Çözüldü MEMORY_MANAGEMENT mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

AXSENS

Hectopat
Katılım
29 Ocak 2020
Mesajlar
348
Makaleler
1
Çözümler
2
Minidump

Sistemim:

Anakart: BIOSTAR A780L3L RAM: 4 GB 1333 MHz DDR3 İşlemci: AMD athelon II X2 240 Ekran kartı: Radeon HD 7850 2 GB
HDD: 750 GB 7200 RPM PSU: 500W Monitör: 1920x1080 60Hz
 
Son düzenleyen: Moderatör:
Çözüm
Memtest86 testi yapar mısın?


Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041289, The subtype of the bugcheck.
Arg2: 000007fee00b5001
Arg3: 00000000000011fe
Arg4: 000007fef50b5005

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800036eb300

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707

SYSTEM_MANUFACTURER:  BIOSTAR Group

SYSTEM_PRODUCT_NAME:  A780L3L

SYSTEM_SKU:  To Be Filled By O.E.M.

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  080014

BIOS_DATE:  06/07/2010

BASEBOARD_MANUFACTURER:  BIOSTAR Group

BASEBOARD_PRODUCT:  A780L3L

DUMP_TYPE:  2

BUGCHECK_P1: 41289

BUGCHECK_P2: 7fee00b5001

BUGCHECK_P3: 11fe

BUGCHECK_P4: 7fef50b5005

BUGCHECK_STR:  0x1a_41289

CPU_COUNT: 2

CPU_MHZ: af0

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 6

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-05-2020 14:42:56.0511

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff800034c9583 to fffff800034e1ea0

STACK_TEXT: 
fffff880`065ca958 fffff800`034c9583 : 00000000`0000001a 00000000`00041289 000007fe`e00b5001 00000000`000011fe : nt!KeBugCheckEx
fffff880`065ca960 fffff800`035653cc : 9fe00000`286d8025 fffff700`01080488 00000000`00000000 fffff800`034dae8d : nt!MiLocateWsle+0x1a3
fffff880`065ca9a0 fffff800`0346e509 : 9fe00000`286d8025 00800000`ac35f867 fffffa80`145935c0 00000000`00000000 : nt!MiGetPageProtection+0x17c
fffff880`065ca9f0 fffff800`0346e8fa : fffffa80`15c14640 fffff880`065caca0 fffffa80`15d138e0 fffff880`065caac0 : nt!MiQueryAddressState+0x3c9
fffff880`065caa50 fffff800`03726a24 : 000007ff`00000002 000007fe`e00b6000 fffffa80`145935c0 fffff880`00000000 : nt!MiQueryAddressSpan+0xba
fffff880`065caac0 fffff800`034eff53 : 00000000`00000150 fffffa80`15c14640 fffffa80`00000000 00000000`0639eab8 : nt!NtQueryVirtualMemory+0x3a4
fffff880`065cabb0 00000000`76e899da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0639ea98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e899da


THREAD_SHA1_HASH_MOD_FUNC:  a866488ff7b38511d6e788204cea80a35086eb07

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  59f3a2b2e18e2c15b4d21fabc7ac5e6ac0b22442

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!MiLocateWsle+1a3
fffff800`034c9583 cc              int     3

FAULT_INSTR_CODE:  4a05ffcc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiLocateWsle+1a3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e0ead5e

IMAGE_VERSION:  6.1.7601.24545

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_41289_nt!MiLocateWsle+1a3

BUCKET_ID:  X64_0x1a_41289_nt!MiLocateWsle+1a3

PRIMARY_PROBLEM_CLASS:  X64_0x1a_41289_nt!MiLocateWsle+1a3

TARGET_TIME:  2020-04-05T00:15:22.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2020-01-03 05:56:30

BUILDDATESTAMP_STR:  200102-1707

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707

ANALYSIS_SESSION_ELAPSED_TIME:  49b

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_41289_nt!milocatewsle+1a3

FAILURE_ID_HASH:  {2479382f-1d0b-5bd2-6e8b-e4504bcc209c}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88001071099, Address of the instruction which caused the bugcheck
Arg3: fffff880074b78e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800036ec300

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707

SYSTEM_MANUFACTURER:  BIOSTAR Group

SYSTEM_PRODUCT_NAME:  A780L3L

SYSTEM_SKU:  To Be Filled By O.E.M.

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  080014

BIOS_DATE:  06/07/2010

BASEBOARD_MANUFACTURER:  BIOSTAR Group

BASEBOARD_PRODUCT:  A780L3L

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff88001071099

BUGCHECK_P3: fffff880074b78e0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
fltmgr!GetContextFromStreamList+99
fffff880`01071099 488b4820        mov     rcx,qword ptr [rax+20h]

CONTEXT:  fffff880074b78e0 -- (.cxr 0xfffff880074b78e0)
rax=0000000c45476d57 rbx=0000000000000000 rcx=0000000c45476d57
rdx=fffffa8014bb66b0 rsi=fffffa80148f5470 rdi=fffffa80148f5420
rip=fffff88001071099 rsp=fffff880074b82b0 rbp=fffff880074b83f0
 r8=0000000000000000  r9=fffff880074b83e8 r10=fffffa80148f5428
r11=0000000000000011 r12=fffff880074b83e8 r13=fffffa8014a2a4d8
r14=0000000000000000 r15=fffffa8014bb66b0
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
fltmgr!GetContextFromStreamList+0x99:
fffff880`01071099 488b4820        mov     rcx,qword ptr [rax+20h] ds:002b:0000000c`45476d77=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 2

CPU_MHZ: af0

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 6

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  mscorsvw.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-05-2020 14:42:52.0502

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff88001071099

STACK_TEXT: 
fffff880`074b82b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!GetContextFromStreamList+0x99


THREAD_SHA1_HASH_MOD_FUNC:  f307d5ffdbca2f48018e937348d1d5626e9a0bf9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  fbe0650572cbda9711cc947e89de0bae46b36233

THREAD_SHA1_HASH_MOD:  396dd0fd4a5f9371acee565c376d380ffffdcf0e

FOLLOWUP_IP:
fltmgr!GetContextFromStreamList+99
fffff880`01071099 488b4820        mov     rcx,qword ptr [rax+20h]

FAULT_INSTR_CODE:  20488b48

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  fltmgr!GetContextFromStreamList+99

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: fltmgr

IMAGE_NAME:  fltmgr.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5a4991bc

IMAGE_VERSION:  6.1.7601.24000

STACK_COMMAND:  .cxr 0xfffff880074b78e0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99

BUCKET_ID:  X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99

PRIMARY_PROBLEM_CLASS:  X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99

TARGET_TIME:  2020-04-05T00:32:23.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2020-01-03 05:56:30

BUILDDATESTAMP_STR:  200102-1707

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707

ANALYSIS_SESSION_ELAPSED_TIME:  4a3

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x3b_c0000005_fltmgr!getcontextfromstreamlist+99

FAILURE_ID_HASH:  {d3f1067a-bc21-41e9-5556-b8a3f1875de2}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffa8002d65d38, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff800031c25c5, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
GetUlongPtrFromAddress: unable to read from fffff800032ea300

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800

SYSTEM_MANUFACTURER:  BIOSTAR Group

SYSTEM_PRODUCT_NAME:  A780L3L

SYSTEM_SKU:  To Be Filled By O.E.M.

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  080014

BIOS_DATE:  06/07/2010

BASEBOARD_MANUFACTURER:  BIOSTAR Group

BASEBOARD_PRODUCT:  A780L3L

DUMP_TYPE:  2

BUGCHECK_P1: fffffa8002d65d38

BUGCHECK_P2: 1

BUGCHECK_P3: fffff800031c25c5

BUGCHECK_P4: 2

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ea100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032ea2f0
GetUlongPtrFromAddress: unable to read from fffff800032ea4a8
GetPointerFromAddress: unable to read from fffff800032ea0d8
 fffffa8002d65d38 Nonpaged pool

FAULTING_IP:
nt!MiRemoveMappedView+665
fffff800`031c25c5 48894108        mov     qword ptr [rcx+8],rax

MM_INTERNAL_CODE:  2

CPU_COUNT: 2

CPU_MHZ: af0

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 6

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-05-2020 14:42:48.0493

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff880080a9750 -- (.trap 0xfffff880080a9750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8014d65d30 rbx=0000000000000000 rcx=fffffa8002d65d30
rdx=000000000000002f rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031c25c5 rsp=fffff880080a98e0 rbp=fffffa8013dd7b50
 r8=0000000000000000  r9=fffff80003245340 r10=fffff8000304d000
r11=fffff880080a97a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiRemoveMappedView+0x665:
fffff800`031c25c5 48894108        mov     qword ptr [rcx+8],rax ds:fffffa80`02d65d38=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800031b8a1d to fffff800030e0ba0

STACK_TEXT: 
fffff880`080a95f8 fffff800`031b8a1d : 00000000`00000050 fffffa80`02d65d38 00000000`00000001 fffff880`080a9750 : nt!KeBugCheckEx
fffff880`080a9600 fffff800`030ecc96 : 00000000`00000001 fffffa80`02d65d38 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x7dd
fffff880`080a9750 fffff800`031c25c5 : fffffa80`14510a70 00000003`00000000 fffffa80`14ddf010 e2a00000`22d08c24 : nt!KiPageFault+0x356
fffff880`080a98e0 fffff800`03339971 : fffffa80`14510a70 00000000`00000000 00000000`00000000 fffffa80`1507b000 : nt!MiRemoveMappedView+0x665
fffff880`080a9a20 fffff800`0333a1b5 : 00000000`00000000 00000000`00000000 fffff8a0`00000001 fffff8a0`08badad0 : nt!MiUnmapViewOfSection+0x1b1
fffff880`080a9ae0 fffff800`03339d48 : fffff8a0`08badab0 00000000`00000000 fffff800`0322eed8 00000000`00000001 : nt!AlpcpViewDestroyProcedure+0x205
fffff880`080a9b80 fffff800`0331f5de : fffff8a0`08badad0 00000000`ffffffff 00000000`ffffffff 00000000`00000000 : nt!AlpcpDestroyBlob+0x28
fffff880`080a9bb0 fffff800`030eebd3 : fffffa80`13dd7b50 fffff880`080a9ca0 00000000`00000001 fffffa80`15a16e60 : nt!NtAlpcDeleteSectionView+0x142
fffff880`080a9c20 00000000`778da04a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0838db68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778da04a


THREAD_SHA1_HASH_MOD_FUNC:  6e5ddee051ba85d335b443d2754efe0aedfca7dd

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  daabdd3ffb16cecbe11a8dcae15c913ed79d1fa2

THREAD_SHA1_HASH_MOD:  9f457f347057f10e1df248e166a3e95e6570ecfe

FOLLOWUP_IP:
nt!MiRemoveMappedView+665
fffff800`031c25c5 48894108        mov     qword ptr [rcx+8],rax

FAULT_INSTR_CODE:  8418948

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiRemoveMappedView+665

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5c6e1cbd

IMAGE_VERSION:  6.1.7601.24384

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x50_nt!MiRemoveMappedView+665

BUCKET_ID:  X64_0x50_nt!MiRemoveMappedView+665

PRIMARY_PROBLEM_CLASS:  X64_0x50_nt!MiRemoveMappedView+665

TARGET_TIME:  2020-04-04T18:24:24.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-02-21 06:36:29

BUILDDATESTAMP_STR:  190220-1800

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800

ANALYSIS_SESSION_ELAPSED_TIME:  4ec

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x50_nt!miremovemappedview+665

FAILURE_ID_HASH:  {e393b9e1-1039-22c6-d42f-3f761a9c0bc2}

Followup:     MachineOwner
---------
1586085753375.png
 
Memtest86 testi yapar mısın?


Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041289, The subtype of the bugcheck.
Arg2: 000007fee00b5001
Arg3: 00000000000011fe
Arg4: 000007fef50b5005

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800036eb300

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707

SYSTEM_MANUFACTURER:  BIOSTAR Group

SYSTEM_PRODUCT_NAME:  A780L3L

SYSTEM_SKU:  To Be Filled By O.E.M.

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  080014

BIOS_DATE:  06/07/2010

BASEBOARD_MANUFACTURER:  BIOSTAR Group

BASEBOARD_PRODUCT:  A780L3L

DUMP_TYPE:  2

BUGCHECK_P1: 41289

BUGCHECK_P2: 7fee00b5001

BUGCHECK_P3: 11fe

BUGCHECK_P4: 7fef50b5005

BUGCHECK_STR:  0x1a_41289

CPU_COUNT: 2

CPU_MHZ: af0

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 6

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-05-2020 14:42:56.0511

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff800034c9583 to fffff800034e1ea0

STACK_TEXT: 
fffff880`065ca958 fffff800`034c9583 : 00000000`0000001a 00000000`00041289 000007fe`e00b5001 00000000`000011fe : nt!KeBugCheckEx
fffff880`065ca960 fffff800`035653cc : 9fe00000`286d8025 fffff700`01080488 00000000`00000000 fffff800`034dae8d : nt!MiLocateWsle+0x1a3
fffff880`065ca9a0 fffff800`0346e509 : 9fe00000`286d8025 00800000`ac35f867 fffffa80`145935c0 00000000`00000000 : nt!MiGetPageProtection+0x17c
fffff880`065ca9f0 fffff800`0346e8fa : fffffa80`15c14640 fffff880`065caca0 fffffa80`15d138e0 fffff880`065caac0 : nt!MiQueryAddressState+0x3c9
fffff880`065caa50 fffff800`03726a24 : 000007ff`00000002 000007fe`e00b6000 fffffa80`145935c0 fffff880`00000000 : nt!MiQueryAddressSpan+0xba
fffff880`065caac0 fffff800`034eff53 : 00000000`00000150 fffffa80`15c14640 fffffa80`00000000 00000000`0639eab8 : nt!NtQueryVirtualMemory+0x3a4
fffff880`065cabb0 00000000`76e899da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0639ea98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e899da


THREAD_SHA1_HASH_MOD_FUNC:  a866488ff7b38511d6e788204cea80a35086eb07

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  59f3a2b2e18e2c15b4d21fabc7ac5e6ac0b22442

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!MiLocateWsle+1a3
fffff800`034c9583 cc              int     3

FAULT_INSTR_CODE:  4a05ffcc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiLocateWsle+1a3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e0ead5e

IMAGE_VERSION:  6.1.7601.24545

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_41289_nt!MiLocateWsle+1a3

BUCKET_ID:  X64_0x1a_41289_nt!MiLocateWsle+1a3

PRIMARY_PROBLEM_CLASS:  X64_0x1a_41289_nt!MiLocateWsle+1a3

TARGET_TIME:  2020-04-05T00:15:22.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2020-01-03 05:56:30

BUILDDATESTAMP_STR:  200102-1707

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707

ANALYSIS_SESSION_ELAPSED_TIME:  49b

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_41289_nt!milocatewsle+1a3

FAILURE_ID_HASH:  {2479382f-1d0b-5bd2-6e8b-e4504bcc209c}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88001071099, Address of the instruction which caused the bugcheck
Arg3: fffff880074b78e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800036ec300

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707

SYSTEM_MANUFACTURER:  BIOSTAR Group

SYSTEM_PRODUCT_NAME:  A780L3L

SYSTEM_SKU:  To Be Filled By O.E.M.

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  080014

BIOS_DATE:  06/07/2010

BASEBOARD_MANUFACTURER:  BIOSTAR Group

BASEBOARD_PRODUCT:  A780L3L

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff88001071099

BUGCHECK_P3: fffff880074b78e0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
fltmgr!GetContextFromStreamList+99
fffff880`01071099 488b4820        mov     rcx,qword ptr [rax+20h]

CONTEXT:  fffff880074b78e0 -- (.cxr 0xfffff880074b78e0)
rax=0000000c45476d57 rbx=0000000000000000 rcx=0000000c45476d57
rdx=fffffa8014bb66b0 rsi=fffffa80148f5470 rdi=fffffa80148f5420
rip=fffff88001071099 rsp=fffff880074b82b0 rbp=fffff880074b83f0
 r8=0000000000000000  r9=fffff880074b83e8 r10=fffffa80148f5428
r11=0000000000000011 r12=fffff880074b83e8 r13=fffffa8014a2a4d8
r14=0000000000000000 r15=fffffa8014bb66b0
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
fltmgr!GetContextFromStreamList+0x99:
fffff880`01071099 488b4820        mov     rcx,qword ptr [rax+20h] ds:002b:0000000c`45476d77=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 2

CPU_MHZ: af0

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 6

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  mscorsvw.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-05-2020 14:42:52.0502

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff88001071099

STACK_TEXT: 
fffff880`074b82b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!GetContextFromStreamList+0x99


THREAD_SHA1_HASH_MOD_FUNC:  f307d5ffdbca2f48018e937348d1d5626e9a0bf9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  fbe0650572cbda9711cc947e89de0bae46b36233

THREAD_SHA1_HASH_MOD:  396dd0fd4a5f9371acee565c376d380ffffdcf0e

FOLLOWUP_IP:
fltmgr!GetContextFromStreamList+99
fffff880`01071099 488b4820        mov     rcx,qword ptr [rax+20h]

FAULT_INSTR_CODE:  20488b48

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  fltmgr!GetContextFromStreamList+99

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: fltmgr

IMAGE_NAME:  fltmgr.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5a4991bc

IMAGE_VERSION:  6.1.7601.24000

STACK_COMMAND:  .cxr 0xfffff880074b78e0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99

BUCKET_ID:  X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99

PRIMARY_PROBLEM_CLASS:  X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99

TARGET_TIME:  2020-04-05T00:32:23.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2020-01-03 05:56:30

BUILDDATESTAMP_STR:  200102-1707

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707

ANALYSIS_SESSION_ELAPSED_TIME:  4a3

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x3b_c0000005_fltmgr!getcontextfromstreamlist+99

FAILURE_ID_HASH:  {d3f1067a-bc21-41e9-5556-b8a3f1875de2}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffa8002d65d38, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff800031c25c5, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
GetUlongPtrFromAddress: unable to read from fffff800032ea300

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800

SYSTEM_MANUFACTURER:  BIOSTAR Group

SYSTEM_PRODUCT_NAME:  A780L3L

SYSTEM_SKU:  To Be Filled By O.E.M.

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  080014

BIOS_DATE:  06/07/2010

BASEBOARD_MANUFACTURER:  BIOSTAR Group

BASEBOARD_PRODUCT:  A780L3L

DUMP_TYPE:  2

BUGCHECK_P1: fffffa8002d65d38

BUGCHECK_P2: 1

BUGCHECK_P3: fffff800031c25c5

BUGCHECK_P4: 2

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ea100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032ea2f0
GetUlongPtrFromAddress: unable to read from fffff800032ea4a8
GetPointerFromAddress: unable to read from fffff800032ea0d8
 fffffa8002d65d38 Nonpaged pool

FAULTING_IP:
nt!MiRemoveMappedView+665
fffff800`031c25c5 48894108        mov     qword ptr [rcx+8],rax

MM_INTERNAL_CODE:  2

CPU_COUNT: 2

CPU_MHZ: af0

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 6

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-05-2020 14:42:48.0493

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff880080a9750 -- (.trap 0xfffff880080a9750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8014d65d30 rbx=0000000000000000 rcx=fffffa8002d65d30
rdx=000000000000002f rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031c25c5 rsp=fffff880080a98e0 rbp=fffffa8013dd7b50
 r8=0000000000000000  r9=fffff80003245340 r10=fffff8000304d000
r11=fffff880080a97a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiRemoveMappedView+0x665:
fffff800`031c25c5 48894108        mov     qword ptr [rcx+8],rax ds:fffffa80`02d65d38=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800031b8a1d to fffff800030e0ba0

STACK_TEXT: 
fffff880`080a95f8 fffff800`031b8a1d : 00000000`00000050 fffffa80`02d65d38 00000000`00000001 fffff880`080a9750 : nt!KeBugCheckEx
fffff880`080a9600 fffff800`030ecc96 : 00000000`00000001 fffffa80`02d65d38 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x7dd
fffff880`080a9750 fffff800`031c25c5 : fffffa80`14510a70 00000003`00000000 fffffa80`14ddf010 e2a00000`22d08c24 : nt!KiPageFault+0x356
fffff880`080a98e0 fffff800`03339971 : fffffa80`14510a70 00000000`00000000 00000000`00000000 fffffa80`1507b000 : nt!MiRemoveMappedView+0x665
fffff880`080a9a20 fffff800`0333a1b5 : 00000000`00000000 00000000`00000000 fffff8a0`00000001 fffff8a0`08badad0 : nt!MiUnmapViewOfSection+0x1b1
fffff880`080a9ae0 fffff800`03339d48 : fffff8a0`08badab0 00000000`00000000 fffff800`0322eed8 00000000`00000001 : nt!AlpcpViewDestroyProcedure+0x205
fffff880`080a9b80 fffff800`0331f5de : fffff8a0`08badad0 00000000`ffffffff 00000000`ffffffff 00000000`00000000 : nt!AlpcpDestroyBlob+0x28
fffff880`080a9bb0 fffff800`030eebd3 : fffffa80`13dd7b50 fffff880`080a9ca0 00000000`00000001 fffffa80`15a16e60 : nt!NtAlpcDeleteSectionView+0x142
fffff880`080a9c20 00000000`778da04a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0838db68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778da04a


THREAD_SHA1_HASH_MOD_FUNC:  6e5ddee051ba85d335b443d2754efe0aedfca7dd

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  daabdd3ffb16cecbe11a8dcae15c913ed79d1fa2

THREAD_SHA1_HASH_MOD:  9f457f347057f10e1df248e166a3e95e6570ecfe

FOLLOWUP_IP:
nt!MiRemoveMappedView+665
fffff800`031c25c5 48894108        mov     qword ptr [rcx+8],rax

FAULT_INSTR_CODE:  8418948

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiRemoveMappedView+665

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5c6e1cbd

IMAGE_VERSION:  6.1.7601.24384

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x50_nt!MiRemoveMappedView+665

BUCKET_ID:  X64_0x50_nt!MiRemoveMappedView+665

PRIMARY_PROBLEM_CLASS:  X64_0x50_nt!MiRemoveMappedView+665

TARGET_TIME:  2020-04-04T18:24:24.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-02-21 06:36:29

BUILDDATESTAMP_STR:  190220-1800

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800

ANALYSIS_SESSION_ELAPSED_TIME:  4ec

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x50_nt!miremovemappedview+665

FAILURE_ID_HASH:  {e393b9e1-1039-22c6-d42f-3f761a9c0bc2}

Followup:     MachineOwner
---------
 
Çözüm
Memtest86 testi yapar mısın?


Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041289, The subtype of the bugcheck.
Arg2: 000007fee00b5001
Arg3: 00000000000011fe
Arg4: 000007fef50b5005

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800036eb300

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707

SYSTEM_MANUFACTURER:  BIOSTAR Group

SYSTEM_PRODUCT_NAME:  A780L3L

SYSTEM_SKU:  To Be Filled By O.E.M.

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  080014

BIOS_DATE:  06/07/2010

BASEBOARD_MANUFACTURER:  BIOSTAR Group

BASEBOARD_PRODUCT:  A780L3L

DUMP_TYPE:  2

BUGCHECK_P1: 41289

BUGCHECK_P2: 7fee00b5001

BUGCHECK_P3: 11fe

BUGCHECK_P4: 7fef50b5005

BUGCHECK_STR:  0x1a_41289

CPU_COUNT: 2

CPU_MHZ: af0

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 6

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-05-2020 14:42:56.0511

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff800034c9583 to fffff800034e1ea0

STACK_TEXT:
fffff880`065ca958 fffff800`034c9583 : 00000000`0000001a 00000000`00041289 000007fe`e00b5001 00000000`000011fe : nt!KeBugCheckEx
fffff880`065ca960 fffff800`035653cc : 9fe00000`286d8025 fffff700`01080488 00000000`00000000 fffff800`034dae8d : nt!MiLocateWsle+0x1a3
fffff880`065ca9a0 fffff800`0346e509 : 9fe00000`286d8025 00800000`ac35f867 fffffa80`145935c0 00000000`00000000 : nt!MiGetPageProtection+0x17c
fffff880`065ca9f0 fffff800`0346e8fa : fffffa80`15c14640 fffff880`065caca0 fffffa80`15d138e0 fffff880`065caac0 : nt!MiQueryAddressState+0x3c9
fffff880`065caa50 fffff800`03726a24 : 000007ff`00000002 000007fe`e00b6000 fffffa80`145935c0 fffff880`00000000 : nt!MiQueryAddressSpan+0xba
fffff880`065caac0 fffff800`034eff53 : 00000000`00000150 fffffa80`15c14640 fffffa80`00000000 00000000`0639eab8 : nt!NtQueryVirtualMemory+0x3a4
fffff880`065cabb0 00000000`76e899da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0639ea98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e899da


THREAD_SHA1_HASH_MOD_FUNC:  a866488ff7b38511d6e788204cea80a35086eb07

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  59f3a2b2e18e2c15b4d21fabc7ac5e6ac0b22442

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!MiLocateWsle+1a3
fffff800`034c9583 cc              int     3

FAULT_INSTR_CODE:  4a05ffcc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiLocateWsle+1a3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5e0ead5e

IMAGE_VERSION:  6.1.7601.24545

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_41289_nt!MiLocateWsle+1a3

BUCKET_ID:  X64_0x1a_41289_nt!MiLocateWsle+1a3

PRIMARY_PROBLEM_CLASS:  X64_0x1a_41289_nt!MiLocateWsle+1a3

TARGET_TIME:  2020-04-05T00:15:22.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2020-01-03 05:56:30

BUILDDATESTAMP_STR:  200102-1707

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707

ANALYSIS_SESSION_ELAPSED_TIME:  49b

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_41289_nt!milocatewsle+1a3

FAILURE_ID_HASH:  {2479382f-1d0b-5bd2-6e8b-e4504bcc209c}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88001071099, Address of the instruction which caused the bugcheck
Arg3: fffff880074b78e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800036ec300

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707

SYSTEM_MANUFACTURER:  BIOSTAR Group

SYSTEM_PRODUCT_NAME:  A780L3L

SYSTEM_SKU:  To Be Filled By O.E.M.

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  080014

BIOS_DATE:  06/07/2010

BASEBOARD_MANUFACTURER:  BIOSTAR Group

BASEBOARD_PRODUCT:  A780L3L

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff88001071099

BUGCHECK_P3: fffff880074b78e0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
fltmgr!GetContextFromStreamList+99
fffff880`01071099 488b4820        mov     rcx,qword ptr [rax+20h]

CONTEXT:  fffff880074b78e0 -- (.cxr 0xfffff880074b78e0)
rax=0000000c45476d57 rbx=0000000000000000 rcx=0000000c45476d57
rdx=fffffa8014bb66b0 rsi=fffffa80148f5470 rdi=fffffa80148f5420
rip=fffff88001071099 rsp=fffff880074b82b0 rbp=fffff880074b83f0
r8=0000000000000000  r9=fffff880074b83e8 r10=fffffa80148f5428
r11=0000000000000011 r12=fffff880074b83e8 r13=fffffa8014a2a4d8
r14=0000000000000000 r15=fffffa8014bb66b0
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
fltmgr!GetContextFromStreamList+0x99:
fffff880`01071099 488b4820        mov     rcx,qword ptr [rax+20h] ds:002b:0000000c`45476d77=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 2

CPU_MHZ: af0

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 6

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  mscorsvw.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-05-2020 14:42:52.0502

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff88001071099

STACK_TEXT:
fffff880`074b82b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!GetContextFromStreamList+0x99


THREAD_SHA1_HASH_MOD_FUNC:  f307d5ffdbca2f48018e937348d1d5626e9a0bf9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  fbe0650572cbda9711cc947e89de0bae46b36233

THREAD_SHA1_HASH_MOD:  396dd0fd4a5f9371acee565c376d380ffffdcf0e

FOLLOWUP_IP:
fltmgr!GetContextFromStreamList+99
fffff880`01071099 488b4820        mov     rcx,qword ptr [rax+20h]

FAULT_INSTR_CODE:  20488b48

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  fltmgr!GetContextFromStreamList+99

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: fltmgr

IMAGE_NAME:  fltmgr.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5a4991bc

IMAGE_VERSION:  6.1.7601.24000

STACK_COMMAND:  .cxr 0xfffff880074b78e0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99

BUCKET_ID:  X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99

PRIMARY_PROBLEM_CLASS:  X64_0x3B_c0000005_fltmgr!GetContextFromStreamList+99

TARGET_TIME:  2020-04-05T00:32:23.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2020-01-03 05:56:30

BUILDDATESTAMP_STR:  200102-1707

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707

ANALYSIS_SESSION_ELAPSED_TIME:  4a3

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x3b_c0000005_fltmgr!getcontextfromstreamlist+99

FAILURE_ID_HASH:  {d3f1067a-bc21-41e9-5556-b8a3f1875de2}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffa8002d65d38, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff800031c25c5, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
GetUlongPtrFromAddress: unable to read from fffff800032ea300

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800

SYSTEM_MANUFACTURER:  BIOSTAR Group

SYSTEM_PRODUCT_NAME:  A780L3L

SYSTEM_SKU:  To Be Filled By O.E.M.

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  080014

BIOS_DATE:  06/07/2010

BASEBOARD_MANUFACTURER:  BIOSTAR Group

BASEBOARD_PRODUCT:  A780L3L

DUMP_TYPE:  2

BUGCHECK_P1: fffffa8002d65d38

BUGCHECK_P2: 1

BUGCHECK_P3: fffff800031c25c5

BUGCHECK_P4: 2

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ea100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032ea2f0
GetUlongPtrFromAddress: unable to read from fffff800032ea4a8
GetPointerFromAddress: unable to read from fffff800032ea0d8
fffffa8002d65d38 Nonpaged pool

FAULTING_IP:
nt!MiRemoveMappedView+665
fffff800`031c25c5 48894108        mov     qword ptr [rcx+8],rax

MM_INTERNAL_CODE:  2

CPU_COUNT: 2

CPU_MHZ: af0

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 6

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-05-2020 14:42:48.0493

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff880080a9750 -- (.trap 0xfffff880080a9750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8014d65d30 rbx=0000000000000000 rcx=fffffa8002d65d30
rdx=000000000000002f rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031c25c5 rsp=fffff880080a98e0 rbp=fffffa8013dd7b50
r8=0000000000000000  r9=fffff80003245340 r10=fffff8000304d000
r11=fffff880080a97a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiRemoveMappedView+0x665:
fffff800`031c25c5 48894108        mov     qword ptr [rcx+8],rax ds:fffffa80`02d65d38=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800031b8a1d to fffff800030e0ba0

STACK_TEXT:
fffff880`080a95f8 fffff800`031b8a1d : 00000000`00000050 fffffa80`02d65d38 00000000`00000001 fffff880`080a9750 : nt!KeBugCheckEx
fffff880`080a9600 fffff800`030ecc96 : 00000000`00000001 fffffa80`02d65d38 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x7dd
fffff880`080a9750 fffff800`031c25c5 : fffffa80`14510a70 00000003`00000000 fffffa80`14ddf010 e2a00000`22d08c24 : nt!KiPageFault+0x356
fffff880`080a98e0 fffff800`03339971 : fffffa80`14510a70 00000000`00000000 00000000`00000000 fffffa80`1507b000 : nt!MiRemoveMappedView+0x665
fffff880`080a9a20 fffff800`0333a1b5 : 00000000`00000000 00000000`00000000 fffff8a0`00000001 fffff8a0`08badad0 : nt!MiUnmapViewOfSection+0x1b1
fffff880`080a9ae0 fffff800`03339d48 : fffff8a0`08badab0 00000000`00000000 fffff800`0322eed8 00000000`00000001 : nt!AlpcpViewDestroyProcedure+0x205
fffff880`080a9b80 fffff800`0331f5de : fffff8a0`08badad0 00000000`ffffffff 00000000`ffffffff 00000000`00000000 : nt!AlpcpDestroyBlob+0x28
fffff880`080a9bb0 fffff800`030eebd3 : fffffa80`13dd7b50 fffff880`080a9ca0 00000000`00000001 fffffa80`15a16e60 : nt!NtAlpcDeleteSectionView+0x142
fffff880`080a9c20 00000000`778da04a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0838db68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778da04a


THREAD_SHA1_HASH_MOD_FUNC:  6e5ddee051ba85d335b443d2754efe0aedfca7dd

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  daabdd3ffb16cecbe11a8dcae15c913ed79d1fa2

THREAD_SHA1_HASH_MOD:  9f457f347057f10e1df248e166a3e95e6570ecfe

FOLLOWUP_IP:
nt!MiRemoveMappedView+665
fffff800`031c25c5 48894108        mov     qword ptr [rcx+8],rax

FAULT_INSTR_CODE:  8418948

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiRemoveMappedView+665

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5c6e1cbd

IMAGE_VERSION:  6.1.7601.24384

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x50_nt!MiRemoveMappedView+665

BUCKET_ID:  X64_0x50_nt!MiRemoveMappedView+665

PRIMARY_PROBLEM_CLASS:  X64_0x50_nt!MiRemoveMappedView+665

TARGET_TIME:  2020-04-04T18:24:24.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-02-21 06:36:29

BUILDDATESTAMP_STR:  190220-1800

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800

ANALYSIS_SESSION_ELAPSED_TIME:  4ec

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x50_nt!miremovemappedview+665

FAILURE_ID_HASH:  {e393b9e1-1039-22c6-d42f-3f761a9c0bc2}

Followup:     MachineOwner
---------


Yaptım sorun buldu. RAM'imde sıkıntı mı var?
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Geri
Yukarı