MSI GX70 3BE Ekran kartı sürücüsü ve mavi ekran hataları

scuti

Hectopat
Katılım
1 Şubat 2020
Mesajlar
19
Merhaba.
MSI GX70 3BE Model dizüstü bilgisayarım var. Windows 8.1'de ekran kartı sürücüsünü yüklediğimde sürekli farklı mavi ekran hataları alıyorum.

Windows 10 yüklediğimde ise arada bir mavi ekran hataları alıyor veya donma problemi yaşıyorum.

Forumu araştırdım bu model bilgisayarda benzer problemleri yaşayanlara sunulan çözümleri denedim fakat sonuç alamadım.

Aşağıya AIDA64 Sistem raporu, minidump dosyaları ve MemTest86 ekran görüntülerini paylaşıyorum. Lütfen yardım eder misiniz? Teşekkürler.

Not: BIOS Güncellemesi yaptım.

AIDA64 Raporu
minidump dosyaları
DSC_0414.JPGDSC_0415.JPG

@Murat5038
 
İşlemci ısınmasın diye BIOS altından ayarları mı kurcalıyorsun?

BIOS'a gir Exit bölümünden Load Defaults yap kaydet çık farklı bir ayara dokunma.

Ayrıca belleklerin ikisi birden takılı şekilde Memtest86 testi yap.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003453, The subtype of the bugcheck.
Arg2: ffffe000ed65d900
Arg3: 000000000012280a
Arg4: 0000000000000004

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: 3453

BUGCHECK_P2: ffffe000ed65d900

BUGCHECK_P3: 12280a

BUGCHECK_P4: 4

BUGCHECK_STR:  0x1a_3453

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:13.0372

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80007b86beb to fffff80007b519a0

STACK_TEXT:
ffffd001`72b4f868 fffff800`07b86beb : 00000000`0000001a 00000000`00003453 ffffe000`ed65d900 00000000`0012280a : nt!KeBugCheckEx
ffffd001`72b4f870 fffff800`07dbacb9 : ffffffff`ffffffff 00000000`00000000 ffffd001`72b4f9d0 ffffe000`ed65dbe8 : nt! ?? ::FNODOBFM::`string'+0x24d3b
ffffd001`72b4f910 fffff800`07dba79c : ffffe000`eb7f4880 ffffd001`72b4f9d0 ffffe000`ed65dbe8 ffffe000`ed65d900 : nt!MmDeleteProcessAddressSpace+0x35
ffffd001`72b4f950 fffff800`07dc9dd0 : 00000000`00000000 00000000`00000000 ffffe000`eac76480 ffffe000`ed65d8d0 : nt!PspProcessDelete+0x1a0
ffffd001`72b4fa00 fffff800`07a5ac5f : 00000000`00000000 fffff800`07cc0040 ffffe000`ed65d900 00000000`00000000 : nt!ObpRemoveObjectRoutine+0x64
ffffd001`72b4fa60 fffff800`0801ae5f : ffffe000`ed65d900 ffffe000`eb7f4880 fffff800`07cc0040 ffffe000`eb7f4880 : nt!ObfDereferenceObjectWithTag+0x8f
ffffd001`72b4faa0 fffff800`07a9d38c : fffff800`0801ae20 ffffe000`eb7f49c0 ffffe000`eb7f4880 fffff800`07cb3300 : nt!PspProcessRundownWorkerSingle+0x3f
ffffd001`72b4fad0 fffff800`07b02c70 : 214c2824`44894800 ffffe000`eb7f4880 00000000`00000080 ffffe000`eb7f4880 : nt!ExpWorkerThread+0x28c
ffffd001`72b4fb80 fffff800`07b57fc6 : ffffd001`72640180 ffffe000`eb7f4880 ffffe000`eac60880 8b44ff33`00000320 : nt!PspSystemThreadStartup+0x58
ffffd001`72b4fbe0 00000000`00000000 : ffffd001`72b50000 ffffd001`72b49000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  5afe794a4b3d7876191790e6986a95a31b24d585

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a4e6d90b421a8e835becf8deea6b3e500448b4e0

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+24d3b
fffff800`07b86beb cc              int     3

FAULT_INSTR_CODE:  85c6ffcc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+24d3b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  24d3b

FAILURE_BUCKET_ID:  0x1a_3453_nt!_??_::FNODOBFM::_string_

BUCKET_ID:  0x1a_3453_nt!_??_::FNODOBFM::_string_

PRIMARY_PROBLEM_CLASS:  0x1a_3453_nt!_??_::FNODOBFM::_string_

TARGET_TIME:  2020-01-28T09:19:04.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  79d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_3453_nt!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {8c6944dd-28fb-640a-3fae-95a7a3ec1a0a}

Followup:     MachineOwner
---------

REFERENCE_BY_POINTER (18)
Arguments:
Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
Arg2: ffffc00109963060, Object whose reference count is being lowered
Arg3: 0000000000000010, Reserved
Arg4: 0000000000000000, Reserved
    The reference count of an object is illegal for the current state of the object.
    Each time a driver uses a pointer to an object the driver calls a kernel routine
    to increment the reference count of the object. When the driver is done with the
    pointer the driver calls another kernel routine to decrement the reference count.
    Drivers must match calls to the increment and decrement routines. This bugcheck
    can occur because an object's reference count goes to zero while there are still
    open handles to the object, in which case the fourth parameter indicates the number
    of opened handles. It may also occur when the object's reference count drops below zero
    whether or not there are open handles to the object, and in that case the fourth parameter
    contains the actual value of the pointer references count.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: ffffc00109963060

BUGCHECK_P3: 10

BUGCHECK_P4: 0

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x18

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:16.0542

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8007c170177 to fffff8007bd6e9a0

STACK_TEXT:
ffffd000`32c90678 fffff800`7c170177 : 00000000`00000018 00000000`00000000 ffffc001`09963060 00000000`00000010 : nt!KeBugCheckEx
ffffd000`32c90680 fffff800`7c019a51 : 00000000`00000001 ffffd000`32c907d0 00000000`00000000 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x23fc7
ffffd000`32c906d0 fffff800`7c01990a : 00000000`746c6600 ffffd000`00000040 ffffe000`e91f3ba0 ffffc000`fcf2b801 : nt!ObDuplicateObject+0xc1
ffffd000`32c90980 fffff800`7bd7a1b3 : ffffe000`ebe43040 00000055`33a2cc98 ffffd000`32c90a28 ffffd000`00000000 : nt!NtDuplicateObject+0x12a
ffffd000`32c90a10 00007ffa`41ce100a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000055`33a2cc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`41ce100a


THREAD_SHA1_HASH_MOD_FUNC:  c30b0c022e5488d37a362b54b765e225a6eada12

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  be2c4f4d0b2f098e287f568c2913b1fd33e86d3a

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt! ?? ::NNGAKEGL::`string'+23fc7
fffff800`7c170177 cc              int     3

FAULT_INSTR_CODE:  4c8b44cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::NNGAKEGL::`string'+23fc7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  23fc7

FAILURE_BUCKET_ID:  0x18_nt!_??_::NNGAKEGL::_string_

BUCKET_ID:  0x18_nt!_??_::NNGAKEGL::_string_

PRIMARY_PROBLEM_CLASS:  0x18_nt!_??_::NNGAKEGL::_string_

TARGET_TIME:  2020-01-28T09:15:06.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  79e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x18_nt!_??_::nngakegl::_string_

FAILURE_ID_HASH:  {0bed1247-ca82-b969-ac2a-0d0bda811963}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803e7769c6a, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff803e7769c6a

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803e7979298
GetUlongPtrFromAddress: unable to read from fffff803e7979520
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!SwapContext_PatchXRstor+0
fffff803`e7769c6a 0fae29          xrstor  [rcx]

EXCEPTION_PARAMETER2:  ffffffffffffffff

BUGCHECK_STR:  0x1E_c0000005_R

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:19.0521

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff803e77b8b69 to fffff803e77669a0

THREAD_SHA1_HASH_MOD_FUNC:  9bf396324f525e0e837471a0d1b4f971b07bdb3c

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  4a099aec6ea6d389990e699f3593dba50a29941a

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!SwapContext_PatchXRstor+0
fffff803`e7769c6a 0fae29          xrstor  [rcx]

FAULT_INSTR_CODE:  eb29ae0f

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!SwapContext_PatchXRstor+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x1E_c0000005_R_nt!SwapContext_PatchXRstor

BUCKET_ID:  0x1E_c0000005_R_nt!SwapContext_PatchXRstor

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_R_nt!SwapContext_PatchXRstor

TARGET_TIME:  2020-01-28T09:20:44.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  12605

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_r_nt!swapcontext_patchxrstor

FAILURE_ID_HASH:  {3877648d-a897-a15e-f342-f1945b62c157}

Followup:     MachineOwner
---------

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 000000000000000e,
Arg2: ffffc00149b96380
Arg3: ffefdffeff6fffbf
Arg4: 7ecf5f4b43709345

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: e

BUGCHECK_P2: ffffc00149b96380

BUGCHECK_P3: ffefdffeff6fffbf

BUGCHECK_P4: 7ecf5f4b43709345

BUGCHECK_STR:  0x19_e

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  TiWorker.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:32.0721

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff803d4aaf61c to fffff803d495a9a0

STACK_TEXT:
ffffd001`0d721fe8 fffff803`d4aaf61c : 00000000`00000019 00000000`0000000e ffffc001`49b96380 ffefdffe`ff6fffbf : nt!KeBugCheckEx
ffffd001`0d721ff0 fffff803`d4c3f401 : ffffd001`0d722168 00000000`00001880 ffffc001`0f418880 00000000`00000000 : nt!ExDeferredFreePool+0xdac
ffffd001`0d7220c0 fffff803`d4c3ed2f : 00000000`92819301 00000000`0000005c ffffc001`f4f55321 ffffc001`25175380 : nt!CmpGetNameControlBlock+0x191
ffffd001`0d722140 fffff803`d4bfbaab : ffffc001`18719000 00000000`035622f8 ffffc001`1a6452fc ffffc001`0f6caa70 : nt!CmpCreateKeyControlBlock+0x3cf
ffffd001`0d7221d0 fffff803`d4bfd22c : 00000000`00000000 ffffd001`035622f8 ffffd001`0d722950 ffffe000`cf001010 : nt!CmpDoOpen+0x6ab
ffffd001`0d7222b0 fffff803`d4bf5c39 : ffffc001`0f405268 ffffc001`0f405268 ffffc001`0f4051d0 00000000`00000012 : nt!CmpParseKey+0x51c
ffffd001`0d7225e0 fffff803`d4bf3a63 : 00000000`00000000 ffffd001`0d7227d8 ffffe000`00000040 ffffe000`bbe60f20 : nt!ObpLookupObjectName+0x6b9
ffffd001`0d722760 fffff803`d4bf31c4 : 00000000`00000001 000000a5`867cde88 000000a5`867cd980 00000000`01020019 : nt!ObOpenObjectByName+0x1e3
ffffd001`0d722890 fffff803`d4bf160b : ffffc5ab`b35900b0 ffffd001`0d722b00 00007ff9`fdbf89e8 00000000`00000002 : nt!CmOpenKey+0x2a4
ffffd001`0d722a40 fffff803`d49661b3 : 00000000`00000001 000000a5`88b26530 00007ff9`fd984840 00000000`00000000 : nt!NtOpenKeyEx+0xf
ffffd001`0d722a80 00007ffa`0ec01cca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000a5`867cd858 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`0ec01cca


THREAD_SHA1_HASH_MOD_FUNC:  6c0971105e59bfb812cc6a4d42f4e8fa6985a1f5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  47d20bdbd8b872c35e945c801ae500916b04da6b

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!ExDeferredFreePool+dac
fffff803`d4aaf61c cc              int     3

FAULT_INSTR_CODE:  4c8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExDeferredFreePool+dac

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  6.3.9600.17415

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  dac

FAILURE_BUCKET_ID:  0x19_e_nt!ExDeferredFreePool

BUCKET_ID:  0x19_e_nt!ExDeferredFreePool

PRIMARY_PROBLEM_CLASS:  0x19_e_nt!ExDeferredFreePool

TARGET_TIME:  2020-01-27T23:08:35.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  791

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x19_e_nt!exdeferredfreepool

FAILURE_ID_HASH:  {652ef998-c993-02e1-bea8-9dbeb0e887a3}

Followup:     Pool_corruption
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: 0000005be1a10001, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 00007fffd9b5ce5c, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000008, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: 5be1a10001

BUGCHECK_P2: 0

BUGCHECK_P3: 7fffd9b5ce5c

BUGCHECK_P4: 8

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80365765298
GetUlongPtrFromAddress: unable to read from fffff80365765520
0000005be1a10001

FAULTING_IP:
+0
00007fff`d9b5ce5c ??              ???

MM_INTERNAL_CODE:  8

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:09.0662

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff803655a5ed3 to fffff803655529a0

STACK_TEXT:
ffffd000`30b31868 fffff803`655a5ed3 : 00000000`00000050 0000005b`e1a10001 00000000`00000000 ffffd000`30b31a80 : nt!KeBugCheckEx
ffffd000`30b31870 fffff803`6545a183 : ffffe001`99e59580 ffffd000`30b31940 ffffe001`9a8c3880 fffff680`2df0d080 : nt! ?? ::FNODOBFM::`string'+0x43023
ffffd000`30b318c0 fffff803`6555cc2f : 00000000`00000000 00000000`023163ac 00000000`00000001 0000005b`dae61050 : nt!MmAccessFault+0x633
ffffd000`30b31a80 00007fff`d9b5ce5c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x12f
0000005b`daddf4b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`d9b5ce5c


THREAD_SHA1_HASH_MOD_FUNC:  c657d94433f4f33fd268b372caf2b4bbf9b614e8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a50f349d072369079e9be5692fdb90b89d0eca80

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+43023
fffff803`655a5ed3 cc              int     3

FAULT_INSTR_CODE:  353b48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+43023

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  43023

FAILURE_BUCKET_ID:  AV_nt!_??_::FNODOBFM::_string_

BUCKET_ID:  AV_nt!_??_::FNODOBFM::_string_

PRIMARY_PROBLEM_CLASS:  AV_nt!_??_::FNODOBFM::_string_

TARGET_TIME:  2020-01-28T09:08:19.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  842

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {9e2f043e-2671-7df2-fe70-649f4b2357db}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff07, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8010432704f, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffffffff07

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8010432704f

BUGCHECK_P4: 0

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff801043e6298
GetUlongPtrFromAddress: unable to read from fffff801043e6520
ffffffffffffff07

FAULTING_IP:
nt!ExAllocatePoolWithTag+5ff
fffff801`0432704f 4c8b4808        mov     r9,qword ptr [rax+8]

MM_INTERNAL_CODE:  0

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  1

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:00.0299

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd000310eef70 -- (.trap 0xffffd000310eef70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffffffffffeff rbx=0000000000000000 rcx=ffffe001b962f880
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8010432704f rsp=ffffd000310ef100 rbp=0000000000000001
r8=ffffc001473f3010  r9=7ffffffffffffffc r10=0000000000000001
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
nt!ExAllocatePoolWithTag+0x5ff:
fffff801`0432704f 4c8b4808        mov     r9,qword ptr [rax+8] ds:ffffffff`ffffff07=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80104201bd2 to fffff801041d39a0

STACK_TEXT:
ffffd000`310eed08 fffff801`04201bd2 : 00000000`00000050 ffffffff`ffffff07 00000000`00000000 ffffd000`310eef70 : nt!KeBugCheckEx
ffffd000`310eed10 fffff801`040db2b9 : 00000000`00000000 ffffe001`b9632900 ffffd000`310eef70 fffff801`043272ee : nt! ?? ::FNODOBFM::`string'+0x1dd22
ffffd000`310eedb0 fffff801`041ddc2f : 00000000`00000000 ffffe001`b7a01660 ffffd000`310ef000 ffffd000`310eefb0 : nt!MmAccessFault+0x769
ffffd000`310eef70 fffff801`0432704f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x12f
ffffd000`310ef100 fffff801`04449f7b : ffffffff`00000001 00000000`00000314 0a1bfb5a`a8acba61 ffffffff`00000001 : nt!ExAllocatePoolWithTag+0x5ff
ffffd000`310ef1d0 fffff801`04449ab8 : ffffc001`473f2060 ffffd000`310ef260 ffffc001`00000010 00000000`00000001 : nt!ObLogSecurityDescriptor+0x23b
ffffd000`310ef230 fffff801`04447080 : 00000000`00000000 ffffd000`310ef310 00000000`00000000 00000000`00000000 : nt!SeDefaultObjectMethod+0x5c
ffffd000`310ef2a0 fffff801`0446a108 : ffffd000`00000100 ffffd000`310ef3f0 ffffe001`ba3b8990 00000000`00000001 : nt!ObpAssignSecurity+0x114
ffffd000`310ef340 fffff801`0451649c : ffffe001`b9eed5c0 ffffe001`b9eed600 ffffc001`44f0d100 ffffc001`465af060 : nt!ObInsertObjectEx+0x2a8
ffffd000`310ef5d0 fffff801`0445309c : ffffe001`b9eed5c0 ffffe001`b9eed66c ffffc001`473ecaf0 00000000`00000440 : nt!SeCopyClientToken+0x9c
ffffd000`310ef660 fffff801`0445af58 : ffffe001`b9eed5c0 00000000`00000000 ffffd000`310ef740 ffffd000`310ef724 : nt!SepCreateClientSecurityEx+0x100
ffffd000`310ef6c0 fffff801`04442906 : 00000000`00000001 ffffe001`b9eed708 ffffe001`b9eed580 00000000`ffff0000 : nt!SeCreateClientSecurity+0xa4
ffffd000`310ef750 fffff801`0444220f : ffffd000`310ef898 ffffd000`310ef890 ffffe001`00000000 00000000`00000000 : nt!AlpcpCreateClientPort+0x4e6
ffffd000`310ef800 fffff801`0443f198 : 00000000`00000000 ffffe001`b9632900 00000000`00000002 00000000`00000000 : nt!AlpcpConnectPort+0x277
ffffd000`310ef990 fffff801`041df1b3 : ffffe001`b962f880 0000005f`9360efd8 ffffd000`310efa28 00000000`00000001 : nt!NtAlpcConnectPortEx+0x70
ffffd000`310efa10 00007ffd`fd6813ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000005f`9360f4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`fd6813ba


THREAD_SHA1_HASH_MOD_FUNC:  6b6cffb9e78e814084dadf36d2ed16200a978e2e

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  3fc63f12470f626a0c45991ae80755488e4fb0f4

THREAD_SHA1_HASH_MOD:  9eef8c7ca0ce66f8b8b34848179f303828cff762

FOLLOWUP_IP:
nt!ExAllocatePoolWithTag+5ff
fffff801`0432704f 4c8b4808        mov     r9,qword ptr [rax+8]

FAULT_INSTR_CODE:  8488b4c

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!ExAllocatePoolWithTag+5ff

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5ff

FAILURE_BUCKET_ID:  AV_nt!ExAllocatePoolWithTag

BUCKET_ID:  AV_nt!ExAllocatePoolWithTag

PRIMARY_PROBLEM_CLASS:  AV_nt!ExAllocatePoolWithTag

TARGET_TIME:  2020-01-28T09:23:57.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  84f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!exallocatepoolwithtag

FAILURE_ID_HASH:  {8c8c5521-08d5-4e98-e93e-114b9bc77ddd}

Followup:     MachineOwner
---------

WINLOGON_FATAL_ERROR (c000021a)
The Winlogon process terminated unexpectedly.
Arguments:
Arg1: ffffc00076696340, String that identifies the problem.
Arg2: 0000000000000000, Error Code.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

ETW minidump data unavailable

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

ERROR_CODE: (NTSTATUS) 0xc000021a - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc000021a - <Unable to get error code text>

EXCEPTION_CODE_STR:  c000021a

EXCEPTION_PARAMETER1:  ffffc00076696340

EXCEPTION_PARAMETER2:  0000000000000000

EXCEPTION_PARAMETER3:  0000000000000000

EXCEPTION_PARAMETER4: 0

DUMP_TYPE:  2

BUGCHECK_P1: ffffc00076696340

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  services.exe

ADDITIONAL_DEBUG_TEXT:  DCOM Sunucusu Ýþlem Baþlatýcýsý hizmeti beklenmedik biçimde sonlandýrýldýðýndan, Windows þimdi yeniden baþlatýlmalýdýr

TAG_NOT_DEFINED_1004c:
This is a STATUS_SYSTEM_PROCESS_TERMINATED bugcheck.
It signals that the system is rebooting due to a critical service termination.
The bugcheck is not very useful for debugging. To investigate the root cause
find the related svchost.exe crashes that happened on the same machine
around the time of this dump.

BUGCHECK_STR:  0xc000021a_rpcss.dll_Critical_Service_Terminated

IMAGE_NAME:  ntkrnlmp.exe

MODULE_NAME: nt

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:42:56.0700

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff800801a39a1 to fffff8007ff689a0

STACK_TEXT:
ffffd000`76612638 fffff800`801a39a1 : 00000000`0000004c 00000000`c000021a ffffd000`311df378 ffffe001`2a709360 : nt!KeBugCheckEx
ffffd000`76612640 fffff800`8019d4fa : ffffe001`2685a400 ffffd000`76612759 00000000`00000000 00000000`00000002 : nt!PopGracefulShutdown+0x2c9
ffffd000`76612680 fffff800`7ff741b3 : ffffe001`2685a040 00000000`00000000 00000000`c0000004 ffffd000`76612900 : nt! ?? ::OKHAJAOM::`string'+0x269a
ffffd000`766127c0 fffff800`7ff6c600 : fffff800`803ba86d 00000000`00000001 ffffd000`766129d8 00000000`c0000004 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`76612958 fffff800`803ba86d : 00000000`00000001 ffffd000`766129d8 00000000`c0000004 ffffd000`7a5bb180 : nt!KiServiceLinkage
ffffd000`76612960 fffff800`802ed9e3 : 00000000`00000000 00000000`00000000 ffffd000`7a5bb180 ffffe001`2685a180 : nt! ?? ::NNGAKEGL::`string'+0x746bd
ffffd000`76612a20 fffff800`7ff14a5e : fffff800`7ff149a4 00000000`00000000 00000000`00000002 fffff800`800ca300 : nt!PopPolicyWorkerAction+0x63
ffffd000`76612a90 fffff800`7feb438c : fffff800`00000002 fffff800`800d7d40 ffffe001`2685a040 fffff800`800ca300 : nt!PopPolicyWorkerThread+0xba
ffffd000`76612ad0 fffff800`7ff19c70 : 440f4800`1140230d ffffe001`2685a040 00000000`00000080 ffffe001`2685a040 : nt!ExpWorkerThread+0x28c
ffffd000`76612b80 fffff800`7ff6efc6 : fffff800`8011b180 ffffe001`2685a040 ffffe001`26860880 24448d48`884d8948 : nt!PspSystemThreadStartup+0x58
ffffd000`76612be0 00000000`00000000 : ffffd000`76613000 ffffd000`7660c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  ca83477c6c105b050cb3ec79e1112ae3fe845ead

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  46fe666991a5db9d5866c1db91110caec568cdad

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt! ?? ::OKHAJAOM::`string'+269a
fffff800`8019d4fa cc              int     3

FAULT_INSTR_CODE:  e46ce8cc

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt! ?? ::OKHAJAOM::`string'+269a

FOLLOWUP_NAME:  MachineOwner

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  269a

FAILURE_BUCKET_ID:  0xc000021a_rpcss.dll_Critical_Service_Terminated_nt!_??_::OKHAJAOM::_string_

BUCKET_ID:  0xc000021a_rpcss.dll_Critical_Service_Terminated_nt!_??_::OKHAJAOM::_string_

PRIMARY_PROBLEM_CLASS:  0xc000021a_rpcss.dll_Critical_Service_Terminated_nt!_??_::OKHAJAOM::_string_

TARGET_TIME:  2020-01-28T09:18:13.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  bc9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xc000021a_rpcss.dll_critical_service_terminated_nt!_??_::okhajaom::_string_

FAILURE_ID_HASH:  {985ba5ee-c7fd-3ab7-c026-2d066fd15a29}

Followup:     MachineOwner
---------


This is a STATUS_SYSTEM_PROCESS_TERMINATED bugcheck.
It signals that the system is rebooting due to a critical service termination.
The bugcheck is not very useful for debugging. To investigate the root cause
find the related svchost.exe crashes that happened on the same machine
around the time of this dump.
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800c579fd8a, The address that the exception occurred at
Arg3: ffffd0013512f548, Exception Record Address
Arg4: ffffd0013512ed50, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff800c579fd8a

BUGCHECK_P3: ffffd0013512f548

BUGCHECK_P4: ffffd0013512ed50

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!MiDemoteCombinedPte+42
fffff800`c579fd8a 49394520        cmp     qword ptr [r13+20h],rax

EXCEPTION_RECORD:  ffffd0013512f548 -- (.exr 0xffffd0013512f548)
ExceptionAddress: fffff800c579fd8a (nt!MiDemoteCombinedPte+0x0000000000000042)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffd0013512ed50 -- (.cxr 0xffffd0013512ed50)
rax=0000000000000001 rbx=0000000000000000 rcx=fffff6fffffffff8
rdx=8000000000000000 rsi=fffff6fffffffff8 rdi=fffff7810003f000
rip=fffff800c579fd8a rsp=ffffd0013512f780 rbp=fffff800c59d4dc0
r8=8000000000000000  r9=0000000000000013 r10=0000000000000014
r11=0000000000000013 r12=fffff6fffffffff8 r13=7fffffffffffffd0
r14=ffffd0013512f8b0 r15=fffff78100000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!MiDemoteCombinedPte+0x42:
fffff800`c579fd8a 49394520        cmp     qword ptr [r13+20h],rax ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

FOLLOWUP_IP:
nt!MiDemoteCombinedPte+42
fffff800`c579fd8a 49394520        cmp     qword ptr [r13+20h],rax

BUGCHECK_STR:  AV

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff800c59dc298
GetUlongPtrFromAddress: unable to read from fffff800c59dc520
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:42:33.0828

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff800c582e5dd to fffff800c579fd8a

STACK_TEXT:
ffffd001`3512f780 fffff800`c582e5dd : 00000000`00000001 fffff800`c59d4dc0 00000000`00000000 fffff781`00003b98 : nt!MiDemoteCombinedPte+0x42
ffffd001`3512f870 fffff800`c571d4c8 : fffff800`c59d4dc0 fffff800`c59d4dc0 00000000`00000000 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x5472d
ffffd001`3512f9b0 fffff800`c571c4a8 : 00000000`00000000 ffffd001`3512fa79 fffff800`c59d4dc0 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x200
ffffd001`3512f9f0 fffff800`c56feb4e : 00000000`00000000 ffffe000`ab463880 00000000`00000001 ffffe000`ab463880 : nt!MiProcessWorkingSets+0x1c8
ffffd001`3512fae0 fffff800`c57b0103 : 00000000`00000008 ffffd001`3512fb50 00000000`00000008 00000000`00000000 : nt!MmWorkingSetManager+0x4a
ffffd001`3512fb10 fffff800`c577ac70 : ffffe000`ab463880 00000000`00000000 00000000`00000080 00000000`00000000 : nt!KeBalanceSetManager+0x1b3
ffffd001`3512fb80 fffff800`c57cffc6 : ffffd001`391bb180 ffffe000`ab463880 ffffd001`391c72c0 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd001`3512fbe0 00000000`00000000 : ffffd001`35130000 ffffd001`35129000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  347fbe2f34e1725fc5b23f7650fe3d9058f1f815

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  fb5a48110227eddeff0efb575d5580b899bcdf87

THREAD_SHA1_HASH_MOD:  cb5f414824c2521bcc505eaa03e92fa10922dad8

FAULT_INSTR_CODE:  20453949

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiDemoteCombinedPte+42

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .cxr 0xffffd0013512ed50 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  42

FAILURE_BUCKET_ID:  AV_nt!MiDemoteCombinedPte

BUCKET_ID:  AV_nt!MiDemoteCombinedPte

PRIMARY_PROBLEM_CLASS:  AV_nt!MiDemoteCombinedPte

TARGET_TIME:  2020-01-28T09:10:11.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  776

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!midemotecombinedpte

FAILURE_ID_HASH:  {c577c73b-79a7-0c44-6c62-58e1d697b6d8}

Followup:     MachineOwner
---------
 
İşlemci ısınmasın diye BIOS altından ayarları mı kurcalıyorsun?

BIOS'a gir Exit bölümünden Load Defaults yap kaydet çık farklı bir ayara dokunma.

Ayrıca belleklerin ikisi birden takılı şekilde Memtest86 testi yap.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003453, The subtype of the bugcheck.
Arg2: ffffe000ed65d900
Arg3: 000000000012280a
Arg4: 0000000000000004

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: 3453

BUGCHECK_P2: ffffe000ed65d900

BUGCHECK_P3: 12280a

BUGCHECK_P4: 4

BUGCHECK_STR:  0x1a_3453

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:13.0372

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80007b86beb to fffff80007b519a0

STACK_TEXT:
ffffd001`72b4f868 fffff800`07b86beb : 00000000`0000001a 00000000`00003453 ffffe000`ed65d900 00000000`0012280a : nt!KeBugCheckEx
ffffd001`72b4f870 fffff800`07dbacb9 : ffffffff`ffffffff 00000000`00000000 ffffd001`72b4f9d0 ffffe000`ed65dbe8 : nt! ?? ::FNODOBFM::`string'+0x24d3b
ffffd001`72b4f910 fffff800`07dba79c : ffffe000`eb7f4880 ffffd001`72b4f9d0 ffffe000`ed65dbe8 ffffe000`ed65d900 : nt!MmDeleteProcessAddressSpace+0x35
ffffd001`72b4f950 fffff800`07dc9dd0 : 00000000`00000000 00000000`00000000 ffffe000`eac76480 ffffe000`ed65d8d0 : nt!PspProcessDelete+0x1a0
ffffd001`72b4fa00 fffff800`07a5ac5f : 00000000`00000000 fffff800`07cc0040 ffffe000`ed65d900 00000000`00000000 : nt!ObpRemoveObjectRoutine+0x64
ffffd001`72b4fa60 fffff800`0801ae5f : ffffe000`ed65d900 ffffe000`eb7f4880 fffff800`07cc0040 ffffe000`eb7f4880 : nt!ObfDereferenceObjectWithTag+0x8f
ffffd001`72b4faa0 fffff800`07a9d38c : fffff800`0801ae20 ffffe000`eb7f49c0 ffffe000`eb7f4880 fffff800`07cb3300 : nt!PspProcessRundownWorkerSingle+0x3f
ffffd001`72b4fad0 fffff800`07b02c70 : 214c2824`44894800 ffffe000`eb7f4880 00000000`00000080 ffffe000`eb7f4880 : nt!ExpWorkerThread+0x28c
ffffd001`72b4fb80 fffff800`07b57fc6 : ffffd001`72640180 ffffe000`eb7f4880 ffffe000`eac60880 8b44ff33`00000320 : nt!PspSystemThreadStartup+0x58
ffffd001`72b4fbe0 00000000`00000000 : ffffd001`72b50000 ffffd001`72b49000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  5afe794a4b3d7876191790e6986a95a31b24d585

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a4e6d90b421a8e835becf8deea6b3e500448b4e0

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+24d3b
fffff800`07b86beb cc              int     3

FAULT_INSTR_CODE:  85c6ffcc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+24d3b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  24d3b

FAILURE_BUCKET_ID:  0x1a_3453_nt!_??_::FNODOBFM::_string_

BUCKET_ID:  0x1a_3453_nt!_??_::FNODOBFM::_string_

PRIMARY_PROBLEM_CLASS:  0x1a_3453_nt!_??_::FNODOBFM::_string_

TARGET_TIME:  2020-01-28T09:19:04.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  79d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_3453_nt!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {8c6944dd-28fb-640a-3fae-95a7a3ec1a0a}

Followup:     MachineOwner
---------

REFERENCE_BY_POINTER (18)
Arguments:
Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
Arg2: ffffc00109963060, Object whose reference count is being lowered
Arg3: 0000000000000010, Reserved
Arg4: 0000000000000000, Reserved
    The reference count of an object is illegal for the current state of the object.
    Each time a driver uses a pointer to an object the driver calls a kernel routine
    to increment the reference count of the object. When the driver is done with the
    pointer the driver calls another kernel routine to decrement the reference count.
    Drivers must match calls to the increment and decrement routines. This bugcheck
    can occur because an object's reference count goes to zero while there are still
    open handles to the object, in which case the fourth parameter indicates the number
    of opened handles. It may also occur when the object's reference count drops below zero
    whether or not there are open handles to the object, and in that case the fourth parameter
    contains the actual value of the pointer references count.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: ffffc00109963060

BUGCHECK_P3: 10

BUGCHECK_P4: 0

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x18

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:16.0542

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8007c170177 to fffff8007bd6e9a0

STACK_TEXT:
ffffd000`32c90678 fffff800`7c170177 : 00000000`00000018 00000000`00000000 ffffc001`09963060 00000000`00000010 : nt!KeBugCheckEx
ffffd000`32c90680 fffff800`7c019a51 : 00000000`00000001 ffffd000`32c907d0 00000000`00000000 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x23fc7
ffffd000`32c906d0 fffff800`7c01990a : 00000000`746c6600 ffffd000`00000040 ffffe000`e91f3ba0 ffffc000`fcf2b801 : nt!ObDuplicateObject+0xc1
ffffd000`32c90980 fffff800`7bd7a1b3 : ffffe000`ebe43040 00000055`33a2cc98 ffffd000`32c90a28 ffffd000`00000000 : nt!NtDuplicateObject+0x12a
ffffd000`32c90a10 00007ffa`41ce100a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000055`33a2cc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`41ce100a


THREAD_SHA1_HASH_MOD_FUNC:  c30b0c022e5488d37a362b54b765e225a6eada12

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  be2c4f4d0b2f098e287f568c2913b1fd33e86d3a

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt! ?? ::NNGAKEGL::`string'+23fc7
fffff800`7c170177 cc              int     3

FAULT_INSTR_CODE:  4c8b44cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::NNGAKEGL::`string'+23fc7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  23fc7

FAILURE_BUCKET_ID:  0x18_nt!_??_::NNGAKEGL::_string_

BUCKET_ID:  0x18_nt!_??_::NNGAKEGL::_string_

PRIMARY_PROBLEM_CLASS:  0x18_nt!_??_::NNGAKEGL::_string_

TARGET_TIME:  2020-01-28T09:15:06.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  79e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x18_nt!_??_::nngakegl::_string_

FAILURE_ID_HASH:  {0bed1247-ca82-b969-ac2a-0d0bda811963}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803e7769c6a, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff803e7769c6a

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803e7979298
GetUlongPtrFromAddress: unable to read from fffff803e7979520
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!SwapContext_PatchXRstor+0
fffff803`e7769c6a 0fae29          xrstor  [rcx]

EXCEPTION_PARAMETER2:  ffffffffffffffff

BUGCHECK_STR:  0x1E_c0000005_R

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:19.0521

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff803e77b8b69 to fffff803e77669a0

THREAD_SHA1_HASH_MOD_FUNC:  9bf396324f525e0e837471a0d1b4f971b07bdb3c

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  4a099aec6ea6d389990e699f3593dba50a29941a

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!SwapContext_PatchXRstor+0
fffff803`e7769c6a 0fae29          xrstor  [rcx]

FAULT_INSTR_CODE:  eb29ae0f

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!SwapContext_PatchXRstor+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x1E_c0000005_R_nt!SwapContext_PatchXRstor

BUCKET_ID:  0x1E_c0000005_R_nt!SwapContext_PatchXRstor

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_R_nt!SwapContext_PatchXRstor

TARGET_TIME:  2020-01-28T09:20:44.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  12605

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_r_nt!swapcontext_patchxrstor

FAILURE_ID_HASH:  {3877648d-a897-a15e-f342-f1945b62c157}

Followup:     MachineOwner
---------

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 000000000000000e,
Arg2: ffffc00149b96380
Arg3: ffefdffeff6fffbf
Arg4: 7ecf5f4b43709345

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: e

BUGCHECK_P2: ffffc00149b96380

BUGCHECK_P3: ffefdffeff6fffbf

BUGCHECK_P4: 7ecf5f4b43709345

BUGCHECK_STR:  0x19_e

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  TiWorker.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:32.0721

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff803d4aaf61c to fffff803d495a9a0

STACK_TEXT:
ffffd001`0d721fe8 fffff803`d4aaf61c : 00000000`00000019 00000000`0000000e ffffc001`49b96380 ffefdffe`ff6fffbf : nt!KeBugCheckEx
ffffd001`0d721ff0 fffff803`d4c3f401 : ffffd001`0d722168 00000000`00001880 ffffc001`0f418880 00000000`00000000 : nt!ExDeferredFreePool+0xdac
ffffd001`0d7220c0 fffff803`d4c3ed2f : 00000000`92819301 00000000`0000005c ffffc001`f4f55321 ffffc001`25175380 : nt!CmpGetNameControlBlock+0x191
ffffd001`0d722140 fffff803`d4bfbaab : ffffc001`18719000 00000000`035622f8 ffffc001`1a6452fc ffffc001`0f6caa70 : nt!CmpCreateKeyControlBlock+0x3cf
ffffd001`0d7221d0 fffff803`d4bfd22c : 00000000`00000000 ffffd001`035622f8 ffffd001`0d722950 ffffe000`cf001010 : nt!CmpDoOpen+0x6ab
ffffd001`0d7222b0 fffff803`d4bf5c39 : ffffc001`0f405268 ffffc001`0f405268 ffffc001`0f4051d0 00000000`00000012 : nt!CmpParseKey+0x51c
ffffd001`0d7225e0 fffff803`d4bf3a63 : 00000000`00000000 ffffd001`0d7227d8 ffffe000`00000040 ffffe000`bbe60f20 : nt!ObpLookupObjectName+0x6b9
ffffd001`0d722760 fffff803`d4bf31c4 : 00000000`00000001 000000a5`867cde88 000000a5`867cd980 00000000`01020019 : nt!ObOpenObjectByName+0x1e3
ffffd001`0d722890 fffff803`d4bf160b : ffffc5ab`b35900b0 ffffd001`0d722b00 00007ff9`fdbf89e8 00000000`00000002 : nt!CmOpenKey+0x2a4
ffffd001`0d722a40 fffff803`d49661b3 : 00000000`00000001 000000a5`88b26530 00007ff9`fd984840 00000000`00000000 : nt!NtOpenKeyEx+0xf
ffffd001`0d722a80 00007ffa`0ec01cca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000a5`867cd858 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`0ec01cca


THREAD_SHA1_HASH_MOD_FUNC:  6c0971105e59bfb812cc6a4d42f4e8fa6985a1f5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  47d20bdbd8b872c35e945c801ae500916b04da6b

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!ExDeferredFreePool+dac
fffff803`d4aaf61c cc              int     3

FAULT_INSTR_CODE:  4c8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExDeferredFreePool+dac

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  6.3.9600.17415

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  dac

FAILURE_BUCKET_ID:  0x19_e_nt!ExDeferredFreePool

BUCKET_ID:  0x19_e_nt!ExDeferredFreePool

PRIMARY_PROBLEM_CLASS:  0x19_e_nt!ExDeferredFreePool

TARGET_TIME:  2020-01-27T23:08:35.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  791

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x19_e_nt!exdeferredfreepool

FAILURE_ID_HASH:  {652ef998-c993-02e1-bea8-9dbeb0e887a3}

Followup:     Pool_corruption
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: 0000005be1a10001, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 00007fffd9b5ce5c, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000008, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: 5be1a10001

BUGCHECK_P2: 0

BUGCHECK_P3: 7fffd9b5ce5c

BUGCHECK_P4: 8

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80365765298
GetUlongPtrFromAddress: unable to read from fffff80365765520
0000005be1a10001

FAULTING_IP:
+0
00007fff`d9b5ce5c ??              ???

MM_INTERNAL_CODE:  8

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:09.0662

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff803655a5ed3 to fffff803655529a0

STACK_TEXT:
ffffd000`30b31868 fffff803`655a5ed3 : 00000000`00000050 0000005b`e1a10001 00000000`00000000 ffffd000`30b31a80 : nt!KeBugCheckEx
ffffd000`30b31870 fffff803`6545a183 : ffffe001`99e59580 ffffd000`30b31940 ffffe001`9a8c3880 fffff680`2df0d080 : nt! ?? ::FNODOBFM::`string'+0x43023
ffffd000`30b318c0 fffff803`6555cc2f : 00000000`00000000 00000000`023163ac 00000000`00000001 0000005b`dae61050 : nt!MmAccessFault+0x633
ffffd000`30b31a80 00007fff`d9b5ce5c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x12f
0000005b`daddf4b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`d9b5ce5c


THREAD_SHA1_HASH_MOD_FUNC:  c657d94433f4f33fd268b372caf2b4bbf9b614e8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a50f349d072369079e9be5692fdb90b89d0eca80

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+43023
fffff803`655a5ed3 cc              int     3

FAULT_INSTR_CODE:  353b48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+43023

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  43023

FAILURE_BUCKET_ID:  AV_nt!_??_::FNODOBFM::_string_

BUCKET_ID:  AV_nt!_??_::FNODOBFM::_string_

PRIMARY_PROBLEM_CLASS:  AV_nt!_??_::FNODOBFM::_string_

TARGET_TIME:  2020-01-28T09:08:19.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  842

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {9e2f043e-2671-7df2-fe70-649f4b2357db}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff07, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8010432704f, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffffffff07

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8010432704f

BUGCHECK_P4: 0

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff801043e6298
GetUlongPtrFromAddress: unable to read from fffff801043e6520
ffffffffffffff07

FAULTING_IP:
nt!ExAllocatePoolWithTag+5ff
fffff801`0432704f 4c8b4808        mov     r9,qword ptr [rax+8]

MM_INTERNAL_CODE:  0

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  1

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:00.0299

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd000310eef70 -- (.trap 0xffffd000310eef70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffffffffffeff rbx=0000000000000000 rcx=ffffe001b962f880
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8010432704f rsp=ffffd000310ef100 rbp=0000000000000001
r8=ffffc001473f3010  r9=7ffffffffffffffc r10=0000000000000001
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
nt!ExAllocatePoolWithTag+0x5ff:
fffff801`0432704f 4c8b4808        mov     r9,qword ptr [rax+8] ds:ffffffff`ffffff07=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80104201bd2 to fffff801041d39a0

STACK_TEXT:
ffffd000`310eed08 fffff801`04201bd2 : 00000000`00000050 ffffffff`ffffff07 00000000`00000000 ffffd000`310eef70 : nt!KeBugCheckEx
ffffd000`310eed10 fffff801`040db2b9 : 00000000`00000000 ffffe001`b9632900 ffffd000`310eef70 fffff801`043272ee : nt! ?? ::FNODOBFM::`string'+0x1dd22
ffffd000`310eedb0 fffff801`041ddc2f : 00000000`00000000 ffffe001`b7a01660 ffffd000`310ef000 ffffd000`310eefb0 : nt!MmAccessFault+0x769
ffffd000`310eef70 fffff801`0432704f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x12f
ffffd000`310ef100 fffff801`04449f7b : ffffffff`00000001 00000000`00000314 0a1bfb5a`a8acba61 ffffffff`00000001 : nt!ExAllocatePoolWithTag+0x5ff
ffffd000`310ef1d0 fffff801`04449ab8 : ffffc001`473f2060 ffffd000`310ef260 ffffc001`00000010 00000000`00000001 : nt!ObLogSecurityDescriptor+0x23b
ffffd000`310ef230 fffff801`04447080 : 00000000`00000000 ffffd000`310ef310 00000000`00000000 00000000`00000000 : nt!SeDefaultObjectMethod+0x5c
ffffd000`310ef2a0 fffff801`0446a108 : ffffd000`00000100 ffffd000`310ef3f0 ffffe001`ba3b8990 00000000`00000001 : nt!ObpAssignSecurity+0x114
ffffd000`310ef340 fffff801`0451649c : ffffe001`b9eed5c0 ffffe001`b9eed600 ffffc001`44f0d100 ffffc001`465af060 : nt!ObInsertObjectEx+0x2a8
ffffd000`310ef5d0 fffff801`0445309c : ffffe001`b9eed5c0 ffffe001`b9eed66c ffffc001`473ecaf0 00000000`00000440 : nt!SeCopyClientToken+0x9c
ffffd000`310ef660 fffff801`0445af58 : ffffe001`b9eed5c0 00000000`00000000 ffffd000`310ef740 ffffd000`310ef724 : nt!SepCreateClientSecurityEx+0x100
ffffd000`310ef6c0 fffff801`04442906 : 00000000`00000001 ffffe001`b9eed708 ffffe001`b9eed580 00000000`ffff0000 : nt!SeCreateClientSecurity+0xa4
ffffd000`310ef750 fffff801`0444220f : ffffd000`310ef898 ffffd000`310ef890 ffffe001`00000000 00000000`00000000 : nt!AlpcpCreateClientPort+0x4e6
ffffd000`310ef800 fffff801`0443f198 : 00000000`00000000 ffffe001`b9632900 00000000`00000002 00000000`00000000 : nt!AlpcpConnectPort+0x277
ffffd000`310ef990 fffff801`041df1b3 : ffffe001`b962f880 0000005f`9360efd8 ffffd000`310efa28 00000000`00000001 : nt!NtAlpcConnectPortEx+0x70
ffffd000`310efa10 00007ffd`fd6813ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000005f`9360f4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`fd6813ba


THREAD_SHA1_HASH_MOD_FUNC:  6b6cffb9e78e814084dadf36d2ed16200a978e2e

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  3fc63f12470f626a0c45991ae80755488e4fb0f4

THREAD_SHA1_HASH_MOD:  9eef8c7ca0ce66f8b8b34848179f303828cff762

FOLLOWUP_IP:
nt!ExAllocatePoolWithTag+5ff
fffff801`0432704f 4c8b4808        mov     r9,qword ptr [rax+8]

FAULT_INSTR_CODE:  8488b4c

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!ExAllocatePoolWithTag+5ff

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5ff

FAILURE_BUCKET_ID:  AV_nt!ExAllocatePoolWithTag

BUCKET_ID:  AV_nt!ExAllocatePoolWithTag

PRIMARY_PROBLEM_CLASS:  AV_nt!ExAllocatePoolWithTag

TARGET_TIME:  2020-01-28T09:23:57.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  84f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!exallocatepoolwithtag

FAILURE_ID_HASH:  {8c8c5521-08d5-4e98-e93e-114b9bc77ddd}

Followup:     MachineOwner
---------

WINLOGON_FATAL_ERROR (c000021a)
The Winlogon process terminated unexpectedly.
Arguments:
Arg1: ffffc00076696340, String that identifies the problem.
Arg2: 0000000000000000, Error Code.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

ETW minidump data unavailable

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

ERROR_CODE: (NTSTATUS) 0xc000021a - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc000021a - <Unable to get error code text>

EXCEPTION_CODE_STR:  c000021a

EXCEPTION_PARAMETER1:  ffffc00076696340

EXCEPTION_PARAMETER2:  0000000000000000

EXCEPTION_PARAMETER3:  0000000000000000

EXCEPTION_PARAMETER4: 0

DUMP_TYPE:  2

BUGCHECK_P1: ffffc00076696340

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  services.exe

ADDITIONAL_DEBUG_TEXT:  DCOM Sunucusu Ýþlem Baþlatýcýsý hizmeti beklenmedik biçimde sonlandýrýldýðýndan, Windows þimdi yeniden baþlatýlmalýdýr

TAG_NOT_DEFINED_1004c:
This is a STATUS_SYSTEM_PROCESS_TERMINATED bugcheck.
It signals that the system is rebooting due to a critical service termination.
The bugcheck is not very useful for debugging. To investigate the root cause
find the related svchost.exe crashes that happened on the same machine
around the time of this dump.

BUGCHECK_STR:  0xc000021a_rpcss.dll_Critical_Service_Terminated

IMAGE_NAME:  ntkrnlmp.exe

MODULE_NAME: nt

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:42:56.0700

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff800801a39a1 to fffff8007ff689a0

STACK_TEXT:
ffffd000`76612638 fffff800`801a39a1 : 00000000`0000004c 00000000`c000021a ffffd000`311df378 ffffe001`2a709360 : nt!KeBugCheckEx
ffffd000`76612640 fffff800`8019d4fa : ffffe001`2685a400 ffffd000`76612759 00000000`00000000 00000000`00000002 : nt!PopGracefulShutdown+0x2c9
ffffd000`76612680 fffff800`7ff741b3 : ffffe001`2685a040 00000000`00000000 00000000`c0000004 ffffd000`76612900 : nt! ?? ::OKHAJAOM::`string'+0x269a
ffffd000`766127c0 fffff800`7ff6c600 : fffff800`803ba86d 00000000`00000001 ffffd000`766129d8 00000000`c0000004 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`76612958 fffff800`803ba86d : 00000000`00000001 ffffd000`766129d8 00000000`c0000004 ffffd000`7a5bb180 : nt!KiServiceLinkage
ffffd000`76612960 fffff800`802ed9e3 : 00000000`00000000 00000000`00000000 ffffd000`7a5bb180 ffffe001`2685a180 : nt! ?? ::NNGAKEGL::`string'+0x746bd
ffffd000`76612a20 fffff800`7ff14a5e : fffff800`7ff149a4 00000000`00000000 00000000`00000002 fffff800`800ca300 : nt!PopPolicyWorkerAction+0x63
ffffd000`76612a90 fffff800`7feb438c : fffff800`00000002 fffff800`800d7d40 ffffe001`2685a040 fffff800`800ca300 : nt!PopPolicyWorkerThread+0xba
ffffd000`76612ad0 fffff800`7ff19c70 : 440f4800`1140230d ffffe001`2685a040 00000000`00000080 ffffe001`2685a040 : nt!ExpWorkerThread+0x28c
ffffd000`76612b80 fffff800`7ff6efc6 : fffff800`8011b180 ffffe001`2685a040 ffffe001`26860880 24448d48`884d8948 : nt!PspSystemThreadStartup+0x58
ffffd000`76612be0 00000000`00000000 : ffffd000`76613000 ffffd000`7660c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  ca83477c6c105b050cb3ec79e1112ae3fe845ead

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  46fe666991a5db9d5866c1db91110caec568cdad

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt! ?? ::OKHAJAOM::`string'+269a
fffff800`8019d4fa cc              int     3

FAULT_INSTR_CODE:  e46ce8cc

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt! ?? ::OKHAJAOM::`string'+269a

FOLLOWUP_NAME:  MachineOwner

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  269a

FAILURE_BUCKET_ID:  0xc000021a_rpcss.dll_Critical_Service_Terminated_nt!_??_::OKHAJAOM::_string_

BUCKET_ID:  0xc000021a_rpcss.dll_Critical_Service_Terminated_nt!_??_::OKHAJAOM::_string_

PRIMARY_PROBLEM_CLASS:  0xc000021a_rpcss.dll_Critical_Service_Terminated_nt!_??_::OKHAJAOM::_string_

TARGET_TIME:  2020-01-28T09:18:13.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  bc9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xc000021a_rpcss.dll_critical_service_terminated_nt!_??_::okhajaom::_string_

FAILURE_ID_HASH:  {985ba5ee-c7fd-3ab7-c026-2d066fd15a29}

Followup:     MachineOwner
---------


This is a STATUS_SYSTEM_PROCESS_TERMINATED bugcheck.
It signals that the system is rebooting due to a critical service termination.
The bugcheck is not very useful for debugging. To investigate the root cause
find the related svchost.exe crashes that happened on the same machine
around the time of this dump.
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800c579fd8a, The address that the exception occurred at
Arg3: ffffd0013512f548, Exception Record Address
Arg4: ffffd0013512ed50, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff800c579fd8a

BUGCHECK_P3: ffffd0013512f548

BUGCHECK_P4: ffffd0013512ed50

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!MiDemoteCombinedPte+42
fffff800`c579fd8a 49394520        cmp     qword ptr [r13+20h],rax

EXCEPTION_RECORD:  ffffd0013512f548 -- (.exr 0xffffd0013512f548)
ExceptionAddress: fffff800c579fd8a (nt!MiDemoteCombinedPte+0x0000000000000042)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffd0013512ed50 -- (.cxr 0xffffd0013512ed50)
rax=0000000000000001 rbx=0000000000000000 rcx=fffff6fffffffff8
rdx=8000000000000000 rsi=fffff6fffffffff8 rdi=fffff7810003f000
rip=fffff800c579fd8a rsp=ffffd0013512f780 rbp=fffff800c59d4dc0
r8=8000000000000000  r9=0000000000000013 r10=0000000000000014
r11=0000000000000013 r12=fffff6fffffffff8 r13=7fffffffffffffd0
r14=ffffd0013512f8b0 r15=fffff78100000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!MiDemoteCombinedPte+0x42:
fffff800`c579fd8a 49394520        cmp     qword ptr [r13+20h],rax ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

FOLLOWUP_IP:
nt!MiDemoteCombinedPte+42
fffff800`c579fd8a 49394520        cmp     qword ptr [r13+20h],rax

BUGCHECK_STR:  AV

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff800c59dc298
GetUlongPtrFromAddress: unable to read from fffff800c59dc520
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:42:33.0828

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff800c582e5dd to fffff800c579fd8a

STACK_TEXT:
ffffd001`3512f780 fffff800`c582e5dd : 00000000`00000001 fffff800`c59d4dc0 00000000`00000000 fffff781`00003b98 : nt!MiDemoteCombinedPte+0x42
ffffd001`3512f870 fffff800`c571d4c8 : fffff800`c59d4dc0 fffff800`c59d4dc0 00000000`00000000 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x5472d
ffffd001`3512f9b0 fffff800`c571c4a8 : 00000000`00000000 ffffd001`3512fa79 fffff800`c59d4dc0 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x200
ffffd001`3512f9f0 fffff800`c56feb4e : 00000000`00000000 ffffe000`ab463880 00000000`00000001 ffffe000`ab463880 : nt!MiProcessWorkingSets+0x1c8
ffffd001`3512fae0 fffff800`c57b0103 : 00000000`00000008 ffffd001`3512fb50 00000000`00000008 00000000`00000000 : nt!MmWorkingSetManager+0x4a
ffffd001`3512fb10 fffff800`c577ac70 : ffffe000`ab463880 00000000`00000000 00000000`00000080 00000000`00000000 : nt!KeBalanceSetManager+0x1b3
ffffd001`3512fb80 fffff800`c57cffc6 : ffffd001`391bb180 ffffe000`ab463880 ffffd001`391c72c0 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd001`3512fbe0 00000000`00000000 : ffffd001`35130000 ffffd001`35129000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  347fbe2f34e1725fc5b23f7650fe3d9058f1f815

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  fb5a48110227eddeff0efb575d5580b899bcdf87

THREAD_SHA1_HASH_MOD:  cb5f414824c2521bcc505eaa03e92fa10922dad8

FAULT_INSTR_CODE:  20453949

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiDemoteCombinedPte+42

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .cxr 0xffffd0013512ed50 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  42

FAILURE_BUCKET_ID:  AV_nt!MiDemoteCombinedPte

BUCKET_ID:  AV_nt!MiDemoteCombinedPte

PRIMARY_PROBLEM_CLASS:  AV_nt!MiDemoteCombinedPte

TARGET_TIME:  2020-01-28T09:10:11.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  776

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!midemotecombinedpte

FAILURE_ID_HASH:  {c577c73b-79a7-0c44-6c62-58e1d697b6d8}

Followup:     MachineOwner
---------

Aksine BIOS Güncelleme dışında herhangi bir ayar yapmadım. Load Defaults defalarca yaptım. Dediklerinizi tekrardan yapıp ekran görüntüsü atacağım.
İşlemci ısınmasın diye BIOS altından ayarları mı kurcalıyorsun?

BIOS'a gir Exit bölümünden Load Defaults yap kaydet çık farklı bir ayara dokunma.

Ayrıca belleklerin ikisi birden takılı şekilde Memtest86 testi yap.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003453, The subtype of the bugcheck.
Arg2: ffffe000ed65d900
Arg3: 000000000012280a
Arg4: 0000000000000004

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: 3453

BUGCHECK_P2: ffffe000ed65d900

BUGCHECK_P3: 12280a

BUGCHECK_P4: 4

BUGCHECK_STR:  0x1a_3453

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:13.0372

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80007b86beb to fffff80007b519a0

STACK_TEXT:
ffffd001`72b4f868 fffff800`07b86beb : 00000000`0000001a 00000000`00003453 ffffe000`ed65d900 00000000`0012280a : nt!KeBugCheckEx
ffffd001`72b4f870 fffff800`07dbacb9 : ffffffff`ffffffff 00000000`00000000 ffffd001`72b4f9d0 ffffe000`ed65dbe8 : nt! ?? ::FNODOBFM::`string'+0x24d3b
ffffd001`72b4f910 fffff800`07dba79c : ffffe000`eb7f4880 ffffd001`72b4f9d0 ffffe000`ed65dbe8 ffffe000`ed65d900 : nt!MmDeleteProcessAddressSpace+0x35
ffffd001`72b4f950 fffff800`07dc9dd0 : 00000000`00000000 00000000`00000000 ffffe000`eac76480 ffffe000`ed65d8d0 : nt!PspProcessDelete+0x1a0
ffffd001`72b4fa00 fffff800`07a5ac5f : 00000000`00000000 fffff800`07cc0040 ffffe000`ed65d900 00000000`00000000 : nt!ObpRemoveObjectRoutine+0x64
ffffd001`72b4fa60 fffff800`0801ae5f : ffffe000`ed65d900 ffffe000`eb7f4880 fffff800`07cc0040 ffffe000`eb7f4880 : nt!ObfDereferenceObjectWithTag+0x8f
ffffd001`72b4faa0 fffff800`07a9d38c : fffff800`0801ae20 ffffe000`eb7f49c0 ffffe000`eb7f4880 fffff800`07cb3300 : nt!PspProcessRundownWorkerSingle+0x3f
ffffd001`72b4fad0 fffff800`07b02c70 : 214c2824`44894800 ffffe000`eb7f4880 00000000`00000080 ffffe000`eb7f4880 : nt!ExpWorkerThread+0x28c
ffffd001`72b4fb80 fffff800`07b57fc6 : ffffd001`72640180 ffffe000`eb7f4880 ffffe000`eac60880 8b44ff33`00000320 : nt!PspSystemThreadStartup+0x58
ffffd001`72b4fbe0 00000000`00000000 : ffffd001`72b50000 ffffd001`72b49000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  5afe794a4b3d7876191790e6986a95a31b24d585

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a4e6d90b421a8e835becf8deea6b3e500448b4e0

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+24d3b
fffff800`07b86beb cc              int     3

FAULT_INSTR_CODE:  85c6ffcc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+24d3b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  24d3b

FAILURE_BUCKET_ID:  0x1a_3453_nt!_??_::FNODOBFM::_string_

BUCKET_ID:  0x1a_3453_nt!_??_::FNODOBFM::_string_

PRIMARY_PROBLEM_CLASS:  0x1a_3453_nt!_??_::FNODOBFM::_string_

TARGET_TIME:  2020-01-28T09:19:04.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  79d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_3453_nt!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {8c6944dd-28fb-640a-3fae-95a7a3ec1a0a}

Followup:     MachineOwner
---------

REFERENCE_BY_POINTER (18)
Arguments:
Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
Arg2: ffffc00109963060, Object whose reference count is being lowered
Arg3: 0000000000000010, Reserved
Arg4: 0000000000000000, Reserved
    The reference count of an object is illegal for the current state of the object.
    Each time a driver uses a pointer to an object the driver calls a kernel routine
    to increment the reference count of the object. When the driver is done with the
    pointer the driver calls another kernel routine to decrement the reference count.
    Drivers must match calls to the increment and decrement routines. This bugcheck
    can occur because an object's reference count goes to zero while there are still
    open handles to the object, in which case the fourth parameter indicates the number
    of opened handles. It may also occur when the object's reference count drops below zero
    whether or not there are open handles to the object, and in that case the fourth parameter
    contains the actual value of the pointer references count.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: ffffc00109963060

BUGCHECK_P3: 10

BUGCHECK_P4: 0

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x18

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:16.0542

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8007c170177 to fffff8007bd6e9a0

STACK_TEXT:
ffffd000`32c90678 fffff800`7c170177 : 00000000`00000018 00000000`00000000 ffffc001`09963060 00000000`00000010 : nt!KeBugCheckEx
ffffd000`32c90680 fffff800`7c019a51 : 00000000`00000001 ffffd000`32c907d0 00000000`00000000 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x23fc7
ffffd000`32c906d0 fffff800`7c01990a : 00000000`746c6600 ffffd000`00000040 ffffe000`e91f3ba0 ffffc000`fcf2b801 : nt!ObDuplicateObject+0xc1
ffffd000`32c90980 fffff800`7bd7a1b3 : ffffe000`ebe43040 00000055`33a2cc98 ffffd000`32c90a28 ffffd000`00000000 : nt!NtDuplicateObject+0x12a
ffffd000`32c90a10 00007ffa`41ce100a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000055`33a2cc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`41ce100a


THREAD_SHA1_HASH_MOD_FUNC:  c30b0c022e5488d37a362b54b765e225a6eada12

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  be2c4f4d0b2f098e287f568c2913b1fd33e86d3a

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt! ?? ::NNGAKEGL::`string'+23fc7
fffff800`7c170177 cc              int     3

FAULT_INSTR_CODE:  4c8b44cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::NNGAKEGL::`string'+23fc7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  23fc7

FAILURE_BUCKET_ID:  0x18_nt!_??_::NNGAKEGL::_string_

BUCKET_ID:  0x18_nt!_??_::NNGAKEGL::_string_

PRIMARY_PROBLEM_CLASS:  0x18_nt!_??_::NNGAKEGL::_string_

TARGET_TIME:  2020-01-28T09:15:06.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  79e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x18_nt!_??_::nngakegl::_string_

FAILURE_ID_HASH:  {0bed1247-ca82-b969-ac2a-0d0bda811963}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803e7769c6a, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff803e7769c6a

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803e7979298
GetUlongPtrFromAddress: unable to read from fffff803e7979520
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!SwapContext_PatchXRstor+0
fffff803`e7769c6a 0fae29          xrstor  [rcx]

EXCEPTION_PARAMETER2:  ffffffffffffffff

BUGCHECK_STR:  0x1E_c0000005_R

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:19.0521

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff803e77b8b69 to fffff803e77669a0

THREAD_SHA1_HASH_MOD_FUNC:  9bf396324f525e0e837471a0d1b4f971b07bdb3c

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  4a099aec6ea6d389990e699f3593dba50a29941a

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!SwapContext_PatchXRstor+0
fffff803`e7769c6a 0fae29          xrstor  [rcx]

FAULT_INSTR_CODE:  eb29ae0f

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!SwapContext_PatchXRstor+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x1E_c0000005_R_nt!SwapContext_PatchXRstor

BUCKET_ID:  0x1E_c0000005_R_nt!SwapContext_PatchXRstor

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_R_nt!SwapContext_PatchXRstor

TARGET_TIME:  2020-01-28T09:20:44.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  12605

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_r_nt!swapcontext_patchxrstor

FAILURE_ID_HASH:  {3877648d-a897-a15e-f342-f1945b62c157}

Followup:     MachineOwner
---------

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 000000000000000e,
Arg2: ffffc00149b96380
Arg3: ffefdffeff6fffbf
Arg4: 7ecf5f4b43709345

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: e

BUGCHECK_P2: ffffc00149b96380

BUGCHECK_P3: ffefdffeff6fffbf

BUGCHECK_P4: 7ecf5f4b43709345

BUGCHECK_STR:  0x19_e

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  TiWorker.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:32.0721

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff803d4aaf61c to fffff803d495a9a0

STACK_TEXT:
ffffd001`0d721fe8 fffff803`d4aaf61c : 00000000`00000019 00000000`0000000e ffffc001`49b96380 ffefdffe`ff6fffbf : nt!KeBugCheckEx
ffffd001`0d721ff0 fffff803`d4c3f401 : ffffd001`0d722168 00000000`00001880 ffffc001`0f418880 00000000`00000000 : nt!ExDeferredFreePool+0xdac
ffffd001`0d7220c0 fffff803`d4c3ed2f : 00000000`92819301 00000000`0000005c ffffc001`f4f55321 ffffc001`25175380 : nt!CmpGetNameControlBlock+0x191
ffffd001`0d722140 fffff803`d4bfbaab : ffffc001`18719000 00000000`035622f8 ffffc001`1a6452fc ffffc001`0f6caa70 : nt!CmpCreateKeyControlBlock+0x3cf
ffffd001`0d7221d0 fffff803`d4bfd22c : 00000000`00000000 ffffd001`035622f8 ffffd001`0d722950 ffffe000`cf001010 : nt!CmpDoOpen+0x6ab
ffffd001`0d7222b0 fffff803`d4bf5c39 : ffffc001`0f405268 ffffc001`0f405268 ffffc001`0f4051d0 00000000`00000012 : nt!CmpParseKey+0x51c
ffffd001`0d7225e0 fffff803`d4bf3a63 : 00000000`00000000 ffffd001`0d7227d8 ffffe000`00000040 ffffe000`bbe60f20 : nt!ObpLookupObjectName+0x6b9
ffffd001`0d722760 fffff803`d4bf31c4 : 00000000`00000001 000000a5`867cde88 000000a5`867cd980 00000000`01020019 : nt!ObOpenObjectByName+0x1e3
ffffd001`0d722890 fffff803`d4bf160b : ffffc5ab`b35900b0 ffffd001`0d722b00 00007ff9`fdbf89e8 00000000`00000002 : nt!CmOpenKey+0x2a4
ffffd001`0d722a40 fffff803`d49661b3 : 00000000`00000001 000000a5`88b26530 00007ff9`fd984840 00000000`00000000 : nt!NtOpenKeyEx+0xf
ffffd001`0d722a80 00007ffa`0ec01cca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000a5`867cd858 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`0ec01cca


THREAD_SHA1_HASH_MOD_FUNC:  6c0971105e59bfb812cc6a4d42f4e8fa6985a1f5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  47d20bdbd8b872c35e945c801ae500916b04da6b

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!ExDeferredFreePool+dac
fffff803`d4aaf61c cc              int     3

FAULT_INSTR_CODE:  4c8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExDeferredFreePool+dac

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  6.3.9600.17415

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  dac

FAILURE_BUCKET_ID:  0x19_e_nt!ExDeferredFreePool

BUCKET_ID:  0x19_e_nt!ExDeferredFreePool

PRIMARY_PROBLEM_CLASS:  0x19_e_nt!ExDeferredFreePool

TARGET_TIME:  2020-01-27T23:08:35.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  791

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x19_e_nt!exdeferredfreepool

FAILURE_ID_HASH:  {652ef998-c993-02e1-bea8-9dbeb0e887a3}

Followup:     Pool_corruption
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: 0000005be1a10001, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 00007fffd9b5ce5c, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000008, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: 5be1a10001

BUGCHECK_P2: 0

BUGCHECK_P3: 7fffd9b5ce5c

BUGCHECK_P4: 8

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80365765298
GetUlongPtrFromAddress: unable to read from fffff80365765520
0000005be1a10001

FAULTING_IP:
+0
00007fff`d9b5ce5c ??              ???

MM_INTERNAL_CODE:  8

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:09.0662

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff803655a5ed3 to fffff803655529a0

STACK_TEXT:
ffffd000`30b31868 fffff803`655a5ed3 : 00000000`00000050 0000005b`e1a10001 00000000`00000000 ffffd000`30b31a80 : nt!KeBugCheckEx
ffffd000`30b31870 fffff803`6545a183 : ffffe001`99e59580 ffffd000`30b31940 ffffe001`9a8c3880 fffff680`2df0d080 : nt! ?? ::FNODOBFM::`string'+0x43023
ffffd000`30b318c0 fffff803`6555cc2f : 00000000`00000000 00000000`023163ac 00000000`00000001 0000005b`dae61050 : nt!MmAccessFault+0x633
ffffd000`30b31a80 00007fff`d9b5ce5c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x12f
0000005b`daddf4b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`d9b5ce5c


THREAD_SHA1_HASH_MOD_FUNC:  c657d94433f4f33fd268b372caf2b4bbf9b614e8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a50f349d072369079e9be5692fdb90b89d0eca80

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+43023
fffff803`655a5ed3 cc              int     3

FAULT_INSTR_CODE:  353b48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+43023

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  43023

FAILURE_BUCKET_ID:  AV_nt!_??_::FNODOBFM::_string_

BUCKET_ID:  AV_nt!_??_::FNODOBFM::_string_

PRIMARY_PROBLEM_CLASS:  AV_nt!_??_::FNODOBFM::_string_

TARGET_TIME:  2020-01-28T09:08:19.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  842

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {9e2f043e-2671-7df2-fe70-649f4b2357db}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff07, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8010432704f, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffffffff07

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8010432704f

BUGCHECK_P4: 0

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff801043e6298
GetUlongPtrFromAddress: unable to read from fffff801043e6520
ffffffffffffff07

FAULTING_IP:
nt!ExAllocatePoolWithTag+5ff
fffff801`0432704f 4c8b4808        mov     r9,qword ptr [rax+8]

MM_INTERNAL_CODE:  0

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  1

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:43:00.0299

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd000310eef70 -- (.trap 0xffffd000310eef70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffffffffffeff rbx=0000000000000000 rcx=ffffe001b962f880
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8010432704f rsp=ffffd000310ef100 rbp=0000000000000001
r8=ffffc001473f3010  r9=7ffffffffffffffc r10=0000000000000001
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
nt!ExAllocatePoolWithTag+0x5ff:
fffff801`0432704f 4c8b4808        mov     r9,qword ptr [rax+8] ds:ffffffff`ffffff07=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80104201bd2 to fffff801041d39a0

STACK_TEXT:
ffffd000`310eed08 fffff801`04201bd2 : 00000000`00000050 ffffffff`ffffff07 00000000`00000000 ffffd000`310eef70 : nt!KeBugCheckEx
ffffd000`310eed10 fffff801`040db2b9 : 00000000`00000000 ffffe001`b9632900 ffffd000`310eef70 fffff801`043272ee : nt! ?? ::FNODOBFM::`string'+0x1dd22
ffffd000`310eedb0 fffff801`041ddc2f : 00000000`00000000 ffffe001`b7a01660 ffffd000`310ef000 ffffd000`310eefb0 : nt!MmAccessFault+0x769
ffffd000`310eef70 fffff801`0432704f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x12f
ffffd000`310ef100 fffff801`04449f7b : ffffffff`00000001 00000000`00000314 0a1bfb5a`a8acba61 ffffffff`00000001 : nt!ExAllocatePoolWithTag+0x5ff
ffffd000`310ef1d0 fffff801`04449ab8 : ffffc001`473f2060 ffffd000`310ef260 ffffc001`00000010 00000000`00000001 : nt!ObLogSecurityDescriptor+0x23b
ffffd000`310ef230 fffff801`04447080 : 00000000`00000000 ffffd000`310ef310 00000000`00000000 00000000`00000000 : nt!SeDefaultObjectMethod+0x5c
ffffd000`310ef2a0 fffff801`0446a108 : ffffd000`00000100 ffffd000`310ef3f0 ffffe001`ba3b8990 00000000`00000001 : nt!ObpAssignSecurity+0x114
ffffd000`310ef340 fffff801`0451649c : ffffe001`b9eed5c0 ffffe001`b9eed600 ffffc001`44f0d100 ffffc001`465af060 : nt!ObInsertObjectEx+0x2a8
ffffd000`310ef5d0 fffff801`0445309c : ffffe001`b9eed5c0 ffffe001`b9eed66c ffffc001`473ecaf0 00000000`00000440 : nt!SeCopyClientToken+0x9c
ffffd000`310ef660 fffff801`0445af58 : ffffe001`b9eed5c0 00000000`00000000 ffffd000`310ef740 ffffd000`310ef724 : nt!SepCreateClientSecurityEx+0x100
ffffd000`310ef6c0 fffff801`04442906 : 00000000`00000001 ffffe001`b9eed708 ffffe001`b9eed580 00000000`ffff0000 : nt!SeCreateClientSecurity+0xa4
ffffd000`310ef750 fffff801`0444220f : ffffd000`310ef898 ffffd000`310ef890 ffffe001`00000000 00000000`00000000 : nt!AlpcpCreateClientPort+0x4e6
ffffd000`310ef800 fffff801`0443f198 : 00000000`00000000 ffffe001`b9632900 00000000`00000002 00000000`00000000 : nt!AlpcpConnectPort+0x277
ffffd000`310ef990 fffff801`041df1b3 : ffffe001`b962f880 0000005f`9360efd8 ffffd000`310efa28 00000000`00000001 : nt!NtAlpcConnectPortEx+0x70
ffffd000`310efa10 00007ffd`fd6813ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000005f`9360f4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`fd6813ba


THREAD_SHA1_HASH_MOD_FUNC:  6b6cffb9e78e814084dadf36d2ed16200a978e2e

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  3fc63f12470f626a0c45991ae80755488e4fb0f4

THREAD_SHA1_HASH_MOD:  9eef8c7ca0ce66f8b8b34848179f303828cff762

FOLLOWUP_IP:
nt!ExAllocatePoolWithTag+5ff
fffff801`0432704f 4c8b4808        mov     r9,qword ptr [rax+8]

FAULT_INSTR_CODE:  8488b4c

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!ExAllocatePoolWithTag+5ff

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5ff

FAILURE_BUCKET_ID:  AV_nt!ExAllocatePoolWithTag

BUCKET_ID:  AV_nt!ExAllocatePoolWithTag

PRIMARY_PROBLEM_CLASS:  AV_nt!ExAllocatePoolWithTag

TARGET_TIME:  2020-01-28T09:23:57.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  84f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!exallocatepoolwithtag

FAILURE_ID_HASH:  {8c8c5521-08d5-4e98-e93e-114b9bc77ddd}

Followup:     MachineOwner
---------

WINLOGON_FATAL_ERROR (c000021a)
The Winlogon process terminated unexpectedly.
Arguments:
Arg1: ffffc00076696340, String that identifies the problem.
Arg2: 0000000000000000, Error Code.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

ETW minidump data unavailable

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

ERROR_CODE: (NTSTATUS) 0xc000021a - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc000021a - <Unable to get error code text>

EXCEPTION_CODE_STR:  c000021a

EXCEPTION_PARAMETER1:  ffffc00076696340

EXCEPTION_PARAMETER2:  0000000000000000

EXCEPTION_PARAMETER3:  0000000000000000

EXCEPTION_PARAMETER4: 0

DUMP_TYPE:  2

BUGCHECK_P1: ffffc00076696340

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  services.exe

ADDITIONAL_DEBUG_TEXT:  DCOM Sunucusu Ýþlem Baþlatýcýsý hizmeti beklenmedik biçimde sonlandýrýldýðýndan, Windows þimdi yeniden baþlatýlmalýdýr

TAG_NOT_DEFINED_1004c:
This is a STATUS_SYSTEM_PROCESS_TERMINATED bugcheck.
It signals that the system is rebooting due to a critical service termination.
The bugcheck is not very useful for debugging. To investigate the root cause
find the related svchost.exe crashes that happened on the same machine
around the time of this dump.

BUGCHECK_STR:  0xc000021a_rpcss.dll_Critical_Service_Terminated

IMAGE_NAME:  ntkrnlmp.exe

MODULE_NAME: nt

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:42:56.0700

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff800801a39a1 to fffff8007ff689a0

STACK_TEXT:
ffffd000`76612638 fffff800`801a39a1 : 00000000`0000004c 00000000`c000021a ffffd000`311df378 ffffe001`2a709360 : nt!KeBugCheckEx
ffffd000`76612640 fffff800`8019d4fa : ffffe001`2685a400 ffffd000`76612759 00000000`00000000 00000000`00000002 : nt!PopGracefulShutdown+0x2c9
ffffd000`76612680 fffff800`7ff741b3 : ffffe001`2685a040 00000000`00000000 00000000`c0000004 ffffd000`76612900 : nt! ?? ::OKHAJAOM::`string'+0x269a
ffffd000`766127c0 fffff800`7ff6c600 : fffff800`803ba86d 00000000`00000001 ffffd000`766129d8 00000000`c0000004 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`76612958 fffff800`803ba86d : 00000000`00000001 ffffd000`766129d8 00000000`c0000004 ffffd000`7a5bb180 : nt!KiServiceLinkage
ffffd000`76612960 fffff800`802ed9e3 : 00000000`00000000 00000000`00000000 ffffd000`7a5bb180 ffffe001`2685a180 : nt! ?? ::NNGAKEGL::`string'+0x746bd
ffffd000`76612a20 fffff800`7ff14a5e : fffff800`7ff149a4 00000000`00000000 00000000`00000002 fffff800`800ca300 : nt!PopPolicyWorkerAction+0x63
ffffd000`76612a90 fffff800`7feb438c : fffff800`00000002 fffff800`800d7d40 ffffe001`2685a040 fffff800`800ca300 : nt!PopPolicyWorkerThread+0xba
ffffd000`76612ad0 fffff800`7ff19c70 : 440f4800`1140230d ffffe001`2685a040 00000000`00000080 ffffe001`2685a040 : nt!ExpWorkerThread+0x28c
ffffd000`76612b80 fffff800`7ff6efc6 : fffff800`8011b180 ffffe001`2685a040 ffffe001`26860880 24448d48`884d8948 : nt!PspSystemThreadStartup+0x58
ffffd000`76612be0 00000000`00000000 : ffffd000`76613000 ffffd000`7660c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  ca83477c6c105b050cb3ec79e1112ae3fe845ead

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  46fe666991a5db9d5866c1db91110caec568cdad

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt! ?? ::OKHAJAOM::`string'+269a
fffff800`8019d4fa cc              int     3

FAULT_INSTR_CODE:  e46ce8cc

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt! ?? ::OKHAJAOM::`string'+269a

FOLLOWUP_NAME:  MachineOwner

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  269a

FAILURE_BUCKET_ID:  0xc000021a_rpcss.dll_Critical_Service_Terminated_nt!_??_::OKHAJAOM::_string_

BUCKET_ID:  0xc000021a_rpcss.dll_Critical_Service_Terminated_nt!_??_::OKHAJAOM::_string_

PRIMARY_PROBLEM_CLASS:  0xc000021a_rpcss.dll_Critical_Service_Terminated_nt!_??_::OKHAJAOM::_string_

TARGET_TIME:  2020-01-28T09:18:13.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  bc9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xc000021a_rpcss.dll_critical_service_terminated_nt!_??_::okhajaom::_string_

FAILURE_ID_HASH:  {985ba5ee-c7fd-3ab7-c026-2d066fd15a29}

Followup:     MachineOwner
---------


This is a STATUS_SYSTEM_PROCESS_TERMINATED bugcheck.
It signals that the system is rebooting due to a critical service termination.
The bugcheck is not very useful for debugging. To investigate the root cause
find the related svchost.exe crashes that happened on the same machine
around the time of this dump.
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800c579fd8a, The address that the exception occurred at
Arg3: ffffd0013512f548, Exception Record Address
Arg4: ffffd0013512ed50, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GX70 3BE

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  E176KAMS.50G

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E176KAMS.50G

BIOS_DATE:  01/09/2014

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-176K

BASEBOARD_VERSION:  Ver 1.000

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff800c579fd8a

BUGCHECK_P3: ffffd0013512f548

BUGCHECK_P4: ffffd0013512ed50

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!MiDemoteCombinedPte+42
fffff800`c579fd8a 49394520        cmp     qword ptr [r13+20h],rax

EXCEPTION_RECORD:  ffffd0013512f548 -- (.exr 0xffffd0013512f548)
ExceptionAddress: fffff800c579fd8a (nt!MiDemoteCombinedPte+0x0000000000000042)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffd0013512ed50 -- (.cxr 0xffffd0013512ed50)
rax=0000000000000001 rbx=0000000000000000 rcx=fffff6fffffffff8
rdx=8000000000000000 rsi=fffff6fffffffff8 rdi=fffff7810003f000
rip=fffff800c579fd8a rsp=ffffd0013512f780 rbp=fffff800c59d4dc0
r8=8000000000000000  r9=0000000000000013 r10=0000000000000014
r11=0000000000000013 r12=fffff6fffffffff8 r13=7fffffffffffffd0
r14=ffffd0013512f8b0 r15=fffff78100000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!MiDemoteCombinedPte+0x42:
fffff800`c579fd8a 49394520        cmp     qword ptr [r13+20h],rax ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: 9bf

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 13

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

FOLLOWUP_IP:
nt!MiDemoteCombinedPte+42
fffff800`c579fd8a 49394520        cmp     qword ptr [r13+20h],rax

BUGCHECK_STR:  AV

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff800c59dc298
GetUlongPtrFromAddress: unable to read from fffff800c59dc520
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-01-2020 18:42:33.0828

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff800c582e5dd to fffff800c579fd8a

STACK_TEXT:
ffffd001`3512f780 fffff800`c582e5dd : 00000000`00000001 fffff800`c59d4dc0 00000000`00000000 fffff781`00003b98 : nt!MiDemoteCombinedPte+0x42
ffffd001`3512f870 fffff800`c571d4c8 : fffff800`c59d4dc0 fffff800`c59d4dc0 00000000`00000000 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x5472d
ffffd001`3512f9b0 fffff800`c571c4a8 : 00000000`00000000 ffffd001`3512fa79 fffff800`c59d4dc0 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x200
ffffd001`3512f9f0 fffff800`c56feb4e : 00000000`00000000 ffffe000`ab463880 00000000`00000001 ffffe000`ab463880 : nt!MiProcessWorkingSets+0x1c8
ffffd001`3512fae0 fffff800`c57b0103 : 00000000`00000008 ffffd001`3512fb50 00000000`00000008 00000000`00000000 : nt!MmWorkingSetManager+0x4a
ffffd001`3512fb10 fffff800`c577ac70 : ffffe000`ab463880 00000000`00000000 00000000`00000080 00000000`00000000 : nt!KeBalanceSetManager+0x1b3
ffffd001`3512fb80 fffff800`c57cffc6 : ffffd001`391bb180 ffffe000`ab463880 ffffd001`391c72c0 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd001`3512fbe0 00000000`00000000 : ffffd001`35130000 ffffd001`35129000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  347fbe2f34e1725fc5b23f7650fe3d9058f1f815

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  fb5a48110227eddeff0efb575d5580b899bcdf87

THREAD_SHA1_HASH_MOD:  cb5f414824c2521bcc505eaa03e92fa10922dad8

FAULT_INSTR_CODE:  20453949

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiDemoteCombinedPte+42

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .cxr 0xffffd0013512ed50 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  42

FAILURE_BUCKET_ID:  AV_nt!MiDemoteCombinedPte

BUCKET_ID:  AV_nt!MiDemoteCombinedPte

PRIMARY_PROBLEM_CLASS:  AV_nt!MiDemoteCombinedPte

TARGET_TIME:  2020-01-28T09:10:11.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  776

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!midemotecombinedpte

FAILURE_ID_HASH:  {c577c73b-79a7-0c44-6c62-58e1d697b6d8}

Followup:     MachineOwner
---------

1 Saati geçti. Sorun yok gibi görünüyor. Henüz iptal etmedim.
DSC_0423.JPG
 
Son düzenleme:
Neden eski sürüm bir Memtest86 ile test yapıyorsun?
Neden iptal ediyorsun?
Bırak bitirsin.
Hocam USB bellekte Windows 10 var. Yeni sürümü CD ile Boot edemedim. Ayrıca mesajımda belirttiğim gibi zaten iptal etmedim. Pass 2'ye geçtiğinde yeniden resim atarım. Eğer şart ise yeni sürüm USB'den tarama yaparım.

Ayrıca testin tamamen bitmesi ne kadar sürer?
 
Sana açık açık konuşayım ben bellek nedenli hata gördüm, AIDA64 raporunda baktım depolama birimlerin temiz, kusura bakmayın farklı bir çözümüm bulunmuyor :(

Merhaba. Malesef 1 saaten uzun süren elektrik kesintisi sonrası pass 4'ü tamamlayamadan kapandı. Herhangi bir hata vermemişti zaten. Yeni teste başlamama gerek var mı?
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı