KERNEL_DATA_INPAGE_ERROR mavi ekran hatası

Sistem der Overclock veya XMP var mı?
Memtest86 ile HDtune testi yap sonuçları paylaş.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd000b0f864f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd000b0f86448, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  PA65-UD3-B3

BIOS_VENDOR:  Award Software International, Inc.

BIOS_VERSION:  F12

BIOS_DATE:  03/27/2012

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  PA65-UD3-B3

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd000b0f864f0

BUGCHECK_P3: ffffd000b0f86448

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd000b0f864f0 -- (.trap 0xffffd000b0f864f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe0005cf1a070 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800a03d46af rsp=ffffd000b0f86680 rbp=ffffc0001ccbe620
 r8=0000000000000000  r9=fffff8009fe80000 r10=ffffd000b0737500
r11=ffffc0001ccbe600 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt! ?? ::NNGAKEGL::`string'+0x264ff:
fffff800`a03d46af cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd000b0f86448 -- (.exr 0xffffd000b0f86448)
ExceptionAddress: fffff800a03d46af (nt! ?? ::NNGAKEGL::`string'+0x00000000000264ff)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: c15

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 28'00000000 (cache) 28'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  WerFault.exe

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-14-2019 17:39:35.0127

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8009ffdc4e9 to fffff8009ffd09a0

STACK_TEXT: 
ffffd000`b0f861c8 fffff800`9ffdc4e9 : 00000000`00000139 00000000`00000003 ffffd000`b0f864f0 ffffd000`b0f86448 : nt!KeBugCheckEx
ffffd000`b0f861d0 fffff800`9ffdc810 : 00000000`00000000 fffff800`9feef57a ffffd000`b0735180 ffffd000`b0735180 : nt!KiBugCheckDispatch+0x69
ffffd000`b0f86310 fffff800`9ffdba34 : ffffe000`5ef53210 ffffe000`5c144970 ffffc000`1ccbe600 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd000`b0f864f0 fffff800`a03d46af : ffffc000`1ccbe620 ffffffff`ffffffff 00000000`00000000 ffffe000`5cef3570 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`b0f86680 fffff800`a028650c : ffffe000`5cef3570 ffffc000`1ccbe630 ffffc000`1ccbe630 ffffe000`5cef3570 : nt! ?? ::NNGAKEGL::`string'+0x264ff
ffffd000`b0f866b0 fffff800`a0248dd0 : 00000000`00000000 ffffe000`5cef3570 ffffe000`5c144970 ffffe000`5cef3540 : nt!AlpcpDeletePort+0x148
ffffd000`b0f866f0 fffff800`9fed9c5f : 00000000`00000000 00000000`000001a8 ffffe000`5cef3570 ffffe000`5cef3570 : nt!ObpRemoveObjectRoutine+0x64
ffffd000`b0f86750 fffff800`a02c1d3b : 00000000`00000000 00000000`ffff8020 00000000`00000000 fffff800`00000001 : nt!ObfDereferenceObjectWithTag+0x8f
ffffd000`b0f86790 fffff800`a02c25ca : ffffd000`ac7c0100 fffff800`a0264600 00000000`00000001 00000000`00000000 : nt!ObCloseHandleTableEntry+0x33f
ffffd000`b0f86860 fffff800`a0235071 : 00000000`00040001 ffffd000`b0f869c0 ffffe000`5c65d900 ffffe000`5f4c0880 : nt!ExSweepHandleTable+0xba
ffffd000`b0f868c0 fffff800`a0234d80 : 00000000`00040000 00000000`00000000 00000000`00000000 fffff800`a023a1c2 : nt!ObKillProcess+0x31
ffffd000`b0f868f0 fffff800`a025688f : ffffe000`5c65d900 ffffc000`1a87a650 ffffd000`b0f869c0 00000000`00000000 : nt!PspRundownSingleProcess+0xa4
ffffd000`b0f86980 fffff800`a02dc081 : 00000000`800704c7 00000000`00000000 ffffe000`5c65d900 ffffe000`5f4c0880 : nt!PspExitThread+0x573
ffffd000`b0f86a90 fffff800`9ffdc1b3 : ffffe000`5c65d900 ffffe000`5f4c0880 ffffd000`b0f86b80 00000000`00000000 : nt!NtTerminateProcess+0xfd
ffffd000`b0f86b00 00000000`77582352 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0264ea28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77582352


THREAD_SHA1_HASH_MOD_FUNC:  704c7b2758abf6c3e9ff8cac6d67b9dd24a512b9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  26f42a6f970c02c16e75e9cace85663c1215688f

THREAD_SHA1_HASH_MOD:  38bc5fec3f0409c265cf5c87da6f8f8859d0711c

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff800`9ffdc810 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

TARGET_TIME:  2019-11-12T20:40:36.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  795

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: fffff6fc00f8c2e8, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000003f, error status (normally i/o status code)
Arg3: 0000000086e0a860, current process (virtual address for lock type 3, or PTE)
Arg4: fffff801f185d000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------

GetPointerFromAddress: unable to read from fffff802451f20e8
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  PA65-UD3-B3

BIOS_VENDOR:  Award Software International, Inc.

BIOS_VERSION:  F12

BIOS_DATE:  03/27/2012

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  PA65-UD3-B3

DUMP_TYPE:  2

BUGCHECK_P1: fffff6fc00f8c2e8

BUGCHECK_P2: ffffffffc000003f

BUGCHECK_P3: 86e0a860

BUGCHECK_P4: fffff801f185d000

ERROR_CODE: (NTSTATUS) 0xc000003f - <Unable to get error code text>

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware.

BUGCHECK_STR:  0x7a_c000003f

CPU_COUNT: 4

CPU_MHZ: c15

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 28'00000000 (cache) 28'00000000 (init)

BLACKBOXDISK: 1

DISKSEC_ORG_ID:  ST35

DISKSEC_MODEL:  ST3500413AS                   

DISKSEC_MANUFACTURING_ID:              6VMS3EA

DISKSEC_ISSUE_DESC_STR: 

DISKSEC_TOTAL_SIZE: 188

DISKSEC_REASON: 1

DISKSEC_PUBLIC_TOTAL_SECTION_SIZE: 54

DISKSEC_PUBLIC_OFFSET: 12c

DISKSEC_PUBLIC_DATA_SIZE: 0

DISKSEC_PRIVATE_TOTAL_SECTION_SIZE: 8

DISKSEC_PRIVATE_OFFSET: 180

DISKSEC_PRIVATE_DATA_SIZE: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-14-2019 17:39:30.0611

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8024501cb09 to fffff80244fdf9a0

STACK_TEXT: 
ffffd000`25393178 fffff802`4501cb09 : 00000000`0000007a fffff6fc`00f8c2e8 ffffffff`c000003f 00000000`86e0a860 : nt!KeBugCheckEx
ffffd000`25393180 fffff802`44f2ceb6 : ffffd000`253933d0 00000000`00000000 fffff802`451eaec0 ffffe001`00000000 : nt! ?? ::FNODOBFM::`string'+0x2cc59
ffffd000`25393270 fffff802`45084e1a : 00000000`00000000 ffffe001`4ebff820 ffffd000`25393200 ffffd000`00000000 : nt!MiPfCompleteInPageSupport+0x3a
ffffd000`253932b0 fffff802`44f2ce67 : ffffd000`25393368 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiPfCompleteCoalescedIo+0x112
ffffd000`25393300 fffff802`44ed5f97 : 00000000`00000000 ffffd000`253933c1 00000000`00000010 ffffe001`4edf4700 : nt!MiPfCompletePrefetchIos+0xbb
ffffd000`25393330 fffff802`452f0413 : 00000000`00000010 ffffe001`4edf4700 ffffd000`000000b0 00000000`00000000 : nt!MiPrefetchVirtualMemory+0x377
ffffd000`25393420 fffff802`452efe66 : 00000000`0000110a 00000000`0000110a 00000000`0000110a 00000000`00000000 : nt!MmPrefetchVirtualMemory+0xe3
ffffd000`25393510 fffff802`452f35f6 : ffffd000`25393620 00000000`00000000 ffffd000`00000009 00000000`00000001 : nt!PfpPrefetchPrivatePages+0x1f2
ffffd000`253935d0 fffff802`452f3ce6 : ffffc000`1dac2000 ffffc000`1dac2000 ffffd000`253937f0 00000000`00000000 : nt!PfpPrefetchRequestPerform+0x22a
ffffd000`25393740 fffff802`452e8a44 : ffffe001`00000001 00000000`00000001 ffffc000`1dac2000 ffffe001`4da9a9f0 : nt!PfpPrefetchRequest+0x11e
ffffd000`253937c0 fffff802`452e7f14 : ffffe001`2e63fcd0 00000000`00000000 00000000`00000000 e0014da9`aa40f101 : nt!PfSetSuperfetchInformation+0x13c
ffffd000`253938a0 fffff802`44feb1b3 : ffffe001`4ba46280 00000044`2d3e90d0 00000000`00000001 00000000`00000000 : nt!NtSetSystemInformation+0x1dc
ffffd000`25393b00 00007ffa`4d4524ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000045`2e63fc68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4d4524ba


CHKIMG_EXTENSION: !chkimg -lo 50 -d !rdbss
    fffff801f185d071 - rdbss!RxProcessException+a9
    [ 8f:8e ]
1 error : !rdbss (fffff801f185d071)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2019-11-11T22:10:49.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  4759

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 000000b500190645
Arg2: ffffd0002fee7fa8
Arg3: ffffd0002fee77b0
Arg4: fffff803d68774d5

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  PA65-UD3-B3

BIOS_VENDOR:  Award Software International, Inc.

BIOS_VERSION:  F12

BIOS_DATE:  03/27/2012

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  PA65-UD3-B3

DUMP_TYPE:  2

BUGCHECK_P1: b500190645

BUGCHECK_P2: ffffd0002fee7fa8

BUGCHECK_P3: ffffd0002fee77b0

BUGCHECK_P4: fffff803d68774d5

EXCEPTION_RECORD:  ffffd0002fee7fa8 -- (.exr 0xffffd0002fee7fa8)
ExceptionAddress: fffff803d68774d5 (nt!ExpApplyPriorityBoost+0x00000000000001d1)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 000000000158074b
Attempt to read from address 000000000158074b

CONTEXT:  ffffd0002fee77b0 -- (.cxr 0xffffd0002fee77b0)
rax=0000000000060004 rbx=0000000000000002 rcx=0000000000000000
rdx=000000000000000e rsi=0000000000000000 rdi=ffffe001b6b8aa10
rip=fffff803d68774d5 rsp=ffffd0002fee81e0 rbp=0000000000000000
 r8=0000000000000004  r9=ffffd0002fee8200 r10=0000000000000801
r11=7ffffffffffffffc r12=0000000000000002 r13=000000000000ff01
r14=0000000001580743 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010002
nt!ExpApplyPriorityBoost+0x1d1:
fffff803`d68774d5 458b7e08        mov     r15d,dword ptr [r14+8] ds:002b:00000000`0158074b=????????
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: c15

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 28'00000000 (cache) 28'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  MsMpEng.exe

CURRENT_IRQL:  0

FOLLOWUP_IP:
nt!ExpApplyPriorityBoost+1d1
fffff803`d68774d5 458b7e08        mov     r15d,dword ptr [r14+8]

FAULTING_IP:
nt!ExpApplyPriorityBoost+1d1
fffff803`d68774d5 458b7e08        mov     r15d,dword ptr [r14+8]

BUGCHECK_STR:  0x24

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803d6b72298
GetUlongPtrFromAddress: unable to read from fffff803d6b72520
 000000000158074b

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  000000000158074b

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-14-2019 17:39:26.0785

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff803d68777d2 to fffff803d68774d5

STACK_TEXT: 
ffffd000`2fee81e0 fffff803`d68777d2 : 00000000`00000701 ffffe001`b6b8aa10 00000000`00000001 ffffe001`b9c3a880 : nt!ExpApplyPriorityBoost+0x1d1
ffffd000`2fee8250 fffff803`d6873bba : ffffe001`b6b8aa10 ffffe001`b6b4abb0 ffffe001`b98137b8 ffffc001`00000000 : nt!ExpWaitForResource+0xd2
ffffd000`2fee8320 fffff801`1eb3c002 : ffffe001`b9813602 ffffe001`b98136d8 ffffd000`2fee8750 00000000`00000000 : nt!ExAcquireResourceExclusiveLite+0x1da
ffffd000`2fee8390 fffff801`1ea30e1c : ffffe001`b98136d8 ffffe001`b73f7180 00000000`00000000 fffff801`1e864061 : Ntfs!NtfsFlushVolume+0x286
ffffd000`2fee84e0 fffff801`1ea44f22 : ffffe001`b98136d8 ffffe001`b926a9f0 ffffe001`b7383de0 ffffc000`f6697501 : Ntfs!NtfsVolumeDasdIo+0x1ec
ffffd000`2fee8580 fffff801`1ea4b6de : ffffe001`b98136d8 ffffe001`b926a9f0 00000000`00000201 ffffd000`2fee8701 : Ntfs!NtfsCommonRead+0x1f82
ffffd000`2fee8720 fffff801`1e802b1e : ffffe001`b8e28b90 ffffe001`b926a9f0 00000000`00000001 ffffe001`b926ad90 : Ntfs!NtfsFsdRead+0x1ee
ffffd000`2fee87d0 fffff801`1e8010c2 : ffffd000`2fee8890 ffffe001`b73fa570 ffffe001`b8f9c6d0 ffffe001`b926a9f0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2ce
ffffd000`2fee8870 fffff803`d6bf5788 : 00000000`00000000 ffffd000`2fee8951 ffffe001`b8f9c6d0 0000001e`00100081 : fltmgr!FltpDispatch+0xb2
ffffd000`2fee88d0 fffff803`d6bf3336 : ffffe001`b8f9c604 ffffe001`b8f9c6d0 00000000`00001478 ffffe001`b8f9c6d0 : nt!IopSynchronousServiceTail+0x170
ffffd000`2fee89a0 fffff803`d696b1b3 : ffffe001`b9c3a880 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x656
ffffd000`2fee8a90 00007ff8`12fa0caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000057`b6a1dc58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`12fa0caa


THREAD_SHA1_HASH_MOD_FUNC:  2d8bbd9f43d9a30b3af3099af01eb12db16d41eb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  3cbfdc7bce892e4af04afdf29067644600087584

THREAD_SHA1_HASH_MOD:  3dbb71349fe7c8519723330f7f0a6ea7498d7325

FAULT_INSTR_CODE:  87e8b45

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExpApplyPriorityBoost+1d1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .cxr 0xffffd0002fee77b0 ; kb

BUCKET_ID_FUNC_OFFSET:  1d1

FAILURE_BUCKET_ID:  0x24_nt!ExpApplyPriorityBoost

BUCKET_ID:  0x24_nt!ExpApplyPriorityBoost

PRIMARY_PROBLEM_CLASS:  0x24_nt!ExpApplyPriorityBoost

TARGET_TIME:  2019-11-13T21:28:20.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  1745

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x24_nt!expapplypriorityboost

FAILURE_ID_HASH:  {99788c13-fb0a-47cc-42e3-cbe4a318052c}

Followup:     MachineOwner
---------
 
Sistem der Overclock veya XMP var mı?
Memtest86 ile HDtune testi yap sonuçları paylaş.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd000b0f864f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd000b0f86448, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  PA65-UD3-B3

BIOS_VENDOR:  Award Software International, Inc.

BIOS_VERSION:  F12

BIOS_DATE:  03/27/2012

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  PA65-UD3-B3

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd000b0f864f0

BUGCHECK_P3: ffffd000b0f86448

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd000b0f864f0 -- (.trap 0xffffd000b0f864f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe0005cf1a070 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800a03d46af rsp=ffffd000b0f86680 rbp=ffffc0001ccbe620
r8=0000000000000000  r9=fffff8009fe80000 r10=ffffd000b0737500
r11=ffffc0001ccbe600 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt! ?? ::NNGAKEGL::`string'+0x264ff:
fffff800`a03d46af cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd000b0f86448 -- (.exr 0xffffd000b0f86448)
ExceptionAddress: fffff800a03d46af (nt! ?? ::NNGAKEGL::`string'+0x00000000000264ff)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: c15

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 28'00000000 (cache) 28'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  WerFault.exe

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-14-2019 17:39:35.0127

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8009ffdc4e9 to fffff8009ffd09a0

STACK_TEXT:
ffffd000`b0f861c8 fffff800`9ffdc4e9 : 00000000`00000139 00000000`00000003 ffffd000`b0f864f0 ffffd000`b0f86448 : nt!KeBugCheckEx
ffffd000`b0f861d0 fffff800`9ffdc810 : 00000000`00000000 fffff800`9feef57a ffffd000`b0735180 ffffd000`b0735180 : nt!KiBugCheckDispatch+0x69
ffffd000`b0f86310 fffff800`9ffdba34 : ffffe000`5ef53210 ffffe000`5c144970 ffffc000`1ccbe600 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd000`b0f864f0 fffff800`a03d46af : ffffc000`1ccbe620 ffffffff`ffffffff 00000000`00000000 ffffe000`5cef3570 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`b0f86680 fffff800`a028650c : ffffe000`5cef3570 ffffc000`1ccbe630 ffffc000`1ccbe630 ffffe000`5cef3570 : nt! ?? ::NNGAKEGL::`string'+0x264ff
ffffd000`b0f866b0 fffff800`a0248dd0 : 00000000`00000000 ffffe000`5cef3570 ffffe000`5c144970 ffffe000`5cef3540 : nt!AlpcpDeletePort+0x148
ffffd000`b0f866f0 fffff800`9fed9c5f : 00000000`00000000 00000000`000001a8 ffffe000`5cef3570 ffffe000`5cef3570 : nt!ObpRemoveObjectRoutine+0x64
ffffd000`b0f86750 fffff800`a02c1d3b : 00000000`00000000 00000000`ffff8020 00000000`00000000 fffff800`00000001 : nt!ObfDereferenceObjectWithTag+0x8f
ffffd000`b0f86790 fffff800`a02c25ca : ffffd000`ac7c0100 fffff800`a0264600 00000000`00000001 00000000`00000000 : nt!ObCloseHandleTableEntry+0x33f
ffffd000`b0f86860 fffff800`a0235071 : 00000000`00040001 ffffd000`b0f869c0 ffffe000`5c65d900 ffffe000`5f4c0880 : nt!ExSweepHandleTable+0xba
ffffd000`b0f868c0 fffff800`a0234d80 : 00000000`00040000 00000000`00000000 00000000`00000000 fffff800`a023a1c2 : nt!ObKillProcess+0x31
ffffd000`b0f868f0 fffff800`a025688f : ffffe000`5c65d900 ffffc000`1a87a650 ffffd000`b0f869c0 00000000`00000000 : nt!PspRundownSingleProcess+0xa4
ffffd000`b0f86980 fffff800`a02dc081 : 00000000`800704c7 00000000`00000000 ffffe000`5c65d900 ffffe000`5f4c0880 : nt!PspExitThread+0x573
ffffd000`b0f86a90 fffff800`9ffdc1b3 : ffffe000`5c65d900 ffffe000`5f4c0880 ffffd000`b0f86b80 00000000`00000000 : nt!NtTerminateProcess+0xfd
ffffd000`b0f86b00 00000000`77582352 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0264ea28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77582352


THREAD_SHA1_HASH_MOD_FUNC:  704c7b2758abf6c3e9ff8cac6d67b9dd24a512b9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  26f42a6f970c02c16e75e9cace85663c1215688f

THREAD_SHA1_HASH_MOD:  38bc5fec3f0409c265cf5c87da6f8f8859d0711c

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff800`9ffdc810 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

TARGET_TIME:  2019-11-12T20:40:36.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  795

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: fffff6fc00f8c2e8, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000003f, error status (normally i/o status code)
Arg3: 0000000086e0a860, current process (virtual address for lock type 3, or PTE)
Arg4: fffff801f185d000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------

GetPointerFromAddress: unable to read from fffff802451f20e8
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  PA65-UD3-B3

BIOS_VENDOR:  Award Software International, Inc.

BIOS_VERSION:  F12

BIOS_DATE:  03/27/2012

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  PA65-UD3-B3

DUMP_TYPE:  2

BUGCHECK_P1: fffff6fc00f8c2e8

BUGCHECK_P2: ffffffffc000003f

BUGCHECK_P3: 86e0a860

BUGCHECK_P4: fffff801f185d000

ERROR_CODE: (NTSTATUS) 0xc000003f - <Unable to get error code text>

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware.

BUGCHECK_STR:  0x7a_c000003f

CPU_COUNT: 4

CPU_MHZ: c15

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 28'00000000 (cache) 28'00000000 (init)

BLACKBOXDISK: 1

DISKSEC_ORG_ID:  ST35

DISKSEC_MODEL:  ST3500413AS                  

DISKSEC_MANUFACTURING_ID:              6VMS3EA

DISKSEC_ISSUE_DESC_STR:

DISKSEC_TOTAL_SIZE: 188

DISKSEC_REASON: 1

DISKSEC_PUBLIC_TOTAL_SECTION_SIZE: 54

DISKSEC_PUBLIC_OFFSET: 12c

DISKSEC_PUBLIC_DATA_SIZE: 0

DISKSEC_PRIVATE_TOTAL_SECTION_SIZE: 8

DISKSEC_PRIVATE_OFFSET: 180

DISKSEC_PRIVATE_DATA_SIZE: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-14-2019 17:39:30.0611

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8024501cb09 to fffff80244fdf9a0

STACK_TEXT:
ffffd000`25393178 fffff802`4501cb09 : 00000000`0000007a fffff6fc`00f8c2e8 ffffffff`c000003f 00000000`86e0a860 : nt!KeBugCheckEx
ffffd000`25393180 fffff802`44f2ceb6 : ffffd000`253933d0 00000000`00000000 fffff802`451eaec0 ffffe001`00000000 : nt! ?? ::FNODOBFM::`string'+0x2cc59
ffffd000`25393270 fffff802`45084e1a : 00000000`00000000 ffffe001`4ebff820 ffffd000`25393200 ffffd000`00000000 : nt!MiPfCompleteInPageSupport+0x3a
ffffd000`253932b0 fffff802`44f2ce67 : ffffd000`25393368 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiPfCompleteCoalescedIo+0x112
ffffd000`25393300 fffff802`44ed5f97 : 00000000`00000000 ffffd000`253933c1 00000000`00000010 ffffe001`4edf4700 : nt!MiPfCompletePrefetchIos+0xbb
ffffd000`25393330 fffff802`452f0413 : 00000000`00000010 ffffe001`4edf4700 ffffd000`000000b0 00000000`00000000 : nt!MiPrefetchVirtualMemory+0x377
ffffd000`25393420 fffff802`452efe66 : 00000000`0000110a 00000000`0000110a 00000000`0000110a 00000000`00000000 : nt!MmPrefetchVirtualMemory+0xe3
ffffd000`25393510 fffff802`452f35f6 : ffffd000`25393620 00000000`00000000 ffffd000`00000009 00000000`00000001 : nt!PfpPrefetchPrivatePages+0x1f2
ffffd000`253935d0 fffff802`452f3ce6 : ffffc000`1dac2000 ffffc000`1dac2000 ffffd000`253937f0 00000000`00000000 : nt!PfpPrefetchRequestPerform+0x22a
ffffd000`25393740 fffff802`452e8a44 : ffffe001`00000001 00000000`00000001 ffffc000`1dac2000 ffffe001`4da9a9f0 : nt!PfpPrefetchRequest+0x11e
ffffd000`253937c0 fffff802`452e7f14 : ffffe001`2e63fcd0 00000000`00000000 00000000`00000000 e0014da9`aa40f101 : nt!PfSetSuperfetchInformation+0x13c
ffffd000`253938a0 fffff802`44feb1b3 : ffffe001`4ba46280 00000044`2d3e90d0 00000000`00000001 00000000`00000000 : nt!NtSetSystemInformation+0x1dc
ffffd000`25393b00 00007ffa`4d4524ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000045`2e63fc68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4d4524ba


CHKIMG_EXTENSION: !chkimg -lo 50 -d !rdbss
    fffff801f185d071 - rdbss!RxProcessException+a9
    [ 8f:8e ]
1 error : !rdbss (fffff801f185d071)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2019-11-11T22:10:49.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  4759

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 000000b500190645
Arg2: ffffd0002fee7fa8
Arg3: ffffd0002fee77b0
Arg4: fffff803d68774d5

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  PA65-UD3-B3

BIOS_VENDOR:  Award Software International, Inc.

BIOS_VERSION:  F12

BIOS_DATE:  03/27/2012

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  PA65-UD3-B3

DUMP_TYPE:  2

BUGCHECK_P1: b500190645

BUGCHECK_P2: ffffd0002fee7fa8

BUGCHECK_P3: ffffd0002fee77b0

BUGCHECK_P4: fffff803d68774d5

EXCEPTION_RECORD:  ffffd0002fee7fa8 -- (.exr 0xffffd0002fee7fa8)
ExceptionAddress: fffff803d68774d5 (nt!ExpApplyPriorityBoost+0x00000000000001d1)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 000000000158074b
Attempt to read from address 000000000158074b

CONTEXT:  ffffd0002fee77b0 -- (.cxr 0xffffd0002fee77b0)
rax=0000000000060004 rbx=0000000000000002 rcx=0000000000000000
rdx=000000000000000e rsi=0000000000000000 rdi=ffffe001b6b8aa10
rip=fffff803d68774d5 rsp=ffffd0002fee81e0 rbp=0000000000000000
r8=0000000000000004  r9=ffffd0002fee8200 r10=0000000000000801
r11=7ffffffffffffffc r12=0000000000000002 r13=000000000000ff01
r14=0000000001580743 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010002
nt!ExpApplyPriorityBoost+0x1d1:
fffff803`d68774d5 458b7e08        mov     r15d,dword ptr [r14+8] ds:002b:00000000`0158074b=????????
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: c15

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 28'00000000 (cache) 28'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  MsMpEng.exe

CURRENT_IRQL:  0

FOLLOWUP_IP:
nt!ExpApplyPriorityBoost+1d1
fffff803`d68774d5 458b7e08        mov     r15d,dword ptr [r14+8]

FAULTING_IP:
nt!ExpApplyPriorityBoost+1d1
fffff803`d68774d5 458b7e08        mov     r15d,dword ptr [r14+8]

BUGCHECK_STR:  0x24

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803d6b72298
GetUlongPtrFromAddress: unable to read from fffff803d6b72520
000000000158074b

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  000000000158074b

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-14-2019 17:39:26.0785

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff803d68777d2 to fffff803d68774d5

STACK_TEXT:
ffffd000`2fee81e0 fffff803`d68777d2 : 00000000`00000701 ffffe001`b6b8aa10 00000000`00000001 ffffe001`b9c3a880 : nt!ExpApplyPriorityBoost+0x1d1
ffffd000`2fee8250 fffff803`d6873bba : ffffe001`b6b8aa10 ffffe001`b6b4abb0 ffffe001`b98137b8 ffffc001`00000000 : nt!ExpWaitForResource+0xd2
ffffd000`2fee8320 fffff801`1eb3c002 : ffffe001`b9813602 ffffe001`b98136d8 ffffd000`2fee8750 00000000`00000000 : nt!ExAcquireResourceExclusiveLite+0x1da
ffffd000`2fee8390 fffff801`1ea30e1c : ffffe001`b98136d8 ffffe001`b73f7180 00000000`00000000 fffff801`1e864061 : Ntfs!NtfsFlushVolume+0x286
ffffd000`2fee84e0 fffff801`1ea44f22 : ffffe001`b98136d8 ffffe001`b926a9f0 ffffe001`b7383de0 ffffc000`f6697501 : Ntfs!NtfsVolumeDasdIo+0x1ec
ffffd000`2fee8580 fffff801`1ea4b6de : ffffe001`b98136d8 ffffe001`b926a9f0 00000000`00000201 ffffd000`2fee8701 : Ntfs!NtfsCommonRead+0x1f82
ffffd000`2fee8720 fffff801`1e802b1e : ffffe001`b8e28b90 ffffe001`b926a9f0 00000000`00000001 ffffe001`b926ad90 : Ntfs!NtfsFsdRead+0x1ee
ffffd000`2fee87d0 fffff801`1e8010c2 : ffffd000`2fee8890 ffffe001`b73fa570 ffffe001`b8f9c6d0 ffffe001`b926a9f0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2ce
ffffd000`2fee8870 fffff803`d6bf5788 : 00000000`00000000 ffffd000`2fee8951 ffffe001`b8f9c6d0 0000001e`00100081 : fltmgr!FltpDispatch+0xb2
ffffd000`2fee88d0 fffff803`d6bf3336 : ffffe001`b8f9c604 ffffe001`b8f9c6d0 00000000`00001478 ffffe001`b8f9c6d0 : nt!IopSynchronousServiceTail+0x170
ffffd000`2fee89a0 fffff803`d696b1b3 : ffffe001`b9c3a880 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x656
ffffd000`2fee8a90 00007ff8`12fa0caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000057`b6a1dc58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`12fa0caa


THREAD_SHA1_HASH_MOD_FUNC:  2d8bbd9f43d9a30b3af3099af01eb12db16d41eb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  3cbfdc7bce892e4af04afdf29067644600087584

THREAD_SHA1_HASH_MOD:  3dbb71349fe7c8519723330f7f0a6ea7498d7325

FAULT_INSTR_CODE:  87e8b45

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExpApplyPriorityBoost+1d1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .cxr 0xffffd0002fee77b0 ; kb

BUCKET_ID_FUNC_OFFSET:  1d1

FAILURE_BUCKET_ID:  0x24_nt!ExpApplyPriorityBoost

BUCKET_ID:  0x24_nt!ExpApplyPriorityBoost

PRIMARY_PROBLEM_CLASS:  0x24_nt!ExpApplyPriorityBoost

TARGET_TIME:  2019-11-13T21:28:20.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  1745

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x24_nt!expapplypriorityboost

FAILURE_ID_HASH:  {99788c13-fb0a-47cc-42e3-cbe4a318052c}

Followup:     MachineOwner
---------
Memtest86 ile HDtune testi yaptım zaten bir çok kez. Temiz görünüyor. Overclock veya XMP var mı yok mu bilmiyorum.
 
Son düzenleme:
WinDbg muhteşem yav. Şimdi hocam, bakalım senin dökümlere.

Sabit diskten bozuk veri geldi diyor sistem. Ya diskin arızalı ya da SATA kablon. Bir ihtimal de RAM.

İkinci dökümde ekran kartı hatası var ama ben pek sanmıyorum ekran kartı olacağını. Sen ilk iş HD Tune 5.75 aç ve Health kısmına bir bak. Bizimle paylaş veriyi.

Kod:
it means the disk subsystem has experienced a failure.

ERROR_CODE: (NTSTATUS) 0xc000003f - {Bozuk CRC}  D ng sel art kl k denetimi (CRC) sa lama toplam  hatas  olu tu.

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware.

Kod:
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: fffff6e000418618, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000003f, error status (normally i/o status code)
Arg3: 0000000085f5e820, current process (virtual address for lock type 3, or PTE)
Arg4: ffffc000830c374c, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 1

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-0L1L0I2

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 1

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  7a

BUGCHECK_P1: fffff6e000418618

BUGCHECK_P2: ffffffffc000003f

BUGCHECK_P3: 85f5e820

BUGCHECK_P4: ffffc000830c374c

ERROR_CODE: (NTSTATUS) 0xc000003f - {Bozuk CRC}  D ng sel art kl k denetimi (CRC) sa lama toplam  hatas  olu tu.

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware.

BLACKBOXDISK: 1

DISKSEC_ORG_ID:  ST35

DISKSEC_MODEL:  ST3500413AS                   

DISKSEC_MANUFACTURING_ID:              6VMS3EA

DISKSEC_ISSUE_DESC_STR: 

DISKSEC_TOTAL_SIZE: 188

DISKSEC_REASON: 1

DISKSEC_PUBLIC_TOTAL_SECTION_SIZE: 54

DISKSEC_PUBLIC_OFFSET: 12c

DISKSEC_PUBLIC_DATA_SIZE: 0

DISKSEC_PRIVATE_TOTAL_SECTION_SIZE: 8

DISKSEC_PRIVATE_OFFSET: 180

DISKSEC_PRIVATE_DATA_SIZE: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  GoogleUpdate.e

TRAP_FRAME:  ffffd00031c49530 -- (.trap 0xffffd00031c49530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc0007c7c4000 rbx=0000000000000000 rcx=0000000000000018
rdx=ffffc0007c3c7000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802896738ea rsp=ffffd00031c496c0 rbp=fffff80289673cb0
 r8=000000000000000f  r9=0000000000000738 r10=ffffc0007c341000
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!CmQueryValueKey+0x1da:
fffff802`896738ea 41f6451001      test    byte ptr [r13+10h],1 ds:00000000`00000010=??
Resetting default scope

STACK_TEXT: 
ffffd000`31c491b8 fffff802`8940eb09 : 00000000`0000007a fffff6e0`00418618 ffffffff`c000003f 00000000`85f5e820 : nt!KeBugCheckEx
ffffd000`31c491c0 fffff802`893236c8 : 00000000`00000002 ffffd000`31c49328 fffff802`895dcdc0 ffffd000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2cc59
ffffd000`31c492b0 fffff802`892d910a : fffff802`895dcdc0 ffffe001`ab42d880 00000000`00000000 fffff802`89323316 : nt!MiIssueHardFault+0x184
ffffd000`31c49370 fffff802`893dbc2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x5ba
ffffd000`31c49530 fffff802`896738ea : ffffc000`7de1e7b0 00000000`00000100 ffffd000`31c49950 00000000`00000000 : nt!KiPageFault+0x12f
ffffd000`31c496c0 fffff802`89676cfa : ffffc000`7de1e7b0 ffffd000`31c49950 00000000`00000002 00000000`0018f850 : nt!CmQueryValueKey+0x1da
ffffd000`31c497a0 fffff802`893dd1b3 : ffffe001`ab42d880 00000000`0008e198 ffffd000`31c49aa8 00000000`00000000 : nt!NtQueryValueKey+0x4aa
ffffd000`31c49a90 00007ff9`53d00dba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e4d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`53d00dba


SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+2cc59

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2cc59

FAILURE_BUCKET_ID:  0x7a_c000003f_nt!_??_::FNODOBFM::_string_

OS_VERSION:  8.1.9600.17415

BUILDLAB_STR:  winblue_r4

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {35f7dc2f-9d4e-79ab-5aab-b1994d114d0f}

Followup:     MachineOwner
---------

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001200, Pool tag value from the pool header
Arg3: 0000000000000000, Contents of the first 4 bytes of the pool header
Arg4: ffffc001157372b0, Address of the block of pool being deallocated

Debugging Details:
------------------

fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock
fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock
fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80372777298
GetUlongPtrFromAddress: unable to read from fffff80372777520
fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-0L1L0I2

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 3

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : Analysis.System
Value: CreateObject


BUGCHECK_CODE: c2

BUGCHECK_P1: 7

BUGCHECK_P2: 1200

BUGCHECK_P3: 0

BUGCHECK_P4: ffffc001157372b0

POOL_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80372777298
GetUlongPtrFromAddress: unable to read from fffff80372777520
fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock
ffffc001157372b0 Paged pool

FREED_POOL_TAG: FMfn

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
ffffd000`21a7c018 fffff803`726b8f5c : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00000000 : nt!KeBugCheckEx
ffffd000`21a7c020 fffff803`725137b1 : 00000000`00000001 ffffd000`21a7c239 ffffc001`1c767c70 ffffe001`00000000 : nt!ExDeferredFreePool+0x6ec
ffffd000`21a7c110 fffff801`db6b6c32 : ffffe001`f46ea540 ffffc001`1c767c70 ffffd000`21a7c168 ffffd000`00000005 : nt!ExDeletePagedLookasideList+0x3d
ffffd000`21a7c140 fffff801`db6e6447 : 00000000`00000000 fffff801`db6dc057 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_LINEAR_POOL::`scalar deleting destructor'+0xe
ffffd000`21a7c170 fffff801`db6dc83b : ffffc001`1bc6df80 ffffd000`21a7c239 ffffc001`1c767c70 ffffe001`f46146f0 : dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0xb7
ffffd000`21a7c1b0 fffff801`db6dbe14 : ffffe001`f5a69000 ffffc001`1cb535c0 00000000`00000001 ffffe001`f5a69000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x4cb
ffffd000`21a7c2a0 fffff801`db6dbc32 : ffffc001`1cc4b210 fffff801`00000000 ffffc001`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x194
ffffd000`21a7c420 fffff801`db497cf2 : ffffc001`17125220 00000000`00000000 ffffc001`140207a0 ffffe001`00000007 : dxgmms1!VIDMM_GLOBAL::CloseAllocation+0x52
ffffd000`21a7c460 fffff801`db480cde : ffffc001`1cc4b210 00000000`00000000 00000000`00000000 ffffc001`17125220 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x752
ffffd000`21a7c560 fffff801`db4820ab : ffffc001`1b404000 ffffd000`21a7c649 00000000`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x172
ffffd000`21a7c5c0 fffff801`db4a3a05 : ffffc001`1b404000 ffffc001`140207a0 ffffc001`140207a0 fffff960`00500f60 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xa7
ffffd000`21a7c5f0 fffff801`db488bfd : ffffd000`2c930180 ffffc001`140207a0 fffff901`40679108 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x2dd
ffffd000`21a7c6b0 fffff960`001b7e83 : 00000000`00000d28 ffffd000`21a7c8a0 fffff901`40679010 ffffe001`f41c2580 : dxgkrnl!DxgkProcessCallout+0x135
ffffd000`21a7c710 fffff960`001b9353 : fffff901`40679010 ffffe001`f41c2580 00000000`00000000 fffff580`10804000 : win32k!GdiProcessCallout+0x1f7
ffffd000`21a7c790 fffff803`727eb606 : ffffd000`21a7c8a0 ffffd000`21a7c840 00000000`00000000 00060030`00010002 : win32k!W32pProcessCallout+0x53
ffffd000`21a7c7c0 fffff803`727ea834 : ffffe001`f588acf0 00000000`00000000 00000000`00000000 ffffe001`f41c2848 : nt!PsInvokeWin32Callout+0x42
ffffd000`21a7c800 fffff803`728b8968 : ffffe001`00000000 ffffe001`f541d080 ffffd000`21a7cb00 ffffe001`f541d128 : nt!PspExitThread+0x518
ffffd000`21a7c910 fffff803`7244336a : ffffe001`f541d180 00000000`00000000 00000000`00000000 00000000`00000002 : nt!KiSchedulerApcTerminate+0x18
ffffd000`21a7c940 fffff803`725698c0 : 00000000`000002f4 ffffd000`21a7c9c0 fffff803`724425d4 00000000`00000000 : nt!KiDeliverApc+0x2fa
ffffd000`21a7c9c0 fffff803`7257025a : ffffe001`f541d080 00000000`000080e8 ffffd000`21a7cad8 ffffe001`f67b71f0 : nt!KiInitiateUserApc+0x70
ffffd000`21a7cb00 00007ffe`a4230c8a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000084`6b6ff458 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a4230c8a


SYMBOL_NAME: dxgmms1!VIDMM_LINEAR_POOL::`scalar deleting destructor'+e

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

IMAGE_VERSION: 6.3.9600.17415

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: e

FAILURE_BUCKET_ID: 0xc2_7_FMfn_dxgmms1!VIDMM_LINEAR_POOL::_scalar_deleting_destructor_

OS_VERSION: 8.1.9600.17415

BUILDLAB_STR: winblue_r4

OSPLATFORM_TYPE: x64

OSNAME: Windows 8.1

FAILURE_ID_HASH: {598b7d95-3963-4217-750c-d30122058275}

Followup: MachineOwner
---------
 
WinDbg muhteşem yav. Şimdi hocam, bakalım senin dökümlere.

Sabit diskten bozuk veri geldi diyor sistem. Ya diskin arızalı ya da SATA kablon. Bir ihtimal de RAM.

İkinci dökümde ekran kartı hatası var ama ben pek sanmıyorum ekran kartı olacağını. Sen ilk iş HD Tune 5.75 aç ve Health kısmına bir bak. Bizimle paylaş veriyi.

Kod:
it means the disk subsystem has experienced a failure.

ERROR_CODE: (NTSTATUS) 0xc000003f - {Bozuk CRC}  D ng sel art kl k denetimi (CRC) sa lama toplam  hatas  olu tu.

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware.

Kod:
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: fffff6e000418618, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000003f, error status (normally i/o status code)
Arg3: 0000000085f5e820, current process (virtual address for lock type 3, or PTE)
Arg4: ffffc000830c374c, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 1

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-0L1L0I2

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 1

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  7a

BUGCHECK_P1: fffff6e000418618

BUGCHECK_P2: ffffffffc000003f

BUGCHECK_P3: 85f5e820

BUGCHECK_P4: ffffc000830c374c

ERROR_CODE: (NTSTATUS) 0xc000003f - {Bozuk CRC}  D ng sel art kl k denetimi (CRC) sa lama toplam  hatas  olu tu.

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware.

BLACKBOXDISK: 1

DISKSEC_ORG_ID:  ST35

DISKSEC_MODEL:  ST3500413AS                  

DISKSEC_MANUFACTURING_ID:              6VMS3EA

DISKSEC_ISSUE_DESC_STR:

DISKSEC_TOTAL_SIZE: 188

DISKSEC_REASON: 1

DISKSEC_PUBLIC_TOTAL_SECTION_SIZE: 54

DISKSEC_PUBLIC_OFFSET: 12c

DISKSEC_PUBLIC_DATA_SIZE: 0

DISKSEC_PRIVATE_TOTAL_SECTION_SIZE: 8

DISKSEC_PRIVATE_OFFSET: 180

DISKSEC_PRIVATE_DATA_SIZE: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  GoogleUpdate.e

TRAP_FRAME:  ffffd00031c49530 -- (.trap 0xffffd00031c49530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc0007c7c4000 rbx=0000000000000000 rcx=0000000000000018
rdx=ffffc0007c3c7000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802896738ea rsp=ffffd00031c496c0 rbp=fffff80289673cb0
r8=000000000000000f  r9=0000000000000738 r10=ffffc0007c341000
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!CmQueryValueKey+0x1da:
fffff802`896738ea 41f6451001      test    byte ptr [r13+10h],1 ds:00000000`00000010=??
Resetting default scope

STACK_TEXT:
ffffd000`31c491b8 fffff802`8940eb09 : 00000000`0000007a fffff6e0`00418618 ffffffff`c000003f 00000000`85f5e820 : nt!KeBugCheckEx
ffffd000`31c491c0 fffff802`893236c8 : 00000000`00000002 ffffd000`31c49328 fffff802`895dcdc0 ffffd000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2cc59
ffffd000`31c492b0 fffff802`892d910a : fffff802`895dcdc0 ffffe001`ab42d880 00000000`00000000 fffff802`89323316 : nt!MiIssueHardFault+0x184
ffffd000`31c49370 fffff802`893dbc2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x5ba
ffffd000`31c49530 fffff802`896738ea : ffffc000`7de1e7b0 00000000`00000100 ffffd000`31c49950 00000000`00000000 : nt!KiPageFault+0x12f
ffffd000`31c496c0 fffff802`89676cfa : ffffc000`7de1e7b0 ffffd000`31c49950 00000000`00000002 00000000`0018f850 : nt!CmQueryValueKey+0x1da
ffffd000`31c497a0 fffff802`893dd1b3 : ffffe001`ab42d880 00000000`0008e198 ffffd000`31c49aa8 00000000`00000000 : nt!NtQueryValueKey+0x4aa
ffffd000`31c49a90 00007ff9`53d00dba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e4d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`53d00dba


SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+2cc59

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2cc59

FAILURE_BUCKET_ID:  0x7a_c000003f_nt!_??_::FNODOBFM::_string_

OS_VERSION:  8.1.9600.17415

BUILDLAB_STR:  winblue_r4

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {35f7dc2f-9d4e-79ab-5aab-b1994d114d0f}

Followup:     MachineOwner
---------

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001200, Pool tag value from the pool header
Arg3: 0000000000000000, Contents of the first 4 bytes of the pool header
Arg4: ffffc001157372b0, Address of the block of pool being deallocated

Debugging Details:
------------------

fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock
fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock
fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80372777298
GetUlongPtrFromAddress: unable to read from fffff80372777520
fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-0L1L0I2

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 3

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : Analysis.System
Value: CreateObject


BUGCHECK_CODE: c2

BUGCHECK_P1: 7

BUGCHECK_P2: 1200

BUGCHECK_P3: 0

BUGCHECK_P4: ffffc001157372b0

POOL_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80372777298
GetUlongPtrFromAddress: unable to read from fffff80372777520
fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock
ffffc001157372b0 Paged pool

FREED_POOL_TAG: FMfn

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
ffffd000`21a7c018 fffff803`726b8f5c : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00000000 : nt!KeBugCheckEx
ffffd000`21a7c020 fffff803`725137b1 : 00000000`00000001 ffffd000`21a7c239 ffffc001`1c767c70 ffffe001`00000000 : nt!ExDeferredFreePool+0x6ec
ffffd000`21a7c110 fffff801`db6b6c32 : ffffe001`f46ea540 ffffc001`1c767c70 ffffd000`21a7c168 ffffd000`00000005 : nt!ExDeletePagedLookasideList+0x3d
ffffd000`21a7c140 fffff801`db6e6447 : 00000000`00000000 fffff801`db6dc057 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_LINEAR_POOL::`scalar deleting destructor'+0xe
ffffd000`21a7c170 fffff801`db6dc83b : ffffc001`1bc6df80 ffffd000`21a7c239 ffffc001`1c767c70 ffffe001`f46146f0 : dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0xb7
ffffd000`21a7c1b0 fffff801`db6dbe14 : ffffe001`f5a69000 ffffc001`1cb535c0 00000000`00000001 ffffe001`f5a69000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x4cb
ffffd000`21a7c2a0 fffff801`db6dbc32 : ffffc001`1cc4b210 fffff801`00000000 ffffc001`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x194
ffffd000`21a7c420 fffff801`db497cf2 : ffffc001`17125220 00000000`00000000 ffffc001`140207a0 ffffe001`00000007 : dxgmms1!VIDMM_GLOBAL::CloseAllocation+0x52
ffffd000`21a7c460 fffff801`db480cde : ffffc001`1cc4b210 00000000`00000000 00000000`00000000 ffffc001`17125220 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x752
ffffd000`21a7c560 fffff801`db4820ab : ffffc001`1b404000 ffffd000`21a7c649 00000000`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x172
ffffd000`21a7c5c0 fffff801`db4a3a05 : ffffc001`1b404000 ffffc001`140207a0 ffffc001`140207a0 fffff960`00500f60 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xa7
ffffd000`21a7c5f0 fffff801`db488bfd : ffffd000`2c930180 ffffc001`140207a0 fffff901`40679108 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x2dd
ffffd000`21a7c6b0 fffff960`001b7e83 : 00000000`00000d28 ffffd000`21a7c8a0 fffff901`40679010 ffffe001`f41c2580 : dxgkrnl!DxgkProcessCallout+0x135
ffffd000`21a7c710 fffff960`001b9353 : fffff901`40679010 ffffe001`f41c2580 00000000`00000000 fffff580`10804000 : win32k!GdiProcessCallout+0x1f7
ffffd000`21a7c790 fffff803`727eb606 : ffffd000`21a7c8a0 ffffd000`21a7c840 00000000`00000000 00060030`00010002 : win32k!W32pProcessCallout+0x53
ffffd000`21a7c7c0 fffff803`727ea834 : ffffe001`f588acf0 00000000`00000000 00000000`00000000 ffffe001`f41c2848 : nt!PsInvokeWin32Callout+0x42
ffffd000`21a7c800 fffff803`728b8968 : ffffe001`00000000 ffffe001`f541d080 ffffd000`21a7cb00 ffffe001`f541d128 : nt!PspExitThread+0x518
ffffd000`21a7c910 fffff803`7244336a : ffffe001`f541d180 00000000`00000000 00000000`00000000 00000000`00000002 : nt!KiSchedulerApcTerminate+0x18
ffffd000`21a7c940 fffff803`725698c0 : 00000000`000002f4 ffffd000`21a7c9c0 fffff803`724425d4 00000000`00000000 : nt!KiDeliverApc+0x2fa
ffffd000`21a7c9c0 fffff803`7257025a : ffffe001`f541d080 00000000`000080e8 ffffd000`21a7cad8 ffffe001`f67b71f0 : nt!KiInitiateUserApc+0x70
ffffd000`21a7cb00 00007ffe`a4230c8a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000084`6b6ff458 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a4230c8a


SYMBOL_NAME: dxgmms1!VIDMM_LINEAR_POOL::`scalar deleting destructor'+e

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

IMAGE_VERSION: 6.3.9600.17415

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: e

FAILURE_BUCKET_ID: 0xc2_7_FMfn_dxgmms1!VIDMM_LINEAR_POOL::_scalar_deleting_destructor_

OS_VERSION: 8.1.9600.17415

BUILDLAB_STR: winblue_r4

OSPLATFORM_TYPE: x64

OSNAME: Windows 8.1

FAILURE_ID_HASH: {598b7d95-3963-4217-750c-d30122058275}

Followup: MachineOwner
---------
@Recep Baltaş Bilgisayarım açılır açılmaz sürekli mavi ekran verdiğinden Windows 7 kurdum buradan indirdim programı.
1573815335665.png
 
Uyarı! Bu konu 7 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı