MEMORY_MANAGEMENT mavi ekran hatası

Bellekleri yanlış takmışsın bu şekilde tak.

1586787347676.png


3200MHz bellekler 1866MHz çalışıyor BIOS altından XMP'yi aç.
Kod:
[Memory Device (Type 17) - Length 84 - Handle 0010h]
  Physical Memory Array Handle  0009h
  Memory Error Info Handle      000fh
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          8192MB
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM 0
  Bank Locator                  P0 CHANNEL A
  Memory Type                   1ah - Specification Reserved
  Type Detail                   4080h - Synchronous
  Speed                         1866MHz
  Manufacturer                  Unknown
  Serial Number                        
  Asset Tag Number              [String Not Specified]
  Part Number                   F4-3200C16-8GVKB
[32Bit Memory Error Information (Type 18) - Length 23 - Handle 0012h]
[Memory Device (Type 17) - Length 84 - Handle 0013h]
  Physical Memory Array Handle  0009h
  Memory Error Info Handle      0012h
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          8192MB
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM 1
  Bank Locator                  P0 CHANNEL A
  Memory Type                   1ah - Specification Reserved
  Type Detail                   4080h - Synchronous
  Speed                         1866MHz
  Manufacturer                  Unknown
  Serial Number                        
  Asset Tag Number              [String Not Specified]
  Part Number                   F4-3200C16-8GVKB
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffc20007febe50
Arg3: 00000000000001fe
Arg4: 0000000000000200

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M DS3H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F41

BIOS_DATE:  07/22/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M DS3H-CF

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 41790

BUGCHECK_P2: ffffc20007febe50

BUGCHECK_P3: 1fe

BUGCHECK_P4: 200

BUGCHECK_STR:  0x1a_41790

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  updater.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-13-2020 17:12:30.0966

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8006ec38538 to fffff8006ebc2380

STACK_TEXT:
ffffbf0d`380f2d48 fffff800`6ec38538 : 00000000`0000001a 00000000`00041790 ffffc200`07febe50 00000000`000001fe : nt!KeBugCheckEx
ffffbf0d`380f2d50 fffff800`6eae8527 : 00000000`00000003 ffffbf0d`380f34a0 ffffbf0d`380f34a0 ffffbf0d`380f33f0 : nt!MiDeletePteRun+0x188a78
ffffbf0d`380f2f70 fffff800`6eae4042 : ffff8289`52ad29c0 fffff700`aa551000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
ffffbf0d`380f2fa0 fffff800`6eae41d1 : ffffbf0d`380f33f0 fffff77b`80552a80 00000000`00000000 0a000002`aa3f7867 : nt!MiWalkPageTablesRecursively+0x512
ffffbf0d`380f3060 fffff800`6eae41d1 : ffffbf0d`380f33f0 fffff77b`bdc02a90 00000000`00000000 0a000002`717c0867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffbf0d`380f3120 fffff800`6eae41d1 : ffffbf0d`380f33f0 fffff77b`bddee010 fffff77b`00000000 0a000003`f5ebf867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffbf0d`380f31e0 fffff800`6eae395c : ffffbf0d`380f33f0 00000000`00000000 ffff8289`00000000 00000000`00000002 : nt!MiWalkPageTablesRecursively+0x6a1
ffffbf0d`380f32a0 fffff800`6eae1dc8 : ffffbf0d`380f33f0 ffff8289`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffbf0d`380f33a0 fffff800`6eaeff20 : ffffffff`ffffffff ffff8289`52ad2838 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffbf0d`380f3740 fffff800`6eb35b8a : 00000000`154abc8e ffff8289`4cfb7080 00000000`00000000 fffff800`6eaeaefa : nt!MiDeleteVad+0x860
ffffbf0d`380f3900 fffff800`6f0948f0 : 00000000`00000000 00000000`00000000 ffffbf0d`380f3a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
ffffbf0d`380f3960 fffff800`6f09452b : 00000000`00000000 00000000`00000000 00000012`79bfe800 00000154`9f0ae1c0 : nt!MmFreeVirtualMemory+0x390
ffffbf0d`380f3aa0 fffff800`6ebd3c18 : ffff8289`4cfb7080 ffffbf0d`380f3b80 ffff8289`42aa3000 ffff8289`4c6a5e60 : nt!NtFreeVirtualMemory+0x8b
ffffbf0d`380f3b00 00007ffc`e5c1c484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000012`79bfe7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`e5c1c484


THREAD_SHA1_HASH_MOD_FUNC:  ae96f317ca5c80fc782dc8dfe0b700681be3f611

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  7e7b734d8a98aa4690827ebbd6f50997e6291f7d

THREAD_SHA1_HASH_MOD:  7f608ac2fbce9034a3386b1d51652e4911d30234

FOLLOWUP_IP:
nt!MiDeletePteRun+188a78
fffff800`6ec38538 cc              int     3

FAULT_INSTR_CODE:  4d8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiDeletePteRun+188a78

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  188a78

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeletePteRun

BUCKET_ID:  0x1a_41790_nt!MiDeletePteRun

PRIMARY_PROBLEM_CLASS:  0x1a_41790_nt!MiDeletePteRun

TARGET_TIME:  2020-04-13T10:34:00.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  28d5

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41790_nt!mideletepterun

FAILURE_ID_HASH:  {27ce5d5a-97b1-faf0-183f-c86809269d56}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff802786f90d2, The address that the exception occurred at
Arg3: ffffd189079255b8, Exception Record Address
Arg4: ffffd78121edf930, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M DS3H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F41

BIOS_DATE:  07/22/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M DS3H-CF

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff802786f90d2

BUGCHECK_P3: ffffd189079255b8

BUGCHECK_P4: ffffd78121edf930

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!MmSetAddressRangeModifiedEx+112
fffff802`786f90d2 488b5018        mov     rdx,qword ptr [rax+18h]

EXCEPTION_RECORD:  ffffd189079255b8 -- (.exr 0xffffd189079255b8)
ExceptionAddress: fffff802786f90d2 (nt!MmSetAddressRangeModifiedEx+0x0000000000000112)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffd78121edf930 -- (.cxr 0xffffd78121edf930)
rax=ff0fa48c0900c200 rbx=0000000000001000 rcx=ff0fa48c0900c1b0
rdx=ffffd168b45a27f8 rsi=0000000000000000 rdi=0000000000000004
rip=fffff802786f90d2 rsp=ffffd189079257f0 rbp=8000000000000000
r8=ffffd168b0019f98  r9=ffff8d8000000000 r10=0000000fffffffff
r11=0000000000000002 r12=ffffd160033f3428 r13=0000000000001000
r14=ffffd160033f3428 r15=ffffc0067e685000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nt!MmSetAddressRangeModifiedEx+0x112:
fffff802`786f90d2 488b5018        mov     rdx,qword ptr [rax+18h] ds:002b:ff0fa48c`0900c218=????????????????
Resetting default scope

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

FOLLOWUP_IP:
nt!MmSetAddressRangeModifiedEx+112
fffff802`786f90d2 488b5018        mov     rdx,qword ptr [rax+18h]

BUGCHECK_STR:  AV

READ_ADDRESS: fffff80278b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-13-2020 17:12:27.0666

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

BAD_STACK_POINTER:  ffffd78121edf0c8

LAST_CONTROL_TRANSFER:  from fffff8027868df3b to fffff802786f90d2

STACK_TEXT:
ffffd189`079257f0 fffff802`7868df3b : 00000000`00001000 00000000`00001000 00000000`00001000 ffffd189`07925a40 : nt!MmSetAddressRangeModifiedEx+0x112
ffffd189`07925940 fffff802`78624309 : ffffa48b`fd79d970 00000000`00000000 ffffa48c`00000001 ffffd189`07925ac8 : nt!CcFlushCachePriv+0x3ab
ffffd189`07925a90 fffff802`786f43c5 : ffffa48b`f9c66c00 ffffa48b`00000000 fffff802`78d78200 ffffd189`09938a90 : nt!CcWriteBehindInternal+0x209
ffffd189`07925b70 fffff802`7866bce5 : ffffa48b`fdf24080 00000000`00000080 ffffa48b`f9c6f040 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffd189`07925c10 fffff802`787c99ca : ffffd781`21f24180 ffffa48b`fdf24080 fffff802`7866bc90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd189`07925c60 00000000`00000000 : ffffd189`07926000 ffffd189`07920000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  b6a79d8cba7df40336dfcd516b3091479e6c107c

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5d43599543837ab0a76e4cd6185c342f1ff82e28

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FAULT_INSTR_CODE:  18508b48

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MmSetAddressRangeModifiedEx+112

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .cxr 0xffffd78121edf930 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  112

FAILURE_BUCKET_ID:  AV_STACKPTR_ERROR_nt!MmSetAddressRangeModifiedEx

BUCKET_ID:  AV_STACKPTR_ERROR_nt!MmSetAddressRangeModifiedEx

PRIMARY_PROBLEM_CLASS:  AV_STACKPTR_ERROR_nt!MmSetAddressRangeModifiedEx

TARGET_TIME:  2020-04-13T09:09:03.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  199d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_stackptr_error_nt!mmsetaddressrangemodifiedex

FAILURE_ID_HASH:  {62ac4542-6ec0-5cd2-4c8a-60607a4f11e7}

Followup:     MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffff28003919320
Arg3: 00000000000001fe
Arg4: 0000000000000200

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M DS3H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F41

BIOS_DATE:  07/22/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M DS3H-CF

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 41790

BUGCHECK_P2: fffff28003919320

BUGCHECK_P3: 1fe

BUGCHECK_P4: 200

BUGCHECK_STR:  0x1a_41790

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  Matriks.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-13-2020 17:12:24.0487

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8054e038538 to fffff8054dfc2380

STACK_TEXT:
ffff9c8b`28ed0d48 fffff805`4e038538 : 00000000`0000001a 00000000`00041790 fffff280`03919320 00000000`000001fe : nt!KeBugCheckEx
ffff9c8b`28ed0d50 fffff805`4dee8527 : 00000000`00000003 ffff9c8b`28ed14a0 ffff9c8b`28ed14a0 ffff9c8b`28ed13f0 : nt!MiDeletePteRun+0x188a78
ffff9c8b`28ed0f70 fffff805`4dee4042 : ffff8c8f`dbfc58c0 ffffc680`000e0000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
ffff9c8b`28ed0fa0 fffff805`4dee41d1 : ffff9c8b`28ed13f0 ffffc6e3`400006f8 00000000`00000000 0a000001`30866867 : nt!MiWalkPageTablesRecursively+0x512
ffff9c8b`28ed1060 fffff805`4dee41d1 : ffff9c8b`28ed13f0 ffffc6e3`71a00000 00000000`00000000 0a000001`4f0eb867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9c8b`28ed1120 fffff805`4dee41d1 : ffff9c8b`28ed13f0 ffffc6e3`71b8d000 ffffc6e3`00000000 0a000001`51bea867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9c8b`28ed11e0 fffff805`4dee395c : ffff9c8b`28ed13f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9c8b`28ed12a0 fffff805`4dee1dc8 : ffff9c8b`28ed13f0 fffff280`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffff9c8b`28ed13a0 fffff805`4deeff20 : ffffffff`ffffffff ffff8c8f`dbfc5738 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff9c8b`28ed1740 fffff805`4df35b8a : 00000000`0001ca42 ffff8c8f`d9706080 00000000`00000000 fffff805`4deeaefa : nt!MiDeleteVad+0x860
ffff9c8b`28ed1900 fffff805`4e4948f0 : 00000000`00000000 00000000`00000000 ffff9c8b`28ed1a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
ffff9c8b`28ed1960 fffff805`4e49452b : 00000000`00000000 00000000`0009e578 ffff76f1`29ed15ac 00000000`00000004 : nt!MmFreeVirtualMemory+0x390
ffff9c8b`28ed1aa0 fffff805`4dfd3c18 : ffff8c8f`d9706080 ffff9c8b`28ed1b80 ffff8c8f`cfaa7100 ffff838e`07662468 : nt!NtFreeVirtualMemory+0x8b
ffff9c8b`28ed1b00 00007ff9`86dfc484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0009e558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`86dfc484


THREAD_SHA1_HASH_MOD_FUNC:  ae96f317ca5c80fc782dc8dfe0b700681be3f611

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  7e7b734d8a98aa4690827ebbd6f50997e6291f7d

THREAD_SHA1_HASH_MOD:  7f608ac2fbce9034a3386b1d51652e4911d30234

FOLLOWUP_IP:
nt!MiDeletePteRun+188a78
fffff805`4e038538 cc              int     3

FAULT_INSTR_CODE:  4d8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiDeletePteRun+188a78

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  188a78

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeletePteRun

BUCKET_ID:  0x1a_41790_nt!MiDeletePteRun

PRIMARY_PROBLEM_CLASS:  0x1a_41790_nt!MiDeletePteRun

TARGET_TIME:  2020-04-13T09:53:25.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  219f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41790_nt!mideletepterun

FAILURE_ID_HASH:  {27ce5d5a-97b1-faf0-183f-c86809269d56}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80540cb2eef, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M DS3H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M DS3H-CF

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 10

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80540cb2eef

READ_ADDRESS: fffff805411733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000010

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiInsertPageInFreeOrZeroedList+19f
fffff805`40cb2eef 49034710        add     rax,qword ptr [r15+10h]

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  Matriks.exe

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-13-2020 17:12:20.0644

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffa7012f1aeae0 -- (.trap 0xffffa7012f1aeae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80540cb2eef rsp=ffffa7012f1aec70 rbp=ffffa7012f1aece9
r8=0000000000000070  r9=0000000000000070 r10=0000000000000000
r11=ffffa7012f1aed48 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr ac po nc
nt!MiInsertPageInFreeOrZeroedList+0x19f:
fffff805`40cb2eef 49034710        add     rax,qword ptr [r15+10h] ds:00000000`00000010=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80540dd41e9 to fffff80540dc2380

STACK_TEXT:
ffffa701`2f1ae998 fffff805`40dd41e9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa701`2f1ae9a0 fffff805`40dd052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa701`2f1aeae0 fffff805`40cb2eef : 00000000`00000000 fffff805`00000001 00000000`00000000 fffff805`3f33d180 : nt!KiPageFault+0x46b
ffffa701`2f1aec70 fffff805`40caff14 : 00000000`003e9070 00000000`00000004 ffffa701`00000001 ffff9c80`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x19f
ffffa701`2f1aed50 fffff805`40ce8527 : 00000000`00000003 ffffa701`2f1af4a0 ffffa701`2f1af4a0 ffffa701`2f1af3f0 : nt!MiDeletePteRun+0x454
ffffa701`2f1aef70 fffff805`40ce4042 : ffffaf81`62426940 ffff9f00`000e7000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
ffffa701`2f1aefa0 fffff805`40ce41d1 : ffffa701`2f1af3f0 ffff9f4f`80000730 00000000`00000000 0a000001`0ff89867 : nt!MiWalkPageTablesRecursively+0x512
ffffa701`2f1af060 fffff805`40ce41d1 : ffffa701`2f1af3f0 ffff9f4f`a7c00000 00000000`00000000 0a000001`77bfe867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa701`2f1af120 fffff805`40ce41d1 : ffffa701`2f1af3f0 ffff9f4f`a7d3e000 ffff9f4f`00000000 0a000001`234fd867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa701`2f1af1e0 fffff805`40ce395c : ffffa701`2f1af3f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffa701`2f1af2a0 fffff805`40ce1dc8 : ffffa701`2f1af3f0 ffff9980`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffa701`2f1af3a0 fffff805`40ceff20 : ffffffff`ffffffff ffffaf81`624267b8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffa701`2f1af740 fffff805`40d35b8a : 00000000`0001d695 ffffaf81`6244f080 00000000`00000000 fffff805`40ceaefa : nt!MiDeleteVad+0x860
ffffa701`2f1af900 fffff805`412948f0 : 00000000`00000000 00000000`00000000 ffffa701`2f1afa60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
ffffa701`2f1af960 fffff805`4129452b : 00000000`00000000 00000000`0009e578 ffff120f`9b641212 fffff805`40dc917f : nt!MmFreeVirtualMemory+0x390
ffffa701`2f1afaa0 fffff805`40dd3c18 : ffffaf81`6244f080 ffffa701`2f1afb80 fffff805`40bcbfe0 00000000`00000000 : nt!NtFreeVirtualMemory+0x8b
ffffa701`2f1afb00 00007ffe`cfe7c484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0009e558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`cfe7c484


THREAD_SHA1_HASH_MOD_FUNC:  113f0a56f690aa8102cc517c209bd05ce012b88e

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  46f3d2b3e9ca84b8cd4cee31fc26dc3201b94300

THREAD_SHA1_HASH_MOD:  aaa5a324bf1bd3082ad2b464ee2ed2f6d50e564c

FOLLOWUP_IP:
nt!MiInsertPageInFreeOrZeroedList+19f
fffff805`40cb2eef 49034710        add     rax,qword ptr [r15+10h]

FAULT_INSTR_CODE:  10470349

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiInsertPageInFreeOrZeroedList+19f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  19f

FAILURE_BUCKET_ID:  AV_nt!MiInsertPageInFreeOrZeroedList

BUCKET_ID:  AV_nt!MiInsertPageInFreeOrZeroedList

PRIMARY_PROBLEM_CLASS:  AV_nt!MiInsertPageInFreeOrZeroedList

TARGET_TIME:  2020-04-13T13:18:29.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1ab2

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!miinsertpageinfreeorzeroedlist

FAILURE_ID_HASH:  {779c7427-9286-2607-95ab-7b33d42c5f3a}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: ffffc980000cf9e0
Arg3: 80000003d77f2867
Arg4: ff0fc980000cf9e0

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M DS3H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F41

BIOS_DATE:  07/22/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M DS3H-CF

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 403

BUGCHECK_P2: ffffc980000cf9e0

BUGCHECK_P3: 80000003d77f2867

BUGCHECK_P4: ff0fc980000cf9e0

BUGCHECK_STR:  0x1a_403

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  Matriks.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-13-2020 17:12:15.0950

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8013f238520 to fffff8013f1c2380

STACK_TEXT:
fffff602`70fc1d48 fffff801`3f238520 : 00000000`0000001a 00000000`00000403 ffffc980`000cf9e0 80000003`d77f2867 : nt!KeBugCheckEx
fffff602`70fc1d50 fffff801`3f0e8527 : 00000000`00000003 fffff602`70fc24a0 fffff602`70fc24a0 fffff602`70fc23f0 : nt!MiDeletePteRun+0x188a60
fffff602`70fc1f70 fffff801`3f0e4042 : ffffb704`0351c580 ffffc980`000d0000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
fffff602`70fc1fa0 fffff801`3f0e41d1 : fffff602`70fc23f0 ffffc9e4`c0000678 00000000`00000000 0a000002`774c0867 : nt!MiWalkPageTablesRecursively+0x512
fffff602`70fc2060 fffff801`3f0e41d1 : fffff602`70fc23f0 ffffc9e4`f2600000 00000000`00000000 0a000001`721a5867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff602`70fc2120 fffff801`3f0e41d1 : fffff602`70fc23f0 ffffc9e4`f2793000 ffffc9e4`00000000 0a000001`721a4867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff602`70fc21e0 fffff801`3f0e395c : fffff602`70fc23f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffff602`70fc22a0 fffff801`3f0e1dc8 : fffff602`70fc23f0 ffff8580`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff602`70fc23a0 fffff801`3f0eff20 : ffffffff`ffffffff ffffb704`0351c3f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff602`70fc2740 fffff801`3f135b8a : 00000000`0001a056 ffffb704`031a3340 00000000`00000000 fffff801`3f0eaefa : nt!MiDeleteVad+0x860
fffff602`70fc2900 fffff801`3f6948f0 : 00000000`00000000 00000000`00000000 fffff602`70fc2a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
fffff602`70fc2960 fffff801`3f69452b : 00000000`00000000 00000000`0009e578 ffff4030`f8d672b1 00007ffa`00000004 : nt!MmFreeVirtualMemory+0x390
fffff602`70fc2aa0 fffff801`3f1d3c18 : ffffb704`031a3340 fffff602`70fc2b80 ffffb703`f86a2f00 00000000`00000000 : nt!NtFreeVirtualMemory+0x8b
fffff602`70fc2b00 00007ffa`7b2bc484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0009e558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`7b2bc484


THREAD_SHA1_HASH_MOD_FUNC:  ae96f317ca5c80fc782dc8dfe0b700681be3f611

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  9b8ebe4e1a344a59025150bbf6cbba0ca7c3b554

THREAD_SHA1_HASH_MOD:  7f608ac2fbce9034a3386b1d51652e4911d30234

FOLLOWUP_IP:
nt!MiDeletePteRun+188a60
fffff801`3f238520 cc              int     3

FAULT_INSTR_CODE:  c78b4ccc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiDeletePteRun+188a60

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  188a60

FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

PRIMARY_PROBLEM_CLASS:  0x1a_403_nt!MiDeletePteRun

TARGET_TIME:  2020-04-13T09:26:47.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  218e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_403_nt!mideletepterun

FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup:     MachineOwner
---------
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı