SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff80263ce515e, The address that the exception occurred at
Arg3: ffff820aa8f11248, Exception Record Address
Arg4: ffff820aa8f10a90, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff80263ce515e
BUGCHECK_P3: ffff820aa8f11248
BUGCHECK_P4: ffff820aa8f10a90
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>
FAULTING_IP:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce ???
EXCEPTION_RECORD: ffff820aa8f11248 -- (.exr 0xffff820aa8f11248)
ExceptionAddress: fffff80263ce515e (FLTMGR!FltpPerformPreCallbacks+0x00000000000009fe)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: ffff820aa8f10a90 -- (.cxr 0xffff820aa8f10a90)
rax=0000000000000208 rbx=ffffbc0fd43708b0 rcx=0000000000000208
rdx=0000000000000005 rsi=ffffbc0fd4370c50 rdi=ffffbc0fd0870d40
rip=fffff80263ce515e rsp=ffff820aa8f11488 rbp=ffffbc0fd45ecb30
r8=0000000000000208 r9=0000000000000001 r10=ffffbc0fd03f3240
r11=fffff80263cfc470 r12=0000000000000000 r13=0000000000000000
r14=ffffbc0fd43708b0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
FLTMGR!FltpPerformPreCallbacks+0x9fe:
fffff802`63ce515e ce ???
Resetting default scope
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>
EXCEPTION_CODE_STR: c000001d
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:20.0126
ANALYSIS_VERSION: 10.0.18362.1 x86fre
MISALIGNED_IP:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce ???
LAST_CONTROL_TRANSFER: from ffffbc0fd43f5030 to fffff80263ce515e
FAILED_INSTRUCTION_ADDRESS:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce ???
STACK_TEXT:
ffff820a`a8f11488 ffffbc0f`d43f5030 : fffff802`629e74cd ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 : FLTMGR!FltpPerformPreCallbacks+0x9fe
ffff820a`a8f11598 fffff802`629e74cd : ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 ffffbc0f`d43708b0 : 0xffffbc0f`d43f5030
ffff820a`a8f115a0 fffff802`629fa0e0 : ffff820a`a8f11900 00000000`00000000 ffffbc0f`cc9f9f00 fffff802`628f4fc0 : nt!IopDeleteFile+0x12d
ffff820a`a8f11620 fffff802`624390c4 : 00000000`00000000 00000000`00000000 ffff820a`a8f11900 ffffbc0f`d4596e60 : nt!ObpRemoveObjectRoutine+0x80
ffff820a`a8f11680 fffff802`648926ad : 00000000`00000000 ffffbc0f`d4596e60 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0xa4
ffff820a`a8f116c0 fffff802`648abc94 : ffffcc04`cf383170 ffff820a`a8f119c9 ffffbc0f`d4369c28 ffffcc04`cf383010 : Ntfs!NtfsDeleteInternalAttributeStream+0x111
ffff820a`a8f11700 fffff802`648afb09 : ffffbc0f`d4369c28 00000000`00000000 00000000`00000000 00000067`00000000 : Ntfs!TxfInitializeTxfSystemDirectory+0x220
ffff820a`a8f11810 fffff802`64880753 : ffffbc0f`d43f5180 fffff802`62400001 fffff802`5dd31101 fffff802`62991400 : Ntfs!TxfInitializeVolume+0x335
ffff820a`a8f11950 fffff802`647719c0 : ffffbc0f`d0952d68 fffff802`64771600 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonFileSystemControl+0x16b
ffff820a`a8f11a30 fffff802`624bd095 : ffffbc0f`cc8877d0 ffffbc0f`d0377040 ffffbc0f`cc8877d0 ffffbc0f`d0952df8 : Ntfs!NtfsFspDispatch+0x3c0
ffff820a`a8f11b70 fffff802`6252a7a5 : ffffbc0f`d0377040 00000000`00000080 ffffbc0f`cc8af080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff820a`a8f11c10 fffff802`625c8b2a : ffffe300`3d539180 ffffbc0f`d0377040 fffff802`6252a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff820a`a8f11c60 00000000`00000000 : ffff820a`a8f12000 ffff820a`a8f0c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
fffff80263ce5c21 - FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+7a1
[ fd:f5 ]
1 error : !FLTMGR (fffff80263ce5c21)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xffff820aa8f10a90 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-01-20T19:07:48.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3c87
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffcd00ad11d2b0
Arg3: 000000f09647f7f8
Arg4: fffff801757d284c
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450 GAMING X
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450 GAMING X
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: ffffcd00ad11d2b0
BUGCHECK_P3: f09647f7f8
BUGCHECK_P4: fffff801757d284c
BUGCHECK_STR: 0x7f_8
TRAP_FRAME: ffffcd00ad11d2b0 -- (.trap 0xffffcd00ad11d2b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000023 rbx=0000000000000000 rcx=00007fff6791c524
rdx=00007fff64b40000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801757d284c rsp=000000f09647f7f8 rbp=0000000000000000
r8=0000000000000006 r9=000000f09647f830 r10=ffffffffffffffff
r11=0000000000000246 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na pe nc
nt!KiSystemCall64+0xc:
fffff801`757d284c 65488b2425a8010000 mov rsp,qword ptr gs:[1A8h] gs:00000000`000001a8=????????????????
Resetting default scope
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: WmiPrvSE.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:24.0377
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: 000000f09647f7f8
LAST_CONTROL_TRANSFER: from fffff801757d32e9 to fffff801757c14e0
STACK_TEXT:
ffffcd00`ad11d168 fffff801`757d32e9 : 00000000`0000007f 00000000`00000008 ffffcd00`ad11d2b0 000000f0`9647f7f8 : nt!KeBugCheckEx
ffffcd00`ad11d170 fffff801`757ce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcd00`ad11d2b0 fffff801`757d284c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
000000f0`9647f7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemCall64+0xc
THREAD_SHA1_HASH_MOD_FUNC: d998fe020a7bf757d69726f6a68a4c5e54a760f5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3b0d8742792bf900a74135b28da7f2938ee852be
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+2c5
fffff801`757ce145 90 nop
FAULT_INSTR_CODE: 6666c390
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+2c5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2c5
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
PRIMARY_PROBLEM_CLASS: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
TARGET_TIME: 2020-01-20T19:32:24.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 6624
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7f_8_stackptr_error_nt!kidoublefaultabort
FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000004, The exception code that was not handled
Arg2: fffff80153f4206c, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffff828a45efa108, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450 GAMING X
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450 GAMING X
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: ffffffff80000004
BUGCHECK_P2: fffff80153f4206c
BUGCHECK_P3: 0
BUGCHECK_P4: ffff828a45efa108
EXCEPTION_CODE: (HRESULT) 0x80000004 (2147483652) - B yle bir arabirim desteklenmiyor
FAULTING_IP:
amdppm!ReadIoMemRaw+e4
fffff801`53f4206c 0fb6c0 movzx eax,al
EXCEPTION_PARAMETER2: ffff828a45efa108
BUGCHECK_STR: 0x1E_80000004
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:28.0704
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: 0000000000140001 -- (.exr 0x140001)
Cannot read Exception record @ 0000000000140001
TRAP_FRAME: fffff801417766c0 -- (.trap 0xfffff801417766c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fbaee8f975003983 rsp=ec834808244c8948 rbp=8b4800036912e828
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 vif ov dn di ng zr na po nc
ffff:fbaee8f9`75003983 ?? ???
Resetting default scope
BAD_STACK_POINTER: ec834808244c8948
LAST_CONTROL_TRANSFER: from fffff80141aa653e to fffff801419c14e0
STACK_TEXT:
ffffc588`5c6d0558 fffff801`41aa653e : 00000000`0000001e ffffffff`80000004 fffff801`53f4206c 00000000`00000000 : nt!KeBugCheckEx
ffffc588`5c6d0560 fffff801`419ca312 : fffff801`41d11000 fffff801`41800000 0005e548`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
ffffc588`5c6d05a0 fffff801`418c2fa5 : 00000000`00000000 00000000`00000000 ffffc588`5c6d0b10 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffffc588`5c6d05d0 fffff801`418c753e : ffffc588`5c6d1508 ffffc588`5c6d1250 ffffc588`5c6d1508 ffff828a`45efa108 : nt!RtlDispatchException+0x4a5
ffffc588`5c6d0d20 fffff801`419d341d : 00000000`00140001 00000000`00000001 fffff801`417766c0 fffff801`417602ca : nt!KiDispatchException+0x16e
ffffc588`5c6d13d0 fffff801`419cc5e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000e : nt!KiExceptionDispatch+0x11d
ffffc588`5c6d15b0 fffff801`53f4206c : fffff801`53f421d0 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 : nt!KxDebugTrapOrFault+0x3e5
ffffc588`5c6d1748 fffff801`53f421d0 : 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 00000000`00005cf5 : amdppm!ReadIoMemRaw+0xe4
ffffc588`5c6d1750 fffff801`53f4a9aa : 00000000`00000000 00000000`00000000 ffff828a`440f2720 fffff801`41af024b : amdppm!ReadGenAddr+0x18
ffffc588`5c6d1780 fffff801`53f4a863 : ffffd880`d9bb9180 00000000`00000000 ffffd880`d9bb9100 000001df`1605dab4 : amdppm!C2Idle+0x8a
ffffc588`5c6d17b0 fffff801`41821e7c : 00000000`0000002e 00000000`00000000 ffff828a`46470010 00000000`0000002e : amdppm!AcpiCStateIdleExecute+0x23
ffffc588`5c6d17e0 fffff801`418215ce : 00000000`00000003 00000000`00000002 ffff828a`46470100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c
ffffc588`5c6d1b00 fffff801`419c4fe8 : ffffffff`00000000 ffffd880`d9bb9180 ffff828a`3cd84040 00000000`00000b6b : nt!PoIdle+0x36e
ffffc588`5c6d1c60 00000000`00000000 : ffffc588`5c6d2000 ffffc588`5c6cc000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: f567785a2aa709df54df08e1708e3e6de0fcbf87
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 26e79b0c8a19c9eb798a9396ece3fd96783ae3ec
THREAD_SHA1_HASH_MOD: 0e4c860846993d7e3faf763ce25943f431bdbf85
FOLLOWUP_IP:
amdppm!ReadIoMemRaw+e4
fffff801`53f4206c 0fb6c0 movzx eax,al
FAULT_INSTR_CODE: c3c0b60f
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: amdppm!ReadIoMemRaw+e4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.387
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: e4
FAILURE_BUCKET_ID: 0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw
BUCKET_ID: 0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw
PRIMARY_PROBLEM_CLASS: 0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw
TARGET_TIME: 2020-01-20T19:17:18.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 41e9
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_80000004_stackptr_error_amdppm!readiomemraw
FAILURE_ID_HASH: {7bb3962b-00ba-2a7f-4bf4-c161c3461831}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd8014ff121d0, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: ffffd8014ff121d0, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450 GAMING X
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450 GAMING X
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: ffffd8014ff121d0
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: ffffd8014ff121d0
READ_ADDRESS: fffff8013f3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffd8014ff121d0
CURRENT_IRQL: 0
FAULTING_IP:
+0
ffffd801`4ff121d0 ?? ???
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:32.0873
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff918c622d15c0 -- (.trap 0xffff918c622d15c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000414
rdx=0000000000000414 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd8014ff121d0 rsp=ffff918c622d1750 rbp=ffff980f51e48010
r8=0000000000000000 r9=0000000000000000 r10=ffff980f51dfc868
r11=ffff9af9d0200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
ffffd801`4ff121d0 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8013efd32e9 to fffff8013efc14e0
FAILED_INSTRUCTION_ADDRESS:
+0
ffffd801`4ff121d0 ?? ???
STACK_TEXT:
ffff918c`622d1478 fffff801`3efd32e9 : 00000000`0000000a ffffd801`4ff121d0 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff918c`622d1480 fffff801`3efcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff918c`622d15c0 ffffd801`4ff121d0 : ffff918c`622d1780 ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 : nt!KiPageFault+0x46b
ffff918c`622d1750 ffff918c`622d1780 : ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 00000000`00000000 : 0xffffd801`4ff121d0
ffff918c`622d1758 ffff69bf`f32ce2c4 : 00000000`00011f9e 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa : 0xffff918c`622d1780
ffff918c`622d1760 00000000`00011f9e : 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 : 0xffff69bf`f32ce2c4
ffff918c`622d1768 00000000`0000b976 : 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 : 0x11f9e
ffff918c`622d1770 00000000`00000000 : fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 ffff980f`4bffa720 : 0xb976
THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 497aaf2f8d4f907c0c9bce6ce025c930b885e2b8
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
FOLLOWUP_IP:
nt!KiPageFault+46b
fffff801`3efcf62b 33c0 xor eax,eax
FAULT_INSTR_CODE: ffb0c033
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+46b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 46b
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
PRIMARY_PROBLEM_CLASS: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
TARGET_TIME: 2020-01-20T19:26:50.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4179
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:disabled_interrupt_fault_code_av_bad_ip_nt!kipagefault
FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffda85ddd64340, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
------------------------------------------------
| |
| NT symbols are not available |
| Wmitrace cannot operate without them |
| |
------------------------------------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE: 2
BUGCHECK_P1: ffffda85ddd64340
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_0xEF
BUGCHECK_STR: 0xEF
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:15.0780
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8017d2cae89 to fffff8017cbc14e0
STACK_TEXT:
ffffad08`4e5e8938 fffff801`7d2cae89 : 00000000`000000ef ffffda85`ddd64340 00000000`00000000 00000000`00000000 : 0xfffff801`7cbc14e0
ffffad08`4e5e8940 00000000`000000ef : ffffda85`ddd64340 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff801`7d2cae89
ffffad08`4e5e8948 ffffda85`ddd64340 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xef
ffffad08`4e5e8950 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`c0000005 : 0xffffda85`ddd64340
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID: CORRUPT_MODULELIST_0xEF
PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_0xEF
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_0xEF
TARGET_TIME: 2020-01-20T19:43:51.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
ANALYSIS_SESSION_ELAPSED_TIME: 1f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:corrupt_modulelist_0xef
FAILURE_ID_HASH: {622df55c-925d-d478-30ae-d5699ff4662f}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff80263ce515e, The address that the exception occurred at
Arg3: ffff820aa8f11248, Exception Record Address
Arg4: ffff820aa8f10a90, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff80263ce515e
BUGCHECK_P3: ffff820aa8f11248
BUGCHECK_P4: ffff820aa8f10a90
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>
FAULTING_IP:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce ???
EXCEPTION_RECORD: ffff820aa8f11248 -- (.exr 0xffff820aa8f11248)
ExceptionAddress: fffff80263ce515e (FLTMGR!FltpPerformPreCallbacks+0x00000000000009fe)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: ffff820aa8f10a90 -- (.cxr 0xffff820aa8f10a90)
rax=0000000000000208 rbx=ffffbc0fd43708b0 rcx=0000000000000208
rdx=0000000000000005 rsi=ffffbc0fd4370c50 rdi=ffffbc0fd0870d40
rip=fffff80263ce515e rsp=ffff820aa8f11488 rbp=ffffbc0fd45ecb30
r8=0000000000000208 r9=0000000000000001 r10=ffffbc0fd03f3240
r11=fffff80263cfc470 r12=0000000000000000 r13=0000000000000000
r14=ffffbc0fd43708b0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
FLTMGR!FltpPerformPreCallbacks+0x9fe:
fffff802`63ce515e ce ???
Resetting default scope
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>
EXCEPTION_CODE_STR: c000001d
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:20.0126
ANALYSIS_VERSION: 10.0.18362.1 x86fre
MISALIGNED_IP:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce ???
LAST_CONTROL_TRANSFER: from ffffbc0fd43f5030 to fffff80263ce515e
FAILED_INSTRUCTION_ADDRESS:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce ???
STACK_TEXT:
ffff820a`a8f11488 ffffbc0f`d43f5030 : fffff802`629e74cd ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 : FLTMGR!FltpPerformPreCallbacks+0x9fe
ffff820a`a8f11598 fffff802`629e74cd : ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 ffffbc0f`d43708b0 : 0xffffbc0f`d43f5030
ffff820a`a8f115a0 fffff802`629fa0e0 : ffff820a`a8f11900 00000000`00000000 ffffbc0f`cc9f9f00 fffff802`628f4fc0 : nt!IopDeleteFile+0x12d
ffff820a`a8f11620 fffff802`624390c4 : 00000000`00000000 00000000`00000000 ffff820a`a8f11900 ffffbc0f`d4596e60 : nt!ObpRemoveObjectRoutine+0x80
ffff820a`a8f11680 fffff802`648926ad : 00000000`00000000 ffffbc0f`d4596e60 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0xa4
ffff820a`a8f116c0 fffff802`648abc94 : ffffcc04`cf383170 ffff820a`a8f119c9 ffffbc0f`d4369c28 ffffcc04`cf383010 : Ntfs!NtfsDeleteInternalAttributeStream+0x111
ffff820a`a8f11700 fffff802`648afb09 : ffffbc0f`d4369c28 00000000`00000000 00000000`00000000 00000067`00000000 : Ntfs!TxfInitializeTxfSystemDirectory+0x220
ffff820a`a8f11810 fffff802`64880753 : ffffbc0f`d43f5180 fffff802`62400001 fffff802`5dd31101 fffff802`62991400 : Ntfs!TxfInitializeVolume+0x335
ffff820a`a8f11950 fffff802`647719c0 : ffffbc0f`d0952d68 fffff802`64771600 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonFileSystemControl+0x16b
ffff820a`a8f11a30 fffff802`624bd095 : ffffbc0f`cc8877d0 ffffbc0f`d0377040 ffffbc0f`cc8877d0 ffffbc0f`d0952df8 : Ntfs!NtfsFspDispatch+0x3c0
ffff820a`a8f11b70 fffff802`6252a7a5 : ffffbc0f`d0377040 00000000`00000080 ffffbc0f`cc8af080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff820a`a8f11c10 fffff802`625c8b2a : ffffe300`3d539180 ffffbc0f`d0377040 fffff802`6252a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff820a`a8f11c60 00000000`00000000 : ffff820a`a8f12000 ffff820a`a8f0c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
fffff80263ce5c21 - FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+7a1
[ fd:f5 ]
1 error : !FLTMGR (fffff80263ce5c21)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xffff820aa8f10a90 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-01-20T19:07:48.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3c87
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffcd00ad11d2b0
Arg3: 000000f09647f7f8
Arg4: fffff801757d284c
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450 GAMING X
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450 GAMING X
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: ffffcd00ad11d2b0
BUGCHECK_P3: f09647f7f8
BUGCHECK_P4: fffff801757d284c
BUGCHECK_STR: 0x7f_8
TRAP_FRAME: ffffcd00ad11d2b0 -- (.trap 0xffffcd00ad11d2b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000023 rbx=0000000000000000 rcx=00007fff6791c524
rdx=00007fff64b40000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801757d284c rsp=000000f09647f7f8 rbp=0000000000000000
r8=0000000000000006 r9=000000f09647f830 r10=ffffffffffffffff
r11=0000000000000246 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na pe nc
nt!KiSystemCall64+0xc:
fffff801`757d284c 65488b2425a8010000 mov rsp,qword ptr gs:[1A8h] gs:00000000`000001a8=????????????????
Resetting default scope
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: WmiPrvSE.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:24.0377
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: 000000f09647f7f8
LAST_CONTROL_TRANSFER: from fffff801757d32e9 to fffff801757c14e0
STACK_TEXT:
ffffcd00`ad11d168 fffff801`757d32e9 : 00000000`0000007f 00000000`00000008 ffffcd00`ad11d2b0 000000f0`9647f7f8 : nt!KeBugCheckEx
ffffcd00`ad11d170 fffff801`757ce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcd00`ad11d2b0 fffff801`757d284c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
000000f0`9647f7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemCall64+0xc
THREAD_SHA1_HASH_MOD_FUNC: d998fe020a7bf757d69726f6a68a4c5e54a760f5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3b0d8742792bf900a74135b28da7f2938ee852be
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+2c5
fffff801`757ce145 90 nop
FAULT_INSTR_CODE: 6666c390
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+2c5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2c5
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
PRIMARY_PROBLEM_CLASS: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
TARGET_TIME: 2020-01-20T19:32:24.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 6624
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7f_8_stackptr_error_nt!kidoublefaultabort
FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000004, The exception code that was not handled
Arg2: fffff80153f4206c, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffff828a45efa108, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450 GAMING X
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450 GAMING X
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: ffffffff80000004
BUGCHECK_P2: fffff80153f4206c
BUGCHECK_P3: 0
BUGCHECK_P4: ffff828a45efa108
EXCEPTION_CODE: (HRESULT) 0x80000004 (2147483652) - B yle bir arabirim desteklenmiyor
FAULTING_IP:
amdppm!ReadIoMemRaw+e4
fffff801`53f4206c 0fb6c0 movzx eax,al
EXCEPTION_PARAMETER2: ffff828a45efa108
BUGCHECK_STR: 0x1E_80000004
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:28.0704
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: 0000000000140001 -- (.exr 0x140001)
Cannot read Exception record @ 0000000000140001
TRAP_FRAME: fffff801417766c0 -- (.trap 0xfffff801417766c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fbaee8f975003983 rsp=ec834808244c8948 rbp=8b4800036912e828
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 vif ov dn di ng zr na po nc
ffff:fbaee8f9`75003983 ?? ???
Resetting default scope
BAD_STACK_POINTER: ec834808244c8948
LAST_CONTROL_TRANSFER: from fffff80141aa653e to fffff801419c14e0
STACK_TEXT:
ffffc588`5c6d0558 fffff801`41aa653e : 00000000`0000001e ffffffff`80000004 fffff801`53f4206c 00000000`00000000 : nt!KeBugCheckEx
ffffc588`5c6d0560 fffff801`419ca312 : fffff801`41d11000 fffff801`41800000 0005e548`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
ffffc588`5c6d05a0 fffff801`418c2fa5 : 00000000`00000000 00000000`00000000 ffffc588`5c6d0b10 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffffc588`5c6d05d0 fffff801`418c753e : ffffc588`5c6d1508 ffffc588`5c6d1250 ffffc588`5c6d1508 ffff828a`45efa108 : nt!RtlDispatchException+0x4a5
ffffc588`5c6d0d20 fffff801`419d341d : 00000000`00140001 00000000`00000001 fffff801`417766c0 fffff801`417602ca : nt!KiDispatchException+0x16e
ffffc588`5c6d13d0 fffff801`419cc5e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000e : nt!KiExceptionDispatch+0x11d
ffffc588`5c6d15b0 fffff801`53f4206c : fffff801`53f421d0 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 : nt!KxDebugTrapOrFault+0x3e5
ffffc588`5c6d1748 fffff801`53f421d0 : 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 00000000`00005cf5 : amdppm!ReadIoMemRaw+0xe4
ffffc588`5c6d1750 fffff801`53f4a9aa : 00000000`00000000 00000000`00000000 ffff828a`440f2720 fffff801`41af024b : amdppm!ReadGenAddr+0x18
ffffc588`5c6d1780 fffff801`53f4a863 : ffffd880`d9bb9180 00000000`00000000 ffffd880`d9bb9100 000001df`1605dab4 : amdppm!C2Idle+0x8a
ffffc588`5c6d17b0 fffff801`41821e7c : 00000000`0000002e 00000000`00000000 ffff828a`46470010 00000000`0000002e : amdppm!AcpiCStateIdleExecute+0x23
ffffc588`5c6d17e0 fffff801`418215ce : 00000000`00000003 00000000`00000002 ffff828a`46470100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c
ffffc588`5c6d1b00 fffff801`419c4fe8 : ffffffff`00000000 ffffd880`d9bb9180 ffff828a`3cd84040 00000000`00000b6b : nt!PoIdle+0x36e
ffffc588`5c6d1c60 00000000`00000000 : ffffc588`5c6d2000 ffffc588`5c6cc000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: f567785a2aa709df54df08e1708e3e6de0fcbf87
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 26e79b0c8a19c9eb798a9396ece3fd96783ae3ec
THREAD_SHA1_HASH_MOD: 0e4c860846993d7e3faf763ce25943f431bdbf85
FOLLOWUP_IP:
amdppm!ReadIoMemRaw+e4
fffff801`53f4206c 0fb6c0 movzx eax,al
FAULT_INSTR_CODE: c3c0b60f
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: amdppm!ReadIoMemRaw+e4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.387
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: e4
FAILURE_BUCKET_ID: 0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw
BUCKET_ID: 0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw
PRIMARY_PROBLEM_CLASS: 0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw
TARGET_TIME: 2020-01-20T19:17:18.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 41e9
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_80000004_stackptr_error_amdppm!readiomemraw
FAILURE_ID_HASH: {7bb3962b-00ba-2a7f-4bf4-c161c3461831}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd8014ff121d0, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: ffffd8014ff121d0, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450 GAMING X
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450 GAMING X
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: ffffd8014ff121d0
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: ffffd8014ff121d0
READ_ADDRESS: fffff8013f3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffd8014ff121d0
CURRENT_IRQL: 0
FAULTING_IP:
+0
ffffd801`4ff121d0 ?? ???
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:32.0873
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff918c622d15c0 -- (.trap 0xffff918c622d15c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000414
rdx=0000000000000414 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd8014ff121d0 rsp=ffff918c622d1750 rbp=ffff980f51e48010
r8=0000000000000000 r9=0000000000000000 r10=ffff980f51dfc868
r11=ffff9af9d0200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
ffffd801`4ff121d0 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8013efd32e9 to fffff8013efc14e0
FAILED_INSTRUCTION_ADDRESS:
+0
ffffd801`4ff121d0 ?? ???
STACK_TEXT:
ffff918c`622d1478 fffff801`3efd32e9 : 00000000`0000000a ffffd801`4ff121d0 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff918c`622d1480 fffff801`3efcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff918c`622d15c0 ffffd801`4ff121d0 : ffff918c`622d1780 ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 : nt!KiPageFault+0x46b
ffff918c`622d1750 ffff918c`622d1780 : ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 00000000`00000000 : 0xffffd801`4ff121d0
ffff918c`622d1758 ffff69bf`f32ce2c4 : 00000000`00011f9e 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa : 0xffff918c`622d1780
ffff918c`622d1760 00000000`00011f9e : 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 : 0xffff69bf`f32ce2c4
ffff918c`622d1768 00000000`0000b976 : 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 : 0x11f9e
ffff918c`622d1770 00000000`00000000 : fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 ffff980f`4bffa720 : 0xb976
THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 497aaf2f8d4f907c0c9bce6ce025c930b885e2b8
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
FOLLOWUP_IP:
nt!KiPageFault+46b
fffff801`3efcf62b 33c0 xor eax,eax
FAULT_INSTR_CODE: ffb0c033
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+46b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 46b
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
PRIMARY_PROBLEM_CLASS: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
TARGET_TIME: 2020-01-20T19:26:50.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4179
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:disabled_interrupt_fault_code_av_bad_ip_nt!kipagefault
FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffda85ddd64340, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
------------------------------------------------
| |
| NT symbols are not available |
| Wmitrace cannot operate without them |
| |
------------------------------------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE: 2
BUGCHECK_P1: ffffda85ddd64340
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_0xEF
BUGCHECK_STR: 0xEF
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:15.0780
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8017d2cae89 to fffff8017cbc14e0
STACK_TEXT:
ffffad08`4e5e8938 fffff801`7d2cae89 : 00000000`000000ef ffffda85`ddd64340 00000000`00000000 00000000`00000000 : 0xfffff801`7cbc14e0
ffffad08`4e5e8940 00000000`000000ef : ffffda85`ddd64340 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff801`7d2cae89
ffffad08`4e5e8948 ffffda85`ddd64340 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xef
ffffad08`4e5e8950 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`c0000005 : 0xffffda85`ddd64340
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID: CORRUPT_MODULELIST_0xEF
PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_0xEF
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_0xEF
TARGET_TIME: 2020-01-20T19:43:51.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
ANALYSIS_SESSION_ELAPSED_TIME: 1f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:corrupt_modulelist_0xef
FAILURE_ID_HASH: {622df55c-925d-d478-30ae-d5699ff4662f}
Followup: MachineOwner
---------
Servise göndermeden önce konuna dediklerimizi yaptıktan sonra gönderseydin daha iyiydi.
PAGE_FAULT_IN_NONPAGED_AREA Mavi Ekran Hatası
Sistemde böyle mavi ekran hatası alıyorum. Aşağıya minidump klasörünün linkini bıraktım. https://drive.google.com/open?id=1rQJEsCRPeFsz5URYrJDMGWccBq_GUn5Xwww.technopat.net
Tekrar soruyorum Memtest86 testi yaptın mı?
Belleklerin kit mi?
Kit demek ikisi de aynı kutudan çıktı demek, iki farklı kutu değil.
HDtune sonuçları paylaşır mısın?
(Error scan, health)
Kod:SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc000001d, The exception code that was not handled Arg2: fffff80263ce515e, The address that the exception occurred at Arg3: ffff820aa8f11248, Exception Record Address Arg4: ffff820aa8f10a90, Context Record Address Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffffffffc000001d BUGCHECK_P2: fffff80263ce515e BUGCHECK_P3: ffff820aa8f11248 BUGCHECK_P4: ffff820aa8f10a90 EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text> FAULTING_IP: FLTMGR!FltpPerformPreCallbacks+9fe fffff802`63ce515e ce ??? EXCEPTION_RECORD: ffff820aa8f11248 -- (.exr 0xffff820aa8f11248) ExceptionAddress: fffff80263ce515e (FLTMGR!FltpPerformPreCallbacks+0x00000000000009fe) ExceptionCode: c000001d (Illegal instruction) ExceptionFlags: 00000000 NumberParameters: 0 CONTEXT: ffff820aa8f10a90 -- (.cxr 0xffff820aa8f10a90) rax=0000000000000208 rbx=ffffbc0fd43708b0 rcx=0000000000000208 rdx=0000000000000005 rsi=ffffbc0fd4370c50 rdi=ffffbc0fd0870d40 rip=fffff80263ce515e rsp=ffff820aa8f11488 rbp=ffffbc0fd45ecb30 r8=0000000000000208 r9=0000000000000001 r10=ffffbc0fd03f3240 r11=fffff80263cfc470 r12=0000000000000000 r13=0000000000000000 r14=ffffbc0fd43708b0 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 FLTMGR!FltpPerformPreCallbacks+0x9fe: fffff802`63ce515e ce ??? Resetting default scope CPU_COUNT: 10 CPU_MHZ: e6d CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXNTFS: 1 (!blackboxntfs) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: AV PROCESS_NAME: System CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text> EXCEPTION_CODE_STR: c000001d ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-20-2020 23:23:20.0126 ANALYSIS_VERSION: 10.0.18362.1 x86fre MISALIGNED_IP: FLTMGR!FltpPerformPreCallbacks+9fe fffff802`63ce515e ce ??? LAST_CONTROL_TRANSFER: from ffffbc0fd43f5030 to fffff80263ce515e FAILED_INSTRUCTION_ADDRESS: FLTMGR!FltpPerformPreCallbacks+9fe fffff802`63ce515e ce ??? STACK_TEXT: ffff820a`a8f11488 ffffbc0f`d43f5030 : fffff802`629e74cd ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 : FLTMGR!FltpPerformPreCallbacks+0x9fe ffff820a`a8f11598 fffff802`629e74cd : ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 ffffbc0f`d43708b0 : 0xffffbc0f`d43f5030 ffff820a`a8f115a0 fffff802`629fa0e0 : ffff820a`a8f11900 00000000`00000000 ffffbc0f`cc9f9f00 fffff802`628f4fc0 : nt!IopDeleteFile+0x12d ffff820a`a8f11620 fffff802`624390c4 : 00000000`00000000 00000000`00000000 ffff820a`a8f11900 ffffbc0f`d4596e60 : nt!ObpRemoveObjectRoutine+0x80 ffff820a`a8f11680 fffff802`648926ad : 00000000`00000000 ffffbc0f`d4596e60 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0xa4 ffff820a`a8f116c0 fffff802`648abc94 : ffffcc04`cf383170 ffff820a`a8f119c9 ffffbc0f`d4369c28 ffffcc04`cf383010 : Ntfs!NtfsDeleteInternalAttributeStream+0x111 ffff820a`a8f11700 fffff802`648afb09 : ffffbc0f`d4369c28 00000000`00000000 00000000`00000000 00000067`00000000 : Ntfs!TxfInitializeTxfSystemDirectory+0x220 ffff820a`a8f11810 fffff802`64880753 : ffffbc0f`d43f5180 fffff802`62400001 fffff802`5dd31101 fffff802`62991400 : Ntfs!TxfInitializeVolume+0x335 ffff820a`a8f11950 fffff802`647719c0 : ffffbc0f`d0952d68 fffff802`64771600 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonFileSystemControl+0x16b ffff820a`a8f11a30 fffff802`624bd095 : ffffbc0f`cc8877d0 ffffbc0f`d0377040 ffffbc0f`cc8877d0 ffffbc0f`d0952df8 : Ntfs!NtfsFspDispatch+0x3c0 ffff820a`a8f11b70 fffff802`6252a7a5 : ffffbc0f`d0377040 00000000`00000080 ffffbc0f`cc8af080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105 ffff820a`a8f11c10 fffff802`625c8b2a : ffffe300`3d539180 ffffbc0f`d0377040 fffff802`6252a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffff820a`a8f11c60 00000000`00000000 : ffff820a`a8f12000 ffff820a`a8f0c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR fffff80263ce5c21 - FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+7a1 [ fd:f5 ] 1 error : !FLTMGR (fffff80263ce5c21) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: ONE_BIT STACK_COMMAND: .cxr 0xffff820aa8f10a90 ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT TARGET_TIME: 2020-01-20T19:07:48.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 3c87 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: memory_corruption --------- UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: ffffcd00ad11d2b0 Arg3: 000000f09647f7f8 Arg4: fffff801757d284c Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd. SYSTEM_PRODUCT_NAME: B450 GAMING X SYSTEM_SKU: Default string SYSTEM_VERSION: Default string BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: F50 BIOS_DATE: 11/27/2019 BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd. BASEBOARD_PRODUCT: B450 GAMING X BASEBOARD_VERSION: x.x DUMP_TYPE: 2 BUGCHECK_P1: 8 BUGCHECK_P2: ffffcd00ad11d2b0 BUGCHECK_P3: f09647f7f8 BUGCHECK_P4: fffff801757d284c BUGCHECK_STR: 0x7f_8 TRAP_FRAME: ffffcd00ad11d2b0 -- (.trap 0xffffcd00ad11d2b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000023 rbx=0000000000000000 rcx=00007fff6791c524 rdx=00007fff64b40000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff801757d284c rsp=000000f09647f7f8 rbp=0000000000000000 r8=0000000000000006 r9=000000f09647f830 r10=ffffffffffffffff r11=0000000000000246 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na pe nc nt!KiSystemCall64+0xc: fffff801`757d284c 65488b2425a8010000 mov rsp,qword ptr gs:[1A8h] gs:00000000`000001a8=???????????????? Resetting default scope CPU_COUNT: 10 CPU_MHZ: e6d CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: WmiPrvSE.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-20-2020 23:23:24.0377 ANALYSIS_VERSION: 10.0.18362.1 x86fre BAD_STACK_POINTER: 000000f09647f7f8 LAST_CONTROL_TRANSFER: from fffff801757d32e9 to fffff801757c14e0 STACK_TEXT: ffffcd00`ad11d168 fffff801`757d32e9 : 00000000`0000007f 00000000`00000008 ffffcd00`ad11d2b0 000000f0`9647f7f8 : nt!KeBugCheckEx ffffcd00`ad11d170 fffff801`757ce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffcd00`ad11d2b0 fffff801`757d284c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5 000000f0`9647f7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemCall64+0xc THREAD_SHA1_HASH_MOD_FUNC: d998fe020a7bf757d69726f6a68a4c5e54a760f5 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3b0d8742792bf900a74135b28da7f2938ee852be THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791 FOLLOWUP_IP: nt!KiDoubleFaultAbort+2c5 fffff801`757ce145 90 nop FAULT_INSTR_CODE: 6666c390 SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!KiDoubleFaultAbort+2c5 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0 IMAGE_VERSION: 10.0.18362.592 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 2c5 FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort PRIMARY_PROBLEM_CLASS: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort TARGET_TIME: 2020-01-20T19:32:24.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 6624 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x7f_8_stackptr_error_nt!kidoublefaultabort FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffff80000004, The exception code that was not handled Arg2: fffff80153f4206c, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffff828a45efa108, Parameter 1 of the exception Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd. SYSTEM_PRODUCT_NAME: B450 GAMING X SYSTEM_SKU: Default string SYSTEM_VERSION: Default string BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: F50 BIOS_DATE: 11/27/2019 BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd. BASEBOARD_PRODUCT: B450 GAMING X BASEBOARD_VERSION: x.x DUMP_TYPE: 2 BUGCHECK_P1: ffffffff80000004 BUGCHECK_P2: fffff80153f4206c BUGCHECK_P3: 0 BUGCHECK_P4: ffff828a45efa108 EXCEPTION_CODE: (HRESULT) 0x80000004 (2147483652) - B yle bir arabirim desteklenmiyor FAULTING_IP: amdppm!ReadIoMemRaw+e4 fffff801`53f4206c 0fb6c0 movzx eax,al EXCEPTION_PARAMETER2: ffff828a45efa108 BUGCHECK_STR: 0x1E_80000004 CPU_COUNT: 10 CPU_MHZ: e6d CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-20-2020 23:23:28.0704 ANALYSIS_VERSION: 10.0.18362.1 x86fre EXCEPTION_RECORD: 0000000000140001 -- (.exr 0x140001) Cannot read Exception record @ 0000000000140001 TRAP_FRAME: fffff801417766c0 -- (.trap 0xfffff801417766c0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fbaee8f975003983 rsp=ec834808244c8948 rbp=8b4800036912e828 r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 vif ov dn di ng zr na po nc ffff:fbaee8f9`75003983 ?? ??? Resetting default scope BAD_STACK_POINTER: ec834808244c8948 LAST_CONTROL_TRANSFER: from fffff80141aa653e to fffff801419c14e0 STACK_TEXT: ffffc588`5c6d0558 fffff801`41aa653e : 00000000`0000001e ffffffff`80000004 fffff801`53f4206c 00000000`00000000 : nt!KeBugCheckEx ffffc588`5c6d0560 fffff801`419ca312 : fffff801`41d11000 fffff801`41800000 0005e548`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22 ffffc588`5c6d05a0 fffff801`418c2fa5 : 00000000`00000000 00000000`00000000 ffffc588`5c6d0b10 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12 ffffc588`5c6d05d0 fffff801`418c753e : ffffc588`5c6d1508 ffffc588`5c6d1250 ffffc588`5c6d1508 ffff828a`45efa108 : nt!RtlDispatchException+0x4a5 ffffc588`5c6d0d20 fffff801`419d341d : 00000000`00140001 00000000`00000001 fffff801`417766c0 fffff801`417602ca : nt!KiDispatchException+0x16e ffffc588`5c6d13d0 fffff801`419cc5e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000e : nt!KiExceptionDispatch+0x11d ffffc588`5c6d15b0 fffff801`53f4206c : fffff801`53f421d0 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 : nt!KxDebugTrapOrFault+0x3e5 ffffc588`5c6d1748 fffff801`53f421d0 : 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 00000000`00005cf5 : amdppm!ReadIoMemRaw+0xe4 ffffc588`5c6d1750 fffff801`53f4a9aa : 00000000`00000000 00000000`00000000 ffff828a`440f2720 fffff801`41af024b : amdppm!ReadGenAddr+0x18 ffffc588`5c6d1780 fffff801`53f4a863 : ffffd880`d9bb9180 00000000`00000000 ffffd880`d9bb9100 000001df`1605dab4 : amdppm!C2Idle+0x8a ffffc588`5c6d17b0 fffff801`41821e7c : 00000000`0000002e 00000000`00000000 ffff828a`46470010 00000000`0000002e : amdppm!AcpiCStateIdleExecute+0x23 ffffc588`5c6d17e0 fffff801`418215ce : 00000000`00000003 00000000`00000002 ffff828a`46470100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c ffffc588`5c6d1b00 fffff801`419c4fe8 : ffffffff`00000000 ffffd880`d9bb9180 ffff828a`3cd84040 00000000`00000b6b : nt!PoIdle+0x36e ffffc588`5c6d1c60 00000000`00000000 : ffffc588`5c6d2000 ffffc588`5c6cc000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48 THREAD_SHA1_HASH_MOD_FUNC: f567785a2aa709df54df08e1708e3e6de0fcbf87 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 26e79b0c8a19c9eb798a9396ece3fd96783ae3ec THREAD_SHA1_HASH_MOD: 0e4c860846993d7e3faf763ce25943f431bdbf85 FOLLOWUP_IP: amdppm!ReadIoMemRaw+e4 fffff801`53f4206c 0fb6c0 movzx eax,al FAULT_INSTR_CODE: c3c0b60f SYMBOL_STACK_INDEX: 7 SYMBOL_NAME: amdppm!ReadIoMemRaw+e4 FOLLOWUP_NAME: MachineOwner MODULE_NAME: amdppm IMAGE_NAME: amdppm.sys DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.387 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: e4 FAILURE_BUCKET_ID: 0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw BUCKET_ID: 0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw PRIMARY_PROBLEM_CLASS: 0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw TARGET_TIME: 2020-01-20T19:17:18.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 41e9 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1e_80000004_stackptr_error_amdppm!readiomemraw FAILURE_ID_HASH: {7bb3962b-00ba-2a7f-4bf4-c161c3461831} Followup: MachineOwner --------- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffd8014ff121d0, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: ffffd8014ff121d0, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd. SYSTEM_PRODUCT_NAME: B450 GAMING X SYSTEM_SKU: Default string SYSTEM_VERSION: Default string BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: F50 BIOS_DATE: 11/27/2019 BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd. BASEBOARD_PRODUCT: B450 GAMING X BASEBOARD_VERSION: x.x DUMP_TYPE: 2 BUGCHECK_P1: ffffd8014ff121d0 BUGCHECK_P2: ff BUGCHECK_P3: 0 BUGCHECK_P4: ffffd8014ff121d0 READ_ADDRESS: fffff8013f3733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffffd8014ff121d0 CURRENT_IRQL: 0 FAULTING_IP: +0 ffffd801`4ff121d0 ?? ??? ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target. BUGCHECK_STR: DISABLED_INTERRUPT_FAULT CPU_COUNT: 10 CPU_MHZ: e6d CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-20-2020 23:23:32.0873 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: ffff918c622d15c0 -- (.trap 0xffff918c622d15c0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000414 rdx=0000000000000414 rsi=0000000000000000 rdi=0000000000000000 rip=ffffd8014ff121d0 rsp=ffff918c622d1750 rbp=ffff980f51e48010 r8=0000000000000000 r9=0000000000000000 r10=ffff980f51dfc868 r11=ffff9af9d0200000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl zr na po nc ffffd801`4ff121d0 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8013efd32e9 to fffff8013efc14e0 FAILED_INSTRUCTION_ADDRESS: +0 ffffd801`4ff121d0 ?? ??? STACK_TEXT: ffff918c`622d1478 fffff801`3efd32e9 : 00000000`0000000a ffffd801`4ff121d0 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx ffff918c`622d1480 fffff801`3efcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffff918c`622d15c0 ffffd801`4ff121d0 : ffff918c`622d1780 ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 : nt!KiPageFault+0x46b ffff918c`622d1750 ffff918c`622d1780 : ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 00000000`00000000 : 0xffffd801`4ff121d0 ffff918c`622d1758 ffff69bf`f32ce2c4 : 00000000`00011f9e 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa : 0xffff918c`622d1780 ffff918c`622d1760 00000000`00011f9e : 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 : 0xffff69bf`f32ce2c4 ffff918c`622d1768 00000000`0000b976 : 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 : 0x11f9e ffff918c`622d1770 00000000`00000000 : fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 ffff980f`4bffa720 : 0xb976 THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 497aaf2f8d4f907c0c9bce6ce025c930b885e2b8 THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b FOLLOWUP_IP: nt!KiPageFault+46b fffff801`3efcf62b 33c0 xor eax,eax FAULT_INSTR_CODE: ffb0c033 SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!KiPageFault+46b FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0 IMAGE_VERSION: 10.0.18362.592 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 46b FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault PRIMARY_PROBLEM_CLASS: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault TARGET_TIME: 2020-01-20T19:26:50.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 4179 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:disabled_interrupt_fault_code_av_bad_ip_nt!kipagefault FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36} Followup: MachineOwner --------- CRITICAL_PROCESS_DIED (ef) A critical system process died Arguments: Arg1: ffffda85ddd64340, Process object or thread object Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died. Arg3: 0000000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ ***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057. ------------------------------------------------ | | | NT symbols are not available | | Wmitrace cannot operate without them | | | ------------------------------------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 DUMP_TYPE: 2 BUGCHECK_P1: ffffda85ddd64340 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 CPU_COUNT: 10 CPU_MHZ: e6d CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_0xEF BUGCHECK_STR: 0xEF CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-20-2020 23:23:15.0780 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8017d2cae89 to fffff8017cbc14e0 STACK_TEXT: ffffad08`4e5e8938 fffff801`7d2cae89 : 00000000`000000ef ffffda85`ddd64340 00000000`00000000 00000000`00000000 : 0xfffff801`7cbc14e0 ffffad08`4e5e8940 00000000`000000ef : ffffda85`ddd64340 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff801`7d2cae89 ffffad08`4e5e8948 ffffda85`ddd64340 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xef ffffad08`4e5e8950 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`c0000005 : 0xffffda85`ddd64340 SYMBOL_NAME: ANALYSIS_INCONCLUSIVE FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID: CORRUPT_MODULELIST_0xEF PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_0xEF FAILURE_BUCKET_ID: CORRUPT_MODULELIST_0xEF TARGET_TIME: 2020-01-20T19:43:51.000Z OSBUILD: 18362 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date ANALYSIS_SESSION_ELAPSED_TIME: 1f ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:corrupt_modulelist_0xef FAILURE_ID_HASH: {622df55c-925d-d478-30ae-d5699ff4662f} Followup: MachineOwner ---------
Tekrardan paylaşıyorum. Sistemde sadece SSD takılı.Health sonuçları gelmedi, ayrıca defalarca test ettiysen sonuçları bize fotoğraf şeklinde bildir, kasaya sadece SSD mi takılı başka birim yok mu?
Çok teşekkür ederim desteklerin için. Servise yolladım, kit RAM yolladılar. Sorun çözüldüTek bellek takıp sistemi dener misin?
Dosya o şekilde dosya alırsan gönder.