Not sure if this helps, but I ran driver verifier and at the next crash got this MEMORY.dmp
Gonna shut down and test the power supply now.
Code
Microsoft (R) Windows Debugger Version 10.0.18362.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff803`43210000 PsLoadedModuleList = 0xfffff803`43658150
Debug session time: Sun Mar 15 17:38:50.234 2020 (UTC - 7:00)
System Uptime: 0 days 1:06:56.962
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000024, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000dc, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803432cb6e0, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: MSI
SYSTEM_PRODUCT_NAME: MS-7752
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: V10.5
BIOS_DATE: 07/11/2013
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: Z77A-G45 Thunderbolt (MS-7752)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 1
BUGCHECK_P1: 24
BUGCHECK_P2: ff
BUGCHECK_P3: dc
BUGCHECK_P4: fffff803432cb6e0
READ_ADDRESS: 0000000000000024
CURRENT_IRQL: 0
FAULTING_IP:
nt!PpmIdleExecuteTransition+750
fffff803`432cb6e0 8b4824 mov ecx,dword ptr [rax+24h]
CPU_COUNT: 8
CPU_MHZ: dac
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 20'00000000 (cache) 20'00000000 (init)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-8KJOVB9
ANALYSIS_SESSION_TIME: 03-15-2020 18:37:24.0550
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffc089c5c29650 -- (.trap 0xffffc089c5c29650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000006
rdx=fffff80342582180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803432cb6e0 rsp=ffffc089c5c297e0 rbp=ffffe10962f41220
r8=fffff80343210000 r9=0000000000000000 r10=0000000000000001
r11=ffff9d7b68600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
nt!PpmIdleExecuteTransition+0x750:
fffff803`432cb6e0 8b4824 mov ecx,dword ptr [rax+24h] ds:00000000`00000024=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803433e41e9 to fffff803433d2380
STACK_TEXT:
ffffc089`c5c29508 fffff803`433e41e9 : 00000000`0000000a 00000000`00000024 00000000`000000ff 00000000`000000dc : nt!KeBugCheckEx
ffffc089`c5c29510 fffff803`433e052b : 00000000`000000ff 00000000`00000000 00000000`00000000 ffff21de`8e39a4d9 : nt!KiBugCheckDispatch+0x69
ffffc089`c5c29650 fffff803`432cb6e0 : 00000000`00000000 00000cd1`00000063 ffffe109`62f41220 00000000`00000071 : nt!KiPageFault+0x46b
ffffc089`c5c297e0 fffff803`432cadee : 00000000`00000003 00000000`00000002 ffffe109`62f41310 00000000`00000008 : nt!PpmIdleExecuteTransition+0x750
ffffc089`c5c29b00 fffff803`433d5e88 : ffffffff`00000000 ffffad81`d3e20180 ffffe109`66239080 00000000`0000073c : nt!PoIdle+0x36e
ffffc089`c5c29c60 00000000`00000000 : ffffc089`c5c2a000 ffffc089`c5c24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: fbc86847fe4eb6c3c1fac4537ef130091fd9343a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d7e0a8c9ee894781cbe0cad88ce7d05e2aa238e2
THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
FOLLOWUP_IP:
nt!PpmIdleExecuteTransition+750
fffff803`432cb6e0 8b4824 mov ecx,dword ptr [rax+24h]
FAULT_INSTR_CODE: c624488b
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PpmIdleExecuteTransition+750
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 750
FAILURE_BUCKET_ID: AV_VRF_nt!PpmIdleExecuteTransition
BUCKET_ID: AV_VRF_nt!PpmIdleExecuteTransition
PRIMARY_PROBLEM_CLASS: AV_VRF_nt!PpmIdleExecuteTransition
TARGET_TIME: 2020-03-16T00:38:50.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 31be
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_vrf_nt!ppmidleexecutetransition
FAILURE_ID_HASH: {7e7d74ed-6c4c-78be-5ab1-61d4e6dbf53e}
Followup: MachineOwner
---------
This post was edited by Schlag96 on Mar 15 2020 07:42pm