*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd000b0f864f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd000b0f86448, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: PA65-UD3-B3
BIOS_VENDOR: Award Software International, Inc.
BIOS_VERSION: F12
BIOS_DATE: 03/27/2012
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: PA65-UD3-B3
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd000b0f864f0
BUGCHECK_P3: ffffd000b0f86448
BUGCHECK_P4: 0
TRAP_FRAME: ffffd000b0f864f0 -- (.trap 0xffffd000b0f864f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe0005cf1a070 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800a03d46af rsp=ffffd000b0f86680 rbp=ffffc0001ccbe620
r8=0000000000000000 r9=fffff8009fe80000 r10=ffffd000b0737500
r11=ffffc0001ccbe600 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt! ?? ::NNGAKEGL::`string'+0x264ff:
fffff800`a03d46af cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd000b0f86448 -- (.exr 0xffffd000b0f86448)
ExceptionAddress: fffff800a03d46af (nt! ?? ::NNGAKEGL::`string'+0x00000000000264ff)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 4
CPU_MHZ: c15
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 28'00000000 (cache) 28'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-14-2019 17:39:35.0127
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8009ffdc4e9 to fffff8009ffd09a0
STACK_TEXT:
ffffd000`b0f861c8 fffff800`9ffdc4e9 : 00000000`00000139 00000000`00000003 ffffd000`b0f864f0 ffffd000`b0f86448 : nt!KeBugCheckEx
ffffd000`b0f861d0 fffff800`9ffdc810 : 00000000`00000000 fffff800`9feef57a ffffd000`b0735180 ffffd000`b0735180 : nt!KiBugCheckDispatch+0x69
ffffd000`b0f86310 fffff800`9ffdba34 : ffffe000`5ef53210 ffffe000`5c144970 ffffc000`1ccbe600 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd000`b0f864f0 fffff800`a03d46af : ffffc000`1ccbe620 ffffffff`ffffffff 00000000`00000000 ffffe000`5cef3570 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`b0f86680 fffff800`a028650c : ffffe000`5cef3570 ffffc000`1ccbe630 ffffc000`1ccbe630 ffffe000`5cef3570 : nt! ?? ::NNGAKEGL::`string'+0x264ff
ffffd000`b0f866b0 fffff800`a0248dd0 : 00000000`00000000 ffffe000`5cef3570 ffffe000`5c144970 ffffe000`5cef3540 : nt!AlpcpDeletePort+0x148
ffffd000`b0f866f0 fffff800`9fed9c5f : 00000000`00000000 00000000`000001a8 ffffe000`5cef3570 ffffe000`5cef3570 : nt!ObpRemoveObjectRoutine+0x64
ffffd000`b0f86750 fffff800`a02c1d3b : 00000000`00000000 00000000`ffff8020 00000000`00000000 fffff800`00000001 : nt!ObfDereferenceObjectWithTag+0x8f
ffffd000`b0f86790 fffff800`a02c25ca : ffffd000`ac7c0100 fffff800`a0264600 00000000`00000001 00000000`00000000 : nt!ObCloseHandleTableEntry+0x33f
ffffd000`b0f86860 fffff800`a0235071 : 00000000`00040001 ffffd000`b0f869c0 ffffe000`5c65d900 ffffe000`5f4c0880 : nt!ExSweepHandleTable+0xba
ffffd000`b0f868c0 fffff800`a0234d80 : 00000000`00040000 00000000`00000000 00000000`00000000 fffff800`a023a1c2 : nt!ObKillProcess+0x31
ffffd000`b0f868f0 fffff800`a025688f : ffffe000`5c65d900 ffffc000`1a87a650 ffffd000`b0f869c0 00000000`00000000 : nt!PspRundownSingleProcess+0xa4
ffffd000`b0f86980 fffff800`a02dc081 : 00000000`800704c7 00000000`00000000 ffffe000`5c65d900 ffffe000`5f4c0880 : nt!PspExitThread+0x573
ffffd000`b0f86a90 fffff800`9ffdc1b3 : ffffe000`5c65d900 ffffe000`5f4c0880 ffffd000`b0f86b80 00000000`00000000 : nt!NtTerminateProcess+0xfd
ffffd000`b0f86b00 00000000`77582352 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0264ea28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77582352
THREAD_SHA1_HASH_MOD_FUNC: 704c7b2758abf6c3e9ff8cac6d67b9dd24a512b9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 26f42a6f970c02c16e75e9cace85663c1215688f
THREAD_SHA1_HASH_MOD: 38bc5fec3f0409c265cf5c87da6f8f8859d0711c
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff800`9ffdc810 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 54503718
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
TARGET_TIME: 2019-11-12T20:40:36.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: 795
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: fffff6fc00f8c2e8, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000003f, error status (normally i/o status code)
Arg3: 0000000086e0a860, current process (virtual address for lock type 3, or PTE)
Arg4: fffff801f185d000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
GetPointerFromAddress: unable to read from fffff802451f20e8
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: PA65-UD3-B3
BIOS_VENDOR: Award Software International, Inc.
BIOS_VERSION: F12
BIOS_DATE: 03/27/2012
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: PA65-UD3-B3
DUMP_TYPE: 2
BUGCHECK_P1: fffff6fc00f8c2e8
BUGCHECK_P2: ffffffffc000003f
BUGCHECK_P3: 86e0a860
BUGCHECK_P4: fffff801f185d000
ERROR_CODE: (NTSTATUS) 0xc000003f - <Unable to get error code text>
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware.
BUGCHECK_STR: 0x7a_c000003f
CPU_COUNT: 4
CPU_MHZ: c15
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 28'00000000 (cache) 28'00000000 (init)
BLACKBOXDISK: 1
DISKSEC_ORG_ID: ST35
DISKSEC_MODEL: ST3500413AS
DISKSEC_MANUFACTURING_ID: 6VMS3EA
DISKSEC_ISSUE_DESC_STR:
DISKSEC_TOTAL_SIZE: 188
DISKSEC_REASON: 1
DISKSEC_PUBLIC_TOTAL_SECTION_SIZE: 54
DISKSEC_PUBLIC_OFFSET: 12c
DISKSEC_PUBLIC_DATA_SIZE: 0
DISKSEC_PRIVATE_TOTAL_SECTION_SIZE: 8
DISKSEC_PRIVATE_OFFSET: 180
DISKSEC_PRIVATE_DATA_SIZE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-14-2019 17:39:30.0611
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8024501cb09 to fffff80244fdf9a0
STACK_TEXT:
ffffd000`25393178 fffff802`4501cb09 : 00000000`0000007a fffff6fc`00f8c2e8 ffffffff`c000003f 00000000`86e0a860 : nt!KeBugCheckEx
ffffd000`25393180 fffff802`44f2ceb6 : ffffd000`253933d0 00000000`00000000 fffff802`451eaec0 ffffe001`00000000 : nt! ?? ::FNODOBFM::`string'+0x2cc59
ffffd000`25393270 fffff802`45084e1a : 00000000`00000000 ffffe001`4ebff820 ffffd000`25393200 ffffd000`00000000 : nt!MiPfCompleteInPageSupport+0x3a
ffffd000`253932b0 fffff802`44f2ce67 : ffffd000`25393368 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiPfCompleteCoalescedIo+0x112
ffffd000`25393300 fffff802`44ed5f97 : 00000000`00000000 ffffd000`253933c1 00000000`00000010 ffffe001`4edf4700 : nt!MiPfCompletePrefetchIos+0xbb
ffffd000`25393330 fffff802`452f0413 : 00000000`00000010 ffffe001`4edf4700 ffffd000`000000b0 00000000`00000000 : nt!MiPrefetchVirtualMemory+0x377
ffffd000`25393420 fffff802`452efe66 : 00000000`0000110a 00000000`0000110a 00000000`0000110a 00000000`00000000 : nt!MmPrefetchVirtualMemory+0xe3
ffffd000`25393510 fffff802`452f35f6 : ffffd000`25393620 00000000`00000000 ffffd000`00000009 00000000`00000001 : nt!PfpPrefetchPrivatePages+0x1f2
ffffd000`253935d0 fffff802`452f3ce6 : ffffc000`1dac2000 ffffc000`1dac2000 ffffd000`253937f0 00000000`00000000 : nt!PfpPrefetchRequestPerform+0x22a
ffffd000`25393740 fffff802`452e8a44 : ffffe001`00000001 00000000`00000001 ffffc000`1dac2000 ffffe001`4da9a9f0 : nt!PfpPrefetchRequest+0x11e
ffffd000`253937c0 fffff802`452e7f14 : ffffe001`2e63fcd0 00000000`00000000 00000000`00000000 e0014da9`aa40f101 : nt!PfSetSuperfetchInformation+0x13c
ffffd000`253938a0 fffff802`44feb1b3 : ffffe001`4ba46280 00000044`2d3e90d0 00000000`00000001 00000000`00000000 : nt!NtSetSystemInformation+0x1dc
ffffd000`25393b00 00007ffa`4d4524ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000045`2e63fc68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4d4524ba
CHKIMG_EXTENSION: !chkimg -lo 50 -d !rdbss
fffff801f185d071 - rdbss!RxProcessException+a9
[ 8f:8e ]
1 error : !rdbss (fffff801f185d071)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2019-11-11T22:10:49.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: 4759
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 000000b500190645
Arg2: ffffd0002fee7fa8
Arg3: ffffd0002fee77b0
Arg4: fffff803d68774d5
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: PA65-UD3-B3
BIOS_VENDOR: Award Software International, Inc.
BIOS_VERSION: F12
BIOS_DATE: 03/27/2012
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: PA65-UD3-B3
DUMP_TYPE: 2
BUGCHECK_P1: b500190645
BUGCHECK_P2: ffffd0002fee7fa8
BUGCHECK_P3: ffffd0002fee77b0
BUGCHECK_P4: fffff803d68774d5
EXCEPTION_RECORD: ffffd0002fee7fa8 -- (.exr 0xffffd0002fee7fa8)
ExceptionAddress: fffff803d68774d5 (nt!ExpApplyPriorityBoost+0x00000000000001d1)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000000000158074b
Attempt to read from address 000000000158074b
CONTEXT: ffffd0002fee77b0 -- (.cxr 0xffffd0002fee77b0)
rax=0000000000060004 rbx=0000000000000002 rcx=0000000000000000
rdx=000000000000000e rsi=0000000000000000 rdi=ffffe001b6b8aa10
rip=fffff803d68774d5 rsp=ffffd0002fee81e0 rbp=0000000000000000
r8=0000000000000004 r9=ffffd0002fee8200 r10=0000000000000801
r11=7ffffffffffffffc r12=0000000000000002 r13=000000000000ff01
r14=0000000001580743 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010002
nt!ExpApplyPriorityBoost+0x1d1:
fffff803`d68774d5 458b7e08 mov r15d,dword ptr [r14+8] ds:002b:00000000`0158074b=????????
Resetting default scope
CPU_COUNT: 4
CPU_MHZ: c15
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 28'00000000 (cache) 28'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 0
FOLLOWUP_IP:
nt!ExpApplyPriorityBoost+1d1
fffff803`d68774d5 458b7e08 mov r15d,dword ptr [r14+8]
FAULTING_IP:
nt!ExpApplyPriorityBoost+1d1
fffff803`d68774d5 458b7e08 mov r15d,dword ptr [r14+8]
BUGCHECK_STR: 0x24
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803d6b72298
GetUlongPtrFromAddress: unable to read from fffff803d6b72520
000000000158074b
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000000000158074b
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-14-2019 17:39:26.0785
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff803d68777d2 to fffff803d68774d5
STACK_TEXT:
ffffd000`2fee81e0 fffff803`d68777d2 : 00000000`00000701 ffffe001`b6b8aa10 00000000`00000001 ffffe001`b9c3a880 : nt!ExpApplyPriorityBoost+0x1d1
ffffd000`2fee8250 fffff803`d6873bba : ffffe001`b6b8aa10 ffffe001`b6b4abb0 ffffe001`b98137b8 ffffc001`00000000 : nt!ExpWaitForResource+0xd2
ffffd000`2fee8320 fffff801`1eb3c002 : ffffe001`b9813602 ffffe001`b98136d8 ffffd000`2fee8750 00000000`00000000 : nt!ExAcquireResourceExclusiveLite+0x1da
ffffd000`2fee8390 fffff801`1ea30e1c : ffffe001`b98136d8 ffffe001`b73f7180 00000000`00000000 fffff801`1e864061 : Ntfs!NtfsFlushVolume+0x286
ffffd000`2fee84e0 fffff801`1ea44f22 : ffffe001`b98136d8 ffffe001`b926a9f0 ffffe001`b7383de0 ffffc000`f6697501 : Ntfs!NtfsVolumeDasdIo+0x1ec
ffffd000`2fee8580 fffff801`1ea4b6de : ffffe001`b98136d8 ffffe001`b926a9f0 00000000`00000201 ffffd000`2fee8701 : Ntfs!NtfsCommonRead+0x1f82
ffffd000`2fee8720 fffff801`1e802b1e : ffffe001`b8e28b90 ffffe001`b926a9f0 00000000`00000001 ffffe001`b926ad90 : Ntfs!NtfsFsdRead+0x1ee
ffffd000`2fee87d0 fffff801`1e8010c2 : ffffd000`2fee8890 ffffe001`b73fa570 ffffe001`b8f9c6d0 ffffe001`b926a9f0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2ce
ffffd000`2fee8870 fffff803`d6bf5788 : 00000000`00000000 ffffd000`2fee8951 ffffe001`b8f9c6d0 0000001e`00100081 : fltmgr!FltpDispatch+0xb2
ffffd000`2fee88d0 fffff803`d6bf3336 : ffffe001`b8f9c604 ffffe001`b8f9c6d0 00000000`00001478 ffffe001`b8f9c6d0 : nt!IopSynchronousServiceTail+0x170
ffffd000`2fee89a0 fffff803`d696b1b3 : ffffe001`b9c3a880 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x656
ffffd000`2fee8a90 00007ff8`12fa0caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000057`b6a1dc58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`12fa0caa
THREAD_SHA1_HASH_MOD_FUNC: 2d8bbd9f43d9a30b3af3099af01eb12db16d41eb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3cbfdc7bce892e4af04afdf29067644600087584
THREAD_SHA1_HASH_MOD: 3dbb71349fe7c8519723330f7f0a6ea7498d7325
FAULT_INSTR_CODE: 87e8b45
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExpApplyPriorityBoost+1d1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 54503718
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .cxr 0xffffd0002fee77b0 ; kb
BUCKET_ID_FUNC_OFFSET: 1d1
FAILURE_BUCKET_ID: 0x24_nt!ExpApplyPriorityBoost
BUCKET_ID: 0x24_nt!ExpApplyPriorityBoost
PRIMARY_PROBLEM_CLASS: 0x24_nt!ExpApplyPriorityBoost
TARGET_TIME: 2019-11-13T21:28:20.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: 1745
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x24_nt!expapplypriorityboost
FAILURE_ID_HASH: {99788c13-fb0a-47cc-42e3-cbe4a318052c}
Followup: MachineOwner
---------
Memtest86 ile HDtune testi yaptım zaten bir çok kez. Temiz görünüyor. Overclock veya XMP var mı yok mu bilmiyorum.Sistem der Overclock veya XMP var mı?
Memtest86 ile HDtune testi yap sonuçları paylaş.
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: ffffd000b0f864f0, Address of the trap frame for the exception that caused the bugcheck Arg3: ffffd000b0f86448, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500 SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd. SYSTEM_PRODUCT_NAME: PA65-UD3-B3 BIOS_VENDOR: Award Software International, Inc. BIOS_VERSION: F12 BIOS_DATE: 03/27/2012 BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd. BASEBOARD_PRODUCT: PA65-UD3-B3 DUMP_TYPE: 2 BUGCHECK_P1: 3 BUGCHECK_P2: ffffd000b0f864f0 BUGCHECK_P3: ffffd000b0f86448 BUGCHECK_P4: 0 TRAP_FRAME: ffffd000b0f864f0 -- (.trap 0xffffd000b0f864f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffe0005cf1a070 rbx=0000000000000000 rcx=0000000000000003 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800a03d46af rsp=ffffd000b0f86680 rbp=ffffc0001ccbe620 r8=0000000000000000 r9=fffff8009fe80000 r10=ffffd000b0737500 r11=ffffc0001ccbe600 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po cy nt! ?? ::NNGAKEGL::`string'+0x264ff: fffff800`a03d46af cd29 int 29h Resetting default scope EXCEPTION_RECORD: ffffd000b0f86448 -- (.exr 0xffffd000b0f86448) ExceptionAddress: fffff800a03d46af (nt! ?? ::NNGAKEGL::`string'+0x00000000000264ff) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000003 Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY CPU_COUNT: 4 CPU_MHZ: c15 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 2a CPU_STEPPING: 7 CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 28'00000000 (cache) 28'00000000 (init) CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x139 PROCESS_NAME: WerFault.exe CURRENT_IRQL: 0 DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000003 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 11-14-2019 17:39:35.0127 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8009ffdc4e9 to fffff8009ffd09a0 STACK_TEXT: ffffd000`b0f861c8 fffff800`9ffdc4e9 : 00000000`00000139 00000000`00000003 ffffd000`b0f864f0 ffffd000`b0f86448 : nt!KeBugCheckEx ffffd000`b0f861d0 fffff800`9ffdc810 : 00000000`00000000 fffff800`9feef57a ffffd000`b0735180 ffffd000`b0735180 : nt!KiBugCheckDispatch+0x69 ffffd000`b0f86310 fffff800`9ffdba34 : ffffe000`5ef53210 ffffe000`5c144970 ffffc000`1ccbe600 00000000`00000000 : nt!KiFastFailDispatch+0xd0 ffffd000`b0f864f0 fffff800`a03d46af : ffffc000`1ccbe620 ffffffff`ffffffff 00000000`00000000 ffffe000`5cef3570 : nt!KiRaiseSecurityCheckFailure+0xf4 ffffd000`b0f86680 fffff800`a028650c : ffffe000`5cef3570 ffffc000`1ccbe630 ffffc000`1ccbe630 ffffe000`5cef3570 : nt! ?? ::NNGAKEGL::`string'+0x264ff ffffd000`b0f866b0 fffff800`a0248dd0 : 00000000`00000000 ffffe000`5cef3570 ffffe000`5c144970 ffffe000`5cef3540 : nt!AlpcpDeletePort+0x148 ffffd000`b0f866f0 fffff800`9fed9c5f : 00000000`00000000 00000000`000001a8 ffffe000`5cef3570 ffffe000`5cef3570 : nt!ObpRemoveObjectRoutine+0x64 ffffd000`b0f86750 fffff800`a02c1d3b : 00000000`00000000 00000000`ffff8020 00000000`00000000 fffff800`00000001 : nt!ObfDereferenceObjectWithTag+0x8f ffffd000`b0f86790 fffff800`a02c25ca : ffffd000`ac7c0100 fffff800`a0264600 00000000`00000001 00000000`00000000 : nt!ObCloseHandleTableEntry+0x33f ffffd000`b0f86860 fffff800`a0235071 : 00000000`00040001 ffffd000`b0f869c0 ffffe000`5c65d900 ffffe000`5f4c0880 : nt!ExSweepHandleTable+0xba ffffd000`b0f868c0 fffff800`a0234d80 : 00000000`00040000 00000000`00000000 00000000`00000000 fffff800`a023a1c2 : nt!ObKillProcess+0x31 ffffd000`b0f868f0 fffff800`a025688f : ffffe000`5c65d900 ffffc000`1a87a650 ffffd000`b0f869c0 00000000`00000000 : nt!PspRundownSingleProcess+0xa4 ffffd000`b0f86980 fffff800`a02dc081 : 00000000`800704c7 00000000`00000000 ffffe000`5c65d900 ffffe000`5f4c0880 : nt!PspExitThread+0x573 ffffd000`b0f86a90 fffff800`9ffdc1b3 : ffffe000`5c65d900 ffffe000`5f4c0880 ffffd000`b0f86b80 00000000`00000000 : nt!NtTerminateProcess+0xfd ffffd000`b0f86b00 00000000`77582352 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0264ea28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77582352 THREAD_SHA1_HASH_MOD_FUNC: 704c7b2758abf6c3e9ff8cac6d67b9dd24a512b9 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 26f42a6f970c02c16e75e9cace85663c1215688f THREAD_SHA1_HASH_MOD: 38bc5fec3f0409c265cf5c87da6f8f8859d0711c FOLLOWUP_IP: nt!KiFastFailDispatch+d0 fffff800`9ffdc810 c644242000 mov byte ptr [rsp+20h],0 FAULT_INSTR_CODE: 202444c6 SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!KiFastFailDispatch+d0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 54503718 IMAGE_VERSION: 6.3.9600.17415 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: d0 FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch TARGET_TIME: 2019-11-12T20:40:36.000Z OSBUILD: 9600 OSSERVICEPACK: 17415 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2014-10-29 03:38:48 BUILDDATESTAMP_STR: 141028-1500 BUILDLAB_STR: winblue_r4 BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500 ANALYSIS_SESSION_ELAPSED_TIME: 795 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_DATA_INPAGE_ERROR (7a) The requested page of kernel data could not be read in. Typically caused by a bad block in the paging file or disk controller error. Also see KERNEL_STACK_INPAGE_ERROR. If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185, it means the disk subsystem has experienced a failure. If the error status is 0xC000009A, then it means the request failed because a filesystem failed to make forward progress. Arguments: Arg1: fffff6fc00f8c2e8, lock type that was held (value 1,2,3, or PTE address) Arg2: ffffffffc000003f, error status (normally i/o status code) Arg3: 0000000086e0a860, current process (virtual address for lock type 3, or PTE) Arg4: fffff801f185d000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address) Debugging Details: ------------------ GetPointerFromAddress: unable to read from fffff802451f20e8 *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500 SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd. SYSTEM_PRODUCT_NAME: PA65-UD3-B3 BIOS_VENDOR: Award Software International, Inc. BIOS_VERSION: F12 BIOS_DATE: 03/27/2012 BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd. BASEBOARD_PRODUCT: PA65-UD3-B3 DUMP_TYPE: 2 BUGCHECK_P1: fffff6fc00f8c2e8 BUGCHECK_P2: ffffffffc000003f BUGCHECK_P3: 86e0a860 BUGCHECK_P4: fffff801f185d000 ERROR_CODE: (NTSTATUS) 0xc000003f - <Unable to get error code text> ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware. BUGCHECK_STR: 0x7a_c000003f CPU_COUNT: 4 CPU_MHZ: c15 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 2a CPU_STEPPING: 7 CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 28'00000000 (cache) 28'00000000 (init) BLACKBOXDISK: 1 DISKSEC_ORG_ID: ST35 DISKSEC_MODEL: ST3500413AS DISKSEC_MANUFACTURING_ID: 6VMS3EA DISKSEC_ISSUE_DESC_STR: DISKSEC_TOTAL_SIZE: 188 DISKSEC_REASON: 1 DISKSEC_PUBLIC_TOTAL_SECTION_SIZE: 54 DISKSEC_PUBLIC_OFFSET: 12c DISKSEC_PUBLIC_DATA_SIZE: 0 DISKSEC_PRIVATE_TOTAL_SECTION_SIZE: 8 DISKSEC_PRIVATE_OFFSET: 180 DISKSEC_PRIVATE_DATA_SIZE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 11-14-2019 17:39:30.0611 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8024501cb09 to fffff80244fdf9a0 STACK_TEXT: ffffd000`25393178 fffff802`4501cb09 : 00000000`0000007a fffff6fc`00f8c2e8 ffffffff`c000003f 00000000`86e0a860 : nt!KeBugCheckEx ffffd000`25393180 fffff802`44f2ceb6 : ffffd000`253933d0 00000000`00000000 fffff802`451eaec0 ffffe001`00000000 : nt! ?? ::FNODOBFM::`string'+0x2cc59 ffffd000`25393270 fffff802`45084e1a : 00000000`00000000 ffffe001`4ebff820 ffffd000`25393200 ffffd000`00000000 : nt!MiPfCompleteInPageSupport+0x3a ffffd000`253932b0 fffff802`44f2ce67 : ffffd000`25393368 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiPfCompleteCoalescedIo+0x112 ffffd000`25393300 fffff802`44ed5f97 : 00000000`00000000 ffffd000`253933c1 00000000`00000010 ffffe001`4edf4700 : nt!MiPfCompletePrefetchIos+0xbb ffffd000`25393330 fffff802`452f0413 : 00000000`00000010 ffffe001`4edf4700 ffffd000`000000b0 00000000`00000000 : nt!MiPrefetchVirtualMemory+0x377 ffffd000`25393420 fffff802`452efe66 : 00000000`0000110a 00000000`0000110a 00000000`0000110a 00000000`00000000 : nt!MmPrefetchVirtualMemory+0xe3 ffffd000`25393510 fffff802`452f35f6 : ffffd000`25393620 00000000`00000000 ffffd000`00000009 00000000`00000001 : nt!PfpPrefetchPrivatePages+0x1f2 ffffd000`253935d0 fffff802`452f3ce6 : ffffc000`1dac2000 ffffc000`1dac2000 ffffd000`253937f0 00000000`00000000 : nt!PfpPrefetchRequestPerform+0x22a ffffd000`25393740 fffff802`452e8a44 : ffffe001`00000001 00000000`00000001 ffffc000`1dac2000 ffffe001`4da9a9f0 : nt!PfpPrefetchRequest+0x11e ffffd000`253937c0 fffff802`452e7f14 : ffffe001`2e63fcd0 00000000`00000000 00000000`00000000 e0014da9`aa40f101 : nt!PfSetSuperfetchInformation+0x13c ffffd000`253938a0 fffff802`44feb1b3 : ffffe001`4ba46280 00000044`2d3e90d0 00000000`00000001 00000000`00000000 : nt!NtSetSystemInformation+0x1dc ffffd000`25393b00 00007ffa`4d4524ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000045`2e63fc68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4d4524ba CHKIMG_EXTENSION: !chkimg -lo 50 -d !rdbss fffff801f185d071 - rdbss!RxProcessException+a9 [ 8f:8e ] 1 error : !rdbss (fffff801f185d071) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: ONE_BIT STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT TARGET_TIME: 2019-11-11T22:10:49.000Z OSBUILD: 9600 OSSERVICEPACK: 17415 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2014-10-29 03:38:48 BUILDDATESTAMP_STR: 141028-1500 BUILDLAB_STR: winblue_r4 BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500 ANALYSIS_SESSION_ELAPSED_TIME: 4759 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: memory_corruption --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 000000b500190645 Arg2: ffffd0002fee7fa8 Arg3: ffffd0002fee77b0 Arg4: fffff803d68774d5 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : AV.Fault Value: Read PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500 SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd. SYSTEM_PRODUCT_NAME: PA65-UD3-B3 BIOS_VENDOR: Award Software International, Inc. BIOS_VERSION: F12 BIOS_DATE: 03/27/2012 BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd. BASEBOARD_PRODUCT: PA65-UD3-B3 DUMP_TYPE: 2 BUGCHECK_P1: b500190645 BUGCHECK_P2: ffffd0002fee7fa8 BUGCHECK_P3: ffffd0002fee77b0 BUGCHECK_P4: fffff803d68774d5 EXCEPTION_RECORD: ffffd0002fee7fa8 -- (.exr 0xffffd0002fee7fa8) ExceptionAddress: fffff803d68774d5 (nt!ExpApplyPriorityBoost+0x00000000000001d1) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 000000000158074b Attempt to read from address 000000000158074b CONTEXT: ffffd0002fee77b0 -- (.cxr 0xffffd0002fee77b0) rax=0000000000060004 rbx=0000000000000002 rcx=0000000000000000 rdx=000000000000000e rsi=0000000000000000 rdi=ffffe001b6b8aa10 rip=fffff803d68774d5 rsp=ffffd0002fee81e0 rbp=0000000000000000 r8=0000000000000004 r9=ffffd0002fee8200 r10=0000000000000801 r11=7ffffffffffffffc r12=0000000000000002 r13=000000000000ff01 r14=0000000001580743 r15=0000000000000000 iopl=0 nv up di pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010002 nt!ExpApplyPriorityBoost+0x1d1: fffff803`d68774d5 458b7e08 mov r15d,dword ptr [r14+8] ds:002b:00000000`0158074b=???????? Resetting default scope CPU_COUNT: 4 CPU_MHZ: c15 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 2a CPU_STEPPING: 7 CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 28'00000000 (cache) 28'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: MsMpEng.exe CURRENT_IRQL: 0 FOLLOWUP_IP: nt!ExpApplyPriorityBoost+1d1 fffff803`d68774d5 458b7e08 mov r15d,dword ptr [r14+8] FAULTING_IP: nt!ExpApplyPriorityBoost+1d1 fffff803`d68774d5 458b7e08 mov r15d,dword ptr [r14+8] BUGCHECK_STR: 0x24 READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803d6b72298 GetUlongPtrFromAddress: unable to read from fffff803d6b72520 000000000158074b ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 000000000158074b ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 11-14-2019 17:39:26.0785 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff803d68777d2 to fffff803d68774d5 STACK_TEXT: ffffd000`2fee81e0 fffff803`d68777d2 : 00000000`00000701 ffffe001`b6b8aa10 00000000`00000001 ffffe001`b9c3a880 : nt!ExpApplyPriorityBoost+0x1d1 ffffd000`2fee8250 fffff803`d6873bba : ffffe001`b6b8aa10 ffffe001`b6b4abb0 ffffe001`b98137b8 ffffc001`00000000 : nt!ExpWaitForResource+0xd2 ffffd000`2fee8320 fffff801`1eb3c002 : ffffe001`b9813602 ffffe001`b98136d8 ffffd000`2fee8750 00000000`00000000 : nt!ExAcquireResourceExclusiveLite+0x1da ffffd000`2fee8390 fffff801`1ea30e1c : ffffe001`b98136d8 ffffe001`b73f7180 00000000`00000000 fffff801`1e864061 : Ntfs!NtfsFlushVolume+0x286 ffffd000`2fee84e0 fffff801`1ea44f22 : ffffe001`b98136d8 ffffe001`b926a9f0 ffffe001`b7383de0 ffffc000`f6697501 : Ntfs!NtfsVolumeDasdIo+0x1ec ffffd000`2fee8580 fffff801`1ea4b6de : ffffe001`b98136d8 ffffe001`b926a9f0 00000000`00000201 ffffd000`2fee8701 : Ntfs!NtfsCommonRead+0x1f82 ffffd000`2fee8720 fffff801`1e802b1e : ffffe001`b8e28b90 ffffe001`b926a9f0 00000000`00000001 ffffe001`b926ad90 : Ntfs!NtfsFsdRead+0x1ee ffffd000`2fee87d0 fffff801`1e8010c2 : ffffd000`2fee8890 ffffe001`b73fa570 ffffe001`b8f9c6d0 ffffe001`b926a9f0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2ce ffffd000`2fee8870 fffff803`d6bf5788 : 00000000`00000000 ffffd000`2fee8951 ffffe001`b8f9c6d0 0000001e`00100081 : fltmgr!FltpDispatch+0xb2 ffffd000`2fee88d0 fffff803`d6bf3336 : ffffe001`b8f9c604 ffffe001`b8f9c6d0 00000000`00001478 ffffe001`b8f9c6d0 : nt!IopSynchronousServiceTail+0x170 ffffd000`2fee89a0 fffff803`d696b1b3 : ffffe001`b9c3a880 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x656 ffffd000`2fee8a90 00007ff8`12fa0caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000057`b6a1dc58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`12fa0caa THREAD_SHA1_HASH_MOD_FUNC: 2d8bbd9f43d9a30b3af3099af01eb12db16d41eb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3cbfdc7bce892e4af04afdf29067644600087584 THREAD_SHA1_HASH_MOD: 3dbb71349fe7c8519723330f7f0a6ea7498d7325 FAULT_INSTR_CODE: 87e8b45 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!ExpApplyPriorityBoost+1d1 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 54503718 IMAGE_VERSION: 6.3.9600.17415 STACK_COMMAND: .cxr 0xffffd0002fee77b0 ; kb BUCKET_ID_FUNC_OFFSET: 1d1 FAILURE_BUCKET_ID: 0x24_nt!ExpApplyPriorityBoost BUCKET_ID: 0x24_nt!ExpApplyPriorityBoost PRIMARY_PROBLEM_CLASS: 0x24_nt!ExpApplyPriorityBoost TARGET_TIME: 2019-11-13T21:28:20.000Z OSBUILD: 9600 OSSERVICEPACK: 17415 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2014-10-29 03:38:48 BUILDDATESTAMP_STR: 141028-1500 BUILDLAB_STR: winblue_r4 BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500 ANALYSIS_SESSION_ELAPSED_TIME: 1745 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x24_nt!expapplypriorityboost FAILURE_ID_HASH: {99788c13-fb0a-47cc-42e3-cbe4a318052c} Followup: MachineOwner ---------
BIOS girip default ayarlara çekmeyi denediniz mi?Memtest86 ile HDtune testi yaptım zaten bir çok kez. Temiz görünüyor. Overclock veya XMP var mı yok mu bilmiyorum.
Hayır. DenemedimBIOS girip default ayarlara çekmeyi denediniz mi?
Deneyin.Hayır. Denemedim
Yaptım. Şu anda bir şey yok. Oyunları test edip bilgilendireceğim.Deneyin.
minidump2.rar yine mavi ekran alıyorum bu sefer çok fazla bunu bile zor attım.Deneyin.
@MayCrasHYaptım. Şu anda bir şey yok. Oyunları test edip bilgilendireceğim.
minidump2.rar yine mavi ekran alıyorum bu sefer çok fazla bunu bile zor attım.
it means the disk subsystem has experienced a failure.
ERROR_CODE: (NTSTATUS) 0xc000003f - {Bozuk CRC} D ng sel art kl k denetimi (CRC) sa lama toplam hatas olu tu.
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware.
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: fffff6e000418618, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000003f, error status (normally i/o status code)
Arg3: 0000000085f5e820, current process (virtual address for lock type 3, or PTE)
Arg4: ffffc000830c374c, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-0L1L0I2
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 61
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 7a
BUGCHECK_P1: fffff6e000418618
BUGCHECK_P2: ffffffffc000003f
BUGCHECK_P3: 85f5e820
BUGCHECK_P4: ffffc000830c374c
ERROR_CODE: (NTSTATUS) 0xc000003f - {Bozuk CRC} D ng sel art kl k denetimi (CRC) sa lama toplam hatas olu tu.
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXDISK: 1
DISKSEC_ORG_ID: ST35
DISKSEC_MODEL: ST3500413AS
DISKSEC_MANUFACTURING_ID: 6VMS3EA
DISKSEC_ISSUE_DESC_STR:
DISKSEC_TOTAL_SIZE: 188
DISKSEC_REASON: 1
DISKSEC_PUBLIC_TOTAL_SECTION_SIZE: 54
DISKSEC_PUBLIC_OFFSET: 12c
DISKSEC_PUBLIC_DATA_SIZE: 0
DISKSEC_PRIVATE_TOTAL_SECTION_SIZE: 8
DISKSEC_PRIVATE_OFFSET: 180
DISKSEC_PRIVATE_DATA_SIZE: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GoogleUpdate.e
TRAP_FRAME: ffffd00031c49530 -- (.trap 0xffffd00031c49530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc0007c7c4000 rbx=0000000000000000 rcx=0000000000000018
rdx=ffffc0007c3c7000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802896738ea rsp=ffffd00031c496c0 rbp=fffff80289673cb0
r8=000000000000000f r9=0000000000000738 r10=ffffc0007c341000
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!CmQueryValueKey+0x1da:
fffff802`896738ea 41f6451001 test byte ptr [r13+10h],1 ds:00000000`00000010=??
Resetting default scope
STACK_TEXT:
ffffd000`31c491b8 fffff802`8940eb09 : 00000000`0000007a fffff6e0`00418618 ffffffff`c000003f 00000000`85f5e820 : nt!KeBugCheckEx
ffffd000`31c491c0 fffff802`893236c8 : 00000000`00000002 ffffd000`31c49328 fffff802`895dcdc0 ffffd000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2cc59
ffffd000`31c492b0 fffff802`892d910a : fffff802`895dcdc0 ffffe001`ab42d880 00000000`00000000 fffff802`89323316 : nt!MiIssueHardFault+0x184
ffffd000`31c49370 fffff802`893dbc2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x5ba
ffffd000`31c49530 fffff802`896738ea : ffffc000`7de1e7b0 00000000`00000100 ffffd000`31c49950 00000000`00000000 : nt!KiPageFault+0x12f
ffffd000`31c496c0 fffff802`89676cfa : ffffc000`7de1e7b0 ffffd000`31c49950 00000000`00000002 00000000`0018f850 : nt!CmQueryValueKey+0x1da
ffffd000`31c497a0 fffff802`893dd1b3 : ffffe001`ab42d880 00000000`0008e198 ffffd000`31c49aa8 00000000`00000000 : nt!NtQueryValueKey+0x4aa
ffffd000`31c49a90 00007ff9`53d00dba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e4d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`53d00dba
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+2cc59
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2cc59
FAILURE_BUCKET_ID: 0x7a_c000003f_nt!_??_::FNODOBFM::_string_
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {35f7dc2f-9d4e-79ab-5aab-b1994d114d0f}
Followup: MachineOwner
---------
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001200, Pool tag value from the pool header
Arg3: 0000000000000000, Contents of the first 4 bytes of the pool header
Arg4: ffffc001157372b0, Address of the block of pool being deallocated
Debugging Details:
------------------
fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock
fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock
fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80372777298
GetUlongPtrFromAddress: unable to read from fffff80372777520
fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-0L1L0I2
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: c2
BUGCHECK_P1: 7
BUGCHECK_P2: 1200
BUGCHECK_P3: 0
BUGCHECK_P4: ffffc001157372b0
POOL_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80372777298
GetUlongPtrFromAddress: unable to read from fffff80372777520
fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock
ffffc001157372b0 Paged pool
FREED_POOL_TAG: FMfn
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffd000`21a7c018 fffff803`726b8f5c : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00000000 : nt!KeBugCheckEx
ffffd000`21a7c020 fffff803`725137b1 : 00000000`00000001 ffffd000`21a7c239 ffffc001`1c767c70 ffffe001`00000000 : nt!ExDeferredFreePool+0x6ec
ffffd000`21a7c110 fffff801`db6b6c32 : ffffe001`f46ea540 ffffc001`1c767c70 ffffd000`21a7c168 ffffd000`00000005 : nt!ExDeletePagedLookasideList+0x3d
ffffd000`21a7c140 fffff801`db6e6447 : 00000000`00000000 fffff801`db6dc057 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_LINEAR_POOL::`scalar deleting destructor'+0xe
ffffd000`21a7c170 fffff801`db6dc83b : ffffc001`1bc6df80 ffffd000`21a7c239 ffffc001`1c767c70 ffffe001`f46146f0 : dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0xb7
ffffd000`21a7c1b0 fffff801`db6dbe14 : ffffe001`f5a69000 ffffc001`1cb535c0 00000000`00000001 ffffe001`f5a69000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x4cb
ffffd000`21a7c2a0 fffff801`db6dbc32 : ffffc001`1cc4b210 fffff801`00000000 ffffc001`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x194
ffffd000`21a7c420 fffff801`db497cf2 : ffffc001`17125220 00000000`00000000 ffffc001`140207a0 ffffe001`00000007 : dxgmms1!VIDMM_GLOBAL::CloseAllocation+0x52
ffffd000`21a7c460 fffff801`db480cde : ffffc001`1cc4b210 00000000`00000000 00000000`00000000 ffffc001`17125220 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x752
ffffd000`21a7c560 fffff801`db4820ab : ffffc001`1b404000 ffffd000`21a7c649 00000000`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x172
ffffd000`21a7c5c0 fffff801`db4a3a05 : ffffc001`1b404000 ffffc001`140207a0 ffffc001`140207a0 fffff960`00500f60 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xa7
ffffd000`21a7c5f0 fffff801`db488bfd : ffffd000`2c930180 ffffc001`140207a0 fffff901`40679108 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x2dd
ffffd000`21a7c6b0 fffff960`001b7e83 : 00000000`00000d28 ffffd000`21a7c8a0 fffff901`40679010 ffffe001`f41c2580 : dxgkrnl!DxgkProcessCallout+0x135
ffffd000`21a7c710 fffff960`001b9353 : fffff901`40679010 ffffe001`f41c2580 00000000`00000000 fffff580`10804000 : win32k!GdiProcessCallout+0x1f7
ffffd000`21a7c790 fffff803`727eb606 : ffffd000`21a7c8a0 ffffd000`21a7c840 00000000`00000000 00060030`00010002 : win32k!W32pProcessCallout+0x53
ffffd000`21a7c7c0 fffff803`727ea834 : ffffe001`f588acf0 00000000`00000000 00000000`00000000 ffffe001`f41c2848 : nt!PsInvokeWin32Callout+0x42
ffffd000`21a7c800 fffff803`728b8968 : ffffe001`00000000 ffffe001`f541d080 ffffd000`21a7cb00 ffffe001`f541d128 : nt!PspExitThread+0x518
ffffd000`21a7c910 fffff803`7244336a : ffffe001`f541d180 00000000`00000000 00000000`00000000 00000000`00000002 : nt!KiSchedulerApcTerminate+0x18
ffffd000`21a7c940 fffff803`725698c0 : 00000000`000002f4 ffffd000`21a7c9c0 fffff803`724425d4 00000000`00000000 : nt!KiDeliverApc+0x2fa
ffffd000`21a7c9c0 fffff803`7257025a : ffffe001`f541d080 00000000`000080e8 ffffd000`21a7cad8 ffffe001`f67b71f0 : nt!KiInitiateUserApc+0x70
ffffd000`21a7cb00 00007ffe`a4230c8a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000084`6b6ff458 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a4230c8a
SYMBOL_NAME: dxgmms1!VIDMM_LINEAR_POOL::`scalar deleting destructor'+e
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: e
FAILURE_BUCKET_ID: 0xc2_7_FMfn_dxgmms1!VIDMM_LINEAR_POOL::_scalar_deleting_destructor_
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {598b7d95-3963-4217-750c-d30122058275}
Followup: MachineOwner
---------
@Recep Baltaş Bilgisayarım açılır açılmaz sürekli mavi ekran verdiğinden Windows 7 kurdum buradan indirdim programı.WinDbg muhteşem yav. Şimdi hocam, bakalım senin dökümlere.
Sabit diskten bozuk veri geldi diyor sistem. Ya diskin arızalı ya da SATA kablon. Bir ihtimal de RAM.
İkinci dökümde ekran kartı hatası var ama ben pek sanmıyorum ekran kartı olacağını. Sen ilk iş HD Tune 5.75 aç ve Health kısmına bir bak. Bizimle paylaş veriyi.
Kod:it means the disk subsystem has experienced a failure. ERROR_CODE: (NTSTATUS) 0xc000003f - {Bozuk CRC} D ng sel art kl k denetimi (CRC) sa lama toplam hatas olu tu. ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware.
Kod:KERNEL_DATA_INPAGE_ERROR (7a) The requested page of kernel data could not be read in. Typically caused by a bad block in the paging file or disk controller error. Also see KERNEL_STACK_INPAGE_ERROR. If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185, it means the disk subsystem has experienced a failure. If the error status is 0xC000009A, then it means the request failed because a filesystem failed to make forward progress. Arguments: Arg1: fffff6e000418618, lock type that was held (value 1,2,3, or PTE address) Arg2: ffffffffc000003f, error status (normally i/o status code) Arg3: 0000000085f5e820, current process (virtual address for lock type 3, or PTE) Arg4: ffffc000830c374c, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address) Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-0L1L0I2 Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 61 Key : Analysis.System Value: CreateObject BUGCHECK_CODE: 7a BUGCHECK_P1: fffff6e000418618 BUGCHECK_P2: ffffffffc000003f BUGCHECK_P3: 85f5e820 BUGCHECK_P4: ffffc000830c374c ERROR_CODE: (NTSTATUS) 0xc000003f - {Bozuk CRC} D ng sel art kl k denetimi (CRC) sa lama toplam hatas olu tu. ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware. BLACKBOXDISK: 1 DISKSEC_ORG_ID: ST35 DISKSEC_MODEL: ST3500413AS DISKSEC_MANUFACTURING_ID: 6VMS3EA DISKSEC_ISSUE_DESC_STR: DISKSEC_TOTAL_SIZE: 188 DISKSEC_REASON: 1 DISKSEC_PUBLIC_TOTAL_SECTION_SIZE: 54 DISKSEC_PUBLIC_OFFSET: 12c DISKSEC_PUBLIC_DATA_SIZE: 0 DISKSEC_PRIVATE_TOTAL_SECTION_SIZE: 8 DISKSEC_PRIVATE_OFFSET: 180 DISKSEC_PRIVATE_DATA_SIZE: 0 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: GoogleUpdate.e TRAP_FRAME: ffffd00031c49530 -- (.trap 0xffffd00031c49530) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffc0007c7c4000 rbx=0000000000000000 rcx=0000000000000018 rdx=ffffc0007c3c7000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff802896738ea rsp=ffffd00031c496c0 rbp=fffff80289673cb0 r8=000000000000000f r9=0000000000000738 r10=ffffc0007c341000 r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!CmQueryValueKey+0x1da: fffff802`896738ea 41f6451001 test byte ptr [r13+10h],1 ds:00000000`00000010=?? Resetting default scope STACK_TEXT: ffffd000`31c491b8 fffff802`8940eb09 : 00000000`0000007a fffff6e0`00418618 ffffffff`c000003f 00000000`85f5e820 : nt!KeBugCheckEx ffffd000`31c491c0 fffff802`893236c8 : 00000000`00000002 ffffd000`31c49328 fffff802`895dcdc0 ffffd000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2cc59 ffffd000`31c492b0 fffff802`892d910a : fffff802`895dcdc0 ffffe001`ab42d880 00000000`00000000 fffff802`89323316 : nt!MiIssueHardFault+0x184 ffffd000`31c49370 fffff802`893dbc2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x5ba ffffd000`31c49530 fffff802`896738ea : ffffc000`7de1e7b0 00000000`00000100 ffffd000`31c49950 00000000`00000000 : nt!KiPageFault+0x12f ffffd000`31c496c0 fffff802`89676cfa : ffffc000`7de1e7b0 ffffd000`31c49950 00000000`00000002 00000000`0018f850 : nt!CmQueryValueKey+0x1da ffffd000`31c497a0 fffff802`893dd1b3 : ffffe001`ab42d880 00000000`0008e198 ffffd000`31c49aa8 00000000`00000000 : nt!NtQueryValueKey+0x4aa ffffd000`31c49a90 00007ff9`53d00dba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0008e4d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`53d00dba SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+2cc59 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 6.3.9600.17415 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 2cc59 FAILURE_BUCKET_ID: 0x7a_c000003f_nt!_??_::FNODOBFM::_string_ OS_VERSION: 8.1.9600.17415 BUILDLAB_STR: winblue_r4 OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 FAILURE_ID_HASH: {35f7dc2f-9d4e-79ab-5aab-b1994d114d0f} Followup: MachineOwner --------- BAD_POOL_CALLER (c2) The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc. Arguments: Arg1: 0000000000000007, Attempt to free pool which was already freed Arg2: 0000000000001200, Pool tag value from the pool header Arg3: 0000000000000000, Contents of the first 4 bytes of the pool header Arg4: ffffc001157372b0, Address of the block of pool being deallocated Debugging Details: ------------------ fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff80372777298 GetUlongPtrFromAddress: unable to read from fffff80372777520 fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 3 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-0L1L0I2 Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 3 Key : Analysis.Memory.CommitPeak.Mb Value: 81 Key : Analysis.System Value: CreateObject BUGCHECK_CODE: c2 BUGCHECK_P1: 7 BUGCHECK_P2: 1200 BUGCHECK_P3: 0 BUGCHECK_P4: ffffc001157372b0 POOL_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80372777298 GetUlongPtrFromAddress: unable to read from fffff80372777520 fffff803726bae60: Unable to get Flags value from nt!KdVersionBlock ffffc001157372b0 Paged pool FREED_POOL_TAG: FMfn CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: chrome.exe STACK_TEXT: ffffd000`21a7c018 fffff803`726b8f5c : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00000000 : nt!KeBugCheckEx ffffd000`21a7c020 fffff803`725137b1 : 00000000`00000001 ffffd000`21a7c239 ffffc001`1c767c70 ffffe001`00000000 : nt!ExDeferredFreePool+0x6ec ffffd000`21a7c110 fffff801`db6b6c32 : ffffe001`f46ea540 ffffc001`1c767c70 ffffd000`21a7c168 ffffd000`00000005 : nt!ExDeletePagedLookasideList+0x3d ffffd000`21a7c140 fffff801`db6e6447 : 00000000`00000000 fffff801`db6dc057 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_LINEAR_POOL::`scalar deleting destructor'+0xe ffffd000`21a7c170 fffff801`db6dc83b : ffffc001`1bc6df80 ffffd000`21a7c239 ffffc001`1c767c70 ffffe001`f46146f0 : dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0xb7 ffffd000`21a7c1b0 fffff801`db6dbe14 : ffffe001`f5a69000 ffffc001`1cb535c0 00000000`00000001 ffffe001`f5a69000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x4cb ffffd000`21a7c2a0 fffff801`db6dbc32 : ffffc001`1cc4b210 fffff801`00000000 ffffc001`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x194 ffffd000`21a7c420 fffff801`db497cf2 : ffffc001`17125220 00000000`00000000 ffffc001`140207a0 ffffe001`00000007 : dxgmms1!VIDMM_GLOBAL::CloseAllocation+0x52 ffffd000`21a7c460 fffff801`db480cde : ffffc001`1cc4b210 00000000`00000000 00000000`00000000 ffffc001`17125220 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x752 ffffd000`21a7c560 fffff801`db4820ab : ffffc001`1b404000 ffffd000`21a7c649 00000000`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x172 ffffd000`21a7c5c0 fffff801`db4a3a05 : ffffc001`1b404000 ffffc001`140207a0 ffffc001`140207a0 fffff960`00500f60 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xa7 ffffd000`21a7c5f0 fffff801`db488bfd : ffffd000`2c930180 ffffc001`140207a0 fffff901`40679108 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x2dd ffffd000`21a7c6b0 fffff960`001b7e83 : 00000000`00000d28 ffffd000`21a7c8a0 fffff901`40679010 ffffe001`f41c2580 : dxgkrnl!DxgkProcessCallout+0x135 ffffd000`21a7c710 fffff960`001b9353 : fffff901`40679010 ffffe001`f41c2580 00000000`00000000 fffff580`10804000 : win32k!GdiProcessCallout+0x1f7 ffffd000`21a7c790 fffff803`727eb606 : ffffd000`21a7c8a0 ffffd000`21a7c840 00000000`00000000 00060030`00010002 : win32k!W32pProcessCallout+0x53 ffffd000`21a7c7c0 fffff803`727ea834 : ffffe001`f588acf0 00000000`00000000 00000000`00000000 ffffe001`f41c2848 : nt!PsInvokeWin32Callout+0x42 ffffd000`21a7c800 fffff803`728b8968 : ffffe001`00000000 ffffe001`f541d080 ffffd000`21a7cb00 ffffe001`f541d128 : nt!PspExitThread+0x518 ffffd000`21a7c910 fffff803`7244336a : ffffe001`f541d180 00000000`00000000 00000000`00000000 00000000`00000002 : nt!KiSchedulerApcTerminate+0x18 ffffd000`21a7c940 fffff803`725698c0 : 00000000`000002f4 ffffd000`21a7c9c0 fffff803`724425d4 00000000`00000000 : nt!KiDeliverApc+0x2fa ffffd000`21a7c9c0 fffff803`7257025a : ffffe001`f541d080 00000000`000080e8 ffffd000`21a7cad8 ffffe001`f67b71f0 : nt!KiInitiateUserApc+0x70 ffffd000`21a7cb00 00007ffe`a4230c8a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 00000084`6b6ff458 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a4230c8a SYMBOL_NAME: dxgmms1!VIDMM_LINEAR_POOL::`scalar deleting destructor'+e MODULE_NAME: dxgmms1 IMAGE_NAME: dxgmms1.sys IMAGE_VERSION: 6.3.9600.17415 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: e FAILURE_BUCKET_ID: 0xc2_7_FMfn_dxgmms1!VIDMM_LINEAR_POOL::_scalar_deleting_destructor_ OS_VERSION: 8.1.9600.17415 BUILDLAB_STR: winblue_r4 OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 FAILURE_ID_HASH: {598b7d95-3963-4217-750c-d30122058275} Followup: MachineOwner ---------
"Memtest86 ile HDtune testi yaptım zaten bir çok kez. Temiz görünüyor. " Demiştiniz bana fakat öyle görünmüyor galiba HDD arızalı.@Recep Baltaş Bilgisayarım açılır açılmaz sürekli mavi ekran verdiğinden Windows 7 kurdum buradan indirdim programı.Eki Görüntüle 459683