Speed 3200MHz
Manufacturer G-Skill
Serial Number
Asset Tag Number [String Not Specified]
Part Number F4-3200C16-4GVKB
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff80632024141, The address that the exception occurred at
Arg3: ffffa38757dc5080, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5216
BIOS_DATE: 09/02/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B350M-A
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff80632024141
BUGCHECK_P3: ffffa38757dc5080
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>
FAULTING_IP:
nt!PpmCheckSnapAllDeliveredPerformance+231
fffff806`32024141 0f104620 movups xmm0,xmmword ptr [rsi+20h]
EXCEPTION_PARAMETER1: ffffa38757dc5080
BUGCHECK_STR: 0x1E_c000001d
CPU_COUNT: 8
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 11
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: csgo.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-28-2020 22:19:41.0362
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DPC_STACK_BASE: FFFFF8063806EFB0
EXCEPTION_RECORD: fffff80600000001 -- (.exr 0xfffff80600000001)
Cannot read Exception record @ fffff80600000001
TRAP_FRAME: ffffa3870000b0d6 -- (.trap 0xffffa3870000b0d6)
Unable to read trap frame at ffffa387`0000b0d6
LAST_CONTROL_TRANSFER: from fffff806322a663e to fffff806321c1510
FAILED_INSTRUCTION_ADDRESS:
nt!PpmCheckSnapAllDeliveredPerformance+231
fffff806`32024141 0f104620 movups xmm0,xmmword ptr [rsi+20h]
STACK_TEXT:
fffff806`3806d798 fffff806`322a663e : 00000000`0000001e ffffffff`c000001d fffff806`32024141 ffffa387`57dc5080 : nt!KeBugCheckEx
fffff806`3806d7a0 fffff806`321ca342 : fffff806`32511000 fffff806`32000000 0005e530`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
fffff806`3806d7e0 fffff806`320c2f15 : 00000000`00000000 00000000`00000000 fffff806`3806dd50 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
fffff806`3806d810 fffff806`320c74ae : fffff806`3806e748 fffff806`3806e490 fffff806`3806e748 fffff806`303ea180 : nt!RtlDispatchException+0x4a5
fffff806`3806df60 fffff806`321d351d : fffff806`00000001 00000000`000047f6 ffffa387`0000b0d6 fffff806`00000000 : nt!KiDispatchException+0x16e
fffff806`3806e610 fffff806`321cdaab : 00000000`00000000 ffffa387`573be680 ffffa387`562763d0 fffff806`303eff08 : nt!KiExceptionDispatch+0x11d
fffff806`3806e7f0 fffff806`32024141 : ffffa387`53fd9b98 ffffa387`53f6e6a0 ffffa387`53f6e718 ffffa387`53f6e6a0 : nt!KiInvalidOpcodeFault+0x32b
fffff806`3806e980 fffff806`32027be0 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!PpmCheckSnapAllDeliveredPerformance+0x231
fffff806`3806eb40 fffff806`3202676e : fffff806`324457e8 00000000`00000000 fffff806`3806ed40 fffff806`3243b540 : nt!PpmCheckStart+0x120
fffff806`3806ebf0 fffff806`3206ae95 : ffffa387`5c864080 ffffa387`5c864080 ffffa387`5c8641f0 fffff806`32048cd3 : nt!PpmCheckPeriodicStart+0x3e
fffff806`3806ec40 fffff806`3206a4ef : 00000000`00000000 00000000`00989680 00000000`000011fe 00000000`00000016 : nt!KiExecuteAllDpcs+0x305
fffff806`3806ed80 fffff806`321c8555 : 00000000`00000000 fffff806`303ea180 00000000`00000000 ffffa387`5d6c09c0 : nt!KiRetireDpcList+0x1ef
fffff806`3806efb0 fffff806`321c8340 : ffffe287`de1db9e0 00000000`00000004 00000000`00000040 ffffe287`de1db880 : nt!KxRetireDpcList+0x5
ffffe287`de1db770 fffff806`321c7a10 : 00000004`00000004 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffe287`de1db7a0 fffff806`32074f41 : fffff9fc`fe7f3000 00000000`2c5b4000 00000000`00000001 ffff8000`00000000 : nt!KiDpcInterrupt+0x2f0
ffffe287`de1db930 fffff806`32072dec : 00000000`00000111 00000000`00000001 00000000`c0000016 00000000`2c50f000 : nt!MiUnlockWorkingSetShared+0xb1
ffffe287`de1db960 fffff806`321cf620 : 00000000`00000023 ffffa387`57dc5080 00000000`00d4d000 ffffffff`fffe7960 : nt!MmAccessFault+0x24c
ffffe287`de1dbb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
THREAD_SHA1_HASH_MOD_FUNC: 9a187c5026a137a5b64d1d7660a66ad81d798293
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a1b898d621f19e0af5f7f1be4f14628eb2e1766c
THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb
FOLLOWUP_IP:
nt!PpmCheckSnapAllDeliveredPerformance+231
fffff806`32024141 0f104620 movups xmm0,xmmword ptr [rsi+20h]
FAULT_INSTR_CODE: 2046100f
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nt!PpmCheckSnapAllDeliveredPerformance+231
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790
IMAGE_VERSION: 10.0.18362.657
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 231
FAILURE_BUCKET_ID: 0x1E_c000001d_BAD_IP_nt!PpmCheckSnapAllDeliveredPerformance
BUCKET_ID: 0x1E_c000001d_BAD_IP_nt!PpmCheckSnapAllDeliveredPerformance
PRIMARY_PROBLEM_CLASS: 0x1E_c000001d_BAD_IP_nt!PpmCheckSnapAllDeliveredPerformance
TARGET_TIME: 2020-02-28T18:30:50.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 54dd
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c000001d_bad_ip_nt!ppmchecksnapalldeliveredperformance
FAILURE_ID_HASH: {1fd4315e-5298-223c-cabd-f1477e202779}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5220
BIOS_DATE: 09/12/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B350M-A
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: 0
BUGCHECK_P3: 8
BUGCHECK_P4: 0
CPU_COUNT: 8
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 11
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: RobloxPlayerBeta.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-28-2020 22:19:44.0430
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: ffffedf6fb7db000 -- (.exr 0xffffedf6fb7db000)
ExceptionAddress: 0000000000000000
ExceptionCode: 90f82867
ExceptionFlags: 0a000001
NumberParameters: 0
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
LAST_CONTROL_TRANSFER: from fffff8067a62fea7 to fffff8067a5c1510
STACK_TEXT:
ffffcf0b`097a9798 fffff806`7a62fea7 : 00000000`0000001e ffffffff`c0000005 00000000`00000000 00000000`00000008 : nt!KeBugCheckEx
ffffcf0b`097a97a0 fffff806`7a5d351d : ffffedf6`fb7db000 ffffcf0b`097aa030 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x168b67
ffffcf0b`097a9e50 fffff806`7a5cf705 : ffffbf01`07484400 fffff806`7a4d9525 00000000`00000000 ffffbf01`08446a80 : nt!KiExceptionDispatch+0x11d
ffffcf0b`097aa030 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`1c010900 ffffcf0b`097aa470 : nt!KiPageFault+0x445
THREAD_SHA1_HASH_MOD_FUNC: 2e9ab7e93b3f60731b8608f9c5cc37cdb42d594f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3135bdb7147924eaa427da45cd7aa1118cae1f02
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!KiDispatchException+168b67
fffff806`7a62fea7 cc int 3
FAULT_INSTR_CODE: 86f741cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiDispatchException+168b67
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790
IMAGE_VERSION: 10.0.18362.657
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 168b67
FAILURE_BUCKET_ID: 0x1E_nt!KiDispatchException
BUCKET_ID: 0x1E_nt!KiDispatchException
PRIMARY_PROBLEM_CLASS: 0x1E_nt!KiDispatchException
TARGET_TIME: 2020-02-28T13:56:33.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 7e95
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_nt!kidispatchexception
FAILURE_ID_HASH: {4c003660-11e1-3fb7-2474-3522eb7ee67b}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8053687d187, Address of the instruction which caused the bugcheck
Arg3: fffff281271e78c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5220
BIOS_DATE: 09/12/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B350M-A
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8053687d187
BUGCHECK_P3: fffff281271e78c0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!CcPinFileData+5c7
fffff805`3687d187 483900 cmp qword ptr [rax],rax
CONTEXT: fffff281271e78c0 -- (.cxr 0xfffff281271e78c0)
rax=0000000000000000 rbx=ffffc0047554a5c8 rcx=ffffc0047b68e080
rdx=ffffc0047554a5c8 rsi=ffffc0047b68e3a0 rdi=ffffc0047b68e080
rip=fffff8053687d187 rsp=fffff281271e82b0 rbp=ffff96869dbad170
r8=fffff281271e832c r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000001 r13=ffffc0047554a4b0
r14=fffff281271e8418 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!CcPinFileData+0x5c7:
fffff805`3687d187 483900 cmp qword ptr [rax],rax ds:002b:00000000`00000000=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 8
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 11
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: MRT.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-28-2020 22:19:48.0916
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80536e1edd8 to fffff8053687d187
STACK_TEXT:
fffff281`271e82b0 fffff805`36e1edd8 : ffffe108`11101d01 fffff281`271e8418 fffff805`00001000 ffffe108`11101e00 : nt!CcPinFileData+0x5c7
fffff281`271e83b0 fffff805`393e79be : ffffc004`77809758 fffff281`271e84f0 ffff9686`00001000 ffffe108`00000001 : nt!CcPinMappedData+0xe8
fffff281`271e8470 fffff805`393e6f09 : 7f8dce50`c3fe6398 ffff4628`238f4c4b ffff9686`9dbad458 fffff281`271e90e8 : Ntfs!NtfsUpdateFileNameInIndex+0x1be
fffff281`271e86f0 fffff805`393e693f : 00000000`00000000 00000000`00000000 00000000`00000018 00000000`00000000 : Ntfs!NtfsUpdateFileNameInParent+0x179
fffff281`271e88d0 fffff805`393e8bc7 : ffffc004`77809758 fffff281`271e9080 fffff281`271e8b10 fffff281`271e8b18 : Ntfs!NtfsUpdateDuplicateInfo+0x18f
fffff281`271e8a70 fffff805`393f1d7a : fffff281`271e9080 fffff281`00000000 ffff9686`9dbad458 ffff9686`73b10170 : Ntfs!NtfsUpdateAllInformation+0x127
fffff281`271e8b00 fffff805`39415129 : ffff9686`73b10170 fffff281`271e9080 fffff281`271e9320 00000000`00000000 : Ntfs!NtfsOpenFile+0xa9a
fffff281`271e8dc0 fffff805`39417ffe : ffffc004`77809758 fffff281`271e9080 ffffc004`77809758 ffffc004`7ba43b10 : Ntfs!NtfsCommonCreate+0x979
fffff281`271e8fb0 fffff805`36831f79 : ffffc004`75455030 ffffc004`7ba43b10 ffffc004`71daa700 ffffc004`75446010 : Ntfs!NtfsFsdCreate+0x1fe
fffff281`271e91e0 fffff805`388e55de : ffffc004`7ba43b10 ffffc004`7ba43e00 ffffc004`7ba43b10 ffffc004`80b48c80 : nt!IofCallDriver+0x59
fffff281`271e9220 fffff805`3891cd27 : fffff281`271e92e0 fffff805`00000000 00000020`00000001 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
fffff281`271e92a0 fffff805`36831f79 : ffffc004`80b48c00 fffff805`36de5b45 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x307
fffff281`271e9350 fffff805`36831024 : 00000000`00000000 00000000`00000000 ffffc004`7ba43ef8 fffff805`3689d8ae : nt!IofCallDriver+0x59
fffff281`271e9390 fffff805`36de61eb : fffff281`271e9650 fffff805`36de5b45 fffff281`271e95c0 fffff281`271e98a0 : nt!IoCallDriverWithTracing+0x34
fffff281`271e93e0 fffff805`36ded1bf : ffffc004`751d58f0 ffffc004`751d5845 ffffc004`7b450890 00000000`00000001 : nt!IopParseDevice+0x62b
fffff281`271e9550 fffff805`36deb621 : ffffc004`7b450800 fffff281`271e9798 00000000`00000040 ffffc004`6fef5400 : nt!ObpLookupObjectName+0x78f
fffff281`271e9710 fffff805`36e30234 : 00000000`00000001 00000080`69b7c4a0 00000000`00000028 00000080`69b7c470 : nt!ObOpenObjectByNameEx+0x201
fffff281`271e9850 fffff805`369d2d18 : ffffc004`7b68e080 00000000`00000000 ffffc004`7b68e080 00000000`00000000 : nt!NtQueryFullAttributesFile+0x1b4
fffff281`271e9b00 00007fff`f80be8b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000080`69b7c418 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`f80be8b4
THREAD_SHA1_HASH_MOD_FUNC: 7486de147d2018a8a9ba239d3997516772e24e48
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c8e597139880981eca31c845db3c4d40b4e914f9
THREAD_SHA1_HASH_MOD: 7cbb3b38e7379f0da19dd786e6604c597434708b
FOLLOWUP_IP:
nt!CcPinFileData+5c7
fffff805`3687d187 483900 cmp qword ptr [rax],rax
FAULT_INSTR_CODE: f003948
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!CcPinFileData+5c7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .cxr 0xfffff281271e78c0 ; kb
BUCKET_ID_FUNC_OFFSET: 5c7
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!CcPinFileData
BUCKET_ID: 0x3B_c0000005_nt!CcPinFileData
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!CcPinFileData
TARGET_TIME: 2020-02-27T15:50:28.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4779
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!ccpinfiledata
FAILURE_ID_HASH: {6a1ae539-de69-c88c-7f48-14deeddfb389}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff8064a069d40, Address of the instruction which caused the bugcheck
Arg3: ffff8007ff5ae600, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5220
BIOS_DATE: 09/12/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B350M-A
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: c000001d
BUGCHECK_P2: fffff8064a069d40
BUGCHECK_P3: ffff8007ff5ae600
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>
FAULTING_IP:
nt!KeAreAllApcsDisabled+20
fffff806`4a069d40 440f20c0 mov rax,cr8
CONTEXT: ffff8007ff5ae600 -- (.cxr 0xffff8007ff5ae600)
rax=0000000000000201 rbx=0000000000000001 rcx=0000000000040246
rdx=0000000000000401 rsi=ffffb00519ca28a0 rdi=ffffb0051fc85e00
rip=fffff8064a069d40 rsp=ffff8007ff5aeff0 rbp=0000000000000000
r8=ffff8007ff5af0c0 r9=ffffb0051e558a28 r10=fffff8064a069d20
r11=ffff8007ff5af010 r12=0000000000000401 r13=ffff8007ff5af0c0
r14=ffffb0051e5588d8 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!KeAreAllApcsDisabled+0x20:
fffff806`4a069d40 440f20c0 mov rax,cr8
Resetting default scope
BUGCHECK_STR: 0x3B_c000001d
CPU_COUNT: 8
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 11
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: msiexec.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-28-2020 22:19:52.0342
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8064ece8253 to fffff8064a069d40
STACK_TEXT:
ffff8007`ff5aeff0 fffff806`4ece8253 : ffffc00e`b5fd1778 ffff8007`ff5af1a8 ffffc00e`b5fd1760 fffff806`4ece6fec : nt!KeAreAllApcsDisabled+0x20
ffff8007`ff5af020 fffff806`4f64d384 : ffffb005`19ca28a0 ffffb005`19ca28a0 ffffb005`1fc85e00 ffffb005`19cb1920 : FLTMGR!FltGetFileNameInformation+0xc3
ffff8007`ff5af0a0 fffff806`4f64dec2 : ffff801d`6a92d227 ffffb005`19ca28a0 ffff8007`ff5af230 ffff8007`ff5af148 : fileinfo!FIStreamQueryInfo+0x94
ffff8007`ff5af130 fffff806`4ece3c02 : ffffb005`1e5588d8 ffffc00e`00000001 00000000`00000000 00000000`00000000 : fileinfo!FIPostCreateCallback+0x222
ffff8007`ff5af1e0 fffff806`4ece3408 : 00000000`00000000 00000000`00000000 ffffb005`1fc85e00 00000000`00000000 : FLTMGR!FltpPerformPostCallbacks+0x3e2
ffff8007`ff5af2b0 fffff806`4ece5680 : 00000000`00000000 fffff806`4ecfc470 00000000`00000008 ffffb005`1e5587f0 : FLTMGR!FltpPassThroughCompletionWorker+0x128
ffff8007`ff5af330 fffff806`4ed1cd27 : ffff8007`ff5af3f0 00000000`00000110 00000000`00000000 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x200
ffff8007`ff5af3b0 fffff806`4a031f79 : 00000000`00000000 fffff806`4a5e5b05 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x307
ffff8007`ff5af460 fffff806`4a031024 : 00000000`00000003 00000000`00000000 00000000`00000000 fffff806`4a0317e3 : nt!IofCallDriver+0x59
ffff8007`ff5af4a0 fffff806`4a5e61eb : ffff8007`ff5af760 fffff806`4a5e5b05 ffff8007`ff5af6d0 ffffb005`1ec3f9a0 : nt!IoCallDriverWithTracing+0x34
ffff8007`ff5af4f0 fffff806`4a5ed1bf : ffffb005`19be68f0 ffffb005`19be6805 ffffb005`1f02b6b0 00000000`00000001 : nt!IopParseDevice+0x62b
ffff8007`ff5af660 fffff806`4a5eb621 : ffffb005`1f02b600 ffff8007`ff5af8a8 00000009`00000040 ffffb005`168f44e0 : nt!ObpLookupObjectName+0x78f
ffff8007`ff5af820 fffff806`4a630df0 : 00000000`00000001 00000009`1fd7eaa8 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByNameEx+0x201
ffff8007`ff5af960 fffff806`4a6305b9 : 00000009`1fd7ea50 00000000`40100080 00000009`1fd7eaa8 00000009`1fd7ea68 : nt!IopCreateFile+0x820
ffff8007`ff5afa00 fffff806`4a1d2d18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateFile+0x79
ffff8007`ff5afa90 00007ffb`60cbcb64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000009`1fd7e9d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`60cbcb64
THREAD_SHA1_HASH_MOD_FUNC: 483c8c37408f53846829b037017ba3dc513c1beb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8989f1368bb9d7329aee3f2203c5a68713ecbdf0
THREAD_SHA1_HASH_MOD: e2d8a4e946cdcd5e15f697d508667e75ada359ba
FOLLOWUP_IP:
fileinfo!FIStreamQueryInfo+94
fffff806`4f64d384 8bd8 mov ebx,eax
FAULT_INSTR_CODE: c085d88b
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: fileinfo!FIStreamQueryInfo+94
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fileinfo
IMAGE_NAME: fileinfo.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 24bbed20
IMAGE_VERSION: 10.0.18362.1216
STACK_COMMAND: .cxr 0xffff8007ff5ae600 ; kb
BUCKET_ID_FUNC_OFFSET: 94
FAILURE_BUCKET_ID: 0x3B_c000001d_fileinfo!FIStreamQueryInfo
BUCKET_ID: 0x3B_c000001d_fileinfo!FIStreamQueryInfo
PRIMARY_PROBLEM_CLASS: 0x3B_c000001d_fileinfo!FIStreamQueryInfo
TARGET_TIME: 2020-02-27T15:30:08.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 9b93
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c000001d_fileinfo!fistreamqueryinfo
FAILURE_ID_HASH: {76b14008-2bcf-a46d-9cac-9f8d318d80a6}
Followup: MachineOwner
---------
BIOS güncellemesi yap.
BIOS güncellemesi sonrası hatalar XMP açık şekilde devam ederse;
Bak sana açık açık konuşayım, bellek nedenli hatalar gözüküyor ama belleklerin arızalı demiyorum, bu hatalar XMP nedenli, zaten daha önceki konunda 2133MHz'de hata alırsan dosyasını paylaş demiştim, ha illa ben XMP açacağım parasını verdim belleklerin ama mavi ekranda almayayım diyorsan kusura bakmayın benim buna herhangi çözümüm bulunmuyor.
Mavi Ekran hatası
Sistem özellikleri: Ryzen5 2400G ASUS B350M-A Vega11 G.Skill Ripwas 3200MHz 2 X 4 GB FSP500-60AHBC James Donkey 120 GB Seagate Barracuda 1 TB Oyunlarda hata vermeden atma ve mavi ekran sorunları yaşıyorum. Bazen masaüstünde bile kilitlenip mavi ekran verdiği oluyor. Bir sürü Windows sürü mü...www.technopat.net
hangi donanım yüzünden bu XMP nedenli hataları aldığını da bilmiyorum.
Kod:Speed 3200MHz. Manufacturer G-Skill. Serial Number Asset Tag Number [String Not Specified] Part Number F4-3200C16-4GVKB.Kod:KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints. the driver/function that caused the problem. Always note this address. as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc000001d, The exception code that was not handled. Arg2: fffff80632024141, The address that the exception occurred at. Arg3: ffffa38757dc5080, Parameter 0 of the exception. Arg4: 0000000000000000, Parameter 1 of the exception. Debugging Details: ------------------ KEY_VALUES_STRING: 1. PROCESSES_ANALYSIS: 1. SERVICE_ANALYSIS: 1. STACKHASH_ANALYSIS: 1. TIMELINE_ANALYSIS: 1. DUMP_CLASS: 1. DUMP_QUALIFIER: 400. BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202. SYSTEM_MANUFACTURER: System manufacturer. SYSTEM_PRODUCT_NAME: System Product Name. SYSTEM_SKU: SKU. SYSTEM_VERSION: System Version. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 5216. BIOS_DATE: 09/02/2019. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: PRIME B350M-A. BASEBOARD_VERSION: Rev X.0x. DUMP_TYPE: 2. BUGCHECK_P1: ffffffffc000001d. BUGCHECK_P2: fffff80632024141. BUGCHECK_P3: ffffa38757dc5080. BUGCHECK_P4: 0. EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text> FAULTING_IP: nt!PpmCheckSnapAllDeliveredPerformance+231. fffff806`32024141 0f104620 movups xmm0,xmmword ptr [rsi+20h] EXCEPTION_PARAMETER1: ffffa38757dc5080. BUGCHECK_STR: 0x1E_c000001d. CPU_COUNT: 8. CPU_MHZ: e09. CPU_VENDOR: AuthenticAMD. CPU_FAMILY: 17. CPU_MODEL: 11. CPU_STEPPING: 0. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT. PROCESS_NAME: csgo.exe. CURRENT_IRQL: 2. ANALYSIS_SESSION_HOST: DESKTOP-18V31A3. ANALYSIS_SESSION_TIME: 02-28-2020 22:19:41.0362. ANALYSIS_VERSION: 10.0.18362.1 x86fre. DPC_STACK_BASE: FFFFF8063806EFB0. EXCEPTION_RECORD: fffff80600000001 -- (.exr 0xfffff80600000001) Cannot read Exception record @ fffff80600000001. TRAP_FRAME: ffffa3870000b0d6 -- (.trap 0xffffa3870000b0d6) Unable to read trap frame at ffffa387`0000b0d6. LAST_CONTROL_TRANSFER: from fffff806322a663e to fffff806321c1510. FAILED_INSTRUCTION_ADDRESS: nt!PpmCheckSnapAllDeliveredPerformance+231. fffff806`32024141 0f104620 movups xmm0,xmmword ptr [rsi+20h] STACK_TEXT: fffff806`3806d798 fffff806`322a663e : 00000000`0000001e ffffffff`c000001d fffff806`32024141 ffffa387`57dc5080 : nt!KeBugCheckEx. fffff806`3806d7a0 fffff806`321ca342 : fffff806`32511000 fffff806`32000000 0005e530`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22. fffff806`3806d7e0 fffff806`320c2f15 : 00000000`00000000 00000000`00000000 fffff806`3806dd50 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12. fffff806`3806d810 fffff806`320c74ae : fffff806`3806e748 fffff806`3806e490 fffff806`3806e748 fffff806`303ea180 : nt!RtlDispatchException+0x4a5. fffff806`3806df60 fffff806`321d351d : fffff806`00000001 00000000`000047f6 ffffa387`0000b0d6 fffff806`00000000 : nt!KiDispatchException+0x16e. fffff806`3806e610 fffff806`321cdaab : 00000000`00000000 ffffa387`573be680 ffffa387`562763d0 fffff806`303eff08 : nt!KiExceptionDispatch+0x11d. fffff806`3806e7f0 fffff806`32024141 : ffffa387`53fd9b98 ffffa387`53f6e6a0 ffffa387`53f6e718 ffffa387`53f6e6a0 : nt!KiInvalidOpcodeFault+0x32b. fffff806`3806e980 fffff806`32027be0 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!PpmCheckSnapAllDeliveredPerformance+0x231. fffff806`3806eb40 fffff806`3202676e : fffff806`324457e8 00000000`00000000 fffff806`3806ed40 fffff806`3243b540 : nt!PpmCheckStart+0x120. fffff806`3806ebf0 fffff806`3206ae95 : ffffa387`5c864080 ffffa387`5c864080 ffffa387`5c8641f0 fffff806`32048cd3 : nt!PpmCheckPeriodicStart+0x3e. fffff806`3806ec40 fffff806`3206a4ef : 00000000`00000000 00000000`00989680 00000000`000011fe 00000000`00000016 : nt!KiExecuteAllDpcs+0x305. fffff806`3806ed80 fffff806`321c8555 : 00000000`00000000 fffff806`303ea180 00000000`00000000 ffffa387`5d6c09c0 : nt!KiRetireDpcList+0x1ef. fffff806`3806efb0 fffff806`321c8340 : ffffe287`de1db9e0 00000000`00000004 00000000`00000040 ffffe287`de1db880 : nt!KxRetireDpcList+0x5. ffffe287`de1db770 fffff806`321c7a10 : 00000004`00000004 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue. ffffe287`de1db7a0 fffff806`32074f41 : fffff9fc`fe7f3000 00000000`2c5b4000 00000000`00000001 ffff8000`00000000 : nt!KiDpcInterrupt+0x2f0. ffffe287`de1db930 fffff806`32072dec : 00000000`00000111 00000000`00000001 00000000`c0000016 00000000`2c50f000 : nt!MiUnlockWorkingSetShared+0xb1. ffffe287`de1db960 fffff806`321cf620 : 00000000`00000023 ffffa387`57dc5080 00000000`00d4d000 ffffffff`fffe7960 : nt!MmAccessFault+0x24c. ffffe287`de1dbb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360. THREAD_SHA1_HASH_MOD_FUNC: 9a187c5026a137a5b64d1d7660a66ad81d798293. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a1b898d621f19e0af5f7f1be4f14628eb2e1766c. THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb. FOLLOWUP_IP: nt!PpmCheckSnapAllDeliveredPerformance+231. fffff806`32024141 0f104620 movups xmm0,xmmword ptr [rsi+20h] FAULT_INSTR_CODE: 2046100f. SYMBOL_STACK_INDEX: 7. SYMBOL_NAME: nt!PpmCheckSnapAllDeliveredPerformance+231. FOLLOWUP_NAME: MachineOwner. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790. IMAGE_VERSION: 10.0.18362.657. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 231. FAILURE_BUCKET_ID: 0x1E_c000001d_BAD_IP_nt!PpmCheckSnapAllDeliveredPerformance. BUCKET_ID: 0x1E_c000001d_BAD_IP_nt!PpmCheckSnapAllDeliveredPerformance. PRIMARY_PROBLEM_CLASS: 0x1E_c000001d_BAD_IP_nt!PpmCheckSnapAllDeliveredPerformance. TARGET_TIME: 2020-02-28T18:30:50.000Z. OSBUILD: 18362. OSSERVICEPACK: 657. SERVICEPACK_NUMBER: 0. OS_REVISION: 0. SUITE_MASK: 272. PRODUCT_TYPE: 1. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS. OS_LOCALE: USER_LCID: 0. OSBUILD_TIMESTAMP: 2005-04-23 04:40:32. BUILDDATESTAMP_STR: 190318-1202. BUILDLAB_STR: 19h1_release. BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202. ANALYSIS_SESSION_ELAPSED_TIME: 54dd. ANALYSIS_SOURCE: KM. FAILURE_ID_HASH_STRING: km:0x1e_c000001d_bad_ip_nt!ppmchecksnapalldeliveredperformance. FAILURE_ID_HASH: {1fd4315e-5298-223c-cabd-f1477e202779} Followup: MachineOwner. --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints. the driver/function that caused the problem. Always note this address. as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled. Arg2: 0000000000000000, The address that the exception occurred at. Arg3: 0000000000000008, Parameter 0 of the exception. Arg4: 0000000000000000, Parameter 1 of the exception. Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: ExceptionRecord *** *** *** ************************************************************************* ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: ContextRecord *** *** *** ************************************************************************* KEY_VALUES_STRING: 1. PROCESSES_ANALYSIS: 1. SERVICE_ANALYSIS: 1. STACKHASH_ANALYSIS: 1. TIMELINE_ANALYSIS: 1. DUMP_CLASS: 1. DUMP_QUALIFIER: 400. BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202. SYSTEM_MANUFACTURER: System manufacturer. SYSTEM_PRODUCT_NAME: System Product Name. SYSTEM_SKU: SKU. SYSTEM_VERSION: System Version. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 5220. BIOS_DATE: 09/12/2019. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: PRIME B350M-A. BASEBOARD_VERSION: Rev X.0x. DUMP_TYPE: 2. BUGCHECK_P1: ffffffffc0000005. BUGCHECK_P2: 0. BUGCHECK_P3: 8. BUGCHECK_P4: 0. CPU_COUNT: 8. CPU_MHZ: e09. CPU_VENDOR: AuthenticAMD. CPU_FAMILY: 17. CPU_MODEL: 11. CPU_STEPPING: 0. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT. BUGCHECK_STR: 0x1E. PROCESS_NAME: RobloxPlayerBeta.exe. CURRENT_IRQL: 0. ANALYSIS_SESSION_HOST: DESKTOP-18V31A3. ANALYSIS_SESSION_TIME: 02-28-2020 22:19:44.0430. ANALYSIS_VERSION: 10.0.18362.1 x86fre. EXCEPTION_RECORD: ffffedf6fb7db000 -- (.exr 0xffffedf6fb7db000) ExceptionAddress: 0000000000000000. ExceptionCode: 90f82867. ExceptionFlags: 0a000001. NumberParameters: 0. TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000) Unable to read trap frame at ffff8000`00000000. LAST_CONTROL_TRANSFER: from fffff8067a62fea7 to fffff8067a5c1510. STACK_TEXT: ffffcf0b`097a9798 fffff806`7a62fea7 : 00000000`0000001e ffffffff`c0000005 00000000`00000000 00000000`00000008 : nt!KeBugCheckEx. ffffcf0b`097a97a0 fffff806`7a5d351d : ffffedf6`fb7db000 ffffcf0b`097aa030 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x168b67. ffffcf0b`097a9e50 fffff806`7a5cf705 : ffffbf01`07484400 fffff806`7a4d9525 00000000`00000000 ffffbf01`08446a80 : nt!KiExceptionDispatch+0x11d. ffffcf0b`097aa030 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`1c010900 ffffcf0b`097aa470 : nt!KiPageFault+0x445. THREAD_SHA1_HASH_MOD_FUNC: 2e9ab7e93b3f60731b8608f9c5cc37cdb42d594f. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3135bdb7147924eaa427da45cd7aa1118cae1f02. THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791. FOLLOWUP_IP: nt!KiDispatchException+168b67. fffff806`7a62fea7 cc int 3. FAULT_INSTR_CODE: 86f741cc. SYMBOL_STACK_INDEX: 1. SYMBOL_NAME: nt!KiDispatchException+168b67. FOLLOWUP_NAME: MachineOwner. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790. IMAGE_VERSION: 10.0.18362.657. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 168b67. FAILURE_BUCKET_ID: 0x1E_nt!KiDispatchException. BUCKET_ID: 0x1E_nt!KiDispatchException. PRIMARY_PROBLEM_CLASS: 0x1E_nt!KiDispatchException. TARGET_TIME: 2020-02-28T13:56:33.000Z. OSBUILD: 18362. OSSERVICEPACK: 657. SERVICEPACK_NUMBER: 0. OS_REVISION: 0. SUITE_MASK: 272. PRODUCT_TYPE: 1. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS. OS_LOCALE: USER_LCID: 0. OSBUILD_TIMESTAMP: 2005-04-23 04:40:32. BUILDDATESTAMP_STR: 190318-1202. BUILDLAB_STR: 19h1_release. BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202. ANALYSIS_SESSION_ELAPSED_TIME: 7e95. ANALYSIS_SOURCE: KM. FAILURE_ID_HASH_STRING: km:0x1e_nt!kidispatchexception. FAILURE_ID_HASH: {4c003660-11e1-3fb7-2474-3522eb7ee67b} Followup: MachineOwner. --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff8053687d187, Address of the instruction which caused the bugcheck. Arg3: fffff281271e78c0, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. PROCESSES_ANALYSIS: 1. SERVICE_ANALYSIS: 1. STACKHASH_ANALYSIS: 1. TIMELINE_ANALYSIS: 1. DUMP_CLASS: 1. DUMP_QUALIFIER: 400. BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202. SYSTEM_MANUFACTURER: System manufacturer. SYSTEM_PRODUCT_NAME: System Product Name. SYSTEM_SKU: SKU. SYSTEM_VERSION: System Version. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 5220. BIOS_DATE: 09/12/2019. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: PRIME B350M-A. BASEBOARD_VERSION: Rev X.0x. DUMP_TYPE: 2. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff8053687d187. BUGCHECK_P3: fffff281271e78c0. BUGCHECK_P4: 0. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!CcPinFileData+5c7. fffff805`3687d187 483900 cmp qword ptr [rax],rax. CONTEXT: fffff281271e78c0 -- (.cxr 0xfffff281271e78c0) rax=0000000000000000 rbx=ffffc0047554a5c8 rcx=ffffc0047b68e080. rdx=ffffc0047554a5c8 rsi=ffffc0047b68e3a0 rdi=ffffc0047b68e080. rip=fffff8053687d187 rsp=fffff281271e82b0 rbp=ffff96869dbad170. r8=fffff281271e832c r9=0000000000000000 r10=0000000000000000. r11=0000000000000000 r12=0000000000000001 r13=ffffc0047554a4b0. r14=fffff281271e8418 r15=0000000000000001. iopl=0 nv up ei pl zr na po nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246. nt!CcPinFileData+0x5c7: fffff805`3687d187 483900 cmp qword ptr [rax],rax ds:002b:00000000`00000000=???????????????? Resetting default scope. BUGCHECK_STR: 0x3B_c0000005. CPU_COUNT: 8. CPU_MHZ: e09. CPU_VENDOR: AuthenticAMD. CPU_FAMILY: 17. CPU_MODEL: 11. CPU_STEPPING: 0. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT. PROCESS_NAME: MRT.exe. CURRENT_IRQL: 0. ANALYSIS_SESSION_HOST: DESKTOP-18V31A3. ANALYSIS_SESSION_TIME: 02-28-2020 22:19:48.0916. ANALYSIS_VERSION: 10.0.18362.1 x86fre. LAST_CONTROL_TRANSFER: from fffff80536e1edd8 to fffff8053687d187. STACK_TEXT: fffff281`271e82b0 fffff805`36e1edd8 : ffffe108`11101d01 fffff281`271e8418 fffff805`00001000 ffffe108`11101e00 : nt!CcPinFileData+0x5c7. fffff281`271e83b0 fffff805`393e79be : ffffc004`77809758 fffff281`271e84f0 ffff9686`00001000 ffffe108`00000001 : nt!CcPinMappedData+0xe8. fffff281`271e8470 fffff805`393e6f09 : 7f8dce50`c3fe6398 ffff4628`238f4c4b ffff9686`9dbad458 fffff281`271e90e8 : Ntfs!NtfsUpdateFileNameInIndex+0x1be. fffff281`271e86f0 fffff805`393e693f : 00000000`00000000 00000000`00000000 00000000`00000018 00000000`00000000 : Ntfs!NtfsUpdateFileNameInParent+0x179. fffff281`271e88d0 fffff805`393e8bc7 : ffffc004`77809758 fffff281`271e9080 fffff281`271e8b10 fffff281`271e8b18 : Ntfs!NtfsUpdateDuplicateInfo+0x18f. fffff281`271e8a70 fffff805`393f1d7a : fffff281`271e9080 fffff281`00000000 ffff9686`9dbad458 ffff9686`73b10170 : Ntfs!NtfsUpdateAllInformation+0x127. fffff281`271e8b00 fffff805`39415129 : ffff9686`73b10170 fffff281`271e9080 fffff281`271e9320 00000000`00000000 : Ntfs!NtfsOpenFile+0xa9a. fffff281`271e8dc0 fffff805`39417ffe : ffffc004`77809758 fffff281`271e9080 ffffc004`77809758 ffffc004`7ba43b10 : Ntfs!NtfsCommonCreate+0x979. fffff281`271e8fb0 fffff805`36831f79 : ffffc004`75455030 ffffc004`7ba43b10 ffffc004`71daa700 ffffc004`75446010 : Ntfs!NtfsFsdCreate+0x1fe. fffff281`271e91e0 fffff805`388e55de : ffffc004`7ba43b10 ffffc004`7ba43e00 ffffc004`7ba43b10 ffffc004`80b48c80 : nt!IofCallDriver+0x59. fffff281`271e9220 fffff805`3891cd27 : fffff281`271e92e0 fffff805`00000000 00000020`00000001 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e. fffff281`271e92a0 fffff805`36831f79 : ffffc004`80b48c00 fffff805`36de5b45 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x307. fffff281`271e9350 fffff805`36831024 : 00000000`00000000 00000000`00000000 ffffc004`7ba43ef8 fffff805`3689d8ae : nt!IofCallDriver+0x59. fffff281`271e9390 fffff805`36de61eb : fffff281`271e9650 fffff805`36de5b45 fffff281`271e95c0 fffff281`271e98a0 : nt!IoCallDriverWithTracing+0x34. fffff281`271e93e0 fffff805`36ded1bf : ffffc004`751d58f0 ffffc004`751d5845 ffffc004`7b450890 00000000`00000001 : nt!IopParseDevice+0x62b. fffff281`271e9550 fffff805`36deb621 : ffffc004`7b450800 fffff281`271e9798 00000000`00000040 ffffc004`6fef5400 : nt!ObpLookupObjectName+0x78f. fffff281`271e9710 fffff805`36e30234 : 00000000`00000001 00000080`69b7c4a0 00000000`00000028 00000080`69b7c470 : nt!ObOpenObjectByNameEx+0x201. fffff281`271e9850 fffff805`369d2d18 : ffffc004`7b68e080 00000000`00000000 ffffc004`7b68e080 00000000`00000000 : nt!NtQueryFullAttributesFile+0x1b4. fffff281`271e9b00 00007fff`f80be8b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 00000080`69b7c418 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`f80be8b4. THREAD_SHA1_HASH_MOD_FUNC: 7486de147d2018a8a9ba239d3997516772e24e48. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c8e597139880981eca31c845db3c4d40b4e914f9. THREAD_SHA1_HASH_MOD: 7cbb3b38e7379f0da19dd786e6604c597434708b. FOLLOWUP_IP: nt!CcPinFileData+5c7. fffff805`3687d187 483900 cmp qword ptr [rax],rax. FAULT_INSTR_CODE: f003948. SYMBOL_STACK_INDEX: 0. SYMBOL_NAME: nt!CcPinFileData+5c7. FOLLOWUP_NAME: MachineOwner. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0. IMAGE_VERSION: 10.0.18362.592. STACK_COMMAND: .cxr 0xfffff281271e78c0 ; kb. BUCKET_ID_FUNC_OFFSET: 5c7. FAILURE_BUCKET_ID: 0x3B_c0000005_nt!CcPinFileData. BUCKET_ID: 0x3B_c0000005_nt!CcPinFileData. PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!CcPinFileData. TARGET_TIME: 2020-02-27T15:50:28.000Z. OSBUILD: 18362. OSSERVICEPACK: 592. SERVICEPACK_NUMBER: 0. OS_REVISION: 0. SUITE_MASK: 272. PRODUCT_TYPE: 1. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS. OS_LOCALE: USER_LCID: 0. OSBUILD_TIMESTAMP: 1972-08-22 03:24:00. BUILDDATESTAMP_STR: 190318-1202. BUILDLAB_STR: 19h1_release. BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202. ANALYSIS_SESSION_ELAPSED_TIME: 4779. ANALYSIS_SOURCE: KM. FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!ccpinfiledata. FAILURE_ID_HASH: {6a1ae539-de69-c88c-7f48-14deeddfb389} Followup: MachineOwner. --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c000001d, Exception code that caused the bugcheck. Arg2: fffff8064a069d40, Address of the instruction which caused the bugcheck. Arg3: ffff8007ff5ae600, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. PROCESSES_ANALYSIS: 1. SERVICE_ANALYSIS: 1. STACKHASH_ANALYSIS: 1. TIMELINE_ANALYSIS: 1. DUMP_CLASS: 1. DUMP_QUALIFIER: 400. BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202. SYSTEM_MANUFACTURER: System manufacturer. SYSTEM_PRODUCT_NAME: System Product Name. SYSTEM_SKU: SKU. SYSTEM_VERSION: System Version. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 5220. BIOS_DATE: 09/12/2019. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: PRIME B350M-A. BASEBOARD_VERSION: Rev X.0x. DUMP_TYPE: 2. BUGCHECK_P1: c000001d. BUGCHECK_P2: fffff8064a069d40. BUGCHECK_P3: ffff8007ff5ae600. BUGCHECK_P4: 0. EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text> FAULTING_IP: nt!KeAreAllApcsDisabled+20. fffff806`4a069d40 440f20c0 mov rax,cr8. CONTEXT: ffff8007ff5ae600 -- (.cxr 0xffff8007ff5ae600) rax=0000000000000201 rbx=0000000000000001 rcx=0000000000040246. rdx=0000000000000401 rsi=ffffb00519ca28a0 rdi=ffffb0051fc85e00. rip=fffff8064a069d40 rsp=ffff8007ff5aeff0 rbp=0000000000000000. r8=ffff8007ff5af0c0 r9=ffffb0051e558a28 r10=fffff8064a069d20. r11=ffff8007ff5af010 r12=0000000000000401 r13=ffff8007ff5af0c0. r14=ffffb0051e5588d8 r15=0000000000000000. iopl=0 nv up ei pl nz na pe nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202. nt!KeAreAllApcsDisabled+0x20: fffff806`4a069d40 440f20c0 mov rax,cr8. Resetting default scope. BUGCHECK_STR: 0x3B_c000001d. CPU_COUNT: 8. CPU_MHZ: e09. CPU_VENDOR: AuthenticAMD. CPU_FAMILY: 17. CPU_MODEL: 11. CPU_STEPPING: 0. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT. PROCESS_NAME: msiexec.exe. CURRENT_IRQL: 0. ANALYSIS_SESSION_HOST: DESKTOP-18V31A3. ANALYSIS_SESSION_TIME: 02-28-2020 22:19:52.0342. ANALYSIS_VERSION: 10.0.18362.1 x86fre. LAST_CONTROL_TRANSFER: from fffff8064ece8253 to fffff8064a069d40. STACK_TEXT: ffff8007`ff5aeff0 fffff806`4ece8253 : ffffc00e`b5fd1778 ffff8007`ff5af1a8 ffffc00e`b5fd1760 fffff806`4ece6fec : nt!KeAreAllApcsDisabled+0x20. ffff8007`ff5af020 fffff806`4f64d384 : ffffb005`19ca28a0 ffffb005`19ca28a0 ffffb005`1fc85e00 ffffb005`19cb1920 : FLTMGR!FltGetFileNameInformation+0xc3. ffff8007`ff5af0a0 fffff806`4f64dec2 : ffff801d`6a92d227 ffffb005`19ca28a0 ffff8007`ff5af230 ffff8007`ff5af148 : fileinfo!FIStreamQueryInfo+0x94. ffff8007`ff5af130 fffff806`4ece3c02 : ffffb005`1e5588d8 ffffc00e`00000001 00000000`00000000 00000000`00000000 : fileinfo!FIPostCreateCallback+0x222. ffff8007`ff5af1e0 fffff806`4ece3408 : 00000000`00000000 00000000`00000000 ffffb005`1fc85e00 00000000`00000000 : FLTMGR!FltpPerformPostCallbacks+0x3e2. ffff8007`ff5af2b0 fffff806`4ece5680 : 00000000`00000000 fffff806`4ecfc470 00000000`00000008 ffffb005`1e5587f0 : FLTMGR!FltpPassThroughCompletionWorker+0x128. ffff8007`ff5af330 fffff806`4ed1cd27 : ffff8007`ff5af3f0 00000000`00000110 00000000`00000000 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x200. ffff8007`ff5af3b0 fffff806`4a031f79 : 00000000`00000000 fffff806`4a5e5b05 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x307. ffff8007`ff5af460 fffff806`4a031024 : 00000000`00000003 00000000`00000000 00000000`00000000 fffff806`4a0317e3 : nt!IofCallDriver+0x59. ffff8007`ff5af4a0 fffff806`4a5e61eb : ffff8007`ff5af760 fffff806`4a5e5b05 ffff8007`ff5af6d0 ffffb005`1ec3f9a0 : nt!IoCallDriverWithTracing+0x34. ffff8007`ff5af4f0 fffff806`4a5ed1bf : ffffb005`19be68f0 ffffb005`19be6805 ffffb005`1f02b6b0 00000000`00000001 : nt!IopParseDevice+0x62b. ffff8007`ff5af660 fffff806`4a5eb621 : ffffb005`1f02b600 ffff8007`ff5af8a8 00000009`00000040 ffffb005`168f44e0 : nt!ObpLookupObjectName+0x78f. ffff8007`ff5af820 fffff806`4a630df0 : 00000000`00000001 00000009`1fd7eaa8 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByNameEx+0x201. ffff8007`ff5af960 fffff806`4a6305b9 : 00000009`1fd7ea50 00000000`40100080 00000009`1fd7eaa8 00000009`1fd7ea68 : nt!IopCreateFile+0x820. ffff8007`ff5afa00 fffff806`4a1d2d18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateFile+0x79. ffff8007`ff5afa90 00007ffb`60cbcb64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 00000009`1fd7e9d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`60cbcb64. THREAD_SHA1_HASH_MOD_FUNC: 483c8c37408f53846829b037017ba3dc513c1beb. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8989f1368bb9d7329aee3f2203c5a68713ecbdf0. THREAD_SHA1_HASH_MOD: e2d8a4e946cdcd5e15f697d508667e75ada359ba. FOLLOWUP_IP: fileinfo!FIStreamQueryInfo+94. fffff806`4f64d384 8bd8 mov ebx,eax. FAULT_INSTR_CODE: c085d88b. SYMBOL_STACK_INDEX: 2. SYMBOL_NAME: fileinfo!FIStreamQueryInfo+94. FOLLOWUP_NAME: MachineOwner. MODULE_NAME: fileinfo. IMAGE_NAME: fileinfo.sys. DEBUG_FLR_IMAGE_TIMESTAMP: 24bbed20. IMAGE_VERSION: 10.0.18362.1216. STACK_COMMAND: .cxr 0xffff8007ff5ae600 ; kb. BUCKET_ID_FUNC_OFFSET: 94. FAILURE_BUCKET_ID: 0x3B_c000001d_fileinfo!FIStreamQueryInfo. BUCKET_ID: 0x3B_c000001d_fileinfo!FIStreamQueryInfo. PRIMARY_PROBLEM_CLASS: 0x3B_c000001d_fileinfo!FIStreamQueryInfo. TARGET_TIME: 2020-02-27T15:30:08.000Z. OSBUILD: 18362. OSSERVICEPACK: 592. SERVICEPACK_NUMBER: 0. OS_REVISION: 0. SUITE_MASK: 272. PRODUCT_TYPE: 1. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS. OS_LOCALE: USER_LCID: 0. OSBUILD_TIMESTAMP: 1972-08-22 03:24:00. BUILDDATESTAMP_STR: 190318-1202. BUILDLAB_STR: 19h1_release. BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202. ANALYSIS_SESSION_ELAPSED_TIME: 9b93. ANALYSIS_SOURCE: KM. FAILURE_ID_HASH_STRING: km:0x3b_c000001d_fileinfo!fistreamqueryinfo. FAILURE_ID_HASH: {76b14008-2bcf-a46d-9cac-9f8d318d80a6} Followup: MachineOwner. ---------
XMP kapat frekans değerlerini elle gir. Sırasıyla 3133, 3000, 2933, 2800, 2666 MHz değerlerini dene. Bunlardan birinde sorun çıkmazsa belleklerini öyle kullan. Voltaj değerlerin otomatik olsun. Kontrol ettiğinde 1.2V olup sorun çıkarıyorlarsa 1.35V olarak da deneyebilirsin.İlk önce yazdıkların için teşekkür ederim. 3 BIOS sürümü denedim sonuçlar aynı ve 2133'de hata almıyorum fakat APU olarak kullandığım için çok performans kaybı oluyor. Ryzen DRAM calculator ile biraz frekans ve gecikme değerleri deneyeceğim umarım bir işe yarar.