Çeşitli Mavi Ekran Hataları

Shokka

Centipat
Katılım
1 Aralık 2019
Mesajlar
3
Yaklaşık 1 ay önce yeni bir sistem topladım. İlk hafta bir sorun yoktu, 2. haftadan itibaren çeşitli mavi ekran hataları ile karşılaşmaya başladım. Oyun oynarken herhangi bir hata ile karşılaşmadım ama sistem boşta iken ve indirme yaparken bu hataları alıyorum. Forumda devamlı olarak konuları takip edip çözüm aradım ve daha önce yapmış olduğunuz tavsiyeleri uyguladım. Bir ara sorun düzelir gibi oldu 3 gün boyunca herhangi bir hata almadım. Fakat son 2-3 gündür yine aynı şekilde hata almaya devam ediyorum. RAM'leri hem Windows RAM tanılama aracı ile hem de Memtest86 ile teste soktum herhangi bir hata bulunamadı. DDU ile ekran kartı sürücüsünü kaldırıp yeniden kurdum ve sorun devam etti. Sistemi formatlayıp (UEFI) temiz kurulum yaptım ama sorun devam ediyor. Sürücüleri devamlı güncel tutuyorum. Bu konu hakkında ne yapabilirim bilmiyorum. Minidump klasörümü, sistem özelliklerini ve memtest86 sonuçlarını paylaşıyorum.

w1.jpg


Anakart: MSI B450 Tomahawk Max
RAM: Patriot Viper RGB 3000MHz CL15
CPU: AMD Ryzen 5 3600
GPU: Sapphire Nitro+ RX 5700 XT
SSD: XPG SX8200 PRO 512 GB + Toshiba OCZ 960 GB TR200

Minidump
Memtest86 sonuçları
 
Son düzenleyen: Moderatör:
BIOS sıfırlayınız düzelmezse BIOS yükseltmesi, en yüksek sürümü kullanıyorsanız bir sürüm aşağıya düşürmeyi deneyebilirsiniz. MSI B450 BIOS'larında bu sıralar bir problem var.
 
AdGuard sorun çıkarmış kaldırın, Chrome güncelleyin, Ayrıca bellek hatası gördüm fakat Memtest86 sonucu temiz çıkmış anakartın slotlarına kitapçığa uygun olarak yerleştirdiniz mi? USB portlarına neler takılı? Overclock, undervolt var mı? BIOS update et.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80576fdc59c, Address of the instruction which caused the bugcheck
Arg3: ffffd98a36e4bdd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7C02

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  3.40

BIOS_DATE:  10/25/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450 TOMAHAWK MAX (MS-7C02)

BASEBOARD_VERSION:  1.0

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80576fdc59c

BUGCHECK_P3: ffffd98a36e4bdd0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObInsertObjectEx+cc
fffff805`76fdc59c f6474208        test    byte ptr [rdi+42h],8

CONTEXT:  ffffd98a36e4bdd0 -- (.cxr 0xffffd98a36e4bdd0)
rax=ffffc98b2f171080 rbx=ffffc98b301655a0 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80576fdc59c rsp=ffffd98a36e4c7c0 rbp=ffffd98a36e4c8c0
r8=0000000000000000  r9=fffff80576a00000 r10=0000000000000000
r11=ffffd98a36e4ca50 r12=ffffc98b2b6ff7c0 r13=ffffc98b2b6ff7f0
r14=000002bab3f80ba0 r15=ffffd98a36e4cac8
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ObInsertObjectEx+0xcc:
fffff805`76fdc59c f6474208        test    byte ptr [rdi+42h],8 ds:002b:00000000`00000042=??
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-01-2019 13:12:44.0491

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff805770bc05f to fffff80576fdc59c

STACK_TEXT:
ffffd98a`36e4c7c0 fffff805`770bc05f : 000002ba`b3f80ba0 ffffd98a`36e4cb80 00000000`00000001 000002ba`b3f80ba0 : nt!ObInsertObjectEx+0xcc
ffffd98a`36e4ca70 fffff805`76bd2d18 : ffffc98b`2f171080 000000f6`e77fee60 ffffc98b`1d6c9c00 ffffc98b`00000000 : nt!NtCreateWaitCompletionPacket+0xbf
ffffd98a`36e4cb00 00007ffc`d5cbd954 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f6`e77fedc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`d5cbd954


THREAD_SHA1_HASH_MOD_FUNC:  724bf577529b5411f8c8a84f3b74712c07109ce7

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a6e0dc93af22046c49afb7b8539a0ace601ace5a

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!ObInsertObjectEx+cc
fffff805`76fdc59c f6474208        test    byte ptr [rdi+42h],8

FAULT_INSTR_CODE:  84247f6

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObInsertObjectEx+cc

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .cxr 0xffffd98a36e4bdd0 ; kb

BUCKET_ID_FUNC_OFFSET:  cc

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObInsertObjectEx

BUCKET_ID:  0x3B_c0000005_nt!ObInsertObjectEx

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ObInsertObjectEx

TARGET_TIME:  2019-11-30T23:10:11.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  1665

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!obinsertobjectex

FAILURE_ID_HASH:  {81e179d5-1423-4bf6-d085-e8f692562c3a}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8031e80e9c1, Address of the instruction which caused the bugcheck
Arg3: ffff8485bdd4cec0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7C02

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  3.40

BIOS_DATE:  10/25/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450 TOMAHAWK MAX (MS-7C02)

BASEBOARD_VERSION:  1.0

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8031e80e9c1

BUGCHECK_P3: ffff8485bdd4cec0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ExpWnfUpdateSubscription+21
fffff803`1e80e9c1 48397818        cmp     qword ptr [rax+18h],rdi

CONTEXT:  ffff8485bdd4cec0 -- (.cxr 0xffff8485bdd4cec0)
rax=0000000000000086 rbx=ffffe10198966648 rcx=ffffe1019a4aaaa0
rdx=ffffe101989576f0 rsi=ffffe10198957740 rdi=ffffe1019a4aaaa0
rip=fffff8031e80e9c1 rsp=ffff8485bdd4d8b0 rbp=ffff8485bdd4d970
r8=0000000000000000  r9=0000000000000000 r10=ffffe10198957748
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=ffff8d82b91aa3a0 r15=ffff8d82b3cde0c0
iopl=0         nv up ei pl nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050213
nt!ExpWnfUpdateSubscription+0x21:
fffff803`1e80e9c1 48397818        cmp     qword ptr [rax+18h],rdi ds:002b:00000000`0000009e=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-01-2019 13:12:40.0662

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8031e80e640 to fffff8031e80e9c1

STACK_TEXT:
ffff8485`bdd4d8b0 fffff803`1e80e640 : ffffffff`ffffffff ffff8485`bdd4d970 ffffe101`98957740 00000000`00000000 : nt!ExpWnfUpdateSubscription+0x21
ffff8485`bdd4d900 fffff803`1e80d5a3 : ffffe101`9a4aaaa0 ffff8d82`b3cde0c0 00000000`00000000 00000000`00000000 : nt!ExpWnfSubscribeNameInstance+0xcc
ffff8485`bdd4d9b0 fffff803`1e80d37b : ffff8485`bdd4db18 00000000`00000000 00000014`88fff450 00000014`ffffffff : nt!ExpWnfSubscribeWnfStateChange+0x1df
ffff8485`bdd4da90 fffff803`1e3d2d18 : ffff8d82`b91aa080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtSubscribeWnfStateChange+0x8b
ffff8485`bdd4db00 00007ffb`16cbf734 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000014`88fff3f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`16cbf734


THREAD_SHA1_HASH_MOD_FUNC:  c7d0a90ba0522d33e45aeaa012da6e1ec1fca33a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  eb5e167b621b28387a34f93b797a19ef982c6dcd

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!ExpWnfUpdateSubscription+21
fffff803`1e80e9c1 48397818        cmp     qword ptr [rax+18h],rdi

FAULT_INSTR_CODE:  18783948

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExpWnfUpdateSubscription+21

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .cxr 0xffff8485bdd4cec0 ; kb

BUCKET_ID_FUNC_OFFSET:  21

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExpWnfUpdateSubscription

BUCKET_ID:  0x3B_c0000005_nt!ExpWnfUpdateSubscription

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ExpWnfUpdateSubscription

TARGET_TIME:  2019-11-30T16:12:05.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  180e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!expwnfupdatesubscription

FAILURE_ID_HASH:  {63fadac6-2209-f083-1198-de28d6c77481}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39ffcd918c8b517, Reserved
Arg2: b3b7095f6b46fdc8, Reserved
Arg3: fffff8071bb11000, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7C02

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  3.40

BIOS_DATE:  10/25/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450 TOMAHAWK MAX (MS-7C02)

BASEBOARD_VERSION:  1.0

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: a39ffcd918c8b517

BUGCHECK_P2: b3b7095f6b46fdc8

BUGCHECK_P3: fffff8071bb11000

BUGCHECK_P4: 1

PG_MISMATCH:  3ECC0DDC

FAULTING_IP:
nt!Ports <PERF> (nt+0x511000)+0
fffff807`1bb11000 1010            adc     byte ptr [rax],dl

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x109

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-01-2019 13:12:36.0572

ANALYSIS_VERSION: 10.0.18362.1 x86fre

STACK_TEXT:
fffff586`a1f30e98 00000000`00000000 : 00000000`00000109 a39ffcd9`18c8b517 b3b7095f`6b46fdc8 fffff807`1bb11000 : nt!KeBugCheckEx


THREAD_SHA1_HASH_MOD_FUNC:  81a83ae0317433a47fcc36991983df3b6e638b71

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6e16edd8c7dd677734fdbcd2397a2e35e9fae964

THREAD_SHA1_HASH_MOD:  76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3

FOLLOWUP_IP:
nt!Ports <PERF> (nt+0x511000)+0
fffff807`1bb11000 1010            adc     byte ptr [rax],dl

FAULT_INSTR_CODE:  1010

SYMBOL_NAME:  nt!Ports <PERF> (nt+0x511000)+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x109_1_nt!Ports__PERF__(nt+0x511000)

BUCKET_ID:  0x109_1_nt!Ports__PERF__(nt+0x511000)

PRIMARY_PROBLEM_CLASS:  0x109_1_nt!Ports__PERF__(nt+0x511000)

TARGET_TIME:  2019-11-30T10:23:56.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  d25

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x109_1_nt!ports__perf__(nt+0x511000)

FAILURE_ID_HASH:  {6f07dceb-751e-bee2-a72d-959161a93c09}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc7075a3b1300, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc7075a3b1258, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for adgnetworktdidrv.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7C02

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  3.40

BIOS_DATE:  10/25/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450 TOMAHAWK MAX (MS-7C02)

BASEBOARD_VERSION:  1.0

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc7075a3b1300

BUGCHECK_P3: ffffc7075a3b1258

BUGCHECK_P4: 0

TRAP_FRAME:  ffffc7075a3b1300 -- (.trap 0xffffc7075a3b1300)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb586c760129a rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb586c76012b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013dbf514b rsp=ffffc7075a3b1490 rbp=ffffc7075a3b1590
r8=ffffb586c7601288  r9=ffffb586c7601298 r10=ffffb586c93fe000
r11=ffffb586c7601040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!RtlpHpLfhSlotAllocate+0x1c190b:
fffff801`3dbf514b cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffc7075a3b1258 -- (.exr 0xffffc7075a3b1258)
ExceptionAddress: fffff8013dbf514b (nt!RtlpHpLfhSlotAllocate+0x00000000001c190b)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  AdguardSvc.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-01-2019 13:12:32.0710

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8013dbd32e9 to fffff8013dbc14e0

STACK_TEXT:
ffffc707`5a3b0fd8 fffff801`3dbd32e9 : 00000000`00000139 00000000`00000003 ffffc707`5a3b1300 ffffc707`5a3b1258 : nt!KeBugCheckEx
ffffc707`5a3b0fe0 fffff801`3dbd3710 : 00000000`00000001 ffffca81`263d9180 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc707`5a3b1120 fffff801`3dbd1aa5 : 00000000`00000000 fffff801`3e01feb3 ffffc707`5a3b15c0 00000000`00000001 : nt!KiFastFailDispatch+0xd0
ffffc707`5a3b1300 fffff801`3dbf514b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00989680 : nt!KiRaiseSecurityCheckFailure+0x325
ffffc707`5a3b1490 fffff801`3da33294 : ffffb586`c7600340 ffffb586`c7601040 ffffb586`c7601280 ffffb586`00000130 : nt!RtlpHpLfhSlotAllocate+0x1c190b
ffffc707`5a3b15f0 fffff801`3dd6f06d : ffffb586`00000000 00000000`00000000 00000000`00000000 00000000`0000011b : nt!ExAllocateHeapPool+0xb94
ffffc707`5a3b1730 fffff801`48ba83c7 : 00000000`00000000 00000000`00000000 00000000`00000010 fffff9e5`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffffc707`5a3b1780 00000000`00000000 : 00000000`00000000 00000000`00000010 fffff9e5`00000000 00000000`00000006 : adgnetworktdidrv+0x83c7


THREAD_SHA1_HASH_MOD_FUNC:  1d4a1ec3ad0af96c55913bb61d0851faad07c009

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  4c4fa919898c3b1a3191fbf269c39e2fe9793265

THREAD_SHA1_HASH_MOD:  fc0fd1c8b1fd561290d1c915d05d4dc50539053b

FOLLOWUP_IP:
adgnetworktdidrv+83c7
fffff801`48ba83c7 ??              ???

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  adgnetworktdidrv+83c7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: adgnetworktdidrv

IMAGE_NAME:  adgnetworktdidrv.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5d52ce4b

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  83c7

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_adgnetworktdidrv!unknown_function

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_adgnetworktdidrv!unknown_function

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_adgnetworktdidrv!unknown_function

TARGET_TIME:  2019-11-29T16:04:51.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  dfa

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_adgnetworktdidrv!unknown_function

FAILURE_ID_HASH:  {09ba5999-f8c9-31c4-c50b-242b67147646}

Followup:     MachineOwner
---------

9: kd> lmvm adgnetworktdidrv
Browse full module list
start             end                 module name
fffff801`48ba0000 fffff801`48bb4000   adgnetworktdidrv T (no symbols)        
    Loaded symbol image file: adgnetworktdidrv.sys
    Image path: adgnetworktdidrv.sys
    Image name: adgnetworktdidrv.sys
    Browse all global symbols  functions  data
    Timestamp:        Tue Aug 13 07:50:51 2019 (5D52CE4B)
    CheckSum:         000175EB
    ImageSize:        00014000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8051a917d4e, Address of the instruction which caused the bugcheck
Arg3: ffffba0458fb7290, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7C02

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  3.40

BIOS_DATE:  10/25/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450 TOMAHAWK MAX (MS-7C02)

BASEBOARD_VERSION:  1.0

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8051a917d4e

BUGCHECK_P3: ffffba0458fb7290

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!RtlFnToFxFrame+8e
fffff805`1a917d4e 8b5c2508        mov     ebx,dword ptr [rbp+8]

CONTEXT:  ffffba0458fb7290 -- (.cxr 0xffffba0458fb7290)
rax=000000000000c000 rbx=000000000000ffff rcx=ffffba0458fb7e4f
rdx=ffffba0458fb826c rsi=ffffba0458fb8570 rdi=000000000000c000
rip=fffff8051a917d4e rsp=ffffba0458fb7c88 rbp=000000000001003f
r8=ffffba0458fb7d50  r9=0000000000000000 r10=0000000000000001
r11=ffffba0458fb7e80 r12=0000000000000023 r13=ffffe5896bfe4080
r14=ffffba0458fb8540 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050297
nt!RtlFnToFxFrame+0x8e:
fffff805`1a917d4e 8b5c2508        mov     ebx,dword ptr [rbp+8] ss:0018:00000000`00010047=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  Adguard.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-01-2019 13:14:20.0723

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8051aec28b5 to fffff8051a917d4e

STACK_TEXT:
ffffba04`58fb7c88 fffff805`1aec28b5 : ffffba04`58fb8250 00000000`00010038 ffffba04`58fb8ac8 ffffba04`58fb8ac0 : nt!RtlFnToFxFrame+0x8e
ffffba04`58fb7c90 fffff805`1aec2634 : 00000000`00000033 ffff2ed3`9721cd48 ffffba04`58fb8250 ffffba04`58fb7d50 : nt!RtlpWow64CtxToAmd64+0xe5
ffffba04`58fb7cc0 fffff805`1aec187f : 0fffffff`fffffff0 ffffba04`58fb8540 00000000`00010040 00000000`0001003f : nt!RtlpWow64SetContextOnAmd64+0x48
ffffba04`58fb7d00 fffff805`1ade8179 : ffffba04`58fb8b00 ffffce00`000074f8 00000000`00e9fc4c ffffce67`33800000 : nt!PspWow64SetContextThread+0x267
ffffba04`58fb8890 fffff805`1a9d2d18 : ffffe589`6bfe4080 00000000`7782dc00 00000000`00000000 ffffe589`68c12460 : nt!NtSetInformationThread+0xb39
ffffba04`58fb8b00 00007ffd`db9fc264 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`00e5e898 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`db9fc264


CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
64 errors : !nt (fffff8051a917140-fffff8051a917ff8)
fffff8051a917140 *50  0f  46  c1  33  d2  8d  71 *f6  03  f0  8b  c6  f7  f1  2b P.F.3..q.......+
fffff8051a917150 *f0  44  39  1d  d0  44  32  00 *61  8b  c3  74  45  42  0f  b6 .D9..D2.a..tEB..
fffff8051a917160 *2c  23  77  b8  1f  85  eb  51 *44  0f  af  c9  83  c1  32  f7 ,#w....QD.....2.
fffff8051a917170 *24  0f  b6  0d  78  d8  32  00  44  8b  c2  33  d2  41  c1  e8 $...x.2.D..3.A..
fffff8051a917180 *11  45  2b  c8  41  8b  c1  f7 *b1  41  8b  c3  44  03  c2  41 .E+.A....A..D..A
fffff8051a917190 *1b  f0  73  0e  b8  40  00  00 *20  41  8b  f0  44  8b  f0  89 ..s..@.. A..D...
fffff8051a9171a0 *68  50  8b  d8  45  85  d2  75  1f  44  38  9f  8b  00  00  00 hP..E..u.D8.....
fffff8051a9171b0 *fd  16  0f  b6  b7  80  00  00 *49  44  8b  f0  41  0f  ba  ee ........ID..A...
...
fffff8051a917300 *15  55  48  8b  12  48  8b  c2 *dd  8b  ca  48  d1  e8  48  23 .UH..H.....H..H#
fffff8051a917310 *f5  48  2b  d0  48  b8  33  33 *73  33  33  33  33  33  48  8b .H+.H.33s33333H.
fffff8051a917320 *c8  48  23  d0  48  c1  e9  02 *3d  23  c8  48  03  ca  48  8b .H#.H...=#.H..H.
fffff8051a917330 *50  48  c1  e8  04  48  03  c1 *d8  b9  0f  0f  0f  0f  0f  0f PH...H..........
...
fffff8051a9173c0 *b7  55  68  4d  8b  cf  41  88 *14  3c  8f  00  00  00  4c  8b .UhM..A..<....L.
fffff8051a9173d0 *76  8b  45  50  48  8b  cf  89 *52  24  28  40  88  74  24  20 v.EPH...R$(@.t$
fffff8051a9173e0 *f8  9b  c4  1e  00  44  8b  55  68  49  ff  c4  48  8b  45  b8 .....D.UhI..H.E.
fffff8051a9173f0 *ab  ff  c2  8b  75  60  48  83 *78  08  48  8b  5d  c0  41  bb ....u`H.x.H.].A.
...
fffff8051a917b80 *cf  cc  cc  cc  cc  cc  cc  cc *8e  cc  cc  cc  cc  cc  cc  cc ................
fffff8051a917b90  48  83  ec  38  48  89  4c  24 *34  4c  8d  44  24  20  48  89 H..8H.L$4L.D$ H.
fffff8051a917ba0 *58  24  28  33  c9  48  8d  15 *fc  5e  ff  ff  41  b9  01  00 X$(3.H...^..A...
fffff8051a917bb0 *4c  00  e8  c5  5b  f4  ff  48 *a4  c4  38  c3  cc  cc  cc  cc L...[..H..8.....
...
fffff8051a917d40 *e0  c1  e3  02  41  ff  c2  41 *81  fa  08  72  c2  48  8b  5c ....A..A...r.H.\
fffff8051a917d50 *25  08  48  8b  7c  24  10  44 *89  49  04  c3  cc  cc  cc  cc %.H.|$.D.I......
fffff8051a917d60  cd  cc  cc  cc  48  89  7c  24 *e9  4c  89  64  24  10  4c  89 ....H.|$.L.d$.L.
fffff8051a917d70  6c  24  18  55  41  56  41  57 *6c  8b  ec  48  83  ec  40  4c l$.UAVAWl..H..@L
fffff8051a917d80 *cb  79  10  33  c0  48  89  45 *a0  4c  8b  e2  48  89  45  e8 .y.3.H.E.L..H.E.
fffff8051a917d90 *6a  89  45  f0  4d  85  ff  0f *a0  36  01  00  00  4d  8b  7f j.E.M....6...M..
fffff8051a917da0 *8d  48  8d  55  e0  48  8d  0d *0c  d2  3d  00  e8  8f  70  f2 .H.U.H....=...p.
fffff8051a917db0 *cf  48  8b  05  68  df  34  00 *cc  8d  2d  61  df  34  00  49 .H..h.4...-a.4.I
...
fffff8051a917f00 *02  83  e0  04  c3  b8  01  00 *70  00  c3  b8  02  00  00  00 ........p.......
fffff8051a917f10 *54  b8  03  00  00  00  c3  cc  cc  cc  cc  cc  cc  cc  cc  cc T...............
fffff8051a917f20  7a  8b  c4  48  89  58  08  48 *df  68  10  48  89  70  20  57 z..H.X.H.h.H.p W
fffff8051a917f30 *4c  83  ec  20  48  8b  3d  b5 *d4  31  00  33  db  48  89  58 L.. H.=..1.3.H.X
...
fffff8051a917fc0 *6f  bd  01  00  00  00  44  0f *ff  49  04  4c  8b  e2  44  0f o.....D..I.L..D.
fffff8051a917fd0 *b5  01  41  8b  d9  0f  bf  71 *14  41  2b  dd  44  0f  bf  71 ..A....q.A+.D..q
fffff8051a917fe0 *3b  8b  f8  44  0f  bf  79  0a *54  8d  50  ff  0f  bf  69  0c ;..D..y.T.P...i.
fffff8051a917ff0 *7c  41  3b  c5  0f  8c  b2  01 *aa  00  66  45  3b  cd  0f  8c |A;.......fE;...

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .cxr 0xffffba0458fb7290 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_STRIDE

TARGET_TIME:  2019-11-29T15:29:55.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  25a7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_stride

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------
 
Teşekkürler, söylediklerinizi deneyeceğim.
AdGuard sorun çıkarmış kaldırın, Chrome güncelleyin, Ayrıca bellek hatası gördüm fakat Memtest86 sonucu temiz çıkmış anakartın slotlarına kitapçığa uygun olarak yerleştirdiniz mi? USB portlarına neler takılı? Overclock, undervolt var mı?
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80576fdc59c, Address of the instruction which caused the bugcheck
Arg3: ffffd98a36e4bdd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7C02

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  3.40

BIOS_DATE:  10/25/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450 TOMAHAWK MAX (MS-7C02)

BASEBOARD_VERSION:  1.0

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80576fdc59c

BUGCHECK_P3: ffffd98a36e4bdd0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObInsertObjectEx+cc
fffff805`76fdc59c f6474208        test    byte ptr [rdi+42h],8

CONTEXT:  ffffd98a36e4bdd0 -- (.cxr 0xffffd98a36e4bdd0)
rax=ffffc98b2f171080 rbx=ffffc98b301655a0 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80576fdc59c rsp=ffffd98a36e4c7c0 rbp=ffffd98a36e4c8c0
r8=0000000000000000  r9=fffff80576a00000 r10=0000000000000000
r11=ffffd98a36e4ca50 r12=ffffc98b2b6ff7c0 r13=ffffc98b2b6ff7f0
r14=000002bab3f80ba0 r15=ffffd98a36e4cac8
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ObInsertObjectEx+0xcc:
fffff805`76fdc59c f6474208        test    byte ptr [rdi+42h],8 ds:002b:00000000`00000042=??
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-01-2019 13:12:44.0491

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff805770bc05f to fffff80576fdc59c

STACK_TEXT:
ffffd98a`36e4c7c0 fffff805`770bc05f : 000002ba`b3f80ba0 ffffd98a`36e4cb80 00000000`00000001 000002ba`b3f80ba0 : nt!ObInsertObjectEx+0xcc
ffffd98a`36e4ca70 fffff805`76bd2d18 : ffffc98b`2f171080 000000f6`e77fee60 ffffc98b`1d6c9c00 ffffc98b`00000000 : nt!NtCreateWaitCompletionPacket+0xbf
ffffd98a`36e4cb00 00007ffc`d5cbd954 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f6`e77fedc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`d5cbd954


THREAD_SHA1_HASH_MOD_FUNC:  724bf577529b5411f8c8a84f3b74712c07109ce7

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a6e0dc93af22046c49afb7b8539a0ace601ace5a

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!ObInsertObjectEx+cc
fffff805`76fdc59c f6474208        test    byte ptr [rdi+42h],8

FAULT_INSTR_CODE:  84247f6

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObInsertObjectEx+cc

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .cxr 0xffffd98a36e4bdd0 ; kb

BUCKET_ID_FUNC_OFFSET:  cc

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObInsertObjectEx

BUCKET_ID:  0x3B_c0000005_nt!ObInsertObjectEx

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ObInsertObjectEx

TARGET_TIME:  2019-11-30T23:10:11.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  1665

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!obinsertobjectex

FAILURE_ID_HASH:  {81e179d5-1423-4bf6-d085-e8f692562c3a}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8031e80e9c1, Address of the instruction which caused the bugcheck
Arg3: ffff8485bdd4cec0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7C02

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  3.40

BIOS_DATE:  10/25/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450 TOMAHAWK MAX (MS-7C02)

BASEBOARD_VERSION:  1.0

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8031e80e9c1

BUGCHECK_P3: ffff8485bdd4cec0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ExpWnfUpdateSubscription+21
fffff803`1e80e9c1 48397818        cmp     qword ptr [rax+18h],rdi

CONTEXT:  ffff8485bdd4cec0 -- (.cxr 0xffff8485bdd4cec0)
rax=0000000000000086 rbx=ffffe10198966648 rcx=ffffe1019a4aaaa0
rdx=ffffe101989576f0 rsi=ffffe10198957740 rdi=ffffe1019a4aaaa0
rip=fffff8031e80e9c1 rsp=ffff8485bdd4d8b0 rbp=ffff8485bdd4d970
r8=0000000000000000  r9=0000000000000000 r10=ffffe10198957748
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=ffff8d82b91aa3a0 r15=ffff8d82b3cde0c0
iopl=0         nv up ei pl nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050213
nt!ExpWnfUpdateSubscription+0x21:
fffff803`1e80e9c1 48397818        cmp     qword ptr [rax+18h],rdi ds:002b:00000000`0000009e=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-01-2019 13:12:40.0662

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8031e80e640 to fffff8031e80e9c1

STACK_TEXT:
ffff8485`bdd4d8b0 fffff803`1e80e640 : ffffffff`ffffffff ffff8485`bdd4d970 ffffe101`98957740 00000000`00000000 : nt!ExpWnfUpdateSubscription+0x21
ffff8485`bdd4d900 fffff803`1e80d5a3 : ffffe101`9a4aaaa0 ffff8d82`b3cde0c0 00000000`00000000 00000000`00000000 : nt!ExpWnfSubscribeNameInstance+0xcc
ffff8485`bdd4d9b0 fffff803`1e80d37b : ffff8485`bdd4db18 00000000`00000000 00000014`88fff450 00000014`ffffffff : nt!ExpWnfSubscribeWnfStateChange+0x1df
ffff8485`bdd4da90 fffff803`1e3d2d18 : ffff8d82`b91aa080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtSubscribeWnfStateChange+0x8b
ffff8485`bdd4db00 00007ffb`16cbf734 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000014`88fff3f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`16cbf734


THREAD_SHA1_HASH_MOD_FUNC:  c7d0a90ba0522d33e45aeaa012da6e1ec1fca33a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  eb5e167b621b28387a34f93b797a19ef982c6dcd

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!ExpWnfUpdateSubscription+21
fffff803`1e80e9c1 48397818        cmp     qword ptr [rax+18h],rdi

FAULT_INSTR_CODE:  18783948

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExpWnfUpdateSubscription+21

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .cxr 0xffff8485bdd4cec0 ; kb

BUCKET_ID_FUNC_OFFSET:  21

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExpWnfUpdateSubscription

BUCKET_ID:  0x3B_c0000005_nt!ExpWnfUpdateSubscription

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ExpWnfUpdateSubscription

TARGET_TIME:  2019-11-30T16:12:05.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  180e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!expwnfupdatesubscription

FAILURE_ID_HASH:  {63fadac6-2209-f083-1198-de28d6c77481}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39ffcd918c8b517, Reserved
Arg2: b3b7095f6b46fdc8, Reserved
Arg3: fffff8071bb11000, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7C02

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  3.40

BIOS_DATE:  10/25/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450 TOMAHAWK MAX (MS-7C02)

BASEBOARD_VERSION:  1.0

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: a39ffcd918c8b517

BUGCHECK_P2: b3b7095f6b46fdc8

BUGCHECK_P3: fffff8071bb11000

BUGCHECK_P4: 1

PG_MISMATCH:  3ECC0DDC

FAULTING_IP:
nt!Ports <PERF> (nt+0x511000)+0
fffff807`1bb11000 1010            adc     byte ptr [rax],dl

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x109

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-01-2019 13:12:36.0572

ANALYSIS_VERSION: 10.0.18362.1 x86fre

STACK_TEXT:
fffff586`a1f30e98 00000000`00000000 : 00000000`00000109 a39ffcd9`18c8b517 b3b7095f`6b46fdc8 fffff807`1bb11000 : nt!KeBugCheckEx


THREAD_SHA1_HASH_MOD_FUNC:  81a83ae0317433a47fcc36991983df3b6e638b71

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6e16edd8c7dd677734fdbcd2397a2e35e9fae964

THREAD_SHA1_HASH_MOD:  76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3

FOLLOWUP_IP:
nt!Ports <PERF> (nt+0x511000)+0
fffff807`1bb11000 1010            adc     byte ptr [rax],dl

FAULT_INSTR_CODE:  1010

SYMBOL_NAME:  nt!Ports <PERF> (nt+0x511000)+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x109_1_nt!Ports__PERF__(nt+0x511000)

BUCKET_ID:  0x109_1_nt!Ports__PERF__(nt+0x511000)

PRIMARY_PROBLEM_CLASS:  0x109_1_nt!Ports__PERF__(nt+0x511000)

TARGET_TIME:  2019-11-30T10:23:56.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  d25

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x109_1_nt!ports__perf__(nt+0x511000)

FAILURE_ID_HASH:  {6f07dceb-751e-bee2-a72d-959161a93c09}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc7075a3b1300, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc7075a3b1258, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for adgnetworktdidrv.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7C02

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  3.40

BIOS_DATE:  10/25/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450 TOMAHAWK MAX (MS-7C02)

BASEBOARD_VERSION:  1.0

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc7075a3b1300

BUGCHECK_P3: ffffc7075a3b1258

BUGCHECK_P4: 0

TRAP_FRAME:  ffffc7075a3b1300 -- (.trap 0xffffc7075a3b1300)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb586c760129a rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb586c76012b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013dbf514b rsp=ffffc7075a3b1490 rbp=ffffc7075a3b1590
r8=ffffb586c7601288  r9=ffffb586c7601298 r10=ffffb586c93fe000
r11=ffffb586c7601040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!RtlpHpLfhSlotAllocate+0x1c190b:
fffff801`3dbf514b cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffc7075a3b1258 -- (.exr 0xffffc7075a3b1258)
ExceptionAddress: fffff8013dbf514b (nt!RtlpHpLfhSlotAllocate+0x00000000001c190b)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  AdguardSvc.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-01-2019 13:12:32.0710

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8013dbd32e9 to fffff8013dbc14e0

STACK_TEXT:
ffffc707`5a3b0fd8 fffff801`3dbd32e9 : 00000000`00000139 00000000`00000003 ffffc707`5a3b1300 ffffc707`5a3b1258 : nt!KeBugCheckEx
ffffc707`5a3b0fe0 fffff801`3dbd3710 : 00000000`00000001 ffffca81`263d9180 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc707`5a3b1120 fffff801`3dbd1aa5 : 00000000`00000000 fffff801`3e01feb3 ffffc707`5a3b15c0 00000000`00000001 : nt!KiFastFailDispatch+0xd0
ffffc707`5a3b1300 fffff801`3dbf514b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00989680 : nt!KiRaiseSecurityCheckFailure+0x325
ffffc707`5a3b1490 fffff801`3da33294 : ffffb586`c7600340 ffffb586`c7601040 ffffb586`c7601280 ffffb586`00000130 : nt!RtlpHpLfhSlotAllocate+0x1c190b
ffffc707`5a3b15f0 fffff801`3dd6f06d : ffffb586`00000000 00000000`00000000 00000000`00000000 00000000`0000011b : nt!ExAllocateHeapPool+0xb94
ffffc707`5a3b1730 fffff801`48ba83c7 : 00000000`00000000 00000000`00000000 00000000`00000010 fffff9e5`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffffc707`5a3b1780 00000000`00000000 : 00000000`00000000 00000000`00000010 fffff9e5`00000000 00000000`00000006 : adgnetworktdidrv+0x83c7


THREAD_SHA1_HASH_MOD_FUNC:  1d4a1ec3ad0af96c55913bb61d0851faad07c009

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  4c4fa919898c3b1a3191fbf269c39e2fe9793265

THREAD_SHA1_HASH_MOD:  fc0fd1c8b1fd561290d1c915d05d4dc50539053b

FOLLOWUP_IP:
adgnetworktdidrv+83c7
fffff801`48ba83c7 ??              ???

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  adgnetworktdidrv+83c7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: adgnetworktdidrv

IMAGE_NAME:  adgnetworktdidrv.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5d52ce4b

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  83c7

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_adgnetworktdidrv!unknown_function

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_adgnetworktdidrv!unknown_function

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_adgnetworktdidrv!unknown_function

TARGET_TIME:  2019-11-29T16:04:51.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  dfa

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_adgnetworktdidrv!unknown_function

FAILURE_ID_HASH:  {09ba5999-f8c9-31c4-c50b-242b67147646}

Followup:     MachineOwner
---------

9: kd> lmvm adgnetworktdidrv
Browse full module list
start             end                 module name
fffff801`48ba0000 fffff801`48bb4000   adgnetworktdidrv T (no symbols)        
    Loaded symbol image file: adgnetworktdidrv.sys
    Image path: adgnetworktdidrv.sys
    Image name: adgnetworktdidrv.sys
    Browse all global symbols  functions  data
    Timestamp:        Tue Aug 13 07:50:51 2019 (5D52CE4B)
    CheckSum:         000175EB
    ImageSize:        00014000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8051a917d4e, Address of the instruction which caused the bugcheck
Arg3: ffffba0458fb7290, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.476 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7C02

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  3.40

BIOS_DATE:  10/25/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450 TOMAHAWK MAX (MS-7C02)

BASEBOARD_VERSION:  1.0

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8051a917d4e

BUGCHECK_P3: ffffba0458fb7290

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!RtlFnToFxFrame+8e
fffff805`1a917d4e 8b5c2508        mov     ebx,dword ptr [rbp+8]

CONTEXT:  ffffba0458fb7290 -- (.cxr 0xffffba0458fb7290)
rax=000000000000c000 rbx=000000000000ffff rcx=ffffba0458fb7e4f
rdx=ffffba0458fb826c rsi=ffffba0458fb8570 rdi=000000000000c000
rip=fffff8051a917d4e rsp=ffffba0458fb7c88 rbp=000000000001003f
r8=ffffba0458fb7d50  r9=0000000000000000 r10=0000000000000001
r11=ffffba0458fb7e80 r12=0000000000000023 r13=ffffe5896bfe4080
r14=ffffba0458fb8540 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050297
nt!RtlFnToFxFrame+0x8e:
fffff805`1a917d4e 8b5c2508        mov     ebx,dword ptr [rbp+8] ss:0018:00000000`00010047=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  Adguard.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-01-2019 13:14:20.0723

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8051aec28b5 to fffff8051a917d4e

STACK_TEXT:
ffffba04`58fb7c88 fffff805`1aec28b5 : ffffba04`58fb8250 00000000`00010038 ffffba04`58fb8ac8 ffffba04`58fb8ac0 : nt!RtlFnToFxFrame+0x8e
ffffba04`58fb7c90 fffff805`1aec2634 : 00000000`00000033 ffff2ed3`9721cd48 ffffba04`58fb8250 ffffba04`58fb7d50 : nt!RtlpWow64CtxToAmd64+0xe5
ffffba04`58fb7cc0 fffff805`1aec187f : 0fffffff`fffffff0 ffffba04`58fb8540 00000000`00010040 00000000`0001003f : nt!RtlpWow64SetContextOnAmd64+0x48
ffffba04`58fb7d00 fffff805`1ade8179 : ffffba04`58fb8b00 ffffce00`000074f8 00000000`00e9fc4c ffffce67`33800000 : nt!PspWow64SetContextThread+0x267
ffffba04`58fb8890 fffff805`1a9d2d18 : ffffe589`6bfe4080 00000000`7782dc00 00000000`00000000 ffffe589`68c12460 : nt!NtSetInformationThread+0xb39
ffffba04`58fb8b00 00007ffd`db9fc264 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`00e5e898 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`db9fc264


CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
64 errors : !nt (fffff8051a917140-fffff8051a917ff8)
fffff8051a917140 *50  0f  46  c1  33  d2  8d  71 *f6  03  f0  8b  c6  f7  f1  2b P.F.3..q.......+
fffff8051a917150 *f0  44  39  1d  d0  44  32  00 *61  8b  c3  74  45  42  0f  b6 .D9..D2.a..tEB..
fffff8051a917160 *2c  23  77  b8  1f  85  eb  51 *44  0f  af  c9  83  c1  32  f7 ,#w....QD.....2.
fffff8051a917170 *24  0f  b6  0d  78  d8  32  00  44  8b  c2  33  d2  41  c1  e8 $...x.2.D..3.A..
fffff8051a917180 *11  45  2b  c8  41  8b  c1  f7 *b1  41  8b  c3  44  03  c2  41 .E+.A....A..D..A
fffff8051a917190 *1b  f0  73  0e  b8  40  00  00 *20  41  8b  f0  44  8b  f0  89 ..s..@.. A..D...
fffff8051a9171a0 *68  50  8b  d8  45  85  d2  75  1f  44  38  9f  8b  00  00  00 hP..E..u.D8.....
fffff8051a9171b0 *fd  16  0f  b6  b7  80  00  00 *49  44  8b  f0  41  0f  ba  ee ........ID..A...
...
fffff8051a917300 *15  55  48  8b  12  48  8b  c2 *dd  8b  ca  48  d1  e8  48  23 .UH..H.....H..H#
fffff8051a917310 *f5  48  2b  d0  48  b8  33  33 *73  33  33  33  33  33  48  8b .H+.H.33s33333H.
fffff8051a917320 *c8  48  23  d0  48  c1  e9  02 *3d  23  c8  48  03  ca  48  8b .H#.H...=#.H..H.
fffff8051a917330 *50  48  c1  e8  04  48  03  c1 *d8  b9  0f  0f  0f  0f  0f  0f PH...H..........
...
fffff8051a9173c0 *b7  55  68  4d  8b  cf  41  88 *14  3c  8f  00  00  00  4c  8b .UhM..A..<....L.
fffff8051a9173d0 *76  8b  45  50  48  8b  cf  89 *52  24  28  40  88  74  24  20 v.EPH...R$(@.t$
fffff8051a9173e0 *f8  9b  c4  1e  00  44  8b  55  68  49  ff  c4  48  8b  45  b8 .....D.UhI..H.E.
fffff8051a9173f0 *ab  ff  c2  8b  75  60  48  83 *78  08  48  8b  5d  c0  41  bb ....u`H.x.H.].A.
...
fffff8051a917b80 *cf  cc  cc  cc  cc  cc  cc  cc *8e  cc  cc  cc  cc  cc  cc  cc ................
fffff8051a917b90  48  83  ec  38  48  89  4c  24 *34  4c  8d  44  24  20  48  89 H..8H.L$4L.D$ H.
fffff8051a917ba0 *58  24  28  33  c9  48  8d  15 *fc  5e  ff  ff  41  b9  01  00 X$(3.H...^..A...
fffff8051a917bb0 *4c  00  e8  c5  5b  f4  ff  48 *a4  c4  38  c3  cc  cc  cc  cc L...[..H..8.....
...
fffff8051a917d40 *e0  c1  e3  02  41  ff  c2  41 *81  fa  08  72  c2  48  8b  5c ....A..A...r.H.\
fffff8051a917d50 *25  08  48  8b  7c  24  10  44 *89  49  04  c3  cc  cc  cc  cc %.H.|$.D.I......
fffff8051a917d60  cd  cc  cc  cc  48  89  7c  24 *e9  4c  89  64  24  10  4c  89 ....H.|$.L.d$.L.
fffff8051a917d70  6c  24  18  55  41  56  41  57 *6c  8b  ec  48  83  ec  40  4c l$.UAVAWl..H..@L
fffff8051a917d80 *cb  79  10  33  c0  48  89  45 *a0  4c  8b  e2  48  89  45  e8 .y.3.H.E.L..H.E.
fffff8051a917d90 *6a  89  45  f0  4d  85  ff  0f *a0  36  01  00  00  4d  8b  7f j.E.M....6...M..
fffff8051a917da0 *8d  48  8d  55  e0  48  8d  0d *0c  d2  3d  00  e8  8f  70  f2 .H.U.H....=...p.
fffff8051a917db0 *cf  48  8b  05  68  df  34  00 *cc  8d  2d  61  df  34  00  49 .H..h.4...-a.4.I
...
fffff8051a917f00 *02  83  e0  04  c3  b8  01  00 *70  00  c3  b8  02  00  00  00 ........p.......
fffff8051a917f10 *54  b8  03  00  00  00  c3  cc  cc  cc  cc  cc  cc  cc  cc  cc T...............
fffff8051a917f20  7a  8b  c4  48  89  58  08  48 *df  68  10  48  89  70  20  57 z..H.X.H.h.H.p W
fffff8051a917f30 *4c  83  ec  20  48  8b  3d  b5 *d4  31  00  33  db  48  89  58 L.. H.=..1.3.H.X
...
fffff8051a917fc0 *6f  bd  01  00  00  00  44  0f *ff  49  04  4c  8b  e2  44  0f o.....D..I.L..D.
fffff8051a917fd0 *b5  01  41  8b  d9  0f  bf  71 *14  41  2b  dd  44  0f  bf  71 ..A....q.A+.D..q
fffff8051a917fe0 *3b  8b  f8  44  0f  bf  79  0a *54  8d  50  ff  0f  bf  69  0c ;..D..y.T.P...i.
fffff8051a917ff0 *7c  41  3b  c5  0f  8c  b2  01 *aa  00  66  45  3b  cd  0f  8c |A;.......fE;...

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .cxr 0xffffba0458fb7290 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_STRIDE

TARGET_TIME:  2019-11-29T15:29:55.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.476

ANALYSIS_SESSION_ELAPSED_TIME:  25a7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_stride

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------

Tamamdır, AdGuard'ı kaldırıyorum ve Chrome güncelliyorum. RAM'leri kitapçığa uygun olarak yerleştirdim. Overclock yok. USB portlarında da Klavye, Mouse ve Logitech Z120 hoparlörün enerji aldığı kablo takılı.
Undervolt'da yok, RAM'ler için gerekli olan voltaj 1.35V görünüyor. BIOS'da stok halde RAM frekansı 2133MHz, voltaj ise 1,20'lerde. Ben onu 3000MHz ve 1.35V şeklinde ayarladım. BIOS versiyonunu 3.40'a güncellemiştim, 3.50 versiyon çıkmış ve beta görünüyordu. Şu an normal versiyon olarak görünüyor onu da güncelleyeceğim.
Bu arada Chrome kontrol ettim ve güncel görünüyor. Adguard'ı da kaldırdım.
 
Son düzenleme:
BIOS güncelledim ve dediğim gibi AdGuard'ı kaldırdım.

Ek olarak bunu da yükleyin:

Windows güncellemelerini takipte kalın. GPU sürücülerini fazla kurcalamayın 1/2 ay.

Dediğiniz sürücü de yüklü görünüyordu, yine de Uninstall Tool ile kaldırarak tekrar yükledim. Şimdi bekleyeceğim herhangi bir hata olacak mı diye. Teşekkür ederim.
Bu arada tekrar hata olması durumunda da RAM'leri tek tek test edeceğim.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı