Ryzen 5 3600 Windows 10 mavi ekran hatası

Qsamer

Decapat
Katılım
31 Aralık 2019
Mesajlar
31
Merhabalar, ben yeni bir sistem topladım.
Sistem özellikleri.
  • MSI RX 580 Armor 8 GB OC.
  • AMD Ryzen 5 3600.
  • Gigabyte B450M S2H.
  • Corsair DDR4 8 GB 3000MHz.

Sisteme Windows 10 kurdum ve birçok mavi ekran hatası aldım. İnternetten araştırdım ve tekrar Windows 10 temiz kurulum yapma kararı aldım. Ancak mavi ekran hataları almaya devam ettim.
Şansımı tekrar denemek için yine Windows 10 temiz kurulum yaptım ama sonuç değişmedi. Bu yüzden Windows 8.1 sürümüne geçtim. AMD'nin 8.1 desteği olmadığını öğrenip tekrar.
Windows 10 sürümüne geçtim. Mavi ekran almaya devam ettim. AMD'nin 19.12.3 (isteğe bağlı) sürümünü indirip kurdum. Mavi ekran almaya devam edince driver ı silip 19.12.2 (önerilen) sürümünü indirip kurdum. Sonra Realtek'in High Definition Audio codecs yazılımını indirip eski driverları silip yükledim. 3-4 saat boyunca mavi ekran almadım ama tabii sonra yine mavi ekran hatası almaya başladım.
Son kurduğum Windows'da aldığım mavi ekran hata kodları

IRQL_NOT_LESS_OR_EQUAL.
PAGE_FAULT_IN_NONPAGED_AREA.
KERNEL_SECURITY_CHECK_FAILURE.
INVALID_WORK_QUEUE_ITEM.
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY.

Minidump dosyası

Yardımcı olursanız sevinirim.
 
Son düzenleyen: Moderatör:
Memtest86 testi yapar mısın?
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8040001003e, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff8040001003e, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: fffff8040001003e

BUGCHECK_P2: 10

BUGCHECK_P3: fffff8040001003e

BUGCHECK_P4: 2

READ_ADDRESS: fffff8041a3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 fffff8040001003e

FAULTING_IP:
+0
fffff804`0001003e ??              ???

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-31-2019 19:26:34.0161

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff9886ca53a210 -- (.trap 0xffff9886ca53a210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff860edfc48080
rdx=ffff860edebfe160 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040001003e rsp=ffff9886ca53a3a0 rbp=ffff860edfc49030
 r8=ffff9886ca53a208  r9=000000000000003e r10=fffff80419e663e0
r11=ffff860edfc48080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
fffff804`0001003e ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80419fe35d6 to fffff80419fc14e0

FAILED_INSTRUCTION_ADDRESS:
+0
fffff804`0001003e ??              ???

STACK_TEXT: 
ffff9886`ca539f68 fffff804`19fe35d6 : 00000000`00000050 fffff804`0001003e 00000000`00000010 ffff9886`ca53a210 : nt!KeBugCheckEx
ffff9886`ca539f70 fffff804`19e72eef : 00000000`00000000 00000000`00000010 00000000`00000000 fffff804`0001003e : nt!MiSystemFault+0x1d6866
ffff9886`ca53a070 fffff804`19fcf520 : ffff860e`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x34f
ffff9886`ca53a210 fffff804`0001003e : ffff860e`e4bd89a0 ffff860e`df96bca0 ffff9886`ca53a450 00000000`00000000 : nt!KiPageFault+0x360
ffff9886`ca53a3a0 ffff860e`e4bd89a0 : ffff860e`df96bca0 ffff9886`ca53a450 00000000`00000000 00000000`00000000 : 0xfffff804`0001003e
ffff9886`ca53a3a8 ffff860e`df96bca0 : ffff9886`ca53a450 00000000`00000000 00000000`00000000 fffff804`19e89e95 : 0xffff860e`e4bd89a0
ffff9886`ca53a3b0 ffff9886`ca53a450 : 00000000`00000000 00000000`00000000 fffff804`19e89e95 ffff9886`ca53a450 : 0xffff860e`df96bca0
ffff9886`ca53a3b8 00000000`00000000 : 00000000`00000000 fffff804`19e89e95 ffff9886`ca53a450 ffff860e`dfc49030 : 0xffff9886`ca53a450


THREAD_SHA1_HASH_MOD_FUNC:  35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c0efb11bdbdabbfe638cd9930c42dad821618e02

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff804`19fe35d6 cc              int     3

FAULT_INSTR_CODE:  4d8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiSystemFault+1d6866

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  1d6866

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

PRIMARY_PROBLEM_CLASS:  AV_INVALID_BAD_IP_nt!MiSystemFault

TARGET_TIME:  2019-12-30T20:00:37.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  6750

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_invalid_bad_ip_nt!misystemfault

FAILURE_ID_HASH:  {48ad9531-e3f8-1044-fc5f-d917677674c7}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffa789ddd41840, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa789ddd41798, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffa789ddd41840

BUGCHECK_P3: ffffa789ddd41798

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa789ddd41840 -- (.trap 0xffffa789ddd41840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbf810de7ea80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff878386e8a158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8007d23ba28 rsp=ffffa789ddd419d0 rbp=ffffbf810de79180
 r8=0000000000000000  r9=000000022f50863c r10=0000000000000000
r11=ffffaf7cc7400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x528:
fffff800`7d23ba28 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa789ddd41798 -- (.exr 0xffffa789ddd41798)
ExceptionAddress: fffff8007d23ba28 (nt!KiCommitThreadWait+0x0000000000000528)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  RobloxPlayerBeta.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-31-2019 19:26:42.0387

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8007d3d32e9 to fffff8007d3c14e0

STACK_TEXT: 
ffffa789`ddd41518 fffff800`7d3d32e9 : 00000000`00000139 00000000`00000003 ffffa789`ddd41840 ffffa789`ddd41798 : nt!KeBugCheckEx
ffffa789`ddd41520 fffff800`7d3d3710 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa789`ddd41660 fffff800`7d3d1aa5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffa789`ddd41840 fffff800`7d23ba28 : ffff8783`86e8b080 ffffbf81`00000000 ffff8783`00000000 ffff8783`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
ffffa789`ddd419d0 fffff800`7d3040e4 : 00000000`00000001 00000000`00000000 ffffa789`00000025 00000000`00000000 : nt!KiCommitThreadWait+0x528
ffffa789`ddd41a70 fffff800`7d8b0825 : ffffa789`ddd41b80 00000000`0977fab4 00000000`77763620 00000000`00000000 : nt!KeWaitForAlertByThreadId+0xd4
ffffa789`ddd41ad0 fffff800`7d3d2d18 : ffff8783`86e8b080 00000000`00000000 00000000`00000000 ffffffff`fffd8f00 : nt!NtWaitForAlertByThreadId+0x65
ffffa789`ddd41b00 00000000`77761cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0967f218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77761cbc


THREAD_SHA1_HASH_MOD_FUNC:  14426b7ada71c4972d6a006ea2472f886aab58a5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  485142955ed66a9a6b1805ae908e3c5d2a70b069

THREAD_SHA1_HASH_MOD:  cb5f414824c2521bcc505eaa03e92fa10922dad8

FOLLOWUP_IP:
nt!KiCommitThreadWait+528
fffff800`7d23ba28 cd29            int     29h

FAULT_INSTR_CODE:  894829cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!KiCommitThreadWait+528

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  528

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait

TARGET_TIME:  2019-12-31T12:50:25.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  16e0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kicommitthreadwait

FAILURE_ID_HASH:  {369b7001-cfef-011b-6243-985c04f34d42}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 000000000001003f, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 1003f

TRAP_FRAME:  0000000000000000 -- (.trap 0x0)

EXCEPTION_RECORD:  0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-31-2019 19:26:38.0498

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff807229c9f5b to fffff807229c14e0

STACK_TEXT: 
fffffc01`1099c118 fffff807`229c9f5b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffc01`1099c120 fffff807`250f5235 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`22839878 : nt!guard_icall_bugcheck+0x1b
fffffc01`1099c150 fffff807`250f14c2 : ffff9c0b`d35765e8 ffff9c0b`d3576460 ffff9c0b`d55cdc90 00000000`00000000 : FLTMGR!FltpPerfTraceOperationCallback+0x179
fffffc01`1099c1c0 fffff807`250e45a0 : fffffc01`1099c3a0 00000000`00004000 ffff9c0b`d63f4004 00000000`00020000 : FLTMGR!FltpPerformPreCallbacks+0xcd62
fffffc01`1099c2d0 fffff807`250e4112 : 00000000`00000000 fffffc01`1099c3a0 ffff9c0b`d63f4010 fffffc01`1099c3b0 : FLTMGR!FltpPassThroughInternal+0x90
fffffc01`1099c300 fffff807`250e3efe : fffffc01`1099c3a0 0a000001`20f409ff 0a000001`00000000 ffff9c0b`00000000 : FLTMGR!FltpPassThrough+0x162
fffffc01`1099c380 fffff807`22831f79 : ffff9c0b`d63f4010 fffff807`22831fb7 00000000`0000000d ffff9c0b`00000004 : FLTMGR!FltpDispatch+0x9e
fffffc01`1099c3e0 fffff807`22854493 : fffffc01`1099c4f0 ffff9c0b`d63f4010 ffff9c0b`d7ec2e80 ffff9c0b`cdf65d60 : nt!IofCallDriver+0x59
fffffc01`1099c420 fffff807`228fa730 : fffffc01`1099c4f0 fffffc01`1099c560 00000000`00000010 00000000`00000000 : nt!IoSynchronousPageWriteEx+0x137
fffffc01`1099c460 fffff807`228fa570 : 00000000`00000000 00000000`00000000 00000000`04200000 ffffd507`0f740000 : nt!MiZeroPageWrite+0x18c
fffffc01`1099c600 fffff807`228fa4d8 : 00000000`00200000 fffff807`25b21600 ffff9c0b`d7ec2e80 00000000`fffffe00 : nt!MmZeroPageWrite+0x48
fffffc01`1099c630 fffff807`228f9ddd : 00000000`00200000 00000000`01e00000 00000000`05a40000 0000001c`00000004 : nt!CcZeroDataOnDisk+0x38
fffffc01`1099c660 fffff807`25c43505 : ffffae80`edd8bb00 00000000`04200000 fffffc01`1099c788 00000000`00000001 : nt!CcZeroData+0x20d
fffffc01`1099c720 fffff807`25b0dca0 : ffff9c0b`d575a6d8 ffffae80`edd8bb40 ffff9c0b`d7ec2e80 00000000`00000700 : Ntfs!NtfsZeroData+0x13d
fffffc01`1099c800 fffff807`25b2199b : ffff9c0b`d575a6d8 fffff807`25b21600 00000000`00000000 ffff9c0b`d575a6d8 : Ntfs!NtfsCommonWrite+0x15c0
fffffc01`1099ca30 fffff807`228bd095 : ffff9c0b`cb690cc0 ffff9c0b`d2293040 ffff9c0b`cb690cc0 ffff9c0b`d575a768 : Ntfs!NtfsFspDispatch+0x39b
fffffc01`1099cb70 fffff807`2292a7a5 : ffff9c0b`d2293040 00000000`00000080 ffff9c0b`cb67b180 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
fffffc01`1099cc10 fffff807`229c8b2a : ffffbe81`48f20180 ffff9c0b`d2293040 fffff807`2292a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffc01`1099cc60 00000000`00000000 : fffffc01`1099d000 fffffc01`10997000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  f828e04b73a96012193978f497610b64b807883b

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ef3acde718127db115b8bf657ef4ef14d3d60067

THREAD_SHA1_HASH_MOD:  6f7db1a4ec42380c703ddd74b8c05f452d17543d

FOLLOWUP_IP:
nt!guard_icall_bugcheck+1b
fffff807`229c9f5b 90              nop

FAULT_INSTR_CODE:  ccccc390

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!guard_icall_bugcheck+1b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1b

FAILURE_BUCKET_ID:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

BUCKET_ID:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

PRIMARY_PROBLEM_CLASS:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

TARGET_TIME:  2019-12-30T20:07:13.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  83ba

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_0_legacy_gs_violation_nt!guard_icall_bugcheck

FAILURE_ID_HASH:  {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000095, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8043aa22838, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: ff

BUGCHECK_P3: 95

BUGCHECK_P4: fffff8043aa22838

WRITE_ADDRESS: fffff8043af733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000000

CURRENT_IRQL:  0

FAULTING_IP:
nt!PpmIdlePrepare+448
fffff804`3aa22838 488901          mov     qword ptr [rcx],rax

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-31-2019 19:26:46.0931

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff91034deb5780 -- (.trap 0xffff91034deb5780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043aa22838 rsp=ffff91034deb5910 rbp=ffff91034deb5a10
 r8=00000000ffffffff  r9=ffff9d00ee312100 r10=ffffe08ec097c000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!PpmIdlePrepare+0x448:
fffff804`3aa22838 488901          mov     qword ptr [rcx],rax ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8043abd32e9 to fffff8043abc14e0

STACK_TEXT: 
ffff9103`4deb5638 fffff804`3abd32e9 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`00000095 : nt!KeBugCheckEx
ffff9103`4deb5640 fffff804`3abcf62b : 00000000`00000000 00000000`00000000 00000000`00000886 fffff804`3acf024b : nt!KiBugCheckDispatch+0x69
ffff9103`4deb5780 fffff804`3aa22838 : ffffffff`ffffffff ffff9103`4deb5a10 ffff9d00`ee312180 ffff9d00`ee312180 : nt!KiPageFault+0x46b
ffff9103`4deb5910 fffff804`3aa21446 : 00000000`00000003 00000000`00000002 ffffe08e`c0910100 00000000`00000008 : nt!PpmIdlePrepare+0x448
ffff9103`4deb5b00 fffff804`3abc4fe8 : ffffffff`00000000 ffff9d00`ee312180 ffffe08e`b8ba5080 00000000`0000033c : nt!PoIdle+0x1e6
ffff9103`4deb5c60 00000000`00000000 : ffff9103`4deb6000 ffff9103`4deb0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  bac30f8031bbad40506eeaabc9b982d6623c8637

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  1d218439fbd5de278f21e1c7bd3c7281d77df1b6

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!PpmIdlePrepare+448
fffff804`3aa22838 488901          mov     qword ptr [rcx],rax

FAULT_INSTR_CODE:  8b018948

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PpmIdlePrepare+448

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  448

FAILURE_BUCKET_ID:  AV_nt!PpmIdlePrepare

BUCKET_ID:  AV_nt!PpmIdlePrepare

PRIMARY_PROBLEM_CLASS:  AV_nt!PpmIdlePrepare

TARGET_TIME:  2019-12-31T13:41:44.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  4b1c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!ppmidleprepare

FAILURE_ID_HASH:  {dd7d0096-4602-c4e5-a984-978d6ab3aa71}

Followup:     MachineOwner
---------
 
Memtest86 testi yapar mısın?
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8040001003e, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff8040001003e, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: fffff8040001003e

BUGCHECK_P2: 10

BUGCHECK_P3: fffff8040001003e

BUGCHECK_P4: 2

READ_ADDRESS: fffff8041a3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8040001003e

FAULTING_IP:
+0
fffff804`0001003e ??              ???

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-31-2019 19:26:34.0161

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff9886ca53a210 -- (.trap 0xffff9886ca53a210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff860edfc48080
rdx=ffff860edebfe160 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040001003e rsp=ffff9886ca53a3a0 rbp=ffff860edfc49030
r8=ffff9886ca53a208  r9=000000000000003e r10=fffff80419e663e0
r11=ffff860edfc48080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
fffff804`0001003e ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80419fe35d6 to fffff80419fc14e0

FAILED_INSTRUCTION_ADDRESS:
+0
fffff804`0001003e ??              ???

STACK_TEXT:
ffff9886`ca539f68 fffff804`19fe35d6 : 00000000`00000050 fffff804`0001003e 00000000`00000010 ffff9886`ca53a210 : nt!KeBugCheckEx
ffff9886`ca539f70 fffff804`19e72eef : 00000000`00000000 00000000`00000010 00000000`00000000 fffff804`0001003e : nt!MiSystemFault+0x1d6866
ffff9886`ca53a070 fffff804`19fcf520 : ffff860e`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x34f
ffff9886`ca53a210 fffff804`0001003e : ffff860e`e4bd89a0 ffff860e`df96bca0 ffff9886`ca53a450 00000000`00000000 : nt!KiPageFault+0x360
ffff9886`ca53a3a0 ffff860e`e4bd89a0 : ffff860e`df96bca0 ffff9886`ca53a450 00000000`00000000 00000000`00000000 : 0xfffff804`0001003e
ffff9886`ca53a3a8 ffff860e`df96bca0 : ffff9886`ca53a450 00000000`00000000 00000000`00000000 fffff804`19e89e95 : 0xffff860e`e4bd89a0
ffff9886`ca53a3b0 ffff9886`ca53a450 : 00000000`00000000 00000000`00000000 fffff804`19e89e95 ffff9886`ca53a450 : 0xffff860e`df96bca0
ffff9886`ca53a3b8 00000000`00000000 : 00000000`00000000 fffff804`19e89e95 ffff9886`ca53a450 ffff860e`dfc49030 : 0xffff9886`ca53a450


THREAD_SHA1_HASH_MOD_FUNC:  35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c0efb11bdbdabbfe638cd9930c42dad821618e02

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff804`19fe35d6 cc              int     3

FAULT_INSTR_CODE:  4d8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiSystemFault+1d6866

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  1d6866

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

PRIMARY_PROBLEM_CLASS:  AV_INVALID_BAD_IP_nt!MiSystemFault

TARGET_TIME:  2019-12-30T20:00:37.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  6750

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_invalid_bad_ip_nt!misystemfault

FAILURE_ID_HASH:  {48ad9531-e3f8-1044-fc5f-d917677674c7}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffa789ddd41840, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa789ddd41798, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffa789ddd41840

BUGCHECK_P3: ffffa789ddd41798

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa789ddd41840 -- (.trap 0xffffa789ddd41840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbf810de7ea80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff878386e8a158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8007d23ba28 rsp=ffffa789ddd419d0 rbp=ffffbf810de79180
r8=0000000000000000  r9=000000022f50863c r10=0000000000000000
r11=ffffaf7cc7400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x528:
fffff800`7d23ba28 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa789ddd41798 -- (.exr 0xffffa789ddd41798)
ExceptionAddress: fffff8007d23ba28 (nt!KiCommitThreadWait+0x0000000000000528)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  RobloxPlayerBeta.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-31-2019 19:26:42.0387

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8007d3d32e9 to fffff8007d3c14e0

STACK_TEXT:
ffffa789`ddd41518 fffff800`7d3d32e9 : 00000000`00000139 00000000`00000003 ffffa789`ddd41840 ffffa789`ddd41798 : nt!KeBugCheckEx
ffffa789`ddd41520 fffff800`7d3d3710 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa789`ddd41660 fffff800`7d3d1aa5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffa789`ddd41840 fffff800`7d23ba28 : ffff8783`86e8b080 ffffbf81`00000000 ffff8783`00000000 ffff8783`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
ffffa789`ddd419d0 fffff800`7d3040e4 : 00000000`00000001 00000000`00000000 ffffa789`00000025 00000000`00000000 : nt!KiCommitThreadWait+0x528
ffffa789`ddd41a70 fffff800`7d8b0825 : ffffa789`ddd41b80 00000000`0977fab4 00000000`77763620 00000000`00000000 : nt!KeWaitForAlertByThreadId+0xd4
ffffa789`ddd41ad0 fffff800`7d3d2d18 : ffff8783`86e8b080 00000000`00000000 00000000`00000000 ffffffff`fffd8f00 : nt!NtWaitForAlertByThreadId+0x65
ffffa789`ddd41b00 00000000`77761cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0967f218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77761cbc


THREAD_SHA1_HASH_MOD_FUNC:  14426b7ada71c4972d6a006ea2472f886aab58a5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  485142955ed66a9a6b1805ae908e3c5d2a70b069

THREAD_SHA1_HASH_MOD:  cb5f414824c2521bcc505eaa03e92fa10922dad8

FOLLOWUP_IP:
nt!KiCommitThreadWait+528
fffff800`7d23ba28 cd29            int     29h

FAULT_INSTR_CODE:  894829cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!KiCommitThreadWait+528

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  528

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait

TARGET_TIME:  2019-12-31T12:50:25.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  16e0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kicommitthreadwait

FAILURE_ID_HASH:  {369b7001-cfef-011b-6243-985c04f34d42}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 000000000001003f, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 1003f

TRAP_FRAME:  0000000000000000 -- (.trap 0x0)

EXCEPTION_RECORD:  0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-31-2019 19:26:38.0498

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff807229c9f5b to fffff807229c14e0

STACK_TEXT:
fffffc01`1099c118 fffff807`229c9f5b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffc01`1099c120 fffff807`250f5235 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`22839878 : nt!guard_icall_bugcheck+0x1b
fffffc01`1099c150 fffff807`250f14c2 : ffff9c0b`d35765e8 ffff9c0b`d3576460 ffff9c0b`d55cdc90 00000000`00000000 : FLTMGR!FltpPerfTraceOperationCallback+0x179
fffffc01`1099c1c0 fffff807`250e45a0 : fffffc01`1099c3a0 00000000`00004000 ffff9c0b`d63f4004 00000000`00020000 : FLTMGR!FltpPerformPreCallbacks+0xcd62
fffffc01`1099c2d0 fffff807`250e4112 : 00000000`00000000 fffffc01`1099c3a0 ffff9c0b`d63f4010 fffffc01`1099c3b0 : FLTMGR!FltpPassThroughInternal+0x90
fffffc01`1099c300 fffff807`250e3efe : fffffc01`1099c3a0 0a000001`20f409ff 0a000001`00000000 ffff9c0b`00000000 : FLTMGR!FltpPassThrough+0x162
fffffc01`1099c380 fffff807`22831f79 : ffff9c0b`d63f4010 fffff807`22831fb7 00000000`0000000d ffff9c0b`00000004 : FLTMGR!FltpDispatch+0x9e
fffffc01`1099c3e0 fffff807`22854493 : fffffc01`1099c4f0 ffff9c0b`d63f4010 ffff9c0b`d7ec2e80 ffff9c0b`cdf65d60 : nt!IofCallDriver+0x59
fffffc01`1099c420 fffff807`228fa730 : fffffc01`1099c4f0 fffffc01`1099c560 00000000`00000010 00000000`00000000 : nt!IoSynchronousPageWriteEx+0x137
fffffc01`1099c460 fffff807`228fa570 : 00000000`00000000 00000000`00000000 00000000`04200000 ffffd507`0f740000 : nt!MiZeroPageWrite+0x18c
fffffc01`1099c600 fffff807`228fa4d8 : 00000000`00200000 fffff807`25b21600 ffff9c0b`d7ec2e80 00000000`fffffe00 : nt!MmZeroPageWrite+0x48
fffffc01`1099c630 fffff807`228f9ddd : 00000000`00200000 00000000`01e00000 00000000`05a40000 0000001c`00000004 : nt!CcZeroDataOnDisk+0x38
fffffc01`1099c660 fffff807`25c43505 : ffffae80`edd8bb00 00000000`04200000 fffffc01`1099c788 00000000`00000001 : nt!CcZeroData+0x20d
fffffc01`1099c720 fffff807`25b0dca0 : ffff9c0b`d575a6d8 ffffae80`edd8bb40 ffff9c0b`d7ec2e80 00000000`00000700 : Ntfs!NtfsZeroData+0x13d
fffffc01`1099c800 fffff807`25b2199b : ffff9c0b`d575a6d8 fffff807`25b21600 00000000`00000000 ffff9c0b`d575a6d8 : Ntfs!NtfsCommonWrite+0x15c0
fffffc01`1099ca30 fffff807`228bd095 : ffff9c0b`cb690cc0 ffff9c0b`d2293040 ffff9c0b`cb690cc0 ffff9c0b`d575a768 : Ntfs!NtfsFspDispatch+0x39b
fffffc01`1099cb70 fffff807`2292a7a5 : ffff9c0b`d2293040 00000000`00000080 ffff9c0b`cb67b180 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
fffffc01`1099cc10 fffff807`229c8b2a : ffffbe81`48f20180 ffff9c0b`d2293040 fffff807`2292a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffc01`1099cc60 00000000`00000000 : fffffc01`1099d000 fffffc01`10997000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  f828e04b73a96012193978f497610b64b807883b

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ef3acde718127db115b8bf657ef4ef14d3d60067

THREAD_SHA1_HASH_MOD:  6f7db1a4ec42380c703ddd74b8c05f452d17543d

FOLLOWUP_IP:
nt!guard_icall_bugcheck+1b
fffff807`229c9f5b 90              nop

FAULT_INSTR_CODE:  ccccc390

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!guard_icall_bugcheck+1b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1b

FAILURE_BUCKET_ID:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

BUCKET_ID:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

PRIMARY_PROBLEM_CLASS:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

TARGET_TIME:  2019-12-30T20:07:13.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  83ba

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_0_legacy_gs_violation_nt!guard_icall_bugcheck

FAILURE_ID_HASH:  {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000095, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8043aa22838, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: ff

BUGCHECK_P3: 95

BUGCHECK_P4: fffff8043aa22838

WRITE_ADDRESS: fffff8043af733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000

CURRENT_IRQL:  0

FAULTING_IP:
nt!PpmIdlePrepare+448
fffff804`3aa22838 488901          mov     qword ptr [rcx],rax

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-31-2019 19:26:46.0931

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff91034deb5780 -- (.trap 0xffff91034deb5780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043aa22838 rsp=ffff91034deb5910 rbp=ffff91034deb5a10
r8=00000000ffffffff  r9=ffff9d00ee312100 r10=ffffe08ec097c000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!PpmIdlePrepare+0x448:
fffff804`3aa22838 488901          mov     qword ptr [rcx],rax ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8043abd32e9 to fffff8043abc14e0

STACK_TEXT:
ffff9103`4deb5638 fffff804`3abd32e9 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`00000095 : nt!KeBugCheckEx
ffff9103`4deb5640 fffff804`3abcf62b : 00000000`00000000 00000000`00000000 00000000`00000886 fffff804`3acf024b : nt!KiBugCheckDispatch+0x69
ffff9103`4deb5780 fffff804`3aa22838 : ffffffff`ffffffff ffff9103`4deb5a10 ffff9d00`ee312180 ffff9d00`ee312180 : nt!KiPageFault+0x46b
ffff9103`4deb5910 fffff804`3aa21446 : 00000000`00000003 00000000`00000002 ffffe08e`c0910100 00000000`00000008 : nt!PpmIdlePrepare+0x448
ffff9103`4deb5b00 fffff804`3abc4fe8 : ffffffff`00000000 ffff9d00`ee312180 ffffe08e`b8ba5080 00000000`0000033c : nt!PoIdle+0x1e6
ffff9103`4deb5c60 00000000`00000000 : ffff9103`4deb6000 ffff9103`4deb0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  bac30f8031bbad40506eeaabc9b982d6623c8637

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  1d218439fbd5de278f21e1c7bd3c7281d77df1b6

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!PpmIdlePrepare+448
fffff804`3aa22838 488901          mov     qword ptr [rcx],rax

FAULT_INSTR_CODE:  8b018948

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PpmIdlePrepare+448

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  448

FAILURE_BUCKET_ID:  AV_nt!PpmIdlePrepare

BUCKET_ID:  AV_nt!PpmIdlePrepare

PRIMARY_PROBLEM_CLASS:  AV_nt!PpmIdlePrepare

TARGET_TIME:  2019-12-31T13:41:44.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  4b1c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!ppmidleprepare

FAILURE_ID_HASH:  {dd7d0096-4602-c4e5-a984-978d6ab3aa71}

Followup:     MachineOwner
---------
Test başarıyla tamamlandı. Hata: 0
 

Yeni konular

Geri
Yukarı