Çözüldü SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

okankurubas

Megapat
Katılım
21 Eylül 2013
Mesajlar
997
Çözümler
2
Yer
İzmir
Belleklerin arızalı olduğunu düşündüm ve servise yolladım. Test edildi ve geri geldi. Tekrar sisteme taktığımda mavi ekran hatalarım devam ediyordu. Aşağıya bıraktım dosyaları.
Mavi Ekran Hataları
 
Son düzenleyen: Moderatör:
Çözüm
Servise göndermeden önce konuna dediklerimizi yaptıktan sonra gönderseydin daha iyiydi.

Tekrar soruyorum Memtest86 testi yaptın mı?

Belleklerin kit mi?
Kit demek ikisi de aynı kutudan çıktı demek, iki farklı kutu değil.

HDtune sonuçları paylaşır mısın?
(Error scan, health)
Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff80263ce515e, The address that the exception occurred at
Arg3: ffff820aa8f11248, Exception Record Address
Arg4: ffff820aa8f10a90, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc000001d

BUGCHECK_P2: fffff80263ce515e

BUGCHECK_P3: ffff820aa8f11248

BUGCHECK_P4: ffff820aa8f10a90

EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

FAULTING_IP:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce              ???

EXCEPTION_RECORD:  ffff820aa8f11248 -- (.exr 0xffff820aa8f11248)
ExceptionAddress: fffff80263ce515e (FLTMGR!FltpPerformPreCallbacks+0x00000000000009fe)
   ExceptionCode: c000001d (Illegal instruction)
  ExceptionFlags: 00000000
NumberParameters: 0

CONTEXT:  ffff820aa8f10a90 -- (.cxr 0xffff820aa8f10a90)
rax=0000000000000208 rbx=ffffbc0fd43708b0 rcx=0000000000000208
rdx=0000000000000005 rsi=ffffbc0fd4370c50 rdi=ffffbc0fd0870d40
rip=fffff80263ce515e rsp=ffff820aa8f11488 rbp=ffffbc0fd45ecb30
r8=0000000000000208  r9=0000000000000001 r10=ffffbc0fd03f3240
r11=fffff80263cfc470 r12=0000000000000000 r13=0000000000000000
r14=ffffbc0fd43708b0 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
FLTMGR!FltpPerformPreCallbacks+0x9fe:
fffff802`63ce515e ce              ???
Resetting default scope

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

EXCEPTION_CODE_STR:  c000001d

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:20.0126

ANALYSIS_VERSION: 10.0.18362.1 x86fre

MISALIGNED_IP:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce              ???

LAST_CONTROL_TRANSFER:  from ffffbc0fd43f5030 to fffff80263ce515e

FAILED_INSTRUCTION_ADDRESS:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce              ???

STACK_TEXT:
ffff820a`a8f11488 ffffbc0f`d43f5030 : fffff802`629e74cd ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 : FLTMGR!FltpPerformPreCallbacks+0x9fe
ffff820a`a8f11598 fffff802`629e74cd : ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 ffffbc0f`d43708b0 : 0xffffbc0f`d43f5030
ffff820a`a8f115a0 fffff802`629fa0e0 : ffff820a`a8f11900 00000000`00000000 ffffbc0f`cc9f9f00 fffff802`628f4fc0 : nt!IopDeleteFile+0x12d
ffff820a`a8f11620 fffff802`624390c4 : 00000000`00000000 00000000`00000000 ffff820a`a8f11900 ffffbc0f`d4596e60 : nt!ObpRemoveObjectRoutine+0x80
ffff820a`a8f11680 fffff802`648926ad : 00000000`00000000 ffffbc0f`d4596e60 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0xa4
ffff820a`a8f116c0 fffff802`648abc94 : ffffcc04`cf383170 ffff820a`a8f119c9 ffffbc0f`d4369c28 ffffcc04`cf383010 : Ntfs!NtfsDeleteInternalAttributeStream+0x111
ffff820a`a8f11700 fffff802`648afb09 : ffffbc0f`d4369c28 00000000`00000000 00000000`00000000 00000067`00000000 : Ntfs!TxfInitializeTxfSystemDirectory+0x220
ffff820a`a8f11810 fffff802`64880753 : ffffbc0f`d43f5180 fffff802`62400001 fffff802`5dd31101 fffff802`62991400 : Ntfs!TxfInitializeVolume+0x335
ffff820a`a8f11950 fffff802`647719c0 : ffffbc0f`d0952d68 fffff802`64771600 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonFileSystemControl+0x16b
ffff820a`a8f11a30 fffff802`624bd095 : ffffbc0f`cc8877d0 ffffbc0f`d0377040 ffffbc0f`cc8877d0 ffffbc0f`d0952df8 : Ntfs!NtfsFspDispatch+0x3c0
ffff820a`a8f11b70 fffff802`6252a7a5 : ffffbc0f`d0377040 00000000`00000080 ffffbc0f`cc8af080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff820a`a8f11c10 fffff802`625c8b2a : ffffe300`3d539180 ffffbc0f`d0377040 fffff802`6252a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff820a`a8f11c60 00000000`00000000 : ffff820a`a8f12000 ffff820a`a8f0c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff80263ce5c21 - FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+7a1
    [ fd:f5 ]
1 error : !FLTMGR (fffff80263ce5c21)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xffff820aa8f10a90 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-01-20T19:07:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3c87

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffcd00ad11d2b0
Arg3: 000000f09647f7f8
Arg4: fffff801757d284c

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450 GAMING X

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450 GAMING X

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: ffffcd00ad11d2b0

BUGCHECK_P3: f09647f7f8

BUGCHECK_P4: fffff801757d284c

BUGCHECK_STR:  0x7f_8

TRAP_FRAME:  ffffcd00ad11d2b0 -- (.trap 0xffffcd00ad11d2b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000023 rbx=0000000000000000 rcx=00007fff6791c524
rdx=00007fff64b40000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801757d284c rsp=000000f09647f7f8 rbp=0000000000000000
r8=0000000000000006  r9=000000f09647f830 r10=ffffffffffffffff
r11=0000000000000246 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na pe nc
nt!KiSystemCall64+0xc:
fffff801`757d284c 65488b2425a8010000 mov   rsp,qword ptr gs:[1A8h] gs:00000000`000001a8=????????????????
Resetting default scope

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  WmiPrvSE.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:24.0377

ANALYSIS_VERSION: 10.0.18362.1 x86fre

BAD_STACK_POINTER:  000000f09647f7f8

LAST_CONTROL_TRANSFER:  from fffff801757d32e9 to fffff801757c14e0

STACK_TEXT:
ffffcd00`ad11d168 fffff801`757d32e9 : 00000000`0000007f 00000000`00000008 ffffcd00`ad11d2b0 000000f0`9647f7f8 : nt!KeBugCheckEx
ffffcd00`ad11d170 fffff801`757ce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcd00`ad11d2b0 fffff801`757d284c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
000000f0`9647f7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemCall64+0xc


THREAD_SHA1_HASH_MOD_FUNC:  d998fe020a7bf757d69726f6a68a4c5e54a760f5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  3b0d8742792bf900a74135b28da7f2938ee852be

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!KiDoubleFaultAbort+2c5
fffff801`757ce145 90              nop

FAULT_INSTR_CODE:  6666c390

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c5

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

PRIMARY_PROBLEM_CLASS:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

TARGET_TIME:  2020-01-20T19:32:24.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  6624

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x7f_8_stackptr_error_nt!kidoublefaultabort

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000004, The exception code that was not handled
Arg2: fffff80153f4206c, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffff828a45efa108, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450 GAMING X

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450 GAMING X

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: ffffffff80000004

BUGCHECK_P2: fffff80153f4206c

BUGCHECK_P3: 0

BUGCHECK_P4: ffff828a45efa108

EXCEPTION_CODE: (HRESULT) 0x80000004 (2147483652) - B yle bir arabirim desteklenmiyor

FAULTING_IP:
amdppm!ReadIoMemRaw+e4
fffff801`53f4206c 0fb6c0          movzx   eax,al

EXCEPTION_PARAMETER2:  ffff828a45efa108

BUGCHECK_STR:  0x1E_80000004

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:28.0704

ANALYSIS_VERSION: 10.0.18362.1 x86fre

EXCEPTION_RECORD:  0000000000140001 -- (.exr 0x140001)
Cannot read Exception record @ 0000000000140001

TRAP_FRAME:  fffff801417766c0 -- (.trap 0xfffff801417766c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fbaee8f975003983 rsp=ec834808244c8948 rbp=8b4800036912e828
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0     vif ov dn di ng zr na po nc
ffff:fbaee8f9`75003983 ??              ???
Resetting default scope

BAD_STACK_POINTER:  ec834808244c8948

LAST_CONTROL_TRANSFER:  from fffff80141aa653e to fffff801419c14e0

STACK_TEXT:
ffffc588`5c6d0558 fffff801`41aa653e : 00000000`0000001e ffffffff`80000004 fffff801`53f4206c 00000000`00000000 : nt!KeBugCheckEx
ffffc588`5c6d0560 fffff801`419ca312 : fffff801`41d11000 fffff801`41800000 0005e548`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
ffffc588`5c6d05a0 fffff801`418c2fa5 : 00000000`00000000 00000000`00000000 ffffc588`5c6d0b10 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffffc588`5c6d05d0 fffff801`418c753e : ffffc588`5c6d1508 ffffc588`5c6d1250 ffffc588`5c6d1508 ffff828a`45efa108 : nt!RtlDispatchException+0x4a5
ffffc588`5c6d0d20 fffff801`419d341d : 00000000`00140001 00000000`00000001 fffff801`417766c0 fffff801`417602ca : nt!KiDispatchException+0x16e
ffffc588`5c6d13d0 fffff801`419cc5e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000e : nt!KiExceptionDispatch+0x11d
ffffc588`5c6d15b0 fffff801`53f4206c : fffff801`53f421d0 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 : nt!KxDebugTrapOrFault+0x3e5
ffffc588`5c6d1748 fffff801`53f421d0 : 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 00000000`00005cf5 : amdppm!ReadIoMemRaw+0xe4
ffffc588`5c6d1750 fffff801`53f4a9aa : 00000000`00000000 00000000`00000000 ffff828a`440f2720 fffff801`41af024b : amdppm!ReadGenAddr+0x18
ffffc588`5c6d1780 fffff801`53f4a863 : ffffd880`d9bb9180 00000000`00000000 ffffd880`d9bb9100 000001df`1605dab4 : amdppm!C2Idle+0x8a
ffffc588`5c6d17b0 fffff801`41821e7c : 00000000`0000002e 00000000`00000000 ffff828a`46470010 00000000`0000002e : amdppm!AcpiCStateIdleExecute+0x23
ffffc588`5c6d17e0 fffff801`418215ce : 00000000`00000003 00000000`00000002 ffff828a`46470100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c
ffffc588`5c6d1b00 fffff801`419c4fe8 : ffffffff`00000000 ffffd880`d9bb9180 ffff828a`3cd84040 00000000`00000b6b : nt!PoIdle+0x36e
ffffc588`5c6d1c60 00000000`00000000 : ffffc588`5c6d2000 ffffc588`5c6cc000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  f567785a2aa709df54df08e1708e3e6de0fcbf87

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  26e79b0c8a19c9eb798a9396ece3fd96783ae3ec

THREAD_SHA1_HASH_MOD:  0e4c860846993d7e3faf763ce25943f431bdbf85

FOLLOWUP_IP:
amdppm!ReadIoMemRaw+e4
fffff801`53f4206c 0fb6c0          movzx   eax,al

FAULT_INSTR_CODE:  c3c0b60f

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  amdppm!ReadIoMemRaw+e4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: amdppm

IMAGE_NAME:  amdppm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.387

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  e4

FAILURE_BUCKET_ID:  0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw

BUCKET_ID:  0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw

PRIMARY_PROBLEM_CLASS:  0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw

TARGET_TIME:  2020-01-20T19:17:18.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  41e9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_80000004_stackptr_error_amdppm!readiomemraw

FAILURE_ID_HASH:  {7bb3962b-00ba-2a7f-4bf4-c161c3461831}

Followup:     MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd8014ff121d0, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: ffffd8014ff121d0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450 GAMING X

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450 GAMING X

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: ffffd8014ff121d0

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: ffffd8014ff121d0

READ_ADDRESS: fffff8013f3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffd8014ff121d0

CURRENT_IRQL:  0

FAULTING_IP:
+0
ffffd801`4ff121d0 ??              ???

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BUGCHECK_STR:  DISABLED_INTERRUPT_FAULT

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:32.0873

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff918c622d15c0 -- (.trap 0xffff918c622d15c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000414
rdx=0000000000000414 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd8014ff121d0 rsp=ffff918c622d1750 rbp=ffff980f51e48010
r8=0000000000000000  r9=0000000000000000 r10=ffff980f51dfc868
r11=ffff9af9d0200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
ffffd801`4ff121d0 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8013efd32e9 to fffff8013efc14e0

FAILED_INSTRUCTION_ADDRESS:
+0
ffffd801`4ff121d0 ??              ???

STACK_TEXT:
ffff918c`622d1478 fffff801`3efd32e9 : 00000000`0000000a ffffd801`4ff121d0 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff918c`622d1480 fffff801`3efcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff918c`622d15c0 ffffd801`4ff121d0 : ffff918c`622d1780 ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 : nt!KiPageFault+0x46b
ffff918c`622d1750 ffff918c`622d1780 : ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 00000000`00000000 : 0xffffd801`4ff121d0
ffff918c`622d1758 ffff69bf`f32ce2c4 : 00000000`00011f9e 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa : 0xffff918c`622d1780
ffff918c`622d1760 00000000`00011f9e : 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 : 0xffff69bf`f32ce2c4
ffff918c`622d1768 00000000`0000b976 : 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 : 0x11f9e
ffff918c`622d1770 00000000`00000000 : fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 ffff980f`4bffa720 : 0xb976


THREAD_SHA1_HASH_MOD_FUNC:  bf99962f16aee8a6a536cfcc5454c0cd4db15ac9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  497aaf2f8d4f907c0c9bce6ce025c930b885e2b8

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!KiPageFault+46b
fffff801`3efcf62b 33c0            xor     eax,eax

FAULT_INSTR_CODE:  ffb0c033

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+46b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  46b

FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

PRIMARY_PROBLEM_CLASS:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

TARGET_TIME:  2020-01-20T19:26:50.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  4179

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:disabled_interrupt_fault_code_av_bad_ip_nt!kipagefault

FAILURE_ID_HASH:  {f2ab72c5-099d-9077-bfcf-ba12aa825b36}

Followup:     MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffda85ddd64340, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.

------------------------------------------------
|                                              |
|         NT symbols are not available         |
|     Wmitrace cannot operate without them     |
|                                              |
------------------------------------------------

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

DUMP_TYPE:  2

BUGCHECK_P1: ffffda85ddd64340

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CORRUPT_MODULELIST_0xEF

BUGCHECK_STR:  0xEF

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:15.0780

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8017d2cae89 to fffff8017cbc14e0

STACK_TEXT:
ffffad08`4e5e8938 fffff801`7d2cae89 : 00000000`000000ef ffffda85`ddd64340 00000000`00000000 00000000`00000000 : 0xfffff801`7cbc14e0
ffffad08`4e5e8940 00000000`000000ef : ffffda85`ddd64340 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff801`7d2cae89
ffffad08`4e5e8948 ffffda85`ddd64340 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xef
ffffad08`4e5e8950 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`c0000005 : 0xffffda85`ddd64340


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  CORRUPT_MODULELIST_0xEF

PRIMARY_PROBLEM_CLASS:  CORRUPT_MODULELIST_0xEF

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_0xEF

TARGET_TIME:  2020-01-20T19:43:51.000Z

OSBUILD:  18362

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

ANALYSIS_SESSION_ELAPSED_TIME:  1f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:corrupt_modulelist_0xef

FAILURE_ID_HASH:  {622df55c-925d-d478-30ae-d5699ff4662f}

Followup:     MachineOwner
---------
Servise göndermeden önce konuna dediklerimizi yaptıktan sonra gönderseydin daha iyiydi.

Tekrar soruyorum Memtest86 testi yaptın mı?

Belleklerin kit mi?
Kit demek ikisi de aynı kutudan çıktı demek, iki farklı kutu değil.

HDtune sonuçları paylaşır mısın?
(Error scan, health)
Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff80263ce515e, The address that the exception occurred at
Arg3: ffff820aa8f11248, Exception Record Address
Arg4: ffff820aa8f10a90, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc000001d

BUGCHECK_P2: fffff80263ce515e

BUGCHECK_P3: ffff820aa8f11248

BUGCHECK_P4: ffff820aa8f10a90

EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

FAULTING_IP:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce              ???

EXCEPTION_RECORD:  ffff820aa8f11248 -- (.exr 0xffff820aa8f11248)
ExceptionAddress: fffff80263ce515e (FLTMGR!FltpPerformPreCallbacks+0x00000000000009fe)
   ExceptionCode: c000001d (Illegal instruction)
  ExceptionFlags: 00000000
NumberParameters: 0

CONTEXT:  ffff820aa8f10a90 -- (.cxr 0xffff820aa8f10a90)
rax=0000000000000208 rbx=ffffbc0fd43708b0 rcx=0000000000000208
rdx=0000000000000005 rsi=ffffbc0fd4370c50 rdi=ffffbc0fd0870d40
rip=fffff80263ce515e rsp=ffff820aa8f11488 rbp=ffffbc0fd45ecb30
r8=0000000000000208  r9=0000000000000001 r10=ffffbc0fd03f3240
r11=fffff80263cfc470 r12=0000000000000000 r13=0000000000000000
r14=ffffbc0fd43708b0 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
FLTMGR!FltpPerformPreCallbacks+0x9fe:
fffff802`63ce515e ce              ???
Resetting default scope

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

EXCEPTION_CODE_STR:  c000001d

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:20.0126

ANALYSIS_VERSION: 10.0.18362.1 x86fre

MISALIGNED_IP:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce              ???

LAST_CONTROL_TRANSFER:  from ffffbc0fd43f5030 to fffff80263ce515e

FAILED_INSTRUCTION_ADDRESS:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce              ???

STACK_TEXT:
ffff820a`a8f11488 ffffbc0f`d43f5030 : fffff802`629e74cd ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 : FLTMGR!FltpPerformPreCallbacks+0x9fe
ffff820a`a8f11598 fffff802`629e74cd : ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 ffffbc0f`d43708b0 : 0xffffbc0f`d43f5030
ffff820a`a8f115a0 fffff802`629fa0e0 : ffff820a`a8f11900 00000000`00000000 ffffbc0f`cc9f9f00 fffff802`628f4fc0 : nt!IopDeleteFile+0x12d
ffff820a`a8f11620 fffff802`624390c4 : 00000000`00000000 00000000`00000000 ffff820a`a8f11900 ffffbc0f`d4596e60 : nt!ObpRemoveObjectRoutine+0x80
ffff820a`a8f11680 fffff802`648926ad : 00000000`00000000 ffffbc0f`d4596e60 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0xa4
ffff820a`a8f116c0 fffff802`648abc94 : ffffcc04`cf383170 ffff820a`a8f119c9 ffffbc0f`d4369c28 ffffcc04`cf383010 : Ntfs!NtfsDeleteInternalAttributeStream+0x111
ffff820a`a8f11700 fffff802`648afb09 : ffffbc0f`d4369c28 00000000`00000000 00000000`00000000 00000067`00000000 : Ntfs!TxfInitializeTxfSystemDirectory+0x220
ffff820a`a8f11810 fffff802`64880753 : ffffbc0f`d43f5180 fffff802`62400001 fffff802`5dd31101 fffff802`62991400 : Ntfs!TxfInitializeVolume+0x335
ffff820a`a8f11950 fffff802`647719c0 : ffffbc0f`d0952d68 fffff802`64771600 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonFileSystemControl+0x16b
ffff820a`a8f11a30 fffff802`624bd095 : ffffbc0f`cc8877d0 ffffbc0f`d0377040 ffffbc0f`cc8877d0 ffffbc0f`d0952df8 : Ntfs!NtfsFspDispatch+0x3c0
ffff820a`a8f11b70 fffff802`6252a7a5 : ffffbc0f`d0377040 00000000`00000080 ffffbc0f`cc8af080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff820a`a8f11c10 fffff802`625c8b2a : ffffe300`3d539180 ffffbc0f`d0377040 fffff802`6252a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff820a`a8f11c60 00000000`00000000 : ffff820a`a8f12000 ffff820a`a8f0c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff80263ce5c21 - FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+7a1
    [ fd:f5 ]
1 error : !FLTMGR (fffff80263ce5c21)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xffff820aa8f10a90 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-01-20T19:07:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3c87

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffcd00ad11d2b0
Arg3: 000000f09647f7f8
Arg4: fffff801757d284c

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450 GAMING X

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450 GAMING X

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: ffffcd00ad11d2b0

BUGCHECK_P3: f09647f7f8

BUGCHECK_P4: fffff801757d284c

BUGCHECK_STR:  0x7f_8

TRAP_FRAME:  ffffcd00ad11d2b0 -- (.trap 0xffffcd00ad11d2b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000023 rbx=0000000000000000 rcx=00007fff6791c524
rdx=00007fff64b40000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801757d284c rsp=000000f09647f7f8 rbp=0000000000000000
r8=0000000000000006  r9=000000f09647f830 r10=ffffffffffffffff
r11=0000000000000246 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na pe nc
nt!KiSystemCall64+0xc:
fffff801`757d284c 65488b2425a8010000 mov   rsp,qword ptr gs:[1A8h] gs:00000000`000001a8=????????????????
Resetting default scope

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  WmiPrvSE.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:24.0377

ANALYSIS_VERSION: 10.0.18362.1 x86fre

BAD_STACK_POINTER:  000000f09647f7f8

LAST_CONTROL_TRANSFER:  from fffff801757d32e9 to fffff801757c14e0

STACK_TEXT:
ffffcd00`ad11d168 fffff801`757d32e9 : 00000000`0000007f 00000000`00000008 ffffcd00`ad11d2b0 000000f0`9647f7f8 : nt!KeBugCheckEx
ffffcd00`ad11d170 fffff801`757ce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcd00`ad11d2b0 fffff801`757d284c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
000000f0`9647f7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemCall64+0xc


THREAD_SHA1_HASH_MOD_FUNC:  d998fe020a7bf757d69726f6a68a4c5e54a760f5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  3b0d8742792bf900a74135b28da7f2938ee852be

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!KiDoubleFaultAbort+2c5
fffff801`757ce145 90              nop

FAULT_INSTR_CODE:  6666c390

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c5

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

PRIMARY_PROBLEM_CLASS:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

TARGET_TIME:  2020-01-20T19:32:24.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  6624

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x7f_8_stackptr_error_nt!kidoublefaultabort

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000004, The exception code that was not handled
Arg2: fffff80153f4206c, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffff828a45efa108, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450 GAMING X

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450 GAMING X

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: ffffffff80000004

BUGCHECK_P2: fffff80153f4206c

BUGCHECK_P3: 0

BUGCHECK_P4: ffff828a45efa108

EXCEPTION_CODE: (HRESULT) 0x80000004 (2147483652) - B yle bir arabirim desteklenmiyor

FAULTING_IP:
amdppm!ReadIoMemRaw+e4
fffff801`53f4206c 0fb6c0          movzx   eax,al

EXCEPTION_PARAMETER2:  ffff828a45efa108

BUGCHECK_STR:  0x1E_80000004

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:28.0704

ANALYSIS_VERSION: 10.0.18362.1 x86fre

EXCEPTION_RECORD:  0000000000140001 -- (.exr 0x140001)
Cannot read Exception record @ 0000000000140001

TRAP_FRAME:  fffff801417766c0 -- (.trap 0xfffff801417766c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fbaee8f975003983 rsp=ec834808244c8948 rbp=8b4800036912e828
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0     vif ov dn di ng zr na po nc
ffff:fbaee8f9`75003983 ??              ???
Resetting default scope

BAD_STACK_POINTER:  ec834808244c8948

LAST_CONTROL_TRANSFER:  from fffff80141aa653e to fffff801419c14e0

STACK_TEXT:
ffffc588`5c6d0558 fffff801`41aa653e : 00000000`0000001e ffffffff`80000004 fffff801`53f4206c 00000000`00000000 : nt!KeBugCheckEx
ffffc588`5c6d0560 fffff801`419ca312 : fffff801`41d11000 fffff801`41800000 0005e548`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
ffffc588`5c6d05a0 fffff801`418c2fa5 : 00000000`00000000 00000000`00000000 ffffc588`5c6d0b10 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffffc588`5c6d05d0 fffff801`418c753e : ffffc588`5c6d1508 ffffc588`5c6d1250 ffffc588`5c6d1508 ffff828a`45efa108 : nt!RtlDispatchException+0x4a5
ffffc588`5c6d0d20 fffff801`419d341d : 00000000`00140001 00000000`00000001 fffff801`417766c0 fffff801`417602ca : nt!KiDispatchException+0x16e
ffffc588`5c6d13d0 fffff801`419cc5e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000e : nt!KiExceptionDispatch+0x11d
ffffc588`5c6d15b0 fffff801`53f4206c : fffff801`53f421d0 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 : nt!KxDebugTrapOrFault+0x3e5
ffffc588`5c6d1748 fffff801`53f421d0 : 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 00000000`00005cf5 : amdppm!ReadIoMemRaw+0xe4
ffffc588`5c6d1750 fffff801`53f4a9aa : 00000000`00000000 00000000`00000000 ffff828a`440f2720 fffff801`41af024b : amdppm!ReadGenAddr+0x18
ffffc588`5c6d1780 fffff801`53f4a863 : ffffd880`d9bb9180 00000000`00000000 ffffd880`d9bb9100 000001df`1605dab4 : amdppm!C2Idle+0x8a
ffffc588`5c6d17b0 fffff801`41821e7c : 00000000`0000002e 00000000`00000000 ffff828a`46470010 00000000`0000002e : amdppm!AcpiCStateIdleExecute+0x23
ffffc588`5c6d17e0 fffff801`418215ce : 00000000`00000003 00000000`00000002 ffff828a`46470100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c
ffffc588`5c6d1b00 fffff801`419c4fe8 : ffffffff`00000000 ffffd880`d9bb9180 ffff828a`3cd84040 00000000`00000b6b : nt!PoIdle+0x36e
ffffc588`5c6d1c60 00000000`00000000 : ffffc588`5c6d2000 ffffc588`5c6cc000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  f567785a2aa709df54df08e1708e3e6de0fcbf87

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  26e79b0c8a19c9eb798a9396ece3fd96783ae3ec

THREAD_SHA1_HASH_MOD:  0e4c860846993d7e3faf763ce25943f431bdbf85

FOLLOWUP_IP:
amdppm!ReadIoMemRaw+e4
fffff801`53f4206c 0fb6c0          movzx   eax,al

FAULT_INSTR_CODE:  c3c0b60f

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  amdppm!ReadIoMemRaw+e4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: amdppm

IMAGE_NAME:  amdppm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.387

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  e4

FAILURE_BUCKET_ID:  0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw

BUCKET_ID:  0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw

PRIMARY_PROBLEM_CLASS:  0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw

TARGET_TIME:  2020-01-20T19:17:18.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  41e9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_80000004_stackptr_error_amdppm!readiomemraw

FAILURE_ID_HASH:  {7bb3962b-00ba-2a7f-4bf4-c161c3461831}

Followup:     MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd8014ff121d0, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: ffffd8014ff121d0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450 GAMING X

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450 GAMING X

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: ffffd8014ff121d0

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: ffffd8014ff121d0

READ_ADDRESS: fffff8013f3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffd8014ff121d0

CURRENT_IRQL:  0

FAULTING_IP:
+0
ffffd801`4ff121d0 ??              ???

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BUGCHECK_STR:  DISABLED_INTERRUPT_FAULT

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:32.0873

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff918c622d15c0 -- (.trap 0xffff918c622d15c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000414
rdx=0000000000000414 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd8014ff121d0 rsp=ffff918c622d1750 rbp=ffff980f51e48010
r8=0000000000000000  r9=0000000000000000 r10=ffff980f51dfc868
r11=ffff9af9d0200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
ffffd801`4ff121d0 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8013efd32e9 to fffff8013efc14e0

FAILED_INSTRUCTION_ADDRESS:
+0
ffffd801`4ff121d0 ??              ???

STACK_TEXT:
ffff918c`622d1478 fffff801`3efd32e9 : 00000000`0000000a ffffd801`4ff121d0 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff918c`622d1480 fffff801`3efcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff918c`622d15c0 ffffd801`4ff121d0 : ffff918c`622d1780 ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 : nt!KiPageFault+0x46b
ffff918c`622d1750 ffff918c`622d1780 : ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 00000000`00000000 : 0xffffd801`4ff121d0
ffff918c`622d1758 ffff69bf`f32ce2c4 : 00000000`00011f9e 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa : 0xffff918c`622d1780
ffff918c`622d1760 00000000`00011f9e : 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 : 0xffff69bf`f32ce2c4
ffff918c`622d1768 00000000`0000b976 : 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 : 0x11f9e
ffff918c`622d1770 00000000`00000000 : fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 ffff980f`4bffa720 : 0xb976


THREAD_SHA1_HASH_MOD_FUNC:  bf99962f16aee8a6a536cfcc5454c0cd4db15ac9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  497aaf2f8d4f907c0c9bce6ce025c930b885e2b8

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!KiPageFault+46b
fffff801`3efcf62b 33c0            xor     eax,eax

FAULT_INSTR_CODE:  ffb0c033

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+46b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  46b

FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

PRIMARY_PROBLEM_CLASS:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

TARGET_TIME:  2020-01-20T19:26:50.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  4179

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:disabled_interrupt_fault_code_av_bad_ip_nt!kipagefault

FAILURE_ID_HASH:  {f2ab72c5-099d-9077-bfcf-ba12aa825b36}

Followup:     MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffda85ddd64340, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.

------------------------------------------------
|                                              |
|         NT symbols are not available         |
|     Wmitrace cannot operate without them     |
|                                              |
------------------------------------------------

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

DUMP_TYPE:  2

BUGCHECK_P1: ffffda85ddd64340

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CORRUPT_MODULELIST_0xEF

BUGCHECK_STR:  0xEF

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:15.0780

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8017d2cae89 to fffff8017cbc14e0

STACK_TEXT:
ffffad08`4e5e8938 fffff801`7d2cae89 : 00000000`000000ef ffffda85`ddd64340 00000000`00000000 00000000`00000000 : 0xfffff801`7cbc14e0
ffffad08`4e5e8940 00000000`000000ef : ffffda85`ddd64340 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff801`7d2cae89
ffffad08`4e5e8948 ffffda85`ddd64340 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xef
ffffad08`4e5e8950 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`c0000005 : 0xffffda85`ddd64340


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  CORRUPT_MODULELIST_0xEF

PRIMARY_PROBLEM_CLASS:  CORRUPT_MODULELIST_0xEF

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_0xEF

TARGET_TIME:  2020-01-20T19:43:51.000Z

OSBUILD:  18362

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

ANALYSIS_SESSION_ELAPSED_TIME:  1f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:corrupt_modulelist_0xef

FAILURE_ID_HASH:  {622df55c-925d-d478-30ae-d5699ff4662f}

Followup:     MachineOwner
---------
 
Çözüm
Servise göndermeden önce konuna dediklerimizi yaptıktan sonra gönderseydin daha iyiydi.

Tekrar soruyorum Memtest86 testi yaptın mı?

Belleklerin kit mi?
Kit demek ikisi de aynı kutudan çıktı demek, iki farklı kutu değil.

HDtune sonuçları paylaşır mısın?
(Error scan, health)
Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff80263ce515e, The address that the exception occurred at
Arg3: ffff820aa8f11248, Exception Record Address
Arg4: ffff820aa8f10a90, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc000001d

BUGCHECK_P2: fffff80263ce515e

BUGCHECK_P3: ffff820aa8f11248

BUGCHECK_P4: ffff820aa8f10a90

EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

FAULTING_IP:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce              ???

EXCEPTION_RECORD:  ffff820aa8f11248 -- (.exr 0xffff820aa8f11248)
ExceptionAddress: fffff80263ce515e (FLTMGR!FltpPerformPreCallbacks+0x00000000000009fe)
   ExceptionCode: c000001d (Illegal instruction)
  ExceptionFlags: 00000000
NumberParameters: 0

CONTEXT:  ffff820aa8f10a90 -- (.cxr 0xffff820aa8f10a90)
rax=0000000000000208 rbx=ffffbc0fd43708b0 rcx=0000000000000208
rdx=0000000000000005 rsi=ffffbc0fd4370c50 rdi=ffffbc0fd0870d40
rip=fffff80263ce515e rsp=ffff820aa8f11488 rbp=ffffbc0fd45ecb30
r8=0000000000000208  r9=0000000000000001 r10=ffffbc0fd03f3240
r11=fffff80263cfc470 r12=0000000000000000 r13=0000000000000000
r14=ffffbc0fd43708b0 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
FLTMGR!FltpPerformPreCallbacks+0x9fe:
fffff802`63ce515e ce              ???
Resetting default scope

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

EXCEPTION_CODE_STR:  c000001d

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:20.0126

ANALYSIS_VERSION: 10.0.18362.1 x86fre

MISALIGNED_IP:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce              ???

LAST_CONTROL_TRANSFER:  from ffffbc0fd43f5030 to fffff80263ce515e

FAILED_INSTRUCTION_ADDRESS:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce              ???

STACK_TEXT:
ffff820a`a8f11488 ffffbc0f`d43f5030 : fffff802`629e74cd ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 : FLTMGR!FltpPerformPreCallbacks+0x9fe
ffff820a`a8f11598 fffff802`629e74cd : ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 ffffbc0f`d43708b0 : 0xffffbc0f`d43f5030
ffff820a`a8f115a0 fffff802`629fa0e0 : ffff820a`a8f11900 00000000`00000000 ffffbc0f`cc9f9f00 fffff802`628f4fc0 : nt!IopDeleteFile+0x12d
ffff820a`a8f11620 fffff802`624390c4 : 00000000`00000000 00000000`00000000 ffff820a`a8f11900 ffffbc0f`d4596e60 : nt!ObpRemoveObjectRoutine+0x80
ffff820a`a8f11680 fffff802`648926ad : 00000000`00000000 ffffbc0f`d4596e60 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0xa4
ffff820a`a8f116c0 fffff802`648abc94 : ffffcc04`cf383170 ffff820a`a8f119c9 ffffbc0f`d4369c28 ffffcc04`cf383010 : Ntfs!NtfsDeleteInternalAttributeStream+0x111
ffff820a`a8f11700 fffff802`648afb09 : ffffbc0f`d4369c28 00000000`00000000 00000000`00000000 00000067`00000000 : Ntfs!TxfInitializeTxfSystemDirectory+0x220
ffff820a`a8f11810 fffff802`64880753 : ffffbc0f`d43f5180 fffff802`62400001 fffff802`5dd31101 fffff802`62991400 : Ntfs!TxfInitializeVolume+0x335
ffff820a`a8f11950 fffff802`647719c0 : ffffbc0f`d0952d68 fffff802`64771600 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonFileSystemControl+0x16b
ffff820a`a8f11a30 fffff802`624bd095 : ffffbc0f`cc8877d0 ffffbc0f`d0377040 ffffbc0f`cc8877d0 ffffbc0f`d0952df8 : Ntfs!NtfsFspDispatch+0x3c0
ffff820a`a8f11b70 fffff802`6252a7a5 : ffffbc0f`d0377040 00000000`00000080 ffffbc0f`cc8af080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff820a`a8f11c10 fffff802`625c8b2a : ffffe300`3d539180 ffffbc0f`d0377040 fffff802`6252a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff820a`a8f11c60 00000000`00000000 : ffff820a`a8f12000 ffff820a`a8f0c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff80263ce5c21 - FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+7a1
    [ fd:f5 ]
1 error : !FLTMGR (fffff80263ce5c21)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xffff820aa8f10a90 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-01-20T19:07:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3c87

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffcd00ad11d2b0
Arg3: 000000f09647f7f8
Arg4: fffff801757d284c

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450 GAMING X

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450 GAMING X

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: ffffcd00ad11d2b0

BUGCHECK_P3: f09647f7f8

BUGCHECK_P4: fffff801757d284c

BUGCHECK_STR:  0x7f_8

TRAP_FRAME:  ffffcd00ad11d2b0 -- (.trap 0xffffcd00ad11d2b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000023 rbx=0000000000000000 rcx=00007fff6791c524
rdx=00007fff64b40000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801757d284c rsp=000000f09647f7f8 rbp=0000000000000000
r8=0000000000000006  r9=000000f09647f830 r10=ffffffffffffffff
r11=0000000000000246 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na pe nc
nt!KiSystemCall64+0xc:
fffff801`757d284c 65488b2425a8010000 mov   rsp,qword ptr gs:[1A8h] gs:00000000`000001a8=????????????????
Resetting default scope

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  WmiPrvSE.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:24.0377

ANALYSIS_VERSION: 10.0.18362.1 x86fre

BAD_STACK_POINTER:  000000f09647f7f8

LAST_CONTROL_TRANSFER:  from fffff801757d32e9 to fffff801757c14e0

STACK_TEXT:
ffffcd00`ad11d168 fffff801`757d32e9 : 00000000`0000007f 00000000`00000008 ffffcd00`ad11d2b0 000000f0`9647f7f8 : nt!KeBugCheckEx
ffffcd00`ad11d170 fffff801`757ce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcd00`ad11d2b0 fffff801`757d284c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
000000f0`9647f7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemCall64+0xc


THREAD_SHA1_HASH_MOD_FUNC:  d998fe020a7bf757d69726f6a68a4c5e54a760f5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  3b0d8742792bf900a74135b28da7f2938ee852be

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!KiDoubleFaultAbort+2c5
fffff801`757ce145 90              nop

FAULT_INSTR_CODE:  6666c390

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c5

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

PRIMARY_PROBLEM_CLASS:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

TARGET_TIME:  2020-01-20T19:32:24.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  6624

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x7f_8_stackptr_error_nt!kidoublefaultabort

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000004, The exception code that was not handled
Arg2: fffff80153f4206c, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffff828a45efa108, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450 GAMING X

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450 GAMING X

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: ffffffff80000004

BUGCHECK_P2: fffff80153f4206c

BUGCHECK_P3: 0

BUGCHECK_P4: ffff828a45efa108

EXCEPTION_CODE: (HRESULT) 0x80000004 (2147483652) - B yle bir arabirim desteklenmiyor

FAULTING_IP:
amdppm!ReadIoMemRaw+e4
fffff801`53f4206c 0fb6c0          movzx   eax,al

EXCEPTION_PARAMETER2:  ffff828a45efa108

BUGCHECK_STR:  0x1E_80000004

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:28.0704

ANALYSIS_VERSION: 10.0.18362.1 x86fre

EXCEPTION_RECORD:  0000000000140001 -- (.exr 0x140001)
Cannot read Exception record @ 0000000000140001

TRAP_FRAME:  fffff801417766c0 -- (.trap 0xfffff801417766c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fbaee8f975003983 rsp=ec834808244c8948 rbp=8b4800036912e828
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0     vif ov dn di ng zr na po nc
ffff:fbaee8f9`75003983 ??              ???
Resetting default scope

BAD_STACK_POINTER:  ec834808244c8948

LAST_CONTROL_TRANSFER:  from fffff80141aa653e to fffff801419c14e0

STACK_TEXT:
ffffc588`5c6d0558 fffff801`41aa653e : 00000000`0000001e ffffffff`80000004 fffff801`53f4206c 00000000`00000000 : nt!KeBugCheckEx
ffffc588`5c6d0560 fffff801`419ca312 : fffff801`41d11000 fffff801`41800000 0005e548`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
ffffc588`5c6d05a0 fffff801`418c2fa5 : 00000000`00000000 00000000`00000000 ffffc588`5c6d0b10 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffffc588`5c6d05d0 fffff801`418c753e : ffffc588`5c6d1508 ffffc588`5c6d1250 ffffc588`5c6d1508 ffff828a`45efa108 : nt!RtlDispatchException+0x4a5
ffffc588`5c6d0d20 fffff801`419d341d : 00000000`00140001 00000000`00000001 fffff801`417766c0 fffff801`417602ca : nt!KiDispatchException+0x16e
ffffc588`5c6d13d0 fffff801`419cc5e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000e : nt!KiExceptionDispatch+0x11d
ffffc588`5c6d15b0 fffff801`53f4206c : fffff801`53f421d0 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 : nt!KxDebugTrapOrFault+0x3e5
ffffc588`5c6d1748 fffff801`53f421d0 : 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 00000000`00005cf5 : amdppm!ReadIoMemRaw+0xe4
ffffc588`5c6d1750 fffff801`53f4a9aa : 00000000`00000000 00000000`00000000 ffff828a`440f2720 fffff801`41af024b : amdppm!ReadGenAddr+0x18
ffffc588`5c6d1780 fffff801`53f4a863 : ffffd880`d9bb9180 00000000`00000000 ffffd880`d9bb9100 000001df`1605dab4 : amdppm!C2Idle+0x8a
ffffc588`5c6d17b0 fffff801`41821e7c : 00000000`0000002e 00000000`00000000 ffff828a`46470010 00000000`0000002e : amdppm!AcpiCStateIdleExecute+0x23
ffffc588`5c6d17e0 fffff801`418215ce : 00000000`00000003 00000000`00000002 ffff828a`46470100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c
ffffc588`5c6d1b00 fffff801`419c4fe8 : ffffffff`00000000 ffffd880`d9bb9180 ffff828a`3cd84040 00000000`00000b6b : nt!PoIdle+0x36e
ffffc588`5c6d1c60 00000000`00000000 : ffffc588`5c6d2000 ffffc588`5c6cc000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  f567785a2aa709df54df08e1708e3e6de0fcbf87

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  26e79b0c8a19c9eb798a9396ece3fd96783ae3ec

THREAD_SHA1_HASH_MOD:  0e4c860846993d7e3faf763ce25943f431bdbf85

FOLLOWUP_IP:
amdppm!ReadIoMemRaw+e4
fffff801`53f4206c 0fb6c0          movzx   eax,al

FAULT_INSTR_CODE:  c3c0b60f

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  amdppm!ReadIoMemRaw+e4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: amdppm

IMAGE_NAME:  amdppm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.387

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  e4

FAILURE_BUCKET_ID:  0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw

BUCKET_ID:  0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw

PRIMARY_PROBLEM_CLASS:  0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw

TARGET_TIME:  2020-01-20T19:17:18.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  41e9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_80000004_stackptr_error_amdppm!readiomemraw

FAILURE_ID_HASH:  {7bb3962b-00ba-2a7f-4bf4-c161c3461831}

Followup:     MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd8014ff121d0, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: ffffd8014ff121d0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450 GAMING X

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450 GAMING X

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: ffffd8014ff121d0

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: ffffd8014ff121d0

READ_ADDRESS: fffff8013f3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffd8014ff121d0

CURRENT_IRQL:  0

FAULTING_IP:
+0
ffffd801`4ff121d0 ??              ???

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BUGCHECK_STR:  DISABLED_INTERRUPT_FAULT

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:32.0873

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff918c622d15c0 -- (.trap 0xffff918c622d15c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000414
rdx=0000000000000414 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd8014ff121d0 rsp=ffff918c622d1750 rbp=ffff980f51e48010
r8=0000000000000000  r9=0000000000000000 r10=ffff980f51dfc868
r11=ffff9af9d0200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
ffffd801`4ff121d0 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8013efd32e9 to fffff8013efc14e0

FAILED_INSTRUCTION_ADDRESS:
+0
ffffd801`4ff121d0 ??              ???

STACK_TEXT:
ffff918c`622d1478 fffff801`3efd32e9 : 00000000`0000000a ffffd801`4ff121d0 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff918c`622d1480 fffff801`3efcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff918c`622d15c0 ffffd801`4ff121d0 : ffff918c`622d1780 ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 : nt!KiPageFault+0x46b
ffff918c`622d1750 ffff918c`622d1780 : ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 00000000`00000000 : 0xffffd801`4ff121d0
ffff918c`622d1758 ffff69bf`f32ce2c4 : 00000000`00011f9e 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa : 0xffff918c`622d1780
ffff918c`622d1760 00000000`00011f9e : 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 : 0xffff69bf`f32ce2c4
ffff918c`622d1768 00000000`0000b976 : 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 : 0x11f9e
ffff918c`622d1770 00000000`00000000 : fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 ffff980f`4bffa720 : 0xb976


THREAD_SHA1_HASH_MOD_FUNC:  bf99962f16aee8a6a536cfcc5454c0cd4db15ac9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  497aaf2f8d4f907c0c9bce6ce025c930b885e2b8

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!KiPageFault+46b
fffff801`3efcf62b 33c0            xor     eax,eax

FAULT_INSTR_CODE:  ffb0c033

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+46b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  46b

FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

PRIMARY_PROBLEM_CLASS:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

TARGET_TIME:  2020-01-20T19:26:50.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  4179

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:disabled_interrupt_fault_code_av_bad_ip_nt!kipagefault

FAILURE_ID_HASH:  {f2ab72c5-099d-9077-bfcf-ba12aa825b36}

Followup:     MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffda85ddd64340, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.

------------------------------------------------
|                                              |
|         NT symbols are not available         |
|     Wmitrace cannot operate without them     |
|                                              |
------------------------------------------------

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

DUMP_TYPE:  2

BUGCHECK_P1: ffffda85ddd64340

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CORRUPT_MODULELIST_0xEF

BUGCHECK_STR:  0xEF

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-20-2020 23:23:15.0780

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8017d2cae89 to fffff8017cbc14e0

STACK_TEXT:
ffffad08`4e5e8938 fffff801`7d2cae89 : 00000000`000000ef ffffda85`ddd64340 00000000`00000000 00000000`00000000 : 0xfffff801`7cbc14e0
ffffad08`4e5e8940 00000000`000000ef : ffffda85`ddd64340 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff801`7d2cae89
ffffad08`4e5e8948 ffffda85`ddd64340 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xef
ffffad08`4e5e8950 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`c0000005 : 0xffffda85`ddd64340


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  CORRUPT_MODULELIST_0xEF

PRIMARY_PROBLEM_CLASS:  CORRUPT_MODULELIST_0xEF

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_0xEF

TARGET_TIME:  2020-01-20T19:43:51.000Z

OSBUILD:  18362

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

ANALYSIS_SESSION_ELAPSED_TIME:  1f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:corrupt_modulelist_0xef

FAILURE_ID_HASH:  {622df55c-925d-d478-30ae-d5699ff4662f}

Followup:     MachineOwner
---------

- Kit değil ramler,
- Memtest ile test edildi defalarca
- HD Tune Error Scan: 1 (1).png
- HD Tune Health: 1 (1).png
 
Health sonuçları gelmedi, ayrıca defalarca test ettiysen sonuçları bize fotoğraf şeklinde bildir, kasaya sadece SSD mi takılı başka birim yok mu?
Tekrardan paylaşıyorum. Sistemde sadece SSD takılı.
 

Dosya Ekleri

  • 1 (1).png
    1 (1).png
    12,1 KB · Görüntüleme: 33
  • 2 (1).png
    2 (1).png
    16,5 KB · Görüntüleme: 36
Durum
Mesaj gönderimine kapalı.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Geri
Yukarı