Atakan0658
Hectopat
- Katılım
- 4 Mart 2018
- Mesajlar
- 52
Daha fazla
- Cinsiyet
- Erkek
Sorun halen devam ediyor mu? Bir çözümünü buldun mu? Ona göre Vatan'a götüreceğim parçaları.SYSTEM_THREAD_EXCEPTION_NOT_HANDLED.
SYSTEM_SERVICE_EXCEPTION.
Memory management.
Bunlar bilgisayarımda aldığım hatalar.
Sistemim.
MSI B350 GAMING PRO anakart.
AMD Ryzen 5 2600 işlemci.
GTX 1070.
Corsair vengaence 3000 MHz RAM.
1 TB HDD.
480 GB Toshiba OCZ TR200.
Ekran kartı sürücüsünü anakart sürücüsünü güncelledim ama hata devam ediyor.
Memtest86 testi yapar mısın?
Önceden yaptıysan sonuç nedir?
Belleği neden 3000MHz değilde 2933MHz'de çalıştırıyorsun?
Güç ve Uyku ayarlarını varsayılan ayarlarına döndürüp Dengeli seçeneğine alıp bir süre test eder misin?
Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffff381537ad1d8 Arg3: 0080000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 41792 BUGCHECK_P2: fffff381537ad1d8 BUGCHECK_P3: 80000000000000 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT BUGCHECK_STR: 0x1a_41792 CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: RainbowSix.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-13-2020 22:41:38.0231 ANALYSIS_VERSION: 10.0.18362.1 x86fre STACK_TEXT: ffff830c`f1ffbef8 fffff804`7e2252ee : 00000000`0000001a 00000000`00041792 fffff381`537ad1d8 00800000`00000000 : nt!KeBugCheckEx ffff830c`f1ffbf00 fffff804`7e0ac9e7 : ffffa781`1760c9c0 fffff381`537ad1d8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e ffff830c`f1ffc010 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`c0a9bd68 00000000`00000000 0a000002`53d87867 : nt!MiWalkPageTablesRecursively+0x1e7 ffff830c`f1ffc0d0 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`fce054d8 00000000`00000000 0a000001`a87cc867 : nt!MiWalkPageTablesRecursively+0x6a1 ffff830c`f1ffc190 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`fcfe7028 fffff3f9`00000000 0a000001`f15c3867 : nt!MiWalkPageTablesRecursively+0x6a1 ffff830c`f1ffc250 fffff804`7e0ac62c : ffff830c`f1ffc460 ffffcd02`40c02c90 00000000`00000000 ffffa781`16f25e80 : nt!MiWalkPageTablesRecursively+0x6a1 ffff830c`f1ffc310 fffff804`7e0aaa98 : ffff830c`f1ffc460 fffff3f9`00000002 00000000`00000001 90000001`00000000 : nt!MiWalkPageTables+0x36c ffff830c`f1ffc410 fffff804`7e0b8bf0 : ffffffff`ffffffff ffffa781`1760c838 ffffa781`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268 ffff830c`f1ffc7b0 fffff804`7e5c7a5d : 00000000`00000000 ffffa781`24273750 ffffa781`24273750 00000000`00000000 : nt!MiDeleteVad+0x860 ffff830c`f1ffc970 fffff804`7e5c7853 : ffffa781`1751b800 00000000`00000000 000002a6`f5a30000 00000000`00000000 : nt!MiUnmapVad+0x49 ffff830c`f1ffc9a0 fffff804`7e5c76e9 : ffffa781`1760c4c0 00000000`00000008 ffffa781`16ea97a0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133 ffff830c`f1ffca80 fffff804`7e5c73dc : ffffa781`2249f080 000000ad`650fa4a0 000000ad`650fa4a0 ffffa781`1760c4c0 : nt!NtUnmapViewOfSectionEx+0x99 ffff830c`f1ffcad0 fffff804`7e1d2d18 : ffffa781`2249f080 000000ad`650fa568 000000ad`650fa320 00000000`00000000 : nt!NtUnmapViewOfSection+0xc ffff830c`f1ffcb00 00007ffc`a5c1c604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000ad`650fa028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`a5c1c604 THREAD_SHA1_HASH_MOD_FUNC: e3e3f454f5c5e2fe31f4ba7b6315002a603841a7 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b4d67aab2a3257d5ed2dec242e32feabe54b26c4 THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234 SYMBOL_NAME: ONE_BIT FOLLOWUP_NAME: MachineOwner MODULE_NAME: hardware IMAGE_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT TARGET_TIME: 2020-02-12T17:02:19.000Z OSBUILD: 18362 OSSERVICEPACK: 628 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1991-11-30 08:21:39 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 3d32 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner --------- KERNEL_MODE_HEAP_CORRUPTION (13a) The kernel mode heap manager has detected corruption in a heap. Arguments: Arg1: 0000000000000012, Type of corruption detected Arg2: ffff878ad7e00100, Address of the heap that reported the corruption Arg3: ffff878added2000, Address at which the corruption was detected Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7A39 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.L0 BIOS_DATE: 01/22/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B350M GAMING PRO (MS-7A39) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: 12 BUGCHECK_P2: ffff878ad7e00100 BUGCHECK_P3: ffff878added2000 BUGCHECK_P4: 0 CORRUPTING_POOL_ADDRESS: fffff8062d7733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffff878added2000 FAULTING_IP: nt!ExAllocatePoolWithTag+5d fffff806`2d56f06d 4885c0 test rax,rax BUGCHECK_STR: 0x13a_12 CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: chrome.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-13-2020 22:41:44.0197 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8062d51ad78 to fffff8062d3c1510 STACK_TEXT: ffffb709`b8d4f3f8 fffff806`2d51ad78 : 00000000`0000013a 00000000`00000012 ffff878a`d7e00100 ffff878a`dded2000 : nt!KeBugCheckEx ffffb709`b8d4f400 fffff806`2d51add8 : 00000000`00000012 00000000`008a0000 ffff878a`d7e00100 fffff806`2d239c1d : nt!RtlpHeapHandleError+0x40 ffffb709`b8d4f440 fffff806`2d51aa01 : ffff878a`d7e00280 00000000`00000000 ffffb709`b8d4f590 fffff806`2d233294 : nt!RtlpHpHeapHandleError+0x58 ffffb709`b8d4f470 fffff806`2d242d3d : ffff878a`d7e00280 00000000`00000000 00000036`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45 ffffb709`b8d4f4a0 fffff806`2d23330e : ffff878a`0000008a ffff878a`00000880 ffff878a`00000880 ffff878a`d7e00000 : nt!RtlpHpVsContextAllocateInternal+0x38d ffffb709`b8d4f510 fffff806`2d56f06d : 00000000`80000001 00000000`00000000 00000000`00000000 00000000`00000800 : nt!ExAllocateHeapPool+0xc0e ffffb709`b8d4f650 fffff806`2d7fcc07 : 00000000`00000100 ffffb709`b8d4f840 00000000`08000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d ffffb709`b8d4f6a0 fffff806`2d7dad65 : ffffb709`b8d4f840 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiCreatePagingFileMap+0x677 ffffb709`b8d4f7c0 fffff806`2d7da2af : 00000000`08000000 ffffb709`b8d4fb80 00000000`00000001 00000000`00000004 : nt!MiCreateSection+0x205 ffffb709`b8d4f940 fffff806`2d7da040 : 00000064`261fef00 00000000`000f0007 00000064`261fef18 ffffb907`7943e140 : nt!MiCreateSectionCommon+0x1ff ffffb709`b8d4fa20 fffff806`2d3d2e18 : ffffb907`7856e080 00000064`261ff4e8 ffffb709`b8d4faa8 0000023f`e8b64e60 : nt!NtCreateSection+0x60 ffffb709`b8d4fa90 00007ff8`182bca04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000064`261feea8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`182bca04 THREAD_SHA1_HASH_MOD_FUNC: b703b9990189b46fad16261bcd91d57070401b54 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7deeae155b30a074f22a6bf5432efe0793ed51eb THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94 FOLLOWUP_IP: nt!ExAllocatePoolWithTag+5d fffff806`2d56f06d 4885c0 test rax,rax FAULT_INSTR_CODE: fc08548 SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: nt!ExAllocatePoolWithTag+5d FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790 IMAGE_VERSION: 10.0.18362.657 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 5d FAILURE_BUCKET_ID: 0x13a_12_nt!ExAllocatePoolWithTag BUCKET_ID: 0x13a_12_nt!ExAllocatePoolWithTag PRIMARY_PROBLEM_CLASS: 0x13a_12_nt!ExAllocatePoolWithTag TARGET_TIME: 2020-02-13T19:11:44.000Z OSBUILD: 18362 OSSERVICEPACK: 657 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2005-04-23 04:40:32 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 16fd ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x13a_12_nt!exallocatepoolwithtag FAILURE_ID_HASH: {b9670819-63de-0938-5c20-377096ee8f03} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80220cf03fa, Address of the instruction which caused the bugcheck Arg3: ffff8e04ac5e17b0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80220cf03fa BUGCHECK_P3: ffff8e04ac5e17b0 BUGCHECK_P4: 0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!MiProcessCrcList+13a fffff802`20cf03fa 8b7e10 mov edi,dword ptr [rsi+10h] CONTEXT: ffff8e04ac5e17b0 -- (.cxr 0xffff8e04ac5e17b0) rax=8000000000000000 rbx=ffffc00bffdb2080 rcx=ffffa28000000000 rdx=002078c978739131 rsi=02ffa28004455570 rdi=0000000000000004 rip=fffff80220cf03fa rsp=ffff8e04ac5e21a0 rbp=ffff8e04ac5e2259 r8=ffffc00c02f76180 r9=ffffc00c02200000 r10=0000000000000000 r11=ffffa78000000000 r12=ffffc00c0093d060 r13=0000000000000000 r14=ffffc00c02200028 r15=ffffa7807123ffb0 iopl=0 nv up ei pl nz na pe cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050203 nt!MiProcessCrcList+0x13a: fffff802`20cf03fa 8b7e10 mov edi,dword ptr [rsi+10h] ds:002b:02ffa280`04455580=???????? Resetting default scope BUGCHECK_STR: 0x3B_c0000005 CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-13-2020 22:41:41.0338 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff80220cf0d9e to fffff80220cf03fa STACK_TEXT: ffff8e04`ac5e21a0 fffff802`20cf0d9e : 00000000`00000080 00000000`00000000 00000000`00000000 ffffa280`0c5da7d0 : nt!MiProcessCrcList+0x13a ffff8e04`ac5e22c0 fffff802`20cf3912 : 00000000`00000000 00000000`00000000 ffff8e04`ac5e24e0 00000000`00000000 : nt!MiCombineAllPhysicalMemory+0x30e ffff8e04`ac5e23e0 fffff802`20bfffcd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiCombineIdenticalPages+0x20e ffff8e04`ac5e2650 fffff802`207d2d18 : ffffc00b`ffdb2080 000000cf`c1c2a000 ffff8e04`ac5e2b80 ffffc00b`fe8e9f60 : nt!NtSetSystemInformation+0x5dd ffff8e04`ac5e2b00 00007ff9`282ff534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000cf`c1eff728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`282ff534 THREAD_SHA1_HASH_MOD_FUNC: 9f7f5ae14aebe5bdd59891fe3799ef6417ce15c2 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e51720b5d0470781f64b96f311802cf0e9b9fd33 THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84 FOLLOWUP_IP: nt!MiProcessCrcList+13a fffff802`20cf03fa 8b7e10 mov edi,dword ptr [rsi+10h] FAULT_INSTR_CODE: 4c107e8b SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiProcessCrcList+13a FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 29371fe3 IMAGE_VERSION: 10.0.18362.628 STACK_COMMAND: .cxr 0xffff8e04ac5e17b0 ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 13a FAILURE_BUCKET_ID: 0x3B_c0000005_nt!MiProcessCrcList BUCKET_ID: 0x3B_c0000005_nt!MiProcessCrcList PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!MiProcessCrcList TARGET_TIME: 2020-02-12T16:32:40.000Z OSBUILD: 18362 OSSERVICEPACK: 628 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1991-11-30 08:21:39 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 5973 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!miprocesscrclist FAILURE_ID_HASH: {d7db7768-4133-3f2f-1a28-ac11cb6d4f46} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80031ae5de9, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7A39 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.L0 BIOS_DATE: 01/22/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B350M GAMING PRO (MS-7A39) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff80031ae5de9 BUGCHECK_P3: 0 BUGCHECK_P4: ffffffffffffffff READ_ADDRESS: fffff80031f733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffffffffffffffff EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!RtlpHpLfhSubsegmentFreeBlock+299 fffff800`31ae5de9 49397008 cmp qword ptr [r8+8],rsi EXCEPTION_PARAMETER2: ffffffffffffffff BUGCHECK_STR: 0x1E_c0000005_R CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: csrss.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-13-2020 22:41:34.0494 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: ffffc78bfb267a00 -- (.trap 0xffffc78bfb267a00) Unable to read trap frame at ffffc78b`fb267a00 LAST_CONTROL_TRANSFER: from fffff80031c2fda7 to fffff80031bc14e0 STACK_TEXT: ffff8988`ba07aae8 fffff800`31c2fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`31ae5de9 00000000`00000000 : nt!KeBugCheckEx ffff8988`ba07aaf0 fffff800`31bd341d : 00000000`00000000 fffff800`00000000 ffffc78b`fb267a00 00000000`00000000 : nt!KiDispatchException+0x1689d7 ffff8988`ba07b1a0 fffff800`31bcf1a2 : ffffc78b`fb539170 fffff800`31a4ae66 ffffa406`d5803180 ffffa406`dd82ad68 : nt!KiExceptionDispatch+0x11d ffff8988`ba07b380 fffff800`31ae5de9 : 00000001`005000e0 00000000`00000000 00000000`00000fff 00000000`00000000 : nt!KiGeneralProtectionFault+0x322 ffff8988`ba07b510 fffff800`31a45ed7 : ffffc78b`fa800340 ffffc78b`ffa97eff ffffc78b`fa8048d0 00000000`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x299 ffff8988`ba07b5d0 fffff800`31d6f0a9 : 00000000`00000158 ffffc78b`feb03310 00000000`00000158 01000000`00100000 : nt!ExFreeHeapPool+0x357 ffff8988`ba07b6f0 fffff800`31ffa2d7 : ffffc78b`feb03350 ffffc78b`feb03350 ffffa406`d2ea67a0 fffff800`31e6d4c0 : nt!ExFreePool+0x9 ffff8988`ba07b720 fffff800`31ffa0e8 : 00000000`00000000 ffffc78b`feb03330 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x197 ffff8988`ba07b780 fffff800`31a3a9a9 : 00000000`00000000 00000000`00000000 ffff8988`ba07b909 ffffc78b`feb03380 : nt!ObpRemoveObjectRoutine+0x88 ffff8988`ba07b7e0 fffff800`31fec457 : 00000000`00000000 ffffc78b`feb03350 ffffc78b`00000001 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc9 ffff8988`ba07b820 fffff800`320385a5 : 00000000`00000000 00000000`00000000 00000000`00000004 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7 ffff8988`ba07b960 fffff800`32038241 : 00000000`00000000 ffffa406`daab6080 ffffffff`ffffff01 ffffa406`da3ee380 : nt!ExSweepHandleTable+0xd5 ffff8988`ba07ba10 fffff800`32038769 : ffffffff`ffffffff ffffa406`da3ee080 ffff8988`ba07ba60 ffffa406`00000000 : nt!ObKillProcess+0x35 ffff8988`ba07ba40 fffff800`3205e6d3 : ffffa406`da3ee080 ffffc78b`fae8a060 00000000`00000001 00000000`00000000 : nt!PspRundownSingleProcess+0x131 ffff8988`ba07bac0 fffff800`32052113 : fffff800`00000000 ffffee8c`7493d301 00000000`00000000 00000000`00000088 : nt!PspExitThread+0x60b ffff8988`ba07bbd0 fffff800`31b2a7bf : ffffa406`daab6080 00000000`00000080 ffffee8c`7493d2c0 00000000`00000001 : nt!PspTerminateThreadByPointer+0x53 ffff8988`ba07bc10 fffff800`31bc8b2a : ffffd780`d9fc7180 ffffa406`daab6080 fffff800`31b2a750 00000000`00000246 : nt!PspSystemThreadStartup+0x6f ffff8988`ba07bc60 00000000`00000000 : ffff8988`ba07c000 ffff8988`ba076000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a THREAD_SHA1_HASH_MOD_FUNC: 650aca80b8cc7391d9e9a1c3d6bf376046b26a74 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4343f43d4f2fbf0ba9d4e517789195e9edd23e83 THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb FOLLOWUP_IP: nt!ExFreePool+9 fffff800`31d6f0a9 4883c428 add rsp,28h FAULT_INSTR_CODE: 28c48348 SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: nt!ExFreePool+9 FOLLOWUP_NAME: Pool_corruption IMAGE_NAME: Pool_Corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.628 MODULE_NAME: Pool_Corruption STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!ExFreePool BUCKET_ID: 0x1E_c0000005_R_nt!ExFreePool PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!ExFreePool TARGET_TIME: 2020-02-12T18:23:36.000Z OSBUILD: 18362 OSSERVICEPACK: 628 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1991-11-30 08:21:39 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 7d9f ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!exfreepool FAILURE_ID_HASH: {ad89d73f-a540-2de7-18be-0204e4670731} Followup: Pool_corruption --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: ffffe5bfff90fd80 Arg3: 0080000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7A39 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.L0 BIOS_DATE: 01/22/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B350M GAMING PRO (MS-7A39) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: 41792 BUGCHECK_P2: ffffe5bfff90fd80 BUGCHECK_P3: 80000000000000 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT BUGCHECK_STR: 0x1a_41792 CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: WerFault.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-13-2020 22:41:31.0998 ANALYSIS_VERSION: 10.0.18362.1 x86fre STACK_TEXT: ffffd305`7fcd7ef8 fffff805`0ca252ee : 00000000`0000001a 00000000`00041792 ffffe5bf`ff90fd80 00800000`00000000 : nt!KeBugCheckEx ffffd305`7fcd7f00 fffff805`0c8ac9e7 : ffffc28a`322f6800 ffffe5bf`ff90fd80 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e ffffd305`7fcd8010 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`dfffc878 00000000`00000000 0a000002`563b0867 : nt!MiWalkPageTablesRecursively+0x1e7 ffffd305`7fcd80d0 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`f96fffe0 00000000`00000000 0a000002`5628b867 : nt!MiWalkPageTablesRecursively+0x6a1 ffffd305`7fcd8190 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`f97cb7f8 ffffe5f2`00000000 0a000002`56274867 : nt!MiWalkPageTablesRecursively+0x6a1 ffffd305`7fcd8250 fffff805`0c8ac62c : ffffd305`7fcd8460 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1 ffffd305`7fcd8310 fffff805`0c8aaa98 : ffffd305`7fcd8460 ffffc28a`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c ffffd305`7fcd8410 fffff805`0c8b8bf0 : ffffffff`ffffffff ffffc28a`322f6678 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268 ffffd305`7fcd87b0 fffff805`0cdc7a5d : ffffc28a`2b1a4830 00000000`000b2000 ffffc28a`3020bae0 00000000`00000000 : nt!MiDeleteVad+0x860 ffffd305`7fcd8970 fffff805`0cdc7853 : ffffc28a`3020bae0 00007fff`21fb0000 ffffc28a`2b196d00 00000000`00000000 : nt!MiUnmapVad+0x49 ffffd305`7fcd89a0 fffff805`0cdc76e9 : ffffc28a`322f6300 00000000`00000008 ffffc28a`262a20c0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133 ffffd305`7fcd8a80 fffff805`0cdc73dc : ffffc28a`3069a080 00000269`762b2b00 000000b6`669bf1a0 ffffc28a`322f6300 : nt!NtUnmapViewOfSectionEx+0x99 ffffd305`7fcd8ad0 fffff805`0c9d2d18 : ffffc28a`3069a080 00000269`762b2a18 00000000`00000020 ffffc28a`00000000 : nt!NtUnmapViewOfSection+0xc ffffd305`7fcd8b00 00007fff`23a9c604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000b6`669bf068 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`23a9c604 THREAD_SHA1_HASH_MOD_FUNC: e3e3f454f5c5e2fe31f4ba7b6315002a603841a7 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b4d67aab2a3257d5ed2dec242e32feabe54b26c4 THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234 SYMBOL_NAME: ONE_BIT FOLLOWUP_NAME: MachineOwner MODULE_NAME: hardware IMAGE_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT TARGET_TIME: 2020-02-11T16:06:18.000Z OSBUILD: 18362 OSSERVICEPACK: 628 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1991-11-30 08:21:39 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 1952 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner ---------
Biostan bellekleri D.O.C.P ile 3000 MHz yaptıktan sonra mavi ekran hatası sorunum çözüldü. Normalde 2133 MHz de çalışıyordu.Arkadaşlar mavi ekran sorunlarım devam ediyor
Neden olduğu hakkında da çok bir fikrim yok
Yardımcı olabilir misiniz?
win 10 2004 sürümüne güncelledim mavi ekran hataları devam etti. 1909 a geri döndüm memtest 86 testi yaptım ve sorun çıkmadı. Driverlerı güncelledim ama bir türlü mavi ekran hatalarından kurtulamadım. Yarrdımcı olabilir misiniz? minidump - Google DriveMemtest86 testi yapar mısın?
Önceden yaptıysan sonuç nedir?
Belleği neden 3000MHz değilde 2933MHz'de çalıştırıyorsun?
Güç ve Uyku ayarlarını varsayılan ayarlarına döndürüp Dengeli seçeneğine alıp bir süre test eder misin?
Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffff381537ad1d8 Arg3: 0080000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 41792 BUGCHECK_P2: fffff381537ad1d8 BUGCHECK_P3: 80000000000000 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT BUGCHECK_STR: 0x1a_41792 CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: RainbowSix.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-13-2020 22:41:38.0231 ANALYSIS_VERSION: 10.0.18362.1 x86fre STACK_TEXT: ffff830c`f1ffbef8 fffff804`7e2252ee : 00000000`0000001a 00000000`00041792 fffff381`537ad1d8 00800000`00000000 : nt!KeBugCheckEx ffff830c`f1ffbf00 fffff804`7e0ac9e7 : ffffa781`1760c9c0 fffff381`537ad1d8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e ffff830c`f1ffc010 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`c0a9bd68 00000000`00000000 0a000002`53d87867 : nt!MiWalkPageTablesRecursively+0x1e7 ffff830c`f1ffc0d0 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`fce054d8 00000000`00000000 0a000001`a87cc867 : nt!MiWalkPageTablesRecursively+0x6a1 ffff830c`f1ffc190 fffff804`7e0acea1 : ffff830c`f1ffc460 fffff3f9`fcfe7028 fffff3f9`00000000 0a000001`f15c3867 : nt!MiWalkPageTablesRecursively+0x6a1 ffff830c`f1ffc250 fffff804`7e0ac62c : ffff830c`f1ffc460 ffffcd02`40c02c90 00000000`00000000 ffffa781`16f25e80 : nt!MiWalkPageTablesRecursively+0x6a1 ffff830c`f1ffc310 fffff804`7e0aaa98 : ffff830c`f1ffc460 fffff3f9`00000002 00000000`00000001 90000001`00000000 : nt!MiWalkPageTables+0x36c ffff830c`f1ffc410 fffff804`7e0b8bf0 : ffffffff`ffffffff ffffa781`1760c838 ffffa781`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268 ffff830c`f1ffc7b0 fffff804`7e5c7a5d : 00000000`00000000 ffffa781`24273750 ffffa781`24273750 00000000`00000000 : nt!MiDeleteVad+0x860 ffff830c`f1ffc970 fffff804`7e5c7853 : ffffa781`1751b800 00000000`00000000 000002a6`f5a30000 00000000`00000000 : nt!MiUnmapVad+0x49 ffff830c`f1ffc9a0 fffff804`7e5c76e9 : ffffa781`1760c4c0 00000000`00000008 ffffa781`16ea97a0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133 ffff830c`f1ffca80 fffff804`7e5c73dc : ffffa781`2249f080 000000ad`650fa4a0 000000ad`650fa4a0 ffffa781`1760c4c0 : nt!NtUnmapViewOfSectionEx+0x99 ffff830c`f1ffcad0 fffff804`7e1d2d18 : ffffa781`2249f080 000000ad`650fa568 000000ad`650fa320 00000000`00000000 : nt!NtUnmapViewOfSection+0xc ffff830c`f1ffcb00 00007ffc`a5c1c604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000ad`650fa028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`a5c1c604 THREAD_SHA1_HASH_MOD_FUNC: e3e3f454f5c5e2fe31f4ba7b6315002a603841a7 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b4d67aab2a3257d5ed2dec242e32feabe54b26c4 THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234 SYMBOL_NAME: ONE_BIT FOLLOWUP_NAME: MachineOwner MODULE_NAME: hardware IMAGE_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT TARGET_TIME: 2020-02-12T17:02:19.000Z OSBUILD: 18362 OSSERVICEPACK: 628 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1991-11-30 08:21:39 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 3d32 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner --------- KERNEL_MODE_HEAP_CORRUPTION (13a) The kernel mode heap manager has detected corruption in a heap. Arguments: Arg1: 0000000000000012, Type of corruption detected Arg2: ffff878ad7e00100, Address of the heap that reported the corruption Arg3: ffff878added2000, Address at which the corruption was detected Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7A39 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.L0 BIOS_DATE: 01/22/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B350M GAMING PRO (MS-7A39) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: 12 BUGCHECK_P2: ffff878ad7e00100 BUGCHECK_P3: ffff878added2000 BUGCHECK_P4: 0 CORRUPTING_POOL_ADDRESS: fffff8062d7733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffff878added2000 FAULTING_IP: nt!ExAllocatePoolWithTag+5d fffff806`2d56f06d 4885c0 test rax,rax BUGCHECK_STR: 0x13a_12 CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: chrome.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-13-2020 22:41:44.0197 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8062d51ad78 to fffff8062d3c1510 STACK_TEXT: ffffb709`b8d4f3f8 fffff806`2d51ad78 : 00000000`0000013a 00000000`00000012 ffff878a`d7e00100 ffff878a`dded2000 : nt!KeBugCheckEx ffffb709`b8d4f400 fffff806`2d51add8 : 00000000`00000012 00000000`008a0000 ffff878a`d7e00100 fffff806`2d239c1d : nt!RtlpHeapHandleError+0x40 ffffb709`b8d4f440 fffff806`2d51aa01 : ffff878a`d7e00280 00000000`00000000 ffffb709`b8d4f590 fffff806`2d233294 : nt!RtlpHpHeapHandleError+0x58 ffffb709`b8d4f470 fffff806`2d242d3d : ffff878a`d7e00280 00000000`00000000 00000036`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45 ffffb709`b8d4f4a0 fffff806`2d23330e : ffff878a`0000008a ffff878a`00000880 ffff878a`00000880 ffff878a`d7e00000 : nt!RtlpHpVsContextAllocateInternal+0x38d ffffb709`b8d4f510 fffff806`2d56f06d : 00000000`80000001 00000000`00000000 00000000`00000000 00000000`00000800 : nt!ExAllocateHeapPool+0xc0e ffffb709`b8d4f650 fffff806`2d7fcc07 : 00000000`00000100 ffffb709`b8d4f840 00000000`08000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d ffffb709`b8d4f6a0 fffff806`2d7dad65 : ffffb709`b8d4f840 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiCreatePagingFileMap+0x677 ffffb709`b8d4f7c0 fffff806`2d7da2af : 00000000`08000000 ffffb709`b8d4fb80 00000000`00000001 00000000`00000004 : nt!MiCreateSection+0x205 ffffb709`b8d4f940 fffff806`2d7da040 : 00000064`261fef00 00000000`000f0007 00000064`261fef18 ffffb907`7943e140 : nt!MiCreateSectionCommon+0x1ff ffffb709`b8d4fa20 fffff806`2d3d2e18 : ffffb907`7856e080 00000064`261ff4e8 ffffb709`b8d4faa8 0000023f`e8b64e60 : nt!NtCreateSection+0x60 ffffb709`b8d4fa90 00007ff8`182bca04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000064`261feea8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`182bca04 THREAD_SHA1_HASH_MOD_FUNC: b703b9990189b46fad16261bcd91d57070401b54 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7deeae155b30a074f22a6bf5432efe0793ed51eb THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94 FOLLOWUP_IP: nt!ExAllocatePoolWithTag+5d fffff806`2d56f06d 4885c0 test rax,rax FAULT_INSTR_CODE: fc08548 SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: nt!ExAllocatePoolWithTag+5d FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790 IMAGE_VERSION: 10.0.18362.657 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 5d FAILURE_BUCKET_ID: 0x13a_12_nt!ExAllocatePoolWithTag BUCKET_ID: 0x13a_12_nt!ExAllocatePoolWithTag PRIMARY_PROBLEM_CLASS: 0x13a_12_nt!ExAllocatePoolWithTag TARGET_TIME: 2020-02-13T19:11:44.000Z OSBUILD: 18362 OSSERVICEPACK: 657 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2005-04-23 04:40:32 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 16fd ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x13a_12_nt!exallocatepoolwithtag FAILURE_ID_HASH: {b9670819-63de-0938-5c20-377096ee8f03} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80220cf03fa, Address of the instruction which caused the bugcheck Arg3: ffff8e04ac5e17b0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80220cf03fa BUGCHECK_P3: ffff8e04ac5e17b0 BUGCHECK_P4: 0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!MiProcessCrcList+13a fffff802`20cf03fa 8b7e10 mov edi,dword ptr [rsi+10h] CONTEXT: ffff8e04ac5e17b0 -- (.cxr 0xffff8e04ac5e17b0) rax=8000000000000000 rbx=ffffc00bffdb2080 rcx=ffffa28000000000 rdx=002078c978739131 rsi=02ffa28004455570 rdi=0000000000000004 rip=fffff80220cf03fa rsp=ffff8e04ac5e21a0 rbp=ffff8e04ac5e2259 r8=ffffc00c02f76180 r9=ffffc00c02200000 r10=0000000000000000 r11=ffffa78000000000 r12=ffffc00c0093d060 r13=0000000000000000 r14=ffffc00c02200028 r15=ffffa7807123ffb0 iopl=0 nv up ei pl nz na pe cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050203 nt!MiProcessCrcList+0x13a: fffff802`20cf03fa 8b7e10 mov edi,dword ptr [rsi+10h] ds:002b:02ffa280`04455580=???????? Resetting default scope BUGCHECK_STR: 0x3B_c0000005 CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-13-2020 22:41:41.0338 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff80220cf0d9e to fffff80220cf03fa STACK_TEXT: ffff8e04`ac5e21a0 fffff802`20cf0d9e : 00000000`00000080 00000000`00000000 00000000`00000000 ffffa280`0c5da7d0 : nt!MiProcessCrcList+0x13a ffff8e04`ac5e22c0 fffff802`20cf3912 : 00000000`00000000 00000000`00000000 ffff8e04`ac5e24e0 00000000`00000000 : nt!MiCombineAllPhysicalMemory+0x30e ffff8e04`ac5e23e0 fffff802`20bfffcd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiCombineIdenticalPages+0x20e ffff8e04`ac5e2650 fffff802`207d2d18 : ffffc00b`ffdb2080 000000cf`c1c2a000 ffff8e04`ac5e2b80 ffffc00b`fe8e9f60 : nt!NtSetSystemInformation+0x5dd ffff8e04`ac5e2b00 00007ff9`282ff534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000cf`c1eff728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`282ff534 THREAD_SHA1_HASH_MOD_FUNC: 9f7f5ae14aebe5bdd59891fe3799ef6417ce15c2 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e51720b5d0470781f64b96f311802cf0e9b9fd33 THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84 FOLLOWUP_IP: nt!MiProcessCrcList+13a fffff802`20cf03fa 8b7e10 mov edi,dword ptr [rsi+10h] FAULT_INSTR_CODE: 4c107e8b SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiProcessCrcList+13a FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 29371fe3 IMAGE_VERSION: 10.0.18362.628 STACK_COMMAND: .cxr 0xffff8e04ac5e17b0 ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 13a FAILURE_BUCKET_ID: 0x3B_c0000005_nt!MiProcessCrcList BUCKET_ID: 0x3B_c0000005_nt!MiProcessCrcList PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!MiProcessCrcList TARGET_TIME: 2020-02-12T16:32:40.000Z OSBUILD: 18362 OSSERVICEPACK: 628 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1991-11-30 08:21:39 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 5973 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!miprocesscrclist FAILURE_ID_HASH: {d7db7768-4133-3f2f-1a28-ac11cb6d4f46} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80031ae5de9, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7A39 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.L0 BIOS_DATE: 01/22/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B350M GAMING PRO (MS-7A39) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff80031ae5de9 BUGCHECK_P3: 0 BUGCHECK_P4: ffffffffffffffff READ_ADDRESS: fffff80031f733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffffffffffffffff EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!RtlpHpLfhSubsegmentFreeBlock+299 fffff800`31ae5de9 49397008 cmp qword ptr [r8+8],rsi EXCEPTION_PARAMETER2: ffffffffffffffff BUGCHECK_STR: 0x1E_c0000005_R CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: csrss.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-13-2020 22:41:34.0494 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: ffffc78bfb267a00 -- (.trap 0xffffc78bfb267a00) Unable to read trap frame at ffffc78b`fb267a00 LAST_CONTROL_TRANSFER: from fffff80031c2fda7 to fffff80031bc14e0 STACK_TEXT: ffff8988`ba07aae8 fffff800`31c2fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`31ae5de9 00000000`00000000 : nt!KeBugCheckEx ffff8988`ba07aaf0 fffff800`31bd341d : 00000000`00000000 fffff800`00000000 ffffc78b`fb267a00 00000000`00000000 : nt!KiDispatchException+0x1689d7 ffff8988`ba07b1a0 fffff800`31bcf1a2 : ffffc78b`fb539170 fffff800`31a4ae66 ffffa406`d5803180 ffffa406`dd82ad68 : nt!KiExceptionDispatch+0x11d ffff8988`ba07b380 fffff800`31ae5de9 : 00000001`005000e0 00000000`00000000 00000000`00000fff 00000000`00000000 : nt!KiGeneralProtectionFault+0x322 ffff8988`ba07b510 fffff800`31a45ed7 : ffffc78b`fa800340 ffffc78b`ffa97eff ffffc78b`fa8048d0 00000000`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x299 ffff8988`ba07b5d0 fffff800`31d6f0a9 : 00000000`00000158 ffffc78b`feb03310 00000000`00000158 01000000`00100000 : nt!ExFreeHeapPool+0x357 ffff8988`ba07b6f0 fffff800`31ffa2d7 : ffffc78b`feb03350 ffffc78b`feb03350 ffffa406`d2ea67a0 fffff800`31e6d4c0 : nt!ExFreePool+0x9 ffff8988`ba07b720 fffff800`31ffa0e8 : 00000000`00000000 ffffc78b`feb03330 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x197 ffff8988`ba07b780 fffff800`31a3a9a9 : 00000000`00000000 00000000`00000000 ffff8988`ba07b909 ffffc78b`feb03380 : nt!ObpRemoveObjectRoutine+0x88 ffff8988`ba07b7e0 fffff800`31fec457 : 00000000`00000000 ffffc78b`feb03350 ffffc78b`00000001 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc9 ffff8988`ba07b820 fffff800`320385a5 : 00000000`00000000 00000000`00000000 00000000`00000004 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7 ffff8988`ba07b960 fffff800`32038241 : 00000000`00000000 ffffa406`daab6080 ffffffff`ffffff01 ffffa406`da3ee380 : nt!ExSweepHandleTable+0xd5 ffff8988`ba07ba10 fffff800`32038769 : ffffffff`ffffffff ffffa406`da3ee080 ffff8988`ba07ba60 ffffa406`00000000 : nt!ObKillProcess+0x35 ffff8988`ba07ba40 fffff800`3205e6d3 : ffffa406`da3ee080 ffffc78b`fae8a060 00000000`00000001 00000000`00000000 : nt!PspRundownSingleProcess+0x131 ffff8988`ba07bac0 fffff800`32052113 : fffff800`00000000 ffffee8c`7493d301 00000000`00000000 00000000`00000088 : nt!PspExitThread+0x60b ffff8988`ba07bbd0 fffff800`31b2a7bf : ffffa406`daab6080 00000000`00000080 ffffee8c`7493d2c0 00000000`00000001 : nt!PspTerminateThreadByPointer+0x53 ffff8988`ba07bc10 fffff800`31bc8b2a : ffffd780`d9fc7180 ffffa406`daab6080 fffff800`31b2a750 00000000`00000246 : nt!PspSystemThreadStartup+0x6f ffff8988`ba07bc60 00000000`00000000 : ffff8988`ba07c000 ffff8988`ba076000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a THREAD_SHA1_HASH_MOD_FUNC: 650aca80b8cc7391d9e9a1c3d6bf376046b26a74 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4343f43d4f2fbf0ba9d4e517789195e9edd23e83 THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb FOLLOWUP_IP: nt!ExFreePool+9 fffff800`31d6f0a9 4883c428 add rsp,28h FAULT_INSTR_CODE: 28c48348 SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: nt!ExFreePool+9 FOLLOWUP_NAME: Pool_corruption IMAGE_NAME: Pool_Corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.628 MODULE_NAME: Pool_Corruption STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!ExFreePool BUCKET_ID: 0x1E_c0000005_R_nt!ExFreePool PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!ExFreePool TARGET_TIME: 2020-02-12T18:23:36.000Z OSBUILD: 18362 OSSERVICEPACK: 628 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1991-11-30 08:21:39 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 7d9f ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!exfreepool FAILURE_ID_HASH: {ad89d73f-a540-2de7-18be-0204e4670731} Followup: Pool_corruption --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: ffffe5bfff90fd80 Arg3: 0080000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7A39 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.L0 BIOS_DATE: 01/22/2019 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B350M GAMING PRO (MS-7A39) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: 41792 BUGCHECK_P2: ffffe5bfff90fd80 BUGCHECK_P3: 80000000000000 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT BUGCHECK_STR: 0x1a_41792 CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: WerFault.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-13-2020 22:41:31.0998 ANALYSIS_VERSION: 10.0.18362.1 x86fre STACK_TEXT: ffffd305`7fcd7ef8 fffff805`0ca252ee : 00000000`0000001a 00000000`00041792 ffffe5bf`ff90fd80 00800000`00000000 : nt!KeBugCheckEx ffffd305`7fcd7f00 fffff805`0c8ac9e7 : ffffc28a`322f6800 ffffe5bf`ff90fd80 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e ffffd305`7fcd8010 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`dfffc878 00000000`00000000 0a000002`563b0867 : nt!MiWalkPageTablesRecursively+0x1e7 ffffd305`7fcd80d0 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`f96fffe0 00000000`00000000 0a000002`5628b867 : nt!MiWalkPageTablesRecursively+0x6a1 ffffd305`7fcd8190 fffff805`0c8acea1 : ffffd305`7fcd8460 ffffe5f2`f97cb7f8 ffffe5f2`00000000 0a000002`56274867 : nt!MiWalkPageTablesRecursively+0x6a1 ffffd305`7fcd8250 fffff805`0c8ac62c : ffffd305`7fcd8460 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1 ffffd305`7fcd8310 fffff805`0c8aaa98 : ffffd305`7fcd8460 ffffc28a`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c ffffd305`7fcd8410 fffff805`0c8b8bf0 : ffffffff`ffffffff ffffc28a`322f6678 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268 ffffd305`7fcd87b0 fffff805`0cdc7a5d : ffffc28a`2b1a4830 00000000`000b2000 ffffc28a`3020bae0 00000000`00000000 : nt!MiDeleteVad+0x860 ffffd305`7fcd8970 fffff805`0cdc7853 : ffffc28a`3020bae0 00007fff`21fb0000 ffffc28a`2b196d00 00000000`00000000 : nt!MiUnmapVad+0x49 ffffd305`7fcd89a0 fffff805`0cdc76e9 : ffffc28a`322f6300 00000000`00000008 ffffc28a`262a20c0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133 ffffd305`7fcd8a80 fffff805`0cdc73dc : ffffc28a`3069a080 00000269`762b2b00 000000b6`669bf1a0 ffffc28a`322f6300 : nt!NtUnmapViewOfSectionEx+0x99 ffffd305`7fcd8ad0 fffff805`0c9d2d18 : ffffc28a`3069a080 00000269`762b2a18 00000000`00000020 ffffc28a`00000000 : nt!NtUnmapViewOfSection+0xc ffffd305`7fcd8b00 00007fff`23a9c604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000b6`669bf068 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`23a9c604 THREAD_SHA1_HASH_MOD_FUNC: e3e3f454f5c5e2fe31f4ba7b6315002a603841a7 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b4d67aab2a3257d5ed2dec242e32feabe54b26c4 THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234 SYMBOL_NAME: ONE_BIT FOLLOWUP_NAME: MachineOwner MODULE_NAME: hardware IMAGE_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT TARGET_TIME: 2020-02-11T16:06:18.000Z OSBUILD: 18362 OSSERVICEPACK: 628 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1991-11-30 08:21:39 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 1952 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner ---------