SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80753039c37, Address of the instruction which caused the bugcheck
Arg3: ffffe809d6d36d40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: MSI
SYSTEM_PRODUCT_NAME: MS-7978
SYSTEM_SKU: Default string
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: B.C0
BIOS_DATE: 07/05/2018
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: B150 GAMING M3 (MS-7978)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 1
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80753039c37
BUGCHECK_P3: ffffe809d6d36d40
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExAcquirePushLockExclusiveEx+107
fffff807`53039c37 f0480fba2e00 lock bts qword ptr [rsi],0
CONTEXT: ffffe809d6d36d40 -- (.cxr 0xffffe809d6d36d40)
rax=0000000000000000 rbx=ffff828d5e50d0d8 rcx=ffff828d5e50d040
rdx=ffefc68fc53294e0 rsi=ffefc68fc53294e0 rdi=ffff828d5e50d360
rip=fffff80753039c37 rsp=ffffe809d6d37730 rbp=0000000000000008
r8=ffffe809d6d37778 r9=0000000000000000 r10=7ffffffffffffffc
r11=ffffe809d6d377b0 r12=ffff828d5e582c00 r13=0000000000000000
r14=ffff828d56ee0c40 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ExAcquirePushLockExclusiveEx+0x107:
fffff807`53039c37 f0480fba2e00 lock bts qword ptr [rsi],0 ds:002b:ffefc68f`c53294e0=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 4
CPU_MHZ: c78
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: C6'00000000 (cache) C6'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: taskhostw.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-09-2020 18:31:51.0702
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80753609e3c to fffff80753039c37
STACK_TEXT:
ffffe809`d6d37730 fffff807`53609e3c : ffefc68f`c53294f0 ffff828d`00000000 ffff828d`00000000 00000000`00000000 : nt!ExAcquirePushLockExclusiveEx+0x107
ffffe809`d6d37770 fffff807`535c2e71 : ffffffff`00000000 ffff828d`00000000 ffff828d`5e582d48 ffff828d`5e582c60 : nt!AlpcpLockForCachedReferenceBlob+0x14
ffffe809`d6d377b0 fffff807`535c222e : ffff828d`5e582c60 ffffe809`d6d37939 ffff828d`5e582c30 ffffe809`d6d37939 : nt!AlpcpSendCloseMessage+0x75
ffffe809`d6d37820 fffff807`535ec408 : ffff828d`5e582c30 00000000`00000000 ffff828d`00000000 ffff828d`5e582c30 : nt!AlpcpClosePort+0x5e
ffffe809`d6d37850 fffff807`535f174e : 00000000`00000158 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x278
ffffe809`d6d37990 fffff807`531d2d15 : ffff828d`5e50d040 ffffe809`d6d37a80 ffffe809`d6d37a80 00000000`80210003 : nt!NtClose+0xde
ffffe809`d6d37a00 00007ffd`4215c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000036`6e27f908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`4215c2a4
THREAD_SHA1_HASH_MOD_FUNC: 08287c524a254241f76f464ddb0612ad5398d34a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ef28ee6ae7ff87b4579814537eb349a8ed406ba7
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!ExAcquirePushLockExclusiveEx+107
fffff807`53039c37 f0480fba2e00 lock bts qword ptr [rsi],0
FAULT_INSTR_CODE: ba0f48f0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+107
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .cxr 0xffffe809d6d36d40 ; kb
BUCKET_ID_FUNC_OFFSET: 107
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx
BUCKET_ID: 0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx
TARGET_TIME: 2020-02-09T14:23:57.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: b47e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!exacquirepushlockexclusiveex
FAILURE_ID_HASH: {4fe31d77-fb81-4dc1-5992-c924ac6e709a}
Followup: MachineOwner
---------
Dediğinizi aynen uygulayacağım birazdan, DDU kullanıyordum bir ara şimdi son versiyonunu indirdim. Bir de ekran kartı sürücülüerinden genellikle opsiyonel olanlar tercihim değildir pek, yalnızca WHQL sürücülerini kuruyorum. Bunun bir sakıncası yoktur herhalde değil mi?Ekran kartı sürücüsünü DDU ile kaldır tekrar yükle.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net
Komut satırını(CMD) yönetici olarak başlatın "sfc /scannow" yazın işlemi başlatın, işlem bitince bilgisayarı yeniden başlatın.
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80753039c37, Address of the instruction which caused the bugcheck Arg3: ffffe809d6d36d40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: MSI SYSTEM_PRODUCT_NAME: MS-7978 SYSTEM_SKU: Default string SYSTEM_VERSION: 2.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: B.C0 BIOS_DATE: 07/05/2018 BASEBOARD_MANUFACTURER: MSI BASEBOARD_PRODUCT: B150 GAMING M3 (MS-7978) BASEBOARD_VERSION: 2.0 DUMP_TYPE: 1 BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80753039c37 BUGCHECK_P3: ffffe809d6d36d40 BUGCHECK_P4: 0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!ExAcquirePushLockExclusiveEx+107 fffff807`53039c37 f0480fba2e00 lock bts qword ptr [rsi],0 CONTEXT: ffffe809d6d36d40 -- (.cxr 0xffffe809d6d36d40) rax=0000000000000000 rbx=ffff828d5e50d0d8 rcx=ffff828d5e50d040 rdx=ffefc68fc53294e0 rsi=ffefc68fc53294e0 rdi=ffff828d5e50d360 rip=fffff80753039c37 rsp=ffffe809d6d37730 rbp=0000000000000008 r8=ffffe809d6d37778 r9=0000000000000000 r10=7ffffffffffffffc r11=ffffe809d6d377b0 r12=ffff828d5e582c00 r13=0000000000000000 r14=ffff828d56ee0c40 r15=0000000000000001 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!ExAcquirePushLockExclusiveEx+0x107: fffff807`53039c37 f0480fba2e00 lock bts qword ptr [rsi],0 ds:002b:ffefc68f`c53294e0=???????????????? Resetting default scope BUGCHECK_STR: 0x3B_c0000005 CPU_COUNT: 4 CPU_MHZ: c78 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 5e CPU_STEPPING: 3 CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: C6'00000000 (cache) C6'00000000 (init) BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: taskhostw.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-09-2020 18:31:51.0702 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff80753609e3c to fffff80753039c37 STACK_TEXT: ffffe809`d6d37730 fffff807`53609e3c : ffefc68f`c53294f0 ffff828d`00000000 ffff828d`00000000 00000000`00000000 : nt!ExAcquirePushLockExclusiveEx+0x107 ffffe809`d6d37770 fffff807`535c2e71 : ffffffff`00000000 ffff828d`00000000 ffff828d`5e582d48 ffff828d`5e582c60 : nt!AlpcpLockForCachedReferenceBlob+0x14 ffffe809`d6d377b0 fffff807`535c222e : ffff828d`5e582c60 ffffe809`d6d37939 ffff828d`5e582c30 ffffe809`d6d37939 : nt!AlpcpSendCloseMessage+0x75 ffffe809`d6d37820 fffff807`535ec408 : ffff828d`5e582c30 00000000`00000000 ffff828d`00000000 ffff828d`5e582c30 : nt!AlpcpClosePort+0x5e ffffe809`d6d37850 fffff807`535f174e : 00000000`00000158 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x278 ffffe809`d6d37990 fffff807`531d2d15 : ffff828d`5e50d040 ffffe809`d6d37a80 ffffe809`d6d37a80 00000000`80210003 : nt!NtClose+0xde ffffe809`d6d37a00 00007ffd`4215c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000036`6e27f908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`4215c2a4 THREAD_SHA1_HASH_MOD_FUNC: 08287c524a254241f76f464ddb0612ad5398d34a THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ef28ee6ae7ff87b4579814537eb349a8ed406ba7 THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6 FOLLOWUP_IP: nt!ExAcquirePushLockExclusiveEx+107 fffff807`53039c37 f0480fba2e00 lock bts qword ptr [rsi],0 FAULT_INSTR_CODE: ba0f48f0 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+107 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0 IMAGE_VERSION: 10.0.18362.592 STACK_COMMAND: .cxr 0xffffe809d6d36d40 ; kb BUCKET_ID_FUNC_OFFSET: 107 FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx BUCKET_ID: 0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx TARGET_TIME: 2020-02-09T14:23:57.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: b47e ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!exacquirepushlockexclusiveex FAILURE_ID_HASH: {4fe31d77-fb81-4dc1-5992-c924ac6e709a} Followup: MachineOwner ---------
Evet, dediklerini tam olarak yaptım. "sfc/ scannow" da herhangi bir hata almadım 'did not find any integrity violations' yazısını gösterdi.Yok, sadece DDU ile kaldır, tekrar kur.
Tamamdır teşekkürler. Bir de bu tarz hatalara CCleaner vb. gibi uygulamaların bir etkisi var mıdır? Kayıt defteri temizleme özelliğini falan baya bi kullanıyorumda zararı olur mu?Tekrar mavi ekran alırsan dosyası ile birlikte paylaş.
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffba8c4b756f10, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffba8c4b756e68, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: MSI
SYSTEM_PRODUCT_NAME: MS-7978
SYSTEM_SKU: Default string
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: B.C0
BIOS_DATE: 07/05/2018
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: B150 GAMING M3 (MS-7978)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffffba8c4b756f10
BUGCHECK_P3: ffffba8c4b756e68
BUGCHECK_P4: 0
TRAP_FRAME: ffffba8c4b756f10 -- (.trap 0xffffba8c4b756f10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc98d717d6248 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc98d71c95dd8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8027bcad5ed rsp=ffffba8c4b7570a0 rbp=ffff8009eb68c000
r8=0000000001005000 r9=00000000ffffffff r10=fffff80264435470
r11=0000000000000325 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+0x2c71d:
fffff802`7bcad5ed cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffba8c4b756e68 -- (.exr 0xffffba8c4b756e68)
ExceptionAddress: fffff8027bcad5ed (dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+0x000000000002c71d)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 4
CPU_MHZ: c78
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: C6'00000000 (cache) C6'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: LogonUI.exe
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-26-2020 21:20:23.0557
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff802645d33e9 to fffff802645c1510
STACK_TEXT:
ffffba8c`4b756be8 fffff802`645d33e9 : 00000000`00000139 00000000`00000003 ffffba8c`4b756f10 ffffba8c`4b756e68 : nt!KeBugCheckEx
ffffba8c`4b756bf0 fffff802`645d3810 : 00000000`00000103 00000000`00000001 00000000`fffffffd 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffba8c`4b756d30 fffff802`645d1ba5 : fffff802`60408000 ffffc98d`7212a120 ffffc98d`729982d8 ffffc98d`729982d8 : nt!KiFastFailDispatch+0xd0
ffffba8c`4b756f10 fffff802`7bcad5ed : ffff8009`ed9ad490 ffff8009`00000000 ffffc98d`717d6210 ffffc98d`71c95cb0 : nt!KiRaiseSecurityCheckFailure+0x325
ffffba8c`4b7570a0 fffff802`7bc8141c : ffff8009`ee115b10 00000000`00000001 ffffc98d`71c95cb0 ffffc98d`71c95cb0 : dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+0x2c71d
ffffba8c`4b7570d0 fffff802`7bc7036b : 00000000`00000083 00000000`00000000 ffff8009`00000000 ffffba8c`4b7573c3 : dxgmms2!VIDMM_GLOBAL::CloseOneAllocation+0x21c
ffffba8c`4b757220 fffff802`7bc935e1 : ffffc98d`7245e6b0 fffff802`7bc703c4 ffffc98d`721c7550 00000000`00000083 : dxgmms2!VIDMM_PAGE_TABLE::DestroyPageTable+0x7f
ffffba8c`4b7572a0 fffff802`7bc93552 : 00000000`00000106 00000000`00010600 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::DestroyPdePageTableData+0x49
ffffba8c`4b7572d0 fffff802`7bc7f03a : 00000000`00000000 00000000`00000000 00000000`00000000 ffffba8c`4b757560 : dxgmms2!VIDMM_PAGE_DIRECTORY::HandleFullPageTableCoverage+0x96
ffffba8c`4b757330 fffff802`7bc7e08c : ffffc98d`721c7550 ffffc98d`72124400 ffffba8c`4b757560 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0xeca
ffffba8c`4b7574d0 fffff802`7bc7317f : 00000000`00000000 00000000`00000000 ffffc98d`72124400 ffffc98d`71679480 : dxgmms2!CVirtualAddressAllocator::UncommitVirtualAddressRange+0x10c
ffffba8c`4b757600 fffff802`7bc73119 : 00000000`00000000 ffffc98d`71679480 ffffc98d`71679401 ffffc98d`729565b0 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRangeSystemCommand+0x3b
ffffba8c`4b757630 fffff802`7bc7be27 : ffffc98d`71679498 ffffc98d`729565b0 ffffc98d`71679498 ffff8009`ee114810 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRange+0x6d
ffffba8c`4b7576c0 fffff802`7bc7b890 : 00000000`00000000 ffffba8c`4b757870 ffff8009`eb68c000 00000000`00000001 : dxgmms2!CVirtualAddressAllocator::FreeAllocMappedVaRangeList+0x117
ffffba8c`4b757770 fffff802`7bc981a7 : ffffc98d`6e00c510 fffff802`00000000 00000000`00000001 ffffc98d`6e00c570 : dxgmms2!VIDMM_GLOBAL::ProcessSystemCommand+0xf0
ffffba8c`4b7578e0 fffff802`7bc96ee9 : ffffc98d`6e00c510 ffffe181`a9691101 ffff8009`eb61c600 00000000`00000100 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x12a7
ffffba8c`4b757ae0 fffff802`6452a7b5 : ffff8009`eb61c680 fffff802`7bc96ee0 ffffc98d`6e00c510 000024ef`bd9bbfff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffba8c`4b757b10 fffff802`645c8b5a : ffffe181`a9680180 ffff8009`eb61c680 fffff802`6452a760 455275c0`8500000b : nt!PspSystemThreadStartup+0x55
ffffba8c`4b757b60 00000000`00000000 : ffffba8c`4b758000 ffffba8c`4b751000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: 07138b927afd5815e1aca4406d5146ef276b3ad0
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8cf0e6a2c6f1c1a2552fae1a4c4714c68b69cb8b
THREAD_SHA1_HASH_MOD: 14914db7342ad42db0d5026fc42fca92a942ebd9
FOLLOWUP_IP:
dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+2c71d
fffff802`7bcad5ed cd29 int 29h
FAULT_INSTR_CODE: 48cc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+2c71d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.449
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2c71d
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation
TARGET_TIME: 2020-02-20T13:28:11.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2cf1
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_dxgmms2!vidmm_global::closelocalallocation
FAILURE_ID_HASH: {e1c37518-8534-579d-dba4-630a870df059}
Followup: MachineOwner
---------