i7 3630QM Sistem sürekli mavi ekran verip kapanıyor

Wake up Samurai

Hectopat
Katılım
2 Aralık 2019
Mesajlar
932
Çözümler
6
Bilgisayarım kullanım sırasında sürekli mavi ekran veriyor. Bazen hiç yanıt vermiyor donmalar yaşanıyor. Minidump dosyalarını bırakıyorum.

Dizüstü bilgisayarımın özellikleri:
i7 3630QM.
8 GB 1633MHz RAM (2x4)
NVIDIA 650M.
Laptopun adı: Samsung NP550P5C-S05TR.

 
"Synaptics Pointing Device" Sürücüsün güncelle, Undervolt var mı? Ekran kartını DDU ile kaldır ve en güncel sürümü yükle, Ağ sürücünü güncelle, Memtest86 testi yap.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80654621306, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80654621306

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff80654b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!PoIdle+a6
fffff806`54621306 41899e1c030000  mov     dword ptr [r14+31Ch],ebx

EXCEPTION_PARAMETER2:  ffffffffffffffff

BUGCHECK_STR:  0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-02-2019 17:48:26.0958

ANALYSIS_VERSION: 10.0.18362.1 x86fre

BAD_STACK_POINTER:  ffffce01d45df138

LAST_CONTROL_TRANSFER:  from fffff806548a653e to fffff806547c14e0

STACK_TEXT: 
ffffce01`d45df138 fffff806`548a653e : 00000000`0000001e ffffffff`c0000005 fffff806`54621306 00000000`00000000 : nt!KeBugCheckEx
ffffce01`d45df140 fffff806`547ca312 : fffff806`54b11000 fffff806`54600000 0005e560`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
ffffce01`d45df180 fffff806`546c33c5 : 00000000`00000000 00000000`00000000 ffffce01`d45df6f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffffce01`d45df1b0 fffff806`546c795e : ffff8783`70c7d8c8 ffffce01`d45dfe30 ffff8783`70c7d8c8 ffff9381`5c4ed080 : nt!RtlDispatchException+0x4a5
ffffce01`d45df900 fffff806`547c2362 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffce01`d45dffb0 fffff806`547c2330 : fffff806`547d3416 00000000`000fb8cc fffff806`548f024b 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8783`70c7d788 fffff806`547d3416 : 00000000`000fb8cc fffff806`548f024b 00000000`00000000 fffff806`550b7848 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8783`70c7d790 fffff806`547cf1a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116
ffff8783`70c7d970 fffff806`54621306 : 00000000`00000003 00000000`00000002 ffff9381`5714c0f0 00000000`00000008 : nt!KiGeneralProtectionFault+0x322
ffff8783`70c7db00 fffff806`547c4fe8 : ffffffff`00000000 ffffce01`d45b9180 ffff9381`5c4ed080 00000000`00001478 : nt!PoIdle+0xa6
ffff8783`70c7dc60 00000000`00000000 : ffff8783`70c7e000 ffff8783`70c78000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  b154fa1594f9ea1d8aea6003c540d2f3ef2959a5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d79531b4489f8e9f932fde47cf2d41eec6af2063

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!PoIdle+a6
fffff806`54621306 41899e1c030000  mov     dword ptr [r14+31Ch],ebx

FAULT_INSTR_CODE:  1c9e8941

SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  nt!PoIdle+a6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  a6

FAILURE_BUCKET_ID:  0x1E_c0000005_R_STACKPTR_ERROR_nt!PoIdle

BUCKET_ID:  0x1E_c0000005_R_STACKPTR_ERROR_nt!PoIdle

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_R_STACKPTR_ERROR_nt!PoIdle

TARGET_TIME:  2019-11-30T19:41:14.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  16f4

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_r_stackptr_error_nt!poidle

FAILURE_ID_HASH:  {070b077a-971c-5785-9a06-6c7ac128d8f5}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff804631f4a62, Address of the instruction which caused the bugcheck
Arg3: ffffbc844b491b10, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  SAMSUNG ELECTRONICS CO., LTD.

SYSTEM_PRODUCT_NAME:  550P5C/550P7C

SYSTEM_SKU:  SAMSUNG SENS Series

SYSTEM_VERSION:  P07ABI

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  P07ABI.020.140310.dg

BIOS_DATE:  03/10/2014

BASEBOARD_MANUFACTURER:  SAMSUNG ELECTRONICS CO., LTD.

BASEBOARD_PRODUCT:  NP550P5C-S05TR

BASEBOARD_VERSION:  SEC_SW_REVISION_1234567890ABCD

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff804631f4a62

BUGCHECK_P3: ffffbc844b491b10

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!RtlpHpLfhSlotAllocate+1c1222
fffff804`631f4a62 48ff0a          dec     qword ptr [rdx]

CONTEXT:  ffffbc844b491b10 -- (.cxr 0xffffbc844b491b10)
rax=ffff988448d14000 rbx=ffffffffffffffff rcx=ffff988448600da8
rdx=0000000000000000 rsi=ffff98844dafc000 rdi=0000000000000001
rip=fffff804631f4a62 rsp=ffffbc844b492500 rbp=ffffbc844b492600
 r8=ffff988448600d88  r9=ffff988448600d98 r10=ffff988448d24000
r11=ffff988448600c00 r12=0000000000000002 r13=0000000000000002
r14=0000000000000001 r15=ffff988448600d80
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!RtlpHpLfhSlotAllocate+0x1c1222:
fffff804`631f4a62 48ff0a          dec     qword ptr [rdx] ds:002b:00000000`00000000=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 20'00000000 (cache) 20'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-02-2019 17:48:23.0313

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80463033294 to fffff804631f4a62

STACK_TEXT: 
ffffbc84`4b492500 fffff804`63033294 : ffff9884`48600340 ffff9884`48600c00 ffff9884`48600d80 ffff9884`00000020 : nt!RtlpHpLfhSlotAllocate+0x1c1222
ffffbc84`4b492660 fffff804`6336f06d : ffff9884`00000001 00000000`00000000 00000000`00000000 00000000`00000008 : nt!ExAllocateHeapPool+0xb94
ffffbc84`4b4927a0 fffff804`7420c915 : ffffffff`ffffffff ffffbc84`4b492b80 00000000`00000000 ffffe28b`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffffbc84`4b4927f0 fffff804`7430d579 : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000000 ffffe28b`300e4000 : dxgkrnl!operator new+0x31
ffffbc84`4b492820 fffff804`7431095d : ffff7148`c9245bc1 fffff804`7432def4 ffffe28b`32321080 00000000`00000000 : dxgkrnl!DxgkCreateAllocationInternal+0x449
ffffbc84`4b492ac0 fffff804`631d2d18 : ffffe28b`32321080 ffffe28b`32321080 000001e6`3bedb838 00000000`00000020 : dxgkrnl!DxgkCreateAllocation+0xd
ffffbc84`4b492b00 00007ffc`5a8c46c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000043`539fd018 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`5a8c46c4


THREAD_SHA1_HASH_MOD_FUNC:  24792c79e1de9a604fe8120893d8a9587c4efdc2

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  297201aa73165bf1dca259ecccd3acf6e92ad5d7

THREAD_SHA1_HASH_MOD:  7e8fda681bedb1fc474cfb2f58f3e448efbbb70a

FOLLOWUP_IP:
dxgkrnl!operator new+31
fffff804`7420c915 4883c428        add     rsp,28h

FAULT_INSTR_CODE:  28c48348

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  dxgkrnl!operator new+31

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .cxr 0xffffbc844b491b10 ; kb

BUCKET_ID_FUNC_OFFSET:  31

FAILURE_BUCKET_ID:  0x3B_c0000005_dxgkrnl!operator_new

BUCKET_ID:  0x3B_c0000005_dxgkrnl!operator_new

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_dxgkrnl!operator_new

TARGET_TIME:  2019-11-30T09:56:50.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  1700

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_dxgkrnl!operator_new

FAILURE_ID_HASH:  {2554216e-e8f7-13c5-17bb-08af0abb9161}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8044f3b0697, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for SynTP.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8044f3b0697

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff8043cb733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
SynTP+30697
fffff804`4f3b0697 a05775094038b19416 mov   al,byte ptr [1694B13840097557h]

EXCEPTION_PARAMETER2:  ffffffffffffffff

BUGCHECK_STR:  0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-02-2019 17:48:20.0727

ANALYSIS_VERSION: 10.0.18362.1 x86fre

EXCEPTION_RECORD:  0000000000000004 -- (.exr 0x4)
Cannot read Exception record @ 0000000000000004

LAST_CONTROL_TRANSFER:  from fffff8043c8a653e to fffff8043c7c14e0

STACK_TEXT: 
fffff804`41c88ff8 fffff804`3c8a653e : 00000000`0000001e ffffffff`c0000005 fffff804`4f3b0697 00000000`00000000 : nt!KeBugCheckEx
fffff804`41c89000 fffff804`3c7ca312 : fffff804`3cb11000 fffff804`3c600000 0005e560`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
fffff804`41c89040 fffff804`3c6c33c5 : 00000000`00000000 00000000`00000000 fffff804`41c895b0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
fffff804`41c89070 fffff804`3c6c795e : fffff804`41c89fa8 fffff804`41c89cf0 fffff804`41c89fa8 ffff830e`d6b49310 : nt!RtlDispatchException+0x4a5
fffff804`41c897c0 fffff804`3c7d341d : 00000000`00000004 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
fffff804`41c89e70 fffff804`3c7cf1a2 : 00000016`ffffff00 00000004`0000001c 0000000d`0000007b 00000036`00000023 : nt!KiExceptionDispatch+0x11d
fffff804`41c8a050 fffff804`4f3b0697 : ffff830e`d6b4a190 fffff804`41c8a259 00000000`00000000 ffff830e`d6b49310 : nt!KiGeneralProtectionFault+0x322
fffff804`41c8a1e0 ffff830e`d6b4a190 : fffff804`41c8a259 00000000`00000000 ffff830e`d6b49310 00000000`00000007 : SynTP+0x30697
fffff804`41c8a1e8 fffff804`41c8a259 : 00000000`00000000 ffff830e`d6b49310 00000000`00000007 00000000`00000000 : 0xffff830e`d6b4a190
fffff804`41c8a1f0 00000000`00000000 : ffff830e`d6b49310 00000000`00000007 00000000`00000000 00000000`00000000 : 0xfffff804`41c8a259


THREAD_SHA1_HASH_MOD_FUNC:  b8b97ccf7b1bfd1d39a14c0e95d0e38f510074b0

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  7fb03c951dff74d8f20e3ab17580dacd7b1eea53

THREAD_SHA1_HASH_MOD:  73d4b91887a216bef7319bf58f9b379da637f331

FOLLOWUP_IP:
SynTP+30697
fffff804`4f3b0697 a05775094038b19416 mov   al,byte ptr [1694B13840097557h]

FAULT_INSTR_CODE:  97557a0

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  SynTP+30697

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: SynTP

IMAGE_NAME:  SynTP.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  56a6c59d

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  30697

FAILURE_BUCKET_ID:  0x1E_c0000005_R_SynTP!unknown_function

BUCKET_ID:  0x1E_c0000005_R_SynTP!unknown_function

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_R_SynTP!unknown_function

TARGET_TIME:  2019-11-28T18:20:57.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  10b7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_r_syntp!unknown_function

FAILURE_ID_HASH:  {15c19da1-506d-3a60-edbb-6addf2c27165}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: ffffab034ad19028, Address of the WHEA_ERROR_RECORD structure.
Arg3: 00000000be200000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000041136, Low order 32-bits of the MCi_STATUS value.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: ffffab034ad19028

BUGCHECK_P3: be200000

BUGCHECK_P4: 41136

BUGCHECK_STR:  0x124_GenuineIntel

CPU_COUNT: 8

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  f

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-02-2019 17:50:51.0197

ANALYSIS_VERSION: 10.0.18362.1 x86fre

STACK_TEXT: 
ffffc201`d90ebb58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx


THREAD_SHA1_HASH_MOD_FUNC:  81a83ae0317433a47fcc36991983df3b6e638b71

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6e16edd8c7dd677734fdbcd2397a2e35e9fae964

THREAD_SHA1_HASH_MOD:  76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: GenuineIntel

IMAGE_NAME:  GenuineIntel

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x124_GenuineIntel_PROCESSOR_CACHE

BUCKET_ID:  0x124_GenuineIntel_PROCESSOR_CACHE

PRIMARY_PROBLEM_CLASS:  0x124_GenuineIntel_PROCESSOR_CACHE

TARGET_TIME:  2019-11-27T08:18:11.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  ad7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x124_genuineintel_processor_cache

FAILURE_ID_HASH:  {4c8f3f5e-1af5-ed8b-df14-d42663b1dfa7}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000658b000b18a0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80480028100, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  SAMSUNG ELECTRONICS CO., LTD.

SYSTEM_PRODUCT_NAME:  550P5C/550P7C

SYSTEM_SKU:  SAMSUNG SENS Series

SYSTEM_VERSION:  P07ABI

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  P07ABI.020.140310.dg

BIOS_DATE:  03/10/2014

BASEBOARD_MANUFACTURER:  SAMSUNG ELECTRONICS CO., LTD.

BASEBOARD_PRODUCT:  NP550P5C-S05TR

BASEBOARD_VERSION:  SEC_SW_REVISION_1234567890ABCD

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: 658b000b18a0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80480028100

READ_ADDRESS: fffff804805733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000658b000b18a0 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiIntSteerCalculateDistribution+120
fffff804`80028100 4839b8c0000000  cmp     qword ptr [rax+0C0h],rdi

CPU_COUNT: 8

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 20'00000000 (cache) 20'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-02-2019 17:51:02.0024

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffec81024530d0 -- (.trap 0xffffec81024530d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000658b000b17e0 rbx=0000000000000000 rcx=0000000000000060
rdx=000000000000000a rsi=0000000000000000 rdi=0000000000000000
rip=fffff80480028100 rsp=ffffec8102453260 rbp=ffffec81024532f0
 r8=0000000000000000  r9=fffff80480448de0 r10=0000000000000001
r11=ffffec81024532e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiIntSteerCalculateDistribution+0x120:
fffff804`80028100 4839b8c0000000  cmp     qword ptr [rax+0C0h],rdi ds:0000658b`000b18a0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff804801d32e9 to fffff804801c14e0

STACK_TEXT:  
ffffec81`02452f88 fffff804`801d32e9 : 00000000`0000000a 0000658b`000b18a0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffec81`02452f90 fffff804`801cf62b : 00000000`00000002 00000000`00000000 fffff804`80ab9180 fffff804`80ab7c53 : nt!KiBugCheckDispatch+0x69
ffffec81`024530d0 fffff804`80028100 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
ffffec81`02453260 fffff804`800273be : 00000000`00000001 0f0f0f0f`0f0f0f0f 00000000`00000002 00000000`00000002 : nt!KiIntSteerCalculateDistribution+0x120
ffffec81`02453330 fffff804`80027be0 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : nt!PpmParkSteerInterrupts+0x45e
ffffec81`024537f0 fffff804`8002676e : fffff804`804457a8 00000000`00000000 ffffec81`024539f0 fffff804`8043b560 : nt!PpmCheckStart+0x120
ffffec81`024538a0 fffff804`8006ae95 : ffff9d8f`882a2080 ffff9d8f`882a2080 ffff9d8f`88323390 fffff804`80048cd3 : nt!PpmCheckPeriodicStart+0x3e
ffffec81`024538f0 fffff804`8006a4ef : 00000000`00000002 00000000`00989680 00000000`00000849 00000000`00000061 : nt!KiExecuteAllDpcs+0x305
ffffec81`02453a30 fffff804`801c5024 : ffffffff`00000000 ffffdc81`1d9c5180 ffffdc81`1d9d6240 ffff9d8f`8309d040 : nt!KiRetireDpcList+0x1ef
ffffec81`02453c60 00000000`00000000 : ffffec81`02454000 ffffec81`0244e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84


THREAD_SHA1_HASH_MOD_FUNC:  7278c47338e17a5deef510a79fbc7b8b19c3dafb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  7f52810ba880cdabc79e81e9c50faac73c35e366

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP: 
nt!KiIntSteerCalculateDistribution+120
fffff804`80028100 4839b8c0000000  cmp     qword ptr [rax+0C0h],rdi

FAULT_INSTR_CODE:  c0b83948

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiIntSteerCalculateDistribution+120

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  120

FAILURE_BUCKET_ID:  AV_nt!KiIntSteerCalculateDistribution

BUCKET_ID:  AV_nt!KiIntSteerCalculateDistribution

PRIMARY_PROBLEM_CLASS:  AV_nt!KiIntSteerCalculateDistribution

TARGET_TIME:  2019-11-27T08:13:07.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  1614

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kiintsteercalculatedistribution

FAILURE_ID_HASH:  {3035e70d-e1a6-b78e-ff73-da6251b6f39c}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff94085c733060, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff94085c732fb8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffff94085c733060

BUGCHECK_P3: ffff94085c732fb8

BUGCHECK_P4: 0

TRAP_FRAME:  ffff94085c733060 -- (.trap 0xffff94085c733060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe78a441797e8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8006ca88646 rsp=ffff94085c7331f0 rbp=ffff94085c7332b9
 r8=0000000000000000  r9=0000000000000000 r10=ffff94085c7333b0
r11=ffff9501c11b9180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KeWaitForMultipleObjects+0x3e6:
fffff800`6ca88646 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff94085c732fb8 -- (.exr 0xffff94085c732fb8)
ExceptionAddress: fffff8006ca88646 (nt!KeWaitForMultipleObjects+0x00000000000003e6)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 8

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-02-2019 17:52:31.0140

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8006cbd32e9 to fffff8006cbc14e0

STACK_TEXT:  
ffff9408`5c732d38 fffff800`6cbd32e9 : 00000000`00000139 00000000`00000003 ffff9408`5c733060 ffff9408`5c732fb8 : nt!KeBugCheckEx
ffff9408`5c732d40 fffff800`6cbd3710 : 00000000`00000000 fffff800`7a509411 ffffe78a`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9408`5c732e80 fffff800`6cbd1aa5 : 00000000`000000ff 00000000`0000000a 00000001`00048e02 00000000`00000100 : nt!KiFastFailDispatch+0xd0
ffff9408`5c733060 fffff800`6ca88646 : 00000000`00000000 00000000`00000001 ffff9408`5c733730 ffffe78a`43557000 : nt!KiRaiseSecurityCheckFailure+0x325
ffff9408`5c7331f0 fffff800`6d01fe49 : 00000000`00000005 ffff9408`5c733340 ffffe78a`44c46950 00000000`00000000 : nt!KeWaitForMultipleObjects+0x3e6
ffff9408`5c733300 fffff800`6d01fb65 : ffff9408`5c7339c0 0000005e`ba17f5e8 00000000`00000000 00000000`00000001 : nt!ObWaitForMultipleObjects+0x2a9
ffff9408`5c733800 fffff800`6cbd2d18 : 00000000`00000000 00000000`00000000 ffffe78a`44b1d080 0000005e`ba17f048 : nt!NtWaitForMultipleObjects+0x105
ffff9408`5c733a90 00007ff8`3523cc14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000005e`ba17f028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`3523cc14


THREAD_SHA1_HASH_MOD_FUNC:  75d0e07cbd16d3cbf3da02550f51aef0cd0174f0

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  02149e8695a271328f63051298b0a99748a431b8

THREAD_SHA1_HASH_MOD:  cb5f414824c2521bcc505eaa03e92fa10922dad8

FOLLOWUP_IP: 
nt!KiFastFailDispatch+d0
fffff800`6cbd3710 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

TARGET_TIME:  2019-11-19T06:47:13.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  adb

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffc18044fc4090
Arg3: ffff820e53f34f40
Arg4: fffff802397d330f

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: ffffc18044fc4090

BUGCHECK_P3: ffff820e53f34f40

BUGCHECK_P4: fffff802397d330f

BUGCHECK_STR:  0x7f_8

STACK_OVERFLOW: Stack Limit: ffff820e53f35000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xfffff802397d341d was blamed for the stack overflow. It is using 6720 bytes of stack total in 14 instances (likely recursion).

FOLLOWUP_IP: 
nt!KiExceptionDispatch+11d
fffff802`397d341d 488d8c2400010000 lea     rcx,[rsp+100h]

CPU_COUNT: 8

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  WmiPrvSE.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-02-2019 17:52:12.0092

ANALYSIS_VERSION: 10.0.18362.1 x86fre

STACK_TEXT:  
ffff820e`53f34f40 fffff802`397cd9ab : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xf
ffff820e`53f35120 fffff802`396c7459 : fffff802`396c7134 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f352b8 fffff802`396c7134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f352c0 fffff802`396c78b0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f352f0 fffff802`397d341d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0xc0
ffff820e`53f354a0 fffff802`397cd9ab : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffff820e`53f35680 fffff802`396c7459 : fffff802`396c7134 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f35818 fffff802`396c7134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f35820 fffff802`396c78b0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f35850 fffff802`397d341d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0xc0
ffff820e`53f35a00 fffff802`397cd9ab : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffff820e`53f35be0 fffff802`396c7459 : fffff802`396c7134 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f35d78 fffff802`396c7134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f35d80 fffff802`396c78b0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f35db0 fffff802`397d341d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0xc0
ffff820e`53f35f60 fffff802`397cd9ab : 303deac1`317db50c 9dd99a20`04be0182 c5e9e53b`a9a52aea 177edbb0`aba6372f : nt!KiExceptionDispatch+0x11d
ffff820e`53f36140 fffff802`396c7459 : fffff802`396c7134 42007300`74006e00 65006b00`6f007200 72006500`53007200 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f362d8 fffff802`396c7134 : 42007300`74006e00 65006b00`6f007200 72006500`53007200 2e007200`65007600 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f362e0 fffff802`396c78b0 : 5b91e7cb`ae1b677e b0b0dbc7`b1c57cba a9f901e4`81cdd29c 6931e03c`62666ec0 : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f36310 fffff802`397d341d : ce73b6ca`71edcff1 40a6103a`f52e3aed 0a061030`12318f6c 0c378201`0401062b : nt!KiDispatchException+0xc0
ffff820e`53f364c0 fffff802`397cd9ab : 6b006f00`6f006c00 4c002d00`70007500 2d003100`2d003200 6c006400`2e003000 : nt!KiExceptionDispatch+0x11d
ffff820e`53f366a0 fffff802`396c7459 : fffff802`396c7134 006c0064`002d0063 00310033`005f006c 00380033`00660062 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f36838 fffff802`396c7134 : 006c0064`002d0063 00310033`005f006c 00380033`00660062 00640061`00360035 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f36840 fffff802`396c78b0 : 002e0030`002e0030 00360033`00380031 005f0031`002e0032 0065006e`006f006e : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f36870 fffff802`397d341d : 69007200`67006500 33005f00`79007400 33006600`62003100 61003600`35003800 : nt!KiDispatchException+0xc0
ffff820e`53f36a20 fffff802`397cd9ab : 00300031`0065005f 00390036`00320066 00370061`00360032 00340065`00370066 : nt!KiExceptionDispatch+0x11d
ffff820e`53f36c00 fffff802`396c7459 : fffff802`396c7134 69007700`2d007400 77006f00`64006e00 2e006300`2d007300 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f36d98 fffff802`396c7134 : 69007700`2d007400 77006f00`64006e00 2e006300`2d007300 6d006100`6e002e00 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f36da0 fffff802`396c78b0 : 6c006e00`77006f00 6c006500`76006500 62003100`33005f00 35003800`33006600 : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f36dd0 fffff802`397d341d : 006d0061`006e002e 00610070`00730065 0064002d`00650063 006c006e`0077006f : nt!KiDispatchException+0xc0
ffff820e`53f36f80 fffff802`397cd9ab : 00000000`00000000 0000045f`00000000 00000000`00000579 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffff820e`53f37160 fffff802`396c7459 : fffff802`396c7134 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f372f8 fffff802`396c7134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f37300 fffff802`396c78b0 : 00000000`00000000 00000000`00000000 00000000`00000000 08000000`0000012a : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f37330 fffff802`397d341d : 00000000`00000000 00000000`00000000 00000000`000003cb 00000000`0000042c : nt!KiDispatchException+0xc0
ffff820e`53f374e0 fffff802`397cd9ab : 00000000`00000399 000001df`00000000 08000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffff820e`53f376c0 fffff802`396c7459 : fffff802`396c7134 00000000`00000000 00000000`00000476 00000000`00000000 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f37858 fffff802`396c7134 : 00000000`00000000 00000000`00000476 00000000`00000000 00000000`00000000 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f37860 fffff802`396c78b0 : 00000000`000005cf 00000295`00000538 00000000`00000000 00000000`00000000 : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f37890 fffff802`397d341d : 000005c2`00000000 00000000`0000059f 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0xc0
ffff820e`53f37a40 fffff802`397cd9ab : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffff820e`53f37c20 fffff802`396c7459 : fffff802`396c7134 00000000`00000000 00000000`00000000 000004e5`00000000 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f37db8 fffff802`396c7134 : 00000000`00000000 00000000`00000000 000004e5`00000000 00000000`00000000 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f37dc0 fffff802`396c78b0 : 00000000`00000000 000004f5`00000000 000001c1`00000424 00000000`00000000 : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f37df0 fffff802`397d341d : 00000000`00000000 00000000`00000000 00000000`000005ad 00000000`00000000 : nt!KiDispatchException+0xc0
ffff820e`53f37fa0 fffff802`397cd9ab : 00000000`00000000 00000000`0000022d 00000000`00000034 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffff820e`53f38180 fffff802`396c7459 : fffff802`396c7134 00000000`00000000 00000000`0000059e 00000000`00000213 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f38318 fffff802`396c7134 : 00000000`00000000 00000000`0000059e 00000000`00000213 00000000`00000000 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f38320 fffff802`396c78b0 : 00000478`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f38350 fffff802`397d341d : 00000000`00000000 ffffaf89`00a33e73 00000000`00000000 ffffaf89`00a33e10 : nt!KiDispatchException+0xc0
ffff820e`53f38500 fffff802`397cd9ab : 00000000`00000000 fffff802`3c21a12a 00000000`00000001 fffff802`39a68940 : nt!KiExceptionDispatch+0x11d
ffff820e`53f386e0 fffff802`396c7459 : fffff802`396c7134 00000000`00000201 fffff802`39000001 ffff9880`79180010 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f38878 fffff802`396c7134 : 00000000`00000201 fffff802`39000001 ffff9880`79180010 ffff820e`53f38e88 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f38880 fffff802`396c78b0 : ffff9880`77f32ce0 ffffaf89`09738e70 ffffaf89`00b88180 fffff802`00000000 : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f388b0 fffff802`397d341d : 00000000`00078e86 00000000`00000030 00000000`00000000 ffffaf89`00000000 : nt!KiDispatchException+0xc0
ffff820e`53f38a60 fffff802`397cd9ab : 8a000001`9b2f5863 00000000`00000000 ffffaf89`096d4010 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffff820e`53f38c40 fffff802`396c7459 : fffff802`396c7134 00000000`00000000 ffffaf88`febdd050 ffffaf89`008d28a0 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f38dd8 fffff802`396c7134 : 00000000`00000000 ffffaf88`febdd050 ffffaf89`008d28a0 ffffaf89`09738e70 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f38de0 fffff802`396c78b0 : ffffaf89`0916d8b0 fffff802`39636a8f ffffaf89`008d28a0 ffffaf89`09b79080 : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f38e10 fffff802`397d341d : 00000000`00000000 00000000`00000000 00000000`00000001 fffff802`396485a3 : nt!KiDispatchException+0xc0
ffff820e`53f38fc0 fffff802`397cd9ab : 00000000`00000000 fffff802`396476a7 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatch+0x11d
ffff820e`53f391a0 fffff802`396c7459 : fffff802`396c7134 00000000`00000000 fffff802`00000000 ffff820e`53f394a0 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f39338 fffff802`396c7134 : 00000000`00000000 fffff802`00000000 ffff820e`53f394a0 ffffa900`03279cc0 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f39340 fffff802`396c78b0 : ffffe5e8`c3337c50 ffffb4bc`094f6cf3 ffff820e`00000000 ffff820e`53f39878 : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f39370 fffff802`397d341d : ffff9880`6fc91128 00000000`00000000 ffff820e`53f39618 ffff820e`53f395c8 : nt!KiDispatchException+0xc0
ffff820e`53f39520 fffff802`397cd9ab : 00000000`00000000 ffff29ab`1a2ff484 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffff820e`53f39700 fffff802`396c7459 : fffff802`396c7134 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f39898 fffff802`396c7134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpValidateContextFlags+0x9
ffff820e`53f398a0 fffff802`396c78b0 : 00000000`00000000 fffff802`3963dea5 00000000`00000000 00000000`00000000 : nt!RtlGetExtendedContextLength+0x14
ffff820e`53f398d0 fffff802`397d341d : ffffaf89`09b791c0 ffff820e`53f39f58 00000000`00000000 ffff820e`53f39b31 : nt!KiDispatchException+0xc0
ffff820e`53f39a80 fffff802`397cd9ab : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffff820e`53f39c60 fffff802`396369f6 : 00000000`00000702 ffffaf89`096d4010 fffff802`3c2159d5 00000000`00000000 : nt!KiInvalidOpcodeFault+0x32b
ffff820e`53f39df8 00000000`00000001 : ffff820e`53f39e00 00000000`00000002 ffff820e`00000000 ffffaf89`03c58001 : nt!ExReleaseResourceLite+0x66
ffff820e`53f39e58 ffff820e`53f39e00 : 00000000`00000002 ffff820e`00000000 ffffaf89`03c58001 ffffaf89`00000001 : 0x1
ffff820e`53f39e60 00000000`00000002 : ffff820e`00000000 ffffaf89`03c58001 ffffaf89`00000001 00000001`03c58001 : 0xffff820e`53f39e00
ffff820e`53f39e68 ffff820e`00000000 : ffffaf89`03c58001 ffffaf89`00000001 00000001`03c58001 ffffaf89`09160101 : 0x2
ffff820e`53f39e70 ffffaf89`03c58001 : ffffaf89`00000001 00000001`03c58001 ffffaf89`09160101 ffff9880`6fcced70 : 0xffff820e`00000000
ffff820e`53f39e78 ffffaf89`00000001 : 00000001`03c58001 ffffaf89`09160101 ffff9880`6fcced70 ffffaf89`00b65d08 : 0xffffaf89`03c58001
ffff820e`53f39e80 00000001`03c58001 : ffffaf89`09160101 ffff9880`6fcced70 ffffaf89`00b65d08 00000000`00003000 : 0xffffaf89`00000001
ffff820e`53f39e88 ffffaf89`09160101 : ffff9880`6fcced70 ffffaf89`00b65d08 00000000`00003000 fffff802`00000002 : 0x00000001`03c58001
ffff820e`53f39e90 ffff9880`6fcced70 : ffffaf89`00b65d08 00000000`00003000 fffff802`00000002 00000000`00000000 : 0xffffaf89`09160101
ffff820e`53f39e98 ffffaf89`00b65d08 : 00000000`00003000 fffff802`00000002 00000000`00000000 ffffaf89`096d4010 : 0xffff9880`6fcced70
ffff820e`53f39ea0 00000000`00003000 : fffff802`00000002 00000000`00000000 ffffaf89`096d4010 00003000`00003000 : 0xffffaf89`00b65d08
ffff820e`53f39ea8 fffff802`00000002 : 00000000`00000000 ffffaf89`096d4010 00003000`00003000 ffffaf89`096d4010 : 0x3000
ffff820e`53f39eb0 00000000`00000000 : ffffaf89`096d4010 00003000`00003000 ffffaf89`096d4010 ffff9880`6fc688d0 : 0xfffff802`00000002


THREAD_SHA1_HASH_MOD_FUNC:  fb3db366c377c29ee2be8c327bf14cfee56c12eb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6c97db6059699f2d9aba91dedba84d8b7f39aea3

THREAD_SHA1_HASH_MOD:  3bc0232f5912a8bba20a84887ac7ea5799d8f951

FAULT_INSTR_CODE:  248c8d48

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  nt!KiExceptionDispatch+11d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  11d

FAILURE_BUCKET_ID:  0x7f_8_STACK_USAGE_RECURSION_nt!KiExceptionDispatch

BUCKET_ID:  0x7f_8_STACK_USAGE_RECURSION_nt!KiExceptionDispatch

PRIMARY_PROBLEM_CLASS:  0x7f_8_STACK_USAGE_RECURSION_nt!KiExceptionDispatch

TARGET_TIME:  2019-11-19T06:06:09.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  170a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x7f_8_stack_usage_recursion_nt!kiexceptiondispatch

FAILURE_ID_HASH:  {565112d6-85c4-b2a5-ce33-9d787f67e836}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000dd6eac28, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80153441044, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for rt640x64.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: dd6eac28

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80153441044

READ_ADDRESS: fffff80150b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 00000000dd6eac28 

CURRENT_IRQL:  2

FAULTING_IP: 
pci!PciBusInterface_GetBusData+34
fffff801`53441044 8b8768050000    mov     eax,dword ptr [rdi+568h]

CPU_COUNT: 8

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-02-2019 17:52:06.0811

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff83018f86f4a0 -- (.trap 0xffff83018f86f4a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80153441010 rbx=0000000000000000 rcx=ffff858fdd6ea6c0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80153441044 rsp=ffff83018f86f630 rbp=0000000000000081
 r8=ffff83018f86f750  r9=0000000000000000 r10=0000fffff8015344
r11=ffff9d7c7ac00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
pci!PciBusInterface_GetBusData+0x34:
fffff801`53441044 8b8768050000    mov     eax,dword ptr [rdi+568h] ds:00000000`00000568=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff801507d32e9 to fffff801507c14e0

STACK_TEXT:  
ffff8301`8f86f358 fffff801`507d32e9 : 00000000`0000000a 00000000`dd6eac28 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8301`8f86f360 fffff801`507cf62b : ffff858f`dd83ca03 00000000`00000002 00000000`00000001 ffff858f`dd855e28 : nt!KiBugCheckDispatch+0x69
ffff8301`8f86f4a0 fffff801`53441044 : 00000000`00000000 00000000`00000000 00000000`00000004 00000000`00000020 : nt!KiPageFault+0x46b
ffff8301`8f86f630 fffff801`53ccda56 : 00000000`00000000 00000000`00000081 ffff8301`8f86f750 ffff858f`e07a71a0 : pci!PciBusInterface_GetBusData+0x34
ffff8301`8f86f6b0 fffff801`6391d00d : ffff858f`e0a09000 fffff801`6397b050 00000000`00000001 ffff858f`e0998600 : ndis!NdisMGetBusData+0xa6
ffff8301`8f86f710 ffff858f`e0a09000 : fffff801`6397b050 00000000`00000001 ffff858f`e0998600 00007a70`00000001 : rt640x64+0xad00d
ffff8301`8f86f718 fffff801`6397b050 : 00000000`00000001 ffff858f`e0998600 00007a70`00000001 fffff801`531014e1 : 0xffff858f`e0a09000
ffff8301`8f86f720 00000000`00000001 : ffff858f`e0998600 00007a70`00000001 fffff801`531014e1 ffff858f`e0998600 : rt640x64+0x10b050
ffff8301`8f86f728 ffff858f`e0998600 : 00007a70`00000001 fffff801`531014e1 ffff858f`e0998600 fffff801`63910850 : 0x1
ffff8301`8f86f730 00007a70`00000001 : fffff801`531014e1 ffff858f`e0998600 fffff801`63910850 00000000`000000ff : 0xffff858f`e0998600
ffff8301`8f86f738 fffff801`531014e1 : ffff858f`e0998600 fffff801`63910850 00000000`000000ff ffff858f`e0a09000 : 0x00007a70`00000001
ffff8301`8f86f740 fffff801`6389d4e1 : fffff801`53101470 ffff858f`e0430d30 fffff801`6397b050 ffff858f`e0a09000 : Wdf01000!imp_WdfSpinLockAcquire+0x71 [minkernel\wdf\framework\shared\support\fxspinlockapi.cpp @ 141] 
ffff8301`8f86f780 fffff801`5310146f : ffff858f`e0430d30 fffff801`6397b050 ffff858f`e0a09000 00000000`00000000 : rt640x64+0x2d4e1
ffff8301`8f86f788 ffff858f`e0430d30 : fffff801`6397b050 ffff858f`e0a09000 00000000`00000000 00000000`00000000 : Wdf01000!FxChildList::EndIteration+0x4b
ffff8301`8f86f790 fffff801`6397b050 : ffff858f`e0a09000 00000000`00000000 00000000`00000000 00000000`00010100 : 0xffff858f`e0430d30
ffff8301`8f86f798 ffff858f`e0a09000 : 00000000`00000000 00000000`00000000 00000000`00010100 00000000`00000006 : rt640x64+0x10b050
ffff8301`8f86f7a0 00000000`00000000 : 00000000`00000000 00000000`00010100 00000000`00000006 00000000`00000000 : 0xffff858f`e0a09000


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff801507c1d87 - nt!NtContinue+177
    [ 00:08 ]
1 error : !nt (fffff801507c1d87)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2019-11-21T12:43:16.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  e6d0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------
 
İşlemci önbelleğinde sorun var gözüküyor son hatada. Apple yazılım ve sürücülerini kaldırın.
Samsung laptop alman zaten hata, desteği olmayan cihazı neden alırsınız ki. Win 10 desteği zaten yok hata alman da doğal belirli zamanlarda.
Diğer bir önceki hatalar ekran kartı ve yukarıda denildiği gibi touchpad sürücülerinle alakalı.
Baştan aşağı sürücüleri güncelle.
Desteği olsa günceller :D
 
Son düzenleyen: Moderatör:
İşlemci önbelleğinde sorun var gözüküyor son hatada. Apple yazılım ve sürücülerini kaldırın.
Samsung laptop alman zaten hata, desteği olmayan cihazı neden alırsınız ki. Win 10 desteği zaten yok hata alman da doğal belirli zamanlarda.
Diğer bir önceki hatalar ekran kartı ve yukarıda denildiği gibi touchpad sürücülerinle alakalı.

Desteği olsa günceller :D
2013'te almıştım laptopu. Aldığım zaman bir numaraydı ama işte. Eskidi zaten yeni gamebookumdan oynuyorum oyunları.
 
Son düzenleyen: Moderatör:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı