ismailkucukbas
Decapat
- Katılım
- 12 Nisan 2019
- Mesajlar
- 3
Merhaba, Abra A7 v5.2 kullanıcısı olarak bende bir süre mavi ekran hatası aldım fakat çözümü temizlikte buldum Monster notebook'larına ömür boyu temizlik (termal macun ve fan) hizmetini ücretsiz veriyor, yaptırmanızı önermekle beraber işletim sisteminizi yeniden yüklemenizi ve lisanslı değilse mutlaka satın almanızı öneririm.İnternette araştırdığımda RAM, ekran kartı, HDD, işlemci, hatta anakart sorunlu olabilire kadar gidiyor. Sorun tam olarak hangisinde anlamış değilim ve hangi parçayı değiştirmem gerekiyor bilemedim, bana yardımcı olursanız çok çok sevineceğim.
PC açılırken bir donma gelip yeniden başlıyor, yine donma gelip onarım ekranına gidiyor ama hiçbir şeyi onaramıyor. Ben de Windows 10'a devam et diyorum ara ara devam ediyor, bazen de yeni bir mavi ekran veriyor.
*PC açılıyor şifreyi yazdıktan sonra masaüstü gelir gelmez mavi ekran veriyor.
*Uyku modundan uyanırken veya ekranı uyandırırken veriyor.
Formattan sonra son ayarları yaparken bile mavi ekran aldım ve minidump dosyalarını çoğu açılışta siliyor. Ben de minidump dosyası buldukca arşivler oldum size 2-3 günlük minidump dosyasını gönderiyorum.
minidump dosyaları
MediaFire is a simple to use free service that lets you put all your photos, documents, music, and video in a single place so you can access them anywhere and share them everywhere.www.mediafire.com
Bilgisayar bilgileri:
Yaptıklarım:
- Monster Abra A5 v1.1
- 8 GB RAM
- GTX 860M ekran kartı
- UEFI olarak kullanıyorum.
yokmudur yardımcı olabilecek biri acaba
- *RAM testi yaptım sorun çıkmadı
- *HDD testi yaptım sorun çıkmadı
- *scannow/ f taraması yaptım sorun çıkmadı
- *Bütün driver güncellemeleri kurdum yine mavi ekran aldım
- *Ekran kartlarını çevrimdışı yaptım sırayla bişey değişmedi
- *Kart okuyucuları enternet kartını wifiyi çevrımdışı yaptım yine mavi ekran aldım.
- *Hatta Windows 7, 8, 8.1 kurdum onlarda da mavi belayı aldım.
- *BIOS olarak kullanırken mavi ekran alıyorum UEFI yaptım yine mavi ekran almaya devam ettim.
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000005aa54e0d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8060acf600e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: MONSTER
SYSTEM_PRODUCT_NAME: ABRA A5 V1
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: MONSTER
BIOS_VERSION: ABRA A5 V1
BIOS_DATE: 04/08/2014
BASEBOARD_MANUFACTURER: MONSTER
BASEBOARD_PRODUCT: ABRA A5 V1
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
BUGCHECK_P1: 5aa54e0d
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8060acf600e
WRITE_ADDRESS: GetUlongFromAddress: unable to read from fffff8060b0c93c0
fffff8060b144390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000005aa54e0d
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiStartingOffsetNeedLock+76
fffff806`0acf600e f2ff8b0ddef444 xacquire dec dword ptr [rbx+44F4DE0Dh]
CPU_COUNT: 8
CPU_MHZ: 9be
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: rundll32.exe
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 04-16-2019 10:48:08.0320
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: ffffaa8d0f275640 -- (.trap 0xffffaa8d0f275640)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000ea rbx=0000000000000000 rcx=0000000000000001
rdx=00000000e8cf8b48 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060acf600e rsp=ffffaa8d0f2757d0 rbp=00000000ffffffff
r8=ffffae0f61896cd0 r9=ffffae0f65e6a580 r10=fffff80609dc2180
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiStartingOffsetNeedLock+0x76:
fffff806`0acf600e f2ff8b0ddef444 xacquire dec dword ptr [rbx+44F4DE0Dh] ds:00000000`44f4de0d=????????
Resetting default scope
MISALIGNED_IP:
nt!MiStartingOffsetNeedLock+76
fffff806`0acf600e f2ff8b0ddef444 xacquire dec dword ptr [rbx+44F4DE0Dh]
LAST_CONTROL_TRANSFER: from fffff8060adc6d69 to fffff8060adb55e0
STACK_TEXT:
ffffaa8d`0f2754f8 fffff806`0adc6d69 : 00000000`0000000a 00000000`5aa54e0d 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffaa8d`0f275500 fffff806`0adc318e : ffffae0f`5f202000 ffffae0f`00000090 00000000`00000000 ffffae0f`00000020 : nt!KiBugCheckDispatch+0x69
ffffaa8d`0f275640 fffff806`0acf600e : ffffae0f`68218150 00000000`02b07000 ffff990b`5af3ead0 00000000`00000000 : nt!KiPageFault+0x44e
ffffaa8d`0f2757d0 fffff806`0b297e1b : 00000000`02b07000 ffffae0f`68218150 00000000`00000000 00000000`00000000 : nt!MiStartingOffsetNeedLock+0x76
ffffaa8d`0f275800 fffff806`0b1b750e : 00000000`00000000 ffffae0f`660414d0 00000000`00000000 00000000`ffffffff : nt!MiPfPrepareReadList+0x3eb
ffffaa8d`0f2758d0 fffff806`0b1b746c : 00000000`00000001 00000000`00002b07 00000000`00000000 ffffae0f`660414d0 : nt!MmPrefetchPagesEx+0x96
ffffaa8d`0f275940 fffff80c`c62eae36 : 00000000`00000001 ffffae0f`614f5070 00000000`00000001 00000000`00000001 : nt!MmPrefetchPages+0xc
ffffaa8d`0f275970 fffff80c`c63cc08e : 00000000`00000000 ffff990b`528f0b40 ffffffff`ffffffff ffff990b`528f0b40 : Ntfs!NtfsPerformPrefetch+0x13a
ffffaa8d`0f2759e0 fffff80c`c63cafe7 : ffffae0f`65de0320 ffff990b`528f0bd0 ffffae0f`61826180 00000009`00000000 : Ntfs!NtfsReadUsnJournal+0x3b2
ffffaa8d`0f275b80 fffff80c`c63caeb7 : ffffaa8d`0f2764f0 ffff990b`528f0b40 00000000`00000001 ffffae0f`65de0320 : Ntfs!NtOfsPostNewLength+0x117
ffffaa8d`0f275c30 fffff80c`c63e246d : 00000001`392b91d1 ffffae0f`61826180 ffffae0f`61826180 00000001`392b91d1 : Ntfs!NtfsProcessNewLengthQueue+0x23
ffffaa8d`0f275c60 fffff80c`c63e1efb : ffff990b`5ac9d601 ffffaa8d`0f2764f0 ffffae0f`61826180 ffff990b`5b058010 : Ntfs!NtfsCommitCurrentTransaction+0x29d
ffffaa8d`0f275d00 fffff80c`c63d664d : ffffaa8d`0f2764f0 ffffae0f`61826180 ffffaa8d`00000000 00000000`00000000 : Ntfs!NtfsCheckpointCurrentTransaction+0x4b
ffffaa8d`0f275d30 fffff80c`c63e829d : ffff990b`5b058160 ffff990b`5b058448 ffff990b`5b058400 ffffaa8d`0f2764f0 : Ntfs!NtfsDeleteFile+0xb3d
ffffaa8d`0f276010 fffff80c`c63e56aa : ffffae0f`65fa78a0 ffffaa8d`0f2764f0 ffffae0f`65fa78a0 ffffaa8d`0f2764c8 : Ntfs!NtfsCommonCleanup+0x283d
ffffaa8d`0f276460 fffff806`0acba0d9 : ffffae0f`690ad4d0 fffff80c`c52050bc ffffae0f`65fa78a0 ffffae0f`616c9cf0 : Ntfs!NtfsFsdCleanup+0x15a
ffffaa8d`0f276770 fffff80c`c5206219 : ffffae0f`65fa78a0 ffffaa8d`0f276840 ffffae0f`65fa78a0 ffffaa8d`0f276850 : nt!IofCallDriver+0x59
ffffaa8d`0f2767b0 fffff80c`c5204a36 : ffffaa8d`0f276840 ffffae0f`616c9cf0 ffffae0f`616c9cf0 ffffae0f`65e6a080 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x289
ffffaa8d`0f276820 fffff806`0acba0d9 : ffffae0f`69bad9a0 fffff806`0acbb89d ffffae0f`65fa78a0 fffff806`0acba0d9 : FLTMGR!FltpDispatch+0xb6
ffffaa8d`0f276880 fffff806`0b2751be : 00000000`00000000 ffffae0f`69bad9a0 00000000`00000000 ffffae0f`65fa78a0 : nt!IofCallDriver+0x59
ffffaa8d`0f2768c0 fffff806`0b29b5b9 : ffffae0f`69bad970 00000000`00000001 ffff990b`00000000 00000000`00007ffe : nt!IopCloseFile+0x15e
ffffaa8d`0f276950 fffff806`0b29feae : ffffae0f`6856d080 00000000`052ce338 00000000`052cec10 00000000`00000001 : nt!ObCloseHandleTableEntry+0x229
ffffaa8d`0f276a90 fffff806`0adc6785 : 00000000`052cfda0 ffffae0f`6856d080 ffffaa8d`0f276b80 00000000`04fb796c : nt!NtClose+0xde
ffffaa8d`0f276b00 00000000`77401cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`052cec48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77401cbc
THREAD_SHA1_HASH_MOD_FUNC: 38bf4bfd27686d8128cb320bd77e3d37d404bda0
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 906eb5182cb57c1bc1c07ccbc048fe04c191c34c
THREAD_SHA1_HASH_MOD: 889dfc8497bb2cf69b9c4c8e8cabc5c1ee463770
FOLLOWUP_IP:
nt!MiStartingOffsetNeedLock+76
fffff806`0acf600e f2ff8b0ddef444 xacquire dec dword ptr [rbx+44F4DE0Dh]
FAULT_INSTR_CODE: d8bfff2
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiStartingOffsetNeedLock+76
FOLLOWUP_NAME: MachineOwner
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.379
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: hardware
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
PRIMARY_PROBLEM_CLASS: IP_MISALIGNED
TARGET_TIME: 2019-04-09T17:20:20.000Z
OSBUILD: 17763
OSSERVICEPACK: 379
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 1bb2
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:ip_misaligned
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8012baf6003, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: MONSTER
SYSTEM_PRODUCT_NAME: ABRA A5 V1
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: MONSTER
BIOS_VERSION: ABRA A5 V1
BIOS_DATE: 04/08/2014
BASEBOARD_MANUFACTURER: MONSTER
BASEBOARD_PRODUCT: ABRA A5 V1
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8012baf6003
READ_ADDRESS: GetUlongFromAddress: unable to read from fffff8012bf723c0
fffff8012bfed390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExpAddTagForBigPages+1d3
fffff801`2baf6003 480f42c8 cmovb rcx,rax
CPU_COUNT: 8
CPU_MHZ: 9be
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 04-16-2019 10:48:05.0550
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: ffffae8a42252a50 -- (.trap 0xffffae8a42252a50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdd0d0c5bf418 rbx=0000000000000000 rcx=ffffdd0d0c593000
rdx=ffffdd0d0c593000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012baf6003 rsp=ffffae8a42252be0 rbp=ffffae8a42252cc9
r8=ffffdd0d0c5bf400 r9=fffff8012c006100 r10=0000000000002000
r11=ffffdd0d0c5c3000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ExpAddTagForBigPages+0x1d3:
fffff801`2baf6003 480f42c8 cmovb rcx,rax
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8012bc6fd69 to fffff8012bc5e5e0
STACK_TEXT:
ffffae8a`42252908 fffff801`2bc6fd69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffae8a`42252910 fffff801`2bc6c18e : ffffdd0d`00000000 00000000`00000000 ffffdd0d`0a128800 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffae8a`42252a50 fffff801`2baf6003 : 00000000`00000000 00000000`00000000 00000000`00000200 fffff801`2bda5df3 : nt!KiPageFault+0x44e
ffffae8a`42252be0 fffff801`2bb65c69 : 00000000`08040d6b ffffae8a`624d6d73 00000000`00010000 00000000`00000001 : nt!ExpAddTagForBigPages+0x1d3
ffffae8a`42252c40 fffff801`2bdf506d : 00000000`00000200 00000000`00010000 00000000`624d6d73 00000000`000001b8 : nt!ExAllocateHeapPool+0x479
ffffae8a`42252d30 fffff80a`565180b6 : 00000000`000001b8 00000000`00000010 ffffdd0d`06f71bf8 00000000`00000010 : nt!ExAllocatePoolWithTag+0x3d
ffffae8a`42252e10 fffff80a`565110b9 : 00000000`00000103 00000000`00000000 ffffdd0d`06f93a20 00000000`00000000 : rdyboost!SmdRBDispatchReadWrite+0x256
ffffae8a`42252f00 fffff801`2bb630d9 : ffffdd0d`06f718a0 ffffdd0d`0a1144a0 ffffae8a`427809a0 00000000`00010000 : rdyboost!SmdDispatchReadWrite+0xa9
ffffae8a`42252f30 fffff80a`56519421 : ffffae8a`00000000 ffffdd0d`0a1144a0 ffffae8a`427809a0 ffffdd0d`06f718a0 : nt!IofCallDriver+0x59
ffffae8a`42252f70 fffff80a`565154ee : 00000000`00000020 00000000`00010000 fffff80a`56543710 00000000`00000002 : rdyboost!SmdPopulationCtxIssueIo+0xdd
ffffae8a`42252fb0 fffff80a`56515369 : ffffae8a`42253150 ffffae8a`42253219 ffffae8a`427809a0 00000000`40d7b000 : rdyboost!SmdPopulationIssueIo+0x13e
ffffae8a`42253020 fffff801`2bbcb148 : 00000000`00040d7b ffffb101`b7318200 ffffae8a`42253219 fffff80a`5651a65a : rdyboost!SmdPopulationCtxCompletionStackCallout+0x79
ffffae8a`42253070 fffff801`2bbcb0bd : fffff80a`565152f0 ffffae8a`42253150 ffffae8a`427809a0 ffffae8a`427809a0 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffae8a`422530e0 fffff80a`56525e87 : ffffdd0d`06f93a20 fffff80a`56511bfd ffffdd0d`06f93a20 fffff801`349c5000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffae8a`42253120 fffff801`2bb6c5dd : ffffdd0d`06f71bfb 00000000`00000000 ffffdd0d`06f71adb 00000000`094169a6 : rdyboost!SmdPopulationCtxCompletion+0x67
ffffae8a`42253170 fffff801`2bb6c3f7 : ffffdd0d`06f718a0 00000000`00000001 ffffdd0d`06f718a0 ffffdd0d`06f71a48 : nt!IopfCompleteRequest+0x1cd
ffffae8a`42253280 fffff801`33c24750 : 00000000`00000000 ffffdd0d`06843ad0 ffffae8a`422533b0 ffffdd0d`06843ad0 : nt!IofCompleteRequest+0x17
ffffae8a`422532b0 fffff801`2bb6c5dd : 00000000`00000000 ffffb101`b730df08 00000000`00000000 fffff801`2bbd1f3f : CLASSPNP!TransferPktComplete+0x6d0
ffffae8a`422534c0 fffff801`2bb6c3f7 : ffffdd0d`0a03cdb0 00000000`00000001 ffffb101`b7ae7fa0 00000000`00008000 : nt!IopfCompleteRequest+0x1cd
ffffae8a`422535d0 fffff80a`559c963d : ffffb101`b7ae5148 fffff801`2ba1e816 fffff801`2baab000 ffffdd0d`06e5e9b0 : nt!IofCompleteRequest+0x17
ffffae8a`42253600 fffff80a`559c8ec3 : ffffb101`b7ae5020 00000000`00989680 ffffae8a`422537d0 ffffdd0d`06e5f1b0 : storport!RaidCompleteRequestEx+0x8d
ffffae8a`422536d0 fffff80a`559df63f : 00000000`00000002 fffff780`00000320 00000000`00000001 00000000`00000000 : storport!RaidUnitCompleteRequest+0x613
ffffae8a`42253870 fffff801`2bb63c67 : ffffb101`b730af80 ffffae8a`42253a10 00000000`0001ed1f ffffb101`b7308180 : storport!RaidpAdapterRedirectDpcRoutine+0x8f
ffffae8a`42253910 fffff801`2bb632ae : 00000000`0000001a 00000000`00989680 ffffb101`b7318200 00000000`00000019 : nt!KiExecuteAllDpcs+0x2e7
ffffae8a`42253a50 fffff801`2bc61ffa : ffffffff`00000000 ffffb101`b7308180 00000000`00000000 ffffb101`b7318200 : nt!KiRetireDpcList+0x1ae
ffffae8a`42253c60 00000000`00000000 : ffffae8a`42254000 ffffae8a`4224e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
THREAD_SHA1_HASH_MOD_FUNC: b3a1283c56761bd98528de5772a20fe845f2b5a7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b9bcc1feac833a9322256038a3ad1bf3eedf8bc8
THREAD_SHA1_HASH_MOD: 8a7c8abfc08ac82b89bc619ad7f2226ad6bc89b4
FOLLOWUP_IP:
rdyboost!SmdRBDispatchReadWrite+256
fffff80a`565180b6 0f1f440000 nop dword ptr [rax+rax]
FAULT_INSTR_CODE: 441f0f
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: rdyboost!SmdRBDispatchReadWrite+256
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rdyboost
IMAGE_NAME: rdyboost.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5b832bf2
IMAGE_VERSION: 10.0.17763.194
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 256
FAILURE_BUCKET_ID: AV_rdyboost!SmdRBDispatchReadWrite
BUCKET_ID: AV_rdyboost!SmdRBDispatchReadWrite
PRIMARY_PROBLEM_CLASS: AV_rdyboost!SmdRBDispatchReadWrite
TARGET_TIME: 2019-04-09T17:03:16.000Z
OSBUILD: 17763
OSSERVICEPACK: 379
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 50c3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_rdyboost!smdrbdispatchreadwrite
FAILURE_ID_HASH: {16062197-a33d-3a53-48bb-121813d624a7}
Followup: MachineOwner
---------
4: kd> lmvm rdyboost
Browse full module list
start end module name
fffff80a`56510000 fffff80a`5655f000 rdyboost # (pdb symbols) C:\ProgramData\Dbg\sym\rdyboost.pdb\6E97EFC5ED3A3104CCC36D52A718F9771\rdyboost.pdb
Loaded symbol image file: rdyboost.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\rdyboost.sys\5B832BF24f000\rdyboost.sys
Image path: \SystemRoot\System32\drivers\rdyboost.sys
Image name: rdyboost.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 5B832BF2 (This is a reproducible build file hash, not a timestamp)
CheckSum: 0004CBBC
ImageSize: 0004F000
File version: 10.0.17763.194
Product version: 10.0.17763.194
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0000.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: rdyboost.sys
OriginalFilename: rdyboost.sys
ProductVersion: 10.0.17763.194
FileVersion: 10.0.17763.194 (WinBuild.160101.0800)
FileDescription: ReadyBoost Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80784e9ab29, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807609a2002, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: MONSTER
SYSTEM_PRODUCT_NAME: ABRA A5 V1
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: MONSTER
BIOS_VERSION: ABRA A5 V1
BIOS_DATE: 04/08/2014
BASEBOARD_MANUFACTURER: MONSTER
BASEBOARD_PRODUCT: ABRA A5 V1
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
BUGCHECK_P1: fffff80784e9ab29
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff807609a2002
READ_ADDRESS: GetUlongFromAddress: unable to read from fffff80760d773c0
fffff80760df2390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80784e9ab29
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiStartingOffset+32
fffff807`609a2002 0fb74720 movzx eax,word ptr [rdi+20h]
CPU_COUNT: 8
CPU_MHZ: 9be
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: firefox.exe
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 04-16-2019 10:48:03.0115
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: fffff48ee795c3f0 -- (.trap 0xfffff48ee795c3f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000008088 rbx=0000000000000000 rcx=ffffae03ea935000
rdx=ffffae03ea935000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807609a2002 rsp=fffff48ee795c580 rbp=00000000ffffffff
r8=00000000ffffffff r9=ffffd1065fd46310 r10=00000000ffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiStartingOffset+0x32:
fffff807`609a2002 0fb74720 movzx eax,word ptr [rdi+20h] ds:00000000`00000020=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80760a74d69 to fffff80760a635e0
STACK_TEXT:
fffff48e`e795c2a8 fffff807`60a74d69 : 00000000`0000000a fffff807`84e9ab29 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff48e`e795c2b0 fffff807`60a7118e : ffffd106`5d602340 00000000`6c526d4d fffff48e`e795c499 fffff807`6096b17b : nt!KiBugCheckDispatch+0x69
fffff48e`e795c3f0 fffff807`609a2002 : 00000000`000000c0 fffff807`6098d3b9 ffffae03`e2400000 ffff7cb4`00000030 : nt!KiPageFault+0x44e
fffff48e`e795c580 fffff807`609a3fd1 : 00000000`0284b000 00000000`0284b000 ffffae03`eddf29a0 00000000`00000000 : nt!MiStartingOffset+0x32
fffff48e`e795c5b0 fffff807`60f45e1b : 00000000`0284b000 ffffd106`6889fd40 00000000`00000000 00000000`00000000 : nt!MiStartingOffsetNeedLock+0x39
fffff48e`e795c5e0 fffff807`60e6550e : 00000000`00000000 ffffd106`5fe1c670 00000000`00000000 00000000`ffffffff : nt!MiPfPrepareReadList+0x3eb
fffff48e`e795c6b0 fffff807`60e6546c : 00000000`00000001 00000000`0000284b 00000000`00000000 ffffd106`5fe1c670 : nt!MmPrefetchPagesEx+0x96
fffff48e`e795c720 fffff802`e82cae36 : 00000000`00000001 ffffd106`5fd47380 00000000`00000001 00000000`00000001 : nt!MmPrefetchPages+0xc
fffff48e`e795c750 fffff802`e83ac08e : 00000000`00000000 ffffae03`e40799f0 ffffffff`ffffffff ffffae03`e40799f0 : Ntfs!NtfsPerformPrefetch+0x13a
fffff48e`e795c7c0 fffff802`e83aafe7 : ffffd106`64246020 ffffae03`e4079a80 ffffd106`5fc1a180 00000034`00000000 : Ntfs!NtfsReadUsnJournal+0x3b2
fffff48e`e795c960 fffff802`e83aaeb7 : ffffd106`644fad88 ffffae03`e40799f0 00000000`00000001 ffffd106`64246020 : Ntfs!NtOfsPostNewLength+0x117
fffff48e`e795ca10 fffff802`e83c246d : 00000001`3853c17f ffffd106`5fc1a180 ffffd106`5fc1a180 00000001`3853c17f : Ntfs!NtfsProcessNewLengthQueue+0x23
fffff48e`e795ca40 fffff802`e83c1efb : ffffd106`5fc1a180 ffffd106`644fad88 ffffd106`5fc1a180 ffffae03`ef0a3010 : Ntfs!NtfsCommitCurrentTransaction+0x29d
fffff48e`e795cae0 fffff802`e8381dfa : fffff48e`e795d170 ffffd106`644fad88 ffffae03`ec489630 ffffae03`ef0a3518 : Ntfs!NtfsCheckpointCurrentTransaction+0x4b
fffff48e`e795cb10 fffff802`e83c0e0a : 00000000`00000400 00000000`00000008 ffffd106`644fad88 ffffd106`673a4a90 : Ntfs!NtfsCreateNewFile+0x1c9a
fffff48e`e795cea0 fffff802`e83c43bd : ffffd106`673a4a90 fffff48e`e795d170 ffffd106`673a4a90 00000000`00000000 : Ntfs!NtfsCommonCreate+0x1bfa
fffff48e`e795d090 fffff807`609680d9 : ffffd106`5fc1a030 ffffd106`673a4a90 ffffd106`5fa62800 ffffd106`69313900 : Ntfs!NtfsFsdCreate+0x1cd
fffff48e`e795d2f0 fffff802`e6e06219 : ffffd106`673a4a90 ffffd106`69313900 ffffd106`673a4f08 ffffd106`5f9a48d0 : nt!IofCallDriver+0x59
fffff48e`e795d330 fffff802`e6e3d559 : fffff48e`e795d3e0 ffffd106`69313900 00000000`000000c0 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x289
fffff48e`e795d3a0 fffff807`609680d9 : ffffd106`69313800 ffffd106`68d689a0 00000000`00000000 00000000`00000030 : FLTMGR!FltpCreate+0x2f9
fffff48e`e795d450 fffff807`609694b4 : 00000000`00000000 00000000`00000005 ffffd106`5faf51b0 fffff807`60969eb3 : nt!IofCallDriver+0x59
fffff48e`e795d490 fffff807`60f24fe2 : fffff48e`e795d750 ffffd106`68d689a0 00000000`00000005 ffffd106`5f9738f0 : nt!IoCallDriverWithTracing+0x34
fffff48e`e795d4e0 fffff807`60f4a1b9 : ffffd106`5f9738f0 ffffd106`5f973800 ffffd106`6457e6a0 ffffae03`ed723301 : nt!IopParseDevice+0x632
fffff48e`e795d650 fffff807`60f487bf : ffffd106`6457e600 fffff48e`e795d8b8 00000000`00000040 ffffd106`5dcf24e0 : nt!ObpLookupObjectName+0x719
fffff48e`e795d820 fffff807`60e9e974 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000028 : nt!ObOpenObjectByNameEx+0x1df
fffff48e`e795d960 fffff807`60e9e559 : 00000000`23dde560 00000000`00000000 00000000`23ddee30 00000000`23dde578 : nt!IopCreateFile+0x404
fffff48e`e795da00 fffff807`60a74785 : 00000000`00000000 00000000`00000001 00000000`23dde578 fffff48e`e795db80 : nt!NtCreateFile+0x79
fffff48e`e795da90 00007ff9`bb280114 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`23dde4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`bb280114
THREAD_SHA1_HASH_MOD_FUNC: 5774f6be9dd40cc4fcf7b800369d45860aeaacf5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2f88dbfe577bc20c08fe4139b69d02e6e012d3e1
THREAD_SHA1_HASH_MOD: 0457ef36599ece36707666ee95213e84cd362e09
FOLLOWUP_IP:
nt!MiStartingOffset+32
fffff807`609a2002 0fb74720 movzx eax,word ptr [rdi+20h]
FAULT_INSTR_CODE: 2047b70f
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiStartingOffset+32
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.379
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 32
FAILURE_BUCKET_ID: AV_nt!MiStartingOffset
BUCKET_ID: AV_nt!MiStartingOffset
PRIMARY_PROBLEM_CLASS: AV_nt!MiStartingOffset
TARGET_TIME: 2019-04-09T15:20:56.000Z
OSBUILD: 17763
OSSERVICEPACK: 379
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 2cdb
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!mistartingoffset
FAILURE_ID_HASH: {4ff16e87-b5e0-759b-5df2-e0f10fb2c49c}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80201c5f27b, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802022f5fff, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: MONSTER
SYSTEM_PRODUCT_NAME: ABRA A5 V1
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: MONSTER
BIOS_VERSION: ABRA A5 V1
BIOS_DATE: 04/08/2014
BASEBOARD_MANUFACTURER: MONSTER
BASEBOARD_PRODUCT: ABRA A5 V1
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
BUGCHECK_P1: fffff80201c5f27b
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff802022f5fff
READ_ADDRESS: GetUlongFromAddress: unable to read from fffff8020276b3c0
fffff802027e6390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80201c5f27b
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiUpdateSpeculationControl+20f
fffff802`022f5fff 0fb685fb000000 movzx eax,byte ptr [rbp+0FBh]
CPU_COUNT: 8
CPU_MHZ: 9be
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 04-16-2019 10:48:00.0436
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: fffffb0372d1e5b0 -- (.trap 0xfffffb0372d1e5b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802022f5fff rsp=fffffb0372d1e740 rbp=fffff8020120f180
r8=fffff8020120f180 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!KiUpdateSpeculationControl+0x20f:
fffff802`022f5fff 0fb685fb000000 movzx eax,byte ptr [rbp+0FBh] ss:0018:fffff802`0120f27b=00
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80202468d69 to fffff802024575e0
STACK_TEXT:
fffffb03`72d1e468 fffff802`02468d69 : 00000000`0000000a fffff802`01c5f27b 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffffb03`72d1e470 fffff802`0246518e : ffff8f0f`ba876740 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffb03`72d1e5b0 fffff802`022f5fff : ffff8f0f`00000000 ffff8f0f`00000001 fffff802`0120f180 fffff802`0120f180 : nt!KiPageFault+0x44e
fffffb03`72d1e740 fffff802`0245e60f : 00002425`bd9bbfff 00000000`00000000 fffff802`00000001 00000000`00000000 : nt!KiUpdateSpeculationControl+0x20f
fffffb03`72d1e7b0 fffff802`0245e186 : ffff8f0f`b4c990d0 ffff8f0f`b4c99050 00000000`00000314 ffff8f0f`b3a02100 : nt!SwapContext+0x1af
fffffb03`72d1e7f0 fffff802`023bd6c7 : ffff8f0f`b4ef6040 00000000`00000000 fffff802`02803400 fffff802`025ef753 : nt!KiSwapContext+0x76
fffffb03`72d1e930 fffff802`023bd1f8 : ffff8f0f`b4ef6040 fffff80e`00000000 fffff80e`12a03650 00000000`080ceb00 : nt!KiSwapThread+0x297
fffffb03`72d1e9f0 fffff802`023baf02 : 00000000`00000900 00000000`00000000 00000000`00000002 fffffb03`72d1eb19 : nt!KiCommitThreadWait+0x508
fffffb03`72d1ea90 fffff80e`129de8ed : ffff8f0f`00000002 fffffb03`72d1eba0 00000000`00000000 00000000`00000000 : nt!KeWaitForMultipleObjects+0x582
fffffb03`72d1eb60 fffff80e`129db5b1 : 00000000`00000000 00000000`00000000 ffffa001`9c1ae200 00000000`00000079 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0xed
fffffb03`72d1ebe0 fffff802`0232abc5 : ffff8f0f`b4c99000 fffff80e`129db5a0 fffffb03`72805e88 00002425`bd9bbfff : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorkerThread+0x11
fffffb03`72d1ec10 fffff802`0245ea3c : ffffa001`9c19e180 ffff8f0f`b4ef6040 fffff802`0232ab70 10c012d0`14e016f0 : nt!PspSystemThreadStartup+0x55
fffffb03`72d1ec60 00000000`00000000 : fffffb03`72d1f000 fffffb03`72d19000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x1c
THREAD_SHA1_HASH_MOD_FUNC: d4efeb6544c6ea84bd7ea484f010ea48156b2813
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 903b9d4ac83ca35304586b914d77b982801ddedd
THREAD_SHA1_HASH_MOD: 4c06ba5399892105b115bc59b1f9fa4e5c7f5c03
FOLLOWUP_IP:
rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+ed
fffff80e`129de8ed 0f1f440000 nop dword ptr [rax+rax]
FAULT_INSTR_CODE: 441f0f
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+ed
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rdyboost
IMAGE_NAME: rdyboost.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5b832bf2
IMAGE_VERSION: 10.0.17763.194
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: ed
FAILURE_BUCKET_ID: AV_rdyboost!SMKM_STORE_SMD_TRAITS_::SmStWorker
BUCKET_ID: AV_rdyboost!SMKM_STORE_SMD_TRAITS_::SmStWorker
PRIMARY_PROBLEM_CLASS: AV_rdyboost!SMKM_STORE_SMD_TRAITS_::SmStWorker
TARGET_TIME: 2019-04-09T10:14:02.000Z
OSBUILD: 17763
OSSERVICEPACK: 379
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 279a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_rdyboost!smkm_store_smd_traits_::smstworker
FAILURE_ID_HASH: {a445d5da-23f2-fc4c-8edf-f29a74445024}
Followup: MachineOwner
---------
BAD_SYSTEM_CONFIG_INFO (74)
Can indicate that the SYSTEM hive loaded by the osloader/NTLDR
was corrupt. This is unlikely, since the osloader will check
a hive to make sure it isn't corrupt after loading it.
It can also indicate that some critical registry keys and values
are not present. (i.e. somebody used regedt32 to delete something
that they shouldn't have) Booting from LastKnownGood may fix
the problem, but if someone is persistent enough in mucking with
the registry they will need to reinstall or use the Emergency
Repair Disk.
Arguments:
Arg1: 0000000000000002, (reserved)
Arg2: ffff8e8fed362a70, (reserved)
Arg3: 0000000000000002, (reserved)
Arg4: ffffffffc000014c, usually the NT status code.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
DUMP_TYPE: 2
BUGCHECK_P1: 2
BUGCHECK_P2: ffff8e8fed362a70
BUGCHECK_P3: 2
BUGCHECK_P4: ffffffffc000014c
ERROR_CODE: (NTSTATUS) 0xc000014c - <Unable to get error code text>
BUGCHECK_STR: 0x74_2_c000014c
CPU_COUNT: 8
CPU_MHZ: 9be
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Registry
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 04-16-2019 10:47:58.0057
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
LAST_CONTROL_TRANSFER: from fffff801569f67e7 to fffff801563ccb40
STACK_TEXT:
ffff8e8f`ed362978 fffff801`569f67e7 : 00000000`00000074 00000000`00000002 ffff8e8f`ed362a70 00000000`00000002 : nt!KeBugCheckEx
ffff8e8f`ed362980 fffff801`562aa625 : ffffb98a`23f5e080 ffffb98a`23f5e080 fffff801`56938b70 00000000`00000002 : nt!CmpLoadHiveThread+0xbdc77
ffff8e8f`ed362c10 fffff801`563d3f9c : fffff801`5516c180 ffffb98a`23f5e080 fffff801`562aa5d0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8e8f`ed362c60 00000000`00000000 : ffff8e8f`ed363000 ffff8e8f`ed35d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x1c
THREAD_SHA1_HASH_MOD_FUNC: 4ea5d1b08bfdd843cc46e9ec8edba00d0b2ed432
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 079cf27efe3adbfc91904153b3eb96e7c8f1e450
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!CmpLoadHiveThread+bdc77
fffff801`569f67e7 cc int 3
FAULT_INSTR_CODE: 1b441cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!CmpLoadHiveThread+bdc77
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.253
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: bdc77
FAILURE_BUCKET_ID: 0x74_2_c000014c_nt!CmpLoadHiveThread
BUCKET_ID: 0x74_2_c000014c_nt!CmpLoadHiveThread
PRIMARY_PROBLEM_CLASS: 0x74_2_c000014c_nt!CmpLoadHiveThread
TARGET_TIME: 2019-04-11T10:55:49.000Z
OSBUILD: 17763
OSSERVICEPACK: 253
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 15fc
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x74_2_c000014c_nt!cmploadhivethread
FAILURE_ID_HASH: {635f2983-bece-5263-565c-834f3be7c2f2}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff8050d01800e, The address that the exception occurred at
Arg3: ffff920e461a8d18, Parameter 0 of the exception
Arg4: ffff920e461a8560, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: MONSTER
SYSTEM_PRODUCT_NAME: ABRA A5 V1
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: MONSTER
BIOS_VERSION: ABRA A5 V1
BIOS_DATE: 04/08/2014
BASEBOARD_MANUFACTURER: MONSTER
BASEBOARD_PRODUCT: ABRA A5 V1
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
BUGCHECK_P1: ffffffff80000003
BUGCHECK_P2: fffff8050d01800e
BUGCHECK_P3: ffff920e461a8d18
BUGCHECK_P4: ffff920e461a8560
EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - Bir veya daha fazla ba ms z de i ken ge ersiz
FAULTING_IP:
nt!KiAbFindWakeupLockEntry+46
fffff805`0d01800e cc int 3
EXCEPTION_PARAMETER1: ffff920e461a8d18
EXCEPTION_PARAMETER2: ffff920e461a8560
BUGCHECK_STR: 0x1E_80000003
CPU_COUNT: 8
CPU_MHZ: 9be
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 04-16-2019 10:47:55.0486
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
LAST_CONTROL_TRANSFER: from fffff8050d293de7 to fffff8050d1b95e0
STACK_TEXT:
ffff920e`461a7cb8 fffff805`0d293de7 : 00000000`0000001e ffffffff`80000003 fffff805`0d01800e ffff920e`461a8d18 : nt!KeBugCheckEx
ffff920e`461a7cc0 fffff805`0d1d3536 : fffff805`0d01800e fffff805`0d07e838 ffff920e`461a8f50 ffff920e`461a8560 : nt!KiFatalFilter+0x1f
ffff920e`461a7d00 fffff805`0d19441f : ffff818f`00000002 ffff920e`461a96a0 ffff920e`461a4000 ffff920e`461aa000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffff920e`461a7d40 fffff805`0d1c20cf : ffff920e`461a96a0 ffff920e`461a8320 ffff920e`461a8400 00000000`00000000 : nt!_C_specific_handler+0x9f
ffff920e`461a7db0 fffff805`0d02cb20 : ffff920e`461a8400 00000000`00000000 ffff920e`461a8320 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xf
ffff920e`461a7de0 fffff805`0d071e74 : ffff920e`461a8d18 ffff920e`461a8a60 ffff920e`461a8d18 00000000`00000000 : nt!RtlDispatchException+0x430
ffff920e`461a8530 fffff805`0d1cae42 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x144
ffff920e`461a8be0 fffff805`0d1c4b7b : ffff818f`606ab030 00000000`00000000 ffff818f`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
ffff920e`461a8dc0 fffff805`0d01800f : ffff818f`699c3080 ffff818f`605a4e18 ffff818f`5e8dea80 00000000`00000001 : nt!KiBreakpointTrap+0x2fb
ffff920e`461a8f50 fffff805`0d017cec : ffff818f`605a4ec8 00000000`00000000 ffffb081`324d9180 ffff818f`66f7e1c0 : nt!KiAbFindWakeupLockEntry+0x47
ffff920e`461a8fa0 fffff805`0d0e2784 : 00000000`0000000b 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpReleaseFastMutexContended+0x13c
ffff920e`461a9030 fffff805`0d697757 : 00000000`00000000 ffff920e`461a9198 ffffda80`00000400 00000000`05cbdc00 : nt!CcPinFileData+0x9c4
ffff920e`461a9130 fffff80e`24bc7390 : ffff920e`461a9368 ffff920e`461a9388 ffff818f`00000400 ffff818f`00000001 : nt!CcPinMappedData+0xe7
ffff920e`461a91f0 fffff80e`24bc7096 : ffffda80`4ea5f010 00000000`00000000 ffff818f`68044768 00000000`00000000 : Ntfs!NtfsChangeAttributeValue_TemporaryCompilerBugWorkaround_+0x210
ffff920e`461a9410 fffff80e`24b8ec28 : ffff818f`68044768 ffffda80`4ea5f010 ffff818f`68044768 ffffda80`4ea5f010 : Ntfs!NtfsUpdateStandardInformation+0x346
ffff920e`461a9550 fffff80e`24b8d829 : ffff818f`68044768 ffff818f`67ced010 fffff80e`24b8d801 ffff920e`461a9780 : Ntfs!NtfsCommonFlushBuffers+0x394
ffff920e`461a9670 fffff805`0d126148 : ffff920e`461a9780 ffff818f`68044768 00000000`00000000 ffff818f`60675c40 : Ntfs!NtfsCommonFlushBuffersCallout+0x19
ffff920e`461a96a0 fffff805`0d1260bd : fffff80e`24b8d810 ffff920e`461a9780 00000000`00000000 fffff80e`23f256f1 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff920e`461a9710 fffff80e`24be3d1b : ffff818f`00000001 00000000`00000000 ffff920e`461a9770 fffff80e`23f3c480 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff920e`461a9750 fffff80e`24be3c5d : 00000000`00000000 ffff818f`67ced010 00000000`00000000 ffff818f`68044768 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x53
ffff920e`461a97c0 fffff805`0d0be0d9 : ffff818f`669aa520 ffff818f`67ced010 ffff818f`68044768 ffff920e`461a97e8 : Ntfs!NtfsFsdFlushBuffers+0xdd
ffff920e`461a9830 fffff80e`23f26219 : 00000000`00000000 ffff920e`461a9900 ffff818f`67ced010 ffff920e`461a9910 : nt!IofCallDriver+0x59
ffff920e`461a9870 fffff80e`23f24a36 : ffff920e`461a9900 ffff818f`605c6d60 ffff920e`461a9908 ffff818f`6047cdc0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x289
ffff920e`461a98e0 fffff805`0d0be0d9 : ffff818f`67ced010 00000000`00120196 00000000`00001eeb 00000000`329bf701 : FLTMGR!FltpDispatch+0xb6
ffff920e`461a9940 fffff805`0d679721 : ffff920e`461a9b80 ffff818f`67ced010 00000000`00000001 ffff818f`6954bc60 : nt!IofCallDriver+0x59
ffff920e`461a9980 fffff805`0d6403bf : ffff818f`00000000 ffff818f`6954bc60 ffff920e`461a9b80 ffff920e`461a9b80 : nt!IopSynchronousServiceTail+0x1b1
ffff920e`461a9a30 fffff805`0d6401e6 : ffff818f`699c3080 00000000`329bf7c8 ffff818f`605c6d60 00000000`29f12000 : nt!NtFlushBuffersFileEx+0x1bf
ffff920e`461a9ac0 fffff805`0d1ca785 : ffff818f`00000000 ffff920e`00000001 00000000`00818000 ffff920e`461a9b80 : nt!NtFlushBuffersFile+0x16
ffff920e`461a9b00 00007ffc`fb02ffd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`3297e808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`fb02ffd4
THREAD_SHA1_HASH_MOD_FUNC: 1b7a307564740ebed71dcba2528aa0a8b7ccb755
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1d2eb46e29feaa4d8de9f250b52dce69b02e92b0
THREAD_SHA1_HASH_MOD: 1354ca4d78269163bee6c7f34da74cf2358ed3a7
FOLLOWUP_IP:
nt!KiAbFindWakeupLockEntry+46
fffff805`0d01800e cc int 3
FAULT_INSTR_CODE: 1c48cc
SYMBOL_NAME: nt!KiAbFindWakeupLockEntry+46
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.379
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 46
FAILURE_BUCKET_ID: 0x1E_80000003_nt!KiAbFindWakeupLockEntry
BUCKET_ID: 0x1E_80000003_nt!KiAbFindWakeupLockEntry
PRIMARY_PROBLEM_CLASS: 0x1E_80000003_nt!KiAbFindWakeupLockEntry
TARGET_TIME: 2019-04-09T16:25:31.000Z
OSBUILD: 17763
OSSERVICEPACK: 379
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 33ed
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_80000003_nt!kiabfindwakeuplockentry
FAILURE_ID_HASH: {5b6cf24d-4ab0-8815-c7bb-186999292a87}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8010627e008, Address of the instruction which caused the bugcheck
Arg3: fffffc0a5bbc6210, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: MONSTER
SYSTEM_PRODUCT_NAME: ABRA A5 V1
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: MONSTER
BIOS_VERSION: ABRA A5 V1
BIOS_DATE: 04/08/2014
BASEBOARD_MANUFACTURER: MONSTER
BASEBOARD_PRODUCT: ABRA A5 V1
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8010627e008
BUGCHECK_P3: fffffc0a5bbc6210
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!IopCloseFile+e8
fffff801`0627e008 a4 movs byte ptr [rdi],byte ptr [rsi]
CONTEXT: fffffc0a5bbc6210 -- (.cxr 0xfffffc0a5bbc6210)
rax=0000000000000001 rbx=ffff9284b7c935a0 rcx=0000000000000000
rdx=0000000000004f0e rsi=0000000000000000 rdi=00000000000c0002
rip=fffff8010627e008 rsp=fffffc0a5bbc6c00 rbp=000000000200004f
r8=0000000000000000 r9=0000000000000001 r10=0000000000000001
r11=0000000000000000 r12=ffff9284b6eaf540 r13=ffff9284aefa8b30
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!IopCloseFile+0xe8:
fffff801`0627e008 a4 movs byte ptr [rdi],byte ptr [rsi] ds:002b:00000000`000c0002=?? ds:002b:00000000`00000000=??
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 8
CPU_MHZ: 9be
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 04-16-2019 10:47:52.0839
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
MISALIGNED_IP:
nt!IopCloseFile+e8
fffff801`0627e008 a4 movs byte ptr [rdi],byte ptr [rsi]
LAST_CONTROL_TRANSFER: from fffff801062a44c9 to fffff8010627e008
STACK_TEXT:
fffffc0a`5bbc6c00 fffff801`062a44c9 : ffff9284`b7c93570 00000000`00000001 ffff8082`00000000 00000000`00007ffe : nt!IopCloseFile+0xe8
fffffc0a`5bbc6c90 fffff801`062a8dbe : ffff9284`b411e080 00000000`055ad780 00000000`055ad830 00000000`00000074 : nt!ObCloseHandleTableEntry+0x229
fffffc0a`5bbc6dd0 fffff801`05dc5d85 : ffff9284`b411e080 00000000`055acd68 fffffc0a`5bbc6ec0 ffff9284`b4323660 : nt!NtClose+0xde
fffffc0a`5bbc6e40 00007fff`9fa8f844 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`055ad8c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`9fa8f844
THREAD_SHA1_HASH_MOD_FUNC: c660c1b57814cec2a0fe3d9ca27acefaf80836fe
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d1508ab29714fb05b0a214078b164923d5722abe
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!IopCloseFile+e8
fffff801`0627e008 a4 movs byte ptr [rdi],byte ptr [rsi]
FAULT_INSTR_CODE: 8b48ffa4
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!IopCloseFile+e8
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.253
STACK_COMMAND: .cxr 0xfffffc0a5bbc6210 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
PRIMARY_PROBLEM_CLASS: IP_MISALIGNED
TARGET_TIME: 2019-04-11T11:26:46.000Z
OSBUILD: 17763
OSSERVICEPACK: 253
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 15a8
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:ip_misaligned
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffda892552c2e8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff806126f6002, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: MONSTER
SYSTEM_PRODUCT_NAME: ABRA A5 V1
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: MONSTER
BIOS_VERSION: ABRA A5 V1
BIOS_DATE: 04/08/2014
BASEBOARD_MANUFACTURER: MONSTER
BASEBOARD_PRODUCT: ABRA A5 V1
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
BUGCHECK_P1: ffffda892552c2e8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff806126f6002
BUGCHECK_P4: 2
READ_ADDRESS: GetUlongFromAddress: unable to read from fffff80612b633c0
fffff80612bde390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffda892552c2e8
FAULTING_IP:
nt!FsRtlLookupPerFileObjectContext+12
fffff806`126f6002 488bda mov rbx,rdx
MM_INTERNAL_CODE: 2
CPU_COUNT: 8
CPU_MHZ: 9be
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 04-16-2019 10:47:50.0090
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: ffff8983712ae4f0 -- (.trap 0xffff8983712ae4f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000200 rbx=0000000000000000 rcx=ffffda88b0893da0
rdx=ffffda88a6c28270 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806126f6002 rsp=ffff8983712ae680 rbp=ffffda88b0893da0
r8=0000000000000000 r9=0000000000000002 r10=0000000000000001
r11=ffffda88aa01f010 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!FsRtlLookupPerFileObjectContext+0x12:
fffff806`126f6002 488bda mov rbx,rdx
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8061287f00f to fffff8061284f5e0
STACK_TEXT:
ffff8983`712ae208 fffff806`1287f00f : 00000000`00000050 ffffda89`2552c2e8 00000000`00000000 ffff8983`712ae4f0 : nt!KeBugCheckEx
ffff8983`712ae210 fffff806`127a3ab7 : ffff9eff`ffffffff 00000000`00000000 00000000`00000000 ffffda89`2552c2e8 : nt!MiSystemFault+0x1ac34f
ffff8983`712ae350 fffff806`1285d083 : 00000000`00000400 00000000`00000000 00000000`00000001 00000000`0000008b : nt!MmAccessFault+0x327
ffff8983`712ae4f0 fffff806`126f6002 : 00000000`00000000 da88b022`aa580470 ffffda88`ac548580 00000000`00000000 : nt!KiPageFault+0x343
ffff8983`712ae680 fffff809`7a924bb7 : ffff8e0c`09461490 ffff8983`712ae740 00000000`00060043 00000000`00000000 : nt!FsRtlLookupPerFileObjectContext+0x12
ffff8983`712ae6b0 fffff809`7a924a1e : ffffffff`ffffffff 00000000`00000001 ffffec80`05957ac0 ffffec80`05957ae2 : FLTMGR!FltpPassThrough+0xe7
ffff8983`712ae720 fffff806`127540d9 : ffffda88`afc80550 fffff806`126bcbfb ffffda88`b0893da0 00000000`00000000 : FLTMGR!FltpDispatch+0x9e
ffff8983`712ae780 fffff806`126bbcc0 : ffffda88`a6eccb50 ffffda88`afc80550 ffffda88`ac7400b0 ffffda88`ac740170 : nt!IofCallDriver+0x59
ffff8983`712ae7c0 fffff806`12737609 : ffffda88`ac740060 ffffda88`ac740080 ffffda88`ac7400c0 ffffda88`ac7400b0 : nt!IoPageReadEx+0x188
ffff8983`712ae810 fffff806`12737f6d : 00000000`00000003 ffff8983`712ae8f0 ffff8983`712aea58 fffff806`127a5a96 : nt!MiIssueHardFaultIo+0xc1
ffff8983`712ae860 fffff806`127a3b7d : 00000000`c0033333 00000000`00000001 00000000`6b9ab260 ffffda88`ac548080 : nt!MiIssueHardFault+0x3ed
ffff8983`712ae960 fffff806`1285d083 : ffffda88`00000000 00000000`00000001 00000000`002bc000 ffff8983`712aeb80 : nt!MmAccessFault+0x3ed
ffff8983`712aeb00 00000000`6b9ab260 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x343
00000000`0060c9a4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6b9ab260
THREAD_SHA1_HASH_MOD_FUNC: 10605c614f0d176669c1ee519f59a30a58d81bcc
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b4dffd8019e68475e0bf7086c14ea99fe20cc5b5
THREAD_SHA1_HASH_MOD: 20c284ed2dff418690dca95f455f8cd542427f5f
FOLLOWUP_IP:
nt!FsRtlLookupPerFileObjectContext+12
fffff806`126f6002 488bda mov rbx,rdx
FAULT_INSTR_CODE: 48da8b48
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!FsRtlLookupPerFileObjectContext+12
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.379
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12
FAILURE_BUCKET_ID: AV_R_INVALID_nt!FsRtlLookupPerFileObjectContext
BUCKET_ID: AV_R_INVALID_nt!FsRtlLookupPerFileObjectContext
PRIMARY_PROBLEM_CLASS: AV_R_INVALID_nt!FsRtlLookupPerFileObjectContext
TARGET_TIME: 2019-04-09T16:31:16.000Z
OSBUILD: 17763
OSSERVICEPACK: 379
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 20a0
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_r_invalid_nt!fsrtllookupperfileobjectcontext
FAILURE_ID_HASH: {29a5473e-11a9-8028-a02d-0eb466cf145e}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff86abec04b4a8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80236638ef2, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: MONSTER
SYSTEM_PRODUCT_NAME: ABRA A5 V1
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: MONSTER
BIOS_VERSION: ABRA A5 V1
BIOS_DATE: 04/08/2014
BASEBOARD_MANUFACTURER: MONSTER
BASEBOARD_PRODUCT: ABRA A5 V1
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
BUGCHECK_P1: ffff86abec04b4a8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80236638ef2
BUGCHECK_P4: 2
READ_ADDRESS: GetUlongFromAddress: unable to read from fffff80236577540
fffff802365f2390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff86abec04b4a8
FAULTING_IP:
nt!HvpGetCellPaged+a2
fffff802`36638ef2 418b02 mov eax,dword ptr [r10]
MM_INTERNAL_CODE: 2
CPU_COUNT: 8
CPU_MHZ: 9be
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: Registry
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 04-16-2019 10:47:43.0694
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: ffffdd010cbed430 -- (.trap 0xffffdd010cbed430)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000007
rdx=00000000000004a8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80236638ef2 rsp=ffffdd010cbed5c8 rbp=0000000000000012
r8=000000000000001c r9=ffffc48d5b0e60c0 r10=ffff86abec04b4a8
r11=00000000000004a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!HvpGetCellPaged+0xa2:
fffff802`36638ef2 418b02 mov eax,dword ptr [r10] ds:ffff86ab`ec04b4a8=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802363078db to fffff80236263730
STACK_TEXT:
ffffdd01`0cbed148 fffff802`363078db : 00000000`00000050 ffff86ab`ec04b4a8 00000000`00000000 ffffdd01`0cbed430 : nt!KeBugCheckEx
ffffdd01`0cbed150 fffff802`361783d7 : ffffdd01`0cbed2f8 00000000`00000000 00000000`00000000 ffff86ab`ec04b4a8 : nt!MiSystemFault+0x1302ab
ffffdd01`0cbed290 fffff802`36271183 : 00000000`000000c0 ffffb201`7d340000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x327
ffffdd01`0cbed430 fffff802`36638ef2 : fffff802`36748069 ffff8501`ec884008 ffff8501`ec884008 00000000`00000000 : nt!KiPageFault+0x343
ffffdd01`0cbed5c8 fffff802`36748069 : ffff8501`ec884008 ffff8501`ec884008 00000000`00000000 fffff802`00000000 : nt!HvpGetCellPaged+0xa2
ffffdd01`0cbed5d0 fffff802`36747e52 : 00000001`ffffffff ffffdd01`0cbed6b0 00000000`00000000 fffff802`36182379 : nt!CmpConstructNameFromKeyNodes+0x1a9
ffffdd01`0cbed650 fffff802`3674745a : 00000000`00000000 ffffdd01`0cbedb80 00000000`00000000 ffff8502`036aae70 : nt!CmpConstructNameWithStatus+0xf2
ffffdd01`0cbed6b0 fffff802`366a8759 : 00000000`00000007 ffffdd01`0cbed980 00000000`00000003 ffffc48d`00000001 : nt!CmQueryKey+0x1ba
ffffdd01`0cbed8a0 fffff802`36274885 : 00000000`00000003 00000000`00000000 00000000`00000000 00000000`0535f370 : nt!NtQueryKey+0x509
ffffdd01`0cbeda90 00007ffc`eeeff954 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0535f138 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`eeeff954
THREAD_SHA1_HASH_MOD_FUNC: 34e835830344ed2a28922a4b2a8a9ec56ebe88f9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b319e6ed9a39bff24b165723d6fa5ce0ae7f06e1
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!HvpGetCellPaged+a2
fffff802`36638ef2 418b02 mov eax,dword ptr [r10]
FAULT_INSTR_CODE: 41028b41
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!HvpGetCellPaged+a2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 438ffec3
IMAGE_VERSION: 10.0.17763.437
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: AV_R_INVALID_nt!HvpGetCellPaged
BUCKET_ID: AV_R_INVALID_nt!HvpGetCellPaged
PRIMARY_PROBLEM_CLASS: AV_R_INVALID_nt!HvpGetCellPaged
TARGET_TIME: 2019-04-12T08:45:41.000Z
OSBUILD: 17763
OSSERVICEPACK: 437
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-12-02 10:58:59
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 4c6e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_r_invalid_nt!hvpgetcellpaged
FAILURE_ID_HASH: {8bf44da1-149f-63eb-e4a3-29a691e6eb62}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff801e69bc91a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80224108002, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: MONSTER
SYSTEM_PRODUCT_NAME: ABRA A5 V1
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: MONSTER
BIOS_VERSION: ABRA A5 V1
BIOS_DATE: 04/08/2014
BASEBOARD_MANUFACTURER: MONSTER
BASEBOARD_PRODUCT: ABRA A5 V1
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
BUGCHECK_P1: fffff801e69bc91a
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80224108002
WRITE_ADDRESS: GetUlongFromAddress: unable to read from fffff802244e13c0
fffff8022455c390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff801e69bc91a
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiDeleteVa+912
fffff802`24108002 48c1f910 sar rcx,10h
CPU_COUNT: 8
CPU_MHZ: 9be
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: dwm.exe
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 04-16-2019 10:47:46.0981
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: ffffad83985b0e70 -- (.trap 0xffffad83985b0e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc2ffffffffff rbx=0000000000000000 rcx=0211be0000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80224108002 rsp=ffffad83985b1000 rbp=ffffad83985b10a9
r8=0000000000000000 r9=ffffc2ffffffffff r10=ffffc28000000000
r11=ffffc50dd5f63580 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiDeleteVa+0x912:
fffff802`24108002 48c1f910 sar rcx,10h
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802241ded69 to fffff802241cd5e0
STACK_TEXT:
ffffad83`985b0d28 fffff802`241ded69 : 00000000`0000000a fffff801`e69bc91a 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffad83`985b0d30 fffff802`241db18e : 00000000`00000000 ffffc50d`d5f63080 00000001`00000000 fffff802`24457880 : nt!KiBugCheckDispatch+0x69
ffffad83`985b0e70 fffff802`24108002 : ffffad83`985b1500 00000000`00000000 00000000`00000004 fffff802`24101f4a : nt!KiPageFault+0x44e
ffffad83`985b1000 fffff802`24101d57 : ffffad83`985b1540 ffffc2e1`00000000 0000007f`fffffff8 fffff802`00000000 : nt!MiDeleteVa+0x912
ffffad83`985b1110 fffff802`2410214a : ffffad83`985b1540 00000000`00000000 ffffad83`00000001 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x2c7
ffffad83`985b1200 fffff802`2410214a : ffffad83`985b1540 00000000`00000000 ffffad83`00000002 fffff802`00000000 : nt!MiWalkPageTablesRecursively+0x6ba
ffffad83`985b12f0 fffff802`2410160a : ffffad83`985b1540 00000000`00000000 00000000`00000003 ffffc50d`00000000 : nt!MiWalkPageTablesRecursively+0x6ba
ffffad83`985b13e0 fffff802`24103f1d : ffffad83`985b1540 00000000`00000001 00000000`00000000 00000000`00000000 : nt!MiWalkPageTables+0x1ea
ffffad83`985b14d0 fffff802`24104a75 : 00000000`00000000 ffffc50d`d5f633f0 ffffad83`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x1dd
ffffad83`985b1710 fffff802`245c5151 : 00000000`00000000 ffffc50d`d6011080 ffffc50d`d995e260 00000000`00001000 : nt!MiDeleteVad+0x7c5
ffffad83`985b1880 fffff802`245c4f4f : ffffc50d`d995e260 00000000`00000000 00000211`be0c0000 00000000`00000000 : nt!MiUnmapVad+0x49
ffffad83`985b18b0 fffff802`245c49ef : 00000000`00000000 ffffad83`985b19b8 00000000`00000000 fffff03f`875634b0 : nt!MiUnmapViewOfSection+0x11f
ffffad83`985b1990 fffff027`035e3a4e : 00000000`00000000 00000000`d5f45d10 00000001`00000001 00000024`00000000 : nt!MmUnmapViewOfSection+0xf
ffffad83`985b19c0 fffff027`035e3a1d : 00000000`00000002 000000ab`e95efc60 00000000`00000001 fffff802`2412d2b5 : win32kbase!DirectComposition::CBatchSharedMemoryPool::UnmapUserModeView+0x26
ffffad83`985b19f0 fffff027`035e3815 : 00000000`00000000 ffffc50d`d60b9d10 00000000`00000000 fffff03f`807b5bc0 : win32kbase!DirectComposition::CBatchSharedMemoryPool::Reset+0x19
ffffad83`985b1a20 fffff027`035e33c3 : 00000000`00000000 00000000`00000001 fffff03f`807b5b01 00000000`00000000 : win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment+0x281
ffffad83`985b1aa0 fffff802`241de785 : ffffc50d`d6011080 ffffad83`985b1b80 00000211`b7980fe0 00000000`00000000 : win32kbase!NtDCompositionSubmitDWMBatch+0x153
ffffad83`985b1b00 00007ffa`b93538a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ab`e95efa18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`b93538a4
THREAD_SHA1_HASH_MOD_FUNC: cf2ad8c7829148ac26206a06ca8eb5fb03f6a8ea
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 578d107bfdcdad6e6a96af7a8460b78b1c06e4eb
THREAD_SHA1_HASH_MOD: b5e9841afdadecf830e0cc431619744b52eb55f3
FOLLOWUP_IP:
win32kbase!DirectComposition::CBatchSharedMemoryPool::UnmapUserModeView+26
fffff027`035e3a4e 0f1f440000 nop dword ptr [rax+rax]
FAULT_INSTR_CODE: 441f0f
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: win32kbase!DirectComposition::CBatchSharedMemoryPool::UnmapUserModeView+26
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.379
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 26
FAILURE_BUCKET_ID: AV_win32kbase!DirectComposition::CBatchSharedMemoryPool::UnmapUserModeView
BUCKET_ID: AV_win32kbase!DirectComposition::CBatchSharedMemoryPool::UnmapUserModeView
PRIMARY_PROBLEM_CLASS: AV_win32kbase!DirectComposition::CBatchSharedMemoryPool::UnmapUserModeView
TARGET_TIME: 2019-04-09T14:44:27.000Z
OSBUILD: 17763
OSSERVICEPACK: 379
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 15a7
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_win32kbase!directcomposition::cbatchsharedmemorypool::unmapusermodeview
FAILURE_ID_HASH: {7dc33770-c5f4-8044-e485-0f7bc6c08a83}
Followup: MachineOwner
---------
Merhaba, Abra A7 v5.2 kullanıcısı olarak bende bir süre mavi ekran hatası aldım fakat çözümü temizlikte buldum Monster notebook'larına ömür boyu temizlik (termal macun ve fan) hizmetini ücretsiz veriyor, yaptırmanızı önermekle beraber işletim sisteminizi yeniden yüklemenizi ve lisanslı değilse mutlaka satın almanızı öneririm.
Almanıza gerek yok Monster Notebook ücretsiz temizliyor ve cihazınızın garantisi varsa devam eder.
Cihazı alalı ne kadar oldu ? İade hakkınız var mı ?
BIOS | 05/06/2014 | 1. System BIOS for W35xSSQ and W37xSS. 2. Update ME firmware. 3. Update Intel micro code to M2306C300000017. 4. Refer to readme.txt to update firmware. | 1.03.03 | B0303.zip |
BIOS | 08/05/2014 | 1. EC firmware for W35xSSQ/W37xSS. 2. Improve mSATA device support. 3. Refer to readme_EC.txt to update firmware. | 1.03.06 | E0306.zip |