Çözüldü KERNEL_SECURITY_CHECK_FAILURE ve benzeri hatalar

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

dejavujojo

Hectopat
Katılım
2 Ekim 2018
Mesajlar
31
Merhaba, bugün 4 kez PC mavi ekran verdi. Minidump dosyalarını ekledim. Sorunun neden kaynaklandığını söyleyebilecek ve yardım edebilecek var mı?

 
Son düzenleyen: Moderatör:
Çözüm
Astrill VPN kaldırmanızı söylemiştim.

Bir sürü çöp yazılım var MSI, ASUS, Ryzen Master, Logitech araçlarını kaldırın.

Hangi cihazı taktığın zaman sorun oluşuyor?

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8020aa14cc5, The address that the exception occurred at
Arg3: fffffe013dbbf198, Exception Record Address
Arg4: fffffe013dbbe9e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2006

BIOS_DATE:  11/13/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME B450M-K

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8020aa14cc5

BUGCHECK_P3: fffffe013dbbf198

BUGCHECK_P4: fffffe013dbbe9e0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!IovpValidateDeviceObject+5
fffff802`0aa14cc5 66833903        cmp     word ptr [rcx],3

EXCEPTION_RECORD:  fffffe013dbbf198 -- (.exr 0xfffffe013dbbf198)
ExceptionAddress: fffff8020aa14cc5 (nt!IovpValidateDeviceObject+0x0000000000000005)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000046dc232
Attempt to read from address 00000000046dc232

CONTEXT:  fffffe013dbbe9e0 -- (.cxr 0xfffffe013dbbe9e0)
rax=ffffa28fa3bc0e10 rbx=ffffa28fa3bc0e10 rcx=00000000046dc232
rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffa28fa0a70b90
rip=fffff8020aa14cc5 rsp=fffffe013dbbf3d8 rbp=fffff8020a22e76a
r8=0000000000000000  r9=0000000000000000 r10=fffff8020aa7a840
r11=ffffce7d2dc00000 r12=ffffa28fa474d000 r13=fffff807aa5c4000
r14=0000000000000000 r15=0000000000400000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!IovpValidateDeviceObject+0x5:
fffff802`0aa14cc5 66833903        cmp     word ptr [rcx],3 ds:002b:00000000`046dc232=????
Resetting default scope

CPU_COUNT: 10

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  System

CURRENT_IRQL:  0

FOLLOWUP_IP:
HIDCLASS!HidpCallDriver+b9
fffff807`aa5a3939 90              nop

BUGCHECK_STR:  AV

READ_ADDRESS: fffff8020a6223b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000046dc232

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000046dc232

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-21-2020 17:37:26.0715

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LOCK_ADDRESS:  fffff8020a5119a0 -- (!locks fffff8020a5119a0)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff8020a5119a0)    Available
1 total locks

PNP_TRIAGE_DATA:
    Lock address  : 0xfffff8020a5119a0
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff8020aa13f9e to fffff8020aa14cc5

STACK_TEXT:
fffffe01`3dbbf3d8 fffff802`0aa13f9e : ffffa28f`a3bc0e10 fffffe01`3dbbf3f8 ffffa28f`a3bc0f70 ffffa28f`9d3796a0 : nt!IovpValidateDeviceObject+0x5
fffffe01`3dbbf3e0 fffff802`0aa21af8 : ffffa28f`a3bc0e10 00000000`00000000 ffffa28f`a4a376a0 ffffa28f`a0a70b90 : nt!IovCallDriver+0x16a
fffffe01`3dbbf420 fffff802`0a22e76a : 00000000`00000000 fffff802`0aa1fa5c ffffa28f`00000000 ffffa28f`00000000 : nt!VerifierIofCallDriver+0x18
fffffe01`3dbbf450 fffff802`0aa140a9 : ffffa28f`a3bc0e10 ffffa28f`a4a376a0 fffffe01`3dbbf510 fffff802`0a170768 : nt!IopfCallDriver+0x56
fffffe01`3dbbf490 fffff802`0aa21af8 : ffffa28f`a3bc0e10 00000000`00000017 ffffa28f`a46f5410 ffffa28f`99bf7100 : nt!IovCallDriver+0x275
fffffe01`3dbbf4d0 fffff807`aa5a3939 : 00000000`00000004 fffff802`0a0b8422 fffffe01`3dbba000 00000000`00000000 : nt!VerifierIofCallDriver+0x18
fffffe01`3dbbf500 fffff807`aa5b3d81 : 00000000`00000000 ffffa28f`a46f5580 ffffa28f`a3bc0e10 fffff802`0aa26387 : HIDCLASS!HidpCallDriver+0xb9
fffffe01`3dbbf570 fffff807`aa5d0f1d : ffffa28f`a46f5560 ffffa28f`a2d85540 ffffa28f`9d379718 fffff802`0aa1ea0a : HIDCLASS!HidpIrpMajorDefault+0x129
fffffe01`3dbbf5d0 fffff807`aa5a269b : ffffa28f`00000002 ffffa28f`a46f5560 ffffa28f`9d379718 00000000`00000017 : HIDCLASS!HidpIrpMajorSystemControl+0x5e5
fffffe01`3dbbf600 fffff802`0a22e76a : 00000000`00000000 ffffa28f`a3bc0e10 ffffa28f`a46f5410 ffffa28f`00000001 : HIDCLASS!HidpMajorHandler+0x26b
fffffe01`3dbbf690 fffff802`0aa140a9 : ffffa28f`a3bc0e10 ffffa28f`a46f5410 00000000`00000000 fffff802`0aa1ff69 : nt!IopfCallDriver+0x56
fffffe01`3dbbf6d0 fffff802`0a30e8c3 : ffffa28f`a3bc0e10 ffffa28f`a46f5410 00000000`00000000 ffffa28f`a2d85540 : nt!IovCallDriver+0x275
fffffe01`3dbbf710 fffff802`0aa1fec5 : ffffa28f`a4a376a0 00000000`00000000 fffffe01`00000002 00000000`000000c0 : nt!IofCallDriver+0x154ff3
fffffe01`3dbbf750 fffff802`0aa3187a : ffffa28f`a4a376a0 fffffe01`3dbbf939 00000000`00000001 ffffa28f`a4a376a0 : nt!VfIrpSendSynchronousIrp+0x115
fffffe01`3dbbf7c0 fffff802`0aa26234 : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 ffffa28f`a4a376a0 : nt!VfWmiTestStartedPdoStack+0x5a
fffffe01`3dbbf860 fffff802`0a20a67b : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 ffffa28f`95284010 : nt!VfMajorTestStartedPdoStack+0x58
fffffe01`3dbbf890 fffff802`0a7b70b7 : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 fffffe01`3dbbf939 : nt!PpvUtilTestStartedPdoStack+0x17
fffffe01`3dbbf8c0 fffff802`0a7b0d1d : ffffa28f`95e30a80 fffffe01`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xbf
fffffe01`3dbbf9a0 fffff802`0a7ce17c : ffffa28f`a40f2d00 fffff802`0a1c1501 fffffe01`3dbbfab0 fffff802`00000002 : nt!PipProcessDevNodeTree+0x375
fffffe01`3dbbfa60 fffff802`0a20b6d7 : 00000001`00000003 ffffa28f`95284010 ffffa28f`a40f2db0 ffffa28f`a40f2db0 : nt!PiProcessReenumeration+0x88
fffffe01`3dbbfab0 fffff802`0a1a33b5 : ffffa28f`99bbb080 ffffa28f`95283a20 fffff802`0a510240 ffffa28f`95283a20 : nt!PnpDeviceActionWorker+0x207
fffffe01`3dbbfb70 fffff802`0a11acd5 : ffffa28f`99bbb080 00000000`00000080 ffffa28f`95282040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
fffffe01`3dbbfc10 fffff802`0a278998 : ffffde81`14ed2180 ffffa28f`99bbb080 fffff802`0a11ac80 ffffe184`e488a1e3 : nt!PspSystemThreadStartup+0x55
fffffe01`3dbbfc60 00000000`00000000 : fffffe01`3dbc0000 fffffe01`3dbba000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


THREAD_SHA1_HASH_MOD_FUNC:  fec41cbe2df6dc4585248640cf4fde66365deaa9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d765ea7fdd134b070e20337900d03742d37cc229

THREAD_SHA1_HASH_MOD:  d85734949ecfb4643d983d4a36d81494e778c50c

FAULT_INSTR_CODE:  187f8090

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  HIDCLASS!HidpCallDriver+b9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: HIDCLASS

IMAGE_NAME:  HIDCLASS.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.175

STACK_COMMAND:  .cxr 0xfffffe013dbbe9e0 ; kb

BUCKET_ID_FUNC_OFFSET:  b9

FAILURE_BUCKET_ID:  AV_VRF_HIDCLASS!HidpCallDriver

BUCKET_ID:  AV_VRF_HIDCLASS!HidpCallDriver

PRIMARY_PROBLEM_CLASS:  AV_VRF_HIDCLASS!HidpCallDriver

TARGET_TIME:  2020-04-21T13:46:07.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  24a4

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_vrf_hidclass!hidpcalldriver

FAILURE_ID_HASH:  {25e71b60-36c1-fafe-99dd-4c12cfb82b8a}

Followup:     MachineOwner
---------
BIOS güncelle.

Driver Genius sürücü bulucu araçları kullandığın için temiz kurulum yap.
Kingsoft Antivirus yazılımı kurma.
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffffc881e976eff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc881e976ef48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.418 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  0409

BIOS_DATE:  08/24/2018

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME B450M-K

BASEBOARD_VERSION:  Rev X.0x

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: 4

BUGCHECK_P2: ffffc881e976eff0

BUGCHECK_P3: ffffc881e976ef48

BUGCHECK_P4: 0

TRAP_FRAME:  944bedc6980b6dc2 -- (.trap 0x944bedc6980b6dc2)
Unable to read trap frame at 944bedc6`980b6dc2

EXCEPTION_RECORD:  287441e8243441ec -- (.exr 0x287441e8243441ec)
Cannot read Exception record @ 287441e8243441ec

CPU_COUNT: 10

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  vegas140.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_INCORRECT_STACK

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-16-2020 17:48:10.0458

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

BAD_STACK_POINTER:  ffffc881e976ecc8

LAST_CONTROL_TRANSFER:  from fffff8050c7d30e9 to fffff8050c7c1220

STACK_TEXT:
ffffc881`e976ecc8 fffff805`0c7d30e9 : 00000000`00000139 00000000`00000004 ffffc881`e976eff0 ffffc881`e976ef48 : nt!KeBugCheckEx
ffffc881`e976ecd0 fffff805`0c7d3510 : 3bf10142`37b10146 00c193e2`0c819319 9fce2d2c`938e2d28 a4febf8c`a8bebf88 : nt!KiBugCheckDispatch+0x69
ffffc881`e976ee10 fffff805`0c7d18a5 : fffff805`0c7271e8 fffff805`0ca0ed44 ffffc881`e976f7d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc881`e976eff0 fffff805`0c84eec7 : 00000000`00000000 00000000`00000360 0005e56c`00ab6000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x325
ffffc881`e976f180 fffff805`0c82e7f8 : 00000000`00000000 00000000`00000000 ffffc881`e976f6f0 00007fff`00000003 : nt!RtlpGetStackLimitsEx+0x12e8bb
ffffc881`e976f1b0 fffff805`0c6c790e : ffffd887`bec1ac38 ffffc881`e976fe30 ffffd887`bec1ac38 ffffec80`01a2ecf0 : nt!RtlDispatchException+0x16b928
ffffc881`e976f900 fffff805`0c7c20a2 : 287441e8`243441ec ecbb2cb7`e0fb2cb3 944bedc6`980b6dc2 af7bff66`a33bff62 : nt!KiDispatchException+0x16e
ffffc881`e976ffb0 fffff805`0c7c2070 : fffff805`0c7d3216 00000000`00000000 ffffd887`bec1ae50 00000000`00140001 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffd887`bec1aaf8 fffff805`0c7d3216 : 00000000`00000000 ffffd887`bec1ae50 00000000`00140001 00000000`0000bfff : nt!KiExceptionDispatchOnExceptionStackContinue
ffffd887`bec1ab00 fffff805`0c7cefa2 : 00000000`80000003 00000000`00000000 00000000`00000002 fffff805`0c786307 : nt!KiExceptionDispatch+0x116
ffffd887`bec1ace0 fffff805`0c605e0e : 00000000`00000000 00000000`00035a11 ffffec80`00a0e300 ffffec80`00a0e450 : nt!KiGeneralProtectionFault+0x322
ffffd887`bec1ae70 fffff805`0c619c7c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxWaitForLockOwnerShip+0xe
ffffd887`bec1aea0 fffff805`0c615ee2 : 00000000`0008ba45 ffffec80`01a2ed08 00000000`00000000 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x78c
ffffd887`bec1af80 fffff805`0c6842e9 : fffffbe4`00000010 001eb887`00000002 00000000`00000000 001eb887`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x372
ffffd887`bec1b1a0 fffff805`0c6840de : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteLocalLargePage+0x199
ffffd887`bec1b280 fffff805`0c678566 : 00000000`00000000 00000000`00000002 00000000`00000000 fffff805`00000001 : nt!MiGetFreeOrZeroPageAnyColor+0x62
ffffd887`bec1b2c0 fffff805`0c677c61 : fffff805`0ca6a480 00000000`00000044 00000000`00000044 ffffec80`00000000 : nt!MiGetPage+0x346
ffffd887`bec1b3a0 fffff805`0c6fe847 : 00000000`00000004 1a000000`89316867 ffffec80`01a28c70 fffff805`0ca6a480 : nt!MiGetPageChain+0x181
ffffd887`bec1b590 fffff805`0c67552c : ffffd887`bec1b880 ffffd887`bec1b668 00000000`00000002 00000000`00000001 : nt!MiCreateSharedZeroPages+0x77
ffffd887`bec1b620 fffff805`0c67a45c : 00000000`00000018 ffffd887`bec1b880 ffffec80`019ee0a0 00000000`00000002 : nt!MiResolveDemandZeroFault+0x2dc
ffffd887`bec1b710 fffff805`0c674bbc : ffffd887`bec1b880 00000000`00000002 ffffd887`bec1b858 ffff9083`4854e660 : nt!MiResolveProtoPteFault+0xabc
ffffd887`bec1b810 fffff805`0c672cf9 : 00000000`00000100 00000000`00000004 00000000`c0000016 fffff805`0c7c842f : nt!MiDispatchFault+0x80c
ffffd887`bec1b960 fffff805`0c7cf320 : ffffb888`1f7db080 ffffb888`226c3d80 00007ff9`f2d90000 00000000`00000000 : nt!MmAccessFault+0x169
ffffd887`bec1bb00 00007ff7`75c20266 : 00000000`0942d5b0 00000000`b9e3f2a0 00000000`7ffe0386 00000000`b9e3f230 : nt!KiPageFault+0x360
00000000`b9e3f210 00000000`0942d5b0 : 00000000`b9e3f2a0 00000000`7ffe0386 00000000`b9e3f230 00000000`b9e3f280 : 0x00007ff7`75c20266
00000000`b9e3f218 00000000`b9e3f2a0 : 00000000`7ffe0386 00000000`b9e3f230 00000000`b9e3f280 00000000`b9e3f240 : 0x942d5b0
00000000`b9e3f220 00000000`7ffe0386 : 00000000`b9e3f230 00000000`b9e3f280 00000000`b9e3f240 00000000`000002a5 : 0xb9e3f2a0
00000000`b9e3f228 00000000`b9e3f230 : 00000000`b9e3f280 00000000`b9e3f240 00000000`000002a5 00007ff7`75c203e0 : SharedUserData+0x386
00000000`b9e3f230 00000000`b9e3f280 : 00000000`b9e3f240 00000000`000002a5 00007ff7`75c203e0 00000000`00000000 : 0xb9e3f230
00000000`b9e3f238 00000000`b9e3f240 : 00000000`000002a5 00007ff7`75c203e0 00000000`00000000 00000000`00ed0b50 : 0xb9e3f280
00000000`b9e3f240 00000000`000002a5 : 00007ff7`75c203e0 00000000`00000000 00000000`00ed0b50 00000000`0942d528 : 0xb9e3f240
00000000`b9e3f248 00007ff7`75c203e0 : 00000000`00000000 00000000`00ed0b50 00000000`0942d528 00007ff9`f2d917d6 : 0x2a5
00000000`b9e3f250 00000000`00000000 : 00000000`00ed0b50 00000000`0942d528 00007ff9`f2d917d6 00000000`7ffe0386 : 0x00007ff7`75c203e0


THREAD_SHA1_HASH_MOD_FUNC:  0f96a9e851987615e9cc1f37fd617aa80b225a25

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  63e669abf034ffd0ec9d4a7a59b3f4d41e3dddfa

THREAD_SHA1_HASH_MOD:  cb872e3d67eb764c79ee5d65208299fea8045d2b

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff805`0c7d3510 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.418

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

TARGET_TIME:  2020-04-16T14:11:25.000Z

OSBUILD:  18362

OSSERVICEPACK:  418

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.418

ANALYSIS_SESSION_ELAPSED_TIME:  62b

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch

FAILURE_ID_HASH:  {7b0febb5-6007-4f2b-3d38-57fef278d8d5}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000002d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8001fce64c6, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.418 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  0409

BIOS_DATE:  08/24/2018

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME B450M-K

BASEBOARD_VERSION:  Rev X.0x

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: 2d

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8001fce64c6

READ_ADDRESS: fffff800201733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000002d

CURRENT_IRQL:  2

FAULTING_IP:
nt!RtlpHpLfhSubsegmentDecommitPages+c6
fffff800`1fce64c6 410fb6472d      movzx   eax,byte ptr [r15+2Dh]

CPU_COUNT: 10

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-16-2020 17:48:16.0220

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffff8f04d35a3790 -- (.trap 0xffff8f04d35a3790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000004ff rbx=0000000000000000 rcx=ffff9303be400340
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001fce64c6 rsp=ffff8f04d35a3920 rbp=0000000000000001
r8=00000000ffffffff  r9=0000000000000001 r10=0000000000000001
r11=ffff9303c86db050 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!RtlpHpLfhSubsegmentDecommitPages+0xc6:
fffff800`1fce64c6 410fb6472d      movzx   eax,byte ptr [r15+2Dh] ds:00000000`0000002d=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8001fdd30e9 to fffff8001fdc1220

STACK_TEXT:
ffff8f04`d35a3648 fffff800`1fdd30e9 : 00000000`0000000a 00000000`0000002d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8f04`d35a3650 fffff800`1fdcf42b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8f04`d35a3790 fffff800`1fce64c6 : 00000000`00000000 00000000`00000000 00010046`00920001 fffff800`1fc44380 : nt!KiPageFault+0x46b
ffff8f04`d35a3920 fffff800`1fce59b3 : ffff9303`be400340 00000000`00000000 ffff9303`d39c6bff fffff800`00000001 : nt!RtlpHpLfhSubsegmentDecommitPages+0xc6
ffff8f04`d35a39b0 fffff800`1fce5a01 : ffff9303`be400a40 ffff9303`be400280 00000000`00000001 00000000`00000001 : nt!RtlpHpLfhOwnerCompact+0x67
ffff8f04`d35a3a10 fffff800`1fce5916 : ffff9303`be400410 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhOwnerCompact+0xb5
ffff8f04`d35a3a70 fffff800`1fce44c6 : ffff9303`be400000 00000000`00000000 ffff9303`be400280 ffff9303`be400280 : nt!RtlpHpLfhContextCompact+0xae
ffff8f04`d35a3ab0 fffff800`1fce5691 : 00000000`00000001 ffff9303`be400000 ffffd785`884ab700 ffff9303`c5cba180 : nt!RtlpHpHeapCompact+0x76
ffff8f04`d35a3ae0 fffff800`1fcbd465 : 00000000`00000001 ffff9303`00000000 fffff800`2b4fd400 00000000`00000000 : nt!ExpHpCompactionRoutine+0x211
ffff8f04`d35a3b70 fffff800`1fd2a725 : ffff9303`c5cba040 00000000`00000080 ffff9303`be88f040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8f04`d35a3c10 fffff800`1fdc886a : ffffb400`274a3180 ffff9303`c5cba040 fffff800`1fd2a6d0 ffff9303`c581f8a0 : nt!PspSystemThreadStartup+0x55
ffff8f04`d35a3c60 00000000`00000000 : ffff8f04`d35a4000 ffff8f04`d359e000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  26a692102e7ff76ec7eb337338c8922138755d24

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  cccaac848a2a27fd5061b5ac68336639745136e5

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!RtlpHpLfhSubsegmentDecommitPages+c6
fffff800`1fce64c6 410fb6472d      movzx   eax,byte ptr [r15+2Dh]

FAULT_INSTR_CODE:  47b60f41

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!RtlpHpLfhSubsegmentDecommitPages+c6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.418

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  c6

FAILURE_BUCKET_ID:  AV_nt!RtlpHpLfhSubsegmentDecommitPages

BUCKET_ID:  AV_nt!RtlpHpLfhSubsegmentDecommitPages

PRIMARY_PROBLEM_CLASS:  AV_nt!RtlpHpLfhSubsegmentDecommitPages

TARGET_TIME:  2020-04-16T13:47:33.000Z

OSBUILD:  18362

OSSERVICEPACK:  418

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.418

ANALYSIS_SESSION_ELAPSED_TIME:  59d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!rtlphplfhsubsegmentdecommitpages

FAILURE_ID_HASH:  {3ea916f4-98f1-2e2d-978b-851f95bd1f17}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000008b64c880, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8051133e856, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.418 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: 8b64c880

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8051133e856

READ_ADDRESS: fffff805117733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000008b64c880

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiDecrementCombinedPte+2a
fffff805`1133e856 498b30          mov     rsi,qword ptr [r8]

CPU_COUNT: 10

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  vegas140.exe

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-16-2020 17:48:07.0914

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffff88007b3bec20 -- (.trap 0xffff88007b3bec20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=ffffa004332e9580
rdx=ffff8d0f5185ed00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8051133e856 rsp=ffff88007b3bedb0 rbp=ffff8d0f5185ed00
r8=000000008b64c880  r9=02200000003553b5 r10=0000000fffffffff
r11=fffffff000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!MiDecrementCombinedPte+0x2a:
fffff805`1133e856 498b30          mov     rsi,qword ptr [r8] ds:00000000`8b64c880=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff805113d30e9 to fffff805113c1220

STACK_TEXT:
ffff8800`7b3bead8 fffff805`113d30e9 : 00000000`0000000a 00000000`8b64c880 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8800`7b3beae0 fffff805`113cf42b : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`11219486 : nt!KiBugCheckDispatch+0x69
ffff8800`7b3bec20 fffff805`1133e856 : fffff080`096e5b80 00000000`00000000 ffffc380`01a23320 ffffc380`01a2cd40 : nt!KiPageFault+0x46b
ffff8800`7b3bedb0 fffff805`11217027 : 80000000`00000000 00000000`00000004 ffff8800`7b3beef0 8a000003`553b5963 : nt!MiDecrementCombinedPte+0x2a
ffff8800`7b3bedf0 fffff805`112b15c7 : 00000000`00000003 ffff8800`7b3bf540 ffff8800`7b3bf540 ffff8800`7b3bf490 : nt!MiDeletePteRun+0xdc7
ffff8800`7b3bf010 fffff805`112ad0e2 : ffffa004`332e9580 fffff080`096e6000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
ffff8800`7b3bf040 fffff805`112ad271 : ffff8800`7b3bf490 fffff0f8`4004b728 00000000`00000000 0a000000`8b666867 : nt!MiWalkPageTablesRecursively+0x512
ffff8800`7b3bf100 fffff805`112ad271 : ffff8800`7b3bf490 fffff0f8`7c200258 00000000`00000000 0a000000`765f6867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff8800`7b3bf1c0 fffff805`112ad271 : ffff8800`7b3bf490 fffff0f8`7c3e1000 fffff0f8`00000000 0a000001`91acd867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff8800`7b3bf280 fffff805`112ac9fc : ffff8800`7b3bf490 00000000`00006000 00000000`00000000 ffff8800`7b3bf3d0 : nt!MiWalkPageTablesRecursively+0x6a1
ffff8800`7b3bf340 fffff805`112aae68 : ffff8800`7b3bf490 ffff8d0f`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffff8800`7b3bf440 fffff805`112b8fc0 : ffffffff`ffffffff ffffa004`332e93f8 ffffa004`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff8800`7b3bf7e0 fffff805`117c786d : 4687a805`00000000 00000000`012dc7d0 ffffa004`3a325ec0 00000000`00000000 : nt!MiDeleteVad+0x860
ffff8800`7b3bf9a0 fffff805`117c7663 : ffffa004`3a325ec0 00000000`00000000 00000012`dc7d0000 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8800`7b3bf9d0 fffff805`117c74f9 : ffffa004`332e9080 00000012`00000008 ffffa004`2468fae0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffff8800`7b3bfab0 fffff805`113d2b18 : ffffa004`300aa0c0 00000012`dc7d0000 ffff8800`7b3bfb80 ffffa004`332e9080 : nt!NtUnmapViewOfSectionEx+0x99
ffff8800`7b3bfb00 00007ffb`f275f974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`010ff648 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`f275f974


THREAD_SHA1_HASH_MOD_FUNC:  9a2c125304243c61739d942aa866c1a6ab3ba43c

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  469d6be0c3fa98f1773d217bb636d6e5353222b3

THREAD_SHA1_HASH_MOD:  aaa5a324bf1bd3082ad2b464ee2ed2f6d50e564c

FOLLOWUP_IP:
nt!MiDecrementCombinedPte+2a
fffff805`1133e856 498b30          mov     rsi,qword ptr [r8]

FAULT_INSTR_CODE:  f0308b49

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiDecrementCombinedPte+2a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.418

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  2a

FAILURE_BUCKET_ID:  AV_nt!MiDecrementCombinedPte

BUCKET_ID:  AV_nt!MiDecrementCombinedPte

PRIMARY_PROBLEM_CLASS:  AV_nt!MiDecrementCombinedPte

TARGET_TIME:  2020-04-16T10:31:12.000Z

OSBUILD:  18362

OSSERVICEPACK:  418

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.418

ANALYSIS_SESSION_ELAPSED_TIME:  d14

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!midecrementcombinedpte

FAILURE_ID_HASH:  {2a0b0fd5-f49c-c11b-58f7-bf573724b1e1}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8011553e856, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.418 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  0409

BIOS_DATE:  08/24/2018

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME B450M-K

BASEBOARD_VERSION:  Rev X.0x

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8011553e856

READ_ADDRESS: fffff801159733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiDecrementCombinedPte+2a
fffff801`1553e856 498b30          mov     rsi,qword ptr [r8]

CPU_COUNT: 10

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  chrome.exe

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-16-2020 17:48:24.0078

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff9066398e0f0 -- (.trap 0xfffff9066398e0f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=ffff8b89ae69f580
rdx=ffff9c8b06840b60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011553e856 rsp=fffff9066398e280 rbp=ffff9c8b06840b60
r8=0000000000000000  r9=00200000001ddd16 r10=0000000fffffffff
r11=fffffff000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!MiDecrementCombinedPte+0x2a:
fffff801`1553e856 498b30          mov     rsi,qword ptr [r8] ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff801155d30e9 to fffff801155c1220

STACK_TEXT:
fffff906`6398dfa8 fffff801`155d30e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff906`6398dfb0 fffff801`155cf42b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff906`6398e0f0 fffff801`1553e856 : ffff452c`b091b580 ffffd480`01a2c500 ffffd480`01a2c500 ffff8b89`ae69f580 : nt!KiPageFault+0x46b
fffff906`6398e280 fffff801`154bd0b3 : fffff906`6398e3c0 ffff8b89`ae69f080 fffff906`6398e3c0 00000000`00000000 : nt!MiDecrementCombinedPte+0x2a
fffff906`6398e2c0 fffff801`15615773 : ffff8b89`a9ed25d0 0000160d`0816c000 fffff906`6398e660 0000160d`0816c000 : nt!MiCopyOnWrite+0x8f3
fffff906`6398e560 fffff801`1552a635 : ffff8b89`b46d3080 fffff801`154b3f9a ffff8b89`a9ed25d0 ffff8b89`a9ed25d0 : nt!MiWalkVaRange+0x18fbcf
fffff906`6398e710 fffff801`15a57a1c : 00000000`00000002 fffff906`6398e860 ffff8b89`a9ed25d0 00000000`00000000 : nt!MiResetVirtualMemory+0x85
fffff906`6398e760 fffff801`15a50756 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAllocateVirtualMemory+0x51c
fffff906`6398e8f0 fffff801`155d2b18 : ffffffff`ffffffff ffff8b89`b46d3080 00000000`00000000 000000f6`ac1ff278 : nt!NtAllocateVirtualMemory+0x196
fffff906`6398ea90 00007fff`8a73c3c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f6`ac1ff258 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`8a73c3c4


THREAD_SHA1_HASH_MOD_FUNC:  8dd960acc5fb270b6cfbf221a83ff96a378f7817

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  2d2d6da1e9c97579642d9840debbda83b86fb048

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt!MiDecrementCombinedPte+2a
fffff801`1553e856 498b30          mov     rsi,qword ptr [r8]

FAULT_INSTR_CODE:  f0308b49

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiDecrementCombinedPte+2a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.418

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  2a

FAILURE_BUCKET_ID:  AV_nt!MiDecrementCombinedPte

BUCKET_ID:  AV_nt!MiDecrementCombinedPte

PRIMARY_PROBLEM_CLASS:  AV_nt!MiDecrementCombinedPte

TARGET_TIME:  2020-04-16T06:47:31.000Z

OSBUILD:  18362

OSSERVICEPACK:  418

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.418

ANALYSIS_SESSION_ELAPSED_TIME:  be7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!midecrementcombinedpte

FAILURE_ID_HASH:  {2a0b0fd5-f49c-c11b-58f7-bf573724b1e1}

Followup:     MachineOwner
---------
 
Tekrardan selam, söyledikleriniz üzerine BIOS'u güncelledim ve format attım. Hiçbir sürücüyü güncellemeden yine watchdog vio. Hatası verdi. Ardından bütün sürücüleri yine güncelledim ve yine mavi ekran verdi. Sorun donanımsal olabilir gibi. Ama hangi donanım olduğunu anlamam mümkün değil.
 
BIOS güncellenmemiş.
Hala Windows 1511 Windows sürümü kullanıyorsunuz.

Dediklerim yapılmamış.


Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffffc0001805514, Virtual address for the attempted write.
Arg2: 8000000002000121, PTE contents.
Arg3: ffffd00028ecefb0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10586.162.amd64fre.th2_release_sec.160223-1728

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  0409

BIOS_DATE:  08/24/2018

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME B450M-K

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: fffffc0001805514

BUGCHECK_P2: 8000000002000121

BUGCHECK_P3: ffffd00028ecefb0

BUGCHECK_P4: a

CPU_COUNT: 10

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xBE

PROCESS_NAME:  Windows10Upgra

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-18-2020 14:16:18.0405

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffd00028ecefb0 -- (.trap 0xffffd00028ecefb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000037000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000078 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80121ee78d7 rsp=ffffd00028ecf140 rbp=ffffd00028ecf180
r8=ff00000fffffffff  r9=00000008000801c5 r10=000000000037d9b9
r11=fffffd8000003878 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
nt!MiUnlinkPageFromList+0x3b7:
fffff801`21ee78d7 6644895724      mov     word ptr [rdi+24h],r10w ds:00000000`00000024=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80122009fe3 to fffff80121fba760

STACK_TEXT:
ffffd000`28ecedf8 fffff801`22009fe3 : 00000000`000000be fffffc00`01805514 80000000`02000121 ffffd000`28ecefb0 : nt!KeBugCheckEx
ffffd000`28ecee00 fffff801`21eb1415 : fffffa80`01a2d4c0 ffffd000`28ecef50 fffffc00`01805514 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40ee3
ffffd000`28ecee50 fffff801`21fc39bc : fffff6d8`003cd390 fffffa80`01a49c90 00000000`80000000 fffff801`22174780 : nt!MmAccessFault+0xb75
ffffd000`28ecefb0 fffff801`21ee78d7 : ffffffff`ffffffff fffff801`21f42d4d 00000000`00000000 00000000`00000040 : nt!KiPageFault+0x13c
ffffd000`28ecf140 fffff801`21ea8417 : fffffa80`01a2d4c0 00000000`00000000 00000000`00000001 ffffe001`00000000 : nt!MiUnlinkPageFromList+0x3b7
ffffd000`28ecf200 fffff801`21ea724e : 00000000`00000173 00000000`00001000 ffffe001`ae4d5d90 00000000`00000000 : nt!MmCheckCachedPageStates+0x717
ffffd000`28ecf3a0 fffff801`2224f6bf : 00000000`72073000 00000000`00000000 00000000`00000001 ffffd000`28ecf4b0 : nt!CcFetchDataForRead+0x8e
ffffd000`28ecf400 fffff801`21ea701e : ffffe001`ac1e5cd8 00000000`72073000 ffffe001`0000d000 ffffe001`aecd1101 : nt!CcMapAndCopyFromCache+0xcf
ffffd000`28ecf4a0 fffff801`829f4faf : 00000000`00000000 ffffd000`28ecf5c4 00000000`00000000 ffffe001`b2802198 : nt!CcCopyReadEx+0xfe
ffffd000`28ecf510 fffff801`829f36ca : 00000000`00000000 ffffd000`28ecf760 00000000`00000001 ffffc001`28cf9150 : NTFS!NtfsCachedRead+0x173
ffffd000`28ecf580 fffff801`829f28b2 : ffffe001`b2802198 ffffe001`ae43fb50 00000000`0f000000 00000000`00000001 : NTFS!NtfsCommonRead+0xc5a
ffffd000`28ecf730 fffff801`821f7895 : ffffe001`b39b4ad0 ffffe001`ae43fb50 ffffe001`ae43fb50 ffffe001`ae43fe60 : NTFS!NtfsFsdRead+0x1f2
ffffd000`28ecf7e0 fffff801`821f5816 : ffffe001`ae4d5de0 00000000`086cf180 ffffe001`b39b4a01 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1a5
ffffd000`28ecf870 fffff801`22260506 : ffffe001`ae4d5e60 ffffd000`28ecf951 00000000`00000001 ffffd000`28ecf970 : FLTMGR!FltpDispatch+0xb6
ffffd000`28ecf8d0 fffff801`22260052 : ffffe001`00000001 ffffe001`ae4d5d04 ffffe001`ae4d5de0 00000000`00000000 : nt!IopSynchronousServiceTail+0x176
ffffd000`28ecf9a0 fffff801`21fc4fa3 : 00000000`00536000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x672
ffffd000`28ecfa90 00000000`56f121bc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0868f048 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x56f121bc


THREAD_SHA1_HASH_MOD_FUNC:  ced4ed012fd441e04c069507a93e5fe9e1ea9263

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e102d2b839cf231b8c537e342a5637b4616543de

THREAD_SHA1_HASH_MOD:  565c6938ad97e5d72b72f98a2a18527cee5206ea

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+40ee3
fffff801`22009fe3 cc              int     3

FAULT_INSTR_CODE:  398348cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+40ee3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  56cd4410

IMAGE_VERSION:  10.0.10586.162

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  40ee3

FAILURE_BUCKET_ID:  0xBE_nt!_??_::FNODOBFM::_string_

BUCKET_ID:  0xBE_nt!_??_::FNODOBFM::_string_

PRIMARY_PROBLEM_CLASS:  0xBE_nt!_??_::FNODOBFM::_string_

TARGET_TIME:  2020-04-17T16:11:47.000Z

OSBUILD:  10586

OSSERVICEPACK:  162

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2016-02-24 08:48:00

BUILDDATESTAMP_STR:  160223-1728

BUILDLAB_STR:  th2_release_sec

BUILDOSVER_STR:  10.0.10586.162.amd64fre.th2_release_sec.160223-1728

ANALYSIS_SESSION_ELAPSED_TIME:  a0a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xbe_nt!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {463ab379-ba7d-e86a-84c4-449f00e9fb43}

Followup:     MachineOwner
---------
 
Eski dump dosyasını göndermişim. Dün gece Memtest'i başlattım sabaha kadar 9 saatte 5 Pass yapmıştı hatasız. 8'e tamamlayamadım. Sabah Online işim olduğu için testi kapatmak zorunda kaldım.

Yeni dump dosyasını ekliyorum. Bugün 12 saat PC kapanmadan devam etti fakat son yarım içinde 2 kez kapandı.


İlginiz için çok teşekkür ederim.
 
Sonuna kadar beklemem gerektiğini bilmiyordum. Tekrar hata verirse bekleyeceğim sonuna kadar. Fakat %100 olup takılıyor. Ben kapatana kadar.

Bu biraz önceki hata. Buradan bir şey çıkarabilmeniz mümkün mü?


On Sun 2020/4/19 22:44:33 your computer crashed or a problem was reported
crash dump file: C:\WINDOWS\Minidump\041920-11875-01.dmp
This was probably caused by the following module: Unknown (0x0000000000000000)
Bugcheck code: 0x133 (0x1, 0x1E00, 0xFFFFF8034EB73358, 0x0)
Error: DPC_WATCHDOG_VIOLATION
Bug check description: The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. This could be caused by either a non-responding driver or non-responding hardware. This bug check can also occur because of overheated CPUs (thermal issue).
A third party driver was identified as the probable root cause of this system error.
Google query: DPC_WATCHDOG_VIOLATION
 
Durum
Mesaj gönderimine kapalı.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı