APC_INDEX_MISMATCH mavi ekran hatası

Juppe Calden

Kilopat
Katılım
12 Eylül 2013
Mesajlar
40
Daha fazla  
Meslek
İnşaat Mühendisi
Merhaba,

Donanımsal olduğunu düşündüğüm mavi ekran hataları alıyorum. Başka ekran kartı ve RAM deneme şansım oldu ve sorun devam ediyordu. Başka işlemci ve anakart deneyemedim. Sorunun hangi parçada olabileceği konusunda yardımcı olabilir misiniz?

Minidump dosyalarına aşağıdan ulaşabilirsiniz.

 
Dosyayı herkese açık olarak paylaşmamışsınız.
 
Düzelttim. Tekrar deneyebilir misiniz ?

Yazılımsal olduğunu düşünmememin sebebi onlarca defa format atmış olmam. Hiçbir şey yüklemememe rağmen mavi ekran vermesi. Yanlış mı format atıyorum diye bilgisayarcıya dahi format attırdım.

İşlemci stres testi yaptığımda çekirdekler fatal error veriyor. İşlemci voltajlarından olabilir mi ?
 
İşlemci ile alakalı bir sorun göremedim. Disk ile ilgili gibi duruyor.

HD Tune Pro ile tüm disklere Quick Scan kapalı olacak şekilde Bad Sector testi gerçekleştirip, sonuçlara ek olarak Health sekmelerini paylaşır mısınız?

Ek olarak aşağıdaki rehberleri gerçekleştirip, varsa windows güncelleştirmelerini yapın.
 
Tarama sonuçları. Scf ve DISM rehberlerindeki adımları da gerçekleştirdim.
Sorun hala devam etmekte. Chrome'da (veya diğer tarayıcılarda tarayıcı fark etmiyor) çökme oldu gene. 5-6 defa olduğunda mavi ekrana çevirecek.

1652476058997.png


1652473855523.png
 
İşlemci veya RAM sorunu. İlk iş Memtest ile test edin:


Kod:
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ff98122ce04, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffc108ca1a3b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16472

    Key  : Analysis.Init.CPU.mSec
    Value: 109

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11251

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051322-6859-01.dmp

BUGCHECK_CODE:  1

BUGCHECK_P1: 7ff98122ce04

BUGCHECK_P2: 0

BUGCHECK_P3: 1

BUGCHECK_P4: ffffc108ca1a3b80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

STACK_TEXT: 
ffffc108`ca1a3948 fffff800`74409c69     : 00000000`00000001 00007ff9`8122ce04 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
ffffc108`ca1a3950 fffff800`74409b33     : ffffcb09`54d5f080 00000000`00000000 00000000`00000000 00005aca`01b166a8 : nt!KiBugCheckDispatch+0x69
ffffc108`ca1a3a90 00007ff9`8122ce04     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
000000fb`c41fefa8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8122ce04


SYMBOL_NAME:  nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1706

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1fe

FAILURE_BUCKET_ID:  0x1_SysCallNum_6_nt!KiSystemServiceExitPico

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {86ef4402-c30f-c6ef-f6d3-34a22389d637}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80214eaf74a, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 717

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13509

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10823

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051322-6515-01.dmp

BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80214eaf74a

READ_ADDRESS: fffff802158fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff582b36d8590 -- (.trap 0xfffff582b36d8590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=8000000000000000 rbx=0000000000000000 rcx=000000000000ffff
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80214eaf74a rsp=fffff582b36d8720 rbp=fffff582b36d8920
 r8=000400000043b430  r9=8000000000000117 r10=ffffaf3fffffff78
r11=fffffb800c1b67b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!MiResolveProtoPteFault+0x9ea:
fffff802`14eaf74a 488b12          mov     rdx,qword ptr [rdx] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT: 
fffff582`b36d8448 fffff802`15009c69     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff582`b36d8450 fffff802`15005f69     : ffffc40b`36ea2540 00000000`00000000 ffffd90a`b0a9e6d0 fffff802`14e5049e : nt!KiBugCheckDispatch+0x69
fffff582`b36d8590 fffff802`14eaf74a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000007`ffd4b220 : nt!KiPageFault+0x469
fffff582`b36d8720 fffff802`14ea87a5     : fffff582`b36d8880 00000000`00000000 fffff582`b36d8860 fffff582`b36d8a20 : nt!MiResolveProtoPteFault+0x9ea
fffff582`b36d8820 fffff802`14ea66e9     : 00000000`00000000 00000000`00000100 00000000`c0000016 ffffc40b`3052d208 : nt!MiDispatchFault+0x3d5
fffff582`b36d8960 fffff802`15005e5e     : ffffd90a`b0a9e080 54e32796`20820000 fffff582`00000001 ffffd90a`00000000 : nt!MmAccessFault+0x189
fffff582`b36d8b00 00007ffd`4b25f10c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000023`43ccea58 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`4b25f10c


SYMBOL_NAME:  nt!MiResolveProtoPteFault+9ea

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1706

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  9ea

FAILURE_BUCKET_ID:  AV_nt!MiResolveProtoPteFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2f2238e9-4751-e3c3-543c-b0cdf930b219}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffcf0a506673f0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffcf0a50667348, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kbase.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 687

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 18469

    Key  : Analysis.Init.CPU.mSec
    Value: 92

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13215

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051322-6109-01.dmp

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffcf0a506673f0

BUGCHECK_P3: ffffcf0a50667348

BUGCHECK_P4: 0

TRAP_FRAME:  ffffcf0a506673f0 -- (.trap 0xffffcf0a506673f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8025d9e9095 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff848f48f95080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802587fd60c rsp=ffffcf0a50667580 rbp=ffffcf0a50667790
 r8=ffffa68f371b5410  r9=7ffff80258c48340 r10=fffff80258cdb590
r11=ffffcf0a50667688 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!CmpCallCallBacksEx+0x1eb34c:
fffff802`587fd60c cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffcf0a50667348 -- (.exr 0xffffcf0a50667348)
ExceptionAddress: fffff802587fd60c (nt!CmpCallCallBacksEx+0x00000000001eb34c)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  explorer.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffcf0a`506670c8 fffff802`58409c69     : 00000000`00000139 00000000`00000003 ffffcf0a`506673f0 ffffcf0a`50667348 : nt!KeBugCheckEx
ffffcf0a`506670d0 fffff802`5840a090     : ffffffff`ffffffff 00000000`00000003 00000000`00000000 00000000`00000210 : nt!KiBugCheckDispatch+0x69
ffffcf0a`50667210 fffff802`58408423     : ffffa68f`3c902030 ffffcf0a`00000024 ffffcf0a`506674f0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffcf0a`506673f0 fffff802`587fd60c     : fffff802`58c48350 ffffa68f`00000000 ffffa68f`00000000 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0x323
ffffcf0a`50667580 fffff802`5860f05c     : ffff848f`0000001c ffffcf0a`50667740 ffffcf0a`506676f8 00000000`ffffff01 : nt!CmpCallCallBacksEx+0x1eb34c
ffffcf0a`50667690 fffff802`5861319e     : fffff802`5860ee00 00000000`00000000 ffff848f`48f81010 ffffcf0a`50667900 : nt!CmpParseKey+0x24c
ffffcf0a`50667830 fffff802`586354ea     : ffff848f`48f81000 ffffcf0a`50667a98 ffff848f`00000240 ffff848f`3db5c980 : nt!ObpLookupObjectName+0x3fe
ffffcf0a`50667a00 fffff802`586352cc     : ffffa68f`00000000 00000000`00000000 00000000`00000000 ffff848f`3db5c980 : nt!ObOpenObjectByNameEx+0x1fa
ffffcf0a`50667b30 fffff802`58634df1     : ffffcf0a`50668000 ffffcf0a`50667ea0 00000000`00000000 ffffcf0a`50667f90 : nt!ObOpenObjectByName+0x5c
ffffcf0a`50667b80 fffff802`58634b1f     : 00000000`00000000 ffffa68f`3c1a7870 00000000`00001678 00000000`00000000 : nt!CmOpenKey+0x2c1
ffffcf0a`50667de0 fffff802`584096b8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000f003f : nt!NtOpenKeyEx+0xf
ffffcf0a`50667e20 fffff802`583fbbc0     : fffff802`585e955e 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffffcf0a`50667fb8 fffff802`585e955e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
ffffcf0a`50667fc0 fffff802`585e948e     : 00000000`00000000 ffffffff`800030a4 00000000`00000000 ffffa68f`349711a0 : nt!_RegRtlOpenKeyTransacted+0xba
ffffcf0a`50668060 fffff802`585e5f3d     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SysCtxRegOpenKey+0x3a
ffffcf0a`506680a0 fffff802`585d83c6     : 00000000`00000000 ffffa68f`3c9d6120 ffffcf0a`50668318 ffffa68f`3c9d6120 : nt!_PnpOpenPropertiesKey+0x179
ffffcf0a`506681d0 fffff802`585d82a6     : fffff802`58009f08 ffffcf0a`50668700 00000000`00000000 fffff802`00000000 : nt!_CmGetInterfaceClassMappedPropertyFromRegValue+0xea
ffffcf0a`50668260 fffff802`585d4c76     : 00000000`00000000 ffffcf0a`506683c0 ffffcf0a`50668700 00000000`00000000 : nt!_CmGetInterfaceClassMappedProperty+0xba
ffffcf0a`506682d0 fffff802`5867fd90     : ffffa68f`3484e4f0 00000000`00000400 00000000`c0000016 fffff802`5867e7f3 : nt!_PnpDispatchInterfaceClass+0xa6
ffffcf0a`50668340 fffff802`5867fc12     : ffffcf0a`50668668 00000000`00000400 ffffa68f`3ab44b30 00000000`00000004 : nt!PnpGetMappedPropertyDispatch+0xa4
ffffcf0a`506683d0 fffff802`5867fad4     : ffffcf0a`50668668 ffffcf0a`50668700 ffffcf0a`50668511 ffffa68f`3484e4f0 : nt!_PnpGetObjectPropertyWorker+0xba
ffffcf0a`50668470 fffff802`5867f95d     : ffffcf0a`50668668 00000000`47706e50 00000000`00000000 00000000`00000000 : nt!_PnpGetObjectProperty+0x108
ffffcf0a`50668540 fffff802`585d8649     : 00000000`00000000 00000000`00000000 ffffcf0a`506686d0 00000000`00000000 : nt!PnpGetObjectProperty+0xd1
ffffcf0a`506685d0 fffff802`585d8f42     : fffff802`00000034 00000000`00180016 ffff848f`469dd710 00000000`00000000 : nt!IopGetDeviceInterfaces+0x189
ffffcf0a`506687a0 ffff8067`c88c241c     : 00000000`00000000 00000000`09fae8e0 ffff848f`469dd710 ffff8009`4060c910 : nt!IoGetDeviceInterfaces+0x32
ffffcf0a`506687e0 00000000`00000000     : 00000000`09fae8e0 ffff848f`469dd710 ffff8009`4060c910 ffff8009`45f3c8a0 : win32kbase+0xc241c


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1706

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------

EFERENCE_BY_POINTER (18)
Arguments:
Arg1: ffffba89060b8ae0, Object type of the object whose reference count is being lowered
Arg2: ffffba89122bcb60, Object whose reference count is being lowered
Arg3: 0000000000000001, Reserved
Arg4: 00007ff92cfb6849, Reserved
    The reference count of an object is illegal for the current state of the object.
    Each time a driver uses a pointer to an object the driver calls a kernel routine
    to increment the reference count of the object. When the driver is done with the
    pointer the driver calls another kernel routine to decrement the reference count.
    Drivers must match calls to the increment and decrement routines. This BugCheck
    can occur because an object's reference count goes to zero while there are still
    open handles to the object, in which case the fourth parameter indicates the number
    of opened handles. It may also occur when the object's reference count drops below zero
    whether or not there are open handles to the object, and in that case the fourth parameter
    contains the actual value of the pointer references count.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11715

    Key  : Analysis.Init.CPU.mSec
    Value: 124

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11132

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051322-7468-01.dmp

BUGCHECK_CODE:  18

BUGCHECK_P1: ffffba89060b8ae0

BUGCHECK_P2: ffffba89122bcb60

BUGCHECK_P3: 1

BUGCHECK_P4: 7ff92cfb6849

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  QtWebEngineProcess.exe

STACK_TEXT: 
fffff409`4d7bd468 fffff800`3942ef20     : 00000000`00000018 ffffba89`060b8ae0 ffffba89`122bcb60 00000000`00000001 : nt!KeBugCheckEx
fffff409`4d7bd470 fffff800`39614929     : ffffba89`122bcb30 ffff9601`438fe5e0 00000000`00000000 ffffba89`11abe670 : nt!ObfDereferenceObjectWithTag+0x1de3a0
fffff409`4d7bd4b0 fffff800`396c19e5     : ffffba89`12cf3098 fffff800`39250f39 ffffba89`12cf3060 00000000`00000000 : nt!ObCloseHandleTableEntry+0x6c9
fffff409`4d7bd5f0 fffff800`3970700d     : ffffba89`12cf3060 ffffba89`062d2080 ffffffff`ffffff01 ffffba89`0f65d4d8 : nt!ExSweepHandleTable+0xd5
fffff409`4d7bd6a0 fffff800`396fa8a8     : ffffffff`ffffffff ffffba89`0f65d080 fffff409`4d7bd6f0 fffff800`396509d0 : nt!ObKillProcess+0x35
fffff409`4d7bd6d0 fffff800`395e34de     : ffffba89`0f65d080 ffff9601`3b676910 fffff409`4d7bd920 00000000`00000000 : nt!PspRundownSingleProcess+0x204
fffff409`4d7bd760 fffff800`396d7888     : 00000000`80000003 fffff800`34d74b01 00000081`8baff570 00000081`8b409000 : nt!PspExitThread+0x5f6
fffff409`4d7bd860 fffff800`39257817     : fffff409`4d7bda68 fffff800`39257a60 ffffba89`11d55c80 00000000`00000001 : nt!KiSchedulerApcTerminate+0x38
fffff409`4d7bd8a0 fffff800`393fc300     : 00000000`00000000 fffff409`4d7bd950 00000000`00000000 00000081`00000000 : nt!KiDeliverApc+0x487
fffff409`4d7bd950 fffff800`3940975f     : ffffba89`062d2080 00000081`8baff548 fffff409`4d7bdaa8 00000257`53c39a30 : nt!KiInitiateUserApc+0x70
fffff409`4d7bda90 00007ff9`8a4ace64     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000081`8baff528 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8a4ace64


SYMBOL_NAME:  nt!ObfDereferenceObjectWithTag+1de3a0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1706

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1de3a0

FAILURE_BUCKET_ID:  0x18_CORRUPT_REF_COUNT_nt!ObfDereferenceObjectWithTag

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fa6b3516-71cb-1e92-b987-b8bebd3458ac}

Followup:     MachineOwner
---------
 

Technopat Haberler

Yeni konular

Yeni mesajlar

Geri
Yukarı