S
Hayır açılmıyor, lütfen rehberi okur musun?
Bunlar dosyalar değil, "122219-9250-01.dmp" gibi dosyaları bize atacaksanız, bu kadar zor olmamalı.
[Memory Device (Type 17) - Length 40 - Handle 001eh]
Physical Memory Array Handle 000fh
Memory Error Info Handle 001dh
Total Width 64 bits
Data Width 64 bits
Size 8192MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM 1
Bank Locator P0 CHANNEL B
Memory Type 1ah - Specification Reserved
Type Detail 4080h - Synchronous
Speed 2667MHz
Manufacturer Unknown
Serial Number
Asset Tag Number [String Not Specified]
Part Number CMW16GX4M2Z3600C18
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8012fa16d39, Virtual address for the attempted execute.
Arg2: 890000041b5c8963, PTE contents.
Arg3: ffffdb8d13492650, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7B89
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.50
BIOS_DATE: 11/07/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: fffff8012fa16d39
BUGCHECK_P2: 890000041b5c8963
BUGCHECK_P3: ffffdb8d13492650
BUGCHECK_P4: 2
CPU_COUNT: c
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xFC
PROCESS_NAME: sppsvc.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-29-2019 00:15:58.0441
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffdb8d13492650 -- (.trap 0xffffdb8d13492650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012fa16d39 rsp=ffffdb8d134927e0 rbp=0000000000002b74
r8=00000000ffffffff r9=7ffff8012e86d7b8 r10=7ffffffffffffffc
r11=ffffa4fd38000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
clipsp+0x46d39:
fffff801`2fa16d39 004900 add byte ptr [rcx],cl ds:00000000`00000000=??
Resetting default scope
MISALIGNED_IP:
clipsp+46d39
fffff801`2fa16d39 004900 add byte ptr [rcx],cl
LAST_CONTROL_TRANSFER: from fffff8012e654aac to fffff8012e5c14e0
STACK_TEXT:
ffffdb8d`13492368 fffff801`2e654aac : 00000000`000000fc fffff801`2fa16d39 89000004`1b5c8963 ffffdb8d`13492650 : nt!KeBugCheckEx
ffffdb8d`13492370 fffff801`2e40d498 : fffff801`2fa16d39 fffff67b`3d9ec000 00000000`00000000 ffffdb8d`13492650 : nt!MiCheckSystemNxFault+0x1298a0
ffffdb8d`134923b0 fffff801`2e472eef : 00000000`00000000 00000000`00000011 00000000`00000000 fffff801`2fa16d39 : nt!MiSystemFault+0x728
ffffdb8d`134924b0 fffff801`2e5cf520 : 00000000`00000001 00000000`00000040 fffff801`2e86d7b8 ffff930b`e6400000 : nt!MmAccessFault+0x34f
ffffdb8d`13492650 fffff801`2fa16d39 : ffffffff`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!KiPageFault+0x360
ffffdb8d`134927e0 ffffffff`00000000 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000028 : clipsp+0x46d39
ffffdb8d`134927e8 00000000`00000000 : 00000000`00000000 ffffffff`ffffffff 00000000`00000028 00000000`00000000 : 0xffffffff`00000000
THREAD_SHA1_HASH_MOD_FUNC: 43684bef5509cce7df42704dd8956da27ef36a88
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f4855a222feb919352ddf99a67880088c1af7646
THREAD_SHA1_HASH_MOD: 0dd312e032f8aa180e802b031bf5c6a4d0a848a8
FOLLOWUP_IP:
clipsp+46d39
fffff801`2fa16d39 004900 add byte ptr [rcx],cl
FAULT_INSTR_CODE: 6e004900
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: clipsp+46d39
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.387
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED_clipsp.sys
BUCKET_ID: IP_MISALIGNED_clipsp.sys
PRIMARY_PROBLEM_CLASS: IP_MISALIGNED_clipsp.sys
TARGET_TIME: 2019-12-27T10:23:07.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 326a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:ip_misaligned_clipsp.sys
FAILURE_ID_HASH: {86ad9ae3-05b2-5902-4536-abeb88ebfb89}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8001da16d39, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff8001da16d39, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7B89
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.50
BIOS_DATE: 11/07/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: fffff8001da16d39
BUGCHECK_P2: 10
BUGCHECK_P3: fffff8001da16d39
BUGCHECK_P4: 2
READ_ADDRESS: fffff8001c9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8001da16d39
FAULTING_IP:
+0
fffff800`1da16d39 ?? ???
MM_INTERNAL_CODE: 2
CPU_COUNT: c
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: sppsvc.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-29-2019 00:16:02.0113
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffad8af45b1650 -- (.trap 0xffffad8af45b1650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001da16d39 rsp=ffffad8af45b17e0 rbp=0000000000001f58
r8=00000000ffffffff r9=7ffff8001c86d7b8 r10=7ffffffffffffffc
r11=ffff787c88e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
fffff800`1da16d39 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8001c5e35d6 to fffff8001c5c14e0
FAILED_INSTRUCTION_ADDRESS:
+0
fffff800`1da16d39 ?? ???
STACK_TEXT:
ffffad8a`f45b13a8 fffff800`1c5e35d6 : 00000000`00000050 fffff800`1da16d39 00000000`00000010 ffffad8a`f45b1650 : nt!KeBugCheckEx
ffffad8a`f45b13b0 fffff800`1c472eef : 00000000`00000000 00000000`00000010 00000000`00000000 fffff800`1da16d39 : nt!MiSystemFault+0x1d6866
ffffad8a`f45b14b0 fffff800`1c5cf520 : 00000000`00000000 ffffad8a`f45b1750 fffff800`1c86d7b8 ffffe488`00000000 : nt!MmAccessFault+0x34f
ffffad8a`f45b1650 fffff800`1da16d39 : ffffffff`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!KiPageFault+0x360
ffffad8a`f45b17e0 ffffffff`00000000 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff ffffc132`d91b27dc : 0xfffff800`1da16d39
ffffad8a`f45b17e8 00000000`00000000 : 00000000`00000000 ffffffff`ffffffff ffffc132`d91b27dc 01000000`00100000 : 0xffffffff`00000000
THREAD_SHA1_HASH_MOD_FUNC: 35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c0efb11bdbdabbfe638cd9930c42dad821618e02
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff800`1c5e35d6 cc int 3
FAULT_INSTR_CODE: 4d8d48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiSystemFault+1d6866
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1d6866
FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
PRIMARY_PROBLEM_CLASS: AV_INVALID_BAD_IP_nt!MiSystemFault
TARGET_TIME: 2019-12-27T09:25:08.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3c1d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_invalid_bad_ip_nt!misystemfault
FAILURE_ID_HASH: {48ad9531-e3f8-1044-fc5f-d917677674c7}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80751a16d39, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff80751a16d39, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7B89
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.50
BIOS_DATE: 11/07/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: fffff80751a16d39
BUGCHECK_P2: 10
BUGCHECK_P3: fffff80751a16d39
BUGCHECK_P4: 2
READ_ADDRESS: fffff807509733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80751a16d39
FAULTING_IP:
+0
fffff807`51a16d39 ?? ???
MM_INTERNAL_CODE: 2
CPU_COUNT: c
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: sppsvc.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-29-2019 00:16:07.0278
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff89853d0a7650 -- (.trap 0xffff89853d0a7650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80751a16d39 rsp=ffff89853d0a77e0 rbp=0000000000002f60
r8=00000000ffffffff r9=7ffff8075086d7b8 r10=7ffffffffffffffc
r11=ffff7d7afbe00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
fffff807`51a16d39 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff807505e35d6 to fffff807505c14e0
FAILED_INSTRUCTION_ADDRESS:
+0
fffff807`51a16d39 ?? ???
STACK_TEXT:
ffff8985`3d0a73a8 fffff807`505e35d6 : 00000000`00000050 fffff807`51a16d39 00000000`00000010 ffff8985`3d0a7650 : nt!KeBugCheckEx
ffff8985`3d0a73b0 fffff807`50472eef : 00000000`00000000 00000000`00000010 00000000`00000000 fffff807`51a16d39 : nt!MiSystemFault+0x1d6866
ffff8985`3d0a74b0 fffff807`505cf520 : 00000000`00000000 ffff8985`3d0a7750 fffff807`5086d7b8 ffffb28c`00000000 : nt!MmAccessFault+0x34f
ffff8985`3d0a7650 fffff807`51a16d39 : ffffffff`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!KiPageFault+0x360
ffff8985`3d0a77e0 ffffffff`00000000 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff ffff7362`fac3bae3 : 0xfffff807`51a16d39
ffff8985`3d0a77e8 00000000`00000000 : 00000000`00000000 ffffffff`ffffffff ffff7362`fac3bae3 01000000`00100000 : 0xffffffff`00000000
THREAD_SHA1_HASH_MOD_FUNC: 35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c0efb11bdbdabbfe638cd9930c42dad821618e02
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff807`505e35d6 cc int 3
FAULT_INSTR_CODE: 4d8d48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiSystemFault+1d6866
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1d6866
FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
PRIMARY_PROBLEM_CLASS: AV_INVALID_BAD_IP_nt!MiSystemFault
TARGET_TIME: 2019-12-27T09:24:04.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3c5a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_invalid_bad_ip_nt!misystemfault
FAILURE_ID_HASH: {48ad9531-e3f8-1044-fc5f-d917677674c7}
Followup: MachineOwner
---------
PROCESS_HAS_LOCKED_PAGES (76)
Caused by a driver not cleaning up correctly after an I/O.
Arguments:
Arg1: 0000000000000000, Locked memory pages found in process being terminated.
Arg2: ffffe404323394c0, Process address.
Arg3: 0000000000000010, Number of locked pages.
Arg4: 0000000000000000, Pointer to driver stacks (if enabled) or 0 if not.
Issue a !search over all of physical memory for the current process pointer.
This will yield at least one MDL which points to it. Then do another !search
for each MDL found, this will yield the IRP(s) that point to it, revealing
which driver is leaking the pages.
Otherwise, set HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory
Management\TrackLockedPages to a DWORD 1 value and reboot. Then the system
will save stack traces so the guilty driver can be easily identified.
When you enable this flag, if the driver commits the error again you will
see a different bugcheck - DRIVER_LEFT_LOCKED_PAGES_IN_PROCESS (0xCB) -
which can identify the offending driver(s).
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7B89
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89)
BASEBOARD_VERSION: 1.0
BUGCHECK_P1: 0
BUGCHECK_P2: ffffe404323394c0
BUGCHECK_P3: 10
BUGCHECK_P4: 0
PROCESS_NAME: sppsvc.exe
DEFAULT_BUCKET_ID: DRIVER_FAULT_0x76
CPU_COUNT: c
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x76
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-29-2019 00:16:10.0879
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8036d1ce1ef to fffff8036cbc14e0
STACK_TEXT:
ffffb901`2d9ab6b8 fffff803`6d1ce1ef : 00000000`00000076 00000000`00000000 ffffe404`323394c0 00000000`00000010 : nt!KeBugCheckEx
ffffb901`2d9ab6c0 fffff803`6d0670fe : ffffe404`323394c0 ffffe404`323397a0 ffffe404`2e822080 ffffe404`323397b0 : nt!MmDeleteProcessAddressSpace+0x16627b
ffffb901`2d9ab710 fffff803`6cffa0e0 : ffffe404`323397a0 ffffe404`32339490 ffffe404`323397a0 00000000`00000000 : nt!PspProcessDelete+0x13e
ffffb901`2d9ab7a0 fffff803`6ca3a9a9 : 00000000`00000000 00000000`00000000 ffffe404`323397a0 ffffe404`323394c0 : nt!ObpRemoveObjectRoutine+0x80
ffffb901`2d9ab800 fffff803`6d060750 : 00000000`00000000 ffffe404`27714738 ffffe404`27714738 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc9
ffffb901`2d9ab840 fffff803`6cffa0e0 : ffffb901`2d9aba39 ffffe404`27714050 ffffb901`2d9aba39 ffffe404`1feec2c0 : nt!PspThreadDelete+0x340
ffffb901`2d9ab8b0 fffff803`6ca3a9a9 : 00000000`00000000 00000000`00000000 ffffb901`2d9aba39 ffffe404`27714080 : nt!ObpRemoveObjectRoutine+0x80
ffffb901`2d9ab910 fffff803`6cfec457 : 00000000`00000000 ffffe404`27714050 ffffe404`27714050 ffffbe02`06542f40 : nt!ObfDereferenceObjectWithTag+0xc9
ffffb901`2d9ab950 fffff803`6cff174e : 00000000`0000020c ffff6357`046fcefc 00000000`00000000 fffff803`6cbd322c : nt!ObCloseHandleTableEntry+0x2c7
ffffb901`2d9aba90 fffff803`6cbd3251 : ffffe404`2e822080 0000024a`5ab50000 ffffb901`2d9abb80 ffffe404`39a4c4c0 : nt!NtClose+0xde
ffffb901`2d9abb00 00007fff`9449c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000008e`5267f1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`9449c2a4
THREAD_SHA1_HASH_MOD_FUNC: 2e812dfe1bb3883903d609a77a8c74115c200eeb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 203f80f14510335b9a0a0cabb168245b177cf677
THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!MmDeleteProcessAddressSpace+16627b
fffff803`6d1ce1ef cc int 3
FAULT_INSTR_CODE: f38b48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MmDeleteProcessAddressSpace+16627b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 16627b
FAILURE_BUCKET_ID: 0x76_sppsvc.exe_nt!MmDeleteProcessAddressSpace
BUCKET_ID: 0x76_sppsvc.exe_nt!MmDeleteProcessAddressSpace
PRIMARY_PROBLEM_CLASS: 0x76_sppsvc.exe_nt!MmDeleteProcessAddressSpace
TARGET_TIME: 2019-12-23T09:32:06.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 342c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x76_sppsvc.exe_nt!mmdeleteprocessaddressspace
FAILURE_ID_HASH: {c1d3d845-feee-7285-2e5a-0bc9b3644feb}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff870a9a7d70c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7B89
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.50
BIOS_DATE: 11/07/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: ffff870a9a7d70c0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_CODE: (NTSTATUS) 0x98a82080 - <Unable to get error code text>
ERROR_CODE: (NTSTATUS) 0x98a82080 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {09c19f5e-c480-47bc-ad01-5504d72df400}
IMAGE_NAME: RPCRT4.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: RPCRT4
FAULTING_MODULE: 0000000000000000
CPU_COUNT: c
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xEF
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-29-2019 00:16:19.0408
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80337acae89 to fffff803373c14e0
STACK_TEXT:
ffffaa83`c93c8938 fffff803`37acae89 : 00000000`000000ef ffff870a`9a7d70c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffaa83`c93c8940 fffff803`379c75c1 : ffff870a`9a7d70c0 fffff803`3729c769 ffff870a`9a7d70c0 fffff803`3729c8c0 : nt!PspCatchCriticalBreak+0x115
ffffaa83`c93c89e0 fffff803`37839fc0 : ffff870a`00000000 00000000`00000000 ffff870a`9a7d70c0 ffff870a`9a7d70c0 : nt!PspTerminateAllThreads+0x175e3d
ffffaa83`c93c8a50 fffff803`37839da9 : ffffffff`ffffffff ffffaa83`c93c8b80 ffff870a`9a7d70c0 fffff803`37554301 : nt!PspTerminateProcess+0xe0
ffffaa83`c93c8a90 fffff803`373d3251 : 00000000`0000040c ffff870a`98a82080 ffff870a`9a7d70c0 00000072`4997fabc : nt!NtTerminateProcess+0xa9
ffffaa83`c93c8b00 00007ff9`423dc644 : 00007ff9`4244fc5f 00007ff9`4247f980 00000072`4997fa80 00000002`00000008 : nt!KiSystemServiceExitPico+0x2bc
00000072`4997db68 00007ff9`4244fc5f : 00007ff9`4247f980 00000072`4997fa80 00000002`00000008 00000072`48a12000 : 0x00007ff9`423dc644
00000072`4997db70 00007ff9`4247f980 : 00000072`4997fa80 00000002`00000008 00000072`48a12000 00000000`00000004 : 0x00007ff9`4244fc5f
00000072`4997db78 00000072`4997fa80 : 00000002`00000008 00000072`48a12000 00000000`00000004 00007ff9`423e3cdd : 0x00007ff9`4247f980
00000072`4997db80 00000002`00000008 : 00000072`48a12000 00000000`00000004 00007ff9`423e3cdd 00007ff9`4247f980 : 0x00000072`4997fa80
00000072`4997db88 00000072`48a12000 : 00000000`00000004 00007ff9`423e3cdd 00007ff9`4247f980 00000000`00000008 : 0x00000002`00000008
00000072`4997db90 00000000`00000004 : 00007ff9`423e3cdd 00007ff9`4247f980 00000000`00000008 00000224`a550eb80 : 0x00000072`48a12000
00000072`4997db98 00007ff9`423e3cdd : 00007ff9`4247f980 00000000`00000008 00000224`a550eb80 00000000`00000004 : 0x4
00000072`4997dba0 00007ff9`4247f980 : 00000000`00000008 00000224`a550eb80 00000000`00000004 00000000`00000000 : 0x00007ff9`423e3cdd
00000072`4997dba8 00000000`00000008 : 00000224`a550eb80 00000000`00000004 00000000`00000000 00000224`a40acd70 : 0x00007ff9`4247f980
00000072`4997dbb0 00000224`a550eb80 : 00000000`00000004 00000000`00000000 00000224`a40acd70 00000000`000341c2 : 0x8
00000072`4997dbb8 00000000`00000004 : 00000000`00000000 00000224`a40acd70 00000000`000341c2 00007ff9`423cc6d6 : 0x00000224`a550eb80
00000072`4997dbc0 00000000`00000000 : 00000224`a40acd70 00000000`000341c2 00007ff9`423cc6d6 00000002`00000054 : 0x4
THREAD_SHA1_HASH_MOD_FUNC: e8c9407148d94b0ae6496e94a8a56eccd3d66cf5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2f08762fa8c6781743e24dc56f4dc1cbde2494b0
THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
FOLLOWUP_NAME: MachineOwner
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_98a82080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll
BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_98a82080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll
PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_98a82080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll
TARGET_TIME: 2019-12-22T09:07:00.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3a58
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_98a82080_rpcrt4.dll!?ndrpsimpletypehypermarshall@@yaxpeau_midl_stub_message@@peae@z_image_rpcrt4.dll
FAILURE_ID_HASH: {be33baba-2fb8-d79c-feb1-3613a90e5ea8}
Followup: MachineOwner
---------
Bellek hataları, Memtest86 testi yapmalısın.
Fakat şunu fark ettim belleklerin 3600MHz olmasına rağmen 2666MHz'de çalışıyor.
Kod:ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc) An attempt was made to execute non-executable memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: fffff8012fa16d39, Virtual address for the attempted execute. Arg2: 890000041b5c8963, PTE contents. Arg3: ffffdb8d13492650, (reserved) Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7B89 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.50 BIOS_DATE: 11/07/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: fffff8012fa16d39 BUGCHECK_P2: 890000041b5c8963 BUGCHECK_P3: ffffdb8d13492650 BUGCHECK_P4: 2 CPU_COUNT: c CPU_MHZ: ed8 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0xFC PROCESS_NAME: sppsvc.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-29-2019 00:15:58.0441 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: ffffdb8d13492650 -- (.trap 0xffffdb8d13492650) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8012fa16d39 rsp=ffffdb8d134927e0 rbp=0000000000002b74 r8=00000000ffffffff r9=7ffff8012e86d7b8 r10=7ffffffffffffffc r11=ffffa4fd38000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc clipsp+0x46d39: fffff801`2fa16d39 004900 add byte ptr [rcx],cl ds:00000000`00000000=?? Resetting default scope MISALIGNED_IP: clipsp+46d39 fffff801`2fa16d39 004900 add byte ptr [rcx],cl LAST_CONTROL_TRANSFER: from fffff8012e654aac to fffff8012e5c14e0 STACK_TEXT: ffffdb8d`13492368 fffff801`2e654aac : 00000000`000000fc fffff801`2fa16d39 89000004`1b5c8963 ffffdb8d`13492650 : nt!KeBugCheckEx ffffdb8d`13492370 fffff801`2e40d498 : fffff801`2fa16d39 fffff67b`3d9ec000 00000000`00000000 ffffdb8d`13492650 : nt!MiCheckSystemNxFault+0x1298a0 ffffdb8d`134923b0 fffff801`2e472eef : 00000000`00000000 00000000`00000011 00000000`00000000 fffff801`2fa16d39 : nt!MiSystemFault+0x728 ffffdb8d`134924b0 fffff801`2e5cf520 : 00000000`00000001 00000000`00000040 fffff801`2e86d7b8 ffff930b`e6400000 : nt!MmAccessFault+0x34f ffffdb8d`13492650 fffff801`2fa16d39 : ffffffff`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!KiPageFault+0x360 ffffdb8d`134927e0 ffffffff`00000000 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000028 : clipsp+0x46d39 ffffdb8d`134927e8 00000000`00000000 : 00000000`00000000 ffffffff`ffffffff 00000000`00000028 00000000`00000000 : 0xffffffff`00000000 THREAD_SHA1_HASH_MOD_FUNC: 43684bef5509cce7df42704dd8956da27ef36a88 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f4855a222feb919352ddf99a67880088c1af7646 THREAD_SHA1_HASH_MOD: 0dd312e032f8aa180e802b031bf5c6a4d0a848a8 FOLLOWUP_IP: clipsp+46d39 fffff801`2fa16d39 004900 add byte ptr [rcx],cl FAULT_INSTR_CODE: 6e004900 SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: clipsp+46d39 FOLLOWUP_NAME: MachineOwner IMAGE_NAME: hardware DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.387 STACK_COMMAND: .thread ; .cxr ; kb MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED_clipsp.sys BUCKET_ID: IP_MISALIGNED_clipsp.sys PRIMARY_PROBLEM_CLASS: IP_MISALIGNED_clipsp.sys TARGET_TIME: 2019-12-27T10:23:07.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 326a ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:ip_misaligned_clipsp.sys FAILURE_ID_HASH: {86ad9ae3-05b2-5902-4536-abeb88ebfb89} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8001da16d39, memory referenced. Arg2: 0000000000000010, value 0 = read operation, 1 = write operation. Arg3: fffff8001da16d39, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7B89 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.50 BIOS_DATE: 11/07/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: fffff8001da16d39 BUGCHECK_P2: 10 BUGCHECK_P3: fffff8001da16d39 BUGCHECK_P4: 2 READ_ADDRESS: fffff8001c9733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8001da16d39 FAULTING_IP: +0 fffff800`1da16d39 ?? ??? MM_INTERNAL_CODE: 2 CPU_COUNT: c CPU_MHZ: ed8 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: sppsvc.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-29-2019 00:16:02.0113 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: ffffad8af45b1650 -- (.trap 0xffffad8af45b1650) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8001da16d39 rsp=ffffad8af45b17e0 rbp=0000000000001f58 r8=00000000ffffffff r9=7ffff8001c86d7b8 r10=7ffffffffffffffc r11=ffff787c88e00000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc fffff800`1da16d39 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8001c5e35d6 to fffff8001c5c14e0 FAILED_INSTRUCTION_ADDRESS: +0 fffff800`1da16d39 ?? ??? STACK_TEXT: ffffad8a`f45b13a8 fffff800`1c5e35d6 : 00000000`00000050 fffff800`1da16d39 00000000`00000010 ffffad8a`f45b1650 : nt!KeBugCheckEx ffffad8a`f45b13b0 fffff800`1c472eef : 00000000`00000000 00000000`00000010 00000000`00000000 fffff800`1da16d39 : nt!MiSystemFault+0x1d6866 ffffad8a`f45b14b0 fffff800`1c5cf520 : 00000000`00000000 ffffad8a`f45b1750 fffff800`1c86d7b8 ffffe488`00000000 : nt!MmAccessFault+0x34f ffffad8a`f45b1650 fffff800`1da16d39 : ffffffff`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!KiPageFault+0x360 ffffad8a`f45b17e0 ffffffff`00000000 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff ffffc132`d91b27dc : 0xfffff800`1da16d39 ffffad8a`f45b17e8 00000000`00000000 : 00000000`00000000 ffffffff`ffffffff ffffc132`d91b27dc 01000000`00100000 : 0xffffffff`00000000 THREAD_SHA1_HASH_MOD_FUNC: 35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c0efb11bdbdabbfe638cd9930c42dad821618e02 THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791 FOLLOWUP_IP: nt!MiSystemFault+1d6866 fffff800`1c5e35d6 cc int 3 FAULT_INSTR_CODE: 4d8d48cc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!MiSystemFault+1d6866 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470 IMAGE_VERSION: 10.0.18362.535 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 1d6866 FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault PRIMARY_PROBLEM_CLASS: AV_INVALID_BAD_IP_nt!MiSystemFault TARGET_TIME: 2019-12-27T09:25:08.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 3c1d ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_invalid_bad_ip_nt!misystemfault FAILURE_ID_HASH: {48ad9531-e3f8-1044-fc5f-d917677674c7} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff80751a16d39, memory referenced. Arg2: 0000000000000010, value 0 = read operation, 1 = write operation. Arg3: fffff80751a16d39, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7B89 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.50 BIOS_DATE: 11/07/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: fffff80751a16d39 BUGCHECK_P2: 10 BUGCHECK_P3: fffff80751a16d39 BUGCHECK_P4: 2 READ_ADDRESS: fffff807509733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff80751a16d39 FAULTING_IP: +0 fffff807`51a16d39 ?? ??? MM_INTERNAL_CODE: 2 CPU_COUNT: c CPU_MHZ: ed8 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: sppsvc.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-29-2019 00:16:07.0278 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: ffff89853d0a7650 -- (.trap 0xffff89853d0a7650) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80751a16d39 rsp=ffff89853d0a77e0 rbp=0000000000002f60 r8=00000000ffffffff r9=7ffff8075086d7b8 r10=7ffffffffffffffc r11=ffff7d7afbe00000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc fffff807`51a16d39 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff807505e35d6 to fffff807505c14e0 FAILED_INSTRUCTION_ADDRESS: +0 fffff807`51a16d39 ?? ??? STACK_TEXT: ffff8985`3d0a73a8 fffff807`505e35d6 : 00000000`00000050 fffff807`51a16d39 00000000`00000010 ffff8985`3d0a7650 : nt!KeBugCheckEx ffff8985`3d0a73b0 fffff807`50472eef : 00000000`00000000 00000000`00000010 00000000`00000000 fffff807`51a16d39 : nt!MiSystemFault+0x1d6866 ffff8985`3d0a74b0 fffff807`505cf520 : 00000000`00000000 ffff8985`3d0a7750 fffff807`5086d7b8 ffffb28c`00000000 : nt!MmAccessFault+0x34f ffff8985`3d0a7650 fffff807`51a16d39 : ffffffff`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!KiPageFault+0x360 ffff8985`3d0a77e0 ffffffff`00000000 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff ffff7362`fac3bae3 : 0xfffff807`51a16d39 ffff8985`3d0a77e8 00000000`00000000 : 00000000`00000000 ffffffff`ffffffff ffff7362`fac3bae3 01000000`00100000 : 0xffffffff`00000000 THREAD_SHA1_HASH_MOD_FUNC: 35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c0efb11bdbdabbfe638cd9930c42dad821618e02 THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791 FOLLOWUP_IP: nt!MiSystemFault+1d6866 fffff807`505e35d6 cc int 3 FAULT_INSTR_CODE: 4d8d48cc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!MiSystemFault+1d6866 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470 IMAGE_VERSION: 10.0.18362.535 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 1d6866 FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault PRIMARY_PROBLEM_CLASS: AV_INVALID_BAD_IP_nt!MiSystemFault TARGET_TIME: 2019-12-27T09:24:04.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 3c5a ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_invalid_bad_ip_nt!misystemfault FAILURE_ID_HASH: {48ad9531-e3f8-1044-fc5f-d917677674c7} Followup: MachineOwner --------- PROCESS_HAS_LOCKED_PAGES (76) Caused by a driver not cleaning up correctly after an I/O. Arguments: Arg1: 0000000000000000, Locked memory pages found in process being terminated. Arg2: ffffe404323394c0, Process address. Arg3: 0000000000000010, Number of locked pages. Arg4: 0000000000000000, Pointer to driver stacks (if enabled) or 0 if not. Issue a !search over all of physical memory for the current process pointer. This will yield at least one MDL which points to it. Then do another !search for each MDL found, this will yield the IRP(s) that point to it, revealing which driver is leaking the pages. Otherwise, set HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\TrackLockedPages to a DWORD 1 value and reboot. Then the system will save stack traces so the guilty driver can be easily identified. When you enable this flag, if the driver commits the error again you will see a different bugcheck - DRIVER_LEFT_LOCKED_PAGES_IN_PROCESS (0xCB) - which can identify the offending driver(s). Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7B89 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89) BASEBOARD_VERSION: 1.0 BUGCHECK_P1: 0 BUGCHECK_P2: ffffe404323394c0 BUGCHECK_P3: 10 BUGCHECK_P4: 0 PROCESS_NAME: sppsvc.exe DEFAULT_BUCKET_ID: DRIVER_FAULT_0x76 CPU_COUNT: c CPU_MHZ: ed8 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x76 CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-29-2019 00:16:10.0879 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8036d1ce1ef to fffff8036cbc14e0 STACK_TEXT: ffffb901`2d9ab6b8 fffff803`6d1ce1ef : 00000000`00000076 00000000`00000000 ffffe404`323394c0 00000000`00000010 : nt!KeBugCheckEx ffffb901`2d9ab6c0 fffff803`6d0670fe : ffffe404`323394c0 ffffe404`323397a0 ffffe404`2e822080 ffffe404`323397b0 : nt!MmDeleteProcessAddressSpace+0x16627b ffffb901`2d9ab710 fffff803`6cffa0e0 : ffffe404`323397a0 ffffe404`32339490 ffffe404`323397a0 00000000`00000000 : nt!PspProcessDelete+0x13e ffffb901`2d9ab7a0 fffff803`6ca3a9a9 : 00000000`00000000 00000000`00000000 ffffe404`323397a0 ffffe404`323394c0 : nt!ObpRemoveObjectRoutine+0x80 ffffb901`2d9ab800 fffff803`6d060750 : 00000000`00000000 ffffe404`27714738 ffffe404`27714738 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc9 ffffb901`2d9ab840 fffff803`6cffa0e0 : ffffb901`2d9aba39 ffffe404`27714050 ffffb901`2d9aba39 ffffe404`1feec2c0 : nt!PspThreadDelete+0x340 ffffb901`2d9ab8b0 fffff803`6ca3a9a9 : 00000000`00000000 00000000`00000000 ffffb901`2d9aba39 ffffe404`27714080 : nt!ObpRemoveObjectRoutine+0x80 ffffb901`2d9ab910 fffff803`6cfec457 : 00000000`00000000 ffffe404`27714050 ffffe404`27714050 ffffbe02`06542f40 : nt!ObfDereferenceObjectWithTag+0xc9 ffffb901`2d9ab950 fffff803`6cff174e : 00000000`0000020c ffff6357`046fcefc 00000000`00000000 fffff803`6cbd322c : nt!ObCloseHandleTableEntry+0x2c7 ffffb901`2d9aba90 fffff803`6cbd3251 : ffffe404`2e822080 0000024a`5ab50000 ffffb901`2d9abb80 ffffe404`39a4c4c0 : nt!NtClose+0xde ffffb901`2d9abb00 00007fff`9449c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc 0000008e`5267f1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`9449c2a4 THREAD_SHA1_HASH_MOD_FUNC: 2e812dfe1bb3883903d609a77a8c74115c200eeb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 203f80f14510335b9a0a0cabb168245b177cf677 THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c FOLLOWUP_IP: nt!MmDeleteProcessAddressSpace+16627b fffff803`6d1ce1ef cc int 3 FAULT_INSTR_CODE: f38b48cc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!MmDeleteProcessAddressSpace+16627b FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470 IMAGE_VERSION: 10.0.18362.535 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 16627b FAILURE_BUCKET_ID: 0x76_sppsvc.exe_nt!MmDeleteProcessAddressSpace BUCKET_ID: 0x76_sppsvc.exe_nt!MmDeleteProcessAddressSpace PRIMARY_PROBLEM_CLASS: 0x76_sppsvc.exe_nt!MmDeleteProcessAddressSpace TARGET_TIME: 2019-12-23T09:32:06.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 342c ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x76_sppsvc.exe_nt!mmdeleteprocessaddressspace FAILURE_ID_HASH: {c1d3d845-feee-7285-2e5a-0bc9b3644feb} Followup: MachineOwner --------- CRITICAL_PROCESS_DIED (ef) A critical system process died Arguments: Arg1: ffff870a9a7d70c0, Process object or thread object Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died. Arg3: 0000000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7B89 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.50 BIOS_DATE: 11/07/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: ffff870a9a7d70c0 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 PROCESS_NAME: svchost.exe CRITICAL_PROCESS: svchost.exe EXCEPTION_CODE: (NTSTATUS) 0x98a82080 - <Unable to get error code text> ERROR_CODE: (NTSTATUS) 0x98a82080 - <Unable to get error code text> CRITICAL_PROCESS_REPORTGUID: {09c19f5e-c480-47bc-ad01-5504d72df400} IMAGE_NAME: RPCRT4.dll DEBUG_FLR_IMAGE_TIMESTAMP: 0 MODULE_NAME: RPCRT4 FAULTING_MODULE: 0000000000000000 CPU_COUNT: c CPU_MHZ: ed8 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0xEF CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-29-2019 00:16:19.0408 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff80337acae89 to fffff803373c14e0 STACK_TEXT: ffffaa83`c93c8938 fffff803`37acae89 : 00000000`000000ef ffff870a`9a7d70c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx ffffaa83`c93c8940 fffff803`379c75c1 : ffff870a`9a7d70c0 fffff803`3729c769 ffff870a`9a7d70c0 fffff803`3729c8c0 : nt!PspCatchCriticalBreak+0x115 ffffaa83`c93c89e0 fffff803`37839fc0 : ffff870a`00000000 00000000`00000000 ffff870a`9a7d70c0 ffff870a`9a7d70c0 : nt!PspTerminateAllThreads+0x175e3d ffffaa83`c93c8a50 fffff803`37839da9 : ffffffff`ffffffff ffffaa83`c93c8b80 ffff870a`9a7d70c0 fffff803`37554301 : nt!PspTerminateProcess+0xe0 ffffaa83`c93c8a90 fffff803`373d3251 : 00000000`0000040c ffff870a`98a82080 ffff870a`9a7d70c0 00000072`4997fabc : nt!NtTerminateProcess+0xa9 ffffaa83`c93c8b00 00007ff9`423dc644 : 00007ff9`4244fc5f 00007ff9`4247f980 00000072`4997fa80 00000002`00000008 : nt!KiSystemServiceExitPico+0x2bc 00000072`4997db68 00007ff9`4244fc5f : 00007ff9`4247f980 00000072`4997fa80 00000002`00000008 00000072`48a12000 : 0x00007ff9`423dc644 00000072`4997db70 00007ff9`4247f980 : 00000072`4997fa80 00000002`00000008 00000072`48a12000 00000000`00000004 : 0x00007ff9`4244fc5f 00000072`4997db78 00000072`4997fa80 : 00000002`00000008 00000072`48a12000 00000000`00000004 00007ff9`423e3cdd : 0x00007ff9`4247f980 00000072`4997db80 00000002`00000008 : 00000072`48a12000 00000000`00000004 00007ff9`423e3cdd 00007ff9`4247f980 : 0x00000072`4997fa80 00000072`4997db88 00000072`48a12000 : 00000000`00000004 00007ff9`423e3cdd 00007ff9`4247f980 00000000`00000008 : 0x00000002`00000008 00000072`4997db90 00000000`00000004 : 00007ff9`423e3cdd 00007ff9`4247f980 00000000`00000008 00000224`a550eb80 : 0x00000072`48a12000 00000072`4997db98 00007ff9`423e3cdd : 00007ff9`4247f980 00000000`00000008 00000224`a550eb80 00000000`00000004 : 0x4 00000072`4997dba0 00007ff9`4247f980 : 00000000`00000008 00000224`a550eb80 00000000`00000004 00000000`00000000 : 0x00007ff9`423e3cdd 00000072`4997dba8 00000000`00000008 : 00000224`a550eb80 00000000`00000004 00000000`00000000 00000224`a40acd70 : 0x00007ff9`4247f980 00000072`4997dbb0 00000224`a550eb80 : 00000000`00000004 00000000`00000000 00000224`a40acd70 00000000`000341c2 : 0x8 00000072`4997dbb8 00000000`00000004 : 00000000`00000000 00000224`a40acd70 00000000`000341c2 00007ff9`423cc6d6 : 0x00000224`a550eb80 00000072`4997dbc0 00000000`00000000 : 00000224`a40acd70 00000000`000341c2 00007ff9`423cc6d6 00000002`00000054 : 0x4 THREAD_SHA1_HASH_MOD_FUNC: e8c9407148d94b0ae6496e94a8a56eccd3d66cf5 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2f08762fa8c6781743e24dc56f4dc1cbde2494b0 THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693 FOLLOWUP_NAME: MachineOwner STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_98a82080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_98a82080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_98a82080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll TARGET_TIME: 2019-12-22T09:07:00.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 3a58 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_98a82080_rpcrt4.dll!?ndrpsimpletypehypermarshall@@yaxpeau_midl_stub_message@@peae@z_image_rpcrt4.dll FAILURE_ID_HASH: {be33baba-2fb8-d79c-feb1-3613a90e5ea8} Followup: MachineOwner ---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80011839114, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 0000000000ffffd0, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7B89
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.50
BIOS_DATE: 11/07/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80011839114
BUGCHECK_P3: 1
BUGCHECK_P4: ffffd0
WRITE_ADDRESS: fffff80011d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000ffffd0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ObfReferenceObject+24
fffff800`11839114 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 0000000000ffffd0
BUGCHECK_STR: 0x1E_c0000005_W
CPU_COUNT: c
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: sppsvc.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-09-2020 19:17:32.0407
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: ffff8341a0d06000 -- (.exr 0xffff8341a0d06000)
ExceptionAddress: 0000000000000000
ExceptionCode: 961aa867
ExceptionFlags: 0a000000
NumberParameters: 0
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
LAST_CONTROL_TRANSFER: from fffff80011a2fda7 to fffff800119c14e0
STACK_TEXT:
ffffbb8b`1dc3c9e8 fffff800`11a2fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`11839114 00000000`00000001 : nt!KeBugCheckEx
ffffbb8b`1dc3c9f0 fffff800`119d341d : ffff8341`a0d06000 ffffbb8b`1dc3d280 ffff8000`00000000 00000000`00ffffd0 : nt!KiDispatchException+0x1689d7
ffffbb8b`1dc3d0a0 fffff800`119cf605 : ffff9b04`937bd520 ffffbb8b`1dc3d6b0 00000000`00000000 fffff800`12dc3592 : nt!KiExceptionDispatch+0x11d
ffffbb8b`1dc3d280 fffff800`11839114 : ffffbb8b`1dc3d568 00000000`00000000 ffffe68b`18047e70 fffff800`11837530 : nt!KiPageFault+0x445
ffffbb8b`1dc3d410 fffff800`11e55474 : 00000000`01000000 00000000`00000000 ffffbb8b`1dc3d740 ffffe68b`2fcb24c8 : nt!ObfReferenceObject+0x24
ffffbb8b`1dc3d450 fffff800`11e5505b : 00000000`01000000 fffff800`11dee02f 00000000`db67ee9a 00000000`00000000 : nt!CmpTransReferenceTransaction+0x1c
ffffbb8b`1dc3d480 fffff800`11e8d454 : ffff9b04`8f937360 00000000`01000000 ffffbb8b`1dc3d660 ffffbb8b`1dc3de00 : nt!CmpTransSearchAddTrans+0x37
ffffbb8b`1dc3d4e0 fffff800`11e8d2a8 : ffffe68b`18747400 fffff800`11dbef95 ffffbb8b`1dc3de00 00000000`00000000 : nt!CmpTransSearchAddTransFromRm+0x50
ffffbb8b`1dc3d520 fffff800`11df20bf : 00000000`01000000 ffffbb8b`00000004 ffffbb8b`00000004 ffffbb8b`1dc3d700 : nt!CmpTransSearchAddTransFromHive+0x44
ffffbb8b`1dc3d560 fffff800`11def2d4 : ffffbb8b`0000001c ffffbb8b`1dc3d8b0 ffffbb8b`1dc3d878 00000000`00000000 : nt!CmpDoParseKey+0x84f
ffffbb8b`1dc3d800 fffff800`11ded1bf : ffff9b04`937bd520 ffffe68b`18011001 ffffbb8b`00000000 00000000`00000000 : nt!CmpParseKey+0x274
ffffbb8b`1dc3da20 fffff800`11deb621 : ffff9b04`937bd500 ffffbb8b`1dc3dc68 00000000`00000240 ffff9b04`7e525e80 : nt!ObpLookupObjectName+0x78f
ffffbb8b`1dc3dbe0 fffff800`11df4b3c : 00000000`00000001 00000000`00000000 00000000`00000000 ffff9b04`7e525e80 : nt!ObOpenObjectByNameEx+0x201
ffffbb8b`1dc3dd20 fffff800`11df49bd : ffffbb8b`1dc3e250 ffffbb8b`1dc3e090 00000000`00000000 fffff800`11e253c4 : nt!ObOpenObjectByName+0x5c
ffffbb8b`1dc3dd70 fffff800`11ebbcd2 : 00000000`00001d83 00000000`00000400 00000000`8000001a 00000000`00000030 : nt!CmOpenKey+0x29d
ffffbb8b`1dc3dfd0 fffff800`119d2d18 : fffff800`11761e70 ffff9b04`92f029c0 ffffbb8b`1dc3e090 fffff800`142417c3 : nt!NtOpenKey+0x12
ffffbb8b`1dc3e010 fffff800`119c5320 : fffff800`11f31366 00000000`00000000 ffffe68b`34458f70 000000b0`d9ba92c7 : nt!KiSystemServiceCopyEnd+0x28
ffffbb8b`1dc3e1a8 fffff800`11f31366 : 00000000`00000000 ffffe68b`34458f70 000000b0`d9ba92c7 fffff800`11831f79 : nt!KiServiceLinkage
ffffbb8b`1dc3e1b0 fffff800`119d2d18 : ffff9b04`8f937040 ffff9b04`8f937040 00000000`00000000 00000000`00000000 : nt!NtLockProductActivationKeys+0x336
ffffbb8b`1dc3eb00 00007ffe`83dfe174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000046`ec3fe188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`83dfe174
THREAD_SHA1_HASH_MOD_FUNC: 530d6de6648f9c0bf47d87c19297f4d5bd92f7d6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bd332fd860f8e2d5251e5c61c4deff8d80a6ce6a
THREAD_SHA1_HASH_MOD: 65e960981daf68eaa3f111ef44aadfdc4bfefe1e
FOLLOWUP_IP:
nt!KiDispatchException+1689d7
fffff800`11a2fda7 cc int 3
FAULT_INSTR_CODE: 86f741cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiDispatchException+1689d7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1689d7
FAILURE_BUCKET_ID: 0x1E_c0000005_W_nt!KiDispatchException
BUCKET_ID: 0x1E_c0000005_W_nt!KiDispatchException
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_W_nt!KiDispatchException
TARGET_TIME: 2020-01-08T21:12:17.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 5e54
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_w_nt!kidispatchexception
FAILURE_ID_HASH: {a68f7226-463e-440d-5496-7118eb986eaf}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff284c18b5990, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000008b, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8006ee2270b, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7B89
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.50
BIOS_DATE: 11/07/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: fffff284c18b5990
BUGCHECK_P2: ff
BUGCHECK_P3: 8b
BUGCHECK_P4: fffff8006ee2270b
WRITE_ADDRESS: fffff8006f3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff284c18b5990
CURRENT_IRQL: 0
FAULTING_IP:
nt!PpmIdlePrepare+31b
fffff800`6ee2270b 48897d80 mov qword ptr [rbp-80h],rdi
CPU_COUNT: c
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-09-2020 19:17:35.0893
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffff284c08b5780 -- (.trap 0xfffff284c08b5780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000000b
rdx=0000009d6cca4262 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8006ee2270b rsp=fffff284c08b5910 rbp=fffff284c18b5a10
r8=0000000000000000 r9=ffff860075e79180 r10=0000009d6dce19b4
r11=ffff75fad5c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz ac pe cy
nt!PpmIdlePrepare+0x31b:
fffff800`6ee2270b 48897d80 mov qword ptr [rbp-80h],rdi ss:0018:fffff284`c18b5990=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8006efd32e9 to fffff8006efc14e0
STACK_TEXT:
fffff284`c08b5638 fffff800`6efd32e9 : 00000000`0000000a fffff284`c18b5990 00000000`000000ff 00000000`0000008b : nt!KeBugCheckEx
fffff284`c08b5640 fffff800`6efcf62b : 00000000`00000000 00000000`00000000 00000000`00420760 fffff800`6f0f024b : nt!KiBugCheckDispatch+0x69
fffff284`c08b5780 fffff800`6ee2270b : 0000009d`6cca49e5 00000000`00989680 fffff284`c08b5a10 ffff8600`75e79180 : nt!KiPageFault+0x46b
fffff284`c08b5910 fffff800`6ee21446 : 00000000`00000003 00000000`00000002 ffff9c07`d3fc0100 00000000`00000008 : nt!PpmIdlePrepare+0x31b
fffff284`c08b5b00 fffff800`6efc4fe8 : ffffffff`00000000 ffff8600`75e79180 ffff9c07`dc91d540 00000000`0000023a : nt!PoIdle+0x1e6
fffff284`c08b5c60 00000000`00000000 : fffff284`c08b6000 fffff284`c08b0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: bac30f8031bbad40506eeaabc9b982d6623c8637
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 06372c5c8e03168aff9eb00044cd61dcaa3f5946
THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
FOLLOWUP_IP:
nt!PpmIdlePrepare+31b
fffff800`6ee2270b 48897d80 mov qword ptr [rbp-80h],rdi
FAULT_INSTR_CODE: 807d8948
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PpmIdlePrepare+31b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 31b
FAILURE_BUCKET_ID: AV_CODE_AV_nt!PpmIdlePrepare
BUCKET_ID: AV_CODE_AV_nt!PpmIdlePrepare
PRIMARY_PROBLEM_CLASS: AV_CODE_AV_nt!PpmIdlePrepare
TARGET_TIME: 2020-01-09T16:00:16.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3437
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_code_av_nt!ppmidleprepare
FAILURE_ID_HASH: {0722116b-c23b-c6c2-0c96-05693152d11a}
Followup: MachineOwner
---------
Memtest86 testi yapar mısın?
Kod:KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80011839114, The address that the exception occurred at Arg3: 0000000000000001, Parameter 0 of the exception Arg4: 0000000000ffffd0, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7B89 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.50 BIOS_DATE: 11/07/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff80011839114 BUGCHECK_P3: 1 BUGCHECK_P4: ffffd0 WRITE_ADDRESS: fffff80011d733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd 0000000000ffffd0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!ObfReferenceObject+24 fffff800`11839114 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx EXCEPTION_PARAMETER1: 0000000000000001 EXCEPTION_PARAMETER2: 0000000000ffffd0 BUGCHECK_STR: 0x1E_c0000005_W CPU_COUNT: c CPU_MHZ: ed8 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: sppsvc.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-09-2020 19:17:32.0407 ANALYSIS_VERSION: 10.0.18362.1 x86fre EXCEPTION_RECORD: ffff8341a0d06000 -- (.exr 0xffff8341a0d06000) ExceptionAddress: 0000000000000000 ExceptionCode: 961aa867 ExceptionFlags: 0a000000 NumberParameters: 0 TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000) Unable to read trap frame at ffff8000`00000000 LAST_CONTROL_TRANSFER: from fffff80011a2fda7 to fffff800119c14e0 STACK_TEXT: ffffbb8b`1dc3c9e8 fffff800`11a2fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`11839114 00000000`00000001 : nt!KeBugCheckEx ffffbb8b`1dc3c9f0 fffff800`119d341d : ffff8341`a0d06000 ffffbb8b`1dc3d280 ffff8000`00000000 00000000`00ffffd0 : nt!KiDispatchException+0x1689d7 ffffbb8b`1dc3d0a0 fffff800`119cf605 : ffff9b04`937bd520 ffffbb8b`1dc3d6b0 00000000`00000000 fffff800`12dc3592 : nt!KiExceptionDispatch+0x11d ffffbb8b`1dc3d280 fffff800`11839114 : ffffbb8b`1dc3d568 00000000`00000000 ffffe68b`18047e70 fffff800`11837530 : nt!KiPageFault+0x445 ffffbb8b`1dc3d410 fffff800`11e55474 : 00000000`01000000 00000000`00000000 ffffbb8b`1dc3d740 ffffe68b`2fcb24c8 : nt!ObfReferenceObject+0x24 ffffbb8b`1dc3d450 fffff800`11e5505b : 00000000`01000000 fffff800`11dee02f 00000000`db67ee9a 00000000`00000000 : nt!CmpTransReferenceTransaction+0x1c ffffbb8b`1dc3d480 fffff800`11e8d454 : ffff9b04`8f937360 00000000`01000000 ffffbb8b`1dc3d660 ffffbb8b`1dc3de00 : nt!CmpTransSearchAddTrans+0x37 ffffbb8b`1dc3d4e0 fffff800`11e8d2a8 : ffffe68b`18747400 fffff800`11dbef95 ffffbb8b`1dc3de00 00000000`00000000 : nt!CmpTransSearchAddTransFromRm+0x50 ffffbb8b`1dc3d520 fffff800`11df20bf : 00000000`01000000 ffffbb8b`00000004 ffffbb8b`00000004 ffffbb8b`1dc3d700 : nt!CmpTransSearchAddTransFromHive+0x44 ffffbb8b`1dc3d560 fffff800`11def2d4 : ffffbb8b`0000001c ffffbb8b`1dc3d8b0 ffffbb8b`1dc3d878 00000000`00000000 : nt!CmpDoParseKey+0x84f ffffbb8b`1dc3d800 fffff800`11ded1bf : ffff9b04`937bd520 ffffe68b`18011001 ffffbb8b`00000000 00000000`00000000 : nt!CmpParseKey+0x274 ffffbb8b`1dc3da20 fffff800`11deb621 : ffff9b04`937bd500 ffffbb8b`1dc3dc68 00000000`00000240 ffff9b04`7e525e80 : nt!ObpLookupObjectName+0x78f ffffbb8b`1dc3dbe0 fffff800`11df4b3c : 00000000`00000001 00000000`00000000 00000000`00000000 ffff9b04`7e525e80 : nt!ObOpenObjectByNameEx+0x201 ffffbb8b`1dc3dd20 fffff800`11df49bd : ffffbb8b`1dc3e250 ffffbb8b`1dc3e090 00000000`00000000 fffff800`11e253c4 : nt!ObOpenObjectByName+0x5c ffffbb8b`1dc3dd70 fffff800`11ebbcd2 : 00000000`00001d83 00000000`00000400 00000000`8000001a 00000000`00000030 : nt!CmOpenKey+0x29d ffffbb8b`1dc3dfd0 fffff800`119d2d18 : fffff800`11761e70 ffff9b04`92f029c0 ffffbb8b`1dc3e090 fffff800`142417c3 : nt!NtOpenKey+0x12 ffffbb8b`1dc3e010 fffff800`119c5320 : fffff800`11f31366 00000000`00000000 ffffe68b`34458f70 000000b0`d9ba92c7 : nt!KiSystemServiceCopyEnd+0x28 ffffbb8b`1dc3e1a8 fffff800`11f31366 : 00000000`00000000 ffffe68b`34458f70 000000b0`d9ba92c7 fffff800`11831f79 : nt!KiServiceLinkage ffffbb8b`1dc3e1b0 fffff800`119d2d18 : ffff9b04`8f937040 ffff9b04`8f937040 00000000`00000000 00000000`00000000 : nt!NtLockProductActivationKeys+0x336 ffffbb8b`1dc3eb00 00007ffe`83dfe174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000046`ec3fe188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`83dfe174 THREAD_SHA1_HASH_MOD_FUNC: 530d6de6648f9c0bf47d87c19297f4d5bd92f7d6 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bd332fd860f8e2d5251e5c61c4deff8d80a6ce6a THREAD_SHA1_HASH_MOD: 65e960981daf68eaa3f111ef44aadfdc4bfefe1e FOLLOWUP_IP: nt!KiDispatchException+1689d7 fffff800`11a2fda7 cc int 3 FAULT_INSTR_CODE: 86f741cc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KiDispatchException+1689d7 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470 IMAGE_VERSION: 10.0.18362.535 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 1689d7 FAILURE_BUCKET_ID: 0x1E_c0000005_W_nt!KiDispatchException BUCKET_ID: 0x1E_c0000005_W_nt!KiDispatchException PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_W_nt!KiDispatchException TARGET_TIME: 2020-01-08T21:12:17.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 5e54 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1e_c0000005_w_nt!kidispatchexception FAILURE_ID_HASH: {a68f7226-463e-440d-5496-7118eb986eaf} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff284c18b5990, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 000000000000008b, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8006ee2270b, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7B89 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.50 BIOS_DATE: 11/07/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: fffff284c18b5990 BUGCHECK_P2: ff BUGCHECK_P3: 8b BUGCHECK_P4: fffff8006ee2270b WRITE_ADDRESS: fffff8006f3733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff284c18b5990 CURRENT_IRQL: 0 FAULTING_IP: nt!PpmIdlePrepare+31b fffff800`6ee2270b 48897d80 mov qword ptr [rbp-80h],rdi CPU_COUNT: c CPU_MHZ: ed8 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-09-2020 19:17:35.0893 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: fffff284c08b5780 -- (.trap 0xfffff284c08b5780) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=000000000000000b rdx=0000009d6cca4262 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8006ee2270b rsp=fffff284c08b5910 rbp=fffff284c18b5a10 r8=0000000000000000 r9=ffff860075e79180 r10=0000009d6dce19b4 r11=ffff75fad5c00000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl nz ac pe cy nt!PpmIdlePrepare+0x31b: fffff800`6ee2270b 48897d80 mov qword ptr [rbp-80h],rdi ss:0018:fffff284`c18b5990=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8006efd32e9 to fffff8006efc14e0 STACK_TEXT: fffff284`c08b5638 fffff800`6efd32e9 : 00000000`0000000a fffff284`c18b5990 00000000`000000ff 00000000`0000008b : nt!KeBugCheckEx fffff284`c08b5640 fffff800`6efcf62b : 00000000`00000000 00000000`00000000 00000000`00420760 fffff800`6f0f024b : nt!KiBugCheckDispatch+0x69 fffff284`c08b5780 fffff800`6ee2270b : 0000009d`6cca49e5 00000000`00989680 fffff284`c08b5a10 ffff8600`75e79180 : nt!KiPageFault+0x46b fffff284`c08b5910 fffff800`6ee21446 : 00000000`00000003 00000000`00000002 ffff9c07`d3fc0100 00000000`00000008 : nt!PpmIdlePrepare+0x31b fffff284`c08b5b00 fffff800`6efc4fe8 : ffffffff`00000000 ffff8600`75e79180 ffff9c07`dc91d540 00000000`0000023a : nt!PoIdle+0x1e6 fffff284`c08b5c60 00000000`00000000 : fffff284`c08b6000 fffff284`c08b0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48 THREAD_SHA1_HASH_MOD_FUNC: bac30f8031bbad40506eeaabc9b982d6623c8637 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 06372c5c8e03168aff9eb00044cd61dcaa3f5946 THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693 FOLLOWUP_IP: nt!PpmIdlePrepare+31b fffff800`6ee2270b 48897d80 mov qword ptr [rbp-80h],rdi FAULT_INSTR_CODE: 807d8948 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!PpmIdlePrepare+31b FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470 IMAGE_VERSION: 10.0.18362.535 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 31b FAILURE_BUCKET_ID: AV_CODE_AV_nt!PpmIdlePrepare BUCKET_ID: AV_CODE_AV_nt!PpmIdlePrepare PRIMARY_PROBLEM_CLASS: AV_CODE_AV_nt!PpmIdlePrepare TARGET_TIME: 2020-01-09T16:00:16.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 3437 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_code_av_nt!ppmidleprepare FAILURE_ID_HASH: {0722116b-c23b-c6c2-0c96-05693152d11a} Followup: MachineOwner ---------
Memtest86 testi yapar mısın?
Kod:KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80011839114, The address that the exception occurred at Arg3: 0000000000000001, Parameter 0 of the exception Arg4: 0000000000ffffd0, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7B89 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.50 BIOS_DATE: 11/07/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff80011839114 BUGCHECK_P3: 1 BUGCHECK_P4: ffffd0 WRITE_ADDRESS: fffff80011d733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd 0000000000ffffd0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!ObfReferenceObject+24 fffff800`11839114 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx EXCEPTION_PARAMETER1: 0000000000000001 EXCEPTION_PARAMETER2: 0000000000ffffd0 BUGCHECK_STR: 0x1E_c0000005_W CPU_COUNT: c CPU_MHZ: ed8 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: sppsvc.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-09-2020 19:17:32.0407 ANALYSIS_VERSION: 10.0.18362.1 x86fre EXCEPTION_RECORD: ffff8341a0d06000 -- (.exr 0xffff8341a0d06000) ExceptionAddress: 0000000000000000 ExceptionCode: 961aa867 ExceptionFlags: 0a000000 NumberParameters: 0 TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000) Unable to read trap frame at ffff8000`00000000 LAST_CONTROL_TRANSFER: from fffff80011a2fda7 to fffff800119c14e0 STACK_TEXT: ffffbb8b`1dc3c9e8 fffff800`11a2fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`11839114 00000000`00000001 : nt!KeBugCheckEx ffffbb8b`1dc3c9f0 fffff800`119d341d : ffff8341`a0d06000 ffffbb8b`1dc3d280 ffff8000`00000000 00000000`00ffffd0 : nt!KiDispatchException+0x1689d7 ffffbb8b`1dc3d0a0 fffff800`119cf605 : ffff9b04`937bd520 ffffbb8b`1dc3d6b0 00000000`00000000 fffff800`12dc3592 : nt!KiExceptionDispatch+0x11d ffffbb8b`1dc3d280 fffff800`11839114 : ffffbb8b`1dc3d568 00000000`00000000 ffffe68b`18047e70 fffff800`11837530 : nt!KiPageFault+0x445 ffffbb8b`1dc3d410 fffff800`11e55474 : 00000000`01000000 00000000`00000000 ffffbb8b`1dc3d740 ffffe68b`2fcb24c8 : nt!ObfReferenceObject+0x24 ffffbb8b`1dc3d450 fffff800`11e5505b : 00000000`01000000 fffff800`11dee02f 00000000`db67ee9a 00000000`00000000 : nt!CmpTransReferenceTransaction+0x1c ffffbb8b`1dc3d480 fffff800`11e8d454 : ffff9b04`8f937360 00000000`01000000 ffffbb8b`1dc3d660 ffffbb8b`1dc3de00 : nt!CmpTransSearchAddTrans+0x37 ffffbb8b`1dc3d4e0 fffff800`11e8d2a8 : ffffe68b`18747400 fffff800`11dbef95 ffffbb8b`1dc3de00 00000000`00000000 : nt!CmpTransSearchAddTransFromRm+0x50 ffffbb8b`1dc3d520 fffff800`11df20bf : 00000000`01000000 ffffbb8b`00000004 ffffbb8b`00000004 ffffbb8b`1dc3d700 : nt!CmpTransSearchAddTransFromHive+0x44 ffffbb8b`1dc3d560 fffff800`11def2d4 : ffffbb8b`0000001c ffffbb8b`1dc3d8b0 ffffbb8b`1dc3d878 00000000`00000000 : nt!CmpDoParseKey+0x84f ffffbb8b`1dc3d800 fffff800`11ded1bf : ffff9b04`937bd520 ffffe68b`18011001 ffffbb8b`00000000 00000000`00000000 : nt!CmpParseKey+0x274 ffffbb8b`1dc3da20 fffff800`11deb621 : ffff9b04`937bd500 ffffbb8b`1dc3dc68 00000000`00000240 ffff9b04`7e525e80 : nt!ObpLookupObjectName+0x78f ffffbb8b`1dc3dbe0 fffff800`11df4b3c : 00000000`00000001 00000000`00000000 00000000`00000000 ffff9b04`7e525e80 : nt!ObOpenObjectByNameEx+0x201 ffffbb8b`1dc3dd20 fffff800`11df49bd : ffffbb8b`1dc3e250 ffffbb8b`1dc3e090 00000000`00000000 fffff800`11e253c4 : nt!ObOpenObjectByName+0x5c ffffbb8b`1dc3dd70 fffff800`11ebbcd2 : 00000000`00001d83 00000000`00000400 00000000`8000001a 00000000`00000030 : nt!CmOpenKey+0x29d ffffbb8b`1dc3dfd0 fffff800`119d2d18 : fffff800`11761e70 ffff9b04`92f029c0 ffffbb8b`1dc3e090 fffff800`142417c3 : nt!NtOpenKey+0x12 ffffbb8b`1dc3e010 fffff800`119c5320 : fffff800`11f31366 00000000`00000000 ffffe68b`34458f70 000000b0`d9ba92c7 : nt!KiSystemServiceCopyEnd+0x28 ffffbb8b`1dc3e1a8 fffff800`11f31366 : 00000000`00000000 ffffe68b`34458f70 000000b0`d9ba92c7 fffff800`11831f79 : nt!KiServiceLinkage ffffbb8b`1dc3e1b0 fffff800`119d2d18 : ffff9b04`8f937040 ffff9b04`8f937040 00000000`00000000 00000000`00000000 : nt!NtLockProductActivationKeys+0x336 ffffbb8b`1dc3eb00 00007ffe`83dfe174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000046`ec3fe188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`83dfe174 THREAD_SHA1_HASH_MOD_FUNC: 530d6de6648f9c0bf47d87c19297f4d5bd92f7d6 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bd332fd860f8e2d5251e5c61c4deff8d80a6ce6a THREAD_SHA1_HASH_MOD: 65e960981daf68eaa3f111ef44aadfdc4bfefe1e FOLLOWUP_IP: nt!KiDispatchException+1689d7 fffff800`11a2fda7 cc int 3 FAULT_INSTR_CODE: 86f741cc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KiDispatchException+1689d7 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470 IMAGE_VERSION: 10.0.18362.535 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 1689d7 FAILURE_BUCKET_ID: 0x1E_c0000005_W_nt!KiDispatchException BUCKET_ID: 0x1E_c0000005_W_nt!KiDispatchException PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_W_nt!KiDispatchException TARGET_TIME: 2020-01-08T21:12:17.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 5e54 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1e_c0000005_w_nt!kidispatchexception FAILURE_ID_HASH: {a68f7226-463e-440d-5496-7118eb986eaf} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff284c18b5990, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 000000000000008b, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8006ee2270b, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7B89 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.50 BIOS_DATE: 11/07/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: fffff284c18b5990 BUGCHECK_P2: ff BUGCHECK_P3: 8b BUGCHECK_P4: fffff8006ee2270b WRITE_ADDRESS: fffff8006f3733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff284c18b5990 CURRENT_IRQL: 0 FAULTING_IP: nt!PpmIdlePrepare+31b fffff800`6ee2270b 48897d80 mov qword ptr [rbp-80h],rdi CPU_COUNT: c CPU_MHZ: ed8 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-09-2020 19:17:35.0893 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: fffff284c08b5780 -- (.trap 0xfffff284c08b5780) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=000000000000000b rdx=0000009d6cca4262 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8006ee2270b rsp=fffff284c08b5910 rbp=fffff284c18b5a10 r8=0000000000000000 r9=ffff860075e79180 r10=0000009d6dce19b4 r11=ffff75fad5c00000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl nz ac pe cy nt!PpmIdlePrepare+0x31b: fffff800`6ee2270b 48897d80 mov qword ptr [rbp-80h],rdi ss:0018:fffff284`c18b5990=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8006efd32e9 to fffff8006efc14e0 STACK_TEXT: fffff284`c08b5638 fffff800`6efd32e9 : 00000000`0000000a fffff284`c18b5990 00000000`000000ff 00000000`0000008b : nt!KeBugCheckEx fffff284`c08b5640 fffff800`6efcf62b : 00000000`00000000 00000000`00000000 00000000`00420760 fffff800`6f0f024b : nt!KiBugCheckDispatch+0x69 fffff284`c08b5780 fffff800`6ee2270b : 0000009d`6cca49e5 00000000`00989680 fffff284`c08b5a10 ffff8600`75e79180 : nt!KiPageFault+0x46b fffff284`c08b5910 fffff800`6ee21446 : 00000000`00000003 00000000`00000002 ffff9c07`d3fc0100 00000000`00000008 : nt!PpmIdlePrepare+0x31b fffff284`c08b5b00 fffff800`6efc4fe8 : ffffffff`00000000 ffff8600`75e79180 ffff9c07`dc91d540 00000000`0000023a : nt!PoIdle+0x1e6 fffff284`c08b5c60 00000000`00000000 : fffff284`c08b6000 fffff284`c08b0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48 THREAD_SHA1_HASH_MOD_FUNC: bac30f8031bbad40506eeaabc9b982d6623c8637 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 06372c5c8e03168aff9eb00044cd61dcaa3f5946 THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693 FOLLOWUP_IP: nt!PpmIdlePrepare+31b fffff800`6ee2270b 48897d80 mov qword ptr [rbp-80h],rdi FAULT_INSTR_CODE: 807d8948 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!PpmIdlePrepare+31b FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470 IMAGE_VERSION: 10.0.18362.535 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 31b FAILURE_BUCKET_ID: AV_CODE_AV_nt!PpmIdlePrepare BUCKET_ID: AV_CODE_AV_nt!PpmIdlePrepare PRIMARY_PROBLEM_CLASS: AV_CODE_AV_nt!PpmIdlePrepare TARGET_TIME: 2020-01-09T16:00:16.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 3437 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_code_av_nt!ppmidleprepare FAILURE_ID_HASH: {0722116b-c23b-c6c2-0c96-05693152d11a} Followup: MachineOwner ---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80711c48a56, Address of the instruction which caused the bugcheck
Arg3: ffffc3814e8df930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7B89
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.50
BIOS_DATE: 11/07/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M MORTAR MAX (MS-7B89)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80711c48a56
BUGCHECK_P3: ffffc3814e8df930
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KiExitDispatcher+a6
fffff807`11c48a56 410fb68573010000 movzx eax,byte ptr [r13+173h]
CONTEXT: ffffc3814e8df930 -- (.cxr 0xffffc3814e8df930)
rax=0000000000000001 rbx=0000000000000000 rcx=ffffc3814f880180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffc3814f880180
rip=fffff80711c48a56 rsp=ffffbb0f887b8a30 rbp=ffffc3814f880180
r8=0000000000000001 r9=0000000000000001 r10=0000fffff807122b
r11=ffffb37d73e00000 r12=000001e3bbf1a870 r13=c59ec732c61a2de8
r14=0000000000000001 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!KiExitDispatcher+0xa6:
fffff807`11c48a56 410fb68573010000 movzx eax,byte ptr [r13+173h] ds:002b:c59ec732`c61a2f5b=??
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-09-2020 20:16:34.0796
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: ffffc3814e8deff8
LAST_CONTROL_TRANSFER: from fffff80711d0f521 to fffff80711c48a56
STACK_TEXT:
ffffbb0f`887b8a30 fffff807`11d0f521 : 00000000`00000000 00000000`00000000 ffffd601`398f3080 ffffc381`4e880180 : nt!KiExitDispatcher+0xa6
ffffbb0f`887b8a90 fffff807`122b8710 : ffffd601`00000000 ffffd601`398f3080 ffffbb0f`887b8b80 000001e3`bbf1a870 : nt!KeAlertThreadByThreadId+0xd5
ffffbb0f`887b8ad0 fffff807`11dd2d18 : ffffd601`3accd080 ffffd601`398f3080 000001e3`bbe00128 ffffd601`3accd080 : nt!NtAlertThreadByThreadId+0x40
ffffbb0f`887b8b00 00007ffb`1375ce94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000e`7d5feb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1375ce94
THREAD_SHA1_HASH_MOD_FUNC: 5cb262de8bc2d601407eb816b9a2274714984a84
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e6a152684433a81b023145ed078f67e61c790448
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!KiExitDispatcher+a6
fffff807`11c48a56 410fb68573010000 movzx eax,byte ptr [r13+173h]
FAULT_INSTR_CODE: 85b60f41
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiExitDispatcher+a6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .cxr 0xffffc3814e8df930 ; kb
BUCKET_ID_FUNC_OFFSET: a6
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KiExitDispatcher
BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KiExitDispatcher
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_STACKPTR_ERROR_nt!KiExitDispatcher
TARGET_TIME: 2020-01-09T17:00:35.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 227f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_stackptr_error_nt!kiexitdispatcher
FAILURE_ID_HASH: {b17de1e6-bd6d-bfd4-c86d-2589a114c66d}
Followup: MachineOwner
---------