Çözüldü B450 Tomahawk Max "IRQL NOT LESS OR EQUAL" Mavi Ekran Hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

PentaRavi

Hectopat
Katılım
18 Haziran 2018
Mesajlar
180
Çözümler
2
Daha fazla  
Cinsiyet
Erkek
Arkadaşlar 2 gün önce mavi ekran aldım oyun sırasında ve geri açmaya çalıştığımda bilgisayar açılmadı. Bilgisayarcıya götürdüm RAM oksitlenmiş dedi verdiler açıldı oyun oynamaya devam ettim. Art arda mavi ekranlar almaya başladım, mavi ekran geliyor reset atıyor bir daha geliyor şeklinde ve mavi ekranlarda sürekli bu hata yazıyordu. Mini dump klasörünü paylaşacağım, yardımcı olursanız sevinirim.
 
  1. DDU ile ekran kartı sürücüsünü silin, güncel sürümü yükleyin.
  2. sfc /scannow çalıştırın ve Windows güncelleştirmelerini yapın.
  3. Sorun devam ederse RAM testi yapın: Memtest86 USB'den Çalışan RAM Test Programı - Technopat Sosyal
Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8018a89b09a, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 5

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-K01TCKK

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 27

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8018a89b09a

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff8016ff723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8016fe293b8: Unable to get Flags value from nt!KdVersionBlock
fffff8016fe293b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff

EXCEPTION_PARAMETER2:  ffffffffffffffff

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
fffff801`74e5d0e8 fffff801`6fca660e : 00000000`0000001e ffffffff`c0000005 fffff801`8a89b09a 00000000`00000000 : nt!KeBugCheckEx
fffff801`74e5d0f0 fffff801`6fbc9ecf : fffff801`6ff10000 fffff801`6fa00000 0005e554`00ab5000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
fffff801`74e5d130 fffff801`6fac3555 : 00000000`00000000 00000000`00000000 fffff801`74e5d6a0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
fffff801`74e5d160 fffff801`6fac7aee : fffff801`74e5e098 fffff801`74e5dde0 fffff801`74e5e098 ffffcb00`066eb680 : nt!RtlDispatchException+0x4a5
fffff801`74e5d8b0 fffff801`6fbd301d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
fffff801`74e5df60 fffff801`6fbceda2 : fffff801`74e5e1c8 00000000`00000008 fffff801`74e5e1d0 00000000`00000004 : nt!KiExceptionDispatch+0x11d
fffff801`74e5e140 fffff801`8a89b09a : ffffcb00`0676cab0 00000000`00989680 ffffcb00`08e0abf0 ffffcb00`08e0abf0 : nt!KiGeneralProtectionFault+0x322
fffff801`74e5e2d0 fffff801`8a88479b : ffffcb00`0676ca02 00000000`00000001 fffff801`74e5e529 00000000`00000000 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x1468a
fffff801`74e5e430 fffff801`891c6762 : fffff801`74e5e529 ffffcb00`066eb000 ffffcb00`0422b6e8 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x22b
fffff801`74e5e4e0 fffff801`8c52d810 : ffffcb00`0422b030 00000000`00000000 ffffcb00`0422b030 ffffcb00`043b4000 : dxgkrnl!DxgNotifyDpcCB+0x92
fffff801`74e5e590 ffffcb00`0422b030 : 00000000`00000000 ffffcb00`0422b030 ffffcb00`043b4000 fffff801`8c52d7a3 : nvlddmkm+0xfd810
fffff801`74e5e598 00000000`00000000 : ffffcb00`0422b030 ffffcb00`043b4000 fffff801`8c52d7a3 ffffcb00`043b4000 : 0xffffcb00`0422b030


SYMBOL_NAME:  dxgmms2!VidSchiProcessDpcCompletedPacket+1468a

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1468a

FAILURE_BUCKET_ID:  0x1E_c0000005_R_dxgmms2!VidSchiProcessDpcCompletedPacket

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2edd816b-6458-1421-4c88-56a03ba756f0}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803819f2aa6, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for WdFilter.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 5

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-K01TCKK

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 23

Key : Analysis.Memory.CommitPeak.Mb
Value: 69

Key : Analysis.System
Value: CreateObject


BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff803819f2aa6

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff8037c9713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8037c8283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8037c8283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

EXCEPTION_PARAMETER2: ffffffffffffffff

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
ffffa109`3bdf05e8 fffff803`7c62f0c9 : 00000000`0000001e ffffffff`c0000005 fffff803`819f2aa6 00000000`00000000 : nt!KeBugCheckEx
ffffa109`3bdf05f0 fffff803`7c5d1c1d : 00000000`00000003 fffff803`82884095 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x167ea9
ffffa109`3bdf0ca0 fffff803`7c5cd9a2 : ffffdf0f`c0d6ed90 ffffa109`3bdf1240 ffffdf0f`bbe375a0 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffffa109`3bdf0e80 fffff803`819f2aa6 : ffffdf0f`00000000 ffffa109`3bdf12c0 00000000`00000001 ffffdf0f`c0e2d998 : nt!KiGeneralProtectionFault+0x322
ffffa109`3bdf1010 ffffdf0f`00000000 : ffffa109`3bdf12c0 00000000`00000001 ffffdf0f`c0e2d998 ffffa109`3bdf1280 : WdFilter+0x2aa6
ffffa109`3bdf1018 ffffa109`3bdf12c0 : 00000000`00000001 ffffdf0f`c0e2d998 ffffa109`3bdf1280 fffff803`81a0f7f5 : 0xffffdf0f`00000000
ffffa109`3bdf1020 00000000`00000001 : ffffdf0f`c0e2d998 ffffa109`3bdf1280 fffff803`81a0f7f5 00000000`00000000 : 0xffffa109`3bdf12c0
ffffa109`3bdf1028 ffffdf0f`c0e2d998 : ffffa109`3bdf1280 fffff803`81a0f7f5 00000000`00000000 fffff803`81a01000 : 0x1
ffffa109`3bdf1030 ffffa109`3bdf1280 : fffff803`81a0f7f5 00000000`00000000 fffff803`81a01000 00000000`00000000 : 0xffffdf0f`c0e2d998
ffffa109`3bdf1038 fffff803`81a0f7f5 : 00000000`00000000 fffff803`81a01000 00000000`00000000 00000000`00000000 : 0xffffa109`3bdf1280
ffffa109`3bdf1040 00000000`00000000 : fffff803`81a01000 00000000`00000000 00000000`00000000 ffffa109`3bdf10c8 : WdFilter+0x1f7f5


SYMBOL_NAME: WdFilter+2aa6

MODULE_NAME: WdFilter

IMAGE_NAME:  WdFilter.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 2aa6

FAILURE_BUCKET_ID: 0x1E_c0000005_R_WdFilter!unknown_function

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {688628c6-2348-c0c3-cad3-2bac422de54a}

Followup: MachineOwner
---------
 
Arkadaşlar 2 gün önce mavi ekran aldım oyun sırasında ve geri açmaya çalıştığımda bilgisayar açılmadı. Bilgisayarcıya götürdüm RAM oksitlenmiş dedi verdiler açıldı oyun oynamaya devam ettim. Art arda mavi ekranlar almaya başladım, mavi ekran geliyor reset atıyor bir daha geliyor şeklinde ve mavi ekranlarda sürekli bu hata yazıyordu. Mini dump klasörünü paylaşacağım, yardımcı olursanız sevinirim.


İnceleme üzerine

ntoskrnl.exe ntoskrnl.exe+22F0C9 fffff803'7C400000 fffff803'7CEB5000 0x00ab5000 0x35707659 31.05.1998 00:12:57
Bölümü hata vermiş lütfen attığım konuyu inceleyin.
 
Son düzenleyen: Moderatör:
Anladığım kadarıyla sizde HDD'de problem olmuş. Bende sistem SSD içersinde kurulu. Ayrıca 1TB HDD mevcut. Onlarda sıkıntı olabileceğini sanmıyorum.

Söylediğiniz her şeyi yaptım DDU ile silip en yeni sürümünü yükledim, Memtest yaptım, sonuçlar temiz çıktı. Galiba fotoğrafını yükleceğim. CMD yaptım, onunda sonucunda yazan mesajı ekleyeceğim. Bunları yaptığım sırada oluşan mavi ekranlar için de güncel minidump dosyası atıcam. Sorun hallen devam etmekde ne yapacağımı bilemedim valla.
Yakın zamanda oluşan mavi ekranın görüntüsü. @MF

Merhabalar. 1 haftadır mavi ekran almaktayım. Memory MANAGEMENT, STORE DATA STRUCTURE CORRUPTION ve REFFERENCE by POINTER gibi mavi ekranlar alıyorum. Bunların çoğu Steam oyunlarına girip oynayıp çıktıktan 1 dakika sonra gerçekleşiyor. Bunu en çok RainbowSixSiege oyununda yapıyor. Onun haricinde masaüstünde veya League of Legends oynarken bu tarz bir hata almıyorum. Ekran kartının driverini silip tekrar yükledim onun haricinde sfc/scannow memtest tarzı çoğu şeyi yaptım sonuç hep temiz. Sistemim daha öncesinde mavi ekran sürekli reset atıyordu, veriyordu işlemci kaynaklı. İşlemci ve anakart değişimi yaptım 2-3 aydır problem yoktu fakat şu anda yukarıda da belirttiğim gibi Steam'deki oyunlarıma girip oynayıp çıktığımda bu tarz mavi ekranlar alıyorum. Minidump klasörümün linkini aşağıya bırakacağım yardımcı olabilriseniz çok sevinirim. Son olarak da eskiden mavi ekran aldığım zamanlarda konu açıyordum minidump at diyorlardı, geri 1000 lerce mesaj bırakıyordum hiçbi şekilde geri dönüş olmuyordu. Lütfen o şekilde olmasın arada dönüp bakın el birliğiyle çözelim. Bu tarz problem yaşayanlarada yardımcı olur umarım.


cmdsonuç.png
memtestsonuç.png
memtestsonuc2.png
maviekran34.jpeg
 
Son düzenleyen: Moderatör:
Merhabalar. 1 haftadır mavi ekran almaktayım. Memory MANAGEMENT, STORE DATA STRUCTURE CORRUPTION ve REFFERENCE by POINTER gibi mavi ekranlar alıyorum. Bunların çoğu Steam oyunlarına girip oynayıp çıktıktan 1 dakika sonra gerçekleşiyor. Bunu en çok RainbowSixSiege oyununda yapıyor. Onun haricinde masaüstünde veya League of Legends oynarken bu tarz bir hata almıyorum. Ekran kartının driverini silip tekrar yükledim onun haricinde sfc/scannow memtest tarzı çoğu şeyi yaptım sonuç hep temiz. Sistemim daha öncesinde mavi ekran sürekli reset atıyordu, veriyordu işlemci kaynaklı. İşlemci ve anakart değişimi yaptım 2-3 aydır problem yoktu fakat şu anda yukarıda da belirttiğim gibi Steam'deki oyunlarıma girip oynayıp çıktığımda bu tarz mavi ekranlar alıyorum. Minidump klasörümün linkini aşağıya bırakacağım yardımcı olabilriseniz çok sevinirim. Son olarak da eskiden mavi ekran aldığım zamanlarda konu açıyordum minidump at diyorlardı, geri 1000 lerce mesaj bırakıyordum hiçbi şekilde geri dönüş olmuyordu. Lütfen o şekilde olmasın arada dönüp bakın el birliğiyle çözelim. Bu tarz problem yaşayanlarada yardımcı olur umarım.



Benim gördüğüm kadarıyla Opera ve Whatsapp uygulamaları crash verdirmiş. Bu Uygulamaları kaldırıp tekrar dener misin.
 
Aynı sorunları RAM frekansını 3200'den 3000 MHZ'e çekerek çözdüm. İşlemcinin desteklediği 3000 MHZ frekans değeriymiş. Bir kontrol edin derim.
 
XMP yani DOCP kapat.
Elle frekans yükseltti isen onu da iptal et.
HDTune ile sistemdeki takılı olan tüm depolama birimlerinin Health sonuçlarını paylaş.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff910005eaf520
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 41790

BUGCHECK_P2: ffff910005eaf520

BUGCHECK_P3: 0

BUGCHECK_P4: 1

BUGCHECK_STR:  0x1a_41790

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  opera.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 13:16:35.0943

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80772a25424 to fffff807729c14e0

STACK_TEXT:
ffffa906`24d1d228 fffff807`72a25424 : 00000000`0000001a 00000000`00041790 ffff9100`05eaf520 00000000`00000000 : nt!KeBugCheckEx
ffffa906`24d1d230 fffff807`728ac9e7 : 00000000`00000000 fffff681`2bc7aff8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176c44
ffffa906`24d1d340 fffff807`728acea1 : ffffa906`24d1d790 fffff6fb`4095e3d0 00000000`00000000 0a000001`f8fc6867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffa906`24d1d400 fffff807`728acea1 : ffffa906`24d1d790 fffff6fb`7da04af0 00000000`00000000 0a000000`bdc86867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa906`24d1d4c0 fffff807`728acea1 : ffffa906`24d1d790 fffff6fb`7dbed020 fffff6fb`00000000 0a000000`28530867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa906`24d1d580 fffff807`728ac62c : ffffa906`24d1d790 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa906`24d1d640 fffff807`728aaa98 : ffffa906`24d1d790 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffa906`24d1d740 fffff807`728b8bf0 : ffffffff`ffffffff ffff800a`504c83f8 ffff800a`00000003 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffa906`24d1dae0 fffff807`728591da : 00000000`2578fecf ffff800a`50e49540 00000000`00000000 fffff807`728b3bca : nt!MiDeleteVad+0x860
ffffa906`24d1dca0 fffff807`72e5b820 : 00000000`00000000 00000000`00000000 ffffa906`24d1de00 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
ffffa906`24d1dd00 fffff807`72e5b45b : 00000000`00000000 00000000`00000000 ffff5f2d`c166b51b 00000000`00000000 : nt!MmFreeVirtualMemory+0x390
ffffa906`24d1de40 fffff807`729d2d18 : ffff800a`50e49540 fffff807`72868c32 00000000`00000001 fffff807`81335ae6 : nt!NtFreeVirtualMemory+0x8b
ffffa906`24d1dea0 fffff807`729c5320 : fffff807`8138fa12 00000000`00000000 fffff807`81335b4a 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x28
ffffa906`24d1e038 fffff807`8138fa12 : 00000000`00000000 fffff807`81335b4a 00000000`00000001 00000000`40003740 : nt!KiServiceLinkage
ffffa906`24d1e040 fffff807`813241da : 00000000`02000000 ffffc508`a4f80120 ffffc508`97c67da0 ffffc508`a4f80168 : dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+0x162
ffffa906`24d1e090 fffff807`8138f875 : fffff807`72926050 fffff807`81378b5f 00000000`00000001 ffffc508`97c67da0 : dxgmms2!VIDMM_RECYCLE_BLOCK::`scalar deleting destructor'+0xe
ffffa906`24d1e0c0 fffff807`81377b3b : ffffc508`9516a110 ffffc508`97c67da0 ffffc508`97c67da0 ffffc508`970c43a0 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::DestroyRange+0x5d
ffffa906`24d1e100 fffff807`8137574d : ffff800a`4bd4c270 ffffc508`97c752a0 ffff800a`4bd4c880 ffffc508`a15f3e60 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::MergeSubrangesWherePossible+0x123
ffffa906`24d1e130 fffff807`81311e84 : ffffc508`aad488d0 00000000`00000001 ffff800a`4b2656d0 ffff800a`4b265790 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::~VIDMM_RECYCLE_HEAP_MGR+0x351
ffffa906`24d1e200 fffff807`8137b67b : ffffc508`90bb1850 ffff800a`00000b10 ffff800a`4f1ef8d0 01000000`00100000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::`vector deleting destructor'+0x14
ffffa906`24d1e230 fffff807`81324242 : ffffc508`90bb1850 ffffc508`aad488d0 ffff800a`4b2656d0 00000000`00000070 : dxgmms2!VIDMM_PROCESS::~VIDMM_PROCESS+0x9f
ffffa906`24d1e260 fffff807`7d63aecf : 00000000`00000001 ffffc508`aad489a0 00000000`00000000 ffffc508`aad488d0 : dxgmms2!VidMmTerminateProcess+0x12
ffffa906`24d1e290 fffff807`7d63b0ce : ffff800a`511d4010 ffffa906`24d1e3c0 00000000`00000400 00000000`00000003 : dxgkrnl!VidMmTerminateProcessX+0x63
ffffa906`24d1e2c0 fffff807`7d63cde5 : ffffc508`aad488d0 00000000`00000000 ffffc508`aad488d0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x1be
ffffa906`24d1e530 fffff807`7d548d04 : 00000000`00000005 ffffc508`aad488d0 ffff800a`45708410 ffff800a`504c8080 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffffa906`24d1e670 fffff807`72dcd996 : 00000000`00000000 00000000`00000000 00000000`0000ff00 ffff800a`50f76bd0 : dxgkrnl!DxgkProcessNotify+0xa4
ffffa906`24d1e6b0 fffff807`72e68260 : ffff800a`504c8000 ffff800a`504c8080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x212
ffffa906`24d1e780 fffff807`72e5e68f : ffff800a`50e49b48 00000000`00000000 ffffa906`24d1e959 00000000`00000000 : nt!PspExitProcess+0x70
ffffa906`24d1e7b0 fffff807`72ecd143 : 00000000`00000000 ffff9880`4cbb9101 000000c2`8040e000 00000000`00000000 : nt!PspExitThread+0x5c7
ffffa906`24d1e8c0 fffff807`7283e551 : ffff800a`50e49540 ffff800a`00000000 00000000`00000000 fffff807`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffa906`24d1e900 fffff807`729c5a60 : 00000000`00000001 ffffa906`24d1e9c0 00000000`00000000 fffff807`00000000 : nt!KiDeliverApc+0x481
ffffa906`24d1e9c0 fffff807`729d2dbf : ffff800a`50e49540 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffa906`24d1eb00 00007ffb`687dc144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c2`8039fcd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`687dc144


THREAD_SHA1_HASH_MOD_FUNC:  1c89f26bbb17015d09ca0f672981e07edfbb54e5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  828031524f46b96feb8f870ead324742e6d4c03b

THREAD_SHA1_HASH_MOD:  a2ec8d7416413b211dc9c775d9f28f7b1f1b13f3

FOLLOWUP_IP:
dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+162
fffff807`8138fa12 4863f8          movsxd  rdi,eax

FAULT_INSTR_CODE:  b8f86348

SYMBOL_STACK_INDEX:  e

SYMBOL_NAME:  dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+162

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  162

FAILURE_BUCKET_ID:  0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK

BUCKET_ID:  0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK

PRIMARY_PROBLEM_CLASS:  0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK

TARGET_TIME:  2020-02-04T03:47:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  8437

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41790_dxgmms2!vidmm_recycle_block::_vidmm_recycle_block

FAILURE_ID_HASH:  {80770e6d-f962-9e92-764d-b939dc653edf}

Followup:     MachineOwner
---------


KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801402922ef, The address that the exception occurred at
Arg3: fffff106accd0fe8, Parameter 0 of the exception
Arg4: fffff106accd0830, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff801402922ef

BUGCHECK_P3: fffff106accd0fe8

BUGCHECK_P4: fffff106accd0830

WRITE_ADDRESS: fffff8013d7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff106accd0830

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
Wof!FileProvReadCompressed+2cf
fffff801`402922ef 4c896c2620      mov     qword ptr [rsi+20h],r13

EXCEPTION_PARAMETER1:  fffff106accd0fe8

EXCEPTION_PARAMETER2:  fffff106accd0830

BUGCHECK_STR:  0x1E_c0000005

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  WhatsApp.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 13:16:31.0818

ANALYSIS_VERSION: 10.0.18362.1 x86fre

EXCEPTION_RECORD:  ffff9e4f2793c000 -- (.exr 0xffff9e4f2793c000)
ExceptionAddress: 0a0000002656d867
   ExceptionCode: 26563867
  ExceptionFlags: 0a000000
NumberParameters: 0

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

LAST_CONTROL_TRANSFER:  from fffff8013d4a6567 to fffff8013d3c14e0

STACK_TEXT:
fffff106`acccff88 fffff801`3d4a6567 : 00000000`0000001e ffffffff`c0000005 fffff801`402922ef fffff106`accd0fe8 : nt!KeBugCheckEx
fffff106`acccff90 fffff801`3d3d9136 : fffff801`402922ef fffff801`3d31654b fffff106`accd1220 fffff106`accd0830 : nt!KiFatalFilter+0x1f
fffff106`acccffd0 fffff801`3d39c55c : ffffe884`00000002 fffff106`accd1340 fffff106`acccc000 fffff106`accd2000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
fffff106`accd0010 fffff801`3d3ca312 : fffff106`accd1340 fffff106`accd05f0 00000000`00000000 00000000`0010001f : nt!_C_specific_handler+0xac
fffff106`accd0080 fffff801`3d2c2fa5 : 00000000`0000000e 00000000`00000000 fffff106`accd05f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
fffff106`accd00b0 fffff801`3d2c753e : fffff106`accd0fe8 fffff106`accd0d30 fffff106`accd0fe8 00000000`00000000 : nt!RtlDispatchException+0x4a5
fffff106`accd0800 fffff801`3d3d341d : ffff9e4f`2793c000 fffff106`accd1090 ffff8000`00000000 00000000`00007020 : nt!KiDispatchException+0x16e
fffff106`accd0eb0 fffff801`3d3cf605 : 00000000`00000000 ffff810b`93064cd0 ffffca8f`70d7d000 fffff801`402670cc : nt!KiExceptionDispatch+0x11d
fffff106`accd1090 fffff801`402922ef : ffff810b`93064c40 00000000`00007000 fffff106`accd1250 00000000`00000000 : nt!KiPageFault+0x445
fffff106`accd1220 fffff801`40291fd8 : ffff810b`97837a98 fffff801`40274980 00000000`00007000 ffffca8f`6f5de000 : Wof!FileProvReadCompressed+0x2cf
fffff106`accd1280 fffff801`40266f2e : ffff810b`00007000 fffff801`000006db 00000000`019b96db 00000000`00001694 : Wof!FileProvReadCompressedOnNewStack+0x3cc
fffff106`accd1310 fffff801`3d269e28 : 00000000`00000001 ffff810b`93064c58 00000000`00000008 00000000`00000008 : Wof!FileProvReadCompressedCallout+0xe
fffff106`accd1340 fffff801`3d269d9d : fffff801`40266f20 ffff810b`93064c58 fffff801`40274800 fffff801`3f8e815c : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff106`accd13b0 fffff801`40291bc2 : ffff810b`945d30f8 ffff810b`93064c58 ffffffff`00000010 00000002`ffffffff : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff106`accd13f0 fffff801`402900ce : ffff810b`93064c58 fffff106`accd1500 ffff810b`945d30f8 ffffca8f`7045d4a0 : Wof!FileProvReadCompressedSwitchStacks+0x6e
fffff106`accd1430 fffff801`40261bfa : 00000000`02d29600 fffff106`accd1500 00000000`00000000 00000000`00000000 : Wof!FileProvCbRead+0x1de
fffff106`accd1480 fffff801`3f8e4a5c : ffff810b`945d3218 fffff106`accd15c8 ffff810b`00000001 00000000`00030001 : Wof!WofPreReadCallback+0x41a
fffff106`accd1540 fffff801`3f8e45a0 : fffff106`accd1720 ffffffff`ffffff00 ffff810b`91139003 00000000`00060000 : FLTMGR!FltpPerformPreCallbacks+0x2fc
fffff106`accd1650 fffff801`3f8e4112 : 00000000`00000000 fffff106`accd1720 ffff810b`91139010 fffff106`accd1730 : FLTMGR!FltpPassThroughInternal+0x90
fffff106`accd1680 fffff801`3f8e3efe : fffff106`accd1910 fffff801`3d27a4a8 fffff106`accd1880 ffffca8f`7096c960 : FLTMGR!FltpPassThrough+0x162
fffff106`accd1700 fffff801`3d231f79 : ffff810b`91139010 fffff801`3d25463b 00000001`00000000 00000000`00000005 : FLTMGR!FltpDispatch+0x9e
fffff106`accd1760 fffff801`3d254223 : 00000000`00000005 ffff810b`91139010 ffff810b`946e7820 ffff810b`946e78e0 : nt!IofCallDriver+0x59
fffff106`accd17a0 fffff801`3d28e055 : ffff810b`946e77d0 00000000`00000000 ffff810b`946e7830 ffff810b`946e77f0 : nt!IoPageReadEx+0x1d3
fffff106`accd1810 fffff801`3d28d7a9 : 00000000`00000003 fffff106`accd18f0 fffff106`accd1a58 fffff801`3d274ef6 : nt!MiIssueHardFaultIo+0xc1
fffff106`accd1860 fffff801`3d272fab : 00000000`c0033333 00000000`00000001 00007ff6`bb25c140 ffff810b`95c43120 : nt!MiIssueHardFault+0x489
fffff106`accd1960 fffff801`3d3cf520 : ffff810b`937af080 00000043`8237ee48 00007a68`1b2024c0 ffffffff`fffec780 : nt!MmAccessFault+0x40b
fffff106`accd1b00 00007ff6`bb25c140 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000043`8237b998 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`bb25c140


CHKIMG_EXTENSION: !chkimg -lo 50 -d !Wof
    fffff801402922f2 - Wof!FileProvReadCompressed+2d2
    [ 24:26 ]
1 error : !Wof (fffff801402922f2)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-02-03T21:35:28.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  636b

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------
STORE_DATA_STRUCTURE_CORRUPTION (1c7)
The store component detected a corruption in its data structures.
Arguments:
Arg1: 0000000000000000, A chunk heap buffer's hash doesn't match.
Arg2: ffffdd851e7d2000, Chunk heap buffer whose hash didn't match.
Arg3: 000000001ecf522e, Expected buffer hash.
Arg4: 0000000000029019, Page frame number of the corrupted page.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: ffffdd851e7d2000

BUGCHECK_P3: 1ecf522e

BUGCHECK_P4: 29019

BUGCHECK_STR:  0x1C7_0

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  MemCompression

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 13:16:39.0556

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80279e5d0f8 to fffff80279dc14e0

STACK_TEXT:
fffff581`64edf938 fffff802`79e5d0f8 : 00000000`000001c7 00000000`00000000 ffffdd85`1e7d2000 00000000`1ecf522e : nt!KeBugCheckEx
fffff581`64edf940 fffff802`79d50271 : 00000000`00029019 00000000`00000013 fffff581`64edfa69 fffff802`79d50004 : nt!SmHpBufferProtectEx+0x10ce78
fffff581`64edf9a0 fffff802`79d5018c : 00000000`ffffffff fffff9f1`68c7e414 ffffdd85`1a709068 00000000`00000000 : nt!SmHpChunkUnprotect+0x2d
fffff581`64edf9d0 fffff802`79d4d627 : 00000000`00000000 fffff581`64edfa69 ffffdd85`1a709050 00000000`203b4ceb : nt!ST_STORE<SM_TRAITS>::StDmPageRecordUnprotect+0x1c
fffff581`64edfa00 fffff802`79d4e92d : 00000000`00000000 ffffdd85`1aeee710 00000000`00000000 fffff802`79d3b83f : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x133
fffff581`64edfad0 fffff802`79d3b06e : ffffdd85`1a709000 fffff581`64edfb98 00000000`00000001 ffffdd85`1a711240 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xc1
fffff581`64edfb20 fffff802`79d3af31 : 00000000`00000000 ffff9901`00000000 ffffdd85`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x12e
fffff581`64edfbe0 fffff802`79d2a7a5 : ffffdd85`1a709000 fffff802`79d3af20 fffff581`64e29278 00000067`b4bbbdff : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
fffff581`64edfc10 fffff802`79dc8b2a : ffff9901`72e79180 ffffdd85`1a711240 fffff802`79d2a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff581`64edfc60 00000000`00000000 : fffff581`64ee0000 fffff581`64eda000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  693890a1f3f5ee0dd4da8e2430836951dfaf767f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  1500a6ab9dcdb79749bc00716abe99ba14bfc745

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt!SmHpBufferProtectEx+10ce78
fffff802`79e5d0f8 cc              int     3

FAULT_INSTR_CODE:  3b9cccc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!SmHpBufferProtectEx+10ce78

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10ce78

FAILURE_BUCKET_ID:  0x1C7_0_nt!SmHpBufferProtectEx

BUCKET_ID:  0x1C7_0_nt!SmHpBufferProtectEx

PRIMARY_PROBLEM_CLASS:  0x1C7_0_nt!SmHpBufferProtectEx

TARGET_TIME:  2020-02-03T18:29:20.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  fcd

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1c7_0_nt!smhpbufferprotectex

FAILURE_ID_HASH:  {677f42d4-ea31-d924-1621-3373689c0a0a}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff380ba96b4d8
Arg3: 0000000000040000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff380ba96b4d8

BUGCHECK_P3: 40000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BUGCHECK_STR:  0x1a_41792

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  opera.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 13:16:43.0727

ANALYSIS_VERSION: 10.0.18362.1 x86fre

STACK_TEXT:
ffffbf86`40644eb8 fffff803`2f2252ee : 00000000`0000001a 00000000`00041792 fffff380`ba96b4d8 00000000`00040000 : nt!KeBugCheckEx
ffffbf86`40644ec0 fffff803`2f0ac9e7 : 00000000`00000000 fffff380`ba96b4d8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e
ffffbf86`40644fd0 fffff803`2f0acea1 : ffffbf86`40645420 fffff3f9`c05d4b58 00000000`00000000 0a000001`c7f5e867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffbf86`40645090 fffff803`2f0acea1 : ffffbf86`40645420 fffff3f9`fce02ea0 00000000`00000000 0a000001`e5931867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffbf86`40645150 fffff803`2f0acea1 : ffffbf86`40645420 fffff3f9`fcfe7010 fffff3f9`00000000 0a000001`3c030867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffbf86`40645210 fffff803`2f0ac62c : ffffbf86`40645420 fffff803`2f048ab5 ffff8207`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffbf86`406452d0 fffff803`2f0aaa98 : ffffbf86`40645420 00000000`00000002 ffffd78e`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffbf86`406453d0 fffff803`2f059f57 : ffff8207`49cb8640 fffff803`2f02c700 ffff8207`4f16c080 ffff8207`49cb83f8 : nt!MiDeletePagablePteRange+0x268
ffffbf86`40645770 fffff803`2f05968f : 00000000`00000040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x47
ffffbf86`406457c0 fffff803`2f059249 : 00000000`1752d600 00000175`2d540000 00000175`2d6bffff fffff803`00000001 : nt!MiDeletePartialVad+0x283
ffffbf86`40645900 fffff803`2f65b820 : 00000000`00000001 00000000`00000000 ffffbf86`40645a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x10d
ffffbf86`40645960 fffff803`2f65b45b : 00000000`00000000 0000006d`4edfe978 00007ebe`00002000 00000000`00000004 : nt!MmFreeVirtualMemory+0x390
ffffbf86`40645aa0 fffff803`2f1d2d18 : ffff8207`4f16c080 00000175`2d7232d8 00000000`00000000 ffff8207`00000000 : nt!NtFreeVirtualMemory+0x8b
ffffbf86`40645b00 00007ffa`0ba9c484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000006d`4edfe928 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`0ba9c484


THREAD_SHA1_HASH_MOD_FUNC:  d6f07722cf56e3e31dfa7a21154ed59a802d244f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d4c446ccaafbe7d8cb7dd9dfcdfd314738c297c5

THREAD_SHA1_HASH_MOD:  7f608ac2fbce9034a3386b1d51652e4911d30234

SYMBOL_NAME:  ONE_BIT

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-02-01T23:55:24.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2b71

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
REFERENCE_BY_POINTER (18)
Arguments:
Arg1: ffffe10d2269c640, Object type of the object whose reference count is being lowered
Arg2: ffff8580fa72d770, Object whose reference count is being lowered
Arg3: 0000000000000001, Reserved
Arg4: 0000000000200000, Reserved
    The reference count of an object is illegal for the current state of the object.
    Each time a driver uses a pointer to an object the driver calls a kernel routine
    to increment the reference count of the object. When the driver is done with the
    pointer the driver calls another kernel routine to decrement the reference count.
    Drivers must match calls to the increment and decrement routines. This bugcheck
    can occur because an object's reference count goes to zero while there are still
    open handles to the object, in which case the fourth parameter indicates the number
    of opened handles. It may also occur when the object's reference count drops below zero
    whether or not there are open handles to the object, and in that case the fourth parameter
    contains the actual value of the pointer references count.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffe10d2269c640

BUGCHECK_P2: ffff8580fa72d770

BUGCHECK_P3: 1

BUGCHECK_P4: 200000

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x18

PROCESS_NAME:  Discord.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 13:16:47.0320

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff807071f71c3 to fffff807071c14e0

STACK_TEXT:
ffff8009`47f6b6f8 fffff807`071f71c3 : 00000000`00000018 ffffe10d`2269c640 ffff8580`fa72d770 00000000`00000001 : nt!KeBugCheckEx
ffff8009`47f6b700 fffff807`075c7348 : ffff8581`01893970 ffffe10d`2abacdd0 ffffe10d`2abacdd0 fffff807`07370690 : nt!ObfDereferenceObject+0x1be1a3
ffff8009`47f6b740 fffff807`075c4199 : fffff807`076efbf0 fffff807`075c42a9 ffff8581`00000000 ffffe10d`00000000 : nt!AlpcSecurityDestroyProcedure+0x38
ffff8009`47f6b770 fffff807`075c2450 : ffffe10d`2abacdd0 ffffe10d`2abacdc8 ffffe10d`2abacdd0 ffffffff`ffffffff : nt!AlpcpDereferenceBlobEx+0x59
ffff8009`47f6b7b0 fffff807`075c22df : ffffffff`ffffffff ffff8009`47f6b939 ffffe10d`2abacde0 ffffffff`ffffffff : nt!AlpcpFlushResourcesPort+0xd8
ffff8009`47f6b7e0 fffff807`075c221a : ffffe10d`2abacc80 ffffe10d`2abacc50 00000000`00000000 ffff8009`47f6b939 : nt!AlpcpDoPortCleanup+0x97
ffff8009`47f6b820 fffff807`075ec408 : ffffe10d`2abacc50 ffffe10d`00000000 ffff8581`00000000 ffffe10d`2abacc50 : nt!AlpcpClosePort+0x4a
ffff8009`47f6b850 fffff807`076385a5 : ffffe10d`22e5f418 fffff807`07036a8f ffffe10d`22e5f3e0 ffffe10d`2ebda080 : nt!ObCloseHandleTableEntry+0x278
ffff8009`47f6b990 fffff807`07638241 : ffffe10d`22e5f3e0 ffffe10d`2ebda080 ffffffff`ffffff01 ffffe10d`2b51d6c0 : nt!ExSweepHandleTable+0xd5
ffff8009`47f6ba40 fffff807`07638769 : ffffffff`ffffffff ffffe10d`2b51d3c0 ffff8009`47f6ba90 ffffe10d`00000000 : nt!ObKillProcess+0x35
ffff8009`47f6ba70 fffff807`0765e6d3 : ffffe10d`2b51d3c0 ffff8581`07ca9060 ffff8009`47f6bc99 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffff8009`47f6baf0 fffff807`076cd143 : 00000000`00000000 00000000`00000001 00000000`092fa000 00000000`00000000 : nt!PspExitThread+0x60b
ffff8009`47f6bc00 fffff807`0703e551 : 00000000`0000019c 00000000`13347810 00000000`00000000 00000000`1876e4f8 : nt!KiSchedulerApcTerminate+0x33
ffff8009`47f6bc40 fffff807`071c5a60 : 00000000`00000001 ffff8009`47f6bd00 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffff8009`47f6bd00 fffff807`071d2dbf : ffffe10d`2ebda080 00007ff8`184f5930 00000000`00000020 ffffe10d`2d4e1e60 : nt!KiInitiateUserApc+0x70
ffff8009`47f6be40 00007ff8`1987fdf0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`1086e940 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`1987fdf0


THREAD_SHA1_HASH_MOD_FUNC:  5e6941c18f0c99100ee09b3bfedf3334a797a7d2

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  218fa6f77819d05ed04dd21e93110131075aa609

THREAD_SHA1_HASH_MOD:  9eef8c7ca0ce66f8b8b34848179f303828cff762

FOLLOWUP_IP:
nt!AlpcSecurityDestroyProcedure+38
fffff807`075c7348 488b4b10        mov     rcx,qword ptr [rbx+10h]

FAULT_INSTR_CODE:  104b8b48

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!AlpcSecurityDestroyProcedure+38

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  38

FAILURE_BUCKET_ID:  0x18_CORRUPT_REF_COUNT_nt!AlpcSecurityDestroyProcedure

BUCKET_ID:  0x18_CORRUPT_REF_COUNT_nt!AlpcSecurityDestroyProcedure

PRIMARY_PROBLEM_CLASS:  0x18_CORRUPT_REF_COUNT_nt!AlpcSecurityDestroyProcedure

TARGET_TIME:  2020-01-30T22:13:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3c6f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x18_corrupt_ref_count_nt!alpcsecuritydestroyprocedure

FAILURE_ID_HASH:  {cb8f66d1-54d6-ef14-1fd1-a31af8aa04e5}

Followup:     MachineOwner
---------
 
Son düzenleyen: Moderatör:
  • Işlemci: Ryzen 5 3600
  • Anakart: B450 MSI Tomahawk Max
  • Ekrankartı: MSI GTX 960 4 GB
  • RAM: G.Skill 8 GB ripjawsv 2400MHz Single
  • PSU: Corsair 650W
  • SSD: 120GB Samsung
  • HDD: 1TB WD Blue
Sistem bu şekilde bir de yorumlardaki bir arkadaşın RAM frekansıyla oynadın mı diye bir soru sormuş onu da 2133 MHz idi eski sistemimin anakartı bu sisteme takınca RAM 2133MHz gösterdi bende BIOS'tan 2400E çıkarttım ki gayette desteklemekte bir de sistemimdeki işlemcim ve anakartımı yeni satın aldım diğer parçalar eski.

Aynı sorunları RAM frekansını 3200'den 3000 MHz'e çekerek çözdüm. İşlemcinin desteklediği 3000 MHz frekans değeriymiş. Bir kontrol edin derim.

Benim anakartta işlemcide bayağı yüksek özellikli olduğu için bayağı üst düzeylere kadar destekliyor.
2 Uygulamayı da Microsoft'un kendi mağzası üzerinden indirip kullanıyordum 2sini de kaldırdım hatta Google Chrome'yi bile kaldırmayı düşünüyorum eğer bu etkili olursa geri dönüş yapacağım.

Benim gördüğüm kadarıyla Opera ve WhatsApp uygulamaları crash verdirmiş. Bu uygulamaları kaldırıp tekrar dener misin?

Dediğiniz XMP ayarına baktım kapalı gözüküyor bu da HD Tune health testleri buyrun.

1582461362900.png


1582461374315.png


Sürekli aynı şey bişeyler yazıyorlar, geri dönüş yapıyorum daha sonra hiçbi şekilde konuya geri dönüş yapılmıyor. Sorunum çok basit. Anlayan biri lütfen yardımcı olsun. Ben konuyu açan kişiyim 2 tane hesabım var, problem şu Steam oyunları "Rainbow Six Siege", "Battlerite", "PUBG" gibi oyunları oynadıktan ve kapattıktan sonra bilgisayar mavi ekran veriyor. Bunu normal masaüstünde veya League of Legends gibi başka bi Client'den açılan oyunda yapmıyor. Sadece bu tarz Steam oyunlarında yapılıyo. Minidump'ları paylaştım. Lütfen anlayan biri yardımcı olsun.
 
Son düzenleyen: Moderatör:
Merhabalar. 1 haftadır mavi ekran almaktayım. Memory MANAGEMENT, STORE DATA STRUCTURE CORRUPTION ve REFFERENCE by POINTER gibi mavi ekranlar alıyorum. Bunların çoğu Steam oyunlarına [RainbowSixSiege, PUBG, Battlerite ] girip oynayıp çıktıktan 1 dakika sonra gerçekleşiyor. Onun haricinde masaüstünde veya League of Legends oynarken bu tarz bir hata almıyorum, Minidump klasörünü buraya paylaşıyorum anlayan biri yardımcı olursa sevinirim.


Sistemim:
İşlemci: Ryzen 5 3600
Anakart: B450 MSI Tomahawk Max
Ekrankartı: MSI GTX 960 4 GB
RAM: G.Skill 8 GB RipjawsV 2400MHz Single
PSU: Corsair 650W
SSD: 120GB Samsung
HDD: 1TB WD Blue
 
Son düzenleyen: Moderatör:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı