DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80069b146b3, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80069b146b3, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 20
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff80069b146b3
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: fffff80069b146b3
READ_ADDRESS: fffff80068f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80068e2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80068e2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff80069b146b3
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ts3client_win64.exe
TRAP_FRAME: ffffb70c2eebc780 -- (.trap 0xffffb70c2eebc780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000ffffffff
rdx=00000000fffffffe rsi=0000000000000000 rdi=0000000000000000
rip=fffff80069b146b3 rsp=ffffb70c2eebc910 rbp=3333333333333333
r8=0000000000000002 r9=0000000000000003 r10=0000000000000000
r11=fffff80068a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
fffff800`69b146b3 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
fffff800`69b146b3 ?? ???
STACK_TEXT:
ffffb70c`2eebc638 fffff800`68bd41e9 : 00000000`0000000a fffff800`69b146b3 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffb70c`2eebc640 fffff800`68bd0529 : ffff8c81`f1a79180 fffff800`68bc955f 00000067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffb70c`2eebc780 fffff800`69b146b3 : ffff8c81`00000001 00000000`fffffffe ffff8c81`ffffffff 00000000`00000002 : nt!KiPageFault+0x469
ffffb70c`2eebc910 ffff8c81`00000001 : 00000000`fffffffe ffff8c81`ffffffff 00000000`00000002 0000000a`868fd6e0 : 0xfffff800`69b146b3
ffffb70c`2eebc918 00000000`fffffffe : ffff8c81`ffffffff 00000000`00000002 0000000a`868fd6e0 00000000`00000000 : 0xffff8c81`00000001
ffffb70c`2eebc920 ffff8c81`ffffffff : 00000000`00000002 0000000a`868fd6e0 00000000`00000000 00000000`00000000 : 0xfffffffe
ffffb70c`2eebc928 00000000`00000002 : 0000000a`868fd6e0 00000000`00000000 00000000`00000000 fffff800`68f8f240 : 0xffff8c81`ffffffff
ffffb70c`2eebc930 0000000a`868fd6e0 : 00000000`00000000 00000000`00000000 fffff800`68f8f240 00000000`00000000 : 0x2
ffffb70c`2eebc938 00000000`00000000 : 00000000`00000000 fffff800`68f8f240 00000000`00000000 00000000`00000000 : 0x0000000a`868fd6e0
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.836
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Followup: MachineOwner
---------
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8000911270d, Virtual address for the attempted execute.
Arg2: 80000001f0ca0963, PTE contents.
Arg3: ffff830f028290f0, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 5
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 24
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: fc
BUGCHECK_P1: fffff8000911270d
BUGCHECK_P2: 80000001f0ca0963
BUGCHECK_P3: ffff830f028290f0
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ctfmon.exe
TRAP_FRAME: ffff830f028290f0 -- (.trap 0xffff830f028290f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa604a3df9080
rdx=ffffcf0588571b48 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000911270d rsp=ffff830f02829280 rbp=ffffcf0585d97960
r8=ffff830f028292c8 r9=7fffcf0588573e28 r10=7ffffffffffffffc
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
fffff800`0911270d ff ???
Resetting default scope
STACK_TEXT:
ffff830f`02828e08 fffff800`08205622 : 00000000`000000fc fffff800`0911270d 80000001`f0ca0963 ffff830f`028290f0 : nt!KeBugCheckEx
ffff830f`02828e10 fffff800`080987c8 : fffff800`0911270d fffffc7e`3f1f8000 00000002`00000000 ffff830f`028290f0 : nt!MiCheckSystemNxFault+0x198fca
ffff830f`02828e50 fffff800`080c91af : ffffa600`003700b8 00000000`00000011 00000000`00000000 fffff800`0911270d : nt!MiSystemFault+0x728
ffff830f`02828f50 fffff800`081d041e : 00000001`00000000 fffff800`0000000c ffffcf05`8830c000 fffff800`0868f74d : nt!MmAccessFault+0x34f
ffff830f`028290f0 fffff800`0911270d : ffffa604`a3df9080 ffffcf05`88571b48 ffff830f`02829560 ffffcf05`9b6da994 : nt!KiPageFault+0x35e
ffff830f`02829280 ffffa604`a3df9080 : ffffcf05`88571b48 ffff830f`02829560 ffffcf05`9b6da994 ffffcf05`85d97950 : 0xfffff800`0911270d
ffff830f`02829288 ffffcf05`88571b48 : ffff830f`02829560 ffffcf05`9b6da994 ffffcf05`85d97950 ffffcf05`85d97960 : 0xffffa604`a3df9080
ffff830f`02829290 ffff830f`02829560 : ffffcf05`9b6da994 ffffcf05`85d97950 ffffcf05`85d97960 00000000`3bf9a523 : 0xffffcf05`88571b48
ffff830f`02829298 ffffcf05`9b6da994 : ffffcf05`85d97950 ffffcf05`85d97960 00000000`3bf9a523 fffff800`086b7b5f : 0xffff830f`02829560
ffff830f`028292a0 ffffcf05`85d97950 : ffffcf05`85d97960 00000000`3bf9a523 fffff800`086b7b5f 00000000`638344fa : 0xffffcf05`9b6da994
ffff830f`028292a8 ffffcf05`85d97960 : 00000000`3bf9a523 fffff800`086b7b5f 00000000`638344fa 00000000`00000000 : 0xffffcf05`85d97950
ffff830f`028292b0 00000000`3bf9a523 : fffff800`086b7b5f 00000000`638344fa 00000000`00000000 00000000`00000000 : 0xffffcf05`85d97960
ffff830f`028292b8 fffff800`086b7b5f : 00000000`638344fa 00000000`00000000 00000000`00000000 ffffcf05`85d97950 : 0x3bf9a523
ffff830f`028292c0 fffff800`086bba10 : ffffcf05`858551a0 ffff830f`00000001 ffff830f`00000004 ffff830f`02829530 : nt!CmpPerformCompleteKcbCacheLookup+0xff
ffff830f`02829390 fffff800`086b8e04 : ffff830f`0000001c ffff830f`028296e0 ffff830f`028296a8 00000000`00000000 : nt!CmpDoParseKey+0x670
ffff830f`02829630 fffff800`086b6cef : ffffa604`a55e8a80 ffffcf05`8cd27501 00000000`00000000 00000000`00000001 : nt!CmpParseKey+0x274
ffff830f`02829850 fffff800`086b5151 : ffffa604`a55e8a00 ffff830f`02829a98 00000000`00000040 ffffa604`9a7f72a0 : nt!ObpLookupObjectName+0x78f
ffff830f`02829a10 fffff800`086be66c : 00000000`00000001 00000000`00000000 00000000`00000000 ffffa604`9a7f72a0 : nt!ObOpenObjectByNameEx+0x201
ffff830f`02829b50 fffff800`086be4ed : 00000092`12ff77c0 ffff830f`02829ec0 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByName+0x5c
ffff830f`02829ba0 fffff800`086c050f : 00000000`00000010 00000092`12ff8258 00000000`00000000 00000092`12ff7e50 : nt!CmOpenKey+0x29d
ffff830f`02829e00 fffff800`081d3c18 : ffffa604`a3df9080 00000252`967be520 ffff830f`02829ec0 00000092`12ff8050 : nt!NtOpenKeyEx+0xf
ffff830f`02829e40 00007ffe`ed1de3c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000092`12ff76e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`ed1de3c4
SYMBOL_NAME: nt!MiCheckSystemNxFault+198fca
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.836
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 198fca
FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd8922986dd74, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80761112713, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 22
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffd8922986dd74
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80761112713
BUGCHECK_P4: 2
READ_ADDRESS: fffff807605733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8076042a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8076042a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffd8922986dd74
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AvastSvc.exe
TRAP_FRAME: ffffea8bfe217850 -- (.trap 0xffffea8bfe217850)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000124 rbx=0000000000000000 rcx=00000000af47df5c
rdx=ffff980b9fc03188 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80761112713 rsp=ffffea8bfe2179e0 rbp=ffffea8bfe217b20
r8=ffffea8bfe217a28 r9=0000000006cb888e r10=0049005600450044
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po nc
tm!TmCommitTransactionExt+0x1d3:
fffff807`61112713 89bccb14020000 mov dword ptr [rbx+rcx*8+214h],edi ds:00000005`7a3efcf4=????????
Resetting default scope
STACK_TEXT:
ffffea8b`fe2175a8 fffff807`6022dd34 : 00000000`00000050 ffffd892`2986dd74 00000000`00000002 ffffea8b`fe217850 : nt!KeBugCheckEx
ffffea8b`fe2175b0 fffff807`600c91af : fffff807`61ab5230 00000000`00000002 00000000`00000000 ffffd892`2986dd74 : nt!MiSystemFault+0x195c94
ffffea8b`fe2176b0 fffff807`601d041e : 00000000`00000000 00000000`00000000 ffffd88c`ae6c68c0 00000000`00000000 : nt!MmAccessFault+0x34f
ffffea8b`fe217850 fffff807`61112713 : ffffd88c`af47e080 ffff980b`9fc03188 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffea8b`fe2179e0 00000000`0000000c : 00000000`00000000 00000000`00000000 00000000`00000103 00000000`00000000 : tm!TmCommitTransactionExt+0x1d3
ffffea8b`fe217a40 00000000`00000000 : 00000000`00000000 00000000`00000103 00000000`00000000 00000000`00000000 : 0xc
SYMBOL_NAME: tm!TmCommitTransactionExt+1d3
MODULE_NAME: tm
IMAGE_NAME: tm.sys
IMAGE_VERSION: 10.0.18362.356
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1d3
FAILURE_BUCKET_ID: AV_INVALID_tm!TmCommitTransactionExt
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e325709f-4be2-35ff-102d-6a73b49b81a5}
Followup: MachineOwner
---------
4: kd> lmvm tm
Browse full module list
start end module name
fffff807`61100000 fffff807`61127000 tm (pdb symbols) C:\ProgramData\Dbg\sym\tm.pdb\437C8C6C45CD9A1EE469E85DABF0B1C51\tm.pdb
Loaded symbol image file: tm.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\tm.sys\9A74C3B727000\tm.sys
Image path: \SystemRoot\System32\drivers\tm.sys
Image name: tm.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 9A74C3B7 (This is a reproducible build file hash, not a timestamp)
CheckSum: 000266D6
ImageSize: 00027000
File version: 10.0.18362.356
Product version: 10.0.18362.356
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: tm.sys
OriginalFilename: tm.sys
ProductVersion: 10.0.18362.356
FileVersion: 10.0.18362.356 (WinBuild.160101.0800)
FileDescription: Kernel Transaction Manager Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ff81185c734, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff890063e68b80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 1
BUGCHECK_P1: 7ff81185c734
BUGCHECK_P2: 0
BUGCHECK_P3: ffff
BUGCHECK_P4: ffff890063e68b80
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
STACK_TEXT:
ffff8900`63e689b8 fffff801`2a9d41e9 : 00000000`00000001 00007ff8`1185c734 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffff8900`63e689c0 fffff801`2a9d4093 : ffffe306`f6c41080 00000000`00000000 ffff8900`63e68b18 ffffffff`ff676980 : nt!KiBugCheckDispatch+0x69
ffff8900`63e68b00 00007ff8`1185c734 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000000`089bde58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`1185c734
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.836
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: 0x1_SysCallNum_36_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {90837ed7-51d1-84e3-21f5-1a89def7df0c}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000118, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80526dc9688, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 4
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 118
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80526dc9688
WRITE_ADDRESS: fffff805271733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8052702a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8052702a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000118
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ts3client_win64.exe
TRAP_FRAME: fffff50cf61e5600 -- (.trap 0xfffff50cf61e5600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000005
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80526dc9688 rsp=fffff50cf61e5790 rbp=00000067b4bbbdff
r8=0000000100000238 r9=0000000100000238 r10=ffffd00006a79180
r11=ffffa88e6c1e1080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!SwapContext+0x2d8:
fffff805`26dc9688 f0480fb38cc218010000 lock btr qword ptr [rdx+rax*8+118h],rcx ds:00000000`00000118=????????????????
Resetting default scope
STACK_TEXT:
fffff50c`f61e54b8 fffff805`26dd41e9 : 00000000`0000000a 00000000`00000118 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff50c`f61e54c0 fffff805`26dd0529 : ffffd000`06ad8180 fffff50c`f61e5680 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff50c`f61e5600 fffff805`26dc9688 : 00000067`b4bbbdff 00000000`00000001 ffffd000`00000000 00000001`00000238 : nt!KiPageFault+0x469
fffff50c`f61e5790 fffff805`26dc90d6 : ffffd000`06c80180 fffff805`26c8f430 00000000`00000000 00000000`00000fff : nt!SwapContext+0x2d8
fffff50c`f61e57d0 fffff805`26d1507d : ffffd000`00000000 00000000`00000000 ffffd000`ffffffff 00000000`00000001 : nt!KiSwapContext+0x76
fffff50c`f61e5910 fffff805`26d13f04 : ffffa88e`6f3e9080 fffff805`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0xbfd
fffff50c`f61e59b0 fffff805`26d0edb0 : ffffa88e`000000ad ffffa88e`00000000 fffff50c`00000001 00000000`00000002 : nt!KiCommitThreadWait+0x144
fffff50c`f61e5a50 fffff805`272b4cef : ffffa88e`6f3e9080 fffff805`26dd3a70 fffff50c`f61e5b10 00000000`00000002 : nt!KeDelayExecutionThread+0x4c0
fffff50c`f61e5ad0 fffff805`26dd3c18 : 00000000`00000000 fffff50c`f61e5b80 ffffffff`fffe7960 ffffa88e`706db6e0 : nt!NtDelayExecution+0x5f
fffff50c`f61e5b00 00007ffc`90b7c6f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a8`610fc848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`90b7c6f4
SYMBOL_NAME: nt!SwapContext+2d8
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.836
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2d8
FAILURE_BUCKET_ID: AV_nt!SwapContext
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
Followup: MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000006,
Arg2: 000000000015dd0d
Arg3: 0000000000000001
Arg4: 0000000005460001
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 5
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 6
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 6
BUGCHECK_P2: 15dd0d
BUGCHECK_P3: 1
BUGCHECK_P4: 5460001
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
fffffe85`ee941098 fffff807`67836c51 : 00000000`0000004e 00000000`00000006 00000000`0015dd0d 00000000`00000001 : nt!KeBugCheckEx
fffffe85`ee9410a0 fffff807`676b43c1 : 00000000`00000000 ffff820d`7d60c038 ffff820d`7d60b000 00000000`00000002 : nt!MiInsertAndUnlockStandbyPages+0x188ef1
fffffe85`ee941130 fffff807`676936d3 : ffff820d`7d60c038 ffff820d`00000040 ffff820d`7d60d002 00000001`5dd0e8c0 : nt!MiDecrementAndInsertStandbyPages+0x241
fffffe85`ee9411a0 fffff807`67c8552f : ffff9609`64500000 ffffe789`685cd130 00000000`00000000 00000000`00000000 : nt!MmUnmapViewInSystemCache+0x453
fffffe85`ee9412b0 fffff807`67692232 : 00000000`000c0000 ffff820d`86e9f950 ffff820d`7d7e2eb8 00000000`00000001 : nt!CcUnmapVacb+0x63
fffffe85`ee9412f0 fffff807`676d4c9b : ffff820d`7d7ec801 ffff820d`7d486050 00000000`00100000 00000000`00100001 : nt!CcUnmapVacbArray+0x202
fffffe85`ee941360 fffff807`67c8f9a9 : 00000000`00000000 00000000`00000000 fffffe85`ee9414a0 fffffe85`ee9414b0 : nt!CcGetVirtualAddress+0x40b
fffffe85`ee941400 fffff807`676d4175 : 00000000`00000000 00000000`00100000 ffff820d`0000f000 ffff820d`8528f001 : nt!CcMapAndCopyFromCache+0x79
fffffe85`ee9414a0 fffff807`6c04a54d : fffffe85`ee9415f0 00000000`00000000 00000000`00010000 00000000`00010000 : nt!CcCopyReadEx+0x135
fffffe85`ee941540 fffff807`6b4e5f77 : 00000000`00000000 00000000`000002b0 ffff820d`86b982b0 00000000`00000000 : Ntfs!NtfsCopyReadA+0x2ed
fffffe85`ee941830 fffff807`6b4e2fa3 : fffffe85`ee941920 00000000`00000000 00000000`00000000 ffff820d`86ee68f0 : FLTMGR!FltpPerformFastIoCall+0x197
fffffe85`ee941890 fffff807`6b51c7c5 : fffffe85`ee9419f8 fffffe85`ee941b80 ffff820d`8528f080 ffff820d`86b982b0 : FLTMGR!FltpPassThroughFastIo+0xd3
fffffe85`ee9418f0 fffff807`67caf10f : ffff820d`86b982b0 00000000`00000000 00000000`00000000 ffff820d`00000000 : FLTMGR!FltpFastIoRead+0x165
fffffe85`ee9419a0 fffff807`677d3c18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x39f
fffffe85`ee941a90 00007ffe`3cefc134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000046`ad1fe328 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3cefc134
SYMBOL_NAME: nt!MiInsertAndUnlockStandbyPages+188ef1
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.836
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 188ef1
FAILURE_BUCKET_ID: 0x4E_6_nt!MiInsertAndUnlockStandbyPages
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f2e306ee-981d-71b2-c912-7d7a45d00cfb}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80044a5b420, Address of the instruction which caused the bugcheck
Arg3: fffff08dbb500420, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 6
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 40
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80044a5b420
BUGCHECK_P3: fffff08dbb500420
BUGCHECK_P4: 0
CONTEXT: fffff08dbb500420 -- (.cxr 0xfffff08dbb500420)
rax=000000000000000e rbx=ffff9981bba00340 rcx=ffff9981bba00340
rdx=ffff9981bba01880 rsi=0000000001000000 rdi=ffffffffffffffff
rip=fffff80044a5b420 rsp=fffff08dbb500e10 rbp=0000000000000000
r8=0000000001000000 r9=0000000000000000 r10=7ffffffffffffffc
r11=0000000000000013 r12=0000000000000001 r13=00000000ffffffff
r14=0000000000000001 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!RtlpHpLfhBucketAddSubsegment+0x14:
fffff800`44a5b420 410fb74022 movzx eax,word ptr [r8+22h] ds:002b:00000000`01000022=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
fffff08d`bb500e10 fffff800`44aa4dc8 : ffff9981`bba00340 00000000`00000000 00000000`00140002 01000000`00100000 : nt!RtlpHpLfhBucketAddSubsegment+0x14
fffff08d`bb500e80 fffff800`44b1e797 : ffff9981`bba00340 6326f6c6`81a1a7ff ffff9981`bba01ad0 00000000`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x378
fffff08d`bb500f40 fffff800`44d6f019 : 00000000`00000001 fffff800`56f3ff54 00000000`00140002 01000000`00100000 : nt!ExFreeHeapPool+0x357
fffff08d`bb501060 fffff800`56fc79c5 : ffff8188`dbb17bb0 fffff800`00000013 ffff8188`00000001 fffff08d`bb501bf9 : nt!ExFreePool+0x9
fffff08d`bb501090 ffff8188`dbb17bb0 : fffff800`00000013 ffff8188`00000001 fffff08d`bb501bf9 00000000`4e4b4e55 : atikmdag+0xe79c5
fffff08d`bb501098 fffff800`00000013 : ffff8188`00000001 fffff08d`bb501bf9 00000000`4e4b4e55 fffff800`56f3ff54 : 0xffff8188`dbb17bb0
fffff08d`bb5010a0 ffff8188`00000001 : fffff08d`bb501bf9 00000000`4e4b4e55 fffff800`56f3ff54 ffff9981`bc439100 : 0xfffff800`00000013
fffff08d`bb5010a8 fffff08d`bb501bf9 : 00000000`4e4b4e55 fffff800`56f3ff54 ffff9981`bc439100 00000000`00000001 : 0xffff8188`00000001
fffff08d`bb5010b0 00000000`4e4b4e55 : fffff800`56f3ff54 ffff9981`bc439100 00000000`00000001 00000001`00000002 : 0xfffff08d`bb501bf9
fffff08d`bb5010b8 fffff800`56f3ff54 : ffff9981`bc439100 00000000`00000001 00000001`00000002 00000000`00000001 : 0x4e4b4e55
fffff08d`bb5010c0 ffff9981`bc439100 : 00000000`00000001 00000001`00000002 00000000`00000001 fffff08d`bb501178 : atikmdag+0x5ff54
fffff08d`bb5010c8 00000000`00000001 : 00000001`00000002 00000000`00000001 fffff08d`bb501178 fffff800`5883090d : 0xffff9981`bc439100
fffff08d`bb5010d0 00000001`00000002 : 00000000`00000001 fffff08d`bb501178 fffff800`5883090d ffff8188`d7deeb90 : 0x1
fffff08d`bb5010d8 00000000`00000001 : fffff08d`bb501178 fffff800`5883090d ffff8188`d7deeb90 fffff08d`bb501bf9 : 0x00000001`00000002
fffff08d`bb5010e0 fffff08d`bb501178 : fffff800`5883090d ffff8188`d7deeb90 fffff08d`bb501bf9 00000000`00000000 : 0x1
fffff08d`bb5010e8 fffff800`5883090d : ffff8188`d7deeb90 fffff08d`bb501bf9 00000000`00000000 fffff800`5ac183b0 : 0xfffff08d`bb501178
fffff08d`bb5010f0 ffff8188`d7deeb90 : fffff08d`bb501bf9 00000000`00000000 fffff800`5ac183b0 ffff9981`bc439100 : atikmdag+0x195090d
fffff08d`bb5010f8 fffff08d`bb501bf9 : 00000000`00000000 fffff800`5ac183b0 ffff9981`bc439100 00000000`00000001 : 0xffff8188`d7deeb90
fffff08d`bb501100 00000000`00000000 : fffff800`5ac183b0 ffff9981`bc439100 00000000`00000001 ffff8188`db1de010 : 0xfffff08d`bb501bf9
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.18362.836
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff08dbb500420 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000000000004, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000000000004, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 22
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: 4
BUGCHECK_P3: 8
BUGCHECK_P4: 4
WRITE_ADDRESS: fffff80081b6e3b0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80081a253b8: Unable to get Flags value from nt!KdVersionBlock
fffff80081a253b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000004
EXCEPTION_PARAMETER1: 0000000000000008
EXCEPTION_PARAMETER2: 0000000000000004
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SrTasks.exe
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffff8682`541637a8 fffff800`818324a5 : 00000000`0000001e ffffffff`c0000005 00000000`00000004 00000000`00000008 : nt!KeBugCheckEx
ffff8682`541637b0 fffff800`817ce81d : ffffb65b`2d96c000 ffff8682`54164040 ffff8000`00000000 00000000`00000004 : nt!KiDispatchException+0x163915
ffff8682`54163e60 fffff800`817caa05 : 00000000`5466744e 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffff8682`54164040 00000000`00000004 : 00000000`00000001 ffffd188`53d8d180 ffffe28d`25715b00 00000000`00000000 : nt!KiPageFault+0x445
ffff8682`541641d0 00000000`00000001 : ffffd188`53d8d180 ffffe28d`25715b00 00000000`00000000 ffffe28d`3a136cb0 : 0x4
ffff8682`541641d8 ffffd188`53d8d180 : ffffe28d`25715b00 00000000`00000000 ffffe28d`3a136cb0 fffff800`81639d80 : 0x1
ffff8682`541641e0 ffffe28d`25715b00 : 00000000`00000000 ffffe28d`3a136cb0 fffff800`81639d80 ffffd188`4fc4c9a8 : 0xffffd188`53d8d180
ffff8682`541641e8 00000000`00000000 : ffffe28d`3a136cb0 fffff800`81639d80 ffffd188`4fc4c9a8 00000000`00000000 : 0xffffe28d`25715b00
SYMBOL_NAME: nt!KiDispatchException+163915
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.239
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 163915
FAILURE_BUCKET_ID: 0x1E_c0000005_X_nt!KiDispatchException
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {72b01280-60ea-6404-b5e3-077cb4799617}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff99327d3d94f2, Address of the instruction which caused the bugcheck
Arg3: ffff960bf3b14920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 4
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff99327d3d94f2
BUGCHECK_P3: ffff960bf3b14920
BUGCHECK_P4: 0
CONTEXT: ffff960bf3b14920 -- (.cxr 0xffff960bf3b14920)
rax=ffff995080a0f3a8 rbx=00000000740a0a27 rcx=0000000000002391
rdx=ffff995080a0f3a8 rsi=ffff995081a0f3a8 rdi=0000000000000000
rip=ffff99327d3d94f2 rsp=ffff960bf3b15310 rbp=000000000000000a
r8=ffff960bf3b15288 r9=0000000000000000 r10=fffff80044839360
r11=ffff960bf3b152e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kbase!HmgShareLock+0x62:
ffff9932`7d3d94f2 40386e0e cmp byte ptr [rsi+0Eh],bpl ds:002b:ffff9950`81a0f3b6=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ts3client_win64.exe
STACK_TEXT:
ffff960b`f3b15310 ffff9932`7d114fdd : 00000000`740a0a27 ffff960b`f3b15618 ffffa202`36887200 ffff960b`f3b15418 : win32kbase!HmgShareLock+0x62
ffff960b`f3b15380 00000000`740a0a27 : ffff960b`f3b15618 ffffa202`36887200 ffff960b`f3b15418 ffff960b`00000000 : win32kfull+0x114fdd
ffff960b`f3b15388 ffff960b`f3b15618 : ffffa202`36887200 ffff960b`f3b15418 ffff960b`00000000 ffff960b`f3b15418 : 0x740a0a27
ffff960b`f3b15390 ffffa202`36887200 : ffff960b`f3b15418 ffff960b`00000000 ffff960b`f3b15418 00000000`00000000 : 0xffff960b`f3b15618
ffff960b`f3b15398 ffff960b`f3b15418 : ffff960b`00000000 ffff960b`f3b15418 00000000`00000000 00000000`00000000 : 0xffffa202`36887200
ffff960b`f3b153a0 ffff960b`00000000 : ffff960b`f3b15418 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff960b`f3b15418
ffff960b`f3b153a8 ffff960b`f3b15418 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff960b`00000000
ffff960b`f3b153b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`740a0a27 : 0xffff960b`f3b15418
SYMBOL_NAME: win32kbase!HmgShareLock+62
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.18362.10050
STACK_COMMAND: .cxr 0xffff960bf3b14920 ; kb
BUCKET_ID_FUNC_OFFSET: 62
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!HmgShareLock
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f8d7532b-024c-73a1-ea86-fe13f10138bd}
Followup: MachineOwner
---------
Anakart takıldıktan sonra başka bir ram kullandık bilgisayarcının internet sekmesi çöktü yine, sonra kendi ramimi taktılar.
- Mevcut RAM'e mi ekleme yaptın yeni RAM mi aldın?
- Yeni aldıysan marka/modeli nedir?
- XMP devrede mi?
Bir de yine bellek testi yapmanı isteyeceğim:
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Kod:KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: 0000000000000004, The address that the exception occurred at Arg3: 0000000000000008, Parameter 0 of the exception Arg4: 0000000000000004, Parameter 1 of the exception Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 4 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 22 Key : Analysis.Memory.CommitPeak.Mb Value: 69 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: 4 BUGCHECK_P3: 8 BUGCHECK_P4: 4 WRITE_ADDRESS: fffff80081b6e3b0: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff80081a253b8: Unable to get Flags value from nt!KdVersionBlock fffff80081a253b8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000004 EXCEPTION_PARAMETER1: 0000000000000008 EXCEPTION_PARAMETER2: 0000000000000004 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: SrTasks.exe TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000) Unable to read trap frame at ffff8000`00000000 STACK_TEXT: ffff8682`541637a8 fffff800`818324a5 : 00000000`0000001e ffffffff`c0000005 00000000`00000004 00000000`00000008 : nt!KeBugCheckEx ffff8682`541637b0 fffff800`817ce81d : ffffb65b`2d96c000 ffff8682`54164040 ffff8000`00000000 00000000`00000004 : nt!KiDispatchException+0x163915 ffff8682`54163e60 fffff800`817caa05 : 00000000`5466744e 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d ffff8682`54164040 00000000`00000004 : 00000000`00000001 ffffd188`53d8d180 ffffe28d`25715b00 00000000`00000000 : nt!KiPageFault+0x445 ffff8682`541641d0 00000000`00000001 : ffffd188`53d8d180 ffffe28d`25715b00 00000000`00000000 ffffe28d`3a136cb0 : 0x4 ffff8682`541641d8 ffffd188`53d8d180 : ffffe28d`25715b00 00000000`00000000 ffffe28d`3a136cb0 fffff800`81639d80 : 0x1 ffff8682`541641e0 ffffe28d`25715b00 : 00000000`00000000 ffffe28d`3a136cb0 fffff800`81639d80 ffffd188`4fc4c9a8 : 0xffffd188`53d8d180 ffff8682`541641e8 00000000`00000000 : ffffe28d`3a136cb0 fffff800`81639d80 ffffd188`4fc4c9a8 00000000`00000000 : 0xffffe28d`25715b00 SYMBOL_NAME: nt!KiDispatchException+163915 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.18362.239 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 163915 FAILURE_BUCKET_ID: 0x1E_c0000005_X_nt!KiDispatchException OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {72b01280-60ea-6404-b5e3-077cb4799617} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: ffff99327d3d94f2, Address of the instruction which caused the bugcheck Arg3: ffff960bf3b14920, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 4 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 4 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: ffff99327d3d94f2 BUGCHECK_P3: ffff960bf3b14920 BUGCHECK_P4: 0 CONTEXT: ffff960bf3b14920 -- (.cxr 0xffff960bf3b14920) rax=ffff995080a0f3a8 rbx=00000000740a0a27 rcx=0000000000002391 rdx=ffff995080a0f3a8 rsi=ffff995081a0f3a8 rdi=0000000000000000 rip=ffff99327d3d94f2 rsp=ffff960bf3b15310 rbp=000000000000000a r8=ffff960bf3b15288 r9=0000000000000000 r10=fffff80044839360 r11=ffff960bf3b152e0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000001 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202 win32kbase!HmgShareLock+0x62: ffff9932`7d3d94f2 40386e0e cmp byte ptr [rsi+0Eh],bpl ds:002b:ffff9950`81a0f3b6=?? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: ts3client_win64.exe STACK_TEXT: ffff960b`f3b15310 ffff9932`7d114fdd : 00000000`740a0a27 ffff960b`f3b15618 ffffa202`36887200 ffff960b`f3b15418 : win32kbase!HmgShareLock+0x62 ffff960b`f3b15380 00000000`740a0a27 : ffff960b`f3b15618 ffffa202`36887200 ffff960b`f3b15418 ffff960b`00000000 : win32kfull+0x114fdd ffff960b`f3b15388 ffff960b`f3b15618 : ffffa202`36887200 ffff960b`f3b15418 ffff960b`00000000 ffff960b`f3b15418 : 0x740a0a27 ffff960b`f3b15390 ffffa202`36887200 : ffff960b`f3b15418 ffff960b`00000000 ffff960b`f3b15418 00000000`00000000 : 0xffff960b`f3b15618 ffff960b`f3b15398 ffff960b`f3b15418 : ffff960b`00000000 ffff960b`f3b15418 00000000`00000000 00000000`00000000 : 0xffffa202`36887200 ffff960b`f3b153a0 ffff960b`00000000 : ffff960b`f3b15418 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff960b`f3b15418 ffff960b`f3b153a8 ffff960b`f3b15418 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff960b`00000000 ffff960b`f3b153b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`740a0a27 : 0xffff960b`f3b15418 SYMBOL_NAME: win32kbase!HmgShareLock+62 MODULE_NAME: win32kbase IMAGE_NAME: win32kbase.sys IMAGE_VERSION: 10.0.18362.10050 STACK_COMMAND: .cxr 0xffff960bf3b14920 ; kb BUCKET_ID_FUNC_OFFSET: 62 FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!HmgShareLock OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f8d7532b-024c-73a1-ea86-fe13f10138bd} Followup: MachineOwner ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.