Çözüldü BSOD (mavi ekran) ve çökme sorununun kaynağını bulma

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

Kutay Yağcı

Kilopat
Katılım
27 Nisan 2015
Mesajlar
57
Yer
Ankara
Daha fazla  
Cinsiyet
Erkek
Arkadaşlar merhaba;

Kasım 2019'da bilgisayar topladım ancak aldığımdan beri aralıklarla mavi ekran hataları ile karşılaşıyorum. Kendi bilgimle araştırma yaptım ancak ne yazık ki kaynağını bulamadım. Windows'tan ya da sürücülerden kaynaklanabileceğini düşünerek temiz kurulum yaptım, BIOS güncellemesi yaptırdım ancak hata vermeye devam etti. GPU Benchmark yaptım herhangi bir sorun çıkmadı, CPU stress test yaptım herhangi bir sorunla karşılaşmadım, HDD'den kaynaklı olabilir diğerek HDD'yi inceledim sorun çıkmadı, belki tespit edilemeyen bir sorun vardır diğerek HDD'yi çıkardım sadece SSD kaldı ancak yine mavi ekran ile karşılaştım. RAM sorunu olabilir diğerek Windows Memory diagnostic tool ile test yaptım bir sorun çıkmadı, memtest86 ile test yaptım onda da bir sorun çıkmadı. Sıvı soğutma kullandığım için CPU yüksek sıcaklıklara ulaşmıyor. Zaten CPU'nun yük altında olması ya da olmaması da bir şey değiştirmiyor, bilgisayar boştayken de oluyor oyun oynarken de oluyor. Bilgisayarın donanım bilgisini aşağıda belirttim, onun da altında mavi ekran bilgilerini, onun da altında minidump indirme bağlantısını paylaştım.

Donanım bilgileri;
İşletim sistemi: Windows 10 (sürüm: 1909)
CPU: AMD Ryzen 5 3600X.
GPU: ASUS ROG STRIX GTX 1660 Ti.
Anakart: ASUS Prime X570-P.
RAM: G.Skill ripjawsv DDR4 3200MHz CL16 1.35V 8x2 = 16 GB.
Depolama: Samsung 860 Evo 500GB, Seagate Barracuda 2TB.

Mavi ekran bilgileri;
1- CRITICAL_STRUCTURE_CORRUPTION.
1.1. bugcheckcode 0x109.
(Bu hatayı BIOS güncellemesi yaptıktan sonra RAM'leri de çıkarıp taktıktan sonra almadım, diğerleri aşağıda)

2- SYSTEM_SERVICE_EXCEPTION.
2.1. bugcheckcode = 0x3b.
2.2. bugcheckparameter1 = 0xc0000005.
2.3. bugcheckparameter2 = 0xfffff80644f000de.
2.4. bugcheckparamtere3 = 0xffffbb00d7b24d30.
2.5. bugcheckparameter4 = 0x0.

3- PAGE_FAULT_IN_NONPAGED_AREA.
3.1. bugcheckcode = 0x50.
3.2. bugcheckparameter1 = 0xfffff1891e11247a.
3.3. bugcheckparameter2 = 0x0.
3.4. bugcheckparameter3 = 0xfffff804655000e1.
3.5. bugcheckparameter4 = 0x2.

Minidump indirme bağlantısı;

Elimdeki bilgiler bu şekilde, yardımcı olabilirseniz sevinirim arkadaşlar.
 
Son düzenleyen: Moderatör:
Çözüm
BIOS güncelle.
Kod:
BIOS_VERSION:  0406
BIOS_DATE:  06/15/2019
BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT:  PRIME X570-P
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80644f000de, Address of the instruction which caused the bugcheck
Arg3: ffffbb00d7b24d30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  0406

BIOS_DATE:  06/15/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME X570-P

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80644f000de

BUGCHECK_P3: ffffbb00d7b24d30

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!EtwpAllocateFilter+ea
fffff806`44f000de 483b901284110f  cmp     rdx,qword ptr [rax+0F118412h]

CONTEXT:  ffffbb00d7b24d30 -- (.cxr 0xffffbb00d7b24d30)
rax=0000000000000000 rbx=ffffe3000f7b3d88 rcx=0000000000000006
rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000088
rip=fffff80644f000de rsp=ffffbb00d7b25720 rbp=ffffbb00d7b258c0
r8=ffffbb00d7b258c0  r9=ffffe3000f7b3d28 r10=0000000000000000
r11=0000000000000001 r12=ffffe3000f7b3d00 r13=0000000000000000
r14=0000000000000006 r15=0000000000000088
iopl=0         nv up ei ng nz ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050297
nt!EtwpAllocateFilter+0xea:
fffff806`44f000de 483b901284110f  cmp     rdx,qword ptr [rax+0F118412h] ds:002b:00000000`0f118412=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: ed1

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  WmiPrvSE.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-14-2020 20:29:53.0908

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80644f01013 to fffff80644f000de

STACK_TEXT:
ffffbb00`d7b25720 fffff806`44f01013 : 00000000`00000cc4 ffffe300`0f7b3030 fffff400`058cc460 ffffe300`024c8ad8 : nt!EtwpAllocateFilter+0xea
ffffbb00`d7b25750 fffff806`44dd2e29 : ffffe300`0f7b3d00 ffffbf8d`47cdd000 ffffbf8d`47cdd000 ffffffff`ffffffff : nt!EtwpValidateFilterDescriptors+0x167
ffffbb00`d7b257a0 fffff806`44c78308 : 00000000`00000001 ffffbb00`d7b258e0 ffffbf8d`47cdd000 00000000`00000000 : nt!EtwpValidateEnableNotification+0x15a401
ffffbb00`d7b257e0 fffff806`44c197c4 : 00000000`00000005 00000000`00000011 00000000`00000011 00000000`00000000 : nt!EtwpEnableGuid+0xc0
ffffbb00`d7b259e0 fffff806`447d2e18 : 00000000`00000011 00000189`353566a0 00000000`0000008e 00000189`353566a0 : nt!NtTraceControl+0x414
ffffbb00`d7b25a90 00007ffc`44a3f854 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000033`5567f548 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`44a3f854


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80644f000e0-fffff80644f000e3  4 bytes - nt!EtwpAllocateFilter+ec
    [ d1 75 39 41:90 12 84 11 ]
    fffff80644f000e7 - nt!EtwpAllocateFilter+f3 (+0x07)
    [ b9:99 ]
5 errors : !nt (fffff80644f000e0-fffff80644f000e7)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffffbb00d7b24d30 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

TARGET_TIME:  2020-03-05T15:05:28.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  25d4

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff1891e11247a, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff804655000e1, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys

Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  0406

BIOS_DATE:  06/15/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME X570-P

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: fffff1891e11247a

BUGCHECK_P2: 0

BUGCHECK_P3: fffff804655000e1

BUGCHECK_P4: 2

READ_ADDRESS: fffff804659723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff1891e11247a

FAULTING_IP:
nt!SepMaximumAccessCheck+411
fffff804`655000e1 12841141fc4489  adc     al,byte ptr [rcx+rdx-76BB03BFh]

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: ed1

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-14-2020 20:32:32.0617

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff18994cc2560 -- (.trap 0xfffff18994cc2560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff18994cc27c8 rbx=0000000000000000 rcx=fffff18994cc2838
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804655000e1 rsp=fffff18994cc26f0 rbp=ffff9580feee1060
r8=ffff9580be6c73b4  r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
nt!SepMaximumAccessCheck+0x411:
fffff804`655000e1 12841141fc4489  adc     al,byte ptr [rcx+rdx-76BB03BFh] ds:fffff189`1e11247a=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff804655e31d6 to fffff804655c10a0

STACK_TEXT:
fffff189`94cc22b8 fffff804`655e31d6 : 00000000`00000050 fffff189`1e11247a 00000000`00000000 fffff189`94cc2560 : nt!KeBugCheckEx
fffff189`94cc22c0 fffff804`654730bf : 00000000`00000000 00000000`00000000 00000000`00000000 fffff189`1e11247a : nt!MiSystemFault+0x1d64a6
fffff189`94cc23c0 fffff804`655cf120 : fffff189`94cc25a9 fffff804`6544c1d0 00000000`00000000 fffff189`94cc2a40 : nt!MmAccessFault+0x34f
fffff189`94cc2560 fffff804`655000e1 : ffff9580`be6c7518 fffff804`654b6196 ffff0898`b1f24eea 00000000`0019c1ac : nt!KiPageFault+0x360
fffff189`94cc26f0 fffff804`65472c88 : ffff9580`feee1060 ffff9580`c4bcd540 00000000`0019c100 00000000`00000000 : nt!SepMaximumAccessCheck+0x411
fffff189`94cc27d0 fffff804`65471127 : 00000000`ffffffff fffff189`94cc2a50 ffff9580`be6c7530 00000000`00020000 : nt!SepAccessCheck+0x778
fffff189`94cc2930 fffff804`6546eb21 : 00000000`00000000 fffff189`94cc2c00 ffffc187`74bcda10 00000000`00000001 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x3d7
fffff189`94cc2ae0 fffff804`659e92b9 : ffff9580`be6c73a0 00000000`00000000 ffffc187`59af1390 ffffc187`02000000 : nt!SeAccessCheck+0xd1
fffff189`94cc2b90 fffff804`659ea4a9 : ffffc187`74bcd901 fffff189`94cc2e48 ffffc187`00000040 ffffc187`4ceac4e0 : nt!ObpCreateHandle+0x7e9
fffff189`94cc2dc0 fffff804`659f2e6c : fffff189`00000001 00000000`00000000 ffffbb3d`4474c8a0 ffffc187`4ceac4e0 : nt!ObOpenObjectByNameEx+0x329
fffff189`94cc2f00 ffffbb62`29cc57d8 : 00000000`00000000 fffff189`94cc36d0 00000000`00000001 00000271`cc7e0040 : nt!ObOpenObjectByName+0x5c
fffff189`94cc2f50 00000000`00000000 : fffff189`94cc36d0 00000000`00000001 00000271`cc7e0040 fffff804`02000000 : win32kfull+0xc57d8


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff804655000e0-fffff804655000e3  4 bytes - nt!SepMaximumAccessCheck+410
    [ 1c 8b 01 89:90 12 84 11 ]
4 errors : !nt (fffff804655000e0-fffff804655000e3)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

TARGET_TIME:  2020-02-17T21:30:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  356

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  7e9b

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe70e1c5d8d0e, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8046f1000e1, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffe70e1c5d8d0e

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8046f1000e1

BUGCHECK_P4: 2

READ_ADDRESS: fffff8046ef723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffe70e1c5d8d0e

FAULTING_IP:
nt!MiGenerateSystemImageNames+41
fffff804`6f1000e1 12841166833a5c  adc     al,byte ptr [rcx+rdx+5C3A8366h]

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: ed1

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-14-2020 20:32:35.0253

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffe70dc0230590 -- (.trap 0xffffe70dc0230590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff828183081d34 rbx=0000000000000000 rcx=ffffe70dc02309a8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046f1000e1 rsp=ffffe70dc0230720 rbp=0000000000000000
r8=0000000000000000  r9=ffff828183081d34 r10=ffff828183081cc0
r11=000000000000005d r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
nt!MiGenerateSystemImageNames+0x41:
fffff804`6f1000e1 12841166833a5c  adc     al,byte ptr [rcx+rdx+5C3A8366h] ds:ffffe70e`1c5d8d0e=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8046ebe31d6 to fffff8046ebc10a0

STACK_TEXT:
ffffe70d`c02302e8 fffff804`6ebe31d6 : 00000000`00000050 ffffe70e`1c5d8d0e 00000000`00000000 ffffe70d`c0230590 : nt!KeBugCheckEx
ffffe70d`c02302f0 fffff804`6ea730bf : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe70e`1c5d8d0e : nt!MiSystemFault+0x1d64a6
ffffe70d`c02303f0 fffff804`6ebcf120 : 00000000`00000000 00000000`00000000 ffffffff`80004e88 fffff804`6ea33926 : nt!MmAccessFault+0x34f
ffffe70d`c0230590 fffff804`6f1000e1 : ffff9985`dc015c80 fffff804`00000040 00000000`00000000 00000000`00000003 : nt!KiPageFault+0x360
ffffe70d`c0230720 fffff804`6f0ff85b : ffffe70d`c02309a8 ffffe70d`c0230860 00000000`00000000 fffff804`6ea45e97 : nt!MiGenerateSystemImageNames+0x41
ffffe70d`c0230760 fffff804`6f10e0f6 : ffffe70d`c02309a8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImageEx+0x8f
ffffe70d`c0230910 fffff804`6f10dbd8 : ffffe70d`c0230a50 ffff9985`db88b500 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImage+0x26
ffffe70d`c0230950 fffff804`6f10d8ae : ffff9985`e2359660 00000000`00000000 00000000`00000100 ffff9985`e2359a70 : nt!IopLoadDriver+0x224
ffffe70d`c0230b30 fffff804`6eabd645 : ffff9985`00000000 ffffffff`80004e88 ffff9985`ed5dd040 ffff9985`ed5dd040 : nt!IopLoadUnloadDriver+0x4e
ffffe70d`c0230b70 fffff804`6eb2a715 : ffff9985`ed5dd040 00000000`00000080 ffff9985`db889300 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffe70d`c0230c10 fffff804`6ebc86ea : ffffd201`cee80180 ffff9985`ed5dd040 fffff804`6eb2a6c0 fffff804`6ea37011 : nt!PspSystemThreadStartup+0x55
ffffe70d`c0230c60 00000000`00000000 : ffffe70d`c0231000 ffffe70d`c022b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8046f1000e0-fffff8046f1000e3  4 bytes - nt!MiGenerateSystemImageNames+40
    [ 49 8d 51 fe:90 12 84 11 ]
4 errors : !nt (fffff8046f1000e0-fffff8046f1000e3)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

TARGET_TIME:  2020-02-16T19:15:03.000Z

OSBUILD:  18362

OSSERVICEPACK:  356

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  26f0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
BIOS güncelle.
Kod:
BIOS_VERSION:  0406
BIOS_DATE:  06/15/2019
BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT:  PRIME X570-P
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80644f000de, Address of the instruction which caused the bugcheck
Arg3: ffffbb00d7b24d30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  0406

BIOS_DATE:  06/15/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME X570-P

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80644f000de

BUGCHECK_P3: ffffbb00d7b24d30

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!EtwpAllocateFilter+ea
fffff806`44f000de 483b901284110f  cmp     rdx,qword ptr [rax+0F118412h]

CONTEXT:  ffffbb00d7b24d30 -- (.cxr 0xffffbb00d7b24d30)
rax=0000000000000000 rbx=ffffe3000f7b3d88 rcx=0000000000000006
rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000088
rip=fffff80644f000de rsp=ffffbb00d7b25720 rbp=ffffbb00d7b258c0
r8=ffffbb00d7b258c0  r9=ffffe3000f7b3d28 r10=0000000000000000
r11=0000000000000001 r12=ffffe3000f7b3d00 r13=0000000000000000
r14=0000000000000006 r15=0000000000000088
iopl=0         nv up ei ng nz ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050297
nt!EtwpAllocateFilter+0xea:
fffff806`44f000de 483b901284110f  cmp     rdx,qword ptr [rax+0F118412h] ds:002b:00000000`0f118412=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: ed1

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  WmiPrvSE.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-14-2020 20:29:53.0908

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80644f01013 to fffff80644f000de

STACK_TEXT:
ffffbb00`d7b25720 fffff806`44f01013 : 00000000`00000cc4 ffffe300`0f7b3030 fffff400`058cc460 ffffe300`024c8ad8 : nt!EtwpAllocateFilter+0xea
ffffbb00`d7b25750 fffff806`44dd2e29 : ffffe300`0f7b3d00 ffffbf8d`47cdd000 ffffbf8d`47cdd000 ffffffff`ffffffff : nt!EtwpValidateFilterDescriptors+0x167
ffffbb00`d7b257a0 fffff806`44c78308 : 00000000`00000001 ffffbb00`d7b258e0 ffffbf8d`47cdd000 00000000`00000000 : nt!EtwpValidateEnableNotification+0x15a401
ffffbb00`d7b257e0 fffff806`44c197c4 : 00000000`00000005 00000000`00000011 00000000`00000011 00000000`00000000 : nt!EtwpEnableGuid+0xc0
ffffbb00`d7b259e0 fffff806`447d2e18 : 00000000`00000011 00000189`353566a0 00000000`0000008e 00000189`353566a0 : nt!NtTraceControl+0x414
ffffbb00`d7b25a90 00007ffc`44a3f854 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000033`5567f548 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`44a3f854


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80644f000e0-fffff80644f000e3  4 bytes - nt!EtwpAllocateFilter+ec
    [ d1 75 39 41:90 12 84 11 ]
    fffff80644f000e7 - nt!EtwpAllocateFilter+f3 (+0x07)
    [ b9:99 ]
5 errors : !nt (fffff80644f000e0-fffff80644f000e7)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffffbb00d7b24d30 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

TARGET_TIME:  2020-03-05T15:05:28.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  25d4

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff1891e11247a, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff804655000e1, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys

Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  0406

BIOS_DATE:  06/15/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME X570-P

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: fffff1891e11247a

BUGCHECK_P2: 0

BUGCHECK_P3: fffff804655000e1

BUGCHECK_P4: 2

READ_ADDRESS: fffff804659723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff1891e11247a

FAULTING_IP:
nt!SepMaximumAccessCheck+411
fffff804`655000e1 12841141fc4489  adc     al,byte ptr [rcx+rdx-76BB03BFh]

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: ed1

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-14-2020 20:32:32.0617

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff18994cc2560 -- (.trap 0xfffff18994cc2560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff18994cc27c8 rbx=0000000000000000 rcx=fffff18994cc2838
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804655000e1 rsp=fffff18994cc26f0 rbp=ffff9580feee1060
r8=ffff9580be6c73b4  r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
nt!SepMaximumAccessCheck+0x411:
fffff804`655000e1 12841141fc4489  adc     al,byte ptr [rcx+rdx-76BB03BFh] ds:fffff189`1e11247a=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff804655e31d6 to fffff804655c10a0

STACK_TEXT:
fffff189`94cc22b8 fffff804`655e31d6 : 00000000`00000050 fffff189`1e11247a 00000000`00000000 fffff189`94cc2560 : nt!KeBugCheckEx
fffff189`94cc22c0 fffff804`654730bf : 00000000`00000000 00000000`00000000 00000000`00000000 fffff189`1e11247a : nt!MiSystemFault+0x1d64a6
fffff189`94cc23c0 fffff804`655cf120 : fffff189`94cc25a9 fffff804`6544c1d0 00000000`00000000 fffff189`94cc2a40 : nt!MmAccessFault+0x34f
fffff189`94cc2560 fffff804`655000e1 : ffff9580`be6c7518 fffff804`654b6196 ffff0898`b1f24eea 00000000`0019c1ac : nt!KiPageFault+0x360
fffff189`94cc26f0 fffff804`65472c88 : ffff9580`feee1060 ffff9580`c4bcd540 00000000`0019c100 00000000`00000000 : nt!SepMaximumAccessCheck+0x411
fffff189`94cc27d0 fffff804`65471127 : 00000000`ffffffff fffff189`94cc2a50 ffff9580`be6c7530 00000000`00020000 : nt!SepAccessCheck+0x778
fffff189`94cc2930 fffff804`6546eb21 : 00000000`00000000 fffff189`94cc2c00 ffffc187`74bcda10 00000000`00000001 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x3d7
fffff189`94cc2ae0 fffff804`659e92b9 : ffff9580`be6c73a0 00000000`00000000 ffffc187`59af1390 ffffc187`02000000 : nt!SeAccessCheck+0xd1
fffff189`94cc2b90 fffff804`659ea4a9 : ffffc187`74bcd901 fffff189`94cc2e48 ffffc187`00000040 ffffc187`4ceac4e0 : nt!ObpCreateHandle+0x7e9
fffff189`94cc2dc0 fffff804`659f2e6c : fffff189`00000001 00000000`00000000 ffffbb3d`4474c8a0 ffffc187`4ceac4e0 : nt!ObOpenObjectByNameEx+0x329
fffff189`94cc2f00 ffffbb62`29cc57d8 : 00000000`00000000 fffff189`94cc36d0 00000000`00000001 00000271`cc7e0040 : nt!ObOpenObjectByName+0x5c
fffff189`94cc2f50 00000000`00000000 : fffff189`94cc36d0 00000000`00000001 00000271`cc7e0040 fffff804`02000000 : win32kfull+0xc57d8


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff804655000e0-fffff804655000e3  4 bytes - nt!SepMaximumAccessCheck+410
    [ 1c 8b 01 89:90 12 84 11 ]
4 errors : !nt (fffff804655000e0-fffff804655000e3)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

TARGET_TIME:  2020-02-17T21:30:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  356

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  7e9b

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe70e1c5d8d0e, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8046f1000e1, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffe70e1c5d8d0e

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8046f1000e1

BUGCHECK_P4: 2

READ_ADDRESS: fffff8046ef723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffe70e1c5d8d0e

FAULTING_IP:
nt!MiGenerateSystemImageNames+41
fffff804`6f1000e1 12841166833a5c  adc     al,byte ptr [rcx+rdx+5C3A8366h]

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: ed1

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-14-2020 20:32:35.0253

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffe70dc0230590 -- (.trap 0xffffe70dc0230590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff828183081d34 rbx=0000000000000000 rcx=ffffe70dc02309a8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046f1000e1 rsp=ffffe70dc0230720 rbp=0000000000000000
r8=0000000000000000  r9=ffff828183081d34 r10=ffff828183081cc0
r11=000000000000005d r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
nt!MiGenerateSystemImageNames+0x41:
fffff804`6f1000e1 12841166833a5c  adc     al,byte ptr [rcx+rdx+5C3A8366h] ds:ffffe70e`1c5d8d0e=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8046ebe31d6 to fffff8046ebc10a0

STACK_TEXT:
ffffe70d`c02302e8 fffff804`6ebe31d6 : 00000000`00000050 ffffe70e`1c5d8d0e 00000000`00000000 ffffe70d`c0230590 : nt!KeBugCheckEx
ffffe70d`c02302f0 fffff804`6ea730bf : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe70e`1c5d8d0e : nt!MiSystemFault+0x1d64a6
ffffe70d`c02303f0 fffff804`6ebcf120 : 00000000`00000000 00000000`00000000 ffffffff`80004e88 fffff804`6ea33926 : nt!MmAccessFault+0x34f
ffffe70d`c0230590 fffff804`6f1000e1 : ffff9985`dc015c80 fffff804`00000040 00000000`00000000 00000000`00000003 : nt!KiPageFault+0x360
ffffe70d`c0230720 fffff804`6f0ff85b : ffffe70d`c02309a8 ffffe70d`c0230860 00000000`00000000 fffff804`6ea45e97 : nt!MiGenerateSystemImageNames+0x41
ffffe70d`c0230760 fffff804`6f10e0f6 : ffffe70d`c02309a8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImageEx+0x8f
ffffe70d`c0230910 fffff804`6f10dbd8 : ffffe70d`c0230a50 ffff9985`db88b500 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImage+0x26
ffffe70d`c0230950 fffff804`6f10d8ae : ffff9985`e2359660 00000000`00000000 00000000`00000100 ffff9985`e2359a70 : nt!IopLoadDriver+0x224
ffffe70d`c0230b30 fffff804`6eabd645 : ffff9985`00000000 ffffffff`80004e88 ffff9985`ed5dd040 ffff9985`ed5dd040 : nt!IopLoadUnloadDriver+0x4e
ffffe70d`c0230b70 fffff804`6eb2a715 : ffff9985`ed5dd040 00000000`00000080 ffff9985`db889300 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffe70d`c0230c10 fffff804`6ebc86ea : ffffd201`cee80180 ffff9985`ed5dd040 fffff804`6eb2a6c0 fffff804`6ea37011 : nt!PspSystemThreadStartup+0x55
ffffe70d`c0230c60 00000000`00000000 : ffffe70d`c0231000 ffffe70d`c022b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8046f1000e0-fffff8046f1000e3  4 bytes - nt!MiGenerateSystemImageNames+40
    [ 49 8d 51 fe:90 12 84 11 ]
4 errors : !nt (fffff8046f1000e0-fffff8046f1000e3)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

TARGET_TIME:  2020-02-16T19:15:03.000Z

OSBUILD:  18362

OSSERVICEPACK:  356

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  26f0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
 
Çözüm
BIOS güncelle.
Kod:
BIOS_VERSION:  0406
BIOS_DATE:  06/15/2019
BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT:  PRIME X570-P
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80644f000de, Address of the instruction which caused the bugcheck
Arg3: ffffbb00d7b24d30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  0406

BIOS_DATE:  06/15/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME X570-P

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80644f000de

BUGCHECK_P3: ffffbb00d7b24d30

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!EtwpAllocateFilter+ea
fffff806`44f000de 483b901284110f  cmp     rdx,qword ptr [rax+0F118412h]

CONTEXT:  ffffbb00d7b24d30 -- (.cxr 0xffffbb00d7b24d30)
rax=0000000000000000 rbx=ffffe3000f7b3d88 rcx=0000000000000006
rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000088
rip=fffff80644f000de rsp=ffffbb00d7b25720 rbp=ffffbb00d7b258c0
r8=ffffbb00d7b258c0  r9=ffffe3000f7b3d28 r10=0000000000000000
r11=0000000000000001 r12=ffffe3000f7b3d00 r13=0000000000000000
r14=0000000000000006 r15=0000000000000088
iopl=0         nv up ei ng nz ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050297
nt!EtwpAllocateFilter+0xea:
fffff806`44f000de 483b901284110f  cmp     rdx,qword ptr [rax+0F118412h] ds:002b:00000000`0f118412=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: ed1

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  WmiPrvSE.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-14-2020 20:29:53.0908

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80644f01013 to fffff80644f000de

STACK_TEXT:
ffffbb00`d7b25720 fffff806`44f01013 : 00000000`00000cc4 ffffe300`0f7b3030 fffff400`058cc460 ffffe300`024c8ad8 : nt!EtwpAllocateFilter+0xea
ffffbb00`d7b25750 fffff806`44dd2e29 : ffffe300`0f7b3d00 ffffbf8d`47cdd000 ffffbf8d`47cdd000 ffffffff`ffffffff : nt!EtwpValidateFilterDescriptors+0x167
ffffbb00`d7b257a0 fffff806`44c78308 : 00000000`00000001 ffffbb00`d7b258e0 ffffbf8d`47cdd000 00000000`00000000 : nt!EtwpValidateEnableNotification+0x15a401
ffffbb00`d7b257e0 fffff806`44c197c4 : 00000000`00000005 00000000`00000011 00000000`00000011 00000000`00000000 : nt!EtwpEnableGuid+0xc0
ffffbb00`d7b259e0 fffff806`447d2e18 : 00000000`00000011 00000189`353566a0 00000000`0000008e 00000189`353566a0 : nt!NtTraceControl+0x414
ffffbb00`d7b25a90 00007ffc`44a3f854 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000033`5567f548 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`44a3f854


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80644f000e0-fffff80644f000e3  4 bytes - nt!EtwpAllocateFilter+ec
    [ d1 75 39 41:90 12 84 11 ]
    fffff80644f000e7 - nt!EtwpAllocateFilter+f3 (+0x07)
    [ b9:99 ]
5 errors : !nt (fffff80644f000e0-fffff80644f000e7)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffffbb00d7b24d30 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

TARGET_TIME:  2020-03-05T15:05:28.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  25d4

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff1891e11247a, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff804655000e1, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys

Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  0406

BIOS_DATE:  06/15/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME X570-P

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: fffff1891e11247a

BUGCHECK_P2: 0

BUGCHECK_P3: fffff804655000e1

BUGCHECK_P4: 2

READ_ADDRESS: fffff804659723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff1891e11247a

FAULTING_IP:
nt!SepMaximumAccessCheck+411
fffff804`655000e1 12841141fc4489  adc     al,byte ptr [rcx+rdx-76BB03BFh]

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: ed1

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-14-2020 20:32:32.0617

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff18994cc2560 -- (.trap 0xfffff18994cc2560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff18994cc27c8 rbx=0000000000000000 rcx=fffff18994cc2838
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804655000e1 rsp=fffff18994cc26f0 rbp=ffff9580feee1060
r8=ffff9580be6c73b4  r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
nt!SepMaximumAccessCheck+0x411:
fffff804`655000e1 12841141fc4489  adc     al,byte ptr [rcx+rdx-76BB03BFh] ds:fffff189`1e11247a=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff804655e31d6 to fffff804655c10a0

STACK_TEXT:
fffff189`94cc22b8 fffff804`655e31d6 : 00000000`00000050 fffff189`1e11247a 00000000`00000000 fffff189`94cc2560 : nt!KeBugCheckEx
fffff189`94cc22c0 fffff804`654730bf : 00000000`00000000 00000000`00000000 00000000`00000000 fffff189`1e11247a : nt!MiSystemFault+0x1d64a6
fffff189`94cc23c0 fffff804`655cf120 : fffff189`94cc25a9 fffff804`6544c1d0 00000000`00000000 fffff189`94cc2a40 : nt!MmAccessFault+0x34f
fffff189`94cc2560 fffff804`655000e1 : ffff9580`be6c7518 fffff804`654b6196 ffff0898`b1f24eea 00000000`0019c1ac : nt!KiPageFault+0x360
fffff189`94cc26f0 fffff804`65472c88 : ffff9580`feee1060 ffff9580`c4bcd540 00000000`0019c100 00000000`00000000 : nt!SepMaximumAccessCheck+0x411
fffff189`94cc27d0 fffff804`65471127 : 00000000`ffffffff fffff189`94cc2a50 ffff9580`be6c7530 00000000`00020000 : nt!SepAccessCheck+0x778
fffff189`94cc2930 fffff804`6546eb21 : 00000000`00000000 fffff189`94cc2c00 ffffc187`74bcda10 00000000`00000001 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x3d7
fffff189`94cc2ae0 fffff804`659e92b9 : ffff9580`be6c73a0 00000000`00000000 ffffc187`59af1390 ffffc187`02000000 : nt!SeAccessCheck+0xd1
fffff189`94cc2b90 fffff804`659ea4a9 : ffffc187`74bcd901 fffff189`94cc2e48 ffffc187`00000040 ffffc187`4ceac4e0 : nt!ObpCreateHandle+0x7e9
fffff189`94cc2dc0 fffff804`659f2e6c : fffff189`00000001 00000000`00000000 ffffbb3d`4474c8a0 ffffc187`4ceac4e0 : nt!ObOpenObjectByNameEx+0x329
fffff189`94cc2f00 ffffbb62`29cc57d8 : 00000000`00000000 fffff189`94cc36d0 00000000`00000001 00000271`cc7e0040 : nt!ObOpenObjectByName+0x5c
fffff189`94cc2f50 00000000`00000000 : fffff189`94cc36d0 00000000`00000001 00000271`cc7e0040 fffff804`02000000 : win32kfull+0xc57d8


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff804655000e0-fffff804655000e3  4 bytes - nt!SepMaximumAccessCheck+410
    [ 1c 8b 01 89:90 12 84 11 ]
4 errors : !nt (fffff804655000e0-fffff804655000e3)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

TARGET_TIME:  2020-02-17T21:30:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  356

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  7e9b

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe70e1c5d8d0e, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8046f1000e1, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffe70e1c5d8d0e

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8046f1000e1

BUGCHECK_P4: 2

READ_ADDRESS: fffff8046ef723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffe70e1c5d8d0e

FAULTING_IP:
nt!MiGenerateSystemImageNames+41
fffff804`6f1000e1 12841166833a5c  adc     al,byte ptr [rcx+rdx+5C3A8366h]

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: ed1

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-14-2020 20:32:35.0253

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffe70dc0230590 -- (.trap 0xffffe70dc0230590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff828183081d34 rbx=0000000000000000 rcx=ffffe70dc02309a8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046f1000e1 rsp=ffffe70dc0230720 rbp=0000000000000000
r8=0000000000000000  r9=ffff828183081d34 r10=ffff828183081cc0
r11=000000000000005d r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
nt!MiGenerateSystemImageNames+0x41:
fffff804`6f1000e1 12841166833a5c  adc     al,byte ptr [rcx+rdx+5C3A8366h] ds:ffffe70e`1c5d8d0e=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8046ebe31d6 to fffff8046ebc10a0

STACK_TEXT:
ffffe70d`c02302e8 fffff804`6ebe31d6 : 00000000`00000050 ffffe70e`1c5d8d0e 00000000`00000000 ffffe70d`c0230590 : nt!KeBugCheckEx
ffffe70d`c02302f0 fffff804`6ea730bf : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe70e`1c5d8d0e : nt!MiSystemFault+0x1d64a6
ffffe70d`c02303f0 fffff804`6ebcf120 : 00000000`00000000 00000000`00000000 ffffffff`80004e88 fffff804`6ea33926 : nt!MmAccessFault+0x34f
ffffe70d`c0230590 fffff804`6f1000e1 : ffff9985`dc015c80 fffff804`00000040 00000000`00000000 00000000`00000003 : nt!KiPageFault+0x360
ffffe70d`c0230720 fffff804`6f0ff85b : ffffe70d`c02309a8 ffffe70d`c0230860 00000000`00000000 fffff804`6ea45e97 : nt!MiGenerateSystemImageNames+0x41
ffffe70d`c0230760 fffff804`6f10e0f6 : ffffe70d`c02309a8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImageEx+0x8f
ffffe70d`c0230910 fffff804`6f10dbd8 : ffffe70d`c0230a50 ffff9985`db88b500 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImage+0x26
ffffe70d`c0230950 fffff804`6f10d8ae : ffff9985`e2359660 00000000`00000000 00000000`00000100 ffff9985`e2359a70 : nt!IopLoadDriver+0x224
ffffe70d`c0230b30 fffff804`6eabd645 : ffff9985`00000000 ffffffff`80004e88 ffff9985`ed5dd040 ffff9985`ed5dd040 : nt!IopLoadUnloadDriver+0x4e
ffffe70d`c0230b70 fffff804`6eb2a715 : ffff9985`ed5dd040 00000000`00000080 ffff9985`db889300 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffe70d`c0230c10 fffff804`6ebc86ea : ffffd201`cee80180 ffff9985`ed5dd040 fffff804`6eb2a6c0 fffff804`6ea37011 : nt!PspSystemThreadStartup+0x55
ffffe70d`c0230c60 00000000`00000000 : ffffe70d`c0231000 ffffe70d`c022b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8046f1000e0-fffff8046f1000e3  4 bytes - nt!MiGenerateSystemImageNames+40
    [ 49 8d 51 fe:90 12 84 11 ]
4 errors : !nt (fffff8046f1000e0-fffff8046f1000e3)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

TARGET_TIME:  2020-02-16T19:15:03.000Z

OSBUILD:  18362

OSSERVICEPACK:  356

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  26f0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
Güncelledim, şimdilik bir sorun ile karşılaşmadım, teşekkürler.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı