F4-3200C16-8GVKB görünüyor.*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 00007ff940b2d7d4, Virtual address for the attempted execute.
Arg2: 01000004011af025, PTE contents.
Arg3: ffff87089d30e9b0, (reserved)
Arg4: 0000000080000005, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1686
Key : Analysis.Elapsed.mSec
Value: 4908
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 1117
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.LegacyAPI
Value: 0xfc
Key : Failure.Bucket
Value: 0xFC_nt!MiCheckSystemNxFault
Key : Failure.Hash
Value: {a6ae5288-6b71-974a-9b09-23f14d998164}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: fc
BUGCHECK_P1: 7ff940b2d7d4
BUGCHECK_P2: 1000004011af025
BUGCHECK_P3: ffff87089d30e9b0
BUGCHECK_P4: 80000005
FILE_IN_CAB: 070923-9921-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LogonUI.exe
TRAP_FRAME: ffff87089d30e9b0 -- (.trap 0xffff87089d30e9b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007ff940c02000 rbx=0000000000000000 rcx=0000000000000130
rdx=00007ff940c02000 rsi=0000000000000000 rdi=0000000000000000
rip=00007ff940b2d7d4 rsp=ffff87089d30eb48 rbp=ffff87089d30f120
r8=00007ff940c02000 r9=ffff800000000000 r10=fffff8013584f888
r11=00007ff940b2d7d4 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
00007ff9`40b2d7d4 ?? ???
Resetting default scope
STACK_TEXT:
ffff8708`9d30e6c8 fffff801`35077337 : 00000000`000000fc 00007ff9`40b2d7d4 01000004`011af025 ffff8708`9d30e9b0 : nt!KeBugCheckEx
ffff8708`9d30e6d0 fffff801`34e6ae0a : ffffd20c`00000001 ffff8708`9d30e730 00000000`00000001 fffff801`34e2667b : nt!MiCheckSystemNxFault+0x15082b
ffff8708`9d30e710 fffff801`34e6f232 : 00000000`00000000 01000004`011af025 fffff33f`fca05968 ffffa50d`d9dc90c0 : nt!MiValidFault+0x39a
ffff8708`9d30e780 fffff801`34e6e51a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUserFault+0x7a2
ffff8708`9d30e810 fffff801`3500bad8 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8708`9d30e940 : nt!MmAccessFault+0x16a
ffff8708`9d30e9b0 00007ff9`40b2d7d4 : fffff801`34e282fb fffff801`34c00000 ffff8708`9d30f208 ffff8708`9d30fa00 : nt!KiPageFault+0x358
ffff8708`9d30eb48 fffff801`34e282fb : fffff801`34c00000 ffff8708`9d30f208 ffff8708`9d30fa00 00007fff`00000000 : 0x00007ff9`40b2d7d4
ffff8708`9d30eb50 fffff801`34e2773e : 00000000`00000000 ffff8708`9d30f208 0000002c`5737b658 fffff801`34ce3c4c : nt!RtlpLookupFunctionEntryForStackWalks+0x1fb
ffff8708`9d30ebd0 fffff801`34e28fbc : 00000000`00000005 00000000`00000011 fffff801`00000001 00000000`00000001 : nt!RtlpWalkFrameChain+0x34e
ffff8708`9d30f2e0 fffff801`38a9f2c9 : 00000000`00000000 00000000`00000004 ffffd20c`af0e09f8 ffff8708`9d309000 : nt!RtlWalkFrameChain+0x11c
ffff8708`9d30f330 fffff801`38a9ed3e : ffffd20c`b439c170 00000000`00000001 ffffa50d`e1868568 fffff801`00000001 : Ntfs!NtfsTrackOplockOwnerState+0x169
ffff8708`9d30f3a0 fffff801`38a9e33f : ffffa50d`e1868568 00000000`00000000 ffffa50d`00000103 ffffa50d`00000000 : Ntfs!NtfsOplockRequest+0x2fe
ffff8708`9d30f450 fffff801`38a9decd : ffffa50d`e1868568 00000000`00000001 00000000`00000000 00000000`00000000 : Ntfs!NtfsUserFsRequest+0x14f
ffff8708`9d30f4d0 fffff801`34e11385 : ffffa50d`e09a9c30 ffff8708`9d30f6c0 ffffa50d`dc6a5800 fffff801`328f5021 : Ntfs!NtfsFsdFileSystemControl+0x17d
ffff8708`9d30f5f0 fffff801`328f710f : 00000000`00000004 00000000`00000000 00000000`00000000 ffff8708`9d30f9c8 : nt!IofCallDriver+0x55
ffff8708`9d30f630 fffff801`3292ae74 : ffff8708`9d30f6c0 ffffa50d`c7cc1d50 00000000`000000d8 ffffa50d`c74871c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff8708`9d30f6a0 fffff801`34e11385 : 00000000`0000000a 00000000`00000002 ffffa50d`df444630 00000000`0000000c : FLTMGR!FltpFsControl+0x104
ffff8708`9d30f700 fffff801`35210dec : 00000000`00000002 00000000`00000000 ffffa50d`df444630 ffffa50d`d9dc90c0 : nt!IofCallDriver+0x55
ffff8708`9d30f740 fffff801`35210a41 : ffffa50d`dc6a5c30 ffff8708`9d30fa80 00000000`00040005 ffffa50d`dc6a5c30 : nt!IopSynchronousServiceTail+0x34c
ffff8708`9d30f7e0 fffff801`352ba5e6 : ffffdab9`d58fdf43 00000000`00000c8c 00000000`00000000 000001f6`652b3fa8 : nt!IopXxxControlFile+0xc71
ffff8708`9d30f920 fffff801`3500f7f5 : ffffa50d`00000000 00000000`00000000 ffff8708`9d30f9c8 00000000`00000000 : nt!NtFsControlFile+0x56
ffff8708`9d30f990 00007ff9`40b2d7d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000002c`5737b658 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`40b2d7d4
SYMBOL_NAME: nt!MiCheckSystemNxFault+15082b
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.3086
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 15082b
FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffe408bb8b30c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2484
Key : Analysis.Elapsed.mSec
Value: 10544
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 156
Key : Analysis.Init.Elapsed.mSec
Value: 974
Key : Analysis.Memory.CommitPeak.Mb
Value: 142
Key : Bugcheck.Code.LegacyAPI
Value: 0xef
Key : CriticalProcessDied.ExceptionCode
Value: b2abb080
Key : CriticalProcessDied.Process
Value: svchost.exe
Key : Failure.Bucket
Value: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_b2abb080_nt!PspCatchCriticalBreak
Key : Failure.Hash
Value: {674cb08e-0847-ae4e-a959-cb1301be03b0}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffe408bb8b30c0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FILE_IN_CAB: 070823-10437-01.dmp
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0xb2abb080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
fffffb0e`e6827838 fffff803`8290db42 : 00000000`000000ef ffffe408`bb8b30c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffb0e`e6827840 fffff803`8280d06d : 00000000`00000000 fffff803`82313d19 00000000`00000002 fffff803`822eb36b : nt!PspCatchCriticalBreak+0x10e
fffffb0e`e68278e0 fffff803`82699710 : ffffe408`00000000 00000000`00000000 ffffe408`bb8b30c0 ffffe408`bb8b34f8 : nt!PspTerminateAllThreads+0x172d61
fffffb0e`e6827950 fffff803`8269950c : ffffe408`bb8b30c0 00000000`00000000 00000000`00000000 fffff803`82685ada : nt!PspTerminateProcess+0xe0
fffffb0e`e6827990 fffff803`8240f7f5 : ffffe408`bb8b30c0 ffffe408`b2abb080 fffffb0e`e6827a80 ffffe408`bb8b30c0 : nt!NtTerminateProcess+0x9c
fffffb0e`e6827a00 00007ffc`b28ed634 : 00007ffc`b28a2712 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000003`f1dff828 00007ffc`b28a2712 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b28ed634
00000003`f1dff830 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b28a2712
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3086
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_b2abb080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {674cb08e-0847-ae4e-a959-cb1301be03b0}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffc93ffd4e6430
Arg3: 0000000000100000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1312
Key : Analysis.Elapsed.mSec
Value: 3238
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 218
Key : Analysis.Init.Elapsed.mSec
Value: 2093
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Failure.Bucket
Value: MEMORY_CORRUPTION_ONE_BIT
Key : Failure.Hash
Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Key : MemoryManagement.PFN
Value: 100
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffc93ffd4e6430
BUGCHECK_P3: 100000
BUGCHECK_P4: 0
FILE_IN_CAB: 070723-9859-01.dmp
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffffaa8f`0b8c7028 fffff804`55ebc4aa : 00000000`0000001a 00000000`00041792 ffffc93f`fd4e6430 00000000`00100000 : nt!KeBugCheckEx
ffffaa8f`0b8c7030 fffff804`55ebacdf : ffff9681`23fce740 00000000`00000000 ffffc93f`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffffaa8f`0b8c7130 fffff804`55e7e830 : 00000000`00000001 ffffaa8f`00000000 ffff9681`23fce590 ffff9681`2cf29080 : nt!MiDeletePagablePteRange+0x48f
ffffaa8f`0b8c7440 fffff804`56285e79 : ffff9681`305b3820 00000000`00000000 ffff9681`00000000 ffff9681`00000000 : nt!MiDeleteVad+0x360
ffffaa8f`0b8c7550 fffff804`5628581c : ffff9681`305b3820 ffff9681`2de90010 ffff9681`2cf29080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffaa8f`0b8c7580 fffff804`562246ef : ffff9681`305b1ac0 ffff9681`305b1ac0 ffff9681`305b3820 ffff9681`23fce0c0 : nt!MiCleanVad+0x30
ffffaa8f`0b8c75b0 fffff804`56231820 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9681`23fce0c0 : nt!MmCleanProcessAddressSpace+0x137
ffffaa8f`0b8c7630 fffff804`562841d2 : ffff9681`23fce0c0 ffffcf85`16aa5060 ffffaa8f`0b8c7859 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffaa8f`0b8c76c0 fffff804`562c8878 : ffff9681`00000000 fffff804`55e1be01 ffff9681`00000000 000000b9`73cc6000 : nt!PspExitThread+0x5f6
ffffaa8f`0b8c77c0 fffff804`55ede0cd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffaa8f`0b8c7800 fffff804`56001480 : 00000000`00000000 ffffaa8f`0b8c78c0 ffffaa8f`0b8c7a00 00007ffa`9dff61f0 : nt!KiDeliverApc+0x60d
ffffaa8f`0b8c78c0 fffff804`5600f89f : ffff9681`2cf29080 ffff9681`30e91b60 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffaa8f`0b8c7a00 00007ffa`9f0ad134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000b9`77dff438 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`9f0ad134
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
nt!_WHEA_ERROR_RECORD structure that describes the error condition. Try !errrec Address of the nt!_WHEA_ERROR_RECORD structure to get more details.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: ffffac0fcc348028, Address of the nt!_WHEA_ERROR_RECORD structure.
Arg3: 00000000be000000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000800400, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1890
Key : Analysis.Elapsed.mSec
Value: 6885
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 202
Key : Analysis.Init.Elapsed.mSec
Value: 1487
Key : Analysis.Memory.CommitPeak.Mb
Value: 140
Key : Bugcheck.Code.LegacyAPI
Value: 0x124
Key : Failure.Bucket
Value: 0x124_0_GenuineIntel_PROCESSOR__UNKNOWN_IMAGE_GenuineIntel.sys
Key : Failure.Hash
Value: {5371cb52-c3d9-558e-47d4-d31c09567ca2}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 124
BUGCHECK_P1: 0
BUGCHECK_P2: ffffac0fcc348028
BUGCHECK_P3: be000000
BUGCHECK_P4: 800400
FILE_IN_CAB: 062923-7234-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff8001`0d3f3908 fffff806`204b77ba : 00000000`00000124 00000000`00000000 ffffac0f`cc348028 00000000`be000000 : nt!KeBugCheckEx
ffff8001`0d3f3910 fffff806`1e7815b0 : 00000000`00000000 ffffac0f`cc348028 ffffac0f`c71ef690 ffffac0f`cc348028 : nt!HalBugCheckSystem+0xca
ffff8001`0d3f3950 fffff806`205b9a9e : 00000000`00000000 ffff8001`0d3f39f9 ffffac0f`cc348028 ffffac0f`c71ef690 : PSHED!PshedBugCheckSystem+0x10
ffff8001`0d3f3980 fffff806`204b90e1 : ffffac0f`cc39e070 ffffac0f`cc39e070 ffffac0f`c71ef6e0 ffffac0f`c71ef690 : nt!WheaReportHwError+0x46e
ffff8001`0d3f3a60 fffff806`204b9453 : 00000000`00000007 ffffac0f`c71ef6e0 ffffac0f`c71ef690 00000000`00000007 : nt!HalpMcaReportError+0xb1
ffff8001`0d3f3bd0 fffff806`204b9330 : ffffac0f`c70cae88 00010000`00000001 00000000`00000000 01d5acdd`df81caf3 : nt!HalpMceHandlerCore+0xef
ffff8001`0d3f3c20 fffff806`204b9581 : 00000000`00000008 00000000`00000001 00000000`00000000 00380034`005f0074 : nt!HalpMceHandler+0xe0
ffff8001`0d3f3c60 fffff806`204b87eb : 00000000`00000000 00000000`00000000 ffff8001`0d3f3ef0 00010000`000008ae : nt!HalpMceHandlerWithRendezvous+0xc9
ffff8001`0d3f3c90 fffff806`204bb035 : ffffac0f`c70cae88 01d5acdd`df81caf3 00000000`00009000 00000000`00008a00 : nt!HalpHandleMachineCheck+0x5f
ffff8001`0d3f3cc0 fffff806`20510b59 : 00650072`00500065 0075006f`00690076 00380034`005f0073 00480030`00300030 : nt!HalHandleMcheck+0x35
ffff8001`0d3f3cf0 fffff806`2040cbba : 00010000`00014929 00000000`00580068 00010000`000008ae 01d5acdd`d72c9b62 : nt!KiHandleMcheck+0x9
ffff8001`0d3f3d20 fffff806`2040c877 : 00000000`00000000 fffff806`2040c7ac 00000000`00000002 00000000`00000000 : nt!KxMcheckAbort+0x7a
ffff8001`0d3f3e60 fffff806`507b138f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiMcheckAbort+0x277
ffffd209`dbc8f5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : intelppm!MWaitIdle+0x1f
MODULE_NAME: GenuineIntel
IMAGE_NAME: GenuineIntel.sys
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: 0x124_0_GenuineIntel_PROCESSOR__UNKNOWN_IMAGE_GenuineIntel.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5371cb52-c3d9-558e-47d4-d31c09567ca2}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
nt!_WHEA_ERROR_RECORD structure that describes the error condition. Try !errrec Address of the nt!_WHEA_ERROR_RECORD structure to get more details.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: ffffb987823d1028, Address of the nt!_WHEA_ERROR_RECORD structure.
Arg3: 00000000be000000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000800400, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2500
Key : Analysis.Elapsed.mSec
Value: 5025
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 1482
Key : Analysis.Memory.CommitPeak.Mb
Value: 150
Key : Bugcheck.Code.LegacyAPI
Value: 0x124
Key : Failure.Bucket
Value: 0x124_0_GenuineIntel_PROCESSOR__UNKNOWN_IMAGE_GenuineIntel.sys
Key : Failure.Hash
Value: {5371cb52-c3d9-558e-47d4-d31c09567ca2}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 124
BUGCHECK_P1: 0
BUGCHECK_P2: ffffb987823d1028
BUGCHECK_P3: be000000
BUGCHECK_P4: 800400
FILE_IN_CAB: 062923-9421-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffa801`9f73f908 fffff803`23cb77ba : 00000000`00000124 00000000`00000000 ffffb987`823d1028 00000000`be000000 : nt!KeBugCheckEx
ffffa801`9f73f910 fffff803`226a15b0 : 00000000`00000000 ffffb987`823d1028 ffffb987`7deb0b30 ffffb987`823d1028 : nt!HalBugCheckSystem+0xca
ffffa801`9f73f950 fffff803`23db9a9e : 00000000`00000000 ffffa801`9f73f9f9 ffffb987`823d1028 ffffb987`7deb0b30 : PSHED!PshedBugCheckSystem+0x10
ffffa801`9f73f980 fffff803`23cb90e1 : ffffb987`7dbe3070 ffffb987`7dbe3070 ffffb987`7deb0b80 ffffb987`7deb0b30 : nt!WheaReportHwError+0x46e
ffffa801`9f73fa60 fffff803`23cb9453 : 00000000`00000001 ffffb987`7deb0b80 ffffb987`7deb0b30 00000000`00000001 : nt!HalpMcaReportError+0xb1
ffffa801`9f73fbd0 fffff803`23cb9330 : ffffb987`7daf4a38 e8004024`00000001 00000000`00000000 48482454`8b483c78 : nt!HalpMceHandlerCore+0xef
ffffa801`9f73fc20 fffff803`23cb9581 : 00000000`00000008 00000000`00000001 00000000`00000000 0975d285`48402454 : nt!HalpMceHandler+0xe0
ffffa801`9f73fc60 fffff803`23cb87eb : 00000000`00000000 00000000`00000000 ffffa801`9f73fef0 8d4c0020`24648348 : nt!HalpMceHandlerWithRendezvous+0xc9
ffffa801`9f73fc90 fffff803`23cbb035 : ffffb987`7daf4a38 8d4c0020`24648348 058d4cff`cdf0bb0d 2d158d48`ffd1e1a4 : nt!HalpHandleMachineCheck+0x5f
ffffa801`9f73fcc0 fffff803`23d10b59 : 8d48001f`12da058d 05894800`1f12630d c5058948`001f12d4 ff82d2f0`e8001f12 : nt!HalHandleMcheck+0x35
ffffa801`9f73fcf0 fffff803`23c0cbba : a286158d`48002e00 48382444`8948fffe d48fa7e8`30244c8d ccccc348`c48348ff : nt!KiHandleMcheck+0x9
ffffa801`9f73fd20 fffff803`23c0c877 : 00000000`00000000 fffff803`23c0c7ac 00000000`00000002 00000000`00000000 : nt!KxMcheckAbort+0x7a
ffffa801`9f73fe60 fffff803`5482138f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiMcheckAbort+0x277
fffff309`5042f5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : intelppm!MWaitIdle+0x1f
MODULE_NAME: GenuineIntel
IMAGE_NAME: GenuineIntel.sys
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: 0x124_0_GenuineIntel_PROCESSOR__UNKNOWN_IMAGE_GenuineIntel.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5371cb52-c3d9-558e-47d4-d31c09567ca2}
Followup: MachineOwner
---------
Hocam teşekkür ederim deneyeceğim.- Sistemde genel itibarıyla RAM ile alakalı bir problem görünüyor.
- Hatta hatalardan birinde direk donanımsal olarak RAM hatası var.
- Sistemde 2xF4-3200C16-8GVKBgörünüyor.
- Yani G.Skill Ripjaws V modeli.
- Bu RAM modelinin sorunları bitmek bilmiyor.
- Sanırım XMP açıkken stabil çalışmıyor.
XMP'yi kapatın ve mavi ekran aldığınız senaryoları tekrar canlandırın.
Önceki konuda Memtest86 testinde bir hata çıkmamış. İlginç.
XMP kapalı şekilde denedikten sonra bir de şöyle yapalım.
Her RAM'i tek başına XMP açık olacak şekilde deneyin. Hata gelirse takılı RAM'i söküp diğerini takın, XMP açın ve deneyin. Sorun sadece 1 RAM'de olabilir mesela.
Bu RAM'ler hakkında ilginç bir konumuz vardı. Sadece birinde problem çıkmıştı.
Çözüldü: Ryzen 5 3600X + RTX 3060 sistemde driver çökmesi
İyi Sosyaller, bugün itibarıyla R5 3600X sistemime Zotac RTX 3060 Twin Edge ekran kartı satın aldım. Temiz bir kurulum olması adına BIOS'u güncelledim, bilgisayarı formatladım ve ekran kartı sürücüsünü bu şekilde kurdum. Lakin oyunlarda sürekli DX11 error tarzı driver çökmesi sorunları...www.technopat.net
* Eski tarihli mavi ekranlar ise CPU'daki undervolt'tan kaynaklanmış evet dediğiniz gibi.
Dökümler:
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc) An attempt was made to execute non-executable memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name is printed on the BugCheck screen and saved in KiBugCheckDriver. Arguments: Arg1: 00007ff940b2d7d4, Virtual address for the attempted execute. Arg2: 01000004011af025, PTE contents. Arg3: ffff87089d30e9b0, (reserved) Arg4: 0000000080000005, (reserved) Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1686 Key : Analysis.Elapsed.mSec Value: 4908 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 187 Key : Analysis.Init.Elapsed.mSec Value: 1117 Key : Analysis.Memory.CommitPeak.Mb Value: 145 Key : Bugcheck.Code.LegacyAPI Value: 0xfc Key : Failure.Bucket Value: 0xFC_nt!MiCheckSystemNxFault Key : Failure.Hash Value: {a6ae5288-6b71-974a-9b09-23f14d998164} Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: fc BUGCHECK_P1: 7ff940b2d7d4 BUGCHECK_P2: 1000004011af025 BUGCHECK_P3: ffff87089d30e9b0 BUGCHECK_P4: 80000005 FILE_IN_CAB: 070923-9921-01.dmp BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: LogonUI.exe TRAP_FRAME: ffff87089d30e9b0 -- (.trap 0xffff87089d30e9b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00007ff940c02000 rbx=0000000000000000 rcx=0000000000000130 rdx=00007ff940c02000 rsi=0000000000000000 rdi=0000000000000000 rip=00007ff940b2d7d4 rsp=ffff87089d30eb48 rbp=ffff87089d30f120 r8=00007ff940c02000 r9=ffff800000000000 r10=fffff8013584f888 r11=00007ff940b2d7d4 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc 00007ff9`40b2d7d4 ?? ??? Resetting default scope STACK_TEXT: ffff8708`9d30e6c8 fffff801`35077337 : 00000000`000000fc 00007ff9`40b2d7d4 01000004`011af025 ffff8708`9d30e9b0 : nt!KeBugCheckEx ffff8708`9d30e6d0 fffff801`34e6ae0a : ffffd20c`00000001 ffff8708`9d30e730 00000000`00000001 fffff801`34e2667b : nt!MiCheckSystemNxFault+0x15082b ffff8708`9d30e710 fffff801`34e6f232 : 00000000`00000000 01000004`011af025 fffff33f`fca05968 ffffa50d`d9dc90c0 : nt!MiValidFault+0x39a ffff8708`9d30e780 fffff801`34e6e51a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUserFault+0x7a2 ffff8708`9d30e810 fffff801`3500bad8 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8708`9d30e940 : nt!MmAccessFault+0x16a ffff8708`9d30e9b0 00007ff9`40b2d7d4 : fffff801`34e282fb fffff801`34c00000 ffff8708`9d30f208 ffff8708`9d30fa00 : nt!KiPageFault+0x358 ffff8708`9d30eb48 fffff801`34e282fb : fffff801`34c00000 ffff8708`9d30f208 ffff8708`9d30fa00 00007fff`00000000 : 0x00007ff9`40b2d7d4 ffff8708`9d30eb50 fffff801`34e2773e : 00000000`00000000 ffff8708`9d30f208 0000002c`5737b658 fffff801`34ce3c4c : nt!RtlpLookupFunctionEntryForStackWalks+0x1fb ffff8708`9d30ebd0 fffff801`34e28fbc : 00000000`00000005 00000000`00000011 fffff801`00000001 00000000`00000001 : nt!RtlpWalkFrameChain+0x34e ffff8708`9d30f2e0 fffff801`38a9f2c9 : 00000000`00000000 00000000`00000004 ffffd20c`af0e09f8 ffff8708`9d309000 : nt!RtlWalkFrameChain+0x11c ffff8708`9d30f330 fffff801`38a9ed3e : ffffd20c`b439c170 00000000`00000001 ffffa50d`e1868568 fffff801`00000001 : Ntfs!NtfsTrackOplockOwnerState+0x169 ffff8708`9d30f3a0 fffff801`38a9e33f : ffffa50d`e1868568 00000000`00000000 ffffa50d`00000103 ffffa50d`00000000 : Ntfs!NtfsOplockRequest+0x2fe ffff8708`9d30f450 fffff801`38a9decd : ffffa50d`e1868568 00000000`00000001 00000000`00000000 00000000`00000000 : Ntfs!NtfsUserFsRequest+0x14f ffff8708`9d30f4d0 fffff801`34e11385 : ffffa50d`e09a9c30 ffff8708`9d30f6c0 ffffa50d`dc6a5800 fffff801`328f5021 : Ntfs!NtfsFsdFileSystemControl+0x17d ffff8708`9d30f5f0 fffff801`328f710f : 00000000`00000004 00000000`00000000 00000000`00000000 ffff8708`9d30f9c8 : nt!IofCallDriver+0x55 ffff8708`9d30f630 fffff801`3292ae74 : ffff8708`9d30f6c0 ffffa50d`c7cc1d50 00000000`000000d8 ffffa50d`c74871c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f ffff8708`9d30f6a0 fffff801`34e11385 : 00000000`0000000a 00000000`00000002 ffffa50d`df444630 00000000`0000000c : FLTMGR!FltpFsControl+0x104 ffff8708`9d30f700 fffff801`35210dec : 00000000`00000002 00000000`00000000 ffffa50d`df444630 ffffa50d`d9dc90c0 : nt!IofCallDriver+0x55 ffff8708`9d30f740 fffff801`35210a41 : ffffa50d`dc6a5c30 ffff8708`9d30fa80 00000000`00040005 ffffa50d`dc6a5c30 : nt!IopSynchronousServiceTail+0x34c ffff8708`9d30f7e0 fffff801`352ba5e6 : ffffdab9`d58fdf43 00000000`00000c8c 00000000`00000000 000001f6`652b3fa8 : nt!IopXxxControlFile+0xc71 ffff8708`9d30f920 fffff801`3500f7f5 : ffffa50d`00000000 00000000`00000000 ffff8708`9d30f9c8 00000000`00000000 : nt!NtFsControlFile+0x56 ffff8708`9d30f990 00007ff9`40b2d7d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 0000002c`5737b658 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`40b2d7d4 SYMBOL_NAME: nt!MiCheckSystemNxFault+15082b MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.3086 STACK_COMMAND: .cxr; .ecxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 15082b FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* CRITICAL_PROCESS_DIED (ef) A critical system process died Arguments: Arg1: ffffe408bb8b30c0, Process object or thread object Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died. Arg3: 0000000000000000, The process object that initiated the termination. Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2484 Key : Analysis.Elapsed.mSec Value: 10544 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 156 Key : Analysis.Init.Elapsed.mSec Value: 974 Key : Analysis.Memory.CommitPeak.Mb Value: 142 Key : Bugcheck.Code.LegacyAPI Value: 0xef Key : CriticalProcessDied.ExceptionCode Value: b2abb080 Key : CriticalProcessDied.Process Value: svchost.exe Key : Failure.Bucket Value: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_b2abb080_nt!PspCatchCriticalBreak Key : Failure.Hash Value: {674cb08e-0847-ae4e-a959-cb1301be03b0} Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: ef BUGCHECK_P1: ffffe408bb8b30c0 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 FILE_IN_CAB: 070823-10437-01.dmp PROCESS_NAME: svchost.exe CRITICAL_PROCESS: svchost.exe ERROR_CODE: (NTSTATUS) 0xb2abb080 - <Unable to get error code text> BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 STACK_TEXT: fffffb0e`e6827838 fffff803`8290db42 : 00000000`000000ef ffffe408`bb8b30c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx fffffb0e`e6827840 fffff803`8280d06d : 00000000`00000000 fffff803`82313d19 00000000`00000002 fffff803`822eb36b : nt!PspCatchCriticalBreak+0x10e fffffb0e`e68278e0 fffff803`82699710 : ffffe408`00000000 00000000`00000000 ffffe408`bb8b30c0 ffffe408`bb8b34f8 : nt!PspTerminateAllThreads+0x172d61 fffffb0e`e6827950 fffff803`8269950c : ffffe408`bb8b30c0 00000000`00000000 00000000`00000000 fffff803`82685ada : nt!PspTerminateProcess+0xe0 fffffb0e`e6827990 fffff803`8240f7f5 : ffffe408`bb8b30c0 ffffe408`b2abb080 fffffb0e`e6827a80 ffffe408`bb8b30c0 : nt!NtTerminateProcess+0x9c fffffb0e`e6827a00 00007ffc`b28ed634 : 00007ffc`b28a2712 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000003`f1dff828 00007ffc`b28a2712 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b28ed634 00000003`f1dff830 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b28a2712 SYMBOL_NAME: nt!PspCatchCriticalBreak+10e MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.3086 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 10e FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_b2abb080_nt!PspCatchCriticalBreak OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {674cb08e-0847-ae4e-a959-cb1301be03b0} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: ffffc93ffd4e6430 Arg3: 0000000000100000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1312 Key : Analysis.Elapsed.mSec Value: 3238 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 218 Key : Analysis.Init.Elapsed.mSec Value: 2093 Key : Analysis.Memory.CommitPeak.Mb Value: 145 Key : Bugcheck.Code.LegacyAPI Value: 0x1a Key : Failure.Bucket Value: MEMORY_CORRUPTION_ONE_BIT Key : Failure.Hash Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Key : MemoryManagement.PFN Value: 100 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: ffffc93ffd4e6430 BUGCHECK_P3: 100000 BUGCHECK_P4: 0 FILE_IN_CAB: 070723-9859-01.dmp MEMORY_CORRUPTOR: ONE_BIT BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: opera.exe STACK_TEXT: ffffaa8f`0b8c7028 fffff804`55ebc4aa : 00000000`0000001a 00000000`00041792 ffffc93f`fd4e6430 00000000`00100000 : nt!KeBugCheckEx ffffaa8f`0b8c7030 fffff804`55ebacdf : ffff9681`23fce740 00000000`00000000 ffffc93f`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a ffffaa8f`0b8c7130 fffff804`55e7e830 : 00000000`00000001 ffffaa8f`00000000 ffff9681`23fce590 ffff9681`2cf29080 : nt!MiDeletePagablePteRange+0x48f ffffaa8f`0b8c7440 fffff804`56285e79 : ffff9681`305b3820 00000000`00000000 ffff9681`00000000 ffff9681`00000000 : nt!MiDeleteVad+0x360 ffffaa8f`0b8c7550 fffff804`5628581c : ffff9681`305b3820 ffff9681`2de90010 ffff9681`2cf29080 00000000`00000000 : nt!MiUnmapVad+0x49 ffffaa8f`0b8c7580 fffff804`562246ef : ffff9681`305b1ac0 ffff9681`305b1ac0 ffff9681`305b3820 ffff9681`23fce0c0 : nt!MiCleanVad+0x30 ffffaa8f`0b8c75b0 fffff804`56231820 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9681`23fce0c0 : nt!MmCleanProcessAddressSpace+0x137 ffffaa8f`0b8c7630 fffff804`562841d2 : ffff9681`23fce0c0 ffffcf85`16aa5060 ffffaa8f`0b8c7859 00000000`00000000 : nt!PspRundownSingleProcess+0x20c ffffaa8f`0b8c76c0 fffff804`562c8878 : ffff9681`00000000 fffff804`55e1be01 ffff9681`00000000 000000b9`73cc6000 : nt!PspExitThread+0x5f6 ffffaa8f`0b8c77c0 fffff804`55ede0cd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38 ffffaa8f`0b8c7800 fffff804`56001480 : 00000000`00000000 ffffaa8f`0b8c78c0 ffffaa8f`0b8c7a00 00007ffa`9dff61f0 : nt!KiDeliverApc+0x60d ffffaa8f`0b8c78c0 fffff804`5600f89f : ffff9681`2cf29080 ffff9681`30e91b60 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70 ffffaa8f`0b8c7a00 00007ffa`9f0ad134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 000000b9`77dff438 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`9f0ad134 MODULE_NAME: hardware IMAGE_NAME: memory_corruption STACK_COMMAND: .cxr; .ecxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* WHEA_UNCORRECTABLE_ERROR (124) A fatal hardware error has occurred. Parameter 1 identifies the type of error source that reported the error. Parameter 2 holds the address of the nt!_WHEA_ERROR_RECORD structure that describes the error condition. Try !errrec Address of the nt!_WHEA_ERROR_RECORD structure to get more details. Arguments: Arg1: 0000000000000000, Machine Check Exception Arg2: ffffac0fcc348028, Address of the nt!_WHEA_ERROR_RECORD structure. Arg3: 00000000be000000, High order 32-bits of the MCi_STATUS value. Arg4: 0000000000800400, Low order 32-bits of the MCi_STATUS value. Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION *** *** *** ************************************************************************* ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1890 Key : Analysis.Elapsed.mSec Value: 6885 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 202 Key : Analysis.Init.Elapsed.mSec Value: 1487 Key : Analysis.Memory.CommitPeak.Mb Value: 140 Key : Bugcheck.Code.LegacyAPI Value: 0x124 Key : Failure.Bucket Value: 0x124_0_GenuineIntel_PROCESSOR__UNKNOWN_IMAGE_GenuineIntel.sys Key : Failure.Hash Value: {5371cb52-c3d9-558e-47d4-d31c09567ca2} Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 124 BUGCHECK_P1: 0 BUGCHECK_P2: ffffac0fcc348028 BUGCHECK_P3: be000000 BUGCHECK_P4: 800400 FILE_IN_CAB: 062923-7234-01.dmp BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: ffff8001`0d3f3908 fffff806`204b77ba : 00000000`00000124 00000000`00000000 ffffac0f`cc348028 00000000`be000000 : nt!KeBugCheckEx ffff8001`0d3f3910 fffff806`1e7815b0 : 00000000`00000000 ffffac0f`cc348028 ffffac0f`c71ef690 ffffac0f`cc348028 : nt!HalBugCheckSystem+0xca ffff8001`0d3f3950 fffff806`205b9a9e : 00000000`00000000 ffff8001`0d3f39f9 ffffac0f`cc348028 ffffac0f`c71ef690 : PSHED!PshedBugCheckSystem+0x10 ffff8001`0d3f3980 fffff806`204b90e1 : ffffac0f`cc39e070 ffffac0f`cc39e070 ffffac0f`c71ef6e0 ffffac0f`c71ef690 : nt!WheaReportHwError+0x46e ffff8001`0d3f3a60 fffff806`204b9453 : 00000000`00000007 ffffac0f`c71ef6e0 ffffac0f`c71ef690 00000000`00000007 : nt!HalpMcaReportError+0xb1 ffff8001`0d3f3bd0 fffff806`204b9330 : ffffac0f`c70cae88 00010000`00000001 00000000`00000000 01d5acdd`df81caf3 : nt!HalpMceHandlerCore+0xef ffff8001`0d3f3c20 fffff806`204b9581 : 00000000`00000008 00000000`00000001 00000000`00000000 00380034`005f0074 : nt!HalpMceHandler+0xe0 ffff8001`0d3f3c60 fffff806`204b87eb : 00000000`00000000 00000000`00000000 ffff8001`0d3f3ef0 00010000`000008ae : nt!HalpMceHandlerWithRendezvous+0xc9 ffff8001`0d3f3c90 fffff806`204bb035 : ffffac0f`c70cae88 01d5acdd`df81caf3 00000000`00009000 00000000`00008a00 : nt!HalpHandleMachineCheck+0x5f ffff8001`0d3f3cc0 fffff806`20510b59 : 00650072`00500065 0075006f`00690076 00380034`005f0073 00480030`00300030 : nt!HalHandleMcheck+0x35 ffff8001`0d3f3cf0 fffff806`2040cbba : 00010000`00014929 00000000`00580068 00010000`000008ae 01d5acdd`d72c9b62 : nt!KiHandleMcheck+0x9 ffff8001`0d3f3d20 fffff806`2040c877 : 00000000`00000000 fffff806`2040c7ac 00000000`00000002 00000000`00000000 : nt!KxMcheckAbort+0x7a ffff8001`0d3f3e60 fffff806`507b138f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiMcheckAbort+0x277 ffffd209`dbc8f5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : intelppm!MWaitIdle+0x1f MODULE_NAME: GenuineIntel IMAGE_NAME: GenuineIntel.sys STACK_COMMAND: .cxr; .ecxr ; kb FAILURE_BUCKET_ID: 0x124_0_GenuineIntel_PROCESSOR__UNKNOWN_IMAGE_GenuineIntel.sys OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {5371cb52-c3d9-558e-47d4-d31c09567ca2} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* WHEA_UNCORRECTABLE_ERROR (124) A fatal hardware error has occurred. Parameter 1 identifies the type of error source that reported the error. Parameter 2 holds the address of the nt!_WHEA_ERROR_RECORD structure that describes the error condition. Try !errrec Address of the nt!_WHEA_ERROR_RECORD structure to get more details. Arguments: Arg1: 0000000000000000, Machine Check Exception Arg2: ffffb987823d1028, Address of the nt!_WHEA_ERROR_RECORD structure. Arg3: 00000000be000000, High order 32-bits of the MCi_STATUS value. Arg4: 0000000000800400, Low order 32-bits of the MCi_STATUS value. Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION *** *** *** ************************************************************************* ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2500 Key : Analysis.Elapsed.mSec Value: 5025 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 171 Key : Analysis.Init.Elapsed.mSec Value: 1482 Key : Analysis.Memory.CommitPeak.Mb Value: 150 Key : Bugcheck.Code.LegacyAPI Value: 0x124 Key : Failure.Bucket Value: 0x124_0_GenuineIntel_PROCESSOR__UNKNOWN_IMAGE_GenuineIntel.sys Key : Failure.Hash Value: {5371cb52-c3d9-558e-47d4-d31c09567ca2} Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 124 BUGCHECK_P1: 0 BUGCHECK_P2: ffffb987823d1028 BUGCHECK_P3: be000000 BUGCHECK_P4: 800400 FILE_IN_CAB: 062923-9421-01.dmp BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: ffffa801`9f73f908 fffff803`23cb77ba : 00000000`00000124 00000000`00000000 ffffb987`823d1028 00000000`be000000 : nt!KeBugCheckEx ffffa801`9f73f910 fffff803`226a15b0 : 00000000`00000000 ffffb987`823d1028 ffffb987`7deb0b30 ffffb987`823d1028 : nt!HalBugCheckSystem+0xca ffffa801`9f73f950 fffff803`23db9a9e : 00000000`00000000 ffffa801`9f73f9f9 ffffb987`823d1028 ffffb987`7deb0b30 : PSHED!PshedBugCheckSystem+0x10 ffffa801`9f73f980 fffff803`23cb90e1 : ffffb987`7dbe3070 ffffb987`7dbe3070 ffffb987`7deb0b80 ffffb987`7deb0b30 : nt!WheaReportHwError+0x46e ffffa801`9f73fa60 fffff803`23cb9453 : 00000000`00000001 ffffb987`7deb0b80 ffffb987`7deb0b30 00000000`00000001 : nt!HalpMcaReportError+0xb1 ffffa801`9f73fbd0 fffff803`23cb9330 : ffffb987`7daf4a38 e8004024`00000001 00000000`00000000 48482454`8b483c78 : nt!HalpMceHandlerCore+0xef ffffa801`9f73fc20 fffff803`23cb9581 : 00000000`00000008 00000000`00000001 00000000`00000000 0975d285`48402454 : nt!HalpMceHandler+0xe0 ffffa801`9f73fc60 fffff803`23cb87eb : 00000000`00000000 00000000`00000000 ffffa801`9f73fef0 8d4c0020`24648348 : nt!HalpMceHandlerWithRendezvous+0xc9 ffffa801`9f73fc90 fffff803`23cbb035 : ffffb987`7daf4a38 8d4c0020`24648348 058d4cff`cdf0bb0d 2d158d48`ffd1e1a4 : nt!HalpHandleMachineCheck+0x5f ffffa801`9f73fcc0 fffff803`23d10b59 : 8d48001f`12da058d 05894800`1f12630d c5058948`001f12d4 ff82d2f0`e8001f12 : nt!HalHandleMcheck+0x35 ffffa801`9f73fcf0 fffff803`23c0cbba : a286158d`48002e00 48382444`8948fffe d48fa7e8`30244c8d ccccc348`c48348ff : nt!KiHandleMcheck+0x9 ffffa801`9f73fd20 fffff803`23c0c877 : 00000000`00000000 fffff803`23c0c7ac 00000000`00000002 00000000`00000000 : nt!KxMcheckAbort+0x7a ffffa801`9f73fe60 fffff803`5482138f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiMcheckAbort+0x277 fffff309`5042f5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : intelppm!MWaitIdle+0x1f MODULE_NAME: GenuineIntel IMAGE_NAME: GenuineIntel.sys STACK_COMMAND: .cxr; .ecxr ; kb FAILURE_BUCKET_ID: 0x124_0_GenuineIntel_PROCESSOR__UNKNOWN_IMAGE_GenuineIntel.sys OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {5371cb52-c3d9-558e-47d4-d31c09567ca2} Followup: MachineOwner ---------