IRQL_NOT_LESS_OR_EQUAL mavi ekran

  • Konuyu başlatan Silinen üye 294212
  • Başlangıç Tarihi
  • Mesaj 33
  • Görüntüleme 4.594
S

Silinen üye 294212

Ziyaretçi
Bir süredir mavi ekran sorunu yaşıyorum. BlueScreenView için ekran görüntüsü ekliyorum. Sorun neden kaynaklı olabilir? Sorunumu nasıl çözebilirim? Yardımcı olabilirseniz çok sevinirim.

ss.jpg


Teşekkürler.
 
Son düzenleyen: Moderatör:
Hayır açılmıyor, lütfen rehberi okur musun?

==================================================
Dump File : 122719-9781-01.dmp
Crash Time : 27.12.2019 13:23:07
Bug Check String : ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY
Bug Check Code : 0x000000fc
Parameter 1 : fffff801`2fa16d39
Parameter 2 : 89000004`1b5c8963
Parameter 3 : ffffdb8d`13492650
Parameter 4 : 00000000`00000002
Caused By Driver : clipsp.sys
Caused By Address : clipsp.sys+46d39
File Description : CLIP Service
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 10.0.18362.387 (WinBuild.160101.0800)
Processor : x64
Crash Address : ntoskrnl.exe+1c14e0
Stack Address 1 :
Stack Address 2 :
Stack Address 3 :
Computer Name :
Full Path : C:\WINDOWS\Minidump\122719-9781-01.dmp
Processors Count : 12
Major Version : 15
Minor Version : 18362
Dump File Size : 883.444
Dump File Time : 27.12.2019 13:24:04
==================================================

==================================================
Dump File : 122719-9906-02.dmp
Crash Time : 27.12.2019 12:25:08
Bug Check String : PAGE_FAULT_IN_NONPAGED_AREA
Bug Check Code : 0x00000050
Parameter 1 : fffff800`1da16d39
Parameter 2 : 00000000`00000010
Parameter 3 : fffff800`1da16d39
Parameter 4 : 00000000`00000002
Caused By Driver : ntoskrnl.exe
Caused By Address : ntoskrnl.exe+1c14e0
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 10.0.18362.535 (WinBuild.160101.0800)
Processor : x64
Crash Address : ntoskrnl.exe+1c14e0
Stack Address 1 :
Stack Address 2 :
Stack Address 3 :
Computer Name :
Full Path : C:\WINDOWS\Minidump\122719-9906-02.dmp
Processors Count : 12
Major Version : 15
Minor Version : 18362
Dump File Size : 802.796
Dump File Time : 27.12.2019 12:26:01
==================================================

==================================================
Dump File : 122719-9906-01.dmp
Crash Time : 27.12.2019 12:24:04
Bug Check String : PAGE_FAULT_IN_NONPAGED_AREA
Bug Check Code : 0x00000050
Parameter 1 : fffff807`51a16d39
Parameter 2 : 00000000`00000010
Parameter 3 : fffff807`51a16d39
Parameter 4 : 00000000`00000002
Caused By Driver : ntoskrnl.exe
Caused By Address : ntoskrnl.exe+1c14e0
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 10.0.18362.535 (WinBuild.160101.0800)
Processor : x64
Crash Address : ntoskrnl.exe+1c14e0
Stack Address 1 :
Stack Address 2 :
Stack Address 3 :
Computer Name :
Full Path : C:\WINDOWS\Minidump\122719-9906-01.dmp
Processors Count : 12
Major Version : 15
Minor Version : 18362
Dump File Size : 910.388
Dump File Time : 27.12.2019 12:25:02
==================================================

==================================================
Dump File : 122319-9718-01.dmp
Crash Time : 23.12.2019 12:32:06
Bug Check String : PROCESS_HAS_LOCKED_PAGES
Bug Check Code : 0x00000076
Parameter 1 : 00000000`00000000
Parameter 2 : ffffe404`323394c0
Parameter 3 : 00000000`00000010
Parameter 4 : 00000000`00000000
Caused By Driver : ntoskrnl.exe
Caused By Address : ntoskrnl.exe+1c14e0
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 10.0.18362.535 (WinBuild.160101.0800)
Processor : x64
Crash Address : ntoskrnl.exe+1c14e0
Stack Address 1 :
Stack Address 2 :
Stack Address 3 :
Computer Name :
Full Path : C:\WINDOWS\Minidump\122319-9718-01.dmp
Processors Count : 12
Major Version : 15
Minor Version : 18362
Dump File Size : 1.284.484
Dump File Time : 23.12.2019 12:33:22
==================================================

==================================================
Dump File : 122219-9250-01.dmp
Crash Time : 22.12.2019 12:07:00
Bug Check String : CRITICAL_PROCESS_DIED
Bug Check Code : 0x000000ef
Parameter 1 : ffff870a`9a7d70c0
Parameter 2 : 00000000`00000000
Parameter 3 : 00000000`00000000
Parameter 4 : 00000000`00000000
Caused By Driver : ntoskrnl.exe
Caused By Address : ntoskrnl.exe+1c14e0
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 10.0.18362.535 (WinBuild.160101.0800)
Processor : x64
Crash Address : ntoskrnl.exe+1c14e0
Stack Address 1 :
Stack Address 2 :
Stack Address 3 :
Computer Name :
Full Path : C:\WINDOWS\Minidump\122219-9250-01.dmp
Processors Count : 12
Major Version : 15
Minor Version : 18362
Dump File Size : 2.086.996
Dump File Time : 22.12.2019 12:08:26
==================================================
 
Bellek hataları, Memtest86 testi yapmalısın.
Fakat şunu fark ettim belleklerin 3600MHz olmasına rağmen 2666MHz de çalışıyor.
[Memory Device (Type 17) - Length 40 - Handle 001eh]
Physical Memory Array Handle 000fh
Memory Error Info Handle 001dh
Total Width 64 bits
Data Width 64 bits
Size 8192MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM 1
Bank Locator P0 CHANNEL B
Memory Type 1ah - Specification Reserved
Type Detail 4080h - Synchronous
Speed 2667MHz
Manufacturer Unknown
Serial Number
Asset Tag Number [String Not Specified]
Part Number CMW16GX4M2Z3600C18


Kod:
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8012fa16d39, Virtual address for the attempted execute.
Arg2: 890000041b5c8963, PTE contents.
Arg3: ffffdb8d13492650, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffff8012fa16d39

BUGCHECK_P2: 890000041b5c8963

BUGCHECK_P3: ffffdb8d13492650

BUGCHECK_P4: 2

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xFC

PROCESS_NAME:  sppsvc.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-29-2019 00:15:58.0441

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffdb8d13492650 -- (.trap 0xffffdb8d13492650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012fa16d39 rsp=ffffdb8d134927e0 rbp=0000000000002b74
 r8=00000000ffffffff  r9=7ffff8012e86d7b8 r10=7ffffffffffffffc
r11=ffffa4fd38000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
clipsp+0x46d39:
fffff801`2fa16d39 004900          add     byte ptr [rcx],cl ds:00000000`00000000=??
Resetting default scope

MISALIGNED_IP:
clipsp+46d39
fffff801`2fa16d39 004900          add     byte ptr [rcx],cl

LAST_CONTROL_TRANSFER:  from fffff8012e654aac to fffff8012e5c14e0

STACK_TEXT: 
ffffdb8d`13492368 fffff801`2e654aac : 00000000`000000fc fffff801`2fa16d39 89000004`1b5c8963 ffffdb8d`13492650 : nt!KeBugCheckEx
ffffdb8d`13492370 fffff801`2e40d498 : fffff801`2fa16d39 fffff67b`3d9ec000 00000000`00000000 ffffdb8d`13492650 : nt!MiCheckSystemNxFault+0x1298a0
ffffdb8d`134923b0 fffff801`2e472eef : 00000000`00000000 00000000`00000011 00000000`00000000 fffff801`2fa16d39 : nt!MiSystemFault+0x728
ffffdb8d`134924b0 fffff801`2e5cf520 : 00000000`00000001 00000000`00000040 fffff801`2e86d7b8 ffff930b`e6400000 : nt!MmAccessFault+0x34f
ffffdb8d`13492650 fffff801`2fa16d39 : ffffffff`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!KiPageFault+0x360
ffffdb8d`134927e0 ffffffff`00000000 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000028 : clipsp+0x46d39
ffffdb8d`134927e8 00000000`00000000 : 00000000`00000000 ffffffff`ffffffff 00000000`00000028 00000000`00000000 : 0xffffffff`00000000


THREAD_SHA1_HASH_MOD_FUNC:  43684bef5509cce7df42704dd8956da27ef36a88

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  f4855a222feb919352ddf99a67880088c1af7646

THREAD_SHA1_HASH_MOD:  0dd312e032f8aa180e802b031bf5c6a4d0a848a8

FOLLOWUP_IP:
clipsp+46d39
fffff801`2fa16d39 004900          add     byte ptr [rcx],cl

FAULT_INSTR_CODE:  6e004900

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  clipsp+46d39

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.387

STACK_COMMAND:  .thread ; .cxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED_clipsp.sys

BUCKET_ID:  IP_MISALIGNED_clipsp.sys

PRIMARY_PROBLEM_CLASS:  IP_MISALIGNED_clipsp.sys

TARGET_TIME:  2019-12-27T10:23:07.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  326a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:ip_misaligned_clipsp.sys

FAILURE_ID_HASH:  {86ad9ae3-05b2-5902-4536-abeb88ebfb89}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8001da16d39, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff8001da16d39, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffff8001da16d39

BUGCHECK_P2: 10

BUGCHECK_P3: fffff8001da16d39

BUGCHECK_P4: 2

READ_ADDRESS: fffff8001c9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 fffff8001da16d39

FAULTING_IP:
+0
fffff800`1da16d39 ??              ???

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  sppsvc.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-29-2019 00:16:02.0113

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffad8af45b1650 -- (.trap 0xffffad8af45b1650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001da16d39 rsp=ffffad8af45b17e0 rbp=0000000000001f58
 r8=00000000ffffffff  r9=7ffff8001c86d7b8 r10=7ffffffffffffffc
r11=ffff787c88e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
fffff800`1da16d39 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8001c5e35d6 to fffff8001c5c14e0

FAILED_INSTRUCTION_ADDRESS:
+0
fffff800`1da16d39 ??              ???

STACK_TEXT: 
ffffad8a`f45b13a8 fffff800`1c5e35d6 : 00000000`00000050 fffff800`1da16d39 00000000`00000010 ffffad8a`f45b1650 : nt!KeBugCheckEx
ffffad8a`f45b13b0 fffff800`1c472eef : 00000000`00000000 00000000`00000010 00000000`00000000 fffff800`1da16d39 : nt!MiSystemFault+0x1d6866
ffffad8a`f45b14b0 fffff800`1c5cf520 : 00000000`00000000 ffffad8a`f45b1750 fffff800`1c86d7b8 ffffe488`00000000 : nt!MmAccessFault+0x34f
ffffad8a`f45b1650 fffff800`1da16d39 : ffffffff`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!KiPageFault+0x360
ffffad8a`f45b17e0 ffffffff`00000000 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff ffffc132`d91b27dc : 0xfffff800`1da16d39
ffffad8a`f45b17e8 00000000`00000000 : 00000000`00000000 ffffffff`ffffffff ffffc132`d91b27dc 01000000`00100000 : 0xffffffff`00000000


THREAD_SHA1_HASH_MOD_FUNC:  35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c0efb11bdbdabbfe638cd9930c42dad821618e02

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff800`1c5e35d6 cc              int     3

FAULT_INSTR_CODE:  4d8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiSystemFault+1d6866

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  1d6866

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

PRIMARY_PROBLEM_CLASS:  AV_INVALID_BAD_IP_nt!MiSystemFault

TARGET_TIME:  2019-12-27T09:25:08.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3c1d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_invalid_bad_ip_nt!misystemfault

FAILURE_ID_HASH:  {48ad9531-e3f8-1044-fc5f-d917677674c7}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80751a16d39, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff80751a16d39, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffff80751a16d39

BUGCHECK_P2: 10

BUGCHECK_P3: fffff80751a16d39

BUGCHECK_P4: 2

READ_ADDRESS: fffff807509733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 fffff80751a16d39

FAULTING_IP:
+0
fffff807`51a16d39 ??              ???

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  sppsvc.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-29-2019 00:16:07.0278

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff89853d0a7650 -- (.trap 0xffff89853d0a7650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80751a16d39 rsp=ffff89853d0a77e0 rbp=0000000000002f60
 r8=00000000ffffffff  r9=7ffff8075086d7b8 r10=7ffffffffffffffc
r11=ffff7d7afbe00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
fffff807`51a16d39 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff807505e35d6 to fffff807505c14e0

FAILED_INSTRUCTION_ADDRESS:
+0
fffff807`51a16d39 ??              ???

STACK_TEXT: 
ffff8985`3d0a73a8 fffff807`505e35d6 : 00000000`00000050 fffff807`51a16d39 00000000`00000010 ffff8985`3d0a7650 : nt!KeBugCheckEx
ffff8985`3d0a73b0 fffff807`50472eef : 00000000`00000000 00000000`00000010 00000000`00000000 fffff807`51a16d39 : nt!MiSystemFault+0x1d6866
ffff8985`3d0a74b0 fffff807`505cf520 : 00000000`00000000 ffff8985`3d0a7750 fffff807`5086d7b8 ffffb28c`00000000 : nt!MmAccessFault+0x34f
ffff8985`3d0a7650 fffff807`51a16d39 : ffffffff`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!KiPageFault+0x360
ffff8985`3d0a77e0 ffffffff`00000000 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff ffff7362`fac3bae3 : 0xfffff807`51a16d39
ffff8985`3d0a77e8 00000000`00000000 : 00000000`00000000 ffffffff`ffffffff ffff7362`fac3bae3 01000000`00100000 : 0xffffffff`00000000


THREAD_SHA1_HASH_MOD_FUNC:  35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c0efb11bdbdabbfe638cd9930c42dad821618e02

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff807`505e35d6 cc              int     3

FAULT_INSTR_CODE:  4d8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiSystemFault+1d6866

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  1d6866

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

PRIMARY_PROBLEM_CLASS:  AV_INVALID_BAD_IP_nt!MiSystemFault

TARGET_TIME:  2019-12-27T09:24:04.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3c5a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_invalid_bad_ip_nt!misystemfault

FAILURE_ID_HASH:  {48ad9531-e3f8-1044-fc5f-d917677674c7}

Followup:     MachineOwner
---------

PROCESS_HAS_LOCKED_PAGES (76)
Caused by a driver not cleaning up correctly after an I/O.
Arguments:
Arg1: 0000000000000000, Locked memory pages found in process being terminated.
Arg2: ffffe404323394c0, Process address.
Arg3: 0000000000000010, Number of locked pages.
Arg4: 0000000000000000, Pointer to driver stacks (if enabled) or 0 if not.
    Issue a !search over all of physical memory for the current process pointer.
    This will yield at least one MDL which points to it.  Then do another !search
    for each MDL found, this will yield the IRP(s) that point to it, revealing
    which driver is leaking the pages.
    Otherwise, set HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory
    Management\TrackLockedPages to a DWORD 1 value and reboot.  Then the system
    will save stack traces so the guilty driver can be easily identified.
    When you enable this flag, if the driver commits the error again you will
    see a different bugcheck - DRIVER_LEFT_LOCKED_PAGES_IN_PROCESS (0xCB) -
    which can identify the offending driver(s).

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

BUGCHECK_P1: 0

BUGCHECK_P2: ffffe404323394c0

BUGCHECK_P3: 10

BUGCHECK_P4: 0

PROCESS_NAME:  sppsvc.exe

DEFAULT_BUCKET_ID:  DRIVER_FAULT_0x76

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x76

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-29-2019 00:16:10.0879

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8036d1ce1ef to fffff8036cbc14e0

STACK_TEXT: 
ffffb901`2d9ab6b8 fffff803`6d1ce1ef : 00000000`00000076 00000000`00000000 ffffe404`323394c0 00000000`00000010 : nt!KeBugCheckEx
ffffb901`2d9ab6c0 fffff803`6d0670fe : ffffe404`323394c0 ffffe404`323397a0 ffffe404`2e822080 ffffe404`323397b0 : nt!MmDeleteProcessAddressSpace+0x16627b
ffffb901`2d9ab710 fffff803`6cffa0e0 : ffffe404`323397a0 ffffe404`32339490 ffffe404`323397a0 00000000`00000000 : nt!PspProcessDelete+0x13e
ffffb901`2d9ab7a0 fffff803`6ca3a9a9 : 00000000`00000000 00000000`00000000 ffffe404`323397a0 ffffe404`323394c0 : nt!ObpRemoveObjectRoutine+0x80
ffffb901`2d9ab800 fffff803`6d060750 : 00000000`00000000 ffffe404`27714738 ffffe404`27714738 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc9
ffffb901`2d9ab840 fffff803`6cffa0e0 : ffffb901`2d9aba39 ffffe404`27714050 ffffb901`2d9aba39 ffffe404`1feec2c0 : nt!PspThreadDelete+0x340
ffffb901`2d9ab8b0 fffff803`6ca3a9a9 : 00000000`00000000 00000000`00000000 ffffb901`2d9aba39 ffffe404`27714080 : nt!ObpRemoveObjectRoutine+0x80
ffffb901`2d9ab910 fffff803`6cfec457 : 00000000`00000000 ffffe404`27714050 ffffe404`27714050 ffffbe02`06542f40 : nt!ObfDereferenceObjectWithTag+0xc9
ffffb901`2d9ab950 fffff803`6cff174e : 00000000`0000020c ffff6357`046fcefc 00000000`00000000 fffff803`6cbd322c : nt!ObCloseHandleTableEntry+0x2c7
ffffb901`2d9aba90 fffff803`6cbd3251 : ffffe404`2e822080 0000024a`5ab50000 ffffb901`2d9abb80 ffffe404`39a4c4c0 : nt!NtClose+0xde
ffffb901`2d9abb00 00007fff`9449c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000008e`5267f1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`9449c2a4


THREAD_SHA1_HASH_MOD_FUNC:  2e812dfe1bb3883903d609a77a8c74115c200eeb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  203f80f14510335b9a0a0cabb168245b177cf677

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!MmDeleteProcessAddressSpace+16627b
fffff803`6d1ce1ef cc              int     3

FAULT_INSTR_CODE:  f38b48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MmDeleteProcessAddressSpace+16627b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  16627b

FAILURE_BUCKET_ID:  0x76_sppsvc.exe_nt!MmDeleteProcessAddressSpace

BUCKET_ID:  0x76_sppsvc.exe_nt!MmDeleteProcessAddressSpace

PRIMARY_PROBLEM_CLASS:  0x76_sppsvc.exe_nt!MmDeleteProcessAddressSpace

TARGET_TIME:  2019-12-23T09:32:06.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  342c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x76_sppsvc.exe_nt!mmdeleteprocessaddressspace

FAILURE_ID_HASH:  {c1d3d845-feee-7285-2e5a-0bc9b3644feb}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffff870a9a7d70c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffff870a9a7d70c0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

EXCEPTION_CODE: (NTSTATUS) 0x98a82080 - <Unable to get error code text>

ERROR_CODE: (NTSTATUS) 0x98a82080 - <Unable to get error code text>

CRITICAL_PROCESS_REPORTGUID:  {09c19f5e-c480-47bc-ad01-5504d72df400}

IMAGE_NAME:  RPCRT4.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: RPCRT4

FAULTING_MODULE: 0000000000000000

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xEF

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-29-2019 00:16:19.0408

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80337acae89 to fffff803373c14e0

STACK_TEXT: 
ffffaa83`c93c8938 fffff803`37acae89 : 00000000`000000ef ffff870a`9a7d70c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffaa83`c93c8940 fffff803`379c75c1 : ffff870a`9a7d70c0 fffff803`3729c769 ffff870a`9a7d70c0 fffff803`3729c8c0 : nt!PspCatchCriticalBreak+0x115
ffffaa83`c93c89e0 fffff803`37839fc0 : ffff870a`00000000 00000000`00000000 ffff870a`9a7d70c0 ffff870a`9a7d70c0 : nt!PspTerminateAllThreads+0x175e3d
ffffaa83`c93c8a50 fffff803`37839da9 : ffffffff`ffffffff ffffaa83`c93c8b80 ffff870a`9a7d70c0 fffff803`37554301 : nt!PspTerminateProcess+0xe0
ffffaa83`c93c8a90 fffff803`373d3251 : 00000000`0000040c ffff870a`98a82080 ffff870a`9a7d70c0 00000072`4997fabc : nt!NtTerminateProcess+0xa9
ffffaa83`c93c8b00 00007ff9`423dc644 : 00007ff9`4244fc5f 00007ff9`4247f980 00000072`4997fa80 00000002`00000008 : nt!KiSystemServiceExitPico+0x2bc
00000072`4997db68 00007ff9`4244fc5f : 00007ff9`4247f980 00000072`4997fa80 00000002`00000008 00000072`48a12000 : 0x00007ff9`423dc644
00000072`4997db70 00007ff9`4247f980 : 00000072`4997fa80 00000002`00000008 00000072`48a12000 00000000`00000004 : 0x00007ff9`4244fc5f
00000072`4997db78 00000072`4997fa80 : 00000002`00000008 00000072`48a12000 00000000`00000004 00007ff9`423e3cdd : 0x00007ff9`4247f980
00000072`4997db80 00000002`00000008 : 00000072`48a12000 00000000`00000004 00007ff9`423e3cdd 00007ff9`4247f980 : 0x00000072`4997fa80
00000072`4997db88 00000072`48a12000 : 00000000`00000004 00007ff9`423e3cdd 00007ff9`4247f980 00000000`00000008 : 0x00000002`00000008
00000072`4997db90 00000000`00000004 : 00007ff9`423e3cdd 00007ff9`4247f980 00000000`00000008 00000224`a550eb80 : 0x00000072`48a12000
00000072`4997db98 00007ff9`423e3cdd : 00007ff9`4247f980 00000000`00000008 00000224`a550eb80 00000000`00000004 : 0x4
00000072`4997dba0 00007ff9`4247f980 : 00000000`00000008 00000224`a550eb80 00000000`00000004 00000000`00000000 : 0x00007ff9`423e3cdd
00000072`4997dba8 00000000`00000008 : 00000224`a550eb80 00000000`00000004 00000000`00000000 00000224`a40acd70 : 0x00007ff9`4247f980
00000072`4997dbb0 00000224`a550eb80 : 00000000`00000004 00000000`00000000 00000224`a40acd70 00000000`000341c2 : 0x8
00000072`4997dbb8 00000000`00000004 : 00000000`00000000 00000224`a40acd70 00000000`000341c2 00007ff9`423cc6d6 : 0x00000224`a550eb80
00000072`4997dbc0 00000000`00000000 : 00000224`a40acd70 00000000`000341c2 00007ff9`423cc6d6 00000002`00000054 : 0x4


THREAD_SHA1_HASH_MOD_FUNC:  e8c9407148d94b0ae6496e94a8a56eccd3d66cf5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  2f08762fa8c6781743e24dc56f4dc1cbde2494b0

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_NAME:  MachineOwner

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_98a82080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll

BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_98a82080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll

PRIMARY_PROBLEM_CLASS:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_98a82080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll

TARGET_TIME:  2019-12-22T09:07:00.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3a58

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xef_svchost.exe_bugcheck_critical_process_98a82080_rpcrt4.dll!?ndrpsimpletypehypermarshall@@yaxpeau_midl_stub_message@@peae@z_image_rpcrt4.dll

FAILURE_ID_HASH:  {be33baba-2fb8-d79c-feb1-3613a90e5ea8}

Followup:     MachineOwner
---------
 
Bellek hataları, Memtest86 testi yapmalısın.
Fakat şunu fark ettim belleklerin 3600MHz olmasına rağmen 2666MHz'de çalışıyor.



Kod:
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8012fa16d39, Virtual address for the attempted execute.
Arg2: 890000041b5c8963, PTE contents.
Arg3: ffffdb8d13492650, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffff8012fa16d39

BUGCHECK_P2: 890000041b5c8963

BUGCHECK_P3: ffffdb8d13492650

BUGCHECK_P4: 2

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xFC

PROCESS_NAME:  sppsvc.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-29-2019 00:15:58.0441

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffdb8d13492650 -- (.trap 0xffffdb8d13492650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012fa16d39 rsp=ffffdb8d134927e0 rbp=0000000000002b74
r8=00000000ffffffff  r9=7ffff8012e86d7b8 r10=7ffffffffffffffc
r11=ffffa4fd38000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
clipsp+0x46d39:
fffff801`2fa16d39 004900          add     byte ptr [rcx],cl ds:00000000`00000000=??
Resetting default scope

MISALIGNED_IP:
clipsp+46d39
fffff801`2fa16d39 004900          add     byte ptr [rcx],cl

LAST_CONTROL_TRANSFER:  from fffff8012e654aac to fffff8012e5c14e0

STACK_TEXT:
ffffdb8d`13492368 fffff801`2e654aac : 00000000`000000fc fffff801`2fa16d39 89000004`1b5c8963 ffffdb8d`13492650 : nt!KeBugCheckEx
ffffdb8d`13492370 fffff801`2e40d498 : fffff801`2fa16d39 fffff67b`3d9ec000 00000000`00000000 ffffdb8d`13492650 : nt!MiCheckSystemNxFault+0x1298a0
ffffdb8d`134923b0 fffff801`2e472eef : 00000000`00000000 00000000`00000011 00000000`00000000 fffff801`2fa16d39 : nt!MiSystemFault+0x728
ffffdb8d`134924b0 fffff801`2e5cf520 : 00000000`00000001 00000000`00000040 fffff801`2e86d7b8 ffff930b`e6400000 : nt!MmAccessFault+0x34f
ffffdb8d`13492650 fffff801`2fa16d39 : ffffffff`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!KiPageFault+0x360
ffffdb8d`134927e0 ffffffff`00000000 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000028 : clipsp+0x46d39
ffffdb8d`134927e8 00000000`00000000 : 00000000`00000000 ffffffff`ffffffff 00000000`00000028 00000000`00000000 : 0xffffffff`00000000


THREAD_SHA1_HASH_MOD_FUNC:  43684bef5509cce7df42704dd8956da27ef36a88

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  f4855a222feb919352ddf99a67880088c1af7646

THREAD_SHA1_HASH_MOD:  0dd312e032f8aa180e802b031bf5c6a4d0a848a8

FOLLOWUP_IP:
clipsp+46d39
fffff801`2fa16d39 004900          add     byte ptr [rcx],cl

FAULT_INSTR_CODE:  6e004900

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  clipsp+46d39

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.387

STACK_COMMAND:  .thread ; .cxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED_clipsp.sys

BUCKET_ID:  IP_MISALIGNED_clipsp.sys

PRIMARY_PROBLEM_CLASS:  IP_MISALIGNED_clipsp.sys

TARGET_TIME:  2019-12-27T10:23:07.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  326a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:ip_misaligned_clipsp.sys

FAILURE_ID_HASH:  {86ad9ae3-05b2-5902-4536-abeb88ebfb89}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8001da16d39, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff8001da16d39, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffff8001da16d39

BUGCHECK_P2: 10

BUGCHECK_P3: fffff8001da16d39

BUGCHECK_P4: 2

READ_ADDRESS: fffff8001c9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8001da16d39

FAULTING_IP:
+0
fffff800`1da16d39 ??              ???

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  sppsvc.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-29-2019 00:16:02.0113

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffad8af45b1650 -- (.trap 0xffffad8af45b1650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001da16d39 rsp=ffffad8af45b17e0 rbp=0000000000001f58
r8=00000000ffffffff  r9=7ffff8001c86d7b8 r10=7ffffffffffffffc
r11=ffff787c88e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
fffff800`1da16d39 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8001c5e35d6 to fffff8001c5c14e0

FAILED_INSTRUCTION_ADDRESS:
+0
fffff800`1da16d39 ??              ???

STACK_TEXT:
ffffad8a`f45b13a8 fffff800`1c5e35d6 : 00000000`00000050 fffff800`1da16d39 00000000`00000010 ffffad8a`f45b1650 : nt!KeBugCheckEx
ffffad8a`f45b13b0 fffff800`1c472eef : 00000000`00000000 00000000`00000010 00000000`00000000 fffff800`1da16d39 : nt!MiSystemFault+0x1d6866
ffffad8a`f45b14b0 fffff800`1c5cf520 : 00000000`00000000 ffffad8a`f45b1750 fffff800`1c86d7b8 ffffe488`00000000 : nt!MmAccessFault+0x34f
ffffad8a`f45b1650 fffff800`1da16d39 : ffffffff`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!KiPageFault+0x360
ffffad8a`f45b17e0 ffffffff`00000000 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff ffffc132`d91b27dc : 0xfffff800`1da16d39
ffffad8a`f45b17e8 00000000`00000000 : 00000000`00000000 ffffffff`ffffffff ffffc132`d91b27dc 01000000`00100000 : 0xffffffff`00000000


THREAD_SHA1_HASH_MOD_FUNC:  35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c0efb11bdbdabbfe638cd9930c42dad821618e02

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff800`1c5e35d6 cc              int     3

FAULT_INSTR_CODE:  4d8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiSystemFault+1d6866

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  1d6866

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

PRIMARY_PROBLEM_CLASS:  AV_INVALID_BAD_IP_nt!MiSystemFault

TARGET_TIME:  2019-12-27T09:25:08.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3c1d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_invalid_bad_ip_nt!misystemfault

FAILURE_ID_HASH:  {48ad9531-e3f8-1044-fc5f-d917677674c7}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80751a16d39, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff80751a16d39, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffff80751a16d39

BUGCHECK_P2: 10

BUGCHECK_P3: fffff80751a16d39

BUGCHECK_P4: 2

READ_ADDRESS: fffff807509733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80751a16d39

FAULTING_IP:
+0
fffff807`51a16d39 ??              ???

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  sppsvc.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-29-2019 00:16:07.0278

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff89853d0a7650 -- (.trap 0xffff89853d0a7650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80751a16d39 rsp=ffff89853d0a77e0 rbp=0000000000002f60
r8=00000000ffffffff  r9=7ffff8075086d7b8 r10=7ffffffffffffffc
r11=ffff7d7afbe00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
fffff807`51a16d39 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff807505e35d6 to fffff807505c14e0

FAILED_INSTRUCTION_ADDRESS:
+0
fffff807`51a16d39 ??              ???

STACK_TEXT:
ffff8985`3d0a73a8 fffff807`505e35d6 : 00000000`00000050 fffff807`51a16d39 00000000`00000010 ffff8985`3d0a7650 : nt!KeBugCheckEx
ffff8985`3d0a73b0 fffff807`50472eef : 00000000`00000000 00000000`00000010 00000000`00000000 fffff807`51a16d39 : nt!MiSystemFault+0x1d6866
ffff8985`3d0a74b0 fffff807`505cf520 : 00000000`00000000 ffff8985`3d0a7750 fffff807`5086d7b8 ffffb28c`00000000 : nt!MmAccessFault+0x34f
ffff8985`3d0a7650 fffff807`51a16d39 : ffffffff`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!KiPageFault+0x360
ffff8985`3d0a77e0 ffffffff`00000000 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff ffff7362`fac3bae3 : 0xfffff807`51a16d39
ffff8985`3d0a77e8 00000000`00000000 : 00000000`00000000 ffffffff`ffffffff ffff7362`fac3bae3 01000000`00100000 : 0xffffffff`00000000


THREAD_SHA1_HASH_MOD_FUNC:  35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c0efb11bdbdabbfe638cd9930c42dad821618e02

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff807`505e35d6 cc              int     3

FAULT_INSTR_CODE:  4d8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiSystemFault+1d6866

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  1d6866

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

PRIMARY_PROBLEM_CLASS:  AV_INVALID_BAD_IP_nt!MiSystemFault

TARGET_TIME:  2019-12-27T09:24:04.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3c5a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_invalid_bad_ip_nt!misystemfault

FAILURE_ID_HASH:  {48ad9531-e3f8-1044-fc5f-d917677674c7}

Followup:     MachineOwner
---------

PROCESS_HAS_LOCKED_PAGES (76)
Caused by a driver not cleaning up correctly after an I/O.
Arguments:
Arg1: 0000000000000000, Locked memory pages found in process being terminated.
Arg2: ffffe404323394c0, Process address.
Arg3: 0000000000000010, Number of locked pages.
Arg4: 0000000000000000, Pointer to driver stacks (if enabled) or 0 if not.
    Issue a !search over all of physical memory for the current process pointer.
    This will yield at least one MDL which points to it.  Then do another !search
    for each MDL found, this will yield the IRP(s) that point to it, revealing
    which driver is leaking the pages.
    Otherwise, set HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory
    Management\TrackLockedPages to a DWORD 1 value and reboot.  Then the system
    will save stack traces so the guilty driver can be easily identified.
    When you enable this flag, if the driver commits the error again you will
    see a different bugcheck - DRIVER_LEFT_LOCKED_PAGES_IN_PROCESS (0xCB) -
    which can identify the offending driver(s).

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

BUGCHECK_P1: 0

BUGCHECK_P2: ffffe404323394c0

BUGCHECK_P3: 10

BUGCHECK_P4: 0

PROCESS_NAME:  sppsvc.exe

DEFAULT_BUCKET_ID:  DRIVER_FAULT_0x76

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x76

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-29-2019 00:16:10.0879

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8036d1ce1ef to fffff8036cbc14e0

STACK_TEXT:
ffffb901`2d9ab6b8 fffff803`6d1ce1ef : 00000000`00000076 00000000`00000000 ffffe404`323394c0 00000000`00000010 : nt!KeBugCheckEx
ffffb901`2d9ab6c0 fffff803`6d0670fe : ffffe404`323394c0 ffffe404`323397a0 ffffe404`2e822080 ffffe404`323397b0 : nt!MmDeleteProcessAddressSpace+0x16627b
ffffb901`2d9ab710 fffff803`6cffa0e0 : ffffe404`323397a0 ffffe404`32339490 ffffe404`323397a0 00000000`00000000 : nt!PspProcessDelete+0x13e
ffffb901`2d9ab7a0 fffff803`6ca3a9a9 : 00000000`00000000 00000000`00000000 ffffe404`323397a0 ffffe404`323394c0 : nt!ObpRemoveObjectRoutine+0x80
ffffb901`2d9ab800 fffff803`6d060750 : 00000000`00000000 ffffe404`27714738 ffffe404`27714738 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc9
ffffb901`2d9ab840 fffff803`6cffa0e0 : ffffb901`2d9aba39 ffffe404`27714050 ffffb901`2d9aba39 ffffe404`1feec2c0 : nt!PspThreadDelete+0x340
ffffb901`2d9ab8b0 fffff803`6ca3a9a9 : 00000000`00000000 00000000`00000000 ffffb901`2d9aba39 ffffe404`27714080 : nt!ObpRemoveObjectRoutine+0x80
ffffb901`2d9ab910 fffff803`6cfec457 : 00000000`00000000 ffffe404`27714050 ffffe404`27714050 ffffbe02`06542f40 : nt!ObfDereferenceObjectWithTag+0xc9
ffffb901`2d9ab950 fffff803`6cff174e : 00000000`0000020c ffff6357`046fcefc 00000000`00000000 fffff803`6cbd322c : nt!ObCloseHandleTableEntry+0x2c7
ffffb901`2d9aba90 fffff803`6cbd3251 : ffffe404`2e822080 0000024a`5ab50000 ffffb901`2d9abb80 ffffe404`39a4c4c0 : nt!NtClose+0xde
ffffb901`2d9abb00 00007fff`9449c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000008e`5267f1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`9449c2a4


THREAD_SHA1_HASH_MOD_FUNC:  2e812dfe1bb3883903d609a77a8c74115c200eeb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  203f80f14510335b9a0a0cabb168245b177cf677

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!MmDeleteProcessAddressSpace+16627b
fffff803`6d1ce1ef cc              int     3

FAULT_INSTR_CODE:  f38b48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MmDeleteProcessAddressSpace+16627b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  16627b

FAILURE_BUCKET_ID:  0x76_sppsvc.exe_nt!MmDeleteProcessAddressSpace

BUCKET_ID:  0x76_sppsvc.exe_nt!MmDeleteProcessAddressSpace

PRIMARY_PROBLEM_CLASS:  0x76_sppsvc.exe_nt!MmDeleteProcessAddressSpace

TARGET_TIME:  2019-12-23T09:32:06.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  342c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x76_sppsvc.exe_nt!mmdeleteprocessaddressspace

FAILURE_ID_HASH:  {c1d3d845-feee-7285-2e5a-0bc9b3644feb}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffff870a9a7d70c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffff870a9a7d70c0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

EXCEPTION_CODE: (NTSTATUS) 0x98a82080 - <Unable to get error code text>

ERROR_CODE: (NTSTATUS) 0x98a82080 - <Unable to get error code text>

CRITICAL_PROCESS_REPORTGUID:  {09c19f5e-c480-47bc-ad01-5504d72df400}

IMAGE_NAME:  RPCRT4.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: RPCRT4

FAULTING_MODULE: 0000000000000000

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xEF

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-29-2019 00:16:19.0408

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80337acae89 to fffff803373c14e0

STACK_TEXT:
ffffaa83`c93c8938 fffff803`37acae89 : 00000000`000000ef ffff870a`9a7d70c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffaa83`c93c8940 fffff803`379c75c1 : ffff870a`9a7d70c0 fffff803`3729c769 ffff870a`9a7d70c0 fffff803`3729c8c0 : nt!PspCatchCriticalBreak+0x115
ffffaa83`c93c89e0 fffff803`37839fc0 : ffff870a`00000000 00000000`00000000 ffff870a`9a7d70c0 ffff870a`9a7d70c0 : nt!PspTerminateAllThreads+0x175e3d
ffffaa83`c93c8a50 fffff803`37839da9 : ffffffff`ffffffff ffffaa83`c93c8b80 ffff870a`9a7d70c0 fffff803`37554301 : nt!PspTerminateProcess+0xe0
ffffaa83`c93c8a90 fffff803`373d3251 : 00000000`0000040c ffff870a`98a82080 ffff870a`9a7d70c0 00000072`4997fabc : nt!NtTerminateProcess+0xa9
ffffaa83`c93c8b00 00007ff9`423dc644 : 00007ff9`4244fc5f 00007ff9`4247f980 00000072`4997fa80 00000002`00000008 : nt!KiSystemServiceExitPico+0x2bc
00000072`4997db68 00007ff9`4244fc5f : 00007ff9`4247f980 00000072`4997fa80 00000002`00000008 00000072`48a12000 : 0x00007ff9`423dc644
00000072`4997db70 00007ff9`4247f980 : 00000072`4997fa80 00000002`00000008 00000072`48a12000 00000000`00000004 : 0x00007ff9`4244fc5f
00000072`4997db78 00000072`4997fa80 : 00000002`00000008 00000072`48a12000 00000000`00000004 00007ff9`423e3cdd : 0x00007ff9`4247f980
00000072`4997db80 00000002`00000008 : 00000072`48a12000 00000000`00000004 00007ff9`423e3cdd 00007ff9`4247f980 : 0x00000072`4997fa80
00000072`4997db88 00000072`48a12000 : 00000000`00000004 00007ff9`423e3cdd 00007ff9`4247f980 00000000`00000008 : 0x00000002`00000008
00000072`4997db90 00000000`00000004 : 00007ff9`423e3cdd 00007ff9`4247f980 00000000`00000008 00000224`a550eb80 : 0x00000072`48a12000
00000072`4997db98 00007ff9`423e3cdd : 00007ff9`4247f980 00000000`00000008 00000224`a550eb80 00000000`00000004 : 0x4
00000072`4997dba0 00007ff9`4247f980 : 00000000`00000008 00000224`a550eb80 00000000`00000004 00000000`00000000 : 0x00007ff9`423e3cdd
00000072`4997dba8 00000000`00000008 : 00000224`a550eb80 00000000`00000004 00000000`00000000 00000224`a40acd70 : 0x00007ff9`4247f980
00000072`4997dbb0 00000224`a550eb80 : 00000000`00000004 00000000`00000000 00000224`a40acd70 00000000`000341c2 : 0x8
00000072`4997dbb8 00000000`00000004 : 00000000`00000000 00000224`a40acd70 00000000`000341c2 00007ff9`423cc6d6 : 0x00000224`a550eb80
00000072`4997dbc0 00000000`00000000 : 00000224`a40acd70 00000000`000341c2 00007ff9`423cc6d6 00000002`00000054 : 0x4


THREAD_SHA1_HASH_MOD_FUNC:  e8c9407148d94b0ae6496e94a8a56eccd3d66cf5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  2f08762fa8c6781743e24dc56f4dc1cbde2494b0

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_NAME:  MachineOwner

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_98a82080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll

BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_98a82080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll

PRIMARY_PROBLEM_CLASS:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_98a82080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll

TARGET_TIME:  2019-12-22T09:07:00.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3a58

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xef_svchost.exe_bugcheck_critical_process_98a82080_rpcrt4.dll!?ndrpsimpletypehypermarshall@@yaxpeau_midl_stub_message@@peae@z_image_rpcrt4.dll

FAILURE_ID_HASH:  {be33baba-2fb8-d79c-feb1-3613a90e5ea8}

Followup:     MachineOwner
---------

BIOS güncellemesini yeni yaptım sayılır aslında ondan önce 3600 MHz değeri seçiliydi. Şu anda Auto şekilde öyle ayarlanmış tekrar 3600 MHz seviyesine mi yükseltmeliyim yoksa 3400 gibi bir alt değerine mi çekmeliyim?
 
Son düzenleyen: Moderatör:
Selamlar,

Daha önce farklı hata kodları ile alakalı mavi ekran hatası alıyordum. Ancak şuanda ilk defa rastladığım 2 farklı hata kodlu mavi ekran hatası aldım.

Minidump

Yardımcı olursanız çok sevinirim.

Teşekkürler.
 
Memtest86 testi yapar mısın?
Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80011839114, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 0000000000ffffd0, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80011839114

BUGCHECK_P3: 1

BUGCHECK_P4: ffffd0

WRITE_ADDRESS: fffff80011d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000ffffd0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObfReferenceObject+24
fffff800`11839114 f0480fc15ed0    lock xadd qword ptr [rsi-30h],rbx

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  0000000000ffffd0

BUGCHECK_STR:  0x1E_c0000005_W

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  sppsvc.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-09-2020 19:17:32.0407

ANALYSIS_VERSION: 10.0.18362.1 x86fre

EXCEPTION_RECORD:  ffff8341a0d06000 -- (.exr 0xffff8341a0d06000)
ExceptionAddress: 0000000000000000
   ExceptionCode: 961aa867
  ExceptionFlags: 0a000000
NumberParameters: 0

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

LAST_CONTROL_TRANSFER:  from fffff80011a2fda7 to fffff800119c14e0

STACK_TEXT: 
ffffbb8b`1dc3c9e8 fffff800`11a2fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`11839114 00000000`00000001 : nt!KeBugCheckEx
ffffbb8b`1dc3c9f0 fffff800`119d341d : ffff8341`a0d06000 ffffbb8b`1dc3d280 ffff8000`00000000 00000000`00ffffd0 : nt!KiDispatchException+0x1689d7
ffffbb8b`1dc3d0a0 fffff800`119cf605 : ffff9b04`937bd520 ffffbb8b`1dc3d6b0 00000000`00000000 fffff800`12dc3592 : nt!KiExceptionDispatch+0x11d
ffffbb8b`1dc3d280 fffff800`11839114 : ffffbb8b`1dc3d568 00000000`00000000 ffffe68b`18047e70 fffff800`11837530 : nt!KiPageFault+0x445
ffffbb8b`1dc3d410 fffff800`11e55474 : 00000000`01000000 00000000`00000000 ffffbb8b`1dc3d740 ffffe68b`2fcb24c8 : nt!ObfReferenceObject+0x24
ffffbb8b`1dc3d450 fffff800`11e5505b : 00000000`01000000 fffff800`11dee02f 00000000`db67ee9a 00000000`00000000 : nt!CmpTransReferenceTransaction+0x1c
ffffbb8b`1dc3d480 fffff800`11e8d454 : ffff9b04`8f937360 00000000`01000000 ffffbb8b`1dc3d660 ffffbb8b`1dc3de00 : nt!CmpTransSearchAddTrans+0x37
ffffbb8b`1dc3d4e0 fffff800`11e8d2a8 : ffffe68b`18747400 fffff800`11dbef95 ffffbb8b`1dc3de00 00000000`00000000 : nt!CmpTransSearchAddTransFromRm+0x50
ffffbb8b`1dc3d520 fffff800`11df20bf : 00000000`01000000 ffffbb8b`00000004 ffffbb8b`00000004 ffffbb8b`1dc3d700 : nt!CmpTransSearchAddTransFromHive+0x44
ffffbb8b`1dc3d560 fffff800`11def2d4 : ffffbb8b`0000001c ffffbb8b`1dc3d8b0 ffffbb8b`1dc3d878 00000000`00000000 : nt!CmpDoParseKey+0x84f
ffffbb8b`1dc3d800 fffff800`11ded1bf : ffff9b04`937bd520 ffffe68b`18011001 ffffbb8b`00000000 00000000`00000000 : nt!CmpParseKey+0x274
ffffbb8b`1dc3da20 fffff800`11deb621 : ffff9b04`937bd500 ffffbb8b`1dc3dc68 00000000`00000240 ffff9b04`7e525e80 : nt!ObpLookupObjectName+0x78f
ffffbb8b`1dc3dbe0 fffff800`11df4b3c : 00000000`00000001 00000000`00000000 00000000`00000000 ffff9b04`7e525e80 : nt!ObOpenObjectByNameEx+0x201
ffffbb8b`1dc3dd20 fffff800`11df49bd : ffffbb8b`1dc3e250 ffffbb8b`1dc3e090 00000000`00000000 fffff800`11e253c4 : nt!ObOpenObjectByName+0x5c
ffffbb8b`1dc3dd70 fffff800`11ebbcd2 : 00000000`00001d83 00000000`00000400 00000000`8000001a 00000000`00000030 : nt!CmOpenKey+0x29d
ffffbb8b`1dc3dfd0 fffff800`119d2d18 : fffff800`11761e70 ffff9b04`92f029c0 ffffbb8b`1dc3e090 fffff800`142417c3 : nt!NtOpenKey+0x12
ffffbb8b`1dc3e010 fffff800`119c5320 : fffff800`11f31366 00000000`00000000 ffffe68b`34458f70 000000b0`d9ba92c7 : nt!KiSystemServiceCopyEnd+0x28
ffffbb8b`1dc3e1a8 fffff800`11f31366 : 00000000`00000000 ffffe68b`34458f70 000000b0`d9ba92c7 fffff800`11831f79 : nt!KiServiceLinkage
ffffbb8b`1dc3e1b0 fffff800`119d2d18 : ffff9b04`8f937040 ffff9b04`8f937040 00000000`00000000 00000000`00000000 : nt!NtLockProductActivationKeys+0x336
ffffbb8b`1dc3eb00 00007ffe`83dfe174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000046`ec3fe188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`83dfe174


THREAD_SHA1_HASH_MOD_FUNC:  530d6de6648f9c0bf47d87c19297f4d5bd92f7d6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  bd332fd860f8e2d5251e5c61c4deff8d80a6ce6a

THREAD_SHA1_HASH_MOD:  65e960981daf68eaa3f111ef44aadfdc4bfefe1e

FOLLOWUP_IP:
nt!KiDispatchException+1689d7
fffff800`11a2fda7 cc              int     3

FAULT_INSTR_CODE:  86f741cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiDispatchException+1689d7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1689d7

FAILURE_BUCKET_ID:  0x1E_c0000005_W_nt!KiDispatchException

BUCKET_ID:  0x1E_c0000005_W_nt!KiDispatchException

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_W_nt!KiDispatchException

TARGET_TIME:  2020-01-08T21:12:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5e54

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_w_nt!kidispatchexception

FAILURE_ID_HASH:  {a68f7226-463e-440d-5496-7118eb986eaf}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff284c18b5990, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000008b, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8006ee2270b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffff284c18b5990

BUGCHECK_P2: ff

BUGCHECK_P3: 8b

BUGCHECK_P4: fffff8006ee2270b

WRITE_ADDRESS: fffff8006f3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 fffff284c18b5990

CURRENT_IRQL:  0

FAULTING_IP:
nt!PpmIdlePrepare+31b
fffff800`6ee2270b 48897d80        mov     qword ptr [rbp-80h],rdi

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-09-2020 19:17:35.0893

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff284c08b5780 -- (.trap 0xfffff284c08b5780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000000b
rdx=0000009d6cca4262 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8006ee2270b rsp=fffff284c08b5910 rbp=fffff284c18b5a10
 r8=0000000000000000  r9=ffff860075e79180 r10=0000009d6dce19b4
r11=ffff75fad5c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz ac pe cy
nt!PpmIdlePrepare+0x31b:
fffff800`6ee2270b 48897d80        mov     qword ptr [rbp-80h],rdi ss:0018:fffff284`c18b5990=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8006efd32e9 to fffff8006efc14e0

STACK_TEXT: 
fffff284`c08b5638 fffff800`6efd32e9 : 00000000`0000000a fffff284`c18b5990 00000000`000000ff 00000000`0000008b : nt!KeBugCheckEx
fffff284`c08b5640 fffff800`6efcf62b : 00000000`00000000 00000000`00000000 00000000`00420760 fffff800`6f0f024b : nt!KiBugCheckDispatch+0x69
fffff284`c08b5780 fffff800`6ee2270b : 0000009d`6cca49e5 00000000`00989680 fffff284`c08b5a10 ffff8600`75e79180 : nt!KiPageFault+0x46b
fffff284`c08b5910 fffff800`6ee21446 : 00000000`00000003 00000000`00000002 ffff9c07`d3fc0100 00000000`00000008 : nt!PpmIdlePrepare+0x31b
fffff284`c08b5b00 fffff800`6efc4fe8 : ffffffff`00000000 ffff8600`75e79180 ffff9c07`dc91d540 00000000`0000023a : nt!PoIdle+0x1e6
fffff284`c08b5c60 00000000`00000000 : fffff284`c08b6000 fffff284`c08b0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  bac30f8031bbad40506eeaabc9b982d6623c8637

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  06372c5c8e03168aff9eb00044cd61dcaa3f5946

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!PpmIdlePrepare+31b
fffff800`6ee2270b 48897d80        mov     qword ptr [rbp-80h],rdi

FAULT_INSTR_CODE:  807d8948

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PpmIdlePrepare+31b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  31b

FAILURE_BUCKET_ID:  AV_CODE_AV_nt!PpmIdlePrepare

BUCKET_ID:  AV_CODE_AV_nt!PpmIdlePrepare

PRIMARY_PROBLEM_CLASS:  AV_CODE_AV_nt!PpmIdlePrepare

TARGET_TIME:  2020-01-09T16:00:16.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3437

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_code_av_nt!ppmidleprepare

FAILURE_ID_HASH:  {0722116b-c23b-c6c2-0c96-05693152d11a}

Followup:     MachineOwner
---------
 
Memtest86 testi yapar mısın?
Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80011839114, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 0000000000ffffd0, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80011839114

BUGCHECK_P3: 1

BUGCHECK_P4: ffffd0

WRITE_ADDRESS: fffff80011d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000ffffd0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObfReferenceObject+24
fffff800`11839114 f0480fc15ed0    lock xadd qword ptr [rsi-30h],rbx

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  0000000000ffffd0

BUGCHECK_STR:  0x1E_c0000005_W

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  sppsvc.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-09-2020 19:17:32.0407

ANALYSIS_VERSION: 10.0.18362.1 x86fre

EXCEPTION_RECORD:  ffff8341a0d06000 -- (.exr 0xffff8341a0d06000)
ExceptionAddress: 0000000000000000
   ExceptionCode: 961aa867
  ExceptionFlags: 0a000000
NumberParameters: 0

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

LAST_CONTROL_TRANSFER:  from fffff80011a2fda7 to fffff800119c14e0

STACK_TEXT:
ffffbb8b`1dc3c9e8 fffff800`11a2fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`11839114 00000000`00000001 : nt!KeBugCheckEx
ffffbb8b`1dc3c9f0 fffff800`119d341d : ffff8341`a0d06000 ffffbb8b`1dc3d280 ffff8000`00000000 00000000`00ffffd0 : nt!KiDispatchException+0x1689d7
ffffbb8b`1dc3d0a0 fffff800`119cf605 : ffff9b04`937bd520 ffffbb8b`1dc3d6b0 00000000`00000000 fffff800`12dc3592 : nt!KiExceptionDispatch+0x11d
ffffbb8b`1dc3d280 fffff800`11839114 : ffffbb8b`1dc3d568 00000000`00000000 ffffe68b`18047e70 fffff800`11837530 : nt!KiPageFault+0x445
ffffbb8b`1dc3d410 fffff800`11e55474 : 00000000`01000000 00000000`00000000 ffffbb8b`1dc3d740 ffffe68b`2fcb24c8 : nt!ObfReferenceObject+0x24
ffffbb8b`1dc3d450 fffff800`11e5505b : 00000000`01000000 fffff800`11dee02f 00000000`db67ee9a 00000000`00000000 : nt!CmpTransReferenceTransaction+0x1c
ffffbb8b`1dc3d480 fffff800`11e8d454 : ffff9b04`8f937360 00000000`01000000 ffffbb8b`1dc3d660 ffffbb8b`1dc3de00 : nt!CmpTransSearchAddTrans+0x37
ffffbb8b`1dc3d4e0 fffff800`11e8d2a8 : ffffe68b`18747400 fffff800`11dbef95 ffffbb8b`1dc3de00 00000000`00000000 : nt!CmpTransSearchAddTransFromRm+0x50
ffffbb8b`1dc3d520 fffff800`11df20bf : 00000000`01000000 ffffbb8b`00000004 ffffbb8b`00000004 ffffbb8b`1dc3d700 : nt!CmpTransSearchAddTransFromHive+0x44
ffffbb8b`1dc3d560 fffff800`11def2d4 : ffffbb8b`0000001c ffffbb8b`1dc3d8b0 ffffbb8b`1dc3d878 00000000`00000000 : nt!CmpDoParseKey+0x84f
ffffbb8b`1dc3d800 fffff800`11ded1bf : ffff9b04`937bd520 ffffe68b`18011001 ffffbb8b`00000000 00000000`00000000 : nt!CmpParseKey+0x274
ffffbb8b`1dc3da20 fffff800`11deb621 : ffff9b04`937bd500 ffffbb8b`1dc3dc68 00000000`00000240 ffff9b04`7e525e80 : nt!ObpLookupObjectName+0x78f
ffffbb8b`1dc3dbe0 fffff800`11df4b3c : 00000000`00000001 00000000`00000000 00000000`00000000 ffff9b04`7e525e80 : nt!ObOpenObjectByNameEx+0x201
ffffbb8b`1dc3dd20 fffff800`11df49bd : ffffbb8b`1dc3e250 ffffbb8b`1dc3e090 00000000`00000000 fffff800`11e253c4 : nt!ObOpenObjectByName+0x5c
ffffbb8b`1dc3dd70 fffff800`11ebbcd2 : 00000000`00001d83 00000000`00000400 00000000`8000001a 00000000`00000030 : nt!CmOpenKey+0x29d
ffffbb8b`1dc3dfd0 fffff800`119d2d18 : fffff800`11761e70 ffff9b04`92f029c0 ffffbb8b`1dc3e090 fffff800`142417c3 : nt!NtOpenKey+0x12
ffffbb8b`1dc3e010 fffff800`119c5320 : fffff800`11f31366 00000000`00000000 ffffe68b`34458f70 000000b0`d9ba92c7 : nt!KiSystemServiceCopyEnd+0x28
ffffbb8b`1dc3e1a8 fffff800`11f31366 : 00000000`00000000 ffffe68b`34458f70 000000b0`d9ba92c7 fffff800`11831f79 : nt!KiServiceLinkage
ffffbb8b`1dc3e1b0 fffff800`119d2d18 : ffff9b04`8f937040 ffff9b04`8f937040 00000000`00000000 00000000`00000000 : nt!NtLockProductActivationKeys+0x336
ffffbb8b`1dc3eb00 00007ffe`83dfe174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000046`ec3fe188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`83dfe174


THREAD_SHA1_HASH_MOD_FUNC:  530d6de6648f9c0bf47d87c19297f4d5bd92f7d6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  bd332fd860f8e2d5251e5c61c4deff8d80a6ce6a

THREAD_SHA1_HASH_MOD:  65e960981daf68eaa3f111ef44aadfdc4bfefe1e

FOLLOWUP_IP:
nt!KiDispatchException+1689d7
fffff800`11a2fda7 cc              int     3

FAULT_INSTR_CODE:  86f741cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiDispatchException+1689d7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1689d7

FAILURE_BUCKET_ID:  0x1E_c0000005_W_nt!KiDispatchException

BUCKET_ID:  0x1E_c0000005_W_nt!KiDispatchException

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_W_nt!KiDispatchException

TARGET_TIME:  2020-01-08T21:12:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5e54

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_w_nt!kidispatchexception

FAILURE_ID_HASH:  {a68f7226-463e-440d-5496-7118eb986eaf}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff284c18b5990, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000008b, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8006ee2270b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffff284c18b5990

BUGCHECK_P2: ff

BUGCHECK_P3: 8b

BUGCHECK_P4: fffff8006ee2270b

WRITE_ADDRESS: fffff8006f3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff284c18b5990

CURRENT_IRQL:  0

FAULTING_IP:
nt!PpmIdlePrepare+31b
fffff800`6ee2270b 48897d80        mov     qword ptr [rbp-80h],rdi

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-09-2020 19:17:35.0893

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff284c08b5780 -- (.trap 0xfffff284c08b5780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000000b
rdx=0000009d6cca4262 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8006ee2270b rsp=fffff284c08b5910 rbp=fffff284c18b5a10
r8=0000000000000000  r9=ffff860075e79180 r10=0000009d6dce19b4
r11=ffff75fad5c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz ac pe cy
nt!PpmIdlePrepare+0x31b:
fffff800`6ee2270b 48897d80        mov     qword ptr [rbp-80h],rdi ss:0018:fffff284`c18b5990=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8006efd32e9 to fffff8006efc14e0

STACK_TEXT:
fffff284`c08b5638 fffff800`6efd32e9 : 00000000`0000000a fffff284`c18b5990 00000000`000000ff 00000000`0000008b : nt!KeBugCheckEx
fffff284`c08b5640 fffff800`6efcf62b : 00000000`00000000 00000000`00000000 00000000`00420760 fffff800`6f0f024b : nt!KiBugCheckDispatch+0x69
fffff284`c08b5780 fffff800`6ee2270b : 0000009d`6cca49e5 00000000`00989680 fffff284`c08b5a10 ffff8600`75e79180 : nt!KiPageFault+0x46b
fffff284`c08b5910 fffff800`6ee21446 : 00000000`00000003 00000000`00000002 ffff9c07`d3fc0100 00000000`00000008 : nt!PpmIdlePrepare+0x31b
fffff284`c08b5b00 fffff800`6efc4fe8 : ffffffff`00000000 ffff8600`75e79180 ffff9c07`dc91d540 00000000`0000023a : nt!PoIdle+0x1e6
fffff284`c08b5c60 00000000`00000000 : fffff284`c08b6000 fffff284`c08b0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  bac30f8031bbad40506eeaabc9b982d6623c8637

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  06372c5c8e03168aff9eb00044cd61dcaa3f5946

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!PpmIdlePrepare+31b
fffff800`6ee2270b 48897d80        mov     qword ptr [rbp-80h],rdi

FAULT_INSTR_CODE:  807d8948

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PpmIdlePrepare+31b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  31b

FAILURE_BUCKET_ID:  AV_CODE_AV_nt!PpmIdlePrepare

BUCKET_ID:  AV_CODE_AV_nt!PpmIdlePrepare

PRIMARY_PROBLEM_CLASS:  AV_CODE_AV_nt!PpmIdlePrepare

TARGET_TIME:  2020-01-09T16:00:16.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3437

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_code_av_nt!ppmidleprepare

FAILURE_ID_HASH:  {0722116b-c23b-c6c2-0c96-05693152d11a}

Followup:     MachineOwner
---------

Daha önce 2 kere yapmıştım oldukça uzunda sürüyordu, ikisinde de 0 hata çıkmıştı.

Corsair CMW16GX4m2Z3600c18 Vengeance RGB Pro 16 GB DDR4 3600MHz
MSI B450M Mortar Max 4133MHz(OC) DDR4 Soket AM4 M.2 HDMI DP mATX Anakart

Kullanıyorum BIOS sürümü en güncel sürüm bulunuyor. RAM değerini manuel 3600 MHz OC ediyordum mavi ekran hatası yine oluyordu. OC kapalıyken 2666 MHz'de çalışırken yine mavi ekran veriyordu şu anda XMP açık yine vermiş oldu ama uzun süredir vermiyordu. Firefox'ta siteleri gezerken bu sefer mavi ekran verdi oyunda da vermedi. Daha başka ne yapabilirim bilmiyorum.
Memtest86 testi yapar mısın?
Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80011839114, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 0000000000ffffd0, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80011839114

BUGCHECK_P3: 1

BUGCHECK_P4: ffffd0

WRITE_ADDRESS: fffff80011d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000ffffd0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObfReferenceObject+24
fffff800`11839114 f0480fc15ed0    lock xadd qword ptr [rsi-30h],rbx

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  0000000000ffffd0

BUGCHECK_STR:  0x1E_c0000005_W

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  sppsvc.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-09-2020 19:17:32.0407

ANALYSIS_VERSION: 10.0.18362.1 x86fre

EXCEPTION_RECORD:  ffff8341a0d06000 -- (.exr 0xffff8341a0d06000)
ExceptionAddress: 0000000000000000
   ExceptionCode: 961aa867
  ExceptionFlags: 0a000000
NumberParameters: 0

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

LAST_CONTROL_TRANSFER:  from fffff80011a2fda7 to fffff800119c14e0

STACK_TEXT:
ffffbb8b`1dc3c9e8 fffff800`11a2fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`11839114 00000000`00000001 : nt!KeBugCheckEx
ffffbb8b`1dc3c9f0 fffff800`119d341d : ffff8341`a0d06000 ffffbb8b`1dc3d280 ffff8000`00000000 00000000`00ffffd0 : nt!KiDispatchException+0x1689d7
ffffbb8b`1dc3d0a0 fffff800`119cf605 : ffff9b04`937bd520 ffffbb8b`1dc3d6b0 00000000`00000000 fffff800`12dc3592 : nt!KiExceptionDispatch+0x11d
ffffbb8b`1dc3d280 fffff800`11839114 : ffffbb8b`1dc3d568 00000000`00000000 ffffe68b`18047e70 fffff800`11837530 : nt!KiPageFault+0x445
ffffbb8b`1dc3d410 fffff800`11e55474 : 00000000`01000000 00000000`00000000 ffffbb8b`1dc3d740 ffffe68b`2fcb24c8 : nt!ObfReferenceObject+0x24
ffffbb8b`1dc3d450 fffff800`11e5505b : 00000000`01000000 fffff800`11dee02f 00000000`db67ee9a 00000000`00000000 : nt!CmpTransReferenceTransaction+0x1c
ffffbb8b`1dc3d480 fffff800`11e8d454 : ffff9b04`8f937360 00000000`01000000 ffffbb8b`1dc3d660 ffffbb8b`1dc3de00 : nt!CmpTransSearchAddTrans+0x37
ffffbb8b`1dc3d4e0 fffff800`11e8d2a8 : ffffe68b`18747400 fffff800`11dbef95 ffffbb8b`1dc3de00 00000000`00000000 : nt!CmpTransSearchAddTransFromRm+0x50
ffffbb8b`1dc3d520 fffff800`11df20bf : 00000000`01000000 ffffbb8b`00000004 ffffbb8b`00000004 ffffbb8b`1dc3d700 : nt!CmpTransSearchAddTransFromHive+0x44
ffffbb8b`1dc3d560 fffff800`11def2d4 : ffffbb8b`0000001c ffffbb8b`1dc3d8b0 ffffbb8b`1dc3d878 00000000`00000000 : nt!CmpDoParseKey+0x84f
ffffbb8b`1dc3d800 fffff800`11ded1bf : ffff9b04`937bd520 ffffe68b`18011001 ffffbb8b`00000000 00000000`00000000 : nt!CmpParseKey+0x274
ffffbb8b`1dc3da20 fffff800`11deb621 : ffff9b04`937bd500 ffffbb8b`1dc3dc68 00000000`00000240 ffff9b04`7e525e80 : nt!ObpLookupObjectName+0x78f
ffffbb8b`1dc3dbe0 fffff800`11df4b3c : 00000000`00000001 00000000`00000000 00000000`00000000 ffff9b04`7e525e80 : nt!ObOpenObjectByNameEx+0x201
ffffbb8b`1dc3dd20 fffff800`11df49bd : ffffbb8b`1dc3e250 ffffbb8b`1dc3e090 00000000`00000000 fffff800`11e253c4 : nt!ObOpenObjectByName+0x5c
ffffbb8b`1dc3dd70 fffff800`11ebbcd2 : 00000000`00001d83 00000000`00000400 00000000`8000001a 00000000`00000030 : nt!CmOpenKey+0x29d
ffffbb8b`1dc3dfd0 fffff800`119d2d18 : fffff800`11761e70 ffff9b04`92f029c0 ffffbb8b`1dc3e090 fffff800`142417c3 : nt!NtOpenKey+0x12
ffffbb8b`1dc3e010 fffff800`119c5320 : fffff800`11f31366 00000000`00000000 ffffe68b`34458f70 000000b0`d9ba92c7 : nt!KiSystemServiceCopyEnd+0x28
ffffbb8b`1dc3e1a8 fffff800`11f31366 : 00000000`00000000 ffffe68b`34458f70 000000b0`d9ba92c7 fffff800`11831f79 : nt!KiServiceLinkage
ffffbb8b`1dc3e1b0 fffff800`119d2d18 : ffff9b04`8f937040 ffff9b04`8f937040 00000000`00000000 00000000`00000000 : nt!NtLockProductActivationKeys+0x336
ffffbb8b`1dc3eb00 00007ffe`83dfe174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000046`ec3fe188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`83dfe174


THREAD_SHA1_HASH_MOD_FUNC:  530d6de6648f9c0bf47d87c19297f4d5bd92f7d6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  bd332fd860f8e2d5251e5c61c4deff8d80a6ce6a

THREAD_SHA1_HASH_MOD:  65e960981daf68eaa3f111ef44aadfdc4bfefe1e

FOLLOWUP_IP:
nt!KiDispatchException+1689d7
fffff800`11a2fda7 cc              int     3

FAULT_INSTR_CODE:  86f741cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiDispatchException+1689d7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1689d7

FAILURE_BUCKET_ID:  0x1E_c0000005_W_nt!KiDispatchException

BUCKET_ID:  0x1E_c0000005_W_nt!KiDispatchException

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_W_nt!KiDispatchException

TARGET_TIME:  2020-01-08T21:12:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5e54

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_w_nt!kidispatchexception

FAILURE_ID_HASH:  {a68f7226-463e-440d-5496-7118eb986eaf}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff284c18b5990, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000008b, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8006ee2270b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffff284c18b5990

BUGCHECK_P2: ff

BUGCHECK_P3: 8b

BUGCHECK_P4: fffff8006ee2270b

WRITE_ADDRESS: fffff8006f3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff284c18b5990

CURRENT_IRQL:  0

FAULTING_IP:
nt!PpmIdlePrepare+31b
fffff800`6ee2270b 48897d80        mov     qword ptr [rbp-80h],rdi

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-09-2020 19:17:35.0893

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff284c08b5780 -- (.trap 0xfffff284c08b5780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000000b
rdx=0000009d6cca4262 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8006ee2270b rsp=fffff284c08b5910 rbp=fffff284c18b5a10
r8=0000000000000000  r9=ffff860075e79180 r10=0000009d6dce19b4
r11=ffff75fad5c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz ac pe cy
nt!PpmIdlePrepare+0x31b:
fffff800`6ee2270b 48897d80        mov     qword ptr [rbp-80h],rdi ss:0018:fffff284`c18b5990=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8006efd32e9 to fffff8006efc14e0

STACK_TEXT:
fffff284`c08b5638 fffff800`6efd32e9 : 00000000`0000000a fffff284`c18b5990 00000000`000000ff 00000000`0000008b : nt!KeBugCheckEx
fffff284`c08b5640 fffff800`6efcf62b : 00000000`00000000 00000000`00000000 00000000`00420760 fffff800`6f0f024b : nt!KiBugCheckDispatch+0x69
fffff284`c08b5780 fffff800`6ee2270b : 0000009d`6cca49e5 00000000`00989680 fffff284`c08b5a10 ffff8600`75e79180 : nt!KiPageFault+0x46b
fffff284`c08b5910 fffff800`6ee21446 : 00000000`00000003 00000000`00000002 ffff9c07`d3fc0100 00000000`00000008 : nt!PpmIdlePrepare+0x31b
fffff284`c08b5b00 fffff800`6efc4fe8 : ffffffff`00000000 ffff8600`75e79180 ffff9c07`dc91d540 00000000`0000023a : nt!PoIdle+0x1e6
fffff284`c08b5c60 00000000`00000000 : fffff284`c08b6000 fffff284`c08b0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  bac30f8031bbad40506eeaabc9b982d6623c8637

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  06372c5c8e03168aff9eb00044cd61dcaa3f5946

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!PpmIdlePrepare+31b
fffff800`6ee2270b 48897d80        mov     qword ptr [rbp-80h],rdi

FAULT_INSTR_CODE:  807d8948

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PpmIdlePrepare+31b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  31b

FAILURE_BUCKET_ID:  AV_CODE_AV_nt!PpmIdlePrepare

BUCKET_ID:  AV_CODE_AV_nt!PpmIdlePrepare

PRIMARY_PROBLEM_CLASS:  AV_CODE_AV_nt!PpmIdlePrepare

TARGET_TIME:  2020-01-09T16:00:16.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3437

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_code_av_nt!ppmidleprepare

FAILURE_ID_HASH:  {0722116b-c23b-c6c2-0c96-05693152d11a}

Followup:     MachineOwner
---------

Minidump1

Size yazdıktan hemen sonra yine oldu bu seferde farklı bir hata oldu.
 
Son düzenleyen: Moderatör:
Farklı bir önerim bulunmuyor, ben bellek problemi olduğunu düşünüyorum, belki dosyayı okuyan arkadaşlar farklı bir problem görebilir.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80711c48a56, Address of the instruction which caused the bugcheck
Arg3: ffffc3814e8df930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B89

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M MORTAR MAX (MS-7B89)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80711c48a56

BUGCHECK_P3: ffffc3814e8df930

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!KiExitDispatcher+a6
fffff807`11c48a56 410fb68573010000 movzx   eax,byte ptr [r13+173h]

CONTEXT:  ffffc3814e8df930 -- (.cxr 0xffffc3814e8df930)
rax=0000000000000001 rbx=0000000000000000 rcx=ffffc3814f880180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffc3814f880180
rip=fffff80711c48a56 rsp=ffffbb0f887b8a30 rbp=ffffc3814f880180
 r8=0000000000000001  r9=0000000000000001 r10=0000fffff807122b
r11=ffffb37d73e00000 r12=000001e3bbf1a870 r13=c59ec732c61a2de8
r14=0000000000000001 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!KiExitDispatcher+0xa6:
fffff807`11c48a56 410fb68573010000 movzx   eax,byte ptr [r13+173h] ds:002b:c59ec732`c61a2f5b=??
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-09-2020 20:16:34.0796

ANALYSIS_VERSION: 10.0.18362.1 x86fre

BAD_STACK_POINTER:  ffffc3814e8deff8

LAST_CONTROL_TRANSFER:  from fffff80711d0f521 to fffff80711c48a56

STACK_TEXT: 
ffffbb0f`887b8a30 fffff807`11d0f521 : 00000000`00000000 00000000`00000000 ffffd601`398f3080 ffffc381`4e880180 : nt!KiExitDispatcher+0xa6
ffffbb0f`887b8a90 fffff807`122b8710 : ffffd601`00000000 ffffd601`398f3080 ffffbb0f`887b8b80 000001e3`bbf1a870 : nt!KeAlertThreadByThreadId+0xd5
ffffbb0f`887b8ad0 fffff807`11dd2d18 : ffffd601`3accd080 ffffd601`398f3080 000001e3`bbe00128 ffffd601`3accd080 : nt!NtAlertThreadByThreadId+0x40
ffffbb0f`887b8b00 00007ffb`1375ce94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000e`7d5feb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1375ce94


THREAD_SHA1_HASH_MOD_FUNC:  5cb262de8bc2d601407eb816b9a2274714984a84

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e6a152684433a81b023145ed078f67e61c790448

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!KiExitDispatcher+a6
fffff807`11c48a56 410fb68573010000 movzx   eax,byte ptr [r13+173h]

FAULT_INSTR_CODE:  85b60f41

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiExitDispatcher+a6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .cxr 0xffffc3814e8df930 ; kb

BUCKET_ID_FUNC_OFFSET:  a6

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!KiExitDispatcher

BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!KiExitDispatcher

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_STACKPTR_ERROR_nt!KiExitDispatcher

TARGET_TIME:  2020-01-09T17:00:35.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  227f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_stackptr_error_nt!kiexitdispatcher

FAILURE_ID_HASH:  {b17de1e6-bd6d-bfd4-c86d-2589a114c66d}

Followup:     MachineOwner
---------
 
Son düzenleme:
Silinen üye 294212, lütfen çözüm olarak uygun mesajın önündeki simgesine tıklayarak bir cevabı çözüm olarak işaretlediğinizden emin olun.
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı