Ryzen 5 2600 ve GTX 1070 sistem Mavi ekran hataları

Atakan0658

Hectopat
Katılım
4 Mart 2018
Mesajlar
52
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED.
SYSTEM_SERVICE_EXCEPTION.
Memory management.
Bunlar bilgisayarımda aldığım hatalar.
Sistemim.
MSI B350 GAMING PRO anakart.
AMD Ryzen 5 2600 işlemci.
GTX 1070.
Corsair vengaence 3000 MHz RAM.
1 TB HDD.
480 GB Toshiba OCZ TR200.

Ekran kartı sürücüsünü anakart sürücüsünü güncelledim ama hata devam ediyor.
 
Son düzenleyen: Moderatör:

avcitalip

Hectopat
Katılım
6 Şubat 2015
Mesajlar
944
Çözümler
2
Yer
Zonguldak
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED.
SYSTEM_SERVICE_EXCEPTION.
Memory management.
Bunlar bilgisayarımda aldığım hatalar.
Sistemim.
MSI B350 GAMING PRO anakart.
AMD Ryzen 5 2600 işlemci.
GTX 1070.
Corsair vengaence 3000 MHz RAM.
1 TB HDD.
480 GB Toshiba OCZ TR200.

Ekran kartı sürücüsünü anakart sürücüsünü güncelledim ama hata devam ediyor.

Sistemi yeni mi topladınız? Elimden bu mavi ekranlara sebep olan 3 tane bozuk 2600 geçti, artık dayanamayıp 3600 aldım ve hiçbir problem yok. Ama ben sorunun işlemciden kaynaklandığından adım gibi emindim.

1. Tavsiyem bellekleri overclocksuz stock olarak kullanarak denemeniz.
2. Tavsiyem anakartın güç modunu yüksek güce getirmeniz.(Ne alaka bilmiyorum ama asusun yayınladığı son biosta makinem sapıttı, bunu bu şekilde yaparak çözdüm.)
 
KS
A

Atakan0658

Hectopat
Katılım
4 Mart 2018
Mesajlar
52
Sistemi yeni mi topladınız? Elimden bu mavi ekranlara sebep olan 3 tane bozuk 2600 geçti, artık dayanamayıp 3600 aldım ve hiçbir problem yok. Ama ben sorunun işlemciden kaynaklandığından adım gibi emindim.

1. Tavsiyem bellekleri overclocksuz stock olarak kullanarak denemeniz.
2. Tavsiyem anakartın güç modunu yüksek güce getirmeniz.(Ne alaka bilmiyorum ama asusun yayınladığı son biosta makinem sapıttı, bunu bu şekilde yaparak çözdüm.)
Sistemi yeni topladım dediklerinizi uygulayacağım teşekkür ederim.
 
Son düzenleyen: Moderatör:

MayCrasH

Terapat
Sosyal Tayfı
Katılım
9 Ekim 2015
Mesajlar
12.630
Çözümler
603
Yer
Andromeda
 

YumukluSucurtaA

Hectopat
Katılım
15 Aralık 2015
Mesajlar
132
Mavi ekran hatası halen devam ediyor mu. ?
Aynı sorun bende de var. İşlemci ve Ram aynı. Vatandan yeni topladım sistemi. Aynı mavi ekran hatalarını sürekli bende alıyorum.
 

YumukluSucurtaA

Hectopat
Katılım
15 Aralık 2015
Mesajlar
132
Biraz AMD tarafı sıkıntılıymış. İşlemcinin pinleri bile yamuktu sıfır olmasına rağmen düzelttiler. İnternette toplanan sistemlerde Ryzen artışı olduğu için tercihim o yönde oldu.
 

MayCrasH

Terapat
Sosyal Tayfı
Katılım
9 Ekim 2015
Mesajlar
12.630
Çözümler
603
Yer
Andromeda
Memtest86 testi yapar mısın?

Önceden yaptıysan sonuç nedir?

Belleği neden 3000MHz değilde 2933MHz'de çalıştırıyorsun?

Güç ve Uyku ayarlarını varsayılan ayarlarına döndürüp Dengeli seçeneğine alıp bir süre test eder misin?
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff381537ad1d8
Arg3: 0080000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff381537ad1d8

BUGCHECK_P3: 80000000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BUGCHECK_STR:  0x1a_41792

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  RainbowSix.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-13-2020 22:41:38.0231

ANALYSIS_VERSION: 10.0.18362.1 x86fre

STACK_TEXT: 
ffff830c`f1ffbef8 fffff804`7e2252ee : 00000000`0000001a 00000000`00041792 fffff381`537ad1d8 00800000`00000000 : nt!KeBugCheckEx
ffff830c`f1ffbf00 fffff804`7e0ac9e7 : ffffa781`1760c9c0 fffff381`537ad1d8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e
ffff830c`f1ffc010 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`c0a9bd68 00000000`00000000 0a000002`53d87867 : nt!MiWalkPageTablesRecursively+0x1e7
ffff830c`f1ffc0d0 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`fce054d8 00000000`00000000 0a000001`a87cc867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff830c`f1ffc190 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`fcfe7028 fffff3f9`00000000 0a000001`f15c3867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff830c`f1ffc250 fffff804`7e0ac62c : ffff830c`f1ffc460 ffffcd02`40c02c90 00000000`00000000 ffffa781`16f25e80 : nt!MiWalkPageTablesRecursively+0x6a1
ffff830c`f1ffc310 fffff804`7e0aaa98 : ffff830c`f1ffc460 fffff3f9`00000002 00000000`00000001 90000001`00000000 : nt!MiWalkPageTables+0x36c
ffff830c`f1ffc410 fffff804`7e0b8bf0 : ffffffff`ffffffff ffffa781`1760c838 ffffa781`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff830c`f1ffc7b0 fffff804`7e5c7a5d : 00000000`00000000 ffffa781`24273750 ffffa781`24273750 00000000`00000000 : nt!MiDeleteVad+0x860
ffff830c`f1ffc970 fffff804`7e5c7853 : ffffa781`1751b800 00000000`00000000 000002a6`f5a30000 00000000`00000000 : nt!MiUnmapVad+0x49
ffff830c`f1ffc9a0 fffff804`7e5c76e9 : ffffa781`1760c4c0 00000000`00000008 ffffa781`16ea97a0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffff830c`f1ffca80 fffff804`7e5c73dc : ffffa781`2249f080 000000ad`650fa4a0 000000ad`650fa4a0 ffffa781`1760c4c0 : nt!NtUnmapViewOfSectionEx+0x99
ffff830c`f1ffcad0 fffff804`7e1d2d18 : ffffa781`2249f080 000000ad`650fa568 000000ad`650fa320 00000000`00000000 : nt!NtUnmapViewOfSection+0xc
ffff830c`f1ffcb00 00007ffc`a5c1c604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ad`650fa028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`a5c1c604


THREAD_SHA1_HASH_MOD_FUNC:  e3e3f454f5c5e2fe31f4ba7b6315002a603841a7

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  b4d67aab2a3257d5ed2dec242e32feabe54b26c4

THREAD_SHA1_HASH_MOD:  7f608ac2fbce9034a3386b1d51652e4911d30234

SYMBOL_NAME:  ONE_BIT

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-02-12T17:02:19.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3d32

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffff878ad7e00100, Address of the heap that reported the corruption
Arg3: ffff878added2000, Address at which the corruption was detected
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.L0

BIOS_DATE:  01/22/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 12

BUGCHECK_P2: ffff878ad7e00100

BUGCHECK_P3: ffff878added2000

BUGCHECK_P4: 0

CORRUPTING_POOL_ADDRESS: fffff8062d7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffff878added2000

FAULTING_IP:
nt!ExAllocatePoolWithTag+5d
fffff806`2d56f06d 4885c0          test    rax,rax

BUGCHECK_STR:  0x13a_12

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-13-2020 22:41:44.0197

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8062d51ad78 to fffff8062d3c1510

STACK_TEXT: 
ffffb709`b8d4f3f8 fffff806`2d51ad78 : 00000000`0000013a 00000000`00000012 ffff878a`d7e00100 ffff878a`dded2000 : nt!KeBugCheckEx
ffffb709`b8d4f400 fffff806`2d51add8 : 00000000`00000012 00000000`008a0000 ffff878a`d7e00100 fffff806`2d239c1d : nt!RtlpHeapHandleError+0x40
ffffb709`b8d4f440 fffff806`2d51aa01 : ffff878a`d7e00280 00000000`00000000 ffffb709`b8d4f590 fffff806`2d233294 : nt!RtlpHpHeapHandleError+0x58
ffffb709`b8d4f470 fffff806`2d242d3d : ffff878a`d7e00280 00000000`00000000 00000036`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
ffffb709`b8d4f4a0 fffff806`2d23330e : ffff878a`0000008a ffff878a`00000880 ffff878a`00000880 ffff878a`d7e00000 : nt!RtlpHpVsContextAllocateInternal+0x38d
ffffb709`b8d4f510 fffff806`2d56f06d : 00000000`80000001 00000000`00000000 00000000`00000000 00000000`00000800 : nt!ExAllocateHeapPool+0xc0e
ffffb709`b8d4f650 fffff806`2d7fcc07 : 00000000`00000100 ffffb709`b8d4f840 00000000`08000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffffb709`b8d4f6a0 fffff806`2d7dad65 : ffffb709`b8d4f840 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiCreatePagingFileMap+0x677
ffffb709`b8d4f7c0 fffff806`2d7da2af : 00000000`08000000 ffffb709`b8d4fb80 00000000`00000001 00000000`00000004 : nt!MiCreateSection+0x205
ffffb709`b8d4f940 fffff806`2d7da040 : 00000064`261fef00 00000000`000f0007 00000064`261fef18 ffffb907`7943e140 : nt!MiCreateSectionCommon+0x1ff
ffffb709`b8d4fa20 fffff806`2d3d2e18 : ffffb907`7856e080 00000064`261ff4e8 ffffb709`b8d4faa8 0000023f`e8b64e60 : nt!NtCreateSection+0x60
ffffb709`b8d4fa90 00007ff8`182bca04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000064`261feea8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`182bca04


THREAD_SHA1_HASH_MOD_FUNC:  b703b9990189b46fad16261bcd91d57070401b54

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  7deeae155b30a074f22a6bf5432efe0793ed51eb

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!ExAllocatePoolWithTag+5d
fffff806`2d56f06d 4885c0          test    rax,rax

FAULT_INSTR_CODE:  fc08548

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  nt!ExAllocatePoolWithTag+5d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4269a790

IMAGE_VERSION:  10.0.18362.657

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5d

FAILURE_BUCKET_ID:  0x13a_12_nt!ExAllocatePoolWithTag

BUCKET_ID:  0x13a_12_nt!ExAllocatePoolWithTag

PRIMARY_PROBLEM_CLASS:  0x13a_12_nt!ExAllocatePoolWithTag

TARGET_TIME:  2020-02-13T19:11:44.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  16fd

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x13a_12_nt!exallocatepoolwithtag

FAILURE_ID_HASH:  {b9670819-63de-0938-5c20-377096ee8f03}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80220cf03fa, Address of the instruction which caused the bugcheck
Arg3: ffff8e04ac5e17b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80220cf03fa

BUGCHECK_P3: ffff8e04ac5e17b0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!MiProcessCrcList+13a
fffff802`20cf03fa 8b7e10          mov     edi,dword ptr [rsi+10h]

CONTEXT:  ffff8e04ac5e17b0 -- (.cxr 0xffff8e04ac5e17b0)
rax=8000000000000000 rbx=ffffc00bffdb2080 rcx=ffffa28000000000
rdx=002078c978739131 rsi=02ffa28004455570 rdi=0000000000000004
rip=fffff80220cf03fa rsp=ffff8e04ac5e21a0 rbp=ffff8e04ac5e2259
 r8=ffffc00c02f76180  r9=ffffc00c02200000 r10=0000000000000000
r11=ffffa78000000000 r12=ffffc00c0093d060 r13=0000000000000000
r14=ffffc00c02200028 r15=ffffa7807123ffb0
iopl=0         nv up ei pl nz na pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050203
nt!MiProcessCrcList+0x13a:
fffff802`20cf03fa 8b7e10          mov     edi,dword ptr [rsi+10h] ds:002b:02ffa280`04455580=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-13-2020 22:41:41.0338

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80220cf0d9e to fffff80220cf03fa

STACK_TEXT: 
ffff8e04`ac5e21a0 fffff802`20cf0d9e : 00000000`00000080 00000000`00000000 00000000`00000000 ffffa280`0c5da7d0 : nt!MiProcessCrcList+0x13a
ffff8e04`ac5e22c0 fffff802`20cf3912 : 00000000`00000000 00000000`00000000 ffff8e04`ac5e24e0 00000000`00000000 : nt!MiCombineAllPhysicalMemory+0x30e
ffff8e04`ac5e23e0 fffff802`20bfffcd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiCombineIdenticalPages+0x20e
ffff8e04`ac5e2650 fffff802`207d2d18 : ffffc00b`ffdb2080 000000cf`c1c2a000 ffff8e04`ac5e2b80 ffffc00b`fe8e9f60 : nt!NtSetSystemInformation+0x5dd
ffff8e04`ac5e2b00 00007ff9`282ff534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000cf`c1eff728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`282ff534


THREAD_SHA1_HASH_MOD_FUNC:  9f7f5ae14aebe5bdd59891fe3799ef6417ce15c2

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e51720b5d0470781f64b96f311802cf0e9b9fd33

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!MiProcessCrcList+13a
fffff802`20cf03fa 8b7e10          mov     edi,dword ptr [rsi+10h]

FAULT_INSTR_CODE:  4c107e8b

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiProcessCrcList+13a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  29371fe3

IMAGE_VERSION:  10.0.18362.628

STACK_COMMAND:  .cxr 0xffff8e04ac5e17b0 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  13a

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!MiProcessCrcList

BUCKET_ID:  0x3B_c0000005_nt!MiProcessCrcList

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!MiProcessCrcList

TARGET_TIME:  2020-02-12T16:32:40.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5973

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!miprocesscrclist

FAILURE_ID_HASH:  {d7db7768-4133-3f2f-1a28-ac11cb6d4f46}

Followup:     MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80031ae5de9, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.L0

BIOS_DATE:  01/22/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80031ae5de9

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff80031f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!RtlpHpLfhSubsegmentFreeBlock+299
fffff800`31ae5de9 49397008        cmp     qword ptr [r8+8],rsi

EXCEPTION_PARAMETER2:  ffffffffffffffff

BUGCHECK_STR:  0x1E_c0000005_R

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-13-2020 22:41:34.0494

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffc78bfb267a00 -- (.trap 0xffffc78bfb267a00)
Unable to read trap frame at ffffc78b`fb267a00

LAST_CONTROL_TRANSFER:  from fffff80031c2fda7 to fffff80031bc14e0

STACK_TEXT: 
ffff8988`ba07aae8 fffff800`31c2fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`31ae5de9 00000000`00000000 : nt!KeBugCheckEx
ffff8988`ba07aaf0 fffff800`31bd341d : 00000000`00000000 fffff800`00000000 ffffc78b`fb267a00 00000000`00000000 : nt!KiDispatchException+0x1689d7
ffff8988`ba07b1a0 fffff800`31bcf1a2 : ffffc78b`fb539170 fffff800`31a4ae66 ffffa406`d5803180 ffffa406`dd82ad68 : nt!KiExceptionDispatch+0x11d
ffff8988`ba07b380 fffff800`31ae5de9 : 00000001`005000e0 00000000`00000000 00000000`00000fff 00000000`00000000 : nt!KiGeneralProtectionFault+0x322
ffff8988`ba07b510 fffff800`31a45ed7 : ffffc78b`fa800340 ffffc78b`ffa97eff ffffc78b`fa8048d0 00000000`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x299
ffff8988`ba07b5d0 fffff800`31d6f0a9 : 00000000`00000158 ffffc78b`feb03310 00000000`00000158 01000000`00100000 : nt!ExFreeHeapPool+0x357
ffff8988`ba07b6f0 fffff800`31ffa2d7 : ffffc78b`feb03350 ffffc78b`feb03350 ffffa406`d2ea67a0 fffff800`31e6d4c0 : nt!ExFreePool+0x9
ffff8988`ba07b720 fffff800`31ffa0e8 : 00000000`00000000 ffffc78b`feb03330 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x197
ffff8988`ba07b780 fffff800`31a3a9a9 : 00000000`00000000 00000000`00000000 ffff8988`ba07b909 ffffc78b`feb03380 : nt!ObpRemoveObjectRoutine+0x88
ffff8988`ba07b7e0 fffff800`31fec457 : 00000000`00000000 ffffc78b`feb03350 ffffc78b`00000001 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc9
ffff8988`ba07b820 fffff800`320385a5 : 00000000`00000000 00000000`00000000 00000000`00000004 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7
ffff8988`ba07b960 fffff800`32038241 : 00000000`00000000 ffffa406`daab6080 ffffffff`ffffff01 ffffa406`da3ee380 : nt!ExSweepHandleTable+0xd5
ffff8988`ba07ba10 fffff800`32038769 : ffffffff`ffffffff ffffa406`da3ee080 ffff8988`ba07ba60 ffffa406`00000000 : nt!ObKillProcess+0x35
ffff8988`ba07ba40 fffff800`3205e6d3 : ffffa406`da3ee080 ffffc78b`fae8a060 00000000`00000001 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffff8988`ba07bac0 fffff800`32052113 : fffff800`00000000 ffffee8c`7493d301 00000000`00000000 00000000`00000088 : nt!PspExitThread+0x60b
ffff8988`ba07bbd0 fffff800`31b2a7bf : ffffa406`daab6080 00000000`00000080 ffffee8c`7493d2c0 00000000`00000001 : nt!PspTerminateThreadByPointer+0x53
ffff8988`ba07bc10 fffff800`31bc8b2a : ffffd780`d9fc7180 ffffa406`daab6080 fffff800`31b2a750 00000000`00000246 : nt!PspSystemThreadStartup+0x6f
ffff8988`ba07bc60 00000000`00000000 : ffff8988`ba07c000 ffff8988`ba076000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  650aca80b8cc7391d9e9a1c3d6bf376046b26a74

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  4343f43d4f2fbf0ba9d4e517789195e9edd23e83

THREAD_SHA1_HASH_MOD:  82d14546c43bd06881f781d6d197c4c7f7ceb9cb

FOLLOWUP_IP:
nt!ExFreePool+9
fffff800`31d6f0a9 4883c428        add     rsp,28h

FAULT_INSTR_CODE:  28c48348

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  nt!ExFreePool+9

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.628

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x1E_c0000005_R_nt!ExFreePool

BUCKET_ID:  0x1E_c0000005_R_nt!ExFreePool

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_R_nt!ExFreePool

TARGET_TIME:  2020-02-12T18:23:36.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  7d9f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_r_nt!exfreepool

FAILURE_ID_HASH:  {ad89d73f-a540-2de7-18be-0204e4670731}

Followup:     Pool_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffe5bfff90fd80
Arg3: 0080000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.L0

BIOS_DATE:  01/22/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffe5bfff90fd80

BUGCHECK_P3: 80000000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BUGCHECK_STR:  0x1a_41792

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  WerFault.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-13-2020 22:41:31.0998

ANALYSIS_VERSION: 10.0.18362.1 x86fre

STACK_TEXT: 
ffffd305`7fcd7ef8 fffff805`0ca252ee : 00000000`0000001a 00000000`00041792 ffffe5bf`ff90fd80 00800000`00000000 : nt!KeBugCheckEx
ffffd305`7fcd7f00 fffff805`0c8ac9e7 : ffffc28a`322f6800 ffffe5bf`ff90fd80 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e
ffffd305`7fcd8010 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`dfffc878 00000000`00000000 0a000002`563b0867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffd305`7fcd80d0 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`f96fffe0 00000000`00000000 0a000002`5628b867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffd305`7fcd8190 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`f97cb7f8 ffffe5f2`00000000 0a000002`56274867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffd305`7fcd8250 fffff805`0c8ac62c : ffffd305`7fcd8460 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffd305`7fcd8310 fffff805`0c8aaa98 : ffffd305`7fcd8460 ffffc28a`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffd305`7fcd8410 fffff805`0c8b8bf0 : ffffffff`ffffffff ffffc28a`322f6678 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffd305`7fcd87b0 fffff805`0cdc7a5d : ffffc28a`2b1a4830 00000000`000b2000 ffffc28a`3020bae0 00000000`00000000 : nt!MiDeleteVad+0x860
ffffd305`7fcd8970 fffff805`0cdc7853 : ffffc28a`3020bae0 00007fff`21fb0000 ffffc28a`2b196d00 00000000`00000000 : nt!MiUnmapVad+0x49
ffffd305`7fcd89a0 fffff805`0cdc76e9 : ffffc28a`322f6300 00000000`00000008 ffffc28a`262a20c0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffffd305`7fcd8a80 fffff805`0cdc73dc : ffffc28a`3069a080 00000269`762b2b00 000000b6`669bf1a0 ffffc28a`322f6300 : nt!NtUnmapViewOfSectionEx+0x99
ffffd305`7fcd8ad0 fffff805`0c9d2d18 : ffffc28a`3069a080 00000269`762b2a18 00000000`00000020 ffffc28a`00000000 : nt!NtUnmapViewOfSection+0xc
ffffd305`7fcd8b00 00007fff`23a9c604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b6`669bf068 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`23a9c604


THREAD_SHA1_HASH_MOD_FUNC:  e3e3f454f5c5e2fe31f4ba7b6315002a603841a7

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  b4d67aab2a3257d5ed2dec242e32feabe54b26c4

THREAD_SHA1_HASH_MOD:  7f608ac2fbce9034a3386b1d51652e4911d30234

SYMBOL_NAME:  ONE_BIT

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-02-11T16:06:18.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1952

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
 
Yukarı