R5 3600 MEMORY_MANAGEMENT ve Mavi Ekran Sorunu

Prostrike

Centipat
Katılım
16 Mart 2020
Mesajlar
3
Daha fazla  
Cinsiyet
Erkek
Meslek
Memur
İyi günler dostlar

GIGABYTE B450M S2H
Ryzen 5 3600
Asus GTX 1070 ROG Strix 8GB
Corsair Vengeance RGB Pro 16GB (2x8GB) 3200 MHZ
500 W 80+ PSU

Yaklaşık 3-4 gün önce yukarıda yazılı bulunan ekran kartı hariç sıfır yeni bir sistem topladım. Topladıktan sonra Windows Updateleri, Biosu ve driverları manuel olarak yükledim. Ramleri BİOS üzerinden XMP aktif ederek 3200 MHZ'e çıkardım ve kullanmaya başladım. Sistemi denemek için hali hazırda bulunan COD MW2' yi oynamaya başladım. Yaklaşık 20 dakika sonra sistem MEMORY_MANAGEMENT hatası verdi ve sistem kendini kapatarak yeniden açıldı. Ben de tekrar oyuna girdim ama yine aynı süre içerisinde aynı hatayı verdi. Bende ramları Memtest86 testine soktum ve yaklaşık bir saat yaptığım test sonucunda 13 hata verdi. Bende ramlarin arızalı olduğunu düşünerek hangi ramde arıza olduğunu tespit etmek için ikisini de ayrı ayrı ve farklı slotlarda yine XMP açıkken bir saat teste soktum ve her ikisinde de sorun tespit edemedi. Bende tekrar iki ramide takarak 3200 MHZ de hem Windows Bellek Tanılama üzerinden hem de Memtest86 üzerinden ki bu testi 7 saat boyunca yapmama rağmen ramlarde yine bir hata tespit edemedi. Ama anlam veremedeğim bir şekilde COD MW2, Pubg ve COD Warzone üzerinde Memory_Management olarak değil ama Driver_IRQL_NOT_LESS_OR_EQUAL, BAD_POOL_CALLER, KERNEL_LOCK_ENTRY_LEAKED_ON_THREAD_TERMİNATİON gibi mavi ekran hataları vermeye devam etti. Bu seferde BİOS üzerinden Ramlerin hızını 2133 MHZ'e düşürerek oyunları çalıştırmayı denedim ve bu sefer herhangi bir mavi ekran olmadı ve oyunları oynayabildim.

Benim bu sistem ile ilgili sorunum sizce nedir, 3-4 gündür forumlarda geziyorum ama sonuca varamadım. Bu konuda yardımlarınıza ihtiyacım var şimdiden teşekkür ederim.

5 günde aldığım Minidump dosyaları: https://drive.google.com/file/d/12XtGbZL4ln1qu4RY_2sKklSaQcBi2eVg/view?usp=drive_open
 
Bellekleri elle 3000MHz veya 2933MHz'e çekerek dene.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 000000000f319000
Arg3: 000000000000000f
Arg4: ffffc500d8be9b00

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 61941

BUGCHECK_P2: f319000

BUGCHECK_P3: f

BUGCHECK_P4: ffffc500d8be9b00

BUGCHECK_STR:  0x1a_61941

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  iw4sp.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-16-2020 15:22:55.0594

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8026a84288c to fffff8026a7c2380

STACK_TEXT:
ffffc500`d8be9958 fffff802`6a84288c : 00000000`0000001a 00000000`00061941 00000000`0f319000 00000000`0000000f : nt!KeBugCheckEx
ffffc500`d8be9960 fffff802`6a7d0420 : ffffc782`c5f82080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x179a1c
ffffc500`d8be9b00 00000000`6e39f9d7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000000`0fe9e9e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6e39f9d7


THREAD_SHA1_HASH_MOD_FUNC:  1feb98d5c6601cfab1575099bc1303f202ec7478

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c9a91cab4b8051e79b1ade67978b4ada6bb03b00

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function

BUCKET_ID:  0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function

PRIMARY_PROBLEM_CLASS:  0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function

TARGET_TIME:  2020-03-13T11:18:47.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3efe

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_61941_analysis_inconclusive!unknown_function

FAILURE_ID_HASH:  {5deef4f7-7ffd-da2a-fbcb-ad563ba13c90}

Followup:     MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff9f80003918f8
Arg3: 0081000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F41

BIOS_DATE:  07/22/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff9f80003918f8

BUGCHECK_P3: 81000000000000

BUGCHECK_P4: 0

BUGCHECK_STR:  0x1a_41792

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  steamwebhelper.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-16-2020 15:23:00.0575

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff807550502b8 to fffff80754fc2380

STACK_TEXT:
fffffb02`6068ada8 fffff807`550502b8 : 00000000`0000001a 00000000`00041792 ffff9f80`003918f8 00810000`00000000 : nt!KeBugCheckEx
fffffb02`6068adb0 fffff807`54ee3d17 : 00000000`00000000 ffff9f80`003918f8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x16a7a8
fffffb02`6068aec0 fffff807`54ee41d1 : fffffb02`6068b310 ffff9fcf`c0001c88 00000000`00000000 0a000001`e477c867 : nt!MiWalkPageTablesRecursively+0x1e7
fffffb02`6068af80 fffff807`54ee41d1 : fffffb02`6068b310 ffff9fcf`e7e00008 00000000`00000000 0a000000`63c56867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffb02`6068b040 fffff807`54ee41d1 : fffffb02`6068b310 ffff9fcf`e7f3f000 ffff9fcf`00000000 0a000001`a6546867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffb02`6068b100 fffff807`54ee395c : fffffb02`6068b310 ffff9fcf`e7f3f9f8 fffffb02`00000000 fffffb02`6068b289 : nt!MiWalkPageTablesRecursively+0x6a1
fffffb02`6068b1c0 fffff807`54ee1dc8 : fffffb02`6068b310 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffffb02`6068b2c0 fffff807`54eeff20 : ffffffff`ffffffff ffff8087`bf7743f8 fffffb02`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffffb02`6068b660 fffff807`5547972d : ffff8087`bf573440 ffff8087`bf573440 ffff8087`bfe030c0 ffff8087`bf7743f0 : nt!MiDeleteVad+0x860
fffffb02`6068b820 fffff807`55488460 : ffff8087`bfe030c0 ffff8087`c0d86c90 ffff8087`bf573440 00000000`00000000 : nt!MiUnmapVad+0x49
fffffb02`6068b850 fffff807`554879cf : ffff8087`c1841f00 ffff8087`c1841f00 ffff8087`bf774080 fffff807`5526a3c0 : nt!MiCleanVad+0x30
fffffb02`6068b880 fffff807`553de469 : ffffffff`00000000 ffffffff`ffffffff fffffb02`6068bb01 ffff8087`bf774080 : nt!MmCleanProcessAddressSpace+0x137
fffffb02`6068b900 fffff807`554d1403 : ffff8087`bf774080 ffffd306`30e5b060 fffffb02`6068bb80 00000000`00000000 : nt!PspRundownSingleProcess+0x139
fffffb02`6068b980 fffff807`5546fcbb : 00000000`00000000 fffffb02`6068bb01 00000000`00e00000 ffff8087`bf573440 : nt!PspExitThread+0x60b
fffffb02`6068ba90 fffff807`54fd3c18 : 00000000`00003598 ffff8087`bf573440 ffff8087`bf774080 00000000`00000000 : nt!NtTerminateProcess+0xeb
fffffb02`6068bb00 00000000`77511cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`00d0e9f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77511cbc


THREAD_SHA1_HASH_MOD_FUNC:  28819333630b094e437e8f4b5f5cbb772be47b43

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ea15c9a53e31626021a26a3b063e5f55c48a30c9

THREAD_SHA1_HASH_MOD:  9eef8c7ca0ce66f8b8b34848179f303828cff762

FOLLOWUP_IP:
nt!MiDeleteVa+16a7a8
fffff807`550502b8 cc              int     3

FAULT_INSTR_CODE:  d66ae8cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiDeleteVa+16a7a8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  16a7a8

FAILURE_BUCKET_ID:  0x1a_41792_nt!MiDeleteVa

BUCKET_ID:  0x1a_41792_nt!MiDeleteVa

PRIMARY_PROBLEM_CLASS:  0x1a_41792_nt!MiDeleteVa

TARGET_TIME:  2020-03-13T20:51:25.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2d8a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41792_nt!mideleteva

FAILURE_ID_HASH:  {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}

Followup:     MachineOwner
---------

KERNEL_LOCK_ENTRY_LEAKED_ON_THREAD_TERMINATION (153)
A thread was terminated before it had freed all its AutoBoost lock entries.
This is typically caused when a thread never released a lock it previously
acquired (e.g. by relying on another thread to release it), or if the thread
did not supply a consistent set of flags to lock package APIs.
Arguments:
Arg1: ffff9287b68a0080, The address of the thread
Arg2: ffff9287b68a0520, The address of the entry that was not freed
Arg3: 0000000000000001, Lock pointer was not NULL
Arg4: 8002000000000000, The address of the lock associated with the entry

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: ffff9287b68a0080

BUGCHECK_P2: ffff9287b68a0520

BUGCHECK_P3: 1

BUGCHECK_P4: 8002000000000000

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x153

PROCESS_NAME:  Battle.net.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-16-2020 15:23:04.0416

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8000a470b11 to fffff8000a3c2380

STACK_TEXT:
ffff9007`a77333b8 fffff800`0a470b11 : 00000000`00000153 ffff9287`b68a0080 ffff9287`b68a0520 00000000`00000001 : nt!KeBugCheckEx
ffff9007`a77333c0 fffff800`0a8d315e : 00000000`0000005a fffff800`0a8c38c7 ffff9287`b4f7e050 ffff9287`b5ef5a30 : nt!KeCleanupThreadState+0x137af5
ffff9007`a7733400 fffff800`0a8c36d0 : 00000000`00000000 ffff9287`b68a0050 ffff9007`a77335f9 00000000`00000000 : nt!PspThreadDelete+0x1e
ffff9007`a7733470 fffff800`0a313279 : 00000000`00000000 00000000`00000000 ffff9007`a77335f9 ffff9287`b68a0080 : nt!ObpRemoveObjectRoutine+0x80
ffff9007`a77334d0 fffff800`0a8b5a47 : 00000000`00000000 ffff9287`b68a0050 ffff9287`00000000 00000000`00005953 : nt!ObfDereferenceObjectWithTag+0xc9
ffff9007`a7733510 fffff800`0a7f8955 : ffff9287`b51d04e8 fffff800`0a30f44f ffff9287`b51d04b0 ffff9287`b896a080 : nt!ObCloseHandleTableEntry+0x2c7
ffff9007`a7733650 fffff800`0a86abed : ffff9287`b51d04b0 ffff9287`b896a080 ffffffff`ffffff01 ffff9287`b6415380 : nt!ExSweepHandleTable+0xd5
ffff9007`a7733700 fffff800`0a7de461 : ffffffff`ffffffff ffff9287`b6415080 ffff9007`a7733750 ffff9287`00000000 : nt!ObKillProcess+0x35
ffff9007`a7733730 fffff800`0a8d1403 : ffff9287`b6415080 ffffa608`275e2060 ffff9007`a7733959 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffff9007`a77337b0 fffff800`0a8cece3 : 00000000`c0000005 ffff8001`d1e79101 00000000`00928000 00000000`00000000 : nt!PspExitThread+0x60b
ffff9007`a77338c0 fffff800`0a316e21 : ffff9287`b896a080 ffff8001`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffff9007`a7733900 fffff800`0a3c6900 : ffff9287`b8960001 ffff9007`a77339c0 00000000`00000000 fffff800`00000000 : nt!KiDeliverApc+0x481
ffff9007`a77339c0 fffff800`0a3d3cbf : ffff9287`b896a080 00000000`00000000 ffff9007`a7733b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff9007`a7733b00 00000000`775c1cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`05bdedb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775c1cbc


THREAD_SHA1_HASH_MOD_FUNC:  302a8dbe881442bd48596becf2940e0d2f158004

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5aeced90d7003f643e128c01d492537959a253ae

THREAD_SHA1_HASH_MOD:  7f608ac2fbce9034a3386b1d51652e4911d30234

FOLLOWUP_IP:
nt!KeCleanupThreadState+137af5
fffff800`0a470b11 cc              int     3

FAULT_INSTR_CODE:  e9c18bcc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KeCleanupThreadState+137af5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  137af5

FAILURE_BUCKET_ID:  0x153_nt!KeCleanupThreadState

BUCKET_ID:  0x153_nt!KeCleanupThreadState

PRIMARY_PROBLEM_CLASS:  0x153_nt!KeCleanupThreadState

TARGET_TIME:  2020-03-14T20:46:22.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2ba4

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x153_nt!kecleanupthreadstate

FAILURE_ID_HASH:  {ec5d6639-ab1b-cfbe-e9ca-947d6a503a92}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: ffffc34780c0fb39
Arg3: 0000000000000009
Arg4: fffffc8e25528530

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 61941

BUGCHECK_P2: ffffc34780c0fb39

BUGCHECK_P3: 9

BUGCHECK_P4: fffffc8e25528530

BUGCHECK_STR:  0x1a_61941

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-16-2020 15:23:08.0508

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffffc8e25528530 -- (.trap 0xfffffc8e25528530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc34780c0fb20 rbx=0000000000000000 rcx=ffffc3478410a4c0
rdx=000000000000000d rsi=0000000000000000 rdi=0000000000000000
rip=ffffc31402c2d364 rsp=fffffc8e255286c0 rbp=000000000000000d
r8=0000000000000000  r9=0000000000000000 r10=ffffc31403d4c310
r11=fffffc8e25528720 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
win32kfull!TimersProc+0x174:
ffffc314`02c2d364 f6401901        test    byte ptr [rax+19h],1 ds:ffffc347`80c0fb39=00
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80644c4288c to fffff80644bc2380

STACK_TEXT:
fffffc8e`25528388 fffff806`44c4288c : 00000000`0000001a 00000000`00061941 ffffc347`80c0fb39 00000000`00000009 : nt!KeBugCheckEx
fffffc8e`25528390 fffff806`44bd0420 : ffffc600`00010224 00000000`00000000 00000000`adbe1100 00000000`00000000 : nt!MmAccessFault+0x179a1c
fffffc8e`25528530 ffffc314`02c2d364 : ffffc347`874b96a0 ffffc314`02f21308 00000000`00000000 ffff920c`aee9d088 : nt!KiPageFault+0x360
fffffc8e`255286c0 ffffc314`02c2d03b : 00000000`00000003 fffffc8e`25528840 ffffc314`02f21308 00000000`00000004 : win32kfull!TimersProc+0x174
fffffc8e`25528740 ffffc314`03d756a3 : ffff920c`a7ca9240 ffff920c`a7ca9240 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0xd9b
fffffc8e`255289c0 ffffc314`02c4f4ef : ffff920c`a7ca9240 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0xa3
fffffc8e`25528ad0 fffff806`44bd3c18 : ffff920c`a7ca9240 00000000`00000005 000002f8`46804200 00000000`000003dc : win32kfull!NtUserCallNoParam+0x6f
fffffc8e`25528b00 00007ffc`31191144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f9`f94bf9d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`31191144


THREAD_SHA1_HASH_MOD_FUNC:  86107f5dc9731f7479b22a96151ec32184de52f0

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6b065e5ec9ff0e2483214cd6056b492b2d2b9b82

THREAD_SHA1_HASH_MOD:  3a3fd6f5d671e23dd8de64436fd8c22ac717caff

FOLLOWUP_IP:
win32kfull!TimersProc+174
ffffc314`02c2d364 f6401901        test    byte ptr [rax+19h],1

FAULT_INSTR_CODE:  11940f6

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  win32kfull!TimersProc+174

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  d8fde2a

IMAGE_VERSION:  10.0.18362.719

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  174

FAILURE_BUCKET_ID:  0x1a_61941_win32kfull!TimersProc

BUCKET_ID:  0x1a_61941_win32kfull!TimersProc

PRIMARY_PROBLEM_CLASS:  0x1a_61941_win32kfull!TimersProc

TARGET_TIME:  2020-03-14T11:50:02.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1fea

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_61941_win32kfull!timersproc

FAILURE_ID_HASH:  {1b316b3d-9e3b-4f89-86fc-7ffa82b2215b}

Followup:     MachineOwner
---------
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000046, Attempt to free an invalid pool address
Arg2: 0002000000000000, Starting address
Arg3: 0000000000000000, 0
Arg4: 0000000000000000, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 46

BUGCHECK_P2: 2000000000000

BUGCHECK_P3: 0

BUGCHECK_P4: 0

FAULTING_IP:
win32kfull!Win32FreePoolImpl+52
ffff83e4`bb648e82 488b5c2440      mov     rbx,qword ptr [rsp+40h]

BUGCHECK_STR:  0xc2_46

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-16-2020 15:23:12.0049

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8014691b0c3 to fffff801467c2380

STACK_TEXT:
ffffd403`9744bb08 fffff801`4691b0c3 : 00000000`000000c2 00000000`00000046 00020000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffd403`9744bb10 fffff801`4691b138 : 00000000`00000016 ffffd403`9744bec9 00020000`00000000 fffff801`46a6e118 : nt!RtlpHeapHandleError+0x2b
ffffd403`9744bb50 fffff801`4691ad61 : ffffd403`9744bc20 fffff801`46a6e118 00000000`00000000 00000028`00000100 : nt!RtlpHpHeapHandleError+0x58
ffffd403`9744bb80 fffff801`466a7ceb : ffffd403`9744bc20 00000000`00000000 00000000`00000000 fffff801`46c824ae : nt!RtlpLogHeapFailure+0x45
ffffd403`9744bbb0 fffff801`46634964 : ffffd403`9744bce0 ffffd403`9744bd80 ffffd403`9744bcc0 fffff801`466c1735 : nt!RtlpHpVaMgrCtxQuery+0x4b
ffffd403`9744bbf0 fffff801`4671ec59 : ffff83a9`00602080 00020000`00000000 a2e64ead`a2e64ead ffff83a9`01201000 : nt!RtlpHpQueryVA+0x54
ffffd403`9744bc50 fffff801`4696f019 : 00000000`00000000 ffffd403`9744bdf0 00000000`00000000 ffffd403`9744bdf0 : nt!ExFreeHeapPool+0x809
ffffd403`9744bd70 ffff83e4`bb648e82 : ffff83a9`040b2760 00000000`00000000 00000000`00000000 ffffd403`9744bdf0 : nt!ExFreePool+0x9
ffffd403`9744bda0 ffff83e4`bb01dd4c : 00000000`00000000 00020000`00000000 00020000`00000000 00000000`00000000 : win32kfull!Win32FreePoolImpl+0x52
ffffd403`9744bdd0 ffff83e4`bb6f4e41 : 00000000`00000001 ffffd403`9744bec9 00000000`ffff3fff ffff83a9`0083a2a0 : win32kbase!Win32FreePool+0x2c
ffffd403`9744be00 ffff83e4`bb6f0e72 : ffff83a9`0062a8a0 00000000`00000000 00000000`00000000 ffff83a9`0083a2a0 : win32kfull!xxxFreeWindow+0x133d
ffffd403`9744bf30 ffff83e4`bb09b99a : ffff83a9`0061b690 ffff83a9`0083a2a0 ffff83e4`bb1d2eac ffff83a9`00c02ec0 : win32kfull!xxxDestroyWindow+0x922
ffffd403`9744c030 ffff83e4`bb036a10 : 00000000`00000176 00000000`00000000 00000000`00000000 ffffd403`9744bfa0 : win32kbase!xxxDestroyWindowIfSupported+0x2a
ffffd403`9744c060 ffff83e4`bb037760 : 00000000`00000000 00000000`00000176 ffff83a9`040b2760 00000000`00000000 : win32kbase!HMDestroyUnlockedObjectWorker+0x68
ffffd403`9744c090 ffff83e4`bb03c93d : ffffc281`ff8af000 00000000`00000000 ffff83a9`040b2760 00000000`00000000 : win32kbase!DestroyThreadsObjects+0x120
ffffd403`9744c0d0 ffff83e4`bb03a396 : ffff83a9`040b2760 ffffc281`ff8af080 ffff83a9`040b2760 ffff83e4`bb218640 : win32kbase!xxxDestroyThreadInfo+0xd35
ffffd403`9744c2a0 ffff83e4`bb69d91b : 00000000`00000001 00000000`00000001 00000000`00000000 ffff9efe`39e00000 : win32kbase!UserThreadCallout+0x466
ffffd403`9744c490 ffff83e4`bb022c5d : 00000000`00000001 ffffd403`9744c5c0 fffff801`46a38948 ffff8e87`0c632b60 : win32kfull!W32pThreadCallout+0x7b
ffffd403`9744c4c0 ffff83e4`bae01040 : fffff801`46a38948 ffffc281`ff7d7700 ffffc281`f4e92c60 ffffc281`f3528f10 : win32kbase!W32CalloutDispatch+0x35d
ffffd403`9744c6e0 fffff801`46c7c4a1 : 00000000`00000000 ffffd403`9744c770 00060030`00010002 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x10
ffffd403`9744c710 fffff801`46cd12db : ffffc281`f4e92c60 ffffd403`9744c8e9 00000000`00000000 00000000`00000000 : nt!ExCallCallBack+0x3d
ffffd403`9744c740 fffff801`46ccece3 : 00000000`40010004 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x4e3
ffffd403`9744c850 fffff801`46716e21 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffd403`9744c890 fffff801`467c6900 : 00000000`00000001 ffffd403`9744c950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffffd403`9744c950 fffff801`467d3cbf : ffffc281`ff8af080 00000000`0556fc58 00000000`ffffffff ffff8e87`00001cff : nt!KiInitiateUserApc+0x70
ffffd403`9744ca90 00007ffa`d4b29a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0556fc38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`d4b29a84


THREAD_SHA1_HASH_MOD_FUNC:  1957e7a04f3ba53d63f9a0b898b7201055c8db62

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  1f5e20c6e7c294ad68be801ef6c1c827c479cdba

THREAD_SHA1_HASH_MOD:  51f2a6522ff30439bd06347c26d588b06dac4ed2

FOLLOWUP_IP:
win32kfull!Win32FreePoolImpl+52
ffff83e4`bb648e82 488b5c2440      mov     rbx,qword ptr [rsp+40h]

FAULT_INSTR_CODE:  245c8b48

SYMBOL_STACK_INDEX:  8

SYMBOL_NAME:  win32kfull!Win32FreePoolImpl+52

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  d8fde2a

IMAGE_VERSION:  10.0.18362.719

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  52

FAILURE_BUCKET_ID:  0xc2_46_win32kfull!Win32FreePoolImpl

BUCKET_ID:  0xc2_46_win32kfull!Win32FreePoolImpl

PRIMARY_PROBLEM_CLASS:  0xc2_46_win32kfull!Win32FreePoolImpl

TARGET_TIME:  2020-03-14T20:52:27.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  51cb

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xc2_46_win32kfull!win32freepoolimpl

FAILURE_ID_HASH:  {c7277be0-aae1-5026-878c-6ebf8984f15b}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007fff0e57b400
Arg3: 000000000000001d
Arg4: ffffde821b5feb00

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 61941

BUGCHECK_P2: 7fff0e57b400

BUGCHECK_P3: 1d

BUGCHECK_P4: ffffde821b5feb00

BUGCHECK_STR:  0x1a_61941

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-16-2020 15:23:23.0039

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8076c04288c to fffff8076bfc2380

STACK_TEXT:
ffffde82`1b5fe958 fffff807`6c04288c : 00000000`0000001a 00000000`00061941 00007fff`0e57b400 00000000`0000001d : nt!KeBugCheckEx
ffffde82`1b5fe960 fffff807`6bfd0420 : ffffa089`cbd130c0 ffffde82`1b5feb80 ffffde82`1b5feb80 000001f8`72df13f0 : nt!MmAccessFault+0x179a1c
ffffde82`1b5feb00 00007fff`0e57b400 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
0000009d`b3b1f418 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0e57b400


THREAD_SHA1_HASH_MOD_FUNC:  1feb98d5c6601cfab1575099bc1303f202ec7478

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c9a91cab4b8051e79b1ade67978b4ada6bb03b00

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function

BUCKET_ID:  0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function

PRIMARY_PROBLEM_CLASS:  0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function

TARGET_TIME:  2020-03-16T10:37:35.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  27d0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_61941_analysis_inconclusive!unknown_function

FAILURE_ID_HASH:  {5deef4f7-7ffd-da2a-fbcb-ad563ba13c90}

Followup:     MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80537b57040, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80536a8b340, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: fffff80537b57040

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80536a8b340

READ_ADDRESS: fffff80523f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80537b57040

CURRENT_IRQL:  2

FAULTING_IP:
wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+364
fffff805`36a8b340 4c390df9bc0c01  cmp     qword ptr [fffff805`37b57040],r9

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-16-2020 15:23:19.0040

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffff850171dd2730 -- (.trap 0xffff850171dd2730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000004
rdx=0000000000000020 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80536a8b340 rsp=ffff850171dd28c0 rbp=ffff850171dd2979
r8=0000000000000000  r9=fffff80536b57040 r10=0000000000000001
r11=ffff92784ba00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+0x364:
fffff805`36a8b340 4c390df9bc0c01  cmp     qword ptr [fffff805`37b57040],r9 ds:fffff805`37b57040=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80523bd41e9 to fffff80523bc2380

STACK_TEXT:
ffff8501`71dd25e8 fffff805`23bd41e9 : 00000000`0000000a fffff805`37b57040 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8501`71dd25f0 fffff805`23bd052b : ffffc60f`9a4091a0 00000000`00000000 ffffc60f`9ea75c10 ffffc60f`9e9dc010 : nt!KiBugCheckDispatch+0x69
ffff8501`71dd2730 fffff805`36a8b340 : ffffc60f`9a3f1b70 ffffc60f`99df2750 ffffc60f`a6df46d2 ffffc60f`a6df46d4 : nt!KiPageFault+0x46b
ffff8501`71dd28c0 fffff805`36a8bf10 : ffffc60f`9a3f1b70 00000000`00000003 ffffc60f`9a3f1b70 ffff8501`71dd2a80 : wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+0x364
ffff8501`71dd29e0 fffff805`36a87d82 : ffffc60f`a6ccc740 ffff8501`71dd2ba0 ffffc60f`9a40d000 fffff805`3660a3ff : wdiwifi!CRxMgr::RxInOrderDataInd+0x358
ffff8501`71dd2a80 fffff805`362bb4f9 : fffff805`36a87cf0 fffff805`36663000 00000000`00000005 00000000`00040286 : wdiwifi!AdapterRxInorderDataInd+0x92
ffff8501`71dd2ad0 fffff805`362ba49d : ffffc60f`9a40d000 00000000`0000001f ffffc60f`9c860005 fffff805`3660617c : rtwlanu!wdi_NotifyPeerData+0x3a5
ffff8501`71dd2b40 fffff805`3634763d : ffffc60f`00000000 ffffc60f`9c000000 ffffc60f`9c86cf20 ffffc60f`9c86def4 : rtwlanu!WDI_NotifyDataInQueue+0x9d
ffff8501`71dd2ba0 fffff805`36605b5e : ffffc60f`9a40e7e8 fffff805`36347570 ffffc60f`997f9b98 ffffc60f`997f9b60 : rtwlanu!RxNotifyThreadCallback+0xcd
ffff8501`71dd2be0 fffff805`23a6bce5 : ffffc60f`9ce13080 00000000`00000080 fffff805`36605ad0 ffffc60f`9c86ce70 : rtwlanu!Ndis6ThreadCallback+0x8e
ffff8501`71dd2c10 fffff805`23bc99ca : ffffa280`f9fd5180 ffffc60f`9ce13080 fffff805`23a6bc90 ae78ae70`ae68ae60 : nt!PspSystemThreadStartup+0x55
ffff8501`71dd2c60 00000000`00000000 : ffff8501`71dd3000 ffff8501`71dcd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


CHKIMG_EXTENSION: !chkimg -lo 50 -db !wdiwifi
11 errors : !wdiwifi (fffff80536a8b346-fffff80536a8bf86)
fffff80536a8b340  4c  39  0d  f9  bc  0c *01  74  3c  48  8b  0d  f8  bc  0c  00 L9.....t<H......
...
fffff80536a8b390  8b  15  92  3f  0d  00  e8  c5  59  01  ed  33  db  45 *8d  ff ...?....Y..3.E..
...
fffff80536a8b3b0  0f  8e  35  02  00  00  83  f8  02  0f  85  86  00  00 *02  48 ..5............H
...
fffff80536a8b700  43  4c  39  35  38  b9 *08  00  74  2b  48  8b  0d  37  b9  0c CL958...t+H..7..
fffff80536a8b710  00  41  b9  30  00  00 *08  89  44  24  28  45  8b  c7  48  8d .A.0....D$(E..H.
...
fffff80536a8b7d0  5c  b4  01  00  85  c0  74  0e  45  33  c0  48  8b  d3 *49  8b \.....t.E3.H..I.
...
fffff80536a8b940  ec  30  41  0f  b7  f8 *41  8b  f2  48  8b  d9  33  ed  4c  8d .0A...A..H..3.L.
...
fffff80536a8bb00  00  00  45  8b  c7  4c  89  64  24  20  b2  04  48  8b *4d  40 ..E..L.d$ ..H.M@
...
fffff80536a8bd00  3c  b3  0c  00  4c  8d *0d  95  3f  0c  00  74  1f  48  8b  0d <...L...?..t.H..
...
fffff80536a8bf60  73  07  66  44  39  71 *58  74  1a  48  8b  49  40  41  b9  4d [email protected]
...
fffff80536a8bf80  ad  ff  ff  48  8d  4b *c4  e8  98  00  00  00  84  c0  74  47 ...H.K........tG

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_STRIDE

TARGET_TIME:  2020-03-15T15:25:51.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  18ccd

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_stride

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80476787da8, memory referenced
Arg2: 000000000000000e, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8046a9c4510, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: fffff80476787da8

BUGCHECK_P2: e

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8046a9c4510

WRITE_ADDRESS: fffff80459d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80476787da8

CURRENT_IRQL:  e

FAULTING_IP:
nvlddmkm+124510
fffff804`6a9c4510 41899cc820030000 mov     dword ptr [r8+rcx*8+320h],ebx

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  ModernWarfare.exe

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-16-2020 15:23:15.0742

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff8045f6758a0 -- (.trap 0xfffff8045f6758a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000797307 rbx=0000000000000000 rcx=00000000016c5915
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046a9c4510 rsp=fffff8045f675a30 rbp=0000000000000000
r8=fffff8046b15b1e0  r9=0000000000000000 r10=fffff8046ac2fde4
r11=fffff8045f6758f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
nvlddmkm+0x124510:
fffff804`6a9c4510 41899cc820030000 mov     dword ptr [r8+rcx*8+320h],ebx ds:fffff804`76787da8=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff804599d41e9 to fffff804599c2380

STACK_TEXT:
fffff804`5f675758 fffff804`599d41e9 : 00000000`0000000a fffff804`76787da8 00000000`0000000e 00000000`00000001 : nt!KeBugCheckEx
fffff804`5f675760 fffff804`599d052b : ffffb30c`a080e000 fffff804`6a9d7bcb 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`5f6758a0 fffff804`6a9c4510 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff804`6a9a4506 : nt!KiPageFault+0x46b
fffff804`5f675a30 00000000`00000001 : 00000000`00000000 00000000`00000000 fffff804`6a9a4506 ffffb30c`9a4ab030 : nvlddmkm+0x124510
fffff804`5f675a38 00000000`00000000 : 00000000`00000000 fffff804`6a9a4506 ffffb30c`9a4ab030 fffff804`5f675b29 : 0x1


THREAD_SHA1_HASH_MOD_FUNC:  57bd2645b6b0775b5c75d343f2a6e2cc4fdca6ac

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ab646ef82e879da2d6ca1d4fda1b9745e2935f61

THREAD_SHA1_HASH_MOD:  99270aa9efddf51499339f5ea82e28c2a8c9f7b4

FOLLOWUP_IP:
nvlddmkm+124510
fffff804`6a9c4510 41899cc820030000 mov     dword ptr [r8+rcx*8+320h],ebx

FAULT_INSTR_CODE:  c89c8941

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nvlddmkm+124510

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5e5ff509

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  124510

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

BUCKET_ID:  AV_nvlddmkm!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_nvlddmkm!unknown_function

TARGET_TIME:  2020-03-14T22:32:19.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1aa45

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nvlddmkm!unknown_function

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
 
Bellek hızlarını XMP ile 3000 MHz hızında deneyin. Yani mavi ekran hatasının sebebi RAM’leri XMP ile 3200 MHz hızına aldığınız için. MSI anakartlarda bu sorun vardı. Beta BIOS güncellemesi ile çözdüler. Anlaşılan GIGABYTE çözememiş sorunu...
 
Cevaplarınız için sağ olun, elle MHz düşürmeyi deneyip bilgi vereceğim.

XMP açarak 3000 MHz'e ayarladım ve yaklaşık 1 saate yakın PUBG oynadım şu anda herhangi bir hata vermedi. Fakat neden 3200 MHz'de kullanamıyorum.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Yeni konular

Geri
Yukarı