Çözüm KERNEL_SECURITY_CHECK_FAILURE Mavi Ekran Hatası

Bu konu bir çözümü açıklamaktadır. Herhangi bir çözüm açıklanmadığını düşünüyorsanız konuyu rapor edebilirsiniz.

EzioAudit0re

Kilopat
Katılım
16 Temmuz 2018
Mesajlar
39
Yaklaşık 7 aydır mavi ekran hatası alıyorum (Bilgisayarı ilk topladığımdan beri). RAM test yaptım bir sorun bulunamadı.
Bugün art arda 7-8 defa mavi ekran verdi bilgisayar. Minidump dosyalarını ekte belirttim. Yardımlarınızı rica ediyorum.
Minidump: Minidump - Google Drive
 
Son düzenleyen: Moderatör:
Kullandığın HDD veya SSD sıfır mı?
Bilgisayar parçalarını almadan önce uyumlu olduğuna baktınmı ? (örnek;mesela işlemci en fazla 2133 MHz RAM destekler sen 2666 MHz kullanıyorsun gibi)
Bilgisayarın tüm driverları kurulumu ?
BIOS Güncellemen var mı?
Birde Windows 10'da blue screen hatalarında açıklama verir. Açıklaması nedir?
 
Son düzenleyen: Moderatör:
Hocam işlemci 2400'e kadar destekliyor. Benim RAM 2666. Tüm driverler kurulu ve parçaları sıfır aldım. Genelde memory managament hatası alıyorum.
 
Son düzenleyen: Moderatör:
Öncelikle BIOS güncel değil, güncelleyin:

Support For B360M PRO-VD | Motherboard - The world leader in motherboard design | MSI Global

Hatalardan biri bellek diğeri ekran kartına işaret ediyor. Bellek testini Memtest ile yapın. Ekran kartını da Furmark ile stres testine sokun.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8056b4e11dd, Address of the instruction which caused the bugcheck
Arg3: fffffe060de25ed0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B53

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1.50

BIOS_DATE:  10/11/2018

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B360M PRO-VD (MS-7B53)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8056b4e11dd

BUGCHECK_P3: fffffe060de25ed0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!MiFindClearVadBitsAligned+51
fffff805`6b4e11dd 833900          cmp     dword ptr [rcx],0

CONTEXT:  fffffe060de25ed0 -- (.cxr 0xfffffe060de25ed0)
rax=0000000000000000 rbx=00000000ffffffff rcx=fffff627001f717c
rdx=0000000000000be0 rsi=0000000000000020 rdi=0000000000000000
rip=fffff8056b4e11dd rsp=fffffe060de268c8 rbp=0000000000010000
 r8=0000000000000020  r9=fffff627001f7000 r10=0000000000000020
r11=0000000000007fe0 r12=0000000000000000 r13=00007ffffffeffff
r14=00000000001f7000 r15=0000000000200000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!MiFindClearVadBitsAligned+0x51:
fffff805`6b4e11dd 833900          cmp     dword ptr [rcx],0 ds:002b:fffff627`001f717c=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: e10

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: b

CPU_MICROCODE: 6,9e,b,0 (F,M,S,R)  SIG: 9A'00000000 (cache) 9A'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-HH6FM2D

ANALYSIS_SESSION_TIME:  03-22-2019 13:13:52.0559

ANALYSIS_VERSION: 10.0.18317.1001 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8056b528e1f to fffff8056b4e11dd

STACK_TEXT:  
fffffe06`0de268c8 fffff805`6b528e1f : ffff9c03`e3494c18 00007df5`80610fff 00000000`0000001a 00000000`00000040 : nt!MiFindClearVadBitsAligned+0x51
fffffe06`0de268d0 fffff805`6b528b23 : 00000000`00000000 ffff9c03`e371c240 00000000`00200000 00000000`00000000 : nt!MiFindEmptyAddressRange+0x26f
fffffe06`0de26950 fffff805`6b48c55a : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00200000 : nt!MiSelectUserAddress+0x113
fffffe06`0de269f0 fffff805`6b4654e3 : 00000000`00000000 00000000`00200000 00000000`00000000 00000000`00000000 : nt!MiAllocateNewSubAllocatedRegion+0x132
fffffe06`0de26ac0 fffff805`6b4652db : 00000000`00000000 00000000`00001000 fffffe06`0de26cc0 ffff9c03`e3494cb0 : nt!MiAllocateFromSubAllocatedRegion+0x1cf
fffffe06`0de26b50 fffff805`6b48b4b0 : 00000000`00000000 00000000`00000002 fffffe06`0de26cd8 00000000`00000000 : nt!MiCreatePebOrTeb+0x43
fffffe06`0de26b80 fffff805`6b45abba : 00000000`000022be fffffe06`0de27270 00000000`000022b4 00000000`00000000 : nt!MmCreatePeb+0x140
fffffe06`0de26d50 fffff805`6b495a9a : 00000000`e248e000 fffffe06`0de27270 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0xfaa
fffffe06`0de271f0 fffff805`6b06c785 : 00000000`00000002 00000000`00000840 00000000`00000000 00000000`00000000 : nt!NtCreateUserProcess+0x62a
fffffe06`0de27990 00007ffd`b8440ec4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000020`8007dc08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b8440ec4


THREAD_SHA1_HASH_MOD_FUNC:  64244941903d6b11890afb645282ba15d8e064ea

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6445527e2b2a36a4d9576ea9bb0715771fb5542b

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt!MiFindClearVadBitsAligned+51
fffff805`6b4e11dd 833900          cmp     dword ptr [rcx],0

FAULT_INSTR_CODE:  74003983

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiFindClearVadBitsAligned+51

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.17763.379

STACK_COMMAND:  .cxr 0xfffffe060de25ed0 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  51

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!MiFindClearVadBitsAligned

BUCKET_ID:  0x3B_c0000005_nt!MiFindClearVadBitsAligned

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!MiFindClearVadBitsAligned

TARGET_TIME:  2019-03-22T08:24:40.000Z

OSBUILD:  17763

OSSERVICEPACK:  379

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  4c9c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!mifindclearvadbitsaligned

FAILURE_ID_HASH:  {19234236-3e39-016e-e6a1-cf7fd79b1cc0}

Followup:     MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffee8e020a71d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffee8e020a7128, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B53

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1.50

BIOS_DATE:  10/11/2018

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B360M PRO-VD (MS-7B53)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffee8e020a71d0

BUGCHECK_P3: ffffee8e020a7128

BUGCHECK_P4: 0

TRAP_FRAME:  ffffee8e020a71d0 -- (.trap 0xffffee8e020a71d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffda8243387780 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffda823cbc6a90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061e48e88a rsp=ffffee8e020a7360 rbp=ffffee8e020a73c0
 r8=ffffee8e020a7368  r9=0000000000000000 r10=7ffffffffffffffc
r11=ffffda824141c5a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand+0x2fe06:
fffff806`1e48e88a cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffee8e020a7128 -- (.exr 0xffffee8e020a7128)
ExceptionAddress: fffff8061e48e88a (dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand+0x000000000002fe06)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: e10

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: b

CPU_MICROCODE: 6,9e,b,0 (F,M,S,R)  SIG: 9A'00000000 (cache) 9A'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  opera.exe

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-HH6FM2D

ANALYSIS_SESSION_TIME:  03-22-2019 13:13:48.0942

ANALYSIS_VERSION: 10.0.18317.1001 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8060946cd69 to fffff8060945b5e0

STACK_TEXT:  
ffffee8e`020a6ea8 fffff806`0946cd69 : 00000000`00000139 00000000`00000003 ffffee8e`020a71d0 ffffee8e`020a7128 : nt!KeBugCheckEx
ffffee8e`020a6eb0 fffff806`0946d110 : ffffae89`ad3f7000 fffff80e`fc4e0b1b ffffae89`aba2e060 fffff806`0936c862 : nt!KiBugCheckDispatch+0x69
ffffee8e`020a6ff0 fffff806`0946b508 : 00000000`00000001 ffffae89`b0377820 ffffae89`b0377680 ffffae89`b02c9098 : nt!KiFastFailDispatch+0xd0
ffffee8e`020a71d0 fffff806`1e48e88a : ffffda82`3cbc6a10 fffff806`00000000 00000000`00000001 ffffee8e`020a7420 : nt!KiRaiseSecurityCheckFailure+0x308
ffffee8e`020a7360 fffff806`1e45e505 : ffffae89`b37eb310 fffff806`00000000 ffffae89`b03da000 ffffee8e`020a7698 : dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand+0x2fe06
ffffee8e`020a73f0 fffff806`1e45e444 : ffffae89`b3876a90 ffffda82`433856e0 ffffee8e`020a7698 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::CommitAllocationList+0xa1
ffffee8e`020a7490 fffff806`1e401c1b : 00000000`00000000 ffffee8e`020a7a80 ffffda82`428d3890 fffff80e`fc4197e9 : dxgmms2!VIDMM_GLOBAL::MakeResident+0x7c
ffffee8e`020a74e0 fffff80e`fc512205 : 00000000`00000001 ffffee8e`020a7a80 000000ca`2f2cf368 ffffae89`b02b29e8 : dxgmms2!VidMmMakeResident+0x2b
ffffee8e`020a7530 fffff80e`fc511a7e : 00000000`00000000 ffffae89`00000001 ffffae89`b3ce9080 00000278`5a1d9678 : dxgkrnl!DxgkMakeResidentInternal+0x775
ffffee8e`020a79a0 ffff85dc`e6e0cdb1 : 00000000`00000000 ffffae89`b3e53360 00000000`00000000 00000000`00000574 : dxgkrnl!DxgkMakeResident+0xe
ffffee8e`020a79d0 fffff806`0946c785 : ffffae89`b3ce9080 00000000`00000000 00000000`00000000 ffffae89`b3e53960 : win32kbase!NtGdiDdDDIMakeResident+0x11
ffffee8e`020a7a00 00007ff9`640f4f44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ca`2f2cf0d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`640f4f44


THREAD_SHA1_HASH_MOD_FUNC:  371c7cbcffa3a2a6854bbb10b89553955e5e98cb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d5c46c325e1909fcab18855350cfd43a84c7fc44

THREAD_SHA1_HASH_MOD:  9467ecd4197983d0d6a4bde46dbae25c6d9ac7ef

FOLLOWUP_IP:
dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand+2fe06
fffff806`1e48e88a cd29            int     29h

FAULT_INSTR_CODE:  8b4829cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand+2fe06

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.17763.134

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2fe06

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand

TARGET_TIME:  2019-03-22T08:13:48.000Z

OSBUILD:  17763

OSSERVICEPACK:  379

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  1537a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_dxgmms2!vidmm_global::queuedeferredcommand

FAILURE_ID_HASH:  {33a7badb-e81d-16aa-6699-bd05e5aee4c2}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: ffff96bfff36efd0
Arg3: 0000000253610025
Arg4: ffffd08de9d74020

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B53

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1.50

BIOS_DATE:  10/11/2018

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B360M PRO-VD (MS-7B53)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 41201

BUGCHECK_P2: ffff96bfff36efd0

BUGCHECK_P3: 253610025

BUGCHECK_P4: ffffd08de9d74020

BUGCHECK_STR:  0x1a_41201

CPU_COUNT: 4

CPU_MHZ: e10

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: b

CPU_MICROCODE: 6,9e,b,0 (F,M,S,R)  SIG: 9A'00000000 (cache) 9A'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  opera.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-HH6FM2D

ANALYSIS_SESSION_TIME:  03-22-2019 13:13:46.0072

ANALYSIS_VERSION: 10.0.18317.1001 amd64fre

LAST_CONTROL_TRANSFER:  from fffff807568ec638 to fffff807568665e0

STACK_TEXT:  
ffffac03`549af498 fffff807`568ec638 : 00000000`0000001a 00000000`00041201 ffff96bf`ff36efd0 00000002`53610025 : nt!KeBugCheckEx
ffffac03`549af4a0 fffff807`56796cee : ffffac03`549af610 00000002`53610025 ffffac03`549af610 00000000`00000001 : nt!MiGetPageProtection+0x154928
ffffac03`549af510 fffff807`567a7b1c : 00007ffe`6e00e000 00000000`01000000 ffffd08d`e89d33a0 fffff807`567c4a79 : nt!MiQueryAddressState+0x47e
ffffac03`549af710 fffff807`56d46d13 : ffffac03`549afa80 00000000`00000000 ffffac03`549af8c0 ffffac03`00000000 : nt!MiQueryAddressSpan+0xac
ffffac03`549af7a0 fffff807`56d467b5 : ffffa4e9`0cae0818 00000000`00000000 00000000`00000108 ffffac03`549afa80 : nt!MmQueryVirtualMemory+0x553
ffffac03`549af940 fffff807`56877785 : ffffd08d`dea91380 00000000`00000000 00000000`77566d4d ffffac03`549af900 : nt!NtQueryVirtualMemory+0x25
ffffac03`549af990 00007ffe`74bffad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000002`66ddf2d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`74bffad4


THREAD_SHA1_HASH_MOD_FUNC:  daeab5d68ba3ecb3234b5b8938d47aee75235996

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  1d56f65877d0a1e25ae4757718b560ab8f80659b

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!MiGetPageProtection+154928
fffff807`568ec638 cc              int     3

FAULT_INSTR_CODE:  2e8948cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiGetPageProtection+154928

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.17763.379

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  154928

FAILURE_BUCKET_ID:  0x1a_41201_nt!MiGetPageProtection

BUCKET_ID:  0x1a_41201_nt!MiGetPageProtection

PRIMARY_PROBLEM_CLASS:  0x1a_41201_nt!MiGetPageProtection

TARGET_TIME:  2019-03-22T08:08:52.000Z

OSBUILD:  17763

OSSERVICEPACK:  379

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  58ea

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41201_nt!migetpageprotection

FAILURE_ID_HASH:  {c1fe3b27-3ba8-d99e-656f-85f3d58dc669}

Followup:     MachineOwner
---------
 

Bu konuyu görüntüleyen kullanıcılar

Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…