Atakan0658
Hectopat
- Katılım
- 4 Mart 2018
- Mesajlar
- 52
Daha fazla
- Cinsiyet
- Erkek
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED.
SYSTEM_SERVICE_EXCEPTION.
Memory management.
Bunlar bilgisayarımda aldığım hatalar.
Sistemim.
MSI B350 GAMING PRO anakart.
AMD Ryzen 5 2600 işlemci.
GTX 1070.
Corsair vengaence 3000 MHz RAM.
1 TB HDD.
480 GB Toshiba OCZ TR200.
Ekran kartı sürücüsünü anakart sürücüsünü güncelledim ama hata devam ediyor.
Sistemi yeni topladım dediklerinizi uygulayacağım teşekkür ederim.Sistemi yeni mi topladınız? Elimden bu mavi ekranlara sebep olan 3 tane bozuk 2600 geçti, artık dayanamayıp 3600 aldım ve hiçbir problem yok. Ama ben sorunun işlemciden kaynaklandığından adım gibi emindim.
1. Tavsiyem bellekleri overclocksuz stock olarak kullanarak denemeniz.
2. Tavsiyem anakartın güç modunu yüksek güce getirmeniz.(Ne alaka bilmiyorum ama asusun yayınladığı son biosta makinem sapıttı, bunu bu şekilde yaparak çözdüm.)
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff381537ad1d8
Arg3: 0080000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff381537ad1d8
BUGCHECK_P3: 80000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: RainbowSix.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-13-2020 22:41:38.0231
ANALYSIS_VERSION: 10.0.18362.1 x86fre
STACK_TEXT:
ffff830c`f1ffbef8 fffff804`7e2252ee : 00000000`0000001a 00000000`00041792 fffff381`537ad1d8 00800000`00000000 : nt!KeBugCheckEx
ffff830c`f1ffbf00 fffff804`7e0ac9e7 : ffffa781`1760c9c0 fffff381`537ad1d8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e
ffff830c`f1ffc010 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`c0a9bd68 00000000`00000000 0a000002`53d87867 : nt!MiWalkPageTablesRecursively+0x1e7
ffff830c`f1ffc0d0 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`fce054d8 00000000`00000000 0a000001`a87cc867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff830c`f1ffc190 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`fcfe7028 fffff3f9`00000000 0a000001`f15c3867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff830c`f1ffc250 fffff804`7e0ac62c : ffff830c`f1ffc460 ffffcd02`40c02c90 00000000`00000000 ffffa781`16f25e80 : nt!MiWalkPageTablesRecursively+0x6a1
ffff830c`f1ffc310 fffff804`7e0aaa98 : ffff830c`f1ffc460 fffff3f9`00000002 00000000`00000001 90000001`00000000 : nt!MiWalkPageTables+0x36c
ffff830c`f1ffc410 fffff804`7e0b8bf0 : ffffffff`ffffffff ffffa781`1760c838 ffffa781`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff830c`f1ffc7b0 fffff804`7e5c7a5d : 00000000`00000000 ffffa781`24273750 ffffa781`24273750 00000000`00000000 : nt!MiDeleteVad+0x860
ffff830c`f1ffc970 fffff804`7e5c7853 : ffffa781`1751b800 00000000`00000000 000002a6`f5a30000 00000000`00000000 : nt!MiUnmapVad+0x49
ffff830c`f1ffc9a0 fffff804`7e5c76e9 : ffffa781`1760c4c0 00000000`00000008 ffffa781`16ea97a0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffff830c`f1ffca80 fffff804`7e5c73dc : ffffa781`2249f080 000000ad`650fa4a0 000000ad`650fa4a0 ffffa781`1760c4c0 : nt!NtUnmapViewOfSectionEx+0x99
ffff830c`f1ffcad0 fffff804`7e1d2d18 : ffffa781`2249f080 000000ad`650fa568 000000ad`650fa320 00000000`00000000 : nt!NtUnmapViewOfSection+0xc
ffff830c`f1ffcb00 00007ffc`a5c1c604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ad`650fa028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`a5c1c604
THREAD_SHA1_HASH_MOD_FUNC: e3e3f454f5c5e2fe31f4ba7b6315002a603841a7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b4d67aab2a3257d5ed2dec242e32feabe54b26c4
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
SYMBOL_NAME: ONE_BIT
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-02-12T17:02:19.000Z
OSBUILD: 18362
OSSERVICEPACK: 628
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1991-11-30 08:21:39
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3d32
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffff878ad7e00100, Address of the heap that reported the corruption
Arg3: ffff878added2000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7A39
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.L0
BIOS_DATE: 01/22/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B350M GAMING PRO (MS-7A39)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 12
BUGCHECK_P2: ffff878ad7e00100
BUGCHECK_P3: ffff878added2000
BUGCHECK_P4: 0
CORRUPTING_POOL_ADDRESS: fffff8062d7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff878added2000
FAULTING_IP:
nt!ExAllocatePoolWithTag+5d
fffff806`2d56f06d 4885c0 test rax,rax
BUGCHECK_STR: 0x13a_12
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-13-2020 22:41:44.0197
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8062d51ad78 to fffff8062d3c1510
STACK_TEXT:
ffffb709`b8d4f3f8 fffff806`2d51ad78 : 00000000`0000013a 00000000`00000012 ffff878a`d7e00100 ffff878a`dded2000 : nt!KeBugCheckEx
ffffb709`b8d4f400 fffff806`2d51add8 : 00000000`00000012 00000000`008a0000 ffff878a`d7e00100 fffff806`2d239c1d : nt!RtlpHeapHandleError+0x40
ffffb709`b8d4f440 fffff806`2d51aa01 : ffff878a`d7e00280 00000000`00000000 ffffb709`b8d4f590 fffff806`2d233294 : nt!RtlpHpHeapHandleError+0x58
ffffb709`b8d4f470 fffff806`2d242d3d : ffff878a`d7e00280 00000000`00000000 00000036`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
ffffb709`b8d4f4a0 fffff806`2d23330e : ffff878a`0000008a ffff878a`00000880 ffff878a`00000880 ffff878a`d7e00000 : nt!RtlpHpVsContextAllocateInternal+0x38d
ffffb709`b8d4f510 fffff806`2d56f06d : 00000000`80000001 00000000`00000000 00000000`00000000 00000000`00000800 : nt!ExAllocateHeapPool+0xc0e
ffffb709`b8d4f650 fffff806`2d7fcc07 : 00000000`00000100 ffffb709`b8d4f840 00000000`08000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffffb709`b8d4f6a0 fffff806`2d7dad65 : ffffb709`b8d4f840 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiCreatePagingFileMap+0x677
ffffb709`b8d4f7c0 fffff806`2d7da2af : 00000000`08000000 ffffb709`b8d4fb80 00000000`00000001 00000000`00000004 : nt!MiCreateSection+0x205
ffffb709`b8d4f940 fffff806`2d7da040 : 00000064`261fef00 00000000`000f0007 00000064`261fef18 ffffb907`7943e140 : nt!MiCreateSectionCommon+0x1ff
ffffb709`b8d4fa20 fffff806`2d3d2e18 : ffffb907`7856e080 00000064`261ff4e8 ffffb709`b8d4faa8 0000023f`e8b64e60 : nt!NtCreateSection+0x60
ffffb709`b8d4fa90 00007ff8`182bca04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000064`261feea8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`182bca04
THREAD_SHA1_HASH_MOD_FUNC: b703b9990189b46fad16261bcd91d57070401b54
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7deeae155b30a074f22a6bf5432efe0793ed51eb
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!ExAllocatePoolWithTag+5d
fffff806`2d56f06d 4885c0 test rax,rax
FAULT_INSTR_CODE: fc08548
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: nt!ExAllocatePoolWithTag+5d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790
IMAGE_VERSION: 10.0.18362.657
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5d
FAILURE_BUCKET_ID: 0x13a_12_nt!ExAllocatePoolWithTag
BUCKET_ID: 0x13a_12_nt!ExAllocatePoolWithTag
PRIMARY_PROBLEM_CLASS: 0x13a_12_nt!ExAllocatePoolWithTag
TARGET_TIME: 2020-02-13T19:11:44.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 16fd
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x13a_12_nt!exallocatepoolwithtag
FAILURE_ID_HASH: {b9670819-63de-0938-5c20-377096ee8f03}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80220cf03fa, Address of the instruction which caused the bugcheck
Arg3: ffff8e04ac5e17b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80220cf03fa
BUGCHECK_P3: ffff8e04ac5e17b0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiProcessCrcList+13a
fffff802`20cf03fa 8b7e10 mov edi,dword ptr [rsi+10h]
CONTEXT: ffff8e04ac5e17b0 -- (.cxr 0xffff8e04ac5e17b0)
rax=8000000000000000 rbx=ffffc00bffdb2080 rcx=ffffa28000000000
rdx=002078c978739131 rsi=02ffa28004455570 rdi=0000000000000004
rip=fffff80220cf03fa rsp=ffff8e04ac5e21a0 rbp=ffff8e04ac5e2259
r8=ffffc00c02f76180 r9=ffffc00c02200000 r10=0000000000000000
r11=ffffa78000000000 r12=ffffc00c0093d060 r13=0000000000000000
r14=ffffc00c02200028 r15=ffffa7807123ffb0
iopl=0 nv up ei pl nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050203
nt!MiProcessCrcList+0x13a:
fffff802`20cf03fa 8b7e10 mov edi,dword ptr [rsi+10h] ds:002b:02ffa280`04455580=????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-13-2020 22:41:41.0338
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80220cf0d9e to fffff80220cf03fa
STACK_TEXT:
ffff8e04`ac5e21a0 fffff802`20cf0d9e : 00000000`00000080 00000000`00000000 00000000`00000000 ffffa280`0c5da7d0 : nt!MiProcessCrcList+0x13a
ffff8e04`ac5e22c0 fffff802`20cf3912 : 00000000`00000000 00000000`00000000 ffff8e04`ac5e24e0 00000000`00000000 : nt!MiCombineAllPhysicalMemory+0x30e
ffff8e04`ac5e23e0 fffff802`20bfffcd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiCombineIdenticalPages+0x20e
ffff8e04`ac5e2650 fffff802`207d2d18 : ffffc00b`ffdb2080 000000cf`c1c2a000 ffff8e04`ac5e2b80 ffffc00b`fe8e9f60 : nt!NtSetSystemInformation+0x5dd
ffff8e04`ac5e2b00 00007ff9`282ff534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000cf`c1eff728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`282ff534
THREAD_SHA1_HASH_MOD_FUNC: 9f7f5ae14aebe5bdd59891fe3799ef6417ce15c2
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e51720b5d0470781f64b96f311802cf0e9b9fd33
THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
FOLLOWUP_IP:
nt!MiProcessCrcList+13a
fffff802`20cf03fa 8b7e10 mov edi,dword ptr [rsi+10h]
FAULT_INSTR_CODE: 4c107e8b
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiProcessCrcList+13a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 29371fe3
IMAGE_VERSION: 10.0.18362.628
STACK_COMMAND: .cxr 0xffff8e04ac5e17b0 ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 13a
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!MiProcessCrcList
BUCKET_ID: 0x3B_c0000005_nt!MiProcessCrcList
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!MiProcessCrcList
TARGET_TIME: 2020-02-12T16:32:40.000Z
OSBUILD: 18362
OSSERVICEPACK: 628
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1991-11-30 08:21:39
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 5973
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!miprocesscrclist
FAILURE_ID_HASH: {d7db7768-4133-3f2f-1a28-ac11cb6d4f46}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80031ae5de9, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7A39
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.L0
BIOS_DATE: 01/22/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B350M GAMING PRO (MS-7A39)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80031ae5de9
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff80031f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!RtlpHpLfhSubsegmentFreeBlock+299
fffff800`31ae5de9 49397008 cmp qword ptr [r8+8],rsi
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-13-2020 22:41:34.0494
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffc78bfb267a00 -- (.trap 0xffffc78bfb267a00)
Unable to read trap frame at ffffc78b`fb267a00
LAST_CONTROL_TRANSFER: from fffff80031c2fda7 to fffff80031bc14e0
STACK_TEXT:
ffff8988`ba07aae8 fffff800`31c2fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`31ae5de9 00000000`00000000 : nt!KeBugCheckEx
ffff8988`ba07aaf0 fffff800`31bd341d : 00000000`00000000 fffff800`00000000 ffffc78b`fb267a00 00000000`00000000 : nt!KiDispatchException+0x1689d7
ffff8988`ba07b1a0 fffff800`31bcf1a2 : ffffc78b`fb539170 fffff800`31a4ae66 ffffa406`d5803180 ffffa406`dd82ad68 : nt!KiExceptionDispatch+0x11d
ffff8988`ba07b380 fffff800`31ae5de9 : 00000001`005000e0 00000000`00000000 00000000`00000fff 00000000`00000000 : nt!KiGeneralProtectionFault+0x322
ffff8988`ba07b510 fffff800`31a45ed7 : ffffc78b`fa800340 ffffc78b`ffa97eff ffffc78b`fa8048d0 00000000`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x299
ffff8988`ba07b5d0 fffff800`31d6f0a9 : 00000000`00000158 ffffc78b`feb03310 00000000`00000158 01000000`00100000 : nt!ExFreeHeapPool+0x357
ffff8988`ba07b6f0 fffff800`31ffa2d7 : ffffc78b`feb03350 ffffc78b`feb03350 ffffa406`d2ea67a0 fffff800`31e6d4c0 : nt!ExFreePool+0x9
ffff8988`ba07b720 fffff800`31ffa0e8 : 00000000`00000000 ffffc78b`feb03330 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x197
ffff8988`ba07b780 fffff800`31a3a9a9 : 00000000`00000000 00000000`00000000 ffff8988`ba07b909 ffffc78b`feb03380 : nt!ObpRemoveObjectRoutine+0x88
ffff8988`ba07b7e0 fffff800`31fec457 : 00000000`00000000 ffffc78b`feb03350 ffffc78b`00000001 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc9
ffff8988`ba07b820 fffff800`320385a5 : 00000000`00000000 00000000`00000000 00000000`00000004 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7
ffff8988`ba07b960 fffff800`32038241 : 00000000`00000000 ffffa406`daab6080 ffffffff`ffffff01 ffffa406`da3ee380 : nt!ExSweepHandleTable+0xd5
ffff8988`ba07ba10 fffff800`32038769 : ffffffff`ffffffff ffffa406`da3ee080 ffff8988`ba07ba60 ffffa406`00000000 : nt!ObKillProcess+0x35
ffff8988`ba07ba40 fffff800`3205e6d3 : ffffa406`da3ee080 ffffc78b`fae8a060 00000000`00000001 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffff8988`ba07bac0 fffff800`32052113 : fffff800`00000000 ffffee8c`7493d301 00000000`00000000 00000000`00000088 : nt!PspExitThread+0x60b
ffff8988`ba07bbd0 fffff800`31b2a7bf : ffffa406`daab6080 00000000`00000080 ffffee8c`7493d2c0 00000000`00000001 : nt!PspTerminateThreadByPointer+0x53
ffff8988`ba07bc10 fffff800`31bc8b2a : ffffd780`d9fc7180 ffffa406`daab6080 fffff800`31b2a750 00000000`00000246 : nt!PspSystemThreadStartup+0x6f
ffff8988`ba07bc60 00000000`00000000 : ffff8988`ba07c000 ffff8988`ba076000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: 650aca80b8cc7391d9e9a1c3d6bf376046b26a74
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4343f43d4f2fbf0ba9d4e517789195e9edd23e83
THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb
FOLLOWUP_IP:
nt!ExFreePool+9
fffff800`31d6f0a9 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: nt!ExFreePool+9
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.628
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!ExFreePool
BUCKET_ID: 0x1E_c0000005_R_nt!ExFreePool
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!ExFreePool
TARGET_TIME: 2020-02-12T18:23:36.000Z
OSBUILD: 18362
OSSERVICEPACK: 628
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1991-11-30 08:21:39
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 7d9f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!exfreepool
FAILURE_ID_HASH: {ad89d73f-a540-2de7-18be-0204e4670731}
Followup: Pool_corruption
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffe5bfff90fd80
Arg3: 0080000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7A39
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.L0
BIOS_DATE: 01/22/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B350M GAMING PRO (MS-7A39)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffe5bfff90fd80
BUGCHECK_P3: 80000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-13-2020 22:41:31.0998
ANALYSIS_VERSION: 10.0.18362.1 x86fre
STACK_TEXT:
ffffd305`7fcd7ef8 fffff805`0ca252ee : 00000000`0000001a 00000000`00041792 ffffe5bf`ff90fd80 00800000`00000000 : nt!KeBugCheckEx
ffffd305`7fcd7f00 fffff805`0c8ac9e7 : ffffc28a`322f6800 ffffe5bf`ff90fd80 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e
ffffd305`7fcd8010 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`dfffc878 00000000`00000000 0a000002`563b0867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffd305`7fcd80d0 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`f96fffe0 00000000`00000000 0a000002`5628b867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffd305`7fcd8190 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`f97cb7f8 ffffe5f2`00000000 0a000002`56274867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffd305`7fcd8250 fffff805`0c8ac62c : ffffd305`7fcd8460 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffd305`7fcd8310 fffff805`0c8aaa98 : ffffd305`7fcd8460 ffffc28a`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffd305`7fcd8410 fffff805`0c8b8bf0 : ffffffff`ffffffff ffffc28a`322f6678 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffd305`7fcd87b0 fffff805`0cdc7a5d : ffffc28a`2b1a4830 00000000`000b2000 ffffc28a`3020bae0 00000000`00000000 : nt!MiDeleteVad+0x860
ffffd305`7fcd8970 fffff805`0cdc7853 : ffffc28a`3020bae0 00007fff`21fb0000 ffffc28a`2b196d00 00000000`00000000 : nt!MiUnmapVad+0x49
ffffd305`7fcd89a0 fffff805`0cdc76e9 : ffffc28a`322f6300 00000000`00000008 ffffc28a`262a20c0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffffd305`7fcd8a80 fffff805`0cdc73dc : ffffc28a`3069a080 00000269`762b2b00 000000b6`669bf1a0 ffffc28a`322f6300 : nt!NtUnmapViewOfSectionEx+0x99
ffffd305`7fcd8ad0 fffff805`0c9d2d18 : ffffc28a`3069a080 00000269`762b2a18 00000000`00000020 ffffc28a`00000000 : nt!NtUnmapViewOfSection+0xc
ffffd305`7fcd8b00 00007fff`23a9c604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b6`669bf068 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`23a9c604
THREAD_SHA1_HASH_MOD_FUNC: e3e3f454f5c5e2fe31f4ba7b6315002a603841a7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b4d67aab2a3257d5ed2dec242e32feabe54b26c4
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
SYMBOL_NAME: ONE_BIT
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-02-11T16:06:18.000Z
OSBUILD: 18362
OSSERVICEPACK: 628
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1991-11-30 08:21:39
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1952
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------