MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041289, The subtype of the bugcheck.
Arg2: 000007fee00b5001
Arg3: 00000000000011fe
Arg4: 000007fef50b5005
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800036eb300
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707
SYSTEM_MANUFACTURER: BIOSTAR Group
SYSTEM_PRODUCT_NAME: A780L3L
SYSTEM_SKU: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 080014
BIOS_DATE: 06/07/2010
BASEBOARD_MANUFACTURER: BIOSTAR Group
BASEBOARD_PRODUCT: A780L3L
DUMP_TYPE: 2
BUGCHECK_P1: 41289
BUGCHECK_P2: 7fee00b5001
BUGCHECK_P3: 11fe
BUGCHECK_P4: 7fef50b5005
BUGCHECK_STR: 0x1a_41289
CPU_COUNT: 2
CPU_MHZ: af0
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 6
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 04-05-2020 14:42:56.0511
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff800034c9583 to fffff800034e1ea0
STACK_TEXT:
fffff880`065ca958 fffff800`034c9583 : 00000000`0000001a 00000000`00041289 000007fe`e00b5001 00000000`000011fe : nt!KeBugCheckEx
fffff880`065ca960 fffff800`035653cc : 9fe00000`286d8025 fffff700`01080488 00000000`00000000 fffff800`034dae8d : nt!MiLocateWsle+0x1a3
fffff880`065ca9a0 fffff800`0346e509 : 9fe00000`286d8025 00800000`ac35f867 fffffa80`145935c0 00000000`00000000 : nt!MiGetPageProtection+0x17c
fffff880`065ca9f0 fffff800`0346e8fa : fffffa80`15c14640 fffff880`065caca0 fffffa80`15d138e0 fffff880`065caac0 : nt!MiQueryAddressState+0x3c9
fffff880`065caa50 fffff800`03726a24 : 000007ff`00000002 000007fe`e00b6000 fffffa80`145935c0 fffff880`00000000 : nt!MiQueryAddressSpan+0xba
fffff880`065caac0 fffff800`034eff53 : 00000000`00000150 fffffa80`15c14640 fffffa80`00000000 00000000`0639eab8 : nt!NtQueryVirtualMemory+0x3a4
fffff880`065cabb0 00000000`76e899da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0639ea98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e899da
THREAD_SHA1_HASH_MOD_FUNC: a866488ff7b38511d6e788204cea80a35086eb07
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 59f3a2b2e18e2c15b4d21fabc7ac5e6ac0b22442
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!MiLocateWsle+1a3
fffff800`034c9583 cc int 3
FAULT_INSTR_CODE: 4a05ffcc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiLocateWsle+1a3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5e0ead5e
IMAGE_VERSION: 6.1.7601.24545
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_41289_nt!MiLocateWsle+1a3
BUCKET_ID: X64_0x1a_41289_nt!MiLocateWsle+1a3
PRIMARY_PROBLEM_CLASS: X64_0x1a_41289_nt!MiLocateWsle+1a3
TARGET_TIME: 2020-04-05T00:15:22.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2020-01-03 05:56:30
BUILDDATESTAMP_STR: 200102-1707
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707
ANALYSIS_SESSION_ELAPSED_TIME: 49b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x1a_41289_nt!milocatewsle+1a3
FAILURE_ID_HASH: {2479382f-1d0b-5bd2-6e8b-e4504bcc209c}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88001071099, Address of the instruction which caused the bugcheck
Arg3: fffff880074b78e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800036ec300
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707
SYSTEM_MANUFACTURER: BIOSTAR Group
SYSTEM_PRODUCT_NAME: A780L3L
SYSTEM_SKU: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 080014
BIOS_DATE: 06/07/2010
BASEBOARD_MANUFACTURER: BIOSTAR Group
BASEBOARD_PRODUCT: A780L3L
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff88001071099
BUGCHECK_P3: fffff880074b78e0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
fltmgr!GetContextFromStreamList+99
fffff880`01071099 488b4820 mov rcx,qword ptr [rax+20h]
CONTEXT: fffff880074b78e0 -- (.cxr 0xfffff880074b78e0)
rax=0000000c45476d57 rbx=0000000000000000 rcx=0000000c45476d57
rdx=fffffa8014bb66b0 rsi=fffffa80148f5470 rdi=fffffa80148f5420
rip=fffff88001071099 rsp=fffff880074b82b0 rbp=fffff880074b83f0
r8=0000000000000000 r9=fffff880074b83e8 r10=fffffa80148f5428
r11=0000000000000011 r12=fffff880074b83e8 r13=fffffa8014a2a4d8
r14=0000000000000000 r15=fffffa8014bb66b0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
fltmgr!GetContextFromStreamList+0x99:
fffff880`01071099 488b4820 mov rcx,qword ptr [rax+20h] ds:002b:0000000c`45476d77=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 2
CPU_MHZ: af0
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 6
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: mscorsvw.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 04-05-2020 14:42:52.0502
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff88001071099
STACK_TEXT:
fffff880`074b82b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!GetContextFromStreamList+0x99
THREAD_SHA1_HASH_MOD_FUNC: f307d5ffdbca2f48018e937348d1d5626e9a0bf9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fbe0650572cbda9711cc947e89de0bae46b36233
THREAD_SHA1_HASH_MOD: 396dd0fd4a5f9371acee565c376d380ffffdcf0e
FOLLOWUP_IP:
fltmgr!GetContextFromStreamList+99
fffff880`01071099 488b4820 mov rcx,qword ptr [rax+20h]
FAULT_INSTR_CODE: 20488b48
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: fltmgr!GetContextFromStreamList+99
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fltmgr
IMAGE_NAME: fltmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5a4991bc
IMAGE_VERSION: 6.1.7601.24000
STACK_COMMAND: .cxr 0xfffff880074b78e0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99
BUCKET_ID: X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99
PRIMARY_PROBLEM_CLASS: X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99
TARGET_TIME: 2020-04-05T00:32:23.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2020-01-03 05:56:30
BUILDDATESTAMP_STR: 200102-1707
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707
ANALYSIS_SESSION_ELAPSED_TIME: 4a3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x3b_c0000005_fltmgr!getcontextfromstreamlist+99
FAILURE_ID_HASH: {d3f1067a-bc21-41e9-5556-b8a3f1875de2}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffa8002d65d38, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff800031c25c5, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
GetUlongPtrFromAddress: unable to read from fffff800032ea300
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800
SYSTEM_MANUFACTURER: BIOSTAR Group
SYSTEM_PRODUCT_NAME: A780L3L
SYSTEM_SKU: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 080014
BIOS_DATE: 06/07/2010
BASEBOARD_MANUFACTURER: BIOSTAR Group
BASEBOARD_PRODUCT: A780L3L
DUMP_TYPE: 2
BUGCHECK_P1: fffffa8002d65d38
BUGCHECK_P2: 1
BUGCHECK_P3: fffff800031c25c5
BUGCHECK_P4: 2
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ea100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032ea2f0
GetUlongPtrFromAddress: unable to read from fffff800032ea4a8
GetPointerFromAddress: unable to read from fffff800032ea0d8
fffffa8002d65d38 Nonpaged pool
FAULTING_IP:
nt!MiRemoveMappedView+665
fffff800`031c25c5 48894108 mov qword ptr [rcx+8],rax
MM_INTERNAL_CODE: 2
CPU_COUNT: 2
CPU_MHZ: af0
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 6
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 04-05-2020 14:42:48.0493
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffff880080a9750 -- (.trap 0xfffff880080a9750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8014d65d30 rbx=0000000000000000 rcx=fffffa8002d65d30
rdx=000000000000002f rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031c25c5 rsp=fffff880080a98e0 rbp=fffffa8013dd7b50
r8=0000000000000000 r9=fffff80003245340 r10=fffff8000304d000
r11=fffff880080a97a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiRemoveMappedView+0x665:
fffff800`031c25c5 48894108 mov qword ptr [rcx+8],rax ds:fffffa80`02d65d38=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800031b8a1d to fffff800030e0ba0
STACK_TEXT:
fffff880`080a95f8 fffff800`031b8a1d : 00000000`00000050 fffffa80`02d65d38 00000000`00000001 fffff880`080a9750 : nt!KeBugCheckEx
fffff880`080a9600 fffff800`030ecc96 : 00000000`00000001 fffffa80`02d65d38 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x7dd
fffff880`080a9750 fffff800`031c25c5 : fffffa80`14510a70 00000003`00000000 fffffa80`14ddf010 e2a00000`22d08c24 : nt!KiPageFault+0x356
fffff880`080a98e0 fffff800`03339971 : fffffa80`14510a70 00000000`00000000 00000000`00000000 fffffa80`1507b000 : nt!MiRemoveMappedView+0x665
fffff880`080a9a20 fffff800`0333a1b5 : 00000000`00000000 00000000`00000000 fffff8a0`00000001 fffff8a0`08badad0 : nt!MiUnmapViewOfSection+0x1b1
fffff880`080a9ae0 fffff800`03339d48 : fffff8a0`08badab0 00000000`00000000 fffff800`0322eed8 00000000`00000001 : nt!AlpcpViewDestroyProcedure+0x205
fffff880`080a9b80 fffff800`0331f5de : fffff8a0`08badad0 00000000`ffffffff 00000000`ffffffff 00000000`00000000 : nt!AlpcpDestroyBlob+0x28
fffff880`080a9bb0 fffff800`030eebd3 : fffffa80`13dd7b50 fffff880`080a9ca0 00000000`00000001 fffffa80`15a16e60 : nt!NtAlpcDeleteSectionView+0x142
fffff880`080a9c20 00000000`778da04a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0838db68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778da04a
THREAD_SHA1_HASH_MOD_FUNC: 6e5ddee051ba85d335b443d2754efe0aedfca7dd
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: daabdd3ffb16cecbe11a8dcae15c913ed79d1fa2
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!MiRemoveMappedView+665
fffff800`031c25c5 48894108 mov qword ptr [rcx+8],rax
FAULT_INSTR_CODE: 8418948
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiRemoveMappedView+665
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5c6e1cbd
IMAGE_VERSION: 6.1.7601.24384
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiRemoveMappedView+665
BUCKET_ID: X64_0x50_nt!MiRemoveMappedView+665
PRIMARY_PROBLEM_CLASS: X64_0x50_nt!MiRemoveMappedView+665
TARGET_TIME: 2020-04-04T18:24:24.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-02-21 06:36:29
BUILDDATESTAMP_STR: 190220-1800
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800
ANALYSIS_SESSION_ELAPSED_TIME: 4ec
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x50_nt!miremovemappedview+665
FAILURE_ID_HASH: {e393b9e1-1039-22c6-d42f-3f761a9c0bc2}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041289, The subtype of the bugcheck.
Arg2: 000007fee00b5001
Arg3: 00000000000011fe
Arg4: 000007fef50b5005
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800036eb300
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707
SYSTEM_MANUFACTURER: BIOSTAR Group
SYSTEM_PRODUCT_NAME: A780L3L
SYSTEM_SKU: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 080014
BIOS_DATE: 06/07/2010
BASEBOARD_MANUFACTURER: BIOSTAR Group
BASEBOARD_PRODUCT: A780L3L
DUMP_TYPE: 2
BUGCHECK_P1: 41289
BUGCHECK_P2: 7fee00b5001
BUGCHECK_P3: 11fe
BUGCHECK_P4: 7fef50b5005
BUGCHECK_STR: 0x1a_41289
CPU_COUNT: 2
CPU_MHZ: af0
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 6
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 04-05-2020 14:42:56.0511
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff800034c9583 to fffff800034e1ea0
STACK_TEXT:
fffff880`065ca958 fffff800`034c9583 : 00000000`0000001a 00000000`00041289 000007fe`e00b5001 00000000`000011fe : nt!KeBugCheckEx
fffff880`065ca960 fffff800`035653cc : 9fe00000`286d8025 fffff700`01080488 00000000`00000000 fffff800`034dae8d : nt!MiLocateWsle+0x1a3
fffff880`065ca9a0 fffff800`0346e509 : 9fe00000`286d8025 00800000`ac35f867 fffffa80`145935c0 00000000`00000000 : nt!MiGetPageProtection+0x17c
fffff880`065ca9f0 fffff800`0346e8fa : fffffa80`15c14640 fffff880`065caca0 fffffa80`15d138e0 fffff880`065caac0 : nt!MiQueryAddressState+0x3c9
fffff880`065caa50 fffff800`03726a24 : 000007ff`00000002 000007fe`e00b6000 fffffa80`145935c0 fffff880`00000000 : nt!MiQueryAddressSpan+0xba
fffff880`065caac0 fffff800`034eff53 : 00000000`00000150 fffffa80`15c14640 fffffa80`00000000 00000000`0639eab8 : nt!NtQueryVirtualMemory+0x3a4
fffff880`065cabb0 00000000`76e899da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0639ea98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e899da
THREAD_SHA1_HASH_MOD_FUNC: a866488ff7b38511d6e788204cea80a35086eb07
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 59f3a2b2e18e2c15b4d21fabc7ac5e6ac0b22442
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!MiLocateWsle+1a3
fffff800`034c9583 cc int 3
FAULT_INSTR_CODE: 4a05ffcc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiLocateWsle+1a3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5e0ead5e
IMAGE_VERSION: 6.1.7601.24545
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_41289_nt!MiLocateWsle+1a3
BUCKET_ID: X64_0x1a_41289_nt!MiLocateWsle+1a3
PRIMARY_PROBLEM_CLASS: X64_0x1a_41289_nt!MiLocateWsle+1a3
TARGET_TIME: 2020-04-05T00:15:22.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2020-01-03 05:56:30
BUILDDATESTAMP_STR: 200102-1707
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707
ANALYSIS_SESSION_ELAPSED_TIME: 49b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x1a_41289_nt!milocatewsle+1a3
FAILURE_ID_HASH: {2479382f-1d0b-5bd2-6e8b-e4504bcc209c}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88001071099, Address of the instruction which caused the bugcheck
Arg3: fffff880074b78e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800036ec300
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707
SYSTEM_MANUFACTURER: BIOSTAR Group
SYSTEM_PRODUCT_NAME: A780L3L
SYSTEM_SKU: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 080014
BIOS_DATE: 06/07/2010
BASEBOARD_MANUFACTURER: BIOSTAR Group
BASEBOARD_PRODUCT: A780L3L
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff88001071099
BUGCHECK_P3: fffff880074b78e0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
fltmgr!GetContextFromStreamList+99
fffff880`01071099 488b4820 mov rcx,qword ptr [rax+20h]
CONTEXT: fffff880074b78e0 -- (.cxr 0xfffff880074b78e0)
rax=0000000c45476d57 rbx=0000000000000000 rcx=0000000c45476d57
rdx=fffffa8014bb66b0 rsi=fffffa80148f5470 rdi=fffffa80148f5420
rip=fffff88001071099 rsp=fffff880074b82b0 rbp=fffff880074b83f0
r8=0000000000000000 r9=fffff880074b83e8 r10=fffffa80148f5428
r11=0000000000000011 r12=fffff880074b83e8 r13=fffffa8014a2a4d8
r14=0000000000000000 r15=fffffa8014bb66b0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
fltmgr!GetContextFromStreamList+0x99:
fffff880`01071099 488b4820 mov rcx,qword ptr [rax+20h] ds:002b:0000000c`45476d77=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 2
CPU_MHZ: af0
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 6
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: mscorsvw.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 04-05-2020 14:42:52.0502
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff88001071099
STACK_TEXT:
fffff880`074b82b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!GetContextFromStreamList+0x99
THREAD_SHA1_HASH_MOD_FUNC: f307d5ffdbca2f48018e937348d1d5626e9a0bf9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fbe0650572cbda9711cc947e89de0bae46b36233
THREAD_SHA1_HASH_MOD: 396dd0fd4a5f9371acee565c376d380ffffdcf0e
FOLLOWUP_IP:
fltmgr!GetContextFromStreamList+99
fffff880`01071099 488b4820 mov rcx,qword ptr [rax+20h]
FAULT_INSTR_CODE: 20488b48
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: fltmgr!GetContextFromStreamList+99
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fltmgr
IMAGE_NAME: fltmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5a4991bc
IMAGE_VERSION: 6.1.7601.24000
STACK_COMMAND: .cxr 0xfffff880074b78e0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99
BUCKET_ID: X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99
PRIMARY_PROBLEM_CLASS: X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99
TARGET_TIME: 2020-04-05T00:32:23.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2020-01-03 05:56:30
BUILDDATESTAMP_STR: 200102-1707
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707
ANALYSIS_SESSION_ELAPSED_TIME: 4a3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x3b_c0000005_fltmgr!getcontextfromstreamlist+99
FAILURE_ID_HASH: {d3f1067a-bc21-41e9-5556-b8a3f1875de2}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffa8002d65d38, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff800031c25c5, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
GetUlongPtrFromAddress: unable to read from fffff800032ea300
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800
SYSTEM_MANUFACTURER: BIOSTAR Group
SYSTEM_PRODUCT_NAME: A780L3L
SYSTEM_SKU: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 080014
BIOS_DATE: 06/07/2010
BASEBOARD_MANUFACTURER: BIOSTAR Group
BASEBOARD_PRODUCT: A780L3L
DUMP_TYPE: 2
BUGCHECK_P1: fffffa8002d65d38
BUGCHECK_P2: 1
BUGCHECK_P3: fffff800031c25c5
BUGCHECK_P4: 2
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ea100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032ea2f0
GetUlongPtrFromAddress: unable to read from fffff800032ea4a8
GetPointerFromAddress: unable to read from fffff800032ea0d8
fffffa8002d65d38 Nonpaged pool
FAULTING_IP:
nt!MiRemoveMappedView+665
fffff800`031c25c5 48894108 mov qword ptr [rcx+8],rax
MM_INTERNAL_CODE: 2
CPU_COUNT: 2
CPU_MHZ: af0
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 6
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 04-05-2020 14:42:48.0493
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffff880080a9750 -- (.trap 0xfffff880080a9750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8014d65d30 rbx=0000000000000000 rcx=fffffa8002d65d30
rdx=000000000000002f rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031c25c5 rsp=fffff880080a98e0 rbp=fffffa8013dd7b50
r8=0000000000000000 r9=fffff80003245340 r10=fffff8000304d000
r11=fffff880080a97a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiRemoveMappedView+0x665:
fffff800`031c25c5 48894108 mov qword ptr [rcx+8],rax ds:fffffa80`02d65d38=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800031b8a1d to fffff800030e0ba0
STACK_TEXT:
fffff880`080a95f8 fffff800`031b8a1d : 00000000`00000050 fffffa80`02d65d38 00000000`00000001 fffff880`080a9750 : nt!KeBugCheckEx
fffff880`080a9600 fffff800`030ecc96 : 00000000`00000001 fffffa80`02d65d38 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x7dd
fffff880`080a9750 fffff800`031c25c5 : fffffa80`14510a70 00000003`00000000 fffffa80`14ddf010 e2a00000`22d08c24 : nt!KiPageFault+0x356
fffff880`080a98e0 fffff800`03339971 : fffffa80`14510a70 00000000`00000000 00000000`00000000 fffffa80`1507b000 : nt!MiRemoveMappedView+0x665
fffff880`080a9a20 fffff800`0333a1b5 : 00000000`00000000 00000000`00000000 fffff8a0`00000001 fffff8a0`08badad0 : nt!MiUnmapViewOfSection+0x1b1
fffff880`080a9ae0 fffff800`03339d48 : fffff8a0`08badab0 00000000`00000000 fffff800`0322eed8 00000000`00000001 : nt!AlpcpViewDestroyProcedure+0x205
fffff880`080a9b80 fffff800`0331f5de : fffff8a0`08badad0 00000000`ffffffff 00000000`ffffffff 00000000`00000000 : nt!AlpcpDestroyBlob+0x28
fffff880`080a9bb0 fffff800`030eebd3 : fffffa80`13dd7b50 fffff880`080a9ca0 00000000`00000001 fffffa80`15a16e60 : nt!NtAlpcDeleteSectionView+0x142
fffff880`080a9c20 00000000`778da04a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0838db68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778da04a
THREAD_SHA1_HASH_MOD_FUNC: 6e5ddee051ba85d335b443d2754efe0aedfca7dd
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: daabdd3ffb16cecbe11a8dcae15c913ed79d1fa2
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!MiRemoveMappedView+665
fffff800`031c25c5 48894108 mov qword ptr [rcx+8],rax
FAULT_INSTR_CODE: 8418948
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiRemoveMappedView+665
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5c6e1cbd
IMAGE_VERSION: 6.1.7601.24384
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiRemoveMappedView+665
BUCKET_ID: X64_0x50_nt!MiRemoveMappedView+665
PRIMARY_PROBLEM_CLASS: X64_0x50_nt!MiRemoveMappedView+665
TARGET_TIME: 2020-04-04T18:24:24.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-02-21 06:36:29
BUILDDATESTAMP_STR: 190220-1800
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800
ANALYSIS_SESSION_ELAPSED_TIME: 4ec
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x50_nt!miremovemappedview+665
FAILURE_ID_HASH: {e393b9e1-1039-22c6-d42f-3f761a9c0bc2}
Followup: MachineOwner
---------
Memtest86 testi yapar mısın?
Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041289, The subtype of the bugcheck. Arg2: 000007fee00b5001 Arg3: 00000000000011fe Arg4: 000007fef50b5005 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800036eb300 KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707 SYSTEM_MANUFACTURER: BIOSTAR Group SYSTEM_PRODUCT_NAME: A780L3L SYSTEM_SKU: To Be Filled By O.E.M. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 080014 BIOS_DATE: 06/07/2010 BASEBOARD_MANUFACTURER: BIOSTAR Group BASEBOARD_PRODUCT: A780L3L DUMP_TYPE: 2 BUGCHECK_P1: 41289 BUGCHECK_P2: 7fee00b5001 BUGCHECK_P3: 11fe BUGCHECK_P4: 7fef50b5005 BUGCHECK_STR: 0x1a_41289 CPU_COUNT: 2 CPU_MHZ: af0 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 10 CPU_MODEL: 6 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT PROCESS_NAME: chrome.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E ANALYSIS_SESSION_TIME: 04-05-2020 14:42:56.0511 ANALYSIS_VERSION: 10.0.18362.1 amd64fre LAST_CONTROL_TRANSFER: from fffff800034c9583 to fffff800034e1ea0 STACK_TEXT: fffff880`065ca958 fffff800`034c9583 : 00000000`0000001a 00000000`00041289 000007fe`e00b5001 00000000`000011fe : nt!KeBugCheckEx fffff880`065ca960 fffff800`035653cc : 9fe00000`286d8025 fffff700`01080488 00000000`00000000 fffff800`034dae8d : nt!MiLocateWsle+0x1a3 fffff880`065ca9a0 fffff800`0346e509 : 9fe00000`286d8025 00800000`ac35f867 fffffa80`145935c0 00000000`00000000 : nt!MiGetPageProtection+0x17c fffff880`065ca9f0 fffff800`0346e8fa : fffffa80`15c14640 fffff880`065caca0 fffffa80`15d138e0 fffff880`065caac0 : nt!MiQueryAddressState+0x3c9 fffff880`065caa50 fffff800`03726a24 : 000007ff`00000002 000007fe`e00b6000 fffffa80`145935c0 fffff880`00000000 : nt!MiQueryAddressSpan+0xba fffff880`065caac0 fffff800`034eff53 : 00000000`00000150 fffffa80`15c14640 fffffa80`00000000 00000000`0639eab8 : nt!NtQueryVirtualMemory+0x3a4 fffff880`065cabb0 00000000`76e899da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0639ea98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e899da THREAD_SHA1_HASH_MOD_FUNC: a866488ff7b38511d6e788204cea80a35086eb07 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 59f3a2b2e18e2c15b4d21fabc7ac5e6ac0b22442 THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6 FOLLOWUP_IP: nt!MiLocateWsle+1a3 fffff800`034c9583 cc int 3 FAULT_INSTR_CODE: 4a05ffcc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!MiLocateWsle+1a3 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 5e0ead5e IMAGE_VERSION: 6.1.7601.24545 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x1a_41289_nt!MiLocateWsle+1a3 BUCKET_ID: X64_0x1a_41289_nt!MiLocateWsle+1a3 PRIMARY_PROBLEM_CLASS: X64_0x1a_41289_nt!MiLocateWsle+1a3 TARGET_TIME: 2020-04-05T00:15:22.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2020-01-03 05:56:30 BUILDDATESTAMP_STR: 200102-1707 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707 ANALYSIS_SESSION_ELAPSED_TIME: 49b ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x1a_41289_nt!milocatewsle+1a3 FAILURE_ID_HASH: {2479382f-1d0b-5bd2-6e8b-e4504bcc209c} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff88001071099, Address of the instruction which caused the bugcheck Arg3: fffff880074b78e0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800036ec300 KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707 SYSTEM_MANUFACTURER: BIOSTAR Group SYSTEM_PRODUCT_NAME: A780L3L SYSTEM_SKU: To Be Filled By O.E.M. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 080014 BIOS_DATE: 06/07/2010 BASEBOARD_MANUFACTURER: BIOSTAR Group BASEBOARD_PRODUCT: A780L3L DUMP_TYPE: 2 BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff88001071099 BUGCHECK_P3: fffff880074b78e0 BUGCHECK_P4: 0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: fltmgr!GetContextFromStreamList+99 fffff880`01071099 488b4820 mov rcx,qword ptr [rax+20h] CONTEXT: fffff880074b78e0 -- (.cxr 0xfffff880074b78e0) rax=0000000c45476d57 rbx=0000000000000000 rcx=0000000c45476d57 rdx=fffffa8014bb66b0 rsi=fffffa80148f5470 rdi=fffffa80148f5420 rip=fffff88001071099 rsp=fffff880074b82b0 rbp=fffff880074b83f0 r8=0000000000000000 r9=fffff880074b83e8 r10=fffffa80148f5428 r11=0000000000000011 r12=fffff880074b83e8 r13=fffffa8014a2a4d8 r14=0000000000000000 r15=fffffa8014bb66b0 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 fltmgr!GetContextFromStreamList+0x99: fffff880`01071099 488b4820 mov rcx,qword ptr [rax+20h] ds:002b:0000000c`45476d77=???????????????? Resetting default scope BUGCHECK_STR: 0x3B_c0000005 CPU_COUNT: 2 CPU_MHZ: af0 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 10 CPU_MODEL: 6 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT PROCESS_NAME: mscorsvw.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E ANALYSIS_SESSION_TIME: 04-05-2020 14:42:52.0502 ANALYSIS_VERSION: 10.0.18362.1 amd64fre LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff88001071099 STACK_TEXT: fffff880`074b82b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!GetContextFromStreamList+0x99 THREAD_SHA1_HASH_MOD_FUNC: f307d5ffdbca2f48018e937348d1d5626e9a0bf9 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fbe0650572cbda9711cc947e89de0bae46b36233 THREAD_SHA1_HASH_MOD: 396dd0fd4a5f9371acee565c376d380ffffdcf0e FOLLOWUP_IP: fltmgr!GetContextFromStreamList+99 fffff880`01071099 488b4820 mov rcx,qword ptr [rax+20h] FAULT_INSTR_CODE: 20488b48 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: fltmgr!GetContextFromStreamList+99 FOLLOWUP_NAME: MachineOwner MODULE_NAME: fltmgr IMAGE_NAME: fltmgr.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5a4991bc IMAGE_VERSION: 6.1.7601.24000 STACK_COMMAND: .cxr 0xfffff880074b78e0 ; kb FAILURE_BUCKET_ID: X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99 BUCKET_ID: X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99 PRIMARY_PROBLEM_CLASS: X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99 TARGET_TIME: 2020-04-05T00:32:23.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2020-01-03 05:56:30 BUILDDATESTAMP_STR: 200102-1707 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707 ANALYSIS_SESSION_ELAPSED_TIME: 4a3 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x3b_c0000005_fltmgr!getcontextfromstreamlist+99 FAILURE_ID_HASH: {d3f1067a-bc21-41e9-5556-b8a3f1875de2} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffffa8002d65d38, memory referenced. Arg2: 0000000000000001, value 0 = read operation, 1 = write operation. Arg3: fffff800031c25c5, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name GetUlongPtrFromAddress: unable to read from fffff800032ea300 KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800 SYSTEM_MANUFACTURER: BIOSTAR Group SYSTEM_PRODUCT_NAME: A780L3L SYSTEM_SKU: To Be Filled By O.E.M. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 080014 BIOS_DATE: 06/07/2010 BASEBOARD_MANUFACTURER: BIOSTAR Group BASEBOARD_PRODUCT: A780L3L DUMP_TYPE: 2 BUGCHECK_P1: fffffa8002d65d38 BUGCHECK_P2: 1 BUGCHECK_P3: fffff800031c25c5 BUGCHECK_P4: 2 WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ea100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800032ea2f0 GetUlongPtrFromAddress: unable to read from fffff800032ea4a8 GetPointerFromAddress: unable to read from fffff800032ea0d8 fffffa8002d65d38 Nonpaged pool FAULTING_IP: nt!MiRemoveMappedView+665 fffff800`031c25c5 48894108 mov qword ptr [rcx+8],rax MM_INTERNAL_CODE: 2 CPU_COUNT: 2 CPU_MHZ: af0 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 10 CPU_MODEL: 6 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E ANALYSIS_SESSION_TIME: 04-05-2020 14:42:48.0493 ANALYSIS_VERSION: 10.0.18362.1 amd64fre TRAP_FRAME: fffff880080a9750 -- (.trap 0xfffff880080a9750) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa8014d65d30 rbx=0000000000000000 rcx=fffffa8002d65d30 rdx=000000000000002f rsi=0000000000000000 rdi=0000000000000000 rip=fffff800031c25c5 rsp=fffff880080a98e0 rbp=fffffa8013dd7b50 r8=0000000000000000 r9=fffff80003245340 r10=fffff8000304d000 r11=fffff880080a97a0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!MiRemoveMappedView+0x665: fffff800`031c25c5 48894108 mov qword ptr [rcx+8],rax ds:fffffa80`02d65d38=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800031b8a1d to fffff800030e0ba0 STACK_TEXT: fffff880`080a95f8 fffff800`031b8a1d : 00000000`00000050 fffffa80`02d65d38 00000000`00000001 fffff880`080a9750 : nt!KeBugCheckEx fffff880`080a9600 fffff800`030ecc96 : 00000000`00000001 fffffa80`02d65d38 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x7dd fffff880`080a9750 fffff800`031c25c5 : fffffa80`14510a70 00000003`00000000 fffffa80`14ddf010 e2a00000`22d08c24 : nt!KiPageFault+0x356 fffff880`080a98e0 fffff800`03339971 : fffffa80`14510a70 00000000`00000000 00000000`00000000 fffffa80`1507b000 : nt!MiRemoveMappedView+0x665 fffff880`080a9a20 fffff800`0333a1b5 : 00000000`00000000 00000000`00000000 fffff8a0`00000001 fffff8a0`08badad0 : nt!MiUnmapViewOfSection+0x1b1 fffff880`080a9ae0 fffff800`03339d48 : fffff8a0`08badab0 00000000`00000000 fffff800`0322eed8 00000000`00000001 : nt!AlpcpViewDestroyProcedure+0x205 fffff880`080a9b80 fffff800`0331f5de : fffff8a0`08badad0 00000000`ffffffff 00000000`ffffffff 00000000`00000000 : nt!AlpcpDestroyBlob+0x28 fffff880`080a9bb0 fffff800`030eebd3 : fffffa80`13dd7b50 fffff880`080a9ca0 00000000`00000001 fffffa80`15a16e60 : nt!NtAlpcDeleteSectionView+0x142 fffff880`080a9c20 00000000`778da04a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0838db68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778da04a THREAD_SHA1_HASH_MOD_FUNC: 6e5ddee051ba85d335b443d2754efe0aedfca7dd THREAD_SHA1_HASH_MOD_FUNC_OFFSET: daabdd3ffb16cecbe11a8dcae15c913ed79d1fa2 THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe FOLLOWUP_IP: nt!MiRemoveMappedView+665 fffff800`031c25c5 48894108 mov qword ptr [rcx+8],rax FAULT_INSTR_CODE: 8418948 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiRemoveMappedView+665 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 5c6e1cbd IMAGE_VERSION: 6.1.7601.24384 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x50_nt!MiRemoveMappedView+665 BUCKET_ID: X64_0x50_nt!MiRemoveMappedView+665 PRIMARY_PROBLEM_CLASS: X64_0x50_nt!MiRemoveMappedView+665 TARGET_TIME: 2020-04-04T18:24:24.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-02-21 06:36:29 BUILDDATESTAMP_STR: 190220-1800 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800 ANALYSIS_SESSION_ELAPSED_TIME: 4ec ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x50_nt!miremovemappedview+665 FAILURE_ID_HASH: {e393b9e1-1039-22c6-d42f-3f761a9c0bc2} Followup: MachineOwner ---------
Evet sıkıntı var.
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.