*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffaf0de3b5e080, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8033acb986f, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffaf0de3b5e080
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8033acb986f
READ_ADDRESS: fffff8033b1733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffaf0de3b5e080
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiDeleteVad+10bf
fffff803`3acb986f 4d39b760060000 cmp qword ptr [r15+660h],r14
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: GameOverlayUI.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-03-2019 12:51:52.0729
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffaf0de3b5d620 -- (.trap 0xffffaf0de3b5d620)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000033 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffcd0e62f06ae0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8033acb986f rsp=ffffaf0de3b5d7b0 rbp=ffffaf0de3b5d8b0
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=ffff8341a0d06000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiDeleteVad+0x10bf:
fffff803`3acb986f 4d39b760060000 cmp qword ptr [r15+660h],r14 ds:00000000`00000660=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8033add32e9 to fffff8033adc14e0
STACK_TEXT:
ffffaf0d`e3b5d4d8 fffff803`3add32e9 : 00000000`0000000a ffffaf0d`e3b5e080 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffaf0d`e3b5d4e0 fffff803`3adcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffaf0d`e3b5d620 fffff803`3acb986f : ffffffff`ffffffff ffffaf0d`e3b5d8b0 00000000`00000003 00000000`00cb8fff : nt!KiPageFault+0x46b
ffffaf0d`e3b5d7b0 fffff803`3b1c7a5d : 00000000`00000000 00000000`00000ca0 ffffcd0e`64161ee0 00000000`00000000 : nt!MiDeleteVad+0x10bf
ffffaf0d`e3b5d970 fffff803`3b1c7853 : ffffcd0e`64161ee0 00000000`00000000 00000000`00ca0000 00000000`00000000 : nt!MiUnmapVad+0x49
ffffaf0d`e3b5d9a0 fffff803`3b1c76e9 : ffffcd0e`64d67080 00000000`00000008 ffffcd0e`544bde80 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffffaf0d`e3b5da80 fffff803`3b1c73dc : ffffcd0e`5f41f080 00007ffb`cfb84e01 00000000`00cab6a0 ffffcd0e`64d67080 : nt!NtUnmapViewOfSectionEx+0x99
ffffaf0d`e3b5dad0 fffff803`3add2d18 : ffffcd0e`5f41f080 00000000`00000000 00000000`00e73000 ffffffff`ff676980 : nt!NtUnmapViewOfSection+0xc
ffffaf0d`e3b5db00 00007ffb`d0adc604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0511e5f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d0adc604
THREAD_SHA1_HASH_MOD_FUNC: 43a5b726671e3486936adbecab7ae34bdcff01d4
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 011e6cc24f558ca1cf97d2a995b31b78eb80e652
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!MiDeleteVad+10bf
fffff803`3acb986f 4d39b760060000 cmp qword ptr [r15+660h],r14
FAULT_INSTR_CODE: 60b7394d
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiDeleteVad+10bf
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 10bf
FAILURE_BUCKET_ID: AV_nt!MiDeleteVad
BUCKET_ID: AV_nt!MiDeleteVad
PRIMARY_PROBLEM_CLASS: AV_nt!MiDeleteVad
TARGET_TIME: 2019-12-03T06:45:53.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 23bf
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!mideletevad
FAILURE_ID_HASH: {dd755fb9-d873-2524-d767-c852b9db8c62}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffff890f7da765c0, The address of the thread.
Arg2: ffff890f84472838, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffff890f7da765c0
BUGCHECK_P2: ffff890f84472838
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x192
PROCESS_NAME: Steam.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-03-2019 12:51:56.0141
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8041fc39c75 to fffff8041fdc14e0
STACK_TEXT:
ffffbd82`6f013768 fffff804`1fc39c75 : 00000000`00000192 ffff890f`7da765c0 ffff890f`84472838 00000000`00000000 : nt!KeBugCheckEx
ffffbd82`6f013770 fffff804`1fcb9472 : ffffffff`ffffffff ffff890f`00000000 ffff890f`00000001 ffff890f`7da765c0 : nt!ExAcquirePushLockExclusiveEx+0x145
ffffbd82`6f0137b0 fffff804`201c7a5d : 00000000`00000000 00000000`00005ff0 ffff890f`8468ac60 00000000`00000000 : nt!MiDeleteVad+0xcc2
ffffbd82`6f013970 fffff804`201c7853 : ffff890f`8468ac60 00000000`00000000 00000000`05ff0000 00000000`00000000 : nt!MiUnmapVad+0x49
ffffbd82`6f0139a0 fffff804`201c76e9 : ffff890f`844724c0 00000000`00000008 ffff890f`70abd4e0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffffbd82`6f013a80 fffff804`201c73dc : ffff890f`7da765c0 00007ff8`6ab14e01 00000000`05ffddb8 ffff890f`844724c0 : nt!NtUnmapViewOfSectionEx+0x99
ffffbd82`6f013ad0 fffff804`1fdd2d18 : 00000000`00000001 ffffbd82`6f013b80 00000000`00374000 ffffffff`ff676980 : nt!NtUnmapViewOfSection+0xc
ffffbd82`6f013b00 00007ff8`6c3dc604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0846e2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6c3dc604
THREAD_SHA1_HASH_MOD_FUNC: af326c0780cb7c5b1ba559ebc859e67e482138c9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 14b50f0ca09655708dd99c27364bf84cac2d7546
THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8
FOLLOWUP_IP:
nt!ExAcquirePushLockExclusiveEx+145
fffff804`1fc39c75 cc int 3
FAULT_INSTR_CODE: 8b8b48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+145
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 145
FAILURE_BUCKET_ID: 0x192_nt!ExAcquirePushLockExclusiveEx
BUCKET_ID: 0x192_nt!ExAcquirePushLockExclusiveEx
PRIMARY_PROBLEM_CLASS: 0x192_nt!ExAcquirePushLockExclusiveEx
TARGET_TIME: 2019-12-03T06:29:02.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2a6a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x192_nt!exacquirepushlockexclusiveex
FAILURE_ID_HASH: {70f07b19-205c-f6b9-7ad5-00ec20680212}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8034cc4600a, Address of the instruction which caused the bugcheck
Arg3: fffff90cd62c2a60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for CorsairLLAccess64.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8034cc4600a
BUGCHECK_P3: fffff90cd62c2a60
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExFreeHeapPool+48a
fffff803`4cc4600a 4d8b2a mov r13,qword ptr [r10]
CONTEXT: fffff90cd62c2a60 -- (.cxr 0xfffff90cd62c2a60)
rax=0000000000000000 rbx=ffff89812b010000 rcx=fffff8034cc00000
rdx=fffff8034cc00000 rsi=ffff898140b45380 rdi=ffff898140b45350
rip=fffff8034cc4600a rsp=fffff90cd62c3450 rbp=0000000020206f49
r8=ffff898100000103 r9=0000000000000000 r10=ffff898100000103
r11=0000000000000000 r12=0000000000000060 r13=0000000000000001
r14=ffff898135a0a080 r15=000000000000000e
iopl=0 nv up ei pl zr ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050256
nt!ExFreeHeapPool+0x48a:
fffff803`4cc4600a 4d8b2a mov r13,qword ptr [r10] ds:002b:ffff8981`00000103=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: iCUE.exe
CURRENT_IRQL: 1
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-03-2019 12:51:59.0843
ANALYSIS_VERSION: 10.0.18362.1 x86fre
IRP_ADDRESS: ffff89813f49f638
LAST_CONTROL_TRANSFER: from fffff8034cf6f0a9 to fffff8034cc4600a
STACK_TEXT:
fffff90c`d62c3450 fffff803`4cf6f0a9 : ffff8981`3dcc2805 ffff8981`406a90c0 ffff8981`3dcc2840 01000000`00100000 : nt!ExFreeHeapPool+0x48a
fffff90c`d62c3570 fffff803`4cc4650e : ffff8981`3f49f6a0 ffff8981`38f7e560 fffff803`4cc00000 fffff803`4cc33966 : nt!ExFreePool+0x9
fffff90c`d62c35a0 fffff803`4cc47e1c : ffff8981`3f49f6b0 fffff803`00000000 00000000`00000a01 ffff8981`40b45030 : nt!IopCompleteRequest+0x8e
fffff90c`d62c3690 fffff803`4cc476a7 : 00000000`00000000 fffff803`63051000 ffff8981`399d7e10 ffff8981`3f49f6a0 : nt!IopfCompleteRequest+0x75c
fffff90c`d62c37a0 fffff803`6305127a : 00000000`00000000 fffff803`4d1f1225 ffff8981`406a93e0 00000000`000000c0 : nt!IofCompleteRequest+0x17
fffff90c`d62c37d0 00000000`00000000 : fffff803`4d1f1225 ffff8981`406a93e0 00000000`000000c0 ffff8981`3f49f6d8 : CorsairLLAccess64+0x127a
THREAD_SHA1_HASH_MOD_FUNC: bdf032ffd4b57f2700aa6d0644c2f4468c2a186a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e84283aff7b476c0a904850b3de7001f2932080b
THREAD_SHA1_HASH_MOD: e05d17fae2df00b9527a0edac7a9cbbb029c42e6
FOLLOWUP_IP:
nt!ExFreePool+9
fffff803`4cf6f0a9 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExFreePool+9
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.476
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff90cd62c2a60 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!ExFreePool
TARGET_TIME: 2019-12-02T19:52:49.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 5451
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!exfreepool
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffff890f7da765c0, The address of the thread.
Arg2: ffff890f84472838, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 6
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VJAA6DJ
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 13
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 192
BUGCHECK_P1: ffff890f7da765c0
BUGCHECK_P2: ffff890f84472838
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Steam.exe
STACK_TEXT:
ffffbd82`6f013768 fffff804`1fc39c75 : 00000000`00000192 ffff890f`7da765c0 ffff890f`84472838 00000000`00000000 : nt!KeBugCheckEx
ffffbd82`6f013770 fffff804`1fcb9472 : ffffffff`ffffffff ffff890f`00000000 ffff890f`00000001 ffff890f`7da765c0 : nt!ExAcquirePushLockExclusiveEx+0x145
ffffbd82`6f0137b0 fffff804`201c7a5d : 00000000`00000000 00000000`00005ff0 ffff890f`8468ac60 00000000`00000000 : nt!MiDeleteVad+0xcc2
ffffbd82`6f013970 fffff804`201c7853 : ffff890f`8468ac60 00000000`00000000 00000000`05ff0000 00000000`00000000 : nt!MiUnmapVad+0x49
ffffbd82`6f0139a0 fffff804`201c76e9 : ffff890f`844724c0 00000000`00000008 ffff890f`70abd4e0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffffbd82`6f013a80 fffff804`201c73dc : ffff890f`7da765c0 00007ff8`6ab14e01 00000000`05ffddb8 ffff890f`844724c0 : nt!NtUnmapViewOfSectionEx+0x99
ffffbd82`6f013ad0 fffff804`1fdd2d18 : 00000000`00000001 ffffbd82`6f013b80 00000000`00374000 ffffffff`ff676980 : nt!NtUnmapViewOfSection+0xc
ffffbd82`6f013b00 00007ff8`6c3dc604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0846e2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6c3dc604
SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+145
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 145
FAILURE_BUCKET_ID: 0x192_nt!ExAcquirePushLockExclusiveEx
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {70f07b19-205c-f6b9-7ad5-00ec20680212}
Followup: MachineOwner
BIOS'a gir optimize defaults save yap. Corsair ve Ryzen araçlarını kaldır. Kablolu güncelle. Steam güncellemelerini kontrol et. GPU için OC yapmaya çalıştın mı veya o şekilde bir araç var mı?
Kod:KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192) A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or above. Arguments: Arg1: ffff890f7da765c0, The address of the thread. Arg2: ffff890f84472838, The lock address. Arg3: 0000000000000000, The IRQL at which the lock was acquired. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 6 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-VJAA6DJ Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 13 Key : Analysis.Memory.CommitPeak.Mb Value: 68 Key : Analysis.System Value: CreateObject BUGCHECK_CODE: 192 BUGCHECK_P1: ffff890f7da765c0 BUGCHECK_P2: ffff890f84472838 BUGCHECK_P3: 0 BUGCHECK_P4: 0 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Steam.exe STACK_TEXT: ffffbd82`6f013768 fffff804`1fc39c75 : 00000000`00000192 ffff890f`7da765c0 ffff890f`84472838 00000000`00000000 : nt!KeBugCheckEx ffffbd82`6f013770 fffff804`1fcb9472 : ffffffff`ffffffff ffff890f`00000000 ffff890f`00000001 ffff890f`7da765c0 : nt!ExAcquirePushLockExclusiveEx+0x145 ffffbd82`6f0137b0 fffff804`201c7a5d : 00000000`00000000 00000000`00005ff0 ffff890f`8468ac60 00000000`00000000 : nt!MiDeleteVad+0xcc2 ffffbd82`6f013970 fffff804`201c7853 : ffff890f`8468ac60 00000000`00000000 00000000`05ff0000 00000000`00000000 : nt!MiUnmapVad+0x49 ffffbd82`6f0139a0 fffff804`201c76e9 : ffff890f`844724c0 00000000`00000008 ffff890f`70abd4e0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133 ffffbd82`6f013a80 fffff804`201c73dc : ffff890f`7da765c0 00007ff8`6ab14e01 00000000`05ffddb8 ffff890f`844724c0 : nt!NtUnmapViewOfSectionEx+0x99 ffffbd82`6f013ad0 fffff804`1fdd2d18 : 00000000`00000001 ffffbd82`6f013b80 00000000`00374000 ffffffff`ff676980 : nt!NtUnmapViewOfSection+0xc ffffbd82`6f013b00 00007ff8`6c3dc604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`0846e2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6c3dc604 SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+145 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.18362.476 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 145 FAILURE_BUCKET_ID: 0x192_nt!ExAcquirePushLockExclusiveEx OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {70f07b19-205c-f6b9-7ad5-00ec20680212} Followup: MachineOwner
Şuan yapıyorum. Durumu sizinle tekrar paylaşacağım.Memtest86 testi yapar mısın?
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: ffffaf0de3b5e080, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8033acb986f, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffffaf0de3b5e080 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8033acb986f READ_ADDRESS: fffff8033b1733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffffaf0de3b5e080 CURRENT_IRQL: 2 FAULTING_IP: nt!MiDeleteVad+10bf fffff803`3acb986f 4d39b760060000 cmp qword ptr [r15+660h],r14 CPU_COUNT: c CPU_MHZ: e09 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: GameOverlayUI.exe ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-03-2019 12:51:52.0729 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: ffffaf0de3b5d620 -- (.trap 0xffffaf0de3b5d620) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000033 rbx=0000000000000000 rcx=0000000000000003 rdx=ffffcd0e62f06ae0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8033acb986f rsp=ffffaf0de3b5d7b0 rbp=ffffaf0de3b5d8b0 r8=0000000000000001 r9=0000000000000000 r10=0000000000000000 r11=ffff8341a0d06000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!MiDeleteVad+0x10bf: fffff803`3acb986f 4d39b760060000 cmp qword ptr [r15+660h],r14 ds:00000000`00000660=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8033add32e9 to fffff8033adc14e0 STACK_TEXT: ffffaf0d`e3b5d4d8 fffff803`3add32e9 : 00000000`0000000a ffffaf0d`e3b5e080 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffaf0d`e3b5d4e0 fffff803`3adcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffaf0d`e3b5d620 fffff803`3acb986f : ffffffff`ffffffff ffffaf0d`e3b5d8b0 00000000`00000003 00000000`00cb8fff : nt!KiPageFault+0x46b ffffaf0d`e3b5d7b0 fffff803`3b1c7a5d : 00000000`00000000 00000000`00000ca0 ffffcd0e`64161ee0 00000000`00000000 : nt!MiDeleteVad+0x10bf ffffaf0d`e3b5d970 fffff803`3b1c7853 : ffffcd0e`64161ee0 00000000`00000000 00000000`00ca0000 00000000`00000000 : nt!MiUnmapVad+0x49 ffffaf0d`e3b5d9a0 fffff803`3b1c76e9 : ffffcd0e`64d67080 00000000`00000008 ffffcd0e`544bde80 00000000`00000000 : nt!MiUnmapViewOfSection+0x133 ffffaf0d`e3b5da80 fffff803`3b1c73dc : ffffcd0e`5f41f080 00007ffb`cfb84e01 00000000`00cab6a0 ffffcd0e`64d67080 : nt!NtUnmapViewOfSectionEx+0x99 ffffaf0d`e3b5dad0 fffff803`3add2d18 : ffffcd0e`5f41f080 00000000`00000000 00000000`00e73000 ffffffff`ff676980 : nt!NtUnmapViewOfSection+0xc ffffaf0d`e3b5db00 00007ffb`d0adc604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`0511e5f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d0adc604 THREAD_SHA1_HASH_MOD_FUNC: 43a5b726671e3486936adbecab7ae34bdcff01d4 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 011e6cc24f558ca1cf97d2a995b31b78eb80e652 THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe FOLLOWUP_IP: nt!MiDeleteVad+10bf fffff803`3acb986f 4d39b760060000 cmp qword ptr [r15+660h],r14 FAULT_INSTR_CODE: 60b7394d SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiDeleteVad+10bf FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9 IMAGE_VERSION: 10.0.18362.476 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 10bf FAILURE_BUCKET_ID: AV_nt!MiDeleteVad BUCKET_ID: AV_nt!MiDeleteVad PRIMARY_PROBLEM_CLASS: AV_nt!MiDeleteVad TARGET_TIME: 2019-12-03T06:45:53.000Z OSBUILD: 18362 OSSERVICEPACK: 476 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2011-12-30 02:28:41 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 23bf ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_nt!mideletevad FAILURE_ID_HASH: {dd755fb9-d873-2524-d767-c852b9db8c62} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192) A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or above. Arguments: Arg1: ffff890f7da765c0, The address of the thread. Arg2: ffff890f84472838, The lock address. Arg3: 0000000000000000, The IRQL at which the lock was acquired. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffff890f7da765c0 BUGCHECK_P2: ffff890f84472838 BUGCHECK_P3: 0 BUGCHECK_P4: 0 CPU_COUNT: c CPU_MHZ: e09 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x192 PROCESS_NAME: Steam.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-03-2019 12:51:56.0141 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8041fc39c75 to fffff8041fdc14e0 STACK_TEXT: ffffbd82`6f013768 fffff804`1fc39c75 : 00000000`00000192 ffff890f`7da765c0 ffff890f`84472838 00000000`00000000 : nt!KeBugCheckEx ffffbd82`6f013770 fffff804`1fcb9472 : ffffffff`ffffffff ffff890f`00000000 ffff890f`00000001 ffff890f`7da765c0 : nt!ExAcquirePushLockExclusiveEx+0x145 ffffbd82`6f0137b0 fffff804`201c7a5d : 00000000`00000000 00000000`00005ff0 ffff890f`8468ac60 00000000`00000000 : nt!MiDeleteVad+0xcc2 ffffbd82`6f013970 fffff804`201c7853 : ffff890f`8468ac60 00000000`00000000 00000000`05ff0000 00000000`00000000 : nt!MiUnmapVad+0x49 ffffbd82`6f0139a0 fffff804`201c76e9 : ffff890f`844724c0 00000000`00000008 ffff890f`70abd4e0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133 ffffbd82`6f013a80 fffff804`201c73dc : ffff890f`7da765c0 00007ff8`6ab14e01 00000000`05ffddb8 ffff890f`844724c0 : nt!NtUnmapViewOfSectionEx+0x99 ffffbd82`6f013ad0 fffff804`1fdd2d18 : 00000000`00000001 ffffbd82`6f013b80 00000000`00374000 ffffffff`ff676980 : nt!NtUnmapViewOfSection+0xc ffffbd82`6f013b00 00007ff8`6c3dc604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`0846e2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6c3dc604 THREAD_SHA1_HASH_MOD_FUNC: af326c0780cb7c5b1ba559ebc859e67e482138c9 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 14b50f0ca09655708dd99c27364bf84cac2d7546 THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8 FOLLOWUP_IP: nt!ExAcquirePushLockExclusiveEx+145 fffff804`1fc39c75 cc int 3 FAULT_INSTR_CODE: 8b8b48cc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+145 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9 IMAGE_VERSION: 10.0.18362.476 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 145 FAILURE_BUCKET_ID: 0x192_nt!ExAcquirePushLockExclusiveEx BUCKET_ID: 0x192_nt!ExAcquirePushLockExclusiveEx PRIMARY_PROBLEM_CLASS: 0x192_nt!ExAcquirePushLockExclusiveEx TARGET_TIME: 2019-12-03T06:29:02.000Z OSBUILD: 18362 OSSERVICEPACK: 476 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2011-12-30 02:28:41 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 2a6a ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x192_nt!exacquirepushlockexclusiveex FAILURE_ID_HASH: {70f07b19-205c-f6b9-7ad5-00ec20680212} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8034cc4600a, Address of the instruction which caused the bugcheck Arg3: fffff90cd62c2a60, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for CorsairLLAccess64.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8034cc4600a BUGCHECK_P3: fffff90cd62c2a60 BUGCHECK_P4: 0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!ExFreeHeapPool+48a fffff803`4cc4600a 4d8b2a mov r13,qword ptr [r10] CONTEXT: fffff90cd62c2a60 -- (.cxr 0xfffff90cd62c2a60) rax=0000000000000000 rbx=ffff89812b010000 rcx=fffff8034cc00000 rdx=fffff8034cc00000 rsi=ffff898140b45380 rdi=ffff898140b45350 rip=fffff8034cc4600a rsp=fffff90cd62c3450 rbp=0000000020206f49 r8=ffff898100000103 r9=0000000000000000 r10=ffff898100000103 r11=0000000000000000 r12=0000000000000060 r13=0000000000000001 r14=ffff898135a0a080 r15=000000000000000e iopl=0 nv up ei pl zr ac po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050256 nt!ExFreeHeapPool+0x48a: fffff803`4cc4600a 4d8b2a mov r13,qword ptr [r10] ds:002b:ffff8981`00000103=???????????????? Resetting default scope BUGCHECK_STR: 0x3B_c0000005 CPU_COUNT: c CPU_MHZ: e09 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: iCUE.exe CURRENT_IRQL: 1 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-03-2019 12:51:59.0843 ANALYSIS_VERSION: 10.0.18362.1 x86fre IRP_ADDRESS: ffff89813f49f638 LAST_CONTROL_TRANSFER: from fffff8034cf6f0a9 to fffff8034cc4600a STACK_TEXT: fffff90c`d62c3450 fffff803`4cf6f0a9 : ffff8981`3dcc2805 ffff8981`406a90c0 ffff8981`3dcc2840 01000000`00100000 : nt!ExFreeHeapPool+0x48a fffff90c`d62c3570 fffff803`4cc4650e : ffff8981`3f49f6a0 ffff8981`38f7e560 fffff803`4cc00000 fffff803`4cc33966 : nt!ExFreePool+0x9 fffff90c`d62c35a0 fffff803`4cc47e1c : ffff8981`3f49f6b0 fffff803`00000000 00000000`00000a01 ffff8981`40b45030 : nt!IopCompleteRequest+0x8e fffff90c`d62c3690 fffff803`4cc476a7 : 00000000`00000000 fffff803`63051000 ffff8981`399d7e10 ffff8981`3f49f6a0 : nt!IopfCompleteRequest+0x75c fffff90c`d62c37a0 fffff803`6305127a : 00000000`00000000 fffff803`4d1f1225 ffff8981`406a93e0 00000000`000000c0 : nt!IofCompleteRequest+0x17 fffff90c`d62c37d0 00000000`00000000 : fffff803`4d1f1225 ffff8981`406a93e0 00000000`000000c0 ffff8981`3f49f6d8 : CorsairLLAccess64+0x127a THREAD_SHA1_HASH_MOD_FUNC: bdf032ffd4b57f2700aa6d0644c2f4468c2a186a THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e84283aff7b476c0a904850b3de7001f2932080b THREAD_SHA1_HASH_MOD: e05d17fae2df00b9527a0edac7a9cbbb029c42e6 FOLLOWUP_IP: nt!ExFreePool+9 fffff803`4cf6f0a9 4883c428 add rsp,28h FAULT_INSTR_CODE: 28c48348 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!ExFreePool+9 FOLLOWUP_NAME: Pool_corruption IMAGE_NAME: Pool_Corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.476 MODULE_NAME: Pool_Corruption STACK_COMMAND: .cxr 0xfffff90cd62c2a60 ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool BUCKET_ID: 0x3B_c0000005_nt!ExFreePool PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!ExFreePool TARGET_TIME: 2019-12-02T19:52:49.000Z OSBUILD: 18362 OSSERVICEPACK: 476 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2011-12-30 02:28:41 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 5451 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!exfreepool FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064} Followup: Pool_corruption ---------
Recep bey'in Technopat Sosyal üzerinden paylaştığı sürümü kurdum.Kernel hatalı veya bozuk, eksik kurulmuş veya sonradan bozulmuş. Kullandığınız ISO kalıbının sağlam olduğundan ve doğru yazılıdığından emin olun. Tekrar en temizinden bir kurulum yapmanız gerekiyor.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff958100000099, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80428301e9b, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.476 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffff958100000099
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80428301e9b
READ_ADDRESS: fffff804287733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff958100000099
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopDecrementVpbRefCount+4b
fffff804`28301e9b 488b7308 mov rsi,qword ptr [rbx+8]
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: csgo.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-03-2019 23:36:27.0009
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffcf82d14d10f0 -- (.trap 0xffffcf82d14d10f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffaa81b36926f0
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80428301e9b rsp=ffffcf82d14d1280 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=ffffaa81abf3dcd0
r11=ffffcf82d14d1328 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!IopDecrementVpbRefCount+0x4b:
fffff804`28301e9b 488b7308 mov rsi,qword ptr [rbx+8] ds:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff804283d32e9 to fffff804283c14e0
STACK_TEXT:
ffffcf82`d14d0fa8 fffff804`283d32e9 : 00000000`0000000a ffff9581`00000099 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffcf82`d14d0fb0 fffff804`283cf62b : 00000000`00000000 ffffcf82`d14d10f8 ffffcf82`d14d10f8 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcf82`d14d10f0 fffff804`28301e9b : ffffaa81`bd3a0000 00000000`00000000 00000000`00000000 fffff804`00000000 : nt!KiPageFault+0x46b
ffffcf82`d14d1280 fffff804`287e749b : ffffaa81`bec64840 ffffaa81`b36926f0 ffffaa81`bd3a27f0 00000000`00000000 : nt!IopDecrementVpbRefCount+0x4b
ffffcf82`d14d12b0 fffff804`287fa0e0 : ffffcf82`d14d1640 00000000`00000000 ffffaa81`abef6400 ffffaa81`bd3a27f0 : nt!IopDeleteFile+0xfb
ffffcf82`d14d1330 fffff804`282390c4 : 00000000`00000000 00000000`00000000 ffffcf82`d14d1640 ffffaa81`bec64840 : nt!ObpRemoveObjectRoutine+0x80
ffffcf82`d14d1390 fffff804`287e6943 : 00000000`00000001 ffffaa81`ae7b5670 ffffaa81`bd3a27f0 00000000`00000001 : nt!ObfDereferenceObject+0xa4
ffffcf82`d14d13d0 fffff804`287ed1bf : ffffaa81`b34a48f0 fffff804`2b51bc40 ffffaa81`bf602ad0 00000000`00000001 : nt!IopParseDevice+0xd83
ffffcf82`d14d1540 fffff804`287eb621 : ffffaa81`bf602a00 ffffcf82`d14d1788 ffffcf82`00000040 ffffaa81`abef6400 : nt!ObpLookupObjectName+0x78f
ffffcf82`d14d1700 fffff804`288af876 : 00000000`00000001 00000000`264de938 00000000`2cb3d7f0 00000000`2cb3d8a0 : nt!ObOpenObjectByNameEx+0x201
ffffcf82`d14d1840 fffff804`283d2d18 : 00000000`2cb3e410 ffffcf82`d14d1b80 ffffaa81`baabe080 00000000`2cb3d8a0 : nt!NtQueryAttributesFile+0x1e6
ffffcf82`d14d1b00 00007ffc`18e3c864 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`264de8f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`18e3c864
THREAD_SHA1_HASH_MOD_FUNC: 8a9d50f51bf5adf3cb9d64c7b9036584a2e1cb4d
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 509d3be07b27a470d3bdb9b545a11af6de365d96
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!IopDecrementVpbRefCount+4b
fffff804`28301e9b 488b7308 mov rsi,qword ptr [rbx+8]
FAULT_INSTR_CODE: 8738b48
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!IopDecrementVpbRefCount+4b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4b
FAILURE_BUCKET_ID: AV_nt!IopDecrementVpbRefCount
BUCKET_ID: AV_nt!IopDecrementVpbRefCount
PRIMARY_PROBLEM_CLASS: AV_nt!IopDecrementVpbRefCount
TARGET_TIME: 2019-12-03T20:15:02.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.476
ANALYSIS_SESSION_ELAPSED_TIME: 1783
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!iopdecrementvpbrefcount
FAILURE_ID_HASH: {7405fd23-17ee-fe84-07f8-fb7776c075e3}
Followup: MachineOwner
---------