Windows 10 mavi ekran hatası (Memory management)

haymania

Kilopat
Katılım
28 Aralık 2017
Mesajlar
58
Arkadaşlar merhaba, birkaç gündür bilgisayarım bir anda donup kapanıyor ve mavi ekran hatası veriyor. Hata kodu olarak Memory management olarak gösteriyor farklı hata kodları veriyor mu fark etmedim, bilgisayarı açtıktan maksimum 1 saat sonra yine mavi ekran hatası veriyor sonra problemin kaynağını aramaya başladım önce yeni gelen güncellemeden kaynaklandığını düşünüp güncellemeyi kaldırdım fakat 4-5 saat sonra yine mavi ekran verdi. Bilgisayarı sıfırlamaya çalıştığım da ise yarıda kesip 'bilgisayarınızı sıfırlarken bir sorun oluştu' dedikten sonra tekrar bilgisayarı sıfırlamadan açıyor. Sorunun neyden kaynaklandığını ya da sıfırlamak için ne yapmam gerektiği konusunda yardımcı olursanız çok sevinirim.

Minidump dosyalarım
 
Son düzenleme:
Memtest86 testi yapar mısın?

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 000001feb2c37000
Arg3: 0000000000000009
Arg4: ffffbc0b15bcd6f0

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7B38

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.GP

BIOS_DATE:  11/15/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 61941

BUGCHECK_P2: 1feb2c37000

BUGCHECK_P3: 9

BUGCHECK_P4: ffffbc0b15bcd6f0

BUGCHECK_STR:  0x1a_61941

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  WmiPrvSE.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-18-2020 16:42:12.0940

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffbc0b15bcd6f0 -- (.trap 0xffffbc0b15bcd6f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000001feb2c37000
rdx=000001feb2c3d000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064fab0959 rsp=ffffbc0b15bcd880 rbp=ffffbc0b15bcdb80
 r8=0000000000000003  r9=0000000000000000 r10=0000000000038000
r11=ffffbc0b15bcdab8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!ProbeForWrite+0x39:
fffff806`4fab0959 0fb601          movzx   eax,byte ptr [rcx] ds:000001fe`b2c37000=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8064f64288c to fffff8064f5c2380

STACK_TEXT: 
ffffbc0b`15bcd548 fffff806`4f64288c : 00000000`0000001a 00000000`00061941 000001fe`b2c37000 00000000`00000009 : nt!KeBugCheckEx
ffffbc0b`15bcd550 fffff806`4f5d0420 : ffffa702`481a7040 ffffa702`481a7040 00000000`00000001 ffffa702`481a7040 : nt!MmAccessFault+0x179a1c
ffffbc0b`15bcd6f0 fffff806`4fab0959 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffbc0b`15bcd880 fffff806`4faaacf6 : 00000068`510fc9f0 00000000`00001000 00000068`510fc9e0 000001fe`b2c05000 : nt!ProbeForWrite+0x39
ffffbc0b`15bcd8b0 fffff806`4faaab1b : 000001fe`b2c04e01 00000000`00000000 00000000`00000000 00000000`00017000 : nt!ExpQuerySystemInformation+0xb6
ffffbc0b`15bcdac0 fffff806`4f5d3c18 : ffffa702`481a7040 00000000`00000001 00000000`00000000 ffffa702`4805b6e0 : nt!NtQuerySystemInformation+0x2b
ffffbc0b`15bcdb00 00007ffb`ed05c784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000068`510fccf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`ed05c784


THREAD_SHA1_HASH_MOD_FUNC:  cc6d0be3deb5fff9d208c84fa213fffd783d14a5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  bfef6d67f549a76153b1dad42afa6d0ae8f27986

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!KiPageFault+360
fffff806`4f5d0420 85c0            test    eax,eax

FAULT_INSTR_CODE:  367cc085

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+360

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.719

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  360

FAILURE_BUCKET_ID:  0x1a_61941_nt!KiPageFault

BUCKET_ID:  0x1a_61941_nt!KiPageFault

PRIMARY_PROBLEM_CLASS:  0x1a_61941_nt!KiPageFault

TARGET_TIME:  2020-03-18T13:12:51.000Z

OSBUILD:  18362

OSSERVICEPACK:  719

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  17a4

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_61941_nt!kipagefault

FAILURE_ID_HASH:  {60820728-e269-54d0-27b9-6b64c44bb18e}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8070bedb59b, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 10

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8070bedb59b

READ_ADDRESS: fffff8070c1733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000010

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiSwapNumaStandbyPage+8b
fffff807`0bedb59b 49037e10        add     rdi,qword ptr [r14+10h]

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  javaw.exe

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-18-2020 16:42:09.0478

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffff808e382d8180 -- (.trap 0xffff808e382d8180)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8070c0680c0 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8070bedb59b rsp=ffff808e382d8310 rbp=ffff808e382d8390
 r8=0000000000000000  r9=0000000000000012 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiSwapNumaStandbyPage+0x8b:
fffff807`0bedb59b 49037e10        add     rdi,qword ptr [r14+10h] ds:00000000`00000010=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8070bdd41e9 to fffff8070bdc2380

STACK_TEXT: 
ffff808e`382d8038 fffff807`0bdd41e9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff808e`382d8040 fffff807`0bdd052b : ffff0e08`ca62fb91 00000002`08e84000 00000000`00000000 00000000`00000006 : nt!KiBugCheckDispatch+0x69
ffff808e`382d8180 fffff807`0bedb59b : 00000000`00190715 fffff807`0bd246df fffff3f0`000000ae 00000000`00000004 : nt!KiPageFault+0x46b
ffff808e`382d8310 fffff807`0be45799 : 00000000`000001af 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiSwapNumaStandbyPage+0x8b
ffff808e`382d83d0 fffff807`0bccdf41 : fffff807`0c06a3c0 ffffb18f`000000af 00000000`000000af 00000000`00000000 : nt!MiGetPage+0x177299
ffff808e`382d84b0 fffff807`0bccbc6a : 00000000`00000000 00000000`00000000 fffff3f9`fcfe7000 ffff808e`382d8810 : nt!MiGetPageChain+0x181
ffff808e`382d86a0 fffff807`0bcc8429 : ffff808e`382d8a58 00000000`00000000 00000000`00000010 00000000`00000010 : nt!MiResolvePrivateZeroFault+0x14a
ffff808e`382d87c0 fffff807`0bcc9850 : ffff808e`382d8a20 ffff808e`382d8960 ffff808e`382d8968 ffff808e`382d88f0 : nt!MiZeroFault+0x389
ffff808e`382d88b0 fffff807`0bcc8fbe : 00000000`00000001 ffff808e`382d8830 ffffffff`00000111 fffff31f`b106c8c6 : nt!MiUserFault+0x3a0
ffff808e`382d8960 fffff807`0bdd0420 : ffffb18f`a6c22080 00000000`1a4cf100 00000000`00000401 00000000`00e73420 : nt!MmAccessFault+0x14e
ffff808e`382d8b00 00007ffb`a3491534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000000`1a4ce158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a3491534


THREAD_SHA1_HASH_MOD_FUNC:  92bd1be9f3ec997fbcacedb8640c1a498415e0e9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e5a2c932a5b680a25e08b3f9740a81cd266804f6

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!MiSwapNumaStandbyPage+8b
fffff807`0bedb59b 49037e10        add     rdi,qword ptr [r14+10h]

FAULT_INSTR_CODE:  107e0349

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiSwapNumaStandbyPage+8b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  8b

FAILURE_BUCKET_ID:  AV_nt!MiSwapNumaStandbyPage

BUCKET_ID:  AV_nt!MiSwapNumaStandbyPage

PRIMARY_PROBLEM_CLASS:  AV_nt!MiSwapNumaStandbyPage

TARGET_TIME:  2020-03-18T09:10:47.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  25e6

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!miswapnumastandbypage

FAILURE_ID_HASH:  {522a635a-0d98-8289-7b34-c2db782a6bc9}

Followup:     MachineOwner
---------

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8071c0aedb4, Virtual address for the attempted write.
Arg2: 8900000000105121, PTE contents.
Arg3: fffffd8517a97960, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: fffff8071c0aedb4

BUGCHECK_P2: 8900000000105121

BUGCHECK_P3: fffffd8517a97960

BUGCHECK_P4: a

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xBE

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-18-2020 16:42:05.0913

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffffd8517a97960 -- (.trap 0xfffffd8517a97960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000001ba11520
rdx=000000001ba11520 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8070803c98a rsp=fffffd8517a97af0 rbp=000000000000001e
 r8=fffff8071c0aeda0  r9=0000000000000000 r10=0000000000000004
r11=000000000000ffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!ExpScanGeneralLookasideList+0x4a:
fffff807`0803c98a 41894814        mov     dword ptr [r8+14h],ecx ds:fffff807`1c0aedb4=00000000
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff807082001e7 to fffff807081c2380

STACK_TEXT: 
fffffd85`17a97778 fffff807`082001e7 : 00000000`000000be fffff807`1c0aedb4 89000000`00105121 fffffd85`17a97960 : nt!KeBugCheckEx
fffffd85`17a97780 fffff807`080c92fa : 89000000`00105121 00000000`00000003 fffffd85`17a978c0 00000000`00000000 : nt!MiRaisedIrqlFault+0x19e437
fffffd85`17a977c0 fffff807`081d0420 : ffff8f85`52b4a080 fffff807`08113f14 ffff8f85`52b4a080 fffff807`0807e9cc : nt!MmAccessFault+0x48a
fffffd85`17a97960 fffff807`0803c98a : 00000000`00000001 fffff807`08431580 00000000`00000118 fffff807`0846a3c0 : nt!KiPageFault+0x360
fffffd85`17a97af0 fffff807`0818c8b2 : 00000000`00000007 00000000`ffffffff fffff807`0846a3c0 00000000`00000118 : nt!ExpScanGeneralLookasideList+0x4a
fffffd85`17a97b20 fffff807`0806bce5 : ffff8f85`52b4a080 00000000`00000080 fffff807`0818c790 00000000`00000000 : nt!KeBalanceSetManager+0x122
fffffd85`17a97c10 fffff807`081c99ca : ffffcd81`947cb180 ffff8f85`52b4a080 fffff807`0806bc90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffd85`17a97c60 00000000`00000000 : fffffd85`17a98000 fffffd85`17a92000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  9cdd30fab53e7c1afab33cb6bfa6ec5e581e0189

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  f8c776b2197401b1635b15f6ebc0bc75129b9ea0

THREAD_SHA1_HASH_MOD:  cb5f414824c2521bcc505eaa03e92fa10922dad8

FOLLOWUP_IP:
nt!MiRaisedIrqlFault+19e437
fffff807`082001e7 cc              int     3

FAULT_INSTR_CODE:  cf8b48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiRaisedIrqlFault+19e437

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  19e437

FAILURE_BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

PRIMARY_PROBLEM_CLASS:  0xBE_nt!MiRaisedIrqlFault

TARGET_TIME:  2020-03-17T14:49:49.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  47e4

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xbe_nt!miraisedirqlfault

FAILURE_ID_HASH:  {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffad0e0a564200, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffad0e0a564158, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffad0e0a564200

BUGCHECK_P3: ffffad0e0a564158

BUGCHECK_P4: 0

TRAP_FRAME:  ffffad0e0a564200 -- (.trap 0xffffad0e0a564200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe98004141880 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057ea3922a rsp=ffffad0e0a564390 rbp=ffffad0e0a564431
 r8=0000000000000000  r9=0000000000000004 r10=0000000000000002
r11=0000000000000090 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiUnlinkNodeLargePage+0x186fea:
fffff805`7ea3922a cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffad0e0a564158 -- (.exr 0xffffad0e0a564158)
ExceptionAddress: fffff8057ea3922a (nt!MiUnlinkNodeLargePage+0x0000000000186fea)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  javaw.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-18-2020 16:42:02.0147

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8057e9d41e9 to fffff8057e9c2380

STACK_TEXT: 
ffffad0e`0a563ed8 fffff805`7e9d41e9 : 00000000`00000139 00000000`00000003 ffffad0e`0a564200 ffffad0e`0a564158 : nt!KeBugCheckEx
ffffad0e`0a563ee0 fffff805`7e9d4610 : fffff805`7e8e5b10 fffff805`7e8e84b0 00007fff`ffff0000 00007fff`fffeffff : nt!KiBugCheckDispatch+0x69
ffffad0e`0a564020 fffff805`7e9d29a5 : 00000000`00000000 00000000`00000000 ffff9a08`cf52b060 00000000`000567fb : nt!KiFastFailDispatch+0xd0
ffffad0e`0a564200 fffff805`7ea3922a : 00000000`00000006 ffffad0e`0a564431 ffffe980`034d2500 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
ffffad0e`0a564390 fffff805`7e8140fb : 00000000`00000010 81000001`00000002 00000000`00000000 00000000`00000004 : nt!MiUnlinkNodeLargePage+0x186fea
ffffad0e`0a564480 fffff805`7e813cbc : 00000000`00000002 fffff805`7ec6a3c0 00000000`0008cb76 ffffad0e`0a564810 : nt!MiGetFreeZeroLargePage+0x63
ffffad0e`0a5644f0 fffff805`7e8cbf5e : 00000000`00000000 00000000`00000000 ffff88c4`62311000 ffffad0e`0a564810 : nt!MiGetLargePage+0xcc
ffffad0e`0a5646a0 fffff805`7e8c8429 : 00000000`00000060 00000000`00000000 00000000`00000010 00000000`00000001 : nt!MiResolvePrivateZeroFault+0x43e
ffffad0e`0a5647c0 fffff805`7e8c9850 : ffffad0e`0a564a20 ffffad0e`0a564960 ffffad0e`0a564968 ffffad0e`0a5648f0 : nt!MiZeroFault+0x389
ffffad0e`0a5648b0 fffff805`7e8c8fbe : 00000000`00000001 ffffad0e`0a564830 ffffffff`00000111 fffffb86`2ce2c8c6 : nt!MiUserFault+0x3a0
ffffad0e`0a564960 fffff805`7e9d0420 : ffff9a08`ce8d1080 00000000`1ae0f060 00000000`00000401 00000000`0186f6f0 : nt!MmAccessFault+0x14e
ffffad0e`0a564b00 00007ffe`8eda1534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000000`1ae0e0b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8eda1534


THREAD_SHA1_HASH_MOD_FUNC:  b366742cf1fcd793b717cb1f6b3a47d8f82f3382

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  107d602b5845ea805e659df6593de0e22b337b74

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff805`7e9d4610 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

TARGET_TIME:  2020-03-17T09:17:34.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2d22

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80374f73358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7B38

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.GP

BIOS_DATE:  11/15/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80374f73358

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x133

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  d

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-18-2020 16:41:57.0747

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffd70b3a8606e0 -- (.trap 0xffffd70b3a8606e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000001255a0005 rbx=0000000000000000 rcx=ffffaf7000270600
rdx=ffffaf7000270600 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80374bca2a7 rsp=ffffd70b3a860870 rbp=0000000000000002
 r8=ffffaf7000270600  r9=0000000000000000 r10=ffffb28000005200
r11=0000000000000020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExpInterlockedPopEntrySListFault:
fffff803`74bca2a7 498b08          mov     rcx,qword ptr [r8] ds:ffffaf70`00270600=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80374c3d8b1 to fffff80374bc2380

STACK_TEXT: 
ffffe701`5b837b08 fffff803`74c3d8b1 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`74f73358 : nt!KeBugCheckEx
ffffe701`5b837b10 fffff803`74ab8e3c : 00000df0`7fab8e6c ffffe701`5b9cd180 00000000`00044338 00000000`00044338 : nt!KeAccumulateTicks+0x181631
ffffe701`5b837b70 fffff803`7495e4b7 : 00000000`00000000 ffffd70b`3a860550 ffffd70b`3a8605d0 00000000`00000002 : nt!KeClockInterruptNotify+0x98c
ffffe701`5b837f30 fffff803`74a2cc75 : 0000000a`29cd8d11 ffff9b87`ab6ce500 ffff9b87`ab6ce5b0 00000000`00000000 : hal!HalpTimerClockInterrupt+0xf7
ffffe701`5b837f60 fffff803`74bc3e1a : ffffd70b`3a8605d0 ffff9b87`ab6ce500 fffff803`74d7a250 ffff9b87`ab6ce500 : nt!KiCallInterruptServiceRoutine+0xa5
ffffe701`5b837fb0 fffff803`74bc4387 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffd70b`3a860550 fffff803`74bd03d7 : 00000001`255a0005 ffffd70b`3a860760 ffff9b87`ab6ce500 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffd70b`3a8606e0 fffff803`74bca2a7 : 00000000`00000000 fffff803`74ace5f1 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x317
ffffd70b`3a860870 fffff803`74ace5f1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
ffffd70b`3a860880 fffff803`74acdf41 : fffff803`74e6a3c0 ffff9b87`00000020 00000000`00000020 00000000`00000000 : nt!MiGetPage+0xf1
ffffd70b`3a860960 fffff803`74acbc6a : 00000000`00000001 00000000`00000000 00000000`00000001 ffffd70b`3a860cd0 : nt!MiGetPageChain+0x181
ffffd70b`3a860b50 fffff803`74acb748 : ffff9b87`000007e6 00000000`00000001 00000000`00000050 00000000`00000050 : nt!MiResolvePrivateZeroFault+0x14a
ffffd70b`3a860c70 fffff803`74acb012 : ffffabd5`c08cea98 ffffd70b`3a861080 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x218
ffffd70b`3a860d60 fffff803`74ac8fd9 : 00000000`00000008 ffffd70b`0000001c 00000000`c0000016 fffff803`868a010f : nt!MiDispatchFault+0x982
ffffd70b`3a860eb0 fffff803`74a3f8f4 : ffffabd5`eaf57000 ffff9b87`b1ff4580 00000000`00000000 00000233`aa7b0000 : nt!MmAccessFault+0x169
ffffd70b`3a861050 fffff803`74b2e11c : 00000000`00000001 ffffab81`19d53d80 ffffd70b`3a8611c0 ffffabd5`eaf577f8 : nt!MiFaultInProbeAddress+0xbc
ffffd70b`3a861100 fffff803`74b2d62e : ffffd70b`3a861270 00000000`00000000 ffffd70b`3a861270 00000233`aa7b0000 : nt!MiLockPageLeafPageTable+0x15c
ffffd70b`3a861170 fffff803`74b2d4b9 : 00000000`00000000 ffff8a08`36cf0d90 ffff8a08`36cf0d90 00000000`00000000 : nt!MiProbeAndLockPages+0x15e
ffffd70b`3a8612c0 fffff803`85e99f2c : ffffd70b`00000000 00000000`00042538 00000000`000e4000 ffff8a08`36cf1c50 : nt!MmProbeAndLockPages+0x29
ffffd70b`3a8612f0 fffff803`85e99e09 : ffff8a08`36cf1c50 ffff8a08`36cf1c50 00000000`00000000 00000233`aa7b0000 : dxgmms2!VIDMM_MDL_RANGE::Lock+0x6c
ffffd70b`3a861350 fffff803`85e96b17 : ffff8a08`36051120 ffff8a08`35cf5cb0 ffff9b87`00000000 ffff9b87`b1355de0 : dxgmms2!VIDMM_RECYCLE_HEAP_PHYSICAL_VIEW::LockRange+0x109
ffffd70b`3a8613d0 fffff803`85e969ff : ffff8a08`35d47910 00000000`000f0000 00000000`00000000 fffff803`85ea9bd3 : dxgmms2!VIDMM_RECYCLE_RANGE::Lock+0x7b
ffffd70b`3a861430 fffff803`85e9693b : ffff8a08`36b48610 00000000`00000000 00000000`00000000 00000000`000f0000 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::Lock+0x83
ffffd70b`3a861490 fffff803`85e9acd9 : ffff8a08`36b48610 ffff9b87`b148b000 00000000`00000030 00000000`00042538 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProbeAndLockAllocation+0x7b
ffffd70b`3a861510 fffff803`85e9aaa1 : ffff9b87`b148b000 ffff8a08`35cf5cb0 ffff8a08`00000000 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProbeAndLockAllocation+0x55
ffffd70b`3a861560 fffff803`85e9adcf : ffff8a08`35cf5cb0 ffff9b87`b148b000 ffff8a08`35cf5cb0 00000000`00000000 : dxgmms2!VIDMM_SEGMENT::LockAllocationBackingStore+0xc5
ffffd70b`3a861620 fffff803`85e9c99f : ffff9b87`b9061110 ffff9b87`b148b000 00000000`00000000 ffff8a08`35cf5cb0 : dxgmms2!VIDMM_SYSMEM_SEGMENT::CommitResource+0x8f
ffffd70b`3a861660 fffff803`85ea7eb2 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x1ef
ffffd70b`3a861770 fffff803`85eb7da4 : 00000000`00000001 00000000`00989680 ffff8a08`2f616900 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x862
ffffd70b`3a8619e0 fffff803`85eb6ee9 : ffff8a08`2c2f3c10 fffff803`74f91401 ffff9b87`b140e600 00000000`00000100 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xea4
ffffd70b`3a861be0 fffff803`74a6bce5 : ffff9b87`b140e680 fffff803`85eb6ee0 ffff8a08`2c2f3c10 00000067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffd70b`3a861c10 fffff803`74bc99ca : fffff803`70369180 ffff9b87`b140e680 fffff803`74a6bc90 8b44fd8b`42746024 : nt!PspSystemThreadStartup+0x55
ffffd70b`3a861c60 00000000`00000000 : ffffd70b`3a862000 ffffd70b`3a85c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  42b1f1008281954d1547b534124a75937d798cc7

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  3344e0c95588065253384753029eb79ee384d992

THREAD_SHA1_HASH_MOD:  dc0110497812df1b54d877b953dab680ed187995

FOLLOWUP_IP:
dxgmms2!VIDMM_MDL_RANGE::Lock+6c
fffff803`85e99f2c eb5d            jmp     dxgmms2!VIDMM_MDL_RANGE::Lock+0xcb (fffff803`85e99f8b)

FAULT_INSTR_CODE:  3d805deb

SYMBOL_STACK_INDEX:  13

SYMBOL_NAME:  dxgmms2!VIDMM_MDL_RANGE::Lock+6c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  40bd916b

IMAGE_VERSION:  10.0.18362.719

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  6c

FAILURE_BUCKET_ID:  0x133_ISR_dxgmms2!VIDMM_MDL_RANGE::Lock

BUCKET_ID:  0x133_ISR_dxgmms2!VIDMM_MDL_RANGE::Lock

PRIMARY_PROBLEM_CLASS:  0x133_ISR_dxgmms2!VIDMM_MDL_RANGE::Lock

TARGET_TIME:  2020-03-14T00:48:18.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  15018

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x133_isr_dxgmms2!vidmm_mdl_range::lock

FAILURE_ID_HASH:  {2ea2a685-a337-d637-b4cf-df7f0dea36b2}

Followup:     MachineOwner
---------
 
Arkadaşlar merhaba, birkaç gündür bilgisayarım bir anda donup kapanıyor ve mavi ekran hatası veriyor. Hata kodu olarak Memory management olarak gösteriyor farklı hata kodları veriyor mu fark etmedim, bilgisayarı açtıktan maksimum 1 saat sonra yine mavi ekran hatası veriyor sonra problemin kaynağını aramaya başladım önce yeni gelen güncellemeden kaynaklandığını düşünüp güncellemeyi kaldırdım fakat 4-5 saat sonra yine mavi ekran verdi. Bilgisayarı sıfırlamaya çalıştığım da ise yarıda kesip 'bilgisayarınızı sıfırlarken bir sorun oluştu' dedikten sonra tekrar bilgisayarı sıfırlamadan açıyor. Sorunun neyden kaynaklandığını ya da sıfırlamak için ne yapmam gerektiği konusunda yardımcı olursanız çok sevinirim.

Minidump dosyalarım.

%90 RAM'lerden yapıyor.
 
Memtest86 testi yapar mısın?

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 000001feb2c37000
Arg3: 0000000000000009
Arg4: ffffbc0b15bcd6f0

Debugging Details:
------------------

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME: MS-7B38

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 2.GP

BIOS_DATE: 11/15/2019

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd

BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION: 1.0

DUMP_TYPE: 2

BUGCHECK_P1: 61941

BUGCHECK_P2: 1feb2c37000

BUGCHECK_P3: 9

BUGCHECK_P4: ffffbc0b15bcd6f0

BUGCHECK_STR: 0x1a_61941

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: WmiPrvSE.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME: 03-18-2020 16:42:12.0940

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME: ffffbc0b15bcd6f0 -- (.trap 0xffffbc0b15bcd6f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000001feb2c37000
rdx=000001feb2c3d000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064fab0959 rsp=ffffbc0b15bcd880 rbp=ffffbc0b15bcdb80
r8=0000000000000003 r9=0000000000000000 r10=0000000000038000
r11=ffffbc0b15bcdab8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ProbeForWrite+0x39:
fffff806`4fab0959 0fb601 movzx eax,byte ptr [rcx] ds:000001fe`b2c37000=??
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff8064f64288c to fffff8064f5c2380

STACK_TEXT:
ffffbc0b`15bcd548 fffff806`4f64288c : 00000000`0000001a 00000000`00061941 000001fe`b2c37000 00000000`00000009 : nt!KeBugCheckEx
ffffbc0b`15bcd550 fffff806`4f5d0420 : ffffa702`481a7040 ffffa702`481a7040 00000000`00000001 ffffa702`481a7040 : nt!MmAccessFault+0x179a1c
ffffbc0b`15bcd6f0 fffff806`4fab0959 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffbc0b`15bcd880 fffff806`4faaacf6 : 00000068`510fc9f0 00000000`00001000 00000068`510fc9e0 000001fe`b2c05000 : nt!ProbeForWrite+0x39
ffffbc0b`15bcd8b0 fffff806`4faaab1b : 000001fe`b2c04e01 00000000`00000000 00000000`00000000 00000000`00017000 : nt!ExpQuerySystemInformation+0xb6
ffffbc0b`15bcdac0 fffff806`4f5d3c18 : ffffa702`481a7040 00000000`00000001 00000000`00000000 ffffa702`4805b6e0 : nt!NtQuerySystemInformation+0x2b
ffffbc0b`15bcdb00 00007ffb`ed05c784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000068`510fccf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`ed05c784

THREAD_SHA1_HASH_MOD_FUNC: cc6d0be3deb5fff9d208c84fa213fffd783d14a5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bfef6d67f549a76153b1dad42afa6d0ae8f27986

THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!KiPageFault+360
fffff806`4f5d0420 85c0 test eax,eax

FAULT_INSTR_CODE: 367cc085

SYMBOL_STACK_INDEX: 2

SYMBOL_NAME: nt!KiPageFault+360

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.18362.719

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 360

FAILURE_BUCKET_ID: 0x1a_61941_nt!KiPageFault

BUCKET_ID: 0x1a_61941_nt!KiPageFault

PRIMARY_PROBLEM_CLASS: 0x1a_61941_nt!KiPageFault

TARGET_TIME: 2020-03-18T13:12:51.000Z

OSBUILD: 18362

OSSERVICEPACK: 719

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 17a4

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1a_61941_nt!kipagefault

FAILURE_ID_HASH: {60820728-e269-54d0-27b9-6b64c44bb18e}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8070bedb59b, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE: 2

BUGCHECK_P1: 10

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8070bedb59b

READ_ADDRESS: fffff8070c1733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000010

CURRENT_IRQL: 2

FAULTING_IP:
nt!MiSwapNumaStandbyPage+8b
fffff807`0bedb59b 49037e10 add rdi,qword ptr [r14+10h]

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: javaw.exe

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME: 03-18-2020 16:42:09.0478

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME: ffff808e382d8180 -- (.trap 0xffff808e382d8180)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8070c0680c0 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8070bedb59b rsp=ffff808e382d8310 rbp=ffff808e382d8390
r8=0000000000000000 r9=0000000000000012 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiSwapNumaStandbyPage+0x8b:
fffff807`0bedb59b 49037e10 add rdi,qword ptr [r14+10h] ds:00000000`00000010=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff8070bdd41e9 to fffff8070bdc2380

STACK_TEXT:
ffff808e`382d8038 fffff807`0bdd41e9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff808e`382d8040 fffff807`0bdd052b : ffff0e08`ca62fb91 00000002`08e84000 00000000`00000000 00000000`00000006 : nt!KiBugCheckDispatch+0x69
ffff808e`382d8180 fffff807`0bedb59b : 00000000`00190715 fffff807`0bd246df fffff3f0`000000ae 00000000`00000004 : nt!KiPageFault+0x46b
ffff808e`382d8310 fffff807`0be45799 : 00000000`000001af 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiSwapNumaStandbyPage+0x8b
ffff808e`382d83d0 fffff807`0bccdf41 : fffff807`0c06a3c0 ffffb18f`000000af 00000000`000000af 00000000`00000000 : nt!MiGetPage+0x177299
ffff808e`382d84b0 fffff807`0bccbc6a : 00000000`00000000 00000000`00000000 fffff3f9`fcfe7000 ffff808e`382d8810 : nt!MiGetPageChain+0x181
ffff808e`382d86a0 fffff807`0bcc8429 : ffff808e`382d8a58 00000000`00000000 00000000`00000010 00000000`00000010 : nt!MiResolvePrivateZeroFault+0x14a
ffff808e`382d87c0 fffff807`0bcc9850 : ffff808e`382d8a20 ffff808e`382d8960 ffff808e`382d8968 ffff808e`382d88f0 : nt!MiZeroFault+0x389
ffff808e`382d88b0 fffff807`0bcc8fbe : 00000000`00000001 ffff808e`382d8830 ffffffff`00000111 fffff31f`b106c8c6 : nt!MiUserFault+0x3a0
ffff808e`382d8960 fffff807`0bdd0420 : ffffb18f`a6c22080 00000000`1a4cf100 00000000`00000401 00000000`00e73420 : nt!MmAccessFault+0x14e
ffff808e`382d8b00 00007ffb`a3491534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000000`1a4ce158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a3491534

THREAD_SHA1_HASH_MOD_FUNC: 92bd1be9f3ec997fbcacedb8640c1a498415e0e9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e5a2c932a5b680a25e08b3f9740a81cd266804f6

THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!MiSwapNumaStandbyPage+8b
fffff807`0bedb59b 49037e10 add rdi,qword ptr [r14+10h]

FAULT_INSTR_CODE: 107e0349

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!MiSwapNumaStandbyPage+8b

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.18362.720

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: memory_corruption

BUCKET_ID_FUNC_OFFSET: 8b

FAILURE_BUCKET_ID: AV_nt!MiSwapNumaStandbyPage

BUCKET_ID: AV_nt!MiSwapNumaStandbyPage

PRIMARY_PROBLEM_CLASS: AV_nt!MiSwapNumaStandbyPage

TARGET_TIME: 2020-03-18T09:10:47.000Z

OSBUILD: 18362

OSSERVICEPACK: 720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 25e6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_nt!miswapnumastandbypage

FAILURE_ID_HASH: {522a635a-0d98-8289-7b34-c2db782a6bc9}

Followup: MachineOwner
---------

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8071c0aedb4, Virtual address for the attempted write.
Arg2: 8900000000105121, PTE contents.
Arg3: fffffd8517a97960, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE: 2

BUGCHECK_P1: fffff8071c0aedb4

BUGCHECK_P2: 8900000000105121

BUGCHECK_P3: fffffd8517a97960

BUGCHECK_P4: a

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0xBE

PROCESS_NAME: System

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME: 03-18-2020 16:42:05.0913

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME: fffffd8517a97960 -- (.trap 0xfffffd8517a97960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000001ba11520
rdx=000000001ba11520 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8070803c98a rsp=fffffd8517a97af0 rbp=000000000000001e
r8=fffff8071c0aeda0 r9=0000000000000000 r10=0000000000000004
r11=000000000000ffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExpScanGeneralLookasideList+0x4a:
fffff807`0803c98a 41894814 mov dword ptr [r8+14h],ecx ds:fffff807`1c0aedb4=00000000
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff807082001e7 to fffff807081c2380

STACK_TEXT:
fffffd85`17a97778 fffff807`082001e7 : 00000000`000000be fffff807`1c0aedb4 89000000`00105121 fffffd85`17a97960 : nt!KeBugCheckEx
fffffd85`17a97780 fffff807`080c92fa : 89000000`00105121 00000000`00000003 fffffd85`17a978c0 00000000`00000000 : nt!MiRaisedIrqlFault+0x19e437
fffffd85`17a977c0 fffff807`081d0420 : ffff8f85`52b4a080 fffff807`08113f14 ffff8f85`52b4a080 fffff807`0807e9cc : nt!MmAccessFault+0x48a
fffffd85`17a97960 fffff807`0803c98a : 00000000`00000001 fffff807`08431580 00000000`00000118 fffff807`0846a3c0 : nt!KiPageFault+0x360
fffffd85`17a97af0 fffff807`0818c8b2 : 00000000`00000007 00000000`ffffffff fffff807`0846a3c0 00000000`00000118 : nt!ExpScanGeneralLookasideList+0x4a
fffffd85`17a97b20 fffff807`0806bce5 : ffff8f85`52b4a080 00000000`00000080 fffff807`0818c790 00000000`00000000 : nt!KeBalanceSetManager+0x122
fffffd85`17a97c10 fffff807`081c99ca : ffffcd81`947cb180 ffff8f85`52b4a080 fffff807`0806bc90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffd85`17a97c60 00000000`00000000 : fffffd85`17a98000 fffffd85`17a92000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a

THREAD_SHA1_HASH_MOD_FUNC: 9cdd30fab53e7c1afab33cb6bfa6ec5e581e0189

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f8c776b2197401b1635b15f6ebc0bc75129b9ea0

THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8

FOLLOWUP_IP:
nt!MiRaisedIrqlFault+19e437
fffff807`082001e7 cc int 3

FAULT_INSTR_CODE: cf8b48cc

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt!MiRaisedIrqlFault+19e437

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.18362.720

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: memory_corruption

BUCKET_ID_FUNC_OFFSET: 19e437

FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault

BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault

PRIMARY_PROBLEM_CLASS: 0xBE_nt!MiRaisedIrqlFault

TARGET_TIME: 2020-03-17T14:49:49.000Z

OSBUILD: 18362

OSSERVICEPACK: 720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 47e4

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0xbe_nt!miraisedirqlfault

FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup: MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffad0e0a564200, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffad0e0a564158, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE: 2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffad0e0a564200

BUGCHECK_P3: ffffad0e0a564158

BUGCHECK_P4: 0

TRAP_FRAME: ffffad0e0a564200 -- (.trap 0xffffad0e0a564200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe98004141880 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057ea3922a rsp=ffffad0e0a564390 rbp=ffffad0e0a564431
r8=0000000000000000 r9=0000000000000004 r10=0000000000000002
r11=0000000000000090 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiUnlinkNodeLargePage+0x186fea:
fffff805`7ea3922a cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffad0e0a564158 -- (.exr 0xffffad0e0a564158)
ExceptionAddress: fffff8057ea3922a (nt!MiUnlinkNodeLargePage+0x0000000000186fea)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

BUGCHECK_STR: 0x139

PROCESS_NAME: javaw.exe

CURRENT_IRQL: 2

DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME: 03-18-2020 16:42:02.0147

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER: from fffff8057e9d41e9 to fffff8057e9c2380

STACK_TEXT:
ffffad0e`0a563ed8 fffff805`7e9d41e9 : 00000000`00000139 00000000`00000003 ffffad0e`0a564200 ffffad0e`0a564158 : nt!KeBugCheckEx
ffffad0e`0a563ee0 fffff805`7e9d4610 : fffff805`7e8e5b10 fffff805`7e8e84b0 00007fff`ffff0000 00007fff`fffeffff : nt!KiBugCheckDispatch+0x69
ffffad0e`0a564020 fffff805`7e9d29a5 : 00000000`00000000 00000000`00000000 ffff9a08`cf52b060 00000000`000567fb : nt!KiFastFailDispatch+0xd0
ffffad0e`0a564200 fffff805`7ea3922a : 00000000`00000006 ffffad0e`0a564431 ffffe980`034d2500 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
ffffad0e`0a564390 fffff805`7e8140fb : 00000000`00000010 81000001`00000002 00000000`00000000 00000000`00000004 : nt!MiUnlinkNodeLargePage+0x186fea
ffffad0e`0a564480 fffff805`7e813cbc : 00000000`00000002 fffff805`7ec6a3c0 00000000`0008cb76 ffffad0e`0a564810 : nt!MiGetFreeZeroLargePage+0x63
ffffad0e`0a5644f0 fffff805`7e8cbf5e : 00000000`00000000 00000000`00000000 ffff88c4`62311000 ffffad0e`0a564810 : nt!MiGetLargePage+0xcc
ffffad0e`0a5646a0 fffff805`7e8c8429 : 00000000`00000060 00000000`00000000 00000000`00000010 00000000`00000001 : nt!MiResolvePrivateZeroFault+0x43e
ffffad0e`0a5647c0 fffff805`7e8c9850 : ffffad0e`0a564a20 ffffad0e`0a564960 ffffad0e`0a564968 ffffad0e`0a5648f0 : nt!MiZeroFault+0x389
ffffad0e`0a5648b0 fffff805`7e8c8fbe : 00000000`00000001 ffffad0e`0a564830 ffffffff`00000111 fffffb86`2ce2c8c6 : nt!MiUserFault+0x3a0
ffffad0e`0a564960 fffff805`7e9d0420 : ffff9a08`ce8d1080 00000000`1ae0f060 00000000`00000401 00000000`0186f6f0 : nt!MmAccessFault+0x14e
ffffad0e`0a564b00 00007ffe`8eda1534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000000`1ae0e0b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8eda1534

THREAD_SHA1_HASH_MOD_FUNC: b366742cf1fcd793b717cb1f6b3a47d8f82f3382

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 107d602b5845ea805e659df6593de0e22b337b74

THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff805`7e9d4610 c644242000 mov byte ptr [rsp+20h],0

FAULT_INSTR_CODE: 202444c6

SYMBOL_STACK_INDEX: 2

SYMBOL_NAME: nt!KiFastFailDispatch+d0

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.18362.720

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

TARGET_TIME: 2020-03-17T09:17:34.000Z

OSBUILD: 18362

OSSERVICEPACK: 720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 2d22

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80374f73358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME: MS-7B38

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 2.GP

BIOS_DATE: 11/15/2019

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd

BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION: 1.0

DUMP_TYPE: 2

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80374f73358

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x133

PROCESS_NAME: chrome.exe

CURRENT_IRQL: d

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME: 03-18-2020 16:41:57.0747

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME: ffffd70b3a8606e0 -- (.trap 0xffffd70b3a8606e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000001255a0005 rbx=0000000000000000 rcx=ffffaf7000270600
rdx=ffffaf7000270600 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80374bca2a7 rsp=ffffd70b3a860870 rbp=0000000000000002
r8=ffffaf7000270600 r9=0000000000000000 r10=ffffb28000005200
r11=0000000000000020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExpInterlockedPopEntrySListFault:
fffff803`74bca2a7 498b08 mov rcx,qword ptr [r8] ds:ffffaf70`00270600=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80374c3d8b1 to fffff80374bc2380

STACK_TEXT:
ffffe701`5b837b08 fffff803`74c3d8b1 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`74f73358 : nt!KeBugCheckEx
ffffe701`5b837b10 fffff803`74ab8e3c : 00000df0`7fab8e6c ffffe701`5b9cd180 00000000`00044338 00000000`00044338 : nt!KeAccumulateTicks+0x181631
ffffe701`5b837b70 fffff803`7495e4b7 : 00000000`00000000 ffffd70b`3a860550 ffffd70b`3a8605d0 00000000`00000002 : nt!KeClockInterruptNotify+0x98c
ffffe701`5b837f30 fffff803`74a2cc75 : 0000000a`29cd8d11 ffff9b87`ab6ce500 ffff9b87`ab6ce5b0 00000000`00000000 : hal!HalpTimerClockInterrupt+0xf7
ffffe701`5b837f60 fffff803`74bc3e1a : ffffd70b`3a8605d0 ffff9b87`ab6ce500 fffff803`74d7a250 ffff9b87`ab6ce500 : nt!KiCallInterruptServiceRoutine+0xa5
ffffe701`5b837fb0 fffff803`74bc4387 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffd70b`3a860550 fffff803`74bd03d7 : 00000001`255a0005 ffffd70b`3a860760 ffff9b87`ab6ce500 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffd70b`3a8606e0 fffff803`74bca2a7 : 00000000`00000000 fffff803`74ace5f1 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x317
ffffd70b`3a860870 fffff803`74ace5f1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
ffffd70b`3a860880 fffff803`74acdf41 : fffff803`74e6a3c0 ffff9b87`00000020 00000000`00000020 00000000`00000000 : nt!MiGetPage+0xf1
ffffd70b`3a860960 fffff803`74acbc6a : 00000000`00000001 00000000`00000000 00000000`00000001 ffffd70b`3a860cd0 : nt!MiGetPageChain+0x181
ffffd70b`3a860b50 fffff803`74acb748 : ffff9b87`000007e6 00000000`00000001 00000000`00000050 00000000`00000050 : nt!MiResolvePrivateZeroFault+0x14a
ffffd70b`3a860c70 fffff803`74acb012 : ffffabd5`c08cea98 ffffd70b`3a861080 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x218
ffffd70b`3a860d60 fffff803`74ac8fd9 : 00000000`00000008 ffffd70b`0000001c 00000000`c0000016 fffff803`868a010f : nt!MiDispatchFault+0x982
ffffd70b`3a860eb0 fffff803`74a3f8f4 : ffffabd5`eaf57000 ffff9b87`b1ff4580 00000000`00000000 00000233`aa7b0000 : nt!MmAccessFault+0x169
ffffd70b`3a861050 fffff803`74b2e11c : 00000000`00000001 ffffab81`19d53d80 ffffd70b`3a8611c0 ffffabd5`eaf577f8 : nt!MiFaultInProbeAddress+0xbc
ffffd70b`3a861100 fffff803`74b2d62e : ffffd70b`3a861270 00000000`00000000 ffffd70b`3a861270 00000233`aa7b0000 : nt!MiLockPageLeafPageTable+0x15c
ffffd70b`3a861170 fffff803`74b2d4b9 : 00000000`00000000 ffff8a08`36cf0d90 ffff8a08`36cf0d90 00000000`00000000 : nt!MiProbeAndLockPages+0x15e
ffffd70b`3a8612c0 fffff803`85e99f2c : ffffd70b`00000000 00000000`00042538 00000000`000e4000 ffff8a08`36cf1c50 : nt!MmProbeAndLockPages+0x29
ffffd70b`3a8612f0 fffff803`85e99e09 : ffff8a08`36cf1c50 ffff8a08`36cf1c50 00000000`00000000 00000233`aa7b0000 : dxgmms2!VIDMM_MDL_RANGE::Lock+0x6c
ffffd70b`3a861350 fffff803`85e96b17 : ffff8a08`36051120 ffff8a08`35cf5cb0 ffff9b87`00000000 ffff9b87`b1355de0 : dxgmms2!VIDMM_RECYCLE_HEAP_PHYSICAL_VIEW::LockRange+0x109
ffffd70b`3a8613d0 fffff803`85e969ff : ffff8a08`35d47910 00000000`000f0000 00000000`00000000 fffff803`85ea9bd3 : dxgmms2!VIDMM_RECYCLE_RANGE::Lock+0x7b
ffffd70b`3a861430 fffff803`85e9693b : ffff8a08`36b48610 00000000`00000000 00000000`00000000 00000000`000f0000 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::Lock+0x83
ffffd70b`3a861490 fffff803`85e9acd9 : ffff8a08`36b48610 ffff9b87`b148b000 00000000`00000030 00000000`00042538 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::probeAndLockAllocation+0x7b
ffffd70b`3a861510 fffff803`85e9aaa1 : ffff9b87`b148b000 ffff8a08`35cf5cb0 ffff8a08`00000000 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::probeAndLockAllocation+0x55
ffffd70b`3a861560 fffff803`85e9adcf : ffff8a08`35cf5cb0 ffff9b87`b148b000 ffff8a08`35cf5cb0 00000000`00000000 : dxgmms2!VIDMM_SEGMENT::LockAllocationBackingStore+0xc5
ffffd70b`3a861620 fffff803`85e9c99f : ffff9b87`b9061110 ffff9b87`b148b000 00000000`00000000 ffff8a08`35cf5cb0 : dxgmms2!VIDMM_SYSMEM_SEGMENT::CommitResource+0x8f
ffffd70b`3a861660 fffff803`85ea7eb2 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::pageInOneAllocation+0x1ef
ffffd70b`3a861770 fffff803`85eb7da4 : 00000000`00000001 00000000`00989680 ffff8a08`2f616900 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::processDeferredCommand+0x862
ffffd70b`3a8619e0 fffff803`85eb6ee9 : ffff8a08`2c2f3c10 fffff803`74f91401 ffff9b87`b140e600 00000000`00000100 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xea4
ffffd70b`3a861be0 fffff803`74a6bce5 : ffff9b87`b140e680 fffff803`85eb6ee0 ffff8a08`2c2f3c10 00000067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffd70b`3a861c10 fffff803`74bc99ca : fffff803`70369180 ffff9b87`b140e680 fffff803`74a6bc90 8b44fd8b`42746024 : nt!PspSystemThreadStartup+0x55
ffffd70b`3a861c60 00000000`00000000 : ffffd70b`3a862000 ffffd70b`3a85c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a

THREAD_SHA1_HASH_MOD_FUNC: 42b1f1008281954d1547b534124a75937d798cc7

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3344e0c95588065253384753029eb79ee384d992

THREAD_SHA1_HASH_MOD: dc0110497812df1b54d877b953dab680ed187995

FOLLOWUP_IP:
dxgmms2!VIDMM_MDL_RANGE::Lock+6c
fffff803`85e99f2c eb5d jmp dxgmms2!VIDMM_MDL_RANGE::Lock+0xcb (fffff803`85e99f8b)

FAULT_INSTR_CODE: 3d805deb

SYMBOL_STACK_INDEX: 13

SYMBOL_NAME: dxgmms2!VIDMM_MDL_RANGE::Lock+6c

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME: dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 40bd916b

IMAGE_VERSION: 10.0.18362.719

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 6c

FAILURE_BUCKET_ID: 0x133_ISR_dxgmms2!VIDMM_MDL_RANGE::Lock

BUCKET_ID: 0x133_ISR_dxgmms2!VIDMM_MDL_RANGE::Lock

PRIMARY_PROBLEM_CLASS: 0x133_ISR_dxgmms2!VIDMM_MDL_RANGE::Lock

TARGET_TIME: 2020-03-14T00:48:18.000Z

OSBUILD: 18362

OSSERVICEPACK: 720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 15018

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x133_isr_dxgmms2!vidmm_mdl_range::lock

FAILURE_ID_HASH: {2ea2a685-a337-d637-b4cf-df7f0dea36b2}

Followup: MachineOwner
---------


Şu anda yanımda bir USB yok akşam yapıp haber edeceğim.
Memtest86 testi yapar mısın?

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 000001feb2c37000.
Arg3: 0000000000000009.
Arg4: ffffbc0b15bcd6f0.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME: MS-7B38.

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 2.GP.

BIOS_DATE: 11/15/2019.

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION: 1.0.

DUMP_TYPE: 2.

BUGCHECK_P1: 61941.

BUGCHECK_P2: 1feb2c37000.

BUGCHECK_P3: 9.

BUGCHECK_P4: ffffbc0b15bcd6f0.

BUGCHECK_STR: 0x1a_61941.

CPU_COUNT: 4.

CPU_MHZ: dac.

CPU_VENDOR: AuthenticAMD.

CPU_FAMILY: 17.

CPU_MODEL: 11.

CPU_STEPPING: 0.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

PROCESS_NAME: WmiPrvSE.exe.

CURRENT_IRQL: 0.

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ.

ANALYSIS_SESSION_TIME: 03-18-2020 16:42:12.0940.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

TRAP_FRAME: ffffbc0b15bcd6f0 -- (.trap 0xffffbc0b15bcd6f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000001feb2c37000.
rdx=000001feb2c3d000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8064fab0959 rsp=ffffbc0b15bcd880 rbp=ffffbc0b15bcdb80.
r8=0000000000000003 r9=0000000000000000 r10=0000000000038000.
r11=ffffbc0b15bcdab8 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na po cy.
nt!ProbeForWrite+0x39:
fffff806`4fab0959 0fb601 movzx eax,byte ptr [rcx] ds:000001fe`b2c37000=??
Resetting default scope.

LAST_CONTROL_TRANSFER: from fffff8064f64288c to fffff8064f5c2380.

STACK_TEXT:
ffffbc0b`15bcd548 fffff806`4f64288c : 00000000`0000001a 00000000`00061941 000001fe`b2c37000 00000000`00000009 : nt!KeBugCheckEx.
ffffbc0b`15bcd550 fffff806`4f5d0420 : ffffa702`481a7040 ffffa702`481a7040 00000000`00000001 ffffa702`481a7040 : nt!MmAccessFault+0x179a1c.
ffffbc0b`15bcd6f0 fffff806`4fab0959 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360.
ffffbc0b`15bcd880 fffff806`4faaacf6 : 00000068`510fc9f0 00000000`00001000 00000068`510fc9e0 000001fe`b2c05000 : nt!ProbeForWrite+0x39.
ffffbc0b`15bcd8b0 fffff806`4faaab1b : 000001fe`b2c04e01 00000000`00000000 00000000`00000000 00000000`00017000 : nt!ExpQuerySystemInformation+0xb6.
ffffbc0b`15bcdac0 fffff806`4f5d3c18 : ffffa702`481a7040 00000000`00000001 00000000`00000000 ffffa702`4805b6e0 : nt!NtQuerySystemInformation+0x2b.
ffffbc0b`15bcdb00 00007ffb`ed05c784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000068`510fccf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`ed05c784.

THREAD_SHA1_HASH_MOD_FUNC: cc6d0be3deb5fff9d208c84fa213fffd783d14a5.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bfef6d67f549a76153b1dad42afa6d0ae8f27986.

THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6.

FOLLOWUP_IP:
nt!KiPageFault+360.
fffff806`4f5d0420 85c0 test eax,eax.

FAULT_INSTR_CODE: 367cc085.

SYMBOL_STACK_INDEX: 2.

SYMBOL_NAME: nt!KiPageFault+360.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

IMAGE_VERSION: 10.0.18362.719.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 360.

FAILURE_BUCKET_ID: 0x1a_61941_nt!KiPageFault.

BUCKET_ID: 0x1a_61941_nt!KiPageFault.

PRIMARY_PROBLEM_CLASS: 0x1a_61941_nt!KiPageFault.

TARGET_TIME: 2020-03-18T13:12:51.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 719.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: unknown_date.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 17a4.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:0x1a_61941_nt!kipagefault.

FAILURE_ID_HASH: {60820728-e269-54d0-27b9-6b64c44bb18e}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8070bedb59b, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

DUMP_TYPE: 2.

BUGCHECK_P1: 10.

BUGCHECK_P2: 2.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff8070bedb59b.

READ_ADDRESS: fffff8070c1733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
0000000000000010.

CURRENT_IRQL: 2.

FAULTING_IP:
nt!MiSwapNumaStandbyPage+8b.
fffff807`0bedb59b 49037e10 add rdi,qword ptr [r14+10h]

CPU_COUNT: 4.

CPU_MHZ: dac.

CPU_VENDOR: AuthenticAMD.

CPU_FAMILY: 17.

CPU_MODEL: 11.

CPU_STEPPING: 0.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

BUGCHECK_STR: AV.

PROCESS_NAME: javaw.exe.

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ.

ANALYSIS_SESSION_TIME: 03-18-2020 16:42:09.0478.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

TRAP_FRAME: ffff808e382d8180 -- (.trap 0xffff808e382d8180)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8070c0680c0 rbx=0000000000000000 rcx=0000000000000001.
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8070bedb59b rsp=ffff808e382d8310 rbp=ffff808e382d8390.
r8=0000000000000000 r9=0000000000000012 r10=0000000000000000.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po nc.
nt!MiSwapNumaStandbyPage+0x8b:
fffff807`0bedb59b 49037e10 add rdi,qword ptr [r14+10h] ds:00000000`00000010=????????????????
Resetting default scope.

LAST_CONTROL_TRANSFER: from fffff8070bdd41e9 to fffff8070bdc2380.

STACK_TEXT:
ffff808e`382d8038 fffff807`0bdd41e9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
ffff808e`382d8040 fffff807`0bdd052b : ffff0e08`ca62fb91 00000002`08e84000 00000000`00000000 00000000`00000006 : nt!KiBugCheckDispatch+0x69.
ffff808e`382d8180 fffff807`0bedb59b : 00000000`00190715 fffff807`0bd246df fffff3f0`000000ae 00000000`00000004 : nt!KiPageFault+0x46b.
ffff808e`382d8310 fffff807`0be45799 : 00000000`000001af 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiSwapNumaStandbyPage+0x8b.
ffff808e`382d83d0 fffff807`0bccdf41 : fffff807`0c06a3c0 ffffb18f`000000af 00000000`000000af 00000000`00000000 : nt!MiGetPage+0x177299.
ffff808e`382d84b0 fffff807`0bccbc6a : 00000000`00000000 00000000`00000000 fffff3f9`fcfe7000 ffff808e`382d8810 : nt!MiGetPageChain+0x181.
ffff808e`382d86a0 fffff807`0bcc8429 : ffff808e`382d8a58 00000000`00000000 00000000`00000010 00000000`00000010 : nt!MiResolvePrivateZeroFault+0x14a.
ffff808e`382d87c0 fffff807`0bcc9850 : ffff808e`382d8a20 ffff808e`382d8960 ffff808e`382d8968 ffff808e`382d88f0 : nt!MiZeroFault+0x389.
ffff808e`382d88b0 fffff807`0bcc8fbe : 00000000`00000001 ffff808e`382d8830 ffffffff`00000111 fffff31f`b106c8c6 : nt!MiUserFault+0x3a0.
ffff808e`382d8960 fffff807`0bdd0420 : ffffb18f`a6c22080 00000000`1a4cf100 00000000`00000401 00000000`00e73420 : nt!MmAccessFault+0x14e.
ffff808e`382d8b00 00007ffb`a3491534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360.
00000000`1a4ce158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a3491534.

THREAD_SHA1_HASH_MOD_FUNC: 92bd1be9f3ec997fbcacedb8640c1a498415e0e9.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e5a2c932a5b680a25e08b3f9740a81cd266804f6.

THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c.

FOLLOWUP_IP:
nt!MiSwapNumaStandbyPage+8b.
fffff807`0bedb59b 49037e10 add rdi,qword ptr [r14+10h]

FAULT_INSTR_CODE: 107e0349.

SYMBOL_STACK_INDEX: 3.

SYMBOL_NAME: nt!MiSwapNumaStandbyPage+8b.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: nt.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

IMAGE_VERSION: 10.0.18362.720.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: memory_corruption.

BUCKET_ID_FUNC_OFFSET: 8b.

FAILURE_BUCKET_ID: AV_nt!MiSwapNumaStandbyPage.

BUCKET_ID: AV_nt!MiSwapNumaStandbyPage.

PRIMARY_PROBLEM_CLASS: AV_nt!MiSwapNumaStandbyPage.

TARGET_TIME: 2020-03-18T09:10:47.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 720.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: unknown_date.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 25e6.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:av_nt!miswapnumastandbypage.

FAILURE_ID_HASH: {522a635a-0d98-8289-7b34-c2db782a6bc9}

Followup: MachineOwner.
---------

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the.
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on.
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8071c0aedb4, Virtual address for the attempted write.
Arg2: 8900000000105121, PTE contents.
Arg3: fffffd8517a97960, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

DUMP_TYPE: 2.

BUGCHECK_P1: fffff8071c0aedb4.

BUGCHECK_P2: 8900000000105121.

BUGCHECK_P3: fffffd8517a97960.

BUGCHECK_P4: a.

CPU_COUNT: 4.

CPU_MHZ: dac.

CPU_VENDOR: AuthenticAMD.

CPU_FAMILY: 17.

CPU_MODEL: 11.

CPU_STEPPING: 0.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

BUGCHECK_STR: 0xBE.

PROCESS_NAME: System.

CURRENT_IRQL: 2.

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ.

ANALYSIS_SESSION_TIME: 03-18-2020 16:42:05.0913.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

TRAP_FRAME: fffffd8517a97960 -- (.trap 0xfffffd8517a97960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000001ba11520.
rdx=000000001ba11520 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8070803c98a rsp=fffffd8517a97af0 rbp=000000000000001e.
r8=fffff8071c0aeda0 r9=0000000000000000 r10=0000000000000004.
r11=000000000000ffff r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na pe nc.
nt!ExpScanGeneralLookasideList+0x4a:
fffff807`0803c98a 41894814 mov dword ptr [r8+14h],ecx ds:fffff807`1c0aedb4=00000000.
Resetting default scope.

LAST_CONTROL_TRANSFER: from fffff807082001e7 to fffff807081c2380.

STACK_TEXT:
fffffd85`17a97778 fffff807`082001e7 : 00000000`000000be fffff807`1c0aedb4 89000000`00105121 fffffd85`17a97960 : nt!KeBugCheckEx.
fffffd85`17a97780 fffff807`080c92fa : 89000000`00105121 00000000`00000003 fffffd85`17a978c0 00000000`00000000 : nt!MiRaisedIrqlFault+0x19e437.
fffffd85`17a977c0 fffff807`081d0420 : ffff8f85`52b4a080 fffff807`08113f14 ffff8f85`52b4a080 fffff807`0807e9cc : nt!MmAccessFault+0x48a.
fffffd85`17a97960 fffff807`0803c98a : 00000000`00000001 fffff807`08431580 00000000`00000118 fffff807`0846a3c0 : nt!KiPageFault+0x360.
fffffd85`17a97af0 fffff807`0818c8b2 : 00000000`00000007 00000000`ffffffff fffff807`0846a3c0 00000000`00000118 : nt!ExpScanGeneralLookasideList+0x4a.
fffffd85`17a97b20 fffff807`0806bce5 : ffff8f85`52b4a080 00000000`00000080 fffff807`0818c790 00000000`00000000 : nt!KeBalanceSetManager+0x122.
fffffd85`17a97c10 fffff807`081c99ca : ffffcd81`947cb180 ffff8f85`52b4a080 fffff807`0806bc90 00000000`00000000 : nt!PspSystemThreadStartup+0x55.
fffffd85`17a97c60 00000000`00000000 : fffffd85`17a98000 fffffd85`17a92000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a.

THREAD_SHA1_HASH_MOD_FUNC: 9cdd30fab53e7c1afab33cb6bfa6ec5e581e0189.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f8c776b2197401b1635b15f6ebc0bc75129b9ea0.

THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8.

FOLLOWUP_IP:
nt!MiRaisedIrqlFault+19e437.
fffff807`082001e7 cc int 3.

FAULT_INSTR_CODE: cf8b48cc.

SYMBOL_STACK_INDEX: 1.

SYMBOL_NAME: nt!MiRaisedIrqlFault+19e437.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: nt.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

IMAGE_VERSION: 10.0.18362.720.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: memory_corruption.

BUCKET_ID_FUNC_OFFSET: 19e437.

FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault.

BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault.

PRIMARY_PROBLEM_CLASS: 0xBE_nt!MiRaisedIrqlFault.

TARGET_TIME: 2020-03-17T14:49:49.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 720.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: unknown_date.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 47e4.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:0xbe_nt!miraisedirqlfault.

FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup: MachineOwner.
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffad0e0a564200, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffffad0e0a564158, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

DUMP_TYPE: 2.

BUGCHECK_P1: 3.

BUGCHECK_P2: ffffad0e0a564200.

BUGCHECK_P3: ffffad0e0a564158.

BUGCHECK_P4: 0.

TRAP_FRAME: ffffad0e0a564200 -- (.trap 0xffffad0e0a564200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe98004141880 rbx=0000000000000000 rcx=0000000000000003.
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8057ea3922a rsp=ffffad0e0a564390 rbp=ffffad0e0a564431.
r8=0000000000000000 r9=0000000000000004 r10=0000000000000002.
r11=0000000000000090 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na po cy.
nt!MiUnlinkNodeLargePage+0x186fea:
fffff805`7ea3922a cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffffad0e0a564158 -- (.exr 0xffffad0e0a564158)
ExceptionAddress: fffff8057ea3922a (nt!MiUnlinkNodeLargePage+0x0000000000186fea)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1.
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY.

CPU_COUNT: 4.

CPU_MHZ: dac.

CPU_VENDOR: AuthenticAMD.

CPU_FAMILY: 17.

CPU_MODEL: 11.

CPU_STEPPING: 0.

CUSTOMER_CRASH_COUNT: 1.

BUGCHECK_STR: 0x139.

PROCESS_NAME: javaw.exe.

CURRENT_IRQL: 2.

DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY.

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ.

ANALYSIS_SESSION_TIME: 03-18-2020 16:42:02.0147.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

LAST_CONTROL_TRANSFER: from fffff8057e9d41e9 to fffff8057e9c2380.

STACK_TEXT:
ffffad0e`0a563ed8 fffff805`7e9d41e9 : 00000000`00000139 00000000`00000003 ffffad0e`0a564200 ffffad0e`0a564158 : nt!KeBugCheckEx.
ffffad0e`0a563ee0 fffff805`7e9d4610 : fffff805`7e8e5b10 fffff805`7e8e84b0 00007fff`ffff0000 00007fff`fffeffff : nt!KiBugCheckDispatch+0x69.
ffffad0e`0a564020 fffff805`7e9d29a5 : 00000000`00000000 00000000`00000000 ffff9a08`cf52b060 00000000`000567fb : nt!KiFastFailDispatch+0xd0.
ffffad0e`0a564200 fffff805`7ea3922a : 00000000`00000006 ffffad0e`0a564431 ffffe980`034d2500 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325.
ffffad0e`0a564390 fffff805`7e8140fb : 00000000`00000010 81000001`00000002 00000000`00000000 00000000`00000004 : nt!MiUnlinkNodeLargePage+0x186fea.
ffffad0e`0a564480 fffff805`7e813cbc : 00000000`00000002 fffff805`7ec6a3c0 00000000`0008cb76 ffffad0e`0a564810 : nt!MiGetFreeZeroLargePage+0x63.
ffffad0e`0a5644f0 fffff805`7e8cbf5e : 00000000`00000000 00000000`00000000 ffff88c4`62311000 ffffad0e`0a564810 : nt!MiGetLargePage+0xcc.
ffffad0e`0a5646a0 fffff805`7e8c8429 : 00000000`00000060 00000000`00000000 00000000`00000010 00000000`00000001 : nt!MiResolvePrivateZeroFault+0x43e.
ffffad0e`0a5647c0 fffff805`7e8c9850 : ffffad0e`0a564a20 ffffad0e`0a564960 ffffad0e`0a564968 ffffad0e`0a5648f0 : nt!MiZeroFault+0x389.
ffffad0e`0a5648b0 fffff805`7e8c8fbe : 00000000`00000001 ffffad0e`0a564830 ffffffff`00000111 fffffb86`2ce2c8c6 : nt!MiUserFault+0x3a0.
ffffad0e`0a564960 fffff805`7e9d0420 : ffff9a08`ce8d1080 00000000`1ae0f060 00000000`00000401 00000000`0186f6f0 : nt!MmAccessFault+0x14e.
ffffad0e`0a564b00 00007ffe`8eda1534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360.
00000000`1ae0e0b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8eda1534.

THREAD_SHA1_HASH_MOD_FUNC: b366742cf1fcd793b717cb1f6b3a47d8f82f3382.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 107d602b5845ea805e659df6593de0e22b337b74.

THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94.

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0.
fffff805`7e9d4610 c644242000 mov byte ptr [rsp+20h],0.

FAULT_INSTR_CODE: 202444c6.

SYMBOL_STACK_INDEX: 2.

SYMBOL_NAME: nt!KiFastFailDispatch+d0.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

IMAGE_VERSION: 10.0.18362.720.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: d0.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch.

BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch.

PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch.

TARGET_TIME: 2020-03-17T09:17:34.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 720.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: unknown_date.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 2d22.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch.

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner.
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL.
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at.
DISPATCH_LEVEL or above. The offending component can usually be.
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80374f73358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains.
additional information regarding the cumulative timeout.
Arg4: 0000000000000000.

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME: MS-7B38.

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 2.GP.

BIOS_DATE: 11/15/2019.

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION: 1.0.

DUMP_TYPE: 2.

BUGCHECK_P1: 1.

BUGCHECK_P2: 1e00.

BUGCHECK_P3: fffff80374f73358.

BUGCHECK_P4: 0.

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED.

CPU_COUNT: 4.

CPU_MHZ: dac.

CPU_VENDOR: AuthenticAMD.

CPU_FAMILY: 17.

CPU_MODEL: 11.

CPU_STEPPING: 0.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

BUGCHECK_STR: 0x133.

PROCESS_NAME: chrome.exe.

CURRENT_IRQL: d.

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ.

ANALYSIS_SESSION_TIME: 03-18-2020 16:41:57.0747.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

TRAP_FRAME: ffffd70b3a8606e0 -- (.trap 0xffffd70b3a8606e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000001255a0005 rbx=0000000000000000 rcx=ffffaf7000270600.
rdx=ffffaf7000270600 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80374bca2a7 rsp=ffffd70b3a860870 rbp=0000000000000002.
r8=ffffaf7000270600 r9=0000000000000000 r10=ffffb28000005200.
r11=0000000000000020 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na po nc.
nt!ExpInterlockedPopEntrySListFault:
fffff803`74bca2a7 498b08 mov rcx,qword ptr [r8] ds:ffffaf70`00270600=????????????????
Resetting default scope.

LAST_CONTROL_TRANSFER: from fffff80374c3d8b1 to fffff80374bc2380.

STACK_TEXT:
ffffe701`5b837b08 fffff803`74c3d8b1 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`74f73358 : nt!KeBugCheckEx.
ffffe701`5b837b10 fffff803`74ab8e3c : 00000df0`7fab8e6c ffffe701`5b9cd180 00000000`00044338 00000000`00044338 : nt!KeAccumulateTicks+0x181631.
ffffe701`5b837b70 fffff803`7495e4b7 : 00000000`00000000 ffffd70b`3a860550 ffffd70b`3a8605d0 00000000`00000002 : nt!KeClockInterruptNotify+0x98c.
ffffe701`5b837f30 fffff803`74a2cc75 : 0000000a`29cd8d11 ffff9b87`ab6ce500 ffff9b87`ab6ce5b0 00000000`00000000 : hal!HalpTimerClockInterrupt+0xf7.
ffffe701`5b837f60 fffff803`74bc3e1a : ffffd70b`3a8605d0 ffff9b87`ab6ce500 fffff803`74d7a250 ffff9b87`ab6ce500 : nt!KiCallInterruptServiceRoutine+0xa5.
ffffe701`5b837fb0 fffff803`74bc4387 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa.
ffffd70b`3a860550 fffff803`74bd03d7 : 00000001`255a0005 ffffd70b`3a860760 ffff9b87`ab6ce500 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37.
ffffd70b`3a8606e0 fffff803`74bca2a7 : 00000000`00000000 fffff803`74ace5f1 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x317.
ffffd70b`3a860870 fffff803`74ace5f1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault.
ffffd70b`3a860880 fffff803`74acdf41 : fffff803`74e6a3c0 ffff9b87`00000020 00000000`00000020 00000000`00000000 : nt!MiGetPage+0xf1.
ffffd70b`3a860960 fffff803`74acbc6a : 00000000`00000001 00000000`00000000 00000000`00000001 ffffd70b`3a860cd0 : nt!MiGetPageChain+0x181.
ffffd70b`3a860b50 fffff803`74acb748 : ffff9b87`000007e6 00000000`00000001 00000000`00000050 00000000`00000050 : nt!MiResolvePrivateZeroFault+0x14a.
ffffd70b`3a860c70 fffff803`74acb012 : ffffabd5`c08cea98 ffffd70b`3a861080 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x218.
ffffd70b`3a860d60 fffff803`74ac8fd9 : 00000000`00000008 ffffd70b`0000001c 00000000`c0000016 fffff803`868a010f : nt!MiDispatchFault+0x982.
ffffd70b`3a860eb0 fffff803`74a3f8f4 : ffffabd5`eaf57000 ffff9b87`b1ff4580 00000000`00000000 00000233`aa7b0000 : nt!MmAccessFault+0x169.
ffffd70b`3a861050 fffff803`74b2e11c : 00000000`00000001 ffffab81`19d53d80 ffffd70b`3a8611c0 ffffabd5`eaf577f8 : nt!MiFaultInProbeAddress+0xbc.
ffffd70b`3a861100 fffff803`74b2d62e : ffffd70b`3a861270 00000000`00000000 ffffd70b`3a861270 00000233`aa7b0000 : nt!MiLockPageLeafPageTable+0x15c.
ffffd70b`3a861170 fffff803`74b2d4b9 : 00000000`00000000 ffff8a08`36cf0d90 ffff8a08`36cf0d90 00000000`00000000 : nt!MiProbeAndLockPages+0x15e.
ffffd70b`3a8612c0 fffff803`85e99f2c : ffffd70b`00000000 00000000`00042538 00000000`000e4000 ffff8a08`36cf1c50 : nt!MmProbeAndLockPages+0x29.
ffffd70b`3a8612f0 fffff803`85e99e09 : ffff8a08`36cf1c50 ffff8a08`36cf1c50 00000000`00000000 00000233`aa7b0000 : dxgmms2!VIDMM_MDL_RANGE::Lock+0x6c.
ffffd70b`3a861350 fffff803`85e96b17 : ffff8a08`36051120 ffff8a08`35cf5cb0 ffff9b87`00000000 ffff9b87`b1355de0 : dxgmms2!VIDMM_RECYCLE_HEAP_PHYSICAL_VIEW::LockRange+0x109.
ffffd70b`3a8613d0 fffff803`85e969ff : ffff8a08`35d47910 00000000`000f0000 00000000`00000000 fffff803`85ea9bd3 : dxgmms2!VIDMM_RECYCLE_RANGE::Lock+0x7b.
ffffd70b`3a861430 fffff803`85e9693b : ffff8a08`36b48610 00000000`00000000 00000000`00000000 00000000`000f0000 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::Lock+0x83.
ffffd70b`3a861490 fffff803`85e9acd9 : ffff8a08`36b48610 ffff9b87`b148b000 00000000`00000030 00000000`00042538 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::probeAndLockAllocation+0x7b.
ffffd70b`3a861510 fffff803`85e9aaa1 : ffff9b87`b148b000 ffff8a08`35cf5cb0 ffff8a08`00000000 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::probeAndLockAllocation+0x55.
ffffd70b`3a861560 fffff803`85e9adcf : ffff8a08`35cf5cb0 ffff9b87`b148b000 ffff8a08`35cf5cb0 00000000`00000000 : dxgmms2!VIDMM_SEGMENT::LockAllocationBackingStore+0xc5.
ffffd70b`3a861620 fffff803`85e9c99f : ffff9b87`b9061110 ffff9b87`b148b000 00000000`00000000 ffff8a08`35cf5cb0 : dxgmms2!VIDMM_SYSMEM_SEGMENT::CommitResource+0x8f.
ffffd70b`3a861660 fffff803`85ea7eb2 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::pageInOneAllocation+0x1ef.
ffffd70b`3a861770 fffff803`85eb7da4 : 00000000`00000001 00000000`00989680 ffff8a08`2f616900 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::processDeferredCommand+0x862.
ffffd70b`3a8619e0 fffff803`85eb6ee9 : ffff8a08`2c2f3c10 fffff803`74f91401 ffff9b87`b140e600 00000000`00000100 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xea4.
ffffd70b`3a861be0 fffff803`74a6bce5 : ffff9b87`b140e680 fffff803`85eb6ee0 ffff8a08`2c2f3c10 00000067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9.
ffffd70b`3a861c10 fffff803`74bc99ca : fffff803`70369180 ffff9b87`b140e680 fffff803`74a6bc90 8b44fd8b`42746024 : nt!PspSystemThreadStartup+0x55.
ffffd70b`3a861c60 00000000`00000000 : ffffd70b`3a862000 ffffd70b`3a85c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a.

THREAD_SHA1_HASH_MOD_FUNC: 42b1f1008281954d1547b534124a75937d798cc7.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3344e0c95588065253384753029eb79ee384d992.

THREAD_SHA1_HASH_MOD: dc0110497812df1b54d877b953dab680ed187995.

FOLLOWUP_IP:
dxgmms2!VIDMM_MDL_RANGE::Lock+6c.
fffff803`85e99f2c eb5d jmp dxgmms2!VIDMM_MDL_RANGE::Lock+0xcb (fffff803`85e99f8b)

FAULT_INSTR_CODE: 3d805deb.

SYMBOL_STACK_INDEX: 13.

SYMBOL_NAME: dxgmms2!VIDMM_MDL_RANGE::Lock+6c.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: dxgmms2.

IMAGE_NAME: dxgmms2.sys.

DEBUG_FLR_IMAGE_TIMESTAMP: 40bd916b.

IMAGE_VERSION: 10.0.18362.719.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 6c.

FAILURE_BUCKET_ID: 0x133_ISR_dxgmms2!VIDMM_MDL_RANGE::Lock.

BUCKET_ID: 0x133_ISR_dxgmms2!VIDMM_MDL_RANGE::Lock.

PRIMARY_PROBLEM_CLASS: 0x133_ISR_dxgmms2!VIDMM_MDL_RANGE::Lock.

TARGET_TIME: 2020-03-14T00:48:18.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 720.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: unknown_date.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 15018.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:0x133_isr_dxgmms2!vidmm_mdl_range::lock.

FAILURE_ID_HASH: {2ea2a685-a337-d637-b4cf-df7f0dea36b2}

Followup: MachineOwner.
---------


Şu an bir USB bellek bulamadım 2 RAM var sırayla çıkararak deneyeceğim 2'sinde birden problem olma ihtimali var mıdır?
 
Son düzenleme:
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı