Bende de aynı sorun olmuştu. Ekran kartı driverını silip başka bir sürüm yükler misin?
Minidump Dosyalarını Paylaşın
23.06.2025 tarihinde yapılan güncel rehbere aşağıdaki linkten erişebilirsiniz: https://www.technopat.net/sosyal/konu/minidump-nedir-nasil-paylasilir.3817531/ Minidump dosyaları, bilgisayarınız mavi ekran verdiğinde belleğin ufak bir dökümünü barındıran dosyalardır. Bunları analiz ederek mavi...www.technopat.net
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8034489f58e, Address of the instruction which caused the bugcheck
Arg3: ffffc98265612dd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8034489f58e
BUGCHECK_P3: ffffc98265612dd0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ObpCaptureHandleInformation+8e
fffff803`4489f58e 410fb64118 movzx eax,byte ptr [r9+18h]
CONTEXT: ffffc98265612dd0 -- (.cxr 0xffffc98265612dd0)
rax=0000000000000000 rbx=ffffe08da7c060a0 rcx=0000000000000000
rdx=0000000000000030 rsi=ffffe08da7c060a0 rdi=0000000000001028
rip=fffff8034489f58e rsp=ffffc982656137c8 rbp=ffffe08dacc57e40
r8=0000000000000000 r9=0000000000000000 r10=000000000018a3d0
r11=ffffc98265613810 r12=ffff9f7a73c00050 r13=ffffc982656138c0
r14=fffff8034489f500 r15=000000000032db48
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ObpCaptureHandleInformation+0x8e:
fffff803`4489f58e 410fb64118 movzx eax,byte ptr [r9+18h] ds:002b:00000000`00000018=??
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 4
CPU_MHZ: d40
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Steam.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 04-03-2020 01:27:01.0851
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8034490cbe9 to fffff8034489f58e
STACK_TEXT:
ffffc982`656137c8 fffff803`4490cbe9 : 00000000`00001028 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0x8e
ffffc982`656137d0 fffff803`4490a475 : fffff803`4489f500 ffffe08d`acc57e58 ffffc982`0032db48 00000000`0032db48 : nt!ExpSnapShotHandleTables+0x131
ffffc982`65613860 fffff803`447aa218 : 00000000`106db050 fffff803`00020000 ffffcb0b`0018a3d0 ffff9f7a`73c00050 : nt!ExpGetHandleInformation+0x71
ffffc982`656138b0 fffff803`445e150b : 00000000`0032db60 00000000`00000000 00000000`00000010 00000000`106db050 : nt!ExpQuerySystemInformation+0x1c8be8
ffffc982`65613ac0 fffff803`441d3251 : ffffcb0b`00000000 00000000`00000001 00000000`00000001 ffffc982`65613b80 : nt!NtQuerySystemInformation+0x2b
ffffc982`65613b00 00007ffe`d9b9c784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000000`092de2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d9b9c784
THREAD_SHA1_HASH_MOD_FUNC: 74d5022b6d70ac2b757be0cd92beda5707d667cf
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e28480b959efa983b7179027260dc7953695a1cf
THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
FOLLOWUP_IP:
nt!ObpCaptureHandleInformation+8e
fffff803`4489f58e 410fb64118 movzx eax,byte ptr [r9+18h]
FAULT_INSTR_CODE: 41b60f41
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpCaptureHandleInformation+8e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .cxr 0xffffc98265612dd0 ; kb
BUCKET_ID_FUNC_OFFSET: 8e
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObpCaptureHandleInformation
BUCKET_ID: 0x3B_c0000005_nt!ObpCaptureHandleInformation
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!ObpCaptureHandleInformation
TARGET_TIME: 2020-02-07T13:57:29.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 34f7
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!obpcapturehandleinformation
FAILURE_ID_HASH: {744cd2bf-a795-9cd1-d425-97880ad655c5}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff80823b9f6240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
ETW minidump data unavailable
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffff80823b9f6240
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_CODE: (NTSTATUS) 0x3b9c7080 - <Unable to get error code text>
ERROR_CODE: (NTSTATUS) 0x3b9c7080 - <Unable to get error code text>
CPU_COUNT: 4
CPU_MHZ: d40
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xEF
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 04-03-2020 01:27:05.0401
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff806616cb1e9 to fffff80660fc1510
STACK_TEXT:
ffff9609`0d867938 fffff806`616cb1e9 : 00000000`000000ef ffff8082`3b9f6240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff9609`0d867940 fffff806`615c7893 : ffff8082`3b9f6240 fffff806`60e9c769 ffff8082`3b9f6240 fffff806`60e9c8c0 : nt!PspCatchCriticalBreak+0x115
ffff9609`0d8679e0 fffff806`6143a190 : ffff8082`00000000 00000000`00000000 ffff8082`3b9f6240 ffff8082`3b9f6240 : nt!PspTerminateAllThreads+0x175cbf
ffff9609`0d867a50 fffff806`61439f79 : ffffffff`ffffffff ffff9609`0d867b80 ffff8082`3b9f6240 fffff806`61154301 : nt!PspTerminateProcess+0xe0
ffff9609`0d867a90 fffff806`60fd3351 : 0000007b`00000414 ffff8082`3b9c7080 ffff8082`3b9f6240 00000000`00000000 : nt!NtTerminateProcess+0xa9
ffff9609`0d867b00 00007ffe`dbdfc644 : 00007ffe`dbdccef2 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000007b`86eff778 00007ffe`dbdccef2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`dbdfc644
0000007b`86eff780 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`dbdccef2
THREAD_SHA1_HASH_MOD_FUNC: e8c9407148d94b0ae6496e94a8a56eccd3d66cf5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 379d05474c8eb0dc5e34b0f2c3904c1f681e675d
THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
FOLLOWUP_IP:
nt!PspCatchCriticalBreak+115
fffff806`616cb1e9 cc int 3
FAULT_INSTR_CODE: ed8440cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!PspCatchCriticalBreak+115
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790
IMAGE_VERSION: 10.0.18362.657
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 115
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_3b9c7080_nt!PspCatchCriticalBreak
BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_3b9c7080_nt!PspCatchCriticalBreak
PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_3b9c7080_nt!PspCatchCriticalBreak
TARGET_TIME: 2020-03-03T14:43:12.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: c23
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_3b9c7080_nt!pspcatchcriticalbreak
FAILURE_ID_HASH: {c7ccb047-8cac-abab-d6dd-0041765eac8c}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc486141e3030, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc486141e2f88, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffffc486141e3030
BUGCHECK_P3: ffffc486141e2f88
BUGCHECK_P4: 0
TRAP_FRAME: ffffc486141e3030 -- (.trap 0xffffc486141e3030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffaf8bb3e89e40 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffaf8bb0cdc210 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80655102168 rsp=ffffc486141e31c8 rbp=ffffc486141e32d0
r8=000000000000008e r9=ffffaf8bb0c98e40 r10=000000000000010e
r11=00000000000000e1 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlEnumerateEntryHashTable+0x108:
fffff806`55102168 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffc486141e2f88 -- (.exr 0xffffc486141e2f88)
ExceptionAddress: fffff80655102168 (nt!RtlEnumerateEntryHashTable+0x0000000000000108)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 4
CPU_MHZ: d40
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 04-03-2020 01:27:09.0089
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff806551d33e9 to fffff806551c1510
STACK_TEXT:
ffffc486`141e2d08 fffff806`551d33e9 : 00000000`00000139 00000000`00000003 ffffc486`141e3030 ffffc486`141e2f88 : nt!KeBugCheckEx
ffffc486`141e2d10 fffff806`551d3810 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`5506f9f7 : nt!KiBugCheckDispatch+0x69
ffffc486`141e2e50 fffff806`551d1ba5 : 00000000`00000000 ffffffff`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc486`141e3030 fffff806`55102168 : fffff806`5738f5f5 ffffaf8b`b3a8e040 ffffaf8b`b062bd70 ffffaf8b`b062b8e0 : nt!KiRaiseSecurityCheckFailure+0x325
ffffc486`141e31c8 fffff806`5738f5f5 : ffffaf8b`b3a8e040 ffffaf8b`b062bd70 ffffaf8b`b062b8e0 ffffc486`141e32d0 : nt!RtlEnumerateEntryHashTable+0x108
ffffc486`141e31d0 fffff806`572af02e : 00000000`00000001 fffff806`5754a5f0 0000000a`5b27f540 fffff806`5754c4e8 : tcpip!Ipv4EnumerateAllPaths+0x515
ffffc486`141e3400 fffff806`62842acd : ffffaf8b`b546f000 00000000`00000070 00000000`00000000 0000000a`5b27f540 : NETIO!NsiEnumerateObjectsAllParametersEx+0x24e
ffffc486`141e35e0 fffff806`628426a2 : 00000000`00000000 ffffaf8b`b3c1a860 ffffaf8b`b3c1a790 0000000a`5b27f540 : nsiproxy!NsippEnumerateObjectsAllParameters+0x25d
ffffc486`141e37d0 fffff806`55031f79 : 00000000`00000002 00000000`00000000 ffffaf8b`b7248cc0 ffffaf8b`b036fd90 : nsiproxy!NsippDispatch+0x82
ffffc486`141e3820 fffff806`555e9785 : ffffaf8b`b3c1a790 00000000`00000000 00000000`00000000 ffffaf8b`b7248cc0 : nt!IofCallDriver+0x59
ffffc486`141e3860 fffff806`555e9590 : 00000000`00000000 00000000`00040800 ffffaf8b`b7248cc0 ffffc486`141e3b80 : nt!IopSynchronousServiceTail+0x1a5
ffffc486`141e3900 fffff806`555e8966 : 00000000`00000328 00000000`000007a4 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10
ffffc486`141e3a20 fffff806`551d3351 : 00000000`00000000 00000000`00000000 00000000`000007a4 00000000`00000328 : nt!NtDeviceIoControlFile+0x56
ffffc486`141e3a90 00007ff9`c19fc1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000000a`5b27f4d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c19fc1a4
THREAD_SHA1_HASH_MOD_FUNC: 822778affbef63251f163b057b138fade7ad61e3
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b8230fae51530b9a4660a81c0335778f5ed33c84
THREAD_SHA1_HASH_MOD: f9ed758f241911ea2ac48b03085dc96cd9ad2cdf
FOLLOWUP_IP:
NETIO!NsiEnumerateObjectsAllParametersEx+24e
fffff806`572af02e 90 nop
FAULT_INSTR_CODE: 24448990
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: NETIO!NsiEnumerateObjectsAllParametersEx+24e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.449
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 24e
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_NETIO!NsiEnumerateObjectsAllParametersEx
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_NETIO!NsiEnumerateObjectsAllParametersEx
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_NETIO!NsiEnumerateObjectsAllParametersEx
TARGET_TIME: 2020-03-05T12:59:16.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3d7a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_netio!nsienumerateobjectsallparametersex
FAILURE_ID_HASH: {96cf6644-d07a-eedc-6683-bcf08a6c06ba}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff83a1105f5850, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffff83a11007867a, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffff83a1105f5850
BUGCHECK_P2: 0
BUGCHECK_P3: ffff83a11007867a
BUGCHECK_P4: 2
READ_ADDRESS: fffff803271733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff83a1105f5850
FAULTING_IP:
win32kbase!CInputThread::IsInputThreadDesktopActive+a
ffff83a1`1007867a 488b1dcfd11700 mov rbx,qword ptr [win32kbase!gpInputThread (ffff83a1`101f5850)]
MM_INTERNAL_CODE: 2
CPU_COUNT: 4
CPU_MHZ: d40
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 04-03-2020 01:27:12.0695
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffff9b093dc71eb0 -- (.trap 0xffff9b093dc71eb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff83c6c0628000
rdx=0000000000000010 rsi=0000000000000000 rdi=0000000000000000
rip=ffff83a11007867a rsp=ffff9b093dc72040 rbp=ffff9b093dc72169
r8=0000022c000004a0 r9=000000000000007e r10=000000000000002a
r11=ffff9b093dc721b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
win32kbase!CInputThread::IsInputThreadDesktopActive+0xa:
ffff83a1`1007867a 488b1dcfd11700 mov rbx,qword ptr [win32kbase!gpInputThread (ffff83a1`101f5850)] ds:ffff83a1`101f5850=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80326e2dd34 to fffff80326dc2380
STACK_TEXT:
ffff9b09`3dc71c08 fffff803`26e2dd34 : 00000000`00000050 ffff83a1`105f5850 00000000`00000000 ffff9b09`3dc71eb0 : nt!KeBugCheckEx
ffff9b09`3dc71c10 fffff803`26cc91bf : 00000000`00000020 00000000`00000000 00000000`00000000 ffff83a1`105f5850 : nt!MiSystemFault+0x195c84
ffff9b09`3dc71d10 fffff803`26dd0420 : ffff9b09`3dc71ef9 ffff9b09`3dc71f78 00000000`00000000 00000000`0000002b : nt!MmAccessFault+0x34f
ffff9b09`3dc71eb0 ffff83a1`1007867a : 00000000`00000000 ffff8807`9708a080 ffff8807`96934610 fffff803`26d0f43a : nt!KiPageFault+0x360
ffff9b09`3dc72040 ffff83a1`1016f63e : ffff83c6`c0628000 ffff9b09`3dc72080 ffff9b09`3dc72250 ffff83a1`10044499 : win32kbase!CInputThread::IsInputThreadDesktopActive+0xa
ffff9b09`3dc72070 ffff83a1`100db990 : 00000000`00000010 ffff9b09`3dc72020 fffff803`26d11920 ffff83a1`100443fe : win32kbase!CBaseProcessor::IsUMSuppressed+0xe
ffff9b09`3dc720a0 ffff83a1`100187a0 : 0000022c`00000498 ffff9b09`3dc72220 ffff83c6`c0628000 ffff9b09`3dc72330 : win32kbase!CMouseProcessor::CommitMousePosAndMoveCursor+0x63914
ffff9b09`3dc721d0 ffff83a1`10173062 : 0000022c`000004a0 0000022c`00000498 ffff83c6`c37fe500 0000c98c`0000a419 : win32kbase!CMouseProcessor::ProcessMouseInputData+0x1a8
ffff9b09`3dc72250 ffff83a1`10167cf6 : ffff83c6`c06063f0 ffff8807`9708b070 00000000`00000018 ffff83c6`c06063f0 : win32kbase!CMouseProcessor::ProcessInput+0x43e
ffff9b09`3dc723e0 ffff83a1`1015a247 : ffff83a1`101b30e0 ffff9b09`3dc72520 ffff83c6`c06063f0 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x56
ffff9b09`3dc72420 ffff83a1`100461a0 : 00000000`00000040 ffff83a1`101b30e0 00000000`00000001 fffff803`26d13f14 : win32kbase!CBaseInput::OnReadNotification+0x467
ffff9b09`3dc72560 ffff83a1`10045f02 : ffff9b09`40f26990 ffff83c6`c067c1a0 00000000`00000006 ffff7880`004a6dd3 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x290
ffff9b09`3dc726d0 ffff83a1`100455ce : 00000000`00000003 00000000`00002000 ffff83c6`c066f600 ffff83a1`101efb10 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
ffff9b09`3dc72700 ffff83a1`100453d2 : 00000000`00000006 00000000`00002000 00000000`00000006 fffff803`26d1109a : win32kbase!LegacyInputDispatcher::Dispatch+0x52
ffff9b09`3dc72730 ffff83a1`0ec368a8 : ffff83c6`c066f640 ffff83c6`c066f640 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x102
ffff9b09`3dc72860 ffff83a1`0ec364e3 : 00000000`00000004 00000000`00000004 00000000`0000000c ffff83a1`101f71e0 : win32kfull!xxxDesktopThreadWaiter+0x130
ffff9b09`3dc728e0 ffff83a1`1008582d : ffff8807`9708a080 ffff8807`9708a080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x403
ffff9b09`3dc729c0 ffff83a1`0ec4f4ef : ffff8807`9708a080 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x22d
ffff9b09`3dc72ad0 fffff803`26dd4151 : ffff8807`9708a080 00000000`00000005 000001c2`7a2042b0 00000000`0000028c : win32kfull!NtUserCallNoParam+0x6f
ffff9b09`3dc72b00 00007fff`ffb01144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000b7`2583ff28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`ffb01144
THREAD_SHA1_HASH_MOD_FUNC: 4a4d29838be446952135e96f693969ec06e0b565
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 01475b698e0e89d2059db06da55e4b44e249aec9
THREAD_SHA1_HASH_MOD: d058d017ac9ebd2d8032c5860845ca55c9d93b48
FOLLOWUP_IP:
win32kbase!CInputThread::IsInputThreadDesktopActive+a
ffff83a1`1007867a 488b1dcfd11700 mov rbx,qword ptr [win32kbase!gpInputThread (ffff83a1`101f5850)]
FAULT_INSTR_CODE: cf1d8b48
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: win32kbase!CInputThread::IsInputThreadDesktopActive+a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: a
FAILURE_BUCKET_ID: AV_R_INVALID_win32kbase!CInputThread::IsInputThreadDesktopActive
BUCKET_ID: AV_R_INVALID_win32kbase!CInputThread::IsInputThreadDesktopActive
PRIMARY_PROBLEM_CLASS: AV_R_INVALID_win32kbase!CInputThread::IsInputThreadDesktopActive
TARGET_TIME: 2020-03-24T22:21:28.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4c05
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_r_invalid_win32kbase!cinputthread::isinputthreaddesktopactive
FAILURE_ID_HASH: {fe2722b0-fd80-54ed-048d-8810feb5f2b0}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff90de83bb2e3d, Address of the instruction which caused the bugcheck
Arg3: fffffa8a22abaec0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff90de83bb2e3d
BUGCHECK_P3: fffffa8a22abaec0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
win32kbase!McTemplateK0pqqqq+19
ffff90de`83bb2e3d 4833c4 xor rax,rsp
CONTEXT: fffffa8a22abaec0 -- (.cxr 0xfffffa8a22abaec0)
rax=000012837a3beb80 rbx=ffff90b380654e10 rcx=ffff90b380654e10
rdx=ffff90de83c8b5e8 rsi=ffff90b380654e10 rdi=ffff90b380654e28
rip=ffff90de83bb2e3d rsp=fffffa8a22abb8b0 rbp=fffffa8a22abb919
r8=000000000000000a r9=ffff90b386792540 r10=ffff90de83b213a0
r11=fffffa8a22abba20 r12=fffff78000000004 r13=000000007fffffff
r14=ffff90b380654e40 r15=fffff78000000320
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
win32kbase!McTemplateK0pqqqq+0x19:
ffff90de`83bb2e3d 4833c4 xor rax,rsp
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 4
CPU_MHZ: d40
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: NVIDIA Share.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 04-03-2020 01:27:16.0383
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from ffff90de83b94b64 to ffff90de83bb2e3d
STACK_TEXT:
fffffa8a`22abb8b0 ffff90de`83b94b64 : 00000000`7fffffff fffffa8a`22abba20 fffff801`0def4c00 ffff90b3`86792540 : win32kbase!McTemplateK0pqqqq+0x19
fffffa8a`22abb960 ffff90de`829191ad : ffff90b3`80654e10 00000000`00501802 ffff90b3`80c04c00 ffff90de`83ac5535 : win32kbase!EtwTraceInternalSetTimer+0x737c4
fffffa8a`22abb9b0 ffff90de`82918d6b : 00000000`0000000a ffff90b3`86792540 00000000`00000000 00000000`00000000 : win32kfull!InternalSetTimer+0x3ad
fffffa8a`22abba40 fffff801`0dfd4151 : ffffb384`0c12b6c0 fffffa8a`22abbb80 00000059`a31ff3f8 fffffa8a`22abbaa8 : win32kfull!NtUserSetTimer+0x11b
fffffa8a`22abba90 00007ffb`740413a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000059`a31ff3d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`740413a4
THREAD_SHA1_HASH_MOD_FUNC: 5d12a6e25234cee3e5c80e162cf6253e0bd9fbc1
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ead9d563218ccc26e54a15f9212b020176ea7eb6
THREAD_SHA1_HASH_MOD: 7270be19cb526fd7decce7cf53041e4119fbf245
FOLLOWUP_IP:
win32kbase!McTemplateK0pqqqq+19
ffff90de`83bb2e3d 4833c4 xor rax,rsp
FAULT_INSTR_CODE: 48c43348
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32kbase!McTemplateK0pqqqq+19
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .cxr 0xfffffa8a22abaec0 ; kb
BUCKET_ID_FUNC_OFFSET: 19
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!McTemplateK0pqqqq
BUCKET_ID: 0x3B_c0000005_win32kbase!McTemplateK0pqqqq
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_win32kbase!McTemplateK0pqqqq
TARGET_TIME: 2020-03-27T20:02:22.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4b05
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_win32kbase!mctemplatek0pqqqq
FAILURE_ID_HASH: {04cfef4f-5244-5b8b-32a8-b121812ec784}
Followup: MachineOwner
---------
Geçici bir süreliğine Avast kaldır.
Intel grafik birimi(Intel ekran kartı) sürücüsü neden yüklü?
Ağ sürücülerini güncelle.
Bellek ve HDD testini ne ile yaptın?
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8034489f58e, Address of the instruction which caused the bugcheck Arg3: ffffc98265612dd0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8034489f58e BUGCHECK_P3: ffffc98265612dd0 BUGCHECK_P4: 0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!ObpCaptureHandleInformation+8e fffff803`4489f58e 410fb64118 movzx eax,byte ptr [r9+18h] CONTEXT: ffffc98265612dd0 -- (.cxr 0xffffc98265612dd0) rax=0000000000000000 rbx=ffffe08da7c060a0 rcx=0000000000000000 rdx=0000000000000030 rsi=ffffe08da7c060a0 rdi=0000000000001028 rip=fffff8034489f58e rsp=ffffc982656137c8 rbp=ffffe08dacc57e40 r8=0000000000000000 r9=0000000000000000 r10=000000000018a3d0 r11=ffffc98265613810 r12=ffff9f7a73c00050 r13=ffffc982656138c0 r14=fffff8034489f500 r15=000000000032db48 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!ObpCaptureHandleInformation+0x8e: fffff803`4489f58e 410fb64118 movzx eax,byte ptr [r9+18h] ds:002b:00000000`00000018=?? Resetting default scope BUGCHECK_STR: 0x3B_c0000005 CPU_COUNT: 4 CPU_MHZ: d40 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3c CPU_STEPPING: 3 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: Steam.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E ANALYSIS_SESSION_TIME: 04-03-2020 01:27:01.0851 ANALYSIS_VERSION: 10.0.18362.1 amd64fre LAST_CONTROL_TRANSFER: from fffff8034490cbe9 to fffff8034489f58e STACK_TEXT: ffffc982`656137c8 fffff803`4490cbe9 : 00000000`00001028 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0x8e ffffc982`656137d0 fffff803`4490a475 : fffff803`4489f500 ffffe08d`acc57e58 ffffc982`0032db48 00000000`0032db48 : nt!ExpSnapShotHandleTables+0x131 ffffc982`65613860 fffff803`447aa218 : 00000000`106db050 fffff803`00020000 ffffcb0b`0018a3d0 ffff9f7a`73c00050 : nt!ExpGetHandleInformation+0x71 ffffc982`656138b0 fffff803`445e150b : 00000000`0032db60 00000000`00000000 00000000`00000010 00000000`106db050 : nt!ExpQuerySystemInformation+0x1c8be8 ffffc982`65613ac0 fffff803`441d3251 : ffffcb0b`00000000 00000000`00000001 00000000`00000001 ffffc982`65613b80 : nt!NtQuerySystemInformation+0x2b ffffc982`65613b00 00007ffe`d9b9c784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc 00000000`092de2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d9b9c784 THREAD_SHA1_HASH_MOD_FUNC: 74d5022b6d70ac2b757be0cd92beda5707d667cf THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e28480b959efa983b7179027260dc7953695a1cf THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693 FOLLOWUP_IP: nt!ObpCaptureHandleInformation+8e fffff803`4489f58e 410fb64118 movzx eax,byte ptr [r9+18h] FAULT_INSTR_CODE: 41b60f41 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!ObpCaptureHandleInformation+8e FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0 IMAGE_VERSION: 10.0.18362.592 STACK_COMMAND: .cxr 0xffffc98265612dd0 ; kb BUCKET_ID_FUNC_OFFSET: 8e FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObpCaptureHandleInformation BUCKET_ID: 0x3B_c0000005_nt!ObpCaptureHandleInformation PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!ObpCaptureHandleInformation TARGET_TIME: 2020-02-07T13:57:29.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 34f7 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!obpcapturehandleinformation FAILURE_ID_HASH: {744cd2bf-a795-9cd1-d425-97880ad655c5} Followup: MachineOwner --------- CRITICAL_PROCESS_DIED (ef) A critical system process died Arguments: Arg1: ffff80823b9f6240, Process object or thread object Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died. Arg3: 0000000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ ETW minidump data unavailable KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffff80823b9f6240 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 PROCESS_NAME: svchost.exe CRITICAL_PROCESS: svchost.exe EXCEPTION_CODE: (NTSTATUS) 0x3b9c7080 - <Unable to get error code text> ERROR_CODE: (NTSTATUS) 0x3b9c7080 - <Unable to get error code text> CPU_COUNT: 4 CPU_MHZ: d40 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3c CPU_STEPPING: 3 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0xEF CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E ANALYSIS_SESSION_TIME: 04-03-2020 01:27:05.0401 ANALYSIS_VERSION: 10.0.18362.1 amd64fre LAST_CONTROL_TRANSFER: from fffff806616cb1e9 to fffff80660fc1510 STACK_TEXT: ffff9609`0d867938 fffff806`616cb1e9 : 00000000`000000ef ffff8082`3b9f6240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx ffff9609`0d867940 fffff806`615c7893 : ffff8082`3b9f6240 fffff806`60e9c769 ffff8082`3b9f6240 fffff806`60e9c8c0 : nt!PspCatchCriticalBreak+0x115 ffff9609`0d8679e0 fffff806`6143a190 : ffff8082`00000000 00000000`00000000 ffff8082`3b9f6240 ffff8082`3b9f6240 : nt!PspTerminateAllThreads+0x175cbf ffff9609`0d867a50 fffff806`61439f79 : ffffffff`ffffffff ffff9609`0d867b80 ffff8082`3b9f6240 fffff806`61154301 : nt!PspTerminateProcess+0xe0 ffff9609`0d867a90 fffff806`60fd3351 : 0000007b`00000414 ffff8082`3b9c7080 ffff8082`3b9f6240 00000000`00000000 : nt!NtTerminateProcess+0xa9 ffff9609`0d867b00 00007ffe`dbdfc644 : 00007ffe`dbdccef2 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc 0000007b`86eff778 00007ffe`dbdccef2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`dbdfc644 0000007b`86eff780 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`dbdccef2 THREAD_SHA1_HASH_MOD_FUNC: e8c9407148d94b0ae6496e94a8a56eccd3d66cf5 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 379d05474c8eb0dc5e34b0f2c3904c1f681e675d THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693 FOLLOWUP_IP: nt!PspCatchCriticalBreak+115 fffff806`616cb1e9 cc int 3 FAULT_INSTR_CODE: ed8440cc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!PspCatchCriticalBreak+115 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790 IMAGE_VERSION: 10.0.18362.657 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 115 FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_3b9c7080_nt!PspCatchCriticalBreak BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_3b9c7080_nt!PspCatchCriticalBreak PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_3b9c7080_nt!PspCatchCriticalBreak TARGET_TIME: 2020-03-03T14:43:12.000Z OSBUILD: 18362 OSSERVICEPACK: 657 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2005-04-23 04:40:32 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: c23 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_3b9c7080_nt!pspcatchcriticalbreak FAILURE_ID_HASH: {c7ccb047-8cac-abab-d6dd-0041765eac8c} Followup: MachineOwner --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: ffffc486141e3030, Address of the trap frame for the exception that caused the bugcheck Arg3: ffffc486141e2f88, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 3 BUGCHECK_P2: ffffc486141e3030 BUGCHECK_P3: ffffc486141e2f88 BUGCHECK_P4: 0 TRAP_FRAME: ffffc486141e3030 -- (.trap 0xffffc486141e3030) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffaf8bb3e89e40 rbx=0000000000000000 rcx=0000000000000003 rdx=ffffaf8bb0cdc210 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80655102168 rsp=ffffc486141e31c8 rbp=ffffc486141e32d0 r8=000000000000008e r9=ffffaf8bb0c98e40 r10=000000000000010e r11=00000000000000e1 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!RtlEnumerateEntryHashTable+0x108: fffff806`55102168 cd29 int 29h Resetting default scope EXCEPTION_RECORD: ffffc486141e2f88 -- (.exr 0xffffc486141e2f88) ExceptionAddress: fffff80655102168 (nt!RtlEnumerateEntryHashTable+0x0000000000000108) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000003 Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY CPU_COUNT: 4 CPU_MHZ: d40 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3c CPU_STEPPING: 3 CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x139 PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000003 ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E ANALYSIS_SESSION_TIME: 04-03-2020 01:27:09.0089 ANALYSIS_VERSION: 10.0.18362.1 amd64fre LAST_CONTROL_TRANSFER: from fffff806551d33e9 to fffff806551c1510 STACK_TEXT: ffffc486`141e2d08 fffff806`551d33e9 : 00000000`00000139 00000000`00000003 ffffc486`141e3030 ffffc486`141e2f88 : nt!KeBugCheckEx ffffc486`141e2d10 fffff806`551d3810 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`5506f9f7 : nt!KiBugCheckDispatch+0x69 ffffc486`141e2e50 fffff806`551d1ba5 : 00000000`00000000 ffffffff`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0 ffffc486`141e3030 fffff806`55102168 : fffff806`5738f5f5 ffffaf8b`b3a8e040 ffffaf8b`b062bd70 ffffaf8b`b062b8e0 : nt!KiRaiseSecurityCheckFailure+0x325 ffffc486`141e31c8 fffff806`5738f5f5 : ffffaf8b`b3a8e040 ffffaf8b`b062bd70 ffffaf8b`b062b8e0 ffffc486`141e32d0 : nt!RtlEnumerateEntryHashTable+0x108 ffffc486`141e31d0 fffff806`572af02e : 00000000`00000001 fffff806`5754a5f0 0000000a`5b27f540 fffff806`5754c4e8 : tcpip!Ipv4EnumerateAllPaths+0x515 ffffc486`141e3400 fffff806`62842acd : ffffaf8b`b546f000 00000000`00000070 00000000`00000000 0000000a`5b27f540 : NETIO!NsiEnumerateObjectsAllParametersEx+0x24e ffffc486`141e35e0 fffff806`628426a2 : 00000000`00000000 ffffaf8b`b3c1a860 ffffaf8b`b3c1a790 0000000a`5b27f540 : nsiproxy!NsippEnumerateObjectsAllParameters+0x25d ffffc486`141e37d0 fffff806`55031f79 : 00000000`00000002 00000000`00000000 ffffaf8b`b7248cc0 ffffaf8b`b036fd90 : nsiproxy!NsippDispatch+0x82 ffffc486`141e3820 fffff806`555e9785 : ffffaf8b`b3c1a790 00000000`00000000 00000000`00000000 ffffaf8b`b7248cc0 : nt!IofCallDriver+0x59 ffffc486`141e3860 fffff806`555e9590 : 00000000`00000000 00000000`00040800 ffffaf8b`b7248cc0 ffffc486`141e3b80 : nt!IopSynchronousServiceTail+0x1a5 ffffc486`141e3900 fffff806`555e8966 : 00000000`00000328 00000000`000007a4 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10 ffffc486`141e3a20 fffff806`551d3351 : 00000000`00000000 00000000`00000000 00000000`000007a4 00000000`00000328 : nt!NtDeviceIoControlFile+0x56 ffffc486`141e3a90 00007ff9`c19fc1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc 0000000a`5b27f4d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c19fc1a4 THREAD_SHA1_HASH_MOD_FUNC: 822778affbef63251f163b057b138fade7ad61e3 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b8230fae51530b9a4660a81c0335778f5ed33c84 THREAD_SHA1_HASH_MOD: f9ed758f241911ea2ac48b03085dc96cd9ad2cdf FOLLOWUP_IP: NETIO!NsiEnumerateObjectsAllParametersEx+24e fffff806`572af02e 90 nop FAULT_INSTR_CODE: 24448990 SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: NETIO!NsiEnumerateObjectsAllParametersEx+24e FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.449 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 24e FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_NETIO!NsiEnumerateObjectsAllParametersEx BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_NETIO!NsiEnumerateObjectsAllParametersEx PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_NETIO!NsiEnumerateObjectsAllParametersEx TARGET_TIME: 2020-03-05T12:59:16.000Z OSBUILD: 18362 OSSERVICEPACK: 657 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2005-04-23 04:40:32 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 3d7a ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_netio!nsienumerateobjectsallparametersex FAILURE_ID_HASH: {96cf6644-d07a-eedc-6683-bcf08a6c06ba} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffff83a1105f5850, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: ffff83a11007867a, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffff83a1105f5850 BUGCHECK_P2: 0 BUGCHECK_P3: ffff83a11007867a BUGCHECK_P4: 2 READ_ADDRESS: fffff803271733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffff83a1105f5850 FAULTING_IP: win32kbase!CInputThread::IsInputThreadDesktopActive+a ffff83a1`1007867a 488b1dcfd11700 mov rbx,qword ptr [win32kbase!gpInputThread (ffff83a1`101f5850)] MM_INTERNAL_CODE: 2 CPU_COUNT: 4 CPU_MHZ: d40 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3c CPU_STEPPING: 3 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: csrss.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E ANALYSIS_SESSION_TIME: 04-03-2020 01:27:12.0695 ANALYSIS_VERSION: 10.0.18362.1 amd64fre TRAP_FRAME: ffff9b093dc71eb0 -- (.trap 0xffff9b093dc71eb0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffff83c6c0628000 rdx=0000000000000010 rsi=0000000000000000 rdi=0000000000000000 rip=ffff83a11007867a rsp=ffff9b093dc72040 rbp=ffff9b093dc72169 r8=0000022c000004a0 r9=000000000000007e r10=000000000000002a r11=ffff9b093dc721b0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc win32kbase!CInputThread::IsInputThreadDesktopActive+0xa: ffff83a1`1007867a 488b1dcfd11700 mov rbx,qword ptr [win32kbase!gpInputThread (ffff83a1`101f5850)] ds:ffff83a1`101f5850=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80326e2dd34 to fffff80326dc2380 STACK_TEXT: ffff9b09`3dc71c08 fffff803`26e2dd34 : 00000000`00000050 ffff83a1`105f5850 00000000`00000000 ffff9b09`3dc71eb0 : nt!KeBugCheckEx ffff9b09`3dc71c10 fffff803`26cc91bf : 00000000`00000020 00000000`00000000 00000000`00000000 ffff83a1`105f5850 : nt!MiSystemFault+0x195c84 ffff9b09`3dc71d10 fffff803`26dd0420 : ffff9b09`3dc71ef9 ffff9b09`3dc71f78 00000000`00000000 00000000`0000002b : nt!MmAccessFault+0x34f ffff9b09`3dc71eb0 ffff83a1`1007867a : 00000000`00000000 ffff8807`9708a080 ffff8807`96934610 fffff803`26d0f43a : nt!KiPageFault+0x360 ffff9b09`3dc72040 ffff83a1`1016f63e : ffff83c6`c0628000 ffff9b09`3dc72080 ffff9b09`3dc72250 ffff83a1`10044499 : win32kbase!CInputThread::IsInputThreadDesktopActive+0xa ffff9b09`3dc72070 ffff83a1`100db990 : 00000000`00000010 ffff9b09`3dc72020 fffff803`26d11920 ffff83a1`100443fe : win32kbase!CBaseProcessor::IsUMSuppressed+0xe ffff9b09`3dc720a0 ffff83a1`100187a0 : 0000022c`00000498 ffff9b09`3dc72220 ffff83c6`c0628000 ffff9b09`3dc72330 : win32kbase!CMouseProcessor::CommitMousePosAndMoveCursor+0x63914 ffff9b09`3dc721d0 ffff83a1`10173062 : 0000022c`000004a0 0000022c`00000498 ffff83c6`c37fe500 0000c98c`0000a419 : win32kbase!CMouseProcessor::ProcessMouseInputData+0x1a8 ffff9b09`3dc72250 ffff83a1`10167cf6 : ffff83c6`c06063f0 ffff8807`9708b070 00000000`00000018 ffff83c6`c06063f0 : win32kbase!CMouseProcessor::ProcessInput+0x43e ffff9b09`3dc723e0 ffff83a1`1015a247 : ffff83a1`101b30e0 ffff9b09`3dc72520 ffff83c6`c06063f0 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x56 ffff9b09`3dc72420 ffff83a1`100461a0 : 00000000`00000040 ffff83a1`101b30e0 00000000`00000001 fffff803`26d13f14 : win32kbase!CBaseInput::OnReadNotification+0x467 ffff9b09`3dc72560 ffff83a1`10045f02 : ffff9b09`40f26990 ffff83c6`c067c1a0 00000000`00000006 ffff7880`004a6dd3 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x290 ffff9b09`3dc726d0 ffff83a1`100455ce : 00000000`00000003 00000000`00002000 ffff83c6`c066f600 ffff83a1`101efb10 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12 ffff9b09`3dc72700 ffff83a1`100453d2 : 00000000`00000006 00000000`00002000 00000000`00000006 fffff803`26d1109a : win32kbase!LegacyInputDispatcher::Dispatch+0x52 ffff9b09`3dc72730 ffff83a1`0ec368a8 : ffff83c6`c066f640 ffff83c6`c066f640 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x102 ffff9b09`3dc72860 ffff83a1`0ec364e3 : 00000000`00000004 00000000`00000004 00000000`0000000c ffff83a1`101f71e0 : win32kfull!xxxDesktopThreadWaiter+0x130 ffff9b09`3dc728e0 ffff83a1`1008582d : ffff8807`9708a080 ffff8807`9708a080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x403 ffff9b09`3dc729c0 ffff83a1`0ec4f4ef : ffff8807`9708a080 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x22d ffff9b09`3dc72ad0 fffff803`26dd4151 : ffff8807`9708a080 00000000`00000005 000001c2`7a2042b0 00000000`0000028c : win32kfull!NtUserCallNoParam+0x6f ffff9b09`3dc72b00 00007fff`ffb01144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc 000000b7`2583ff28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`ffb01144 THREAD_SHA1_HASH_MOD_FUNC: 4a4d29838be446952135e96f693969ec06e0b565 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 01475b698e0e89d2059db06da55e4b44e249aec9 THREAD_SHA1_HASH_MOD: d058d017ac9ebd2d8032c5860845ca55c9d93b48 FOLLOWUP_IP: win32kbase!CInputThread::IsInputThreadDesktopActive+a ffff83a1`1007867a 488b1dcfd11700 mov rbx,qword ptr [win32kbase!gpInputThread (ffff83a1`101f5850)] FAULT_INSTR_CODE: cf1d8b48 SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: win32kbase!CInputThread::IsInputThreadDesktopActive+a FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32kbase IMAGE_NAME: win32kbase.sys DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.719 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: a FAILURE_BUCKET_ID: AV_R_INVALID_win32kbase!CInputThread::IsInputThreadDesktopActive BUCKET_ID: AV_R_INVALID_win32kbase!CInputThread::IsInputThreadDesktopActive PRIMARY_PROBLEM_CLASS: AV_R_INVALID_win32kbase!CInputThread::IsInputThreadDesktopActive TARGET_TIME: 2020-03-24T22:21:28.000Z OSBUILD: 18362 OSSERVICEPACK: 720 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 4c05 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_r_invalid_win32kbase!cinputthread::isinputthreaddesktopactive FAILURE_ID_HASH: {fe2722b0-fd80-54ed-048d-8810feb5f2b0} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: ffff90de83bb2e3d, Address of the instruction which caused the bugcheck Arg3: fffffa8a22abaec0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: c0000005 BUGCHECK_P2: ffff90de83bb2e3d BUGCHECK_P3: fffffa8a22abaec0 BUGCHECK_P4: 0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: win32kbase!McTemplateK0pqqqq+19 ffff90de`83bb2e3d 4833c4 xor rax,rsp CONTEXT: fffffa8a22abaec0 -- (.cxr 0xfffffa8a22abaec0) rax=000012837a3beb80 rbx=ffff90b380654e10 rcx=ffff90b380654e10 rdx=ffff90de83c8b5e8 rsi=ffff90b380654e10 rdi=ffff90b380654e28 rip=ffff90de83bb2e3d rsp=fffffa8a22abb8b0 rbp=fffffa8a22abb919 r8=000000000000000a r9=ffff90b386792540 r10=ffff90de83b213a0 r11=fffffa8a22abba20 r12=fffff78000000004 r13=000000007fffffff r14=ffff90b380654e40 r15=fffff78000000320 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282 win32kbase!McTemplateK0pqqqq+0x19: ffff90de`83bb2e3d 4833c4 xor rax,rsp Resetting default scope BUGCHECK_STR: 0x3B_c0000005 CPU_COUNT: 4 CPU_MHZ: d40 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3c CPU_STEPPING: 3 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: NVIDIA Share.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E ANALYSIS_SESSION_TIME: 04-03-2020 01:27:16.0383 ANALYSIS_VERSION: 10.0.18362.1 amd64fre LAST_CONTROL_TRANSFER: from ffff90de83b94b64 to ffff90de83bb2e3d STACK_TEXT: fffffa8a`22abb8b0 ffff90de`83b94b64 : 00000000`7fffffff fffffa8a`22abba20 fffff801`0def4c00 ffff90b3`86792540 : win32kbase!McTemplateK0pqqqq+0x19 fffffa8a`22abb960 ffff90de`829191ad : ffff90b3`80654e10 00000000`00501802 ffff90b3`80c04c00 ffff90de`83ac5535 : win32kbase!EtwTraceInternalSetTimer+0x737c4 fffffa8a`22abb9b0 ffff90de`82918d6b : 00000000`0000000a ffff90b3`86792540 00000000`00000000 00000000`00000000 : win32kfull!InternalSetTimer+0x3ad fffffa8a`22abba40 fffff801`0dfd4151 : ffffb384`0c12b6c0 fffffa8a`22abbb80 00000059`a31ff3f8 fffffa8a`22abbaa8 : win32kfull!NtUserSetTimer+0x11b fffffa8a`22abba90 00007ffb`740413a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc 00000059`a31ff3d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`740413a4 THREAD_SHA1_HASH_MOD_FUNC: 5d12a6e25234cee3e5c80e162cf6253e0bd9fbc1 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ead9d563218ccc26e54a15f9212b020176ea7eb6 THREAD_SHA1_HASH_MOD: 7270be19cb526fd7decce7cf53041e4119fbf245 FOLLOWUP_IP: win32kbase!McTemplateK0pqqqq+19 ffff90de`83bb2e3d 4833c4 xor rax,rsp FAULT_INSTR_CODE: 48c43348 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: win32kbase!McTemplateK0pqqqq+19 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32kbase IMAGE_NAME: win32kbase.sys DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.719 STACK_COMMAND: .cxr 0xfffffa8a22abaec0 ; kb BUCKET_ID_FUNC_OFFSET: 19 FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!McTemplateK0pqqqq BUCKET_ID: 0x3B_c0000005_win32kbase!McTemplateK0pqqqq PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_win32kbase!McTemplateK0pqqqq TARGET_TIME: 2020-03-27T20:02:22.000Z OSBUILD: 18362 OSSERVICEPACK: 720 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 4b05 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_c0000005_win32kbase!mctemplatek0pqqqq FAILURE_ID_HASH: {04cfef4f-5244-5b8b-32a8-b121812ec784} Followup: MachineOwner ---------
Tamam, yeni hata alırsan dosyası ile paylaş.