Çözüldü KERNEL_SECURITY_CHECK_FAILURE mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Hocam hangi hatayı alıyorsunuz.
 

Dosya Ekleri

  • a5185143dd5f05382462f41328fcf278.jpg
    a5185143dd5f05382462f41328fcf278.jpg
    269,3 KB · Görüntüleme: 92
  • 4542154.jpg
    4542154.jpg
    855 KB · Görüntüleme: 80
Memtest86 sonuçları ne oldu?


HD Tune programı ile sisteme takılı tüm depolama birimlerinin Error Scan ve Health sonuçlarını fotoğraf şeklinde paylaş.

Error Scan testinde Quick Scan yapma.
Kod:
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffcb8d339d8010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff80af7ed3400, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 000000000000000d, Optional internal context dependent data.

Debugging Details:
------------------

Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2104   

BIOS_DATE:  03/09/2009

BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.

BASEBOARD_PRODUCT:  P5B

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: ffffcb8d339d8010

BUGCHECK_P2: fffff80af7ed3400

BUGCHECK_P3: 0

BUGCHECK_P4: d

FAULTING_IP:
nvlddmkm+153400
fffff80a`f7ed3400 48ff2539ce7200  jmp     qword ptr [nvlddmkm+0x880240 (fffff80a`f8600240)]

DEFAULT_BUCKET_ID:  GRAPHICS_DRIVER_TDR_FAULT

CPU_COUNT: 2

CPU_MHZ: a66

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: f

CPU_STEPPING: b

CPU_MICROCODE: 6,f,b,0 (F,M,S,R)  SIG: C1'00000000 (cache) C1'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x116

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-02-2020 13:01:36.0952

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

STACK_TEXT: 
ffffbf86`81b85538 fffff80a`f5d709d5 : 00000000`00000116 ffffcb8d`339d8010 fffff80a`f7ed3400 00000000`00000000 : nt!KeBugCheckEx
ffffbf86`81b85540 fffff80a`f5d7004b : fffff80a`f7ed3400 ffffcb8d`339d8010 ffffbf86`81b85649 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xf9
ffffbf86`81b85580 fffff80a`f679e23a : ffffcb8d`339d8010 00000000`00007c8b ffffbf86`81b85649 00000000`00013955 : dxgkrnl!TdrIsRecoveryRequired+0x1ab
ffffbf86`81b855b0 fffff80a`f67b5a55 : ffffbf86`81b857c0 ffffcb8d`3025f000 ffffbf86`81b857c0 00000000`00000000 : dxgmms1!VidSchiReportHwHang+0x5b2
ffffbf86`81b856b0 fffff80a`f67be528 : ffffcb8d`302ae000 00000000`00000000 00000000`00000002 00000000`00000000 : dxgmms1!VidSchWaitForCompletionEvent+0x4c5
ffffbf86`81b85770 fffff80a`f67c240f : 00000000`00013956 00000000`00000005 ffff808e`00000006 ffffcb8d`34071c00 : dxgmms1!VIDMM_GLOBAL::xWaitForAllEngines+0x4c8
ffffbf86`81b858a0 fffff80a`f67befeb : ffffcb8d`2f491900 ffff808e`6b9f6d90 00000000`00000005 ffffcb8d`33a4ce50 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x1c3f
ffffbf86`81b859e0 fffff80a`f67d47a5 : ffffcb8d`33ad19a0 ffffcb8d`00000000 ffffcb8d`2f4919a0 ffffcb8d`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x1fb
ffffbf86`81b85cc0 fffff80a`f67d46e3 : ffffcb8d`30255000 00000000`00000080 fffff80a`f67d4630 ffffcb8d`30255000 : dxgmms1!VidSchiRun_PriorityTable+0xb5
ffffbf86`81b85d10 fffff806`7172a7a5 : ffffcb8d`302a76c0 fffff80a`f67d4630 ffffcb8d`30255000 00000000`a91b3ffe : dxgmms1!VidSchiWorkerThread+0xb3
ffffbf86`81b85d50 fffff806`717c8b2a : fffff806`6db42180 ffffcb8d`302a76c0 fffff806`7172a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffbf86`81b85da0 00000000`00000000 : ffffbf86`81b86000 ffffbf86`81b80000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  526412124f5b2b73b1243b14b4a2f0f9d5a25941

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e102d7c92acc5a314664e0735a45ea4ebb853e49

THREAD_SHA1_HASH_MOD:  773de2e8f90928e903c905ffb34795d678a81aef

FOLLOWUP_IP:
nvlddmkm+153400
fffff80a`f7ed3400 48ff2539ce7200  jmp     qword ptr [nvlddmkm+0x880240 (fffff80a`f8600240)]

FAULT_INSTR_CODE:  3925ff48

SYMBOL_NAME:  nvlddmkm+153400

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5829870b

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x116_IMAGE_nvlddmkm.sys

BUCKET_ID:  0x116_IMAGE_nvlddmkm.sys

PRIMARY_PROBLEM_CLASS:  0x116_IMAGE_nvlddmkm.sys

TARGET_TIME:  2020-03-31T22:19:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1166

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x116_image_nvlddmkm.sys

FAILURE_ID_HASH:  {c89bfe8c-ed39-f658-ef27-f2898997fdbd}

Followup:     MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffd58ddb629610, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd58ddb629568, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2104   

BIOS_DATE:  03/09/2009

BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.

BASEBOARD_PRODUCT:  P5B

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: 1d

BUGCHECK_P2: ffffd58ddb629610

BUGCHECK_P3: ffffd58ddb629568

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd58ddb629610 -- (.trap 0xffffd58ddb629610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc8088bc2bb18 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffd8088b9afb18 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801811fab3b rsp=ffffd58ddb6297a8 rbp=0000000000000000
 r8=0000000000000001  r9=ffffd8088b9afb18 r10=ffffd8088bc2bb18
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!RtlRbRemoveNode+0x1b64fb:
fffff801`811fab3b cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd58ddb629568 -- (.exr 0xffffd58ddb629568)
ExceptionAddress: fffff801811fab3b (nt!RtlRbRemoveNode+0x00000000001b64fb)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

CPU_COUNT: 2

CPU_MHZ: a66

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: f

CPU_STEPPING: b

CPU_MICROCODE: 6,f,b,0 (F,M,S,R)  SIG: C1'00000000 (cache) C1'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_INVALID_BALANCED_TREE

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-02-2020 13:01:39.0567

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff801811d32e9 to fffff801811c14e0

STACK_TEXT: 
ffffd58d`db6292e8 fffff801`811d32e9 : 00000000`00000139 00000000`0000001d ffffd58d`db629610 ffffd58d`db629568 : nt!KeBugCheckEx
ffffd58d`db6292f0 fffff801`811d3710 : 00000000`00000000 fffff801`00000000 00000000`00000000 00000000`db629920 : nt!KiBugCheckDispatch+0x69
ffffd58d`db629430 fffff801`811d1aa5 : ffffc58c`47405080 ffffd808`8b7b3a40 ffffd808`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd58d`db629610 fffff801`811fab3b : 00000000`0000003a ffffd808`8bc15b10 fffff801`81042eb8 ffffd58d`db629839 : nt!KiRaiseSecurityCheckFailure+0x325
ffffd58d`db6297a8 fffff801`81042eb8 : ffffd58d`db629839 00000000`0000004d ffffd808`8bc15b10 ffffd808`83200280 : nt!RtlRbRemoveNode+0x1b64fb
ffffd58d`db6297c0 fffff801`81042d79 : ffffd808`83200280 fffff801`00000000 ffffc58c`00000000 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x48
ffffd58d`db629890 fffff801`8103330e : ffffd808`0000003b 00000001`00000390 ffffc58c`00000390 ffffd808`83200000 : nt!RtlpHpVsContextAllocateInternal+0x3c9
ffffd58d`db629900 fffff801`8136f06d : 00000193`00000001 00000000`00000000 00000000`00000000 00000000`00000378 : nt!ExAllocateHeapPool+0xc0e
ffffd58d`db629a40 fffff801`816ef56c : 00000000`fff3ffff ffffd58d`db629af0 00000000`01000000 00000193`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffffd58d`db629a90 fffff801`816ed2a0 : 00000000`00000378 00000000`00000008 00000000`00000000 00000000`fff3ffff : nt!ObpAllocateAndQuerySecurityDescriptorInfo+0x7c
ffffd58d`db629b30 fffff801`811d2d15 : 00000000`000012c8 ffffc58c`47405080 ffffd58d`db629cc0 00000000`00000001 : nt!NtSetSecurityObject+0x2f0
ffffd58d`db629c40 00007ffd`47aff4d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000069`2e5fdf38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`47aff4d4


THREAD_SHA1_HASH_MOD_FUNC:  3c71d52b0434db850238b1a8e134fe9dfd7f6a34

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  06f98c81bb4bb898de3eedec136400184bce630d

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff801`811d3710 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch

BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch

TARGET_TIME:  2020-03-31T22:38:46.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  13a1

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_1d_invalid_balanced_tree_nt!kifastfaildispatch

FAILURE_ID_HASH:  {67ec97ad-ad0b-071e-ab87-6dc661e22d1b}

Followup:     MachineOwner
---------

UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffba09cb991000, Pointer to the store context or data manager
Arg2: ffffb90d32516960, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2104   

BIOS_DATE:  03/09/2009

BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.

BASEBOARD_PRODUCT:  P5B

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: ffffba09cb991000

BUGCHECK_P2: ffffb90d32516960

BUGCHECK_P3: 1

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffffb90d32517908 -- (.exr 0xffffb90d32517908)
ExceptionAddress: fffff8032fe5bf97 (nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x000000000010eaa3)
   ExceptionCode: c0000420 (Assertion failure)
  ExceptionFlags: 00000000
NumberParameters: 0
Assertion: PageRecord->RefCount > 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000420 - <Unable to get error code text>

FAULTING_IP:
nt!ST_STORE<SM_TRAITS>::StDmPageRemove+10eaa3
fffff803`2fe5bf97 cd2c            int     2Ch

FOLLOWUP_IP:
nt!ST_STORE<SM_TRAITS>::StDmPageRemove+10eaa3
fffff803`2fe5bf97 cd2c            int     2Ch

EXCEPTION_PARAMETER1:  ffffba09cbfa29d0

EXCEPTION_PARAMETER2:  ffffba09cbfa29e0

BUGCHECK_STR:  0x154_c0000420

CONTEXT:  ffffb90d32517150 -- (.cxr 0xffffb90d32517150)
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001a
rdx=0000000000000000 rsi=ffffba09cb991050 rdi=00000000201eee44
rip=fffff8032fe5bf97 rsp=ffffb90d32517b40 rbp=ffffb90d32517ba9
 r8=ffffb90d32517b00  r9=ffffba09cbfa29d0 r10=ffffba09cbfa29e0
r11=0000000000000000 r12=ffffba09cd66db28 r13=ffffba09c6ac9010
r14=0000000000000000 r15=ffffba09cb991068
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000246
nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x10eaa3:
fffff803`2fe5bf97 cd2c            int     2Ch
Resetting default scope

CPU_COUNT: 2

CPU_MHZ: a66

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: f

CPU_STEPPING: b

CPU_MICROCODE: 6,f,b,0 (F,M,S,R)  SIG: C1'00000000 (cache) C1'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  MemCompression

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000420 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000420

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-02-2020 13:01:44.0015

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8032fd4e92d to fffff8032fe5bf97

STACK_TEXT: 
ffffb90d`32517b40 fffff803`2fd4e92d : 00000000`00000000 ffffba09`cb58b610 00000000`00000000 fffff803`2fd3b83f : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x10eaa3
ffffb90d`32517c10 fffff803`2fd3b06e : ffffba09`cb991000 ffffb90d`32517cd8 00000000`00000001 ffffba09`cc97e640 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xc1
ffffb90d`32517c60 fffff803`2fd3af31 : ffffdb98`00000000 00000000`00000000 ffffa7dc`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x12e
ffffb90d`32517d20 fffff803`2fd2a7a5 : ffffba09`cb991000 fffff803`2fd3af20 ffffb90d`31da5c08 00000000`00000080 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
ffffb90d`32517d50 fffff803`2fdc8b2a : ffffdd01`ad7c0180 ffffba09`cc97e640 fffff803`2fd2a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb90d`32517da0 00000000`00000000 : ffffb90d`32518000 ffffb90d`32512000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  37d569a73277c876541631696fe12bf6ad74bef0

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  697429ccf5ff4d072cf1e2eeb5c965d627bcbe02

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FAULT_INSTR_CODE:  de92ccd

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::StDmPageRemove+10eaa3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .cxr 0xffffb90d32517150 ; kb

BUCKET_ID_FUNC_OFFSET:  10eaa3

FAILURE_BUCKET_ID:  0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRemove

BUCKET_ID:  0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRemove

PRIMARY_PROBLEM_CLASS:  0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRemove

TARGET_TIME:  2020-04-01T01:47:32.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  13f9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x154_c0000420_nt!st_store_sm_traits_::stdmpageremove

FAILURE_ID_HASH:  {590615ef-63a3-d229-bb3e-108b70d75f76}

Followup:     MachineOwner
---------

CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
 or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware
 breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39fd8602a40363a, Reserved
Arg2: 0000000000000000, Reserved
Arg3: 98090ff228a2558d, Failure type dependent information
Arg4: 0000000000000101, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2104   

BIOS_DATE:  03/09/2009

BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.

BASEBOARD_PRODUCT:  P5B

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: a39fd8602a40363a

BUGCHECK_P2: 0

BUGCHECK_P3: 98090ff228a2558d

BUGCHECK_P4: 101

PG_MISMATCH:  20000000000

MEMORY_CORRUPTOR:  ONE_BIT

CPU_COUNT: 2

CPU_MHZ: a66

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: f

CPU_STEPPING: b

CPU_MICROCODE: 6,f,b,0 (F,M,S,R)  SIG: C1'00000000 (cache) C1'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x109

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-02-2020 13:01:47.0881

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

STACK_TEXT: 
fffff805`1de65c38 00000000`00000000 : 00000000`00000109 a39fd860`2a40363a 00000000`00000000 98090ff2`28a2558d : nt!KeBugCheckEx


THREAD_SHA1_HASH_MOD_FUNC:  81a83ae0317433a47fcc36991983df3b6e638b71

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6e16edd8c7dd677734fdbcd2397a2e35e9fae964

THREAD_SHA1_HASH_MOD:  76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-04-01T06:21:56.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  8e2

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa10a33dcdb20, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80050a455d3, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2104   

BIOS_DATE:  03/09/2009

BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.

BASEBOARD_PRODUCT:  P5B

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: ffffa10a33dcdb20

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80050a455d3

BUGCHECK_P4: 2

READ_ADDRESS: fffff80050f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffa10a33dcdb20

FAULTING_IP:
nt!RtlRbInsertNodeEx+273
fffff800`50a455d3 488b4108        mov     rax,qword ptr [rcx+8]

MM_INTERNAL_CODE:  2

CPU_COUNT: 2

CPU_MHZ: a66

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: f

CPU_STEPPING: b

CPU_MICROCODE: 6,f,b,0 (F,M,S,R)  SIG: C1'00000000 (cache) C1'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  PAGE_NOT_ZERO_AV

BUGCHECK_STR:  AV

PROCESS_NAME:  MRT.exe

CURRENT_IRQL:  0

BAD_PAGES_DETECTED: 1

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-02-2020 13:01:52.0032

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

DEVICE_OBJECT: ffff808f00000000

TRAP_FRAME:  ffffaa02c9cb4b80 -- (.trap 0xffffaa02c9cb4b80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb10a33d6bb18 rbx=0000000000000000 rcx=ffffa10a33dcdb18
rdx=ffffb10a33d6bb18 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80050a455d3 rsp=ffffaa02c9cb4d10 rbp=0000000000000000
 r8=ffffb10a33d67b18  r9=0000000000000000 r10=ffffb10a2a000290
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!RtlRbInsertNodeEx+0x273:
fffff800`50a455d3 488b4108        mov     rax,qword ptr [rcx+8] ds:ffffa10a`33dcdb20=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80050be35d6 to fffff80050bc14e0

STACK_TEXT: 
ffffaa02`c9cb48d8 fffff800`50be35d6 : 00000000`00000050 ffffa10a`33dcdb20 00000000`00000000 ffffaa02`c9cb4b80 : nt!KeBugCheckEx
ffffaa02`c9cb48e0 fffff800`50a72eef : 00000000`00000921 00000000`00000000 00000000`00000000 ffffa10a`33dcdb20 : nt!MiSystemFault+0x1d6866
ffffaa02`c9cb49e0 fffff800`50bcf520 : ffff72ec`eb647541 fffff800`50e69b58 ffffb10a`33e37b20 00000000`00000000 : nt!MmAccessFault+0x34f
ffffaa02`c9cb4b80 fffff800`50a455d3 : 00000000`00000000 fffff800`50a44114 ffffb10a`33e46000 ffffb10a`2a000280 : nt!KiPageFault+0x360
ffffaa02`c9cb4d10 fffff800`50a44114 : ffffb10a`33e46000 ffffb10a`2a000280 ffffb10a`33e4bb10 00000000`00000027 : nt!RtlRbInsertNodeEx+0x273
ffffaa02`c9cb4d20 fffff800`50a460ed : 00000000`00000027 00000000`00000000 00000000`00000103 00000000`00000000 : nt!RtlpHpVsContextFree+0x424
ffffaa02`c9cb4dc0 fffff800`50d6f0a9 : ffff808f`d84d9080 ffff808f`00000260 ffffffff`ffffffff 01000000`00100000 : nt!ExFreeHeapPool+0x56d
ffffaa02`c9cb4ee0 fffff800`5214edae : ffff808f`d84d9080 ffff808f`dbb6b248 ffffb10a`2efdab48 ffff808f`d563f4a0 : nt!ExFreePool+0x9
ffffaa02`c9cb4f10 fffff800`5214d906 : fffff800`52139060 ffff808f`d563f4a0 ffff808f`00000001 ffff808f`d563f4a0 : FLTMGR!FltReleaseFileNameInformation+0x12e
ffffaa02`c9cb4f50 fffff800`5214efaa : ffff808f`dbb6b1e0 ffff808f`00008000 00000000`00000000 ffff808f`dbb6b1e0 : FLTMGR!CleanupStreamListCtrl+0x2a6
ffffaa02`c9cb4fd0 fffff800`510704fb : ffffb10a`2f3ad700 ffff808f`dbb6b1e8 ffffb10a`00000001 ffff808f`db53a8d8 : FLTMGR!DeleteStreamListCtrlCallback+0xba
ffffaa02`c9cb5010 fffff800`52ceee21 : ffffb10a`2f3ad700 ffffaa02`c9cb5148 ffff808f`db53a8d8 00000000`00000705 : nt!FsRtlTeardownPerStreamContexts+0xcb
ffffaa02`c9cb5050 fffff800`52cef772 : ffffb10a`2f3ad700 fffff800`52c1a12a ffffb10a`00000203 00000000`00008000 : Ntfs!NtfsDeleteScb+0x161
ffffaa02`c9cb50e0 fffff800`52c14225 : ffffb10a`2f3ad5e0 ffffb10a`2f3ad700 ffffb10a`2f3ad5a0 ffffb10a`2f3ad700 : Ntfs!NtfsRemoveScb+0xba
ffffaa02`c9cb5140 fffff800`52cef4b0 : ffff808f`db53a8d8 ffffaa02`c9cb5850 ffffb10a`2f3ad5a0 ffffb10a`2f3ad900 : Ntfs!NtfsPrepareFcbForRemoval+0x75
ffffaa02`c9cb5180 fffff800`52c1892a : ffff808f`db53a8d8 ffffaa02`c9cb5281 ffffb10a`2f3ad9e8 ffff808f`db53a8d8 : Ntfs!NtfsTeardownStructures+0xa0
ffffaa02`c9cb5200 fffff800`52d10cec : ffffaa02`c9cb5300 ffffb10a`00000000 ffff808f`00000001 ffff808f`db53a8d8 : Ntfs!NtfsDecrementCloseCounts+0xaa
ffffaa02`c9cb5240 fffff800`52d0fc31 : ffff808f`db53a8d8 ffffb10a`2f3ad700 ffffb10a`2f3ad5a0 ffff808f`d5641180 : Ntfs!NtfsCommonClose+0x45c
ffffaa02`c9cb5320 fffff800`52d4d580 : 00000000`00000003 00000000`00000018 00000000`00000003 00000000`00000003 : Ntfs!NtfsFspCloseInternal+0x241
ffffaa02`c9cb5480 fffff800`52c2a577 : ffffb10a`324e7320 ffff808f`d8d644b0 ffffb10a`324e7320 ffff808f`d8d644b0 : Ntfs!NtfsFlushVolume+0x130
ffffaa02`c9cb55a0 fffff800`52c18527 : ffff808f`db662c68 ffff808f`d8d644b0 ffff808f`d5567d30 00000000`00000001 : Ntfs!NtfsVolumeDasdIo+0x1ef
ffffaa02`c9cb5660 fffff800`52c1641c : ffffaa02`c9cb5860 ffff808f`d8d644b0 ffffaa02`c9cb5860 ffff808f`db662c68 : Ntfs!NtfsCommonRead+0x1ef7
ffffaa02`c9cb5820 fffff800`50a31f79 : ffff808f`daa7cb20 ffff808f`d8d644b0 ffff808f`d8d648e0 00000000`00000000 : Ntfs!NtfsFsdRead+0x20c
ffffaa02`c9cb58e0 fffff800`521155d9 : 00000000`00000000 ffffaa02`c9cb59c0 ffff808f`d8d644b0 ffffaa02`c9cb59d0 : nt!IofCallDriver+0x59
ffffaa02`c9cb5920 fffff800`52113f16 : ffffaa02`c9cb59c0 ffff9800`01721bb0 ffffaa02`c9cb5b01 fffff800`50ff1225 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x159
ffffaa02`c9cb59a0 fffff800`50a31f79 : ffff808f`d8d644b0 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltpDispatch+0xb6
ffffaa02`c9cb5a00 fffff800`50fe95e5 : 00000000`00000000 ffff808f`ddd595d0 ffff808f`ddd59620 ffff808f`ddd595d0 : nt!IofCallDriver+0x59
ffffaa02`c9cb5a40 fffff800`50fe57bf : ffff808f`00000000 00000000`00000000 00000000`00000000 ffffaa02`c9cb5cc0 : nt!IopSynchronousServiceTail+0x1a5
ffffaa02`c9cb5ae0 fffff800`50bd2d15 : 00000000`00000700 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x59f
ffffaa02`c9cb5bd0 00007ffb`1b1dc184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000002a`de5fc3f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1b1dc184


THREAD_SHA1_HASH_MOD_FUNC:  7e51b40fd81bf91ed8e7eef428d88e4d26b2be94

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  07f3390cfa4fb35ff031f86b8ab2539578faec8e

THREAD_SHA1_HASH_MOD:  ee35321f7d3ac590bd1e1143242b279f6fdac538

SYMBOL_NAME:  PAGE_NOT_ZERO

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  PAGE_NOT_ZERO_AV

PRIMARY_PROBLEM_CLASS:  PAGE_NOT_ZERO_AV

FAILURE_BUCKET_ID:  PAGE_NOT_ZERO_AV

TARGET_TIME:  2020-04-01T20:44:04.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  19ca

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:page_not_zero_av

FAILURE_ID_HASH:  {91fefd05-7a2b-5d37-e27f-7af624353ffc}

Followup:     MachineOwner
---------

 *** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.
 
Memtest86 sonuçları ne oldu?


HD Tune programı ile sisteme takılı tüm depolama birimlerinin Error Scan ve Health sonuçlarını fotoğraf şeklinde paylaş.

Error Scan testinde Quick Scan yapma.
Kod:
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffcb8d339d8010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff80af7ed3400, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 000000000000000d, Optional internal context dependent data.

Debugging Details:
------------------

Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2104  

BIOS_DATE:  03/09/2009

BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.

BASEBOARD_PRODUCT:  P5B

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: ffffcb8d339d8010

BUGCHECK_P2: fffff80af7ed3400

BUGCHECK_P3: 0

BUGCHECK_P4: d

FAULTING_IP:
nvlddmkm+153400
fffff80a`f7ed3400 48ff2539ce7200  jmp     qword ptr [nvlddmkm+0x880240 (fffff80a`f8600240)]

DEFAULT_BUCKET_ID:  GRAPHICS_DRIVER_TDR_FAULT

CPU_COUNT: 2

CPU_MHZ: a66

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: f

CPU_STEPPING: b

CPU_MICROCODE: 6,f,b,0 (F,M,S,R)  SIG: C1'00000000 (cache) C1'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x116

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-02-2020 13:01:36.0952

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

STACK_TEXT:
ffffbf86`81b85538 fffff80a`f5d709d5 : 00000000`00000116 ffffcb8d`339d8010 fffff80a`f7ed3400 00000000`00000000 : nt!KeBugCheckEx
ffffbf86`81b85540 fffff80a`f5d7004b : fffff80a`f7ed3400 ffffcb8d`339d8010 ffffbf86`81b85649 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xf9
ffffbf86`81b85580 fffff80a`f679e23a : ffffcb8d`339d8010 00000000`00007c8b ffffbf86`81b85649 00000000`00013955 : dxgkrnl!TdrIsRecoveryRequired+0x1ab
ffffbf86`81b855b0 fffff80a`f67b5a55 : ffffbf86`81b857c0 ffffcb8d`3025f000 ffffbf86`81b857c0 00000000`00000000 : dxgmms1!VidSchiReportHwHang+0x5b2
ffffbf86`81b856b0 fffff80a`f67be528 : ffffcb8d`302ae000 00000000`00000000 00000000`00000002 00000000`00000000 : dxgmms1!VidSchWaitForCompletionEvent+0x4c5
ffffbf86`81b85770 fffff80a`f67c240f : 00000000`00013956 00000000`00000005 ffff808e`00000006 ffffcb8d`34071c00 : dxgmms1!VIDMM_GLOBAL::xWaitForAllEngines+0x4c8
ffffbf86`81b858a0 fffff80a`f67befeb : ffffcb8d`2f491900 ffff808e`6b9f6d90 00000000`00000005 ffffcb8d`33a4ce50 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x1c3f
ffffbf86`81b859e0 fffff80a`f67d47a5 : ffffcb8d`33ad19a0 ffffcb8d`00000000 ffffcb8d`2f4919a0 ffffcb8d`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x1fb
ffffbf86`81b85cc0 fffff80a`f67d46e3 : ffffcb8d`30255000 00000000`00000080 fffff80a`f67d4630 ffffcb8d`30255000 : dxgmms1!VidSchiRun_PriorityTable+0xb5
ffffbf86`81b85d10 fffff806`7172a7a5 : ffffcb8d`302a76c0 fffff80a`f67d4630 ffffcb8d`30255000 00000000`a91b3ffe : dxgmms1!VidSchiWorkerThread+0xb3
ffffbf86`81b85d50 fffff806`717c8b2a : fffff806`6db42180 ffffcb8d`302a76c0 fffff806`7172a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffbf86`81b85da0 00000000`00000000 : ffffbf86`81b86000 ffffbf86`81b80000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  526412124f5b2b73b1243b14b4a2f0f9d5a25941

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e102d7c92acc5a314664e0735a45ea4ebb853e49

THREAD_SHA1_HASH_MOD:  773de2e8f90928e903c905ffb34795d678a81aef

FOLLOWUP_IP:
nvlddmkm+153400
fffff80a`f7ed3400 48ff2539ce7200  jmp     qword ptr [nvlddmkm+0x880240 (fffff80a`f8600240)]

FAULT_INSTR_CODE:  3925ff48

SYMBOL_NAME:  nvlddmkm+153400

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5829870b

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x116_IMAGE_nvlddmkm.sys

BUCKET_ID:  0x116_IMAGE_nvlddmkm.sys

PRIMARY_PROBLEM_CLASS:  0x116_IMAGE_nvlddmkm.sys

TARGET_TIME:  2020-03-31T22:19:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1166

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x116_image_nvlddmkm.sys

FAILURE_ID_HASH:  {c89bfe8c-ed39-f658-ef27-f2898997fdbd}

Followup:     MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffd58ddb629610, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd58ddb629568, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2104  

BIOS_DATE:  03/09/2009

BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.

BASEBOARD_PRODUCT:  P5B

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: 1d

BUGCHECK_P2: ffffd58ddb629610

BUGCHECK_P3: ffffd58ddb629568

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd58ddb629610 -- (.trap 0xffffd58ddb629610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc8088bc2bb18 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffd8088b9afb18 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801811fab3b rsp=ffffd58ddb6297a8 rbp=0000000000000000
r8=0000000000000001  r9=ffffd8088b9afb18 r10=ffffd8088bc2bb18
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!RtlRbRemoveNode+0x1b64fb:
fffff801`811fab3b cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd58ddb629568 -- (.exr 0xffffd58ddb629568)
ExceptionAddress: fffff801811fab3b (nt!RtlRbRemoveNode+0x00000000001b64fb)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

CPU_COUNT: 2

CPU_MHZ: a66

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: f

CPU_STEPPING: b

CPU_MICROCODE: 6,f,b,0 (F,M,S,R)  SIG: C1'00000000 (cache) C1'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_INVALID_BALANCED_TREE

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-02-2020 13:01:39.0567

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff801811d32e9 to fffff801811c14e0

STACK_TEXT:
ffffd58d`db6292e8 fffff801`811d32e9 : 00000000`00000139 00000000`0000001d ffffd58d`db629610 ffffd58d`db629568 : nt!KeBugCheckEx
ffffd58d`db6292f0 fffff801`811d3710 : 00000000`00000000 fffff801`00000000 00000000`00000000 00000000`db629920 : nt!KiBugCheckDispatch+0x69
ffffd58d`db629430 fffff801`811d1aa5 : ffffc58c`47405080 ffffd808`8b7b3a40 ffffd808`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd58d`db629610 fffff801`811fab3b : 00000000`0000003a ffffd808`8bc15b10 fffff801`81042eb8 ffffd58d`db629839 : nt!KiRaiseSecurityCheckFailure+0x325
ffffd58d`db6297a8 fffff801`81042eb8 : ffffd58d`db629839 00000000`0000004d ffffd808`8bc15b10 ffffd808`83200280 : nt!RtlRbRemoveNode+0x1b64fb
ffffd58d`db6297c0 fffff801`81042d79 : ffffd808`83200280 fffff801`00000000 ffffc58c`00000000 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x48
ffffd58d`db629890 fffff801`8103330e : ffffd808`0000003b 00000001`00000390 ffffc58c`00000390 ffffd808`83200000 : nt!RtlpHpVsContextAllocateInternal+0x3c9
ffffd58d`db629900 fffff801`8136f06d : 00000193`00000001 00000000`00000000 00000000`00000000 00000000`00000378 : nt!ExAllocateHeapPool+0xc0e
ffffd58d`db629a40 fffff801`816ef56c : 00000000`fff3ffff ffffd58d`db629af0 00000000`01000000 00000193`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffffd58d`db629a90 fffff801`816ed2a0 : 00000000`00000378 00000000`00000008 00000000`00000000 00000000`fff3ffff : nt!ObpAllocateAndQuerySecurityDescriptorInfo+0x7c
ffffd58d`db629b30 fffff801`811d2d15 : 00000000`000012c8 ffffc58c`47405080 ffffd58d`db629cc0 00000000`00000001 : nt!NtSetSecurityObject+0x2f0
ffffd58d`db629c40 00007ffd`47aff4d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000069`2e5fdf38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`47aff4d4


THREAD_SHA1_HASH_MOD_FUNC:  3c71d52b0434db850238b1a8e134fe9dfd7f6a34

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  06f98c81bb4bb898de3eedec136400184bce630d

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff801`811d3710 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch

BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch

TARGET_TIME:  2020-03-31T22:38:46.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  13a1

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_1d_invalid_balanced_tree_nt!kifastfaildispatch

FAILURE_ID_HASH:  {67ec97ad-ad0b-071e-ab87-6dc661e22d1b}

Followup:     MachineOwner
---------

UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffba09cb991000, Pointer to the store context or data manager
Arg2: ffffb90d32516960, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2104  

BIOS_DATE:  03/09/2009

BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.

BASEBOARD_PRODUCT:  P5B

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: ffffba09cb991000

BUGCHECK_P2: ffffb90d32516960

BUGCHECK_P3: 1

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffffb90d32517908 -- (.exr 0xffffb90d32517908)
ExceptionAddress: fffff8032fe5bf97 (nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x000000000010eaa3)
   ExceptionCode: c0000420 (Assertion failure)
  ExceptionFlags: 00000000
NumberParameters: 0
Assertion: PageRecord->RefCount > 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000420 - <Unable to get error code text>

FAULTING_IP:
nt!ST_STORE<SM_TRAITS>::StDmPageRemove+10eaa3
fffff803`2fe5bf97 cd2c            int     2Ch

FOLLOWUP_IP:
nt!ST_STORE<SM_TRAITS>::StDmPageRemove+10eaa3
fffff803`2fe5bf97 cd2c            int     2Ch

EXCEPTION_PARAMETER1:  ffffba09cbfa29d0

EXCEPTION_PARAMETER2:  ffffba09cbfa29e0

BUGCHECK_STR:  0x154_c0000420

CONTEXT:  ffffb90d32517150 -- (.cxr 0xffffb90d32517150)
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001a
rdx=0000000000000000 rsi=ffffba09cb991050 rdi=00000000201eee44
rip=fffff8032fe5bf97 rsp=ffffb90d32517b40 rbp=ffffb90d32517ba9
r8=ffffb90d32517b00  r9=ffffba09cbfa29d0 r10=ffffba09cbfa29e0
r11=0000000000000000 r12=ffffba09cd66db28 r13=ffffba09c6ac9010
r14=0000000000000000 r15=ffffba09cb991068
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000246
nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x10eaa3:
fffff803`2fe5bf97 cd2c            int     2Ch
Resetting default scope

CPU_COUNT: 2

CPU_MHZ: a66

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: f

CPU_STEPPING: b

CPU_MICROCODE: 6,f,b,0 (F,M,S,R)  SIG: C1'00000000 (cache) C1'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  MemCompression

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000420 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000420

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-02-2020 13:01:44.0015

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8032fd4e92d to fffff8032fe5bf97

STACK_TEXT:
ffffb90d`32517b40 fffff803`2fd4e92d : 00000000`00000000 ffffba09`cb58b610 00000000`00000000 fffff803`2fd3b83f : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x10eaa3
ffffb90d`32517c10 fffff803`2fd3b06e : ffffba09`cb991000 ffffb90d`32517cd8 00000000`00000001 ffffba09`cc97e640 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xc1
ffffb90d`32517c60 fffff803`2fd3af31 : ffffdb98`00000000 00000000`00000000 ffffa7dc`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x12e
ffffb90d`32517d20 fffff803`2fd2a7a5 : ffffba09`cb991000 fffff803`2fd3af20 ffffb90d`31da5c08 00000000`00000080 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
ffffb90d`32517d50 fffff803`2fdc8b2a : ffffdd01`ad7c0180 ffffba09`cc97e640 fffff803`2fd2a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb90d`32517da0 00000000`00000000 : ffffb90d`32518000 ffffb90d`32512000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  37d569a73277c876541631696fe12bf6ad74bef0

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  697429ccf5ff4d072cf1e2eeb5c965d627bcbe02

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FAULT_INSTR_CODE:  de92ccd

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::StDmPageRemove+10eaa3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .cxr 0xffffb90d32517150 ; kb

BUCKET_ID_FUNC_OFFSET:  10eaa3

FAILURE_BUCKET_ID:  0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRemove

BUCKET_ID:  0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRemove

PRIMARY_PROBLEM_CLASS:  0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRemove

TARGET_TIME:  2020-04-01T01:47:32.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  13f9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x154_c0000420_nt!st_store_sm_traits_::stdmpageremove

FAILURE_ID_HASH:  {590615ef-63a3-d229-bb3e-108b70d75f76}

Followup:     MachineOwner
---------

CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39fd8602a40363a, Reserved
Arg2: 0000000000000000, Reserved
Arg3: 98090ff228a2558d, Failure type dependent information
Arg4: 0000000000000101, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2104  

BIOS_DATE:  03/09/2009

BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.

BASEBOARD_PRODUCT:  P5B

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: a39fd8602a40363a

BUGCHECK_P2: 0

BUGCHECK_P3: 98090ff228a2558d

BUGCHECK_P4: 101

PG_MISMATCH:  20000000000

MEMORY_CORRUPTOR:  ONE_BIT

CPU_COUNT: 2

CPU_MHZ: a66

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: f

CPU_STEPPING: b

CPU_MICROCODE: 6,f,b,0 (F,M,S,R)  SIG: C1'00000000 (cache) C1'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x109

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-02-2020 13:01:47.0881

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

STACK_TEXT:
fffff805`1de65c38 00000000`00000000 : 00000000`00000109 a39fd860`2a40363a 00000000`00000000 98090ff2`28a2558d : nt!KeBugCheckEx


THREAD_SHA1_HASH_MOD_FUNC:  81a83ae0317433a47fcc36991983df3b6e638b71

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6e16edd8c7dd677734fdbcd2397a2e35e9fae964

THREAD_SHA1_HASH_MOD:  76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-04-01T06:21:56.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  8e2

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa10a33dcdb20, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80050a455d3, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2104  

BIOS_DATE:  03/09/2009

BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.

BASEBOARD_PRODUCT:  P5B

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: ffffa10a33dcdb20

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80050a455d3

BUGCHECK_P4: 2

READ_ADDRESS: fffff80050f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffa10a33dcdb20

FAULTING_IP:
nt!RtlRbInsertNodeEx+273
fffff800`50a455d3 488b4108        mov     rax,qword ptr [rcx+8]

MM_INTERNAL_CODE:  2

CPU_COUNT: 2

CPU_MHZ: a66

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: f

CPU_STEPPING: b

CPU_MICROCODE: 6,f,b,0 (F,M,S,R)  SIG: C1'00000000 (cache) C1'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  PAGE_NOT_ZERO_AV

BUGCHECK_STR:  AV

PROCESS_NAME:  MRT.exe

CURRENT_IRQL:  0

BAD_PAGES_DETECTED: 1

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-02-2020 13:01:52.0032

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

DEVICE_OBJECT: ffff808f00000000

TRAP_FRAME:  ffffaa02c9cb4b80 -- (.trap 0xffffaa02c9cb4b80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb10a33d6bb18 rbx=0000000000000000 rcx=ffffa10a33dcdb18
rdx=ffffb10a33d6bb18 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80050a455d3 rsp=ffffaa02c9cb4d10 rbp=0000000000000000
r8=ffffb10a33d67b18  r9=0000000000000000 r10=ffffb10a2a000290
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!RtlRbInsertNodeEx+0x273:
fffff800`50a455d3 488b4108        mov     rax,qword ptr [rcx+8] ds:ffffa10a`33dcdb20=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80050be35d6 to fffff80050bc14e0

STACK_TEXT:
ffffaa02`c9cb48d8 fffff800`50be35d6 : 00000000`00000050 ffffa10a`33dcdb20 00000000`00000000 ffffaa02`c9cb4b80 : nt!KeBugCheckEx
ffffaa02`c9cb48e0 fffff800`50a72eef : 00000000`00000921 00000000`00000000 00000000`00000000 ffffa10a`33dcdb20 : nt!MiSystemFault+0x1d6866
ffffaa02`c9cb49e0 fffff800`50bcf520 : ffff72ec`eb647541 fffff800`50e69b58 ffffb10a`33e37b20 00000000`00000000 : nt!MmAccessFault+0x34f
ffffaa02`c9cb4b80 fffff800`50a455d3 : 00000000`00000000 fffff800`50a44114 ffffb10a`33e46000 ffffb10a`2a000280 : nt!KiPageFault+0x360
ffffaa02`c9cb4d10 fffff800`50a44114 : ffffb10a`33e46000 ffffb10a`2a000280 ffffb10a`33e4bb10 00000000`00000027 : nt!RtlRbInsertNodeEx+0x273
ffffaa02`c9cb4d20 fffff800`50a460ed : 00000000`00000027 00000000`00000000 00000000`00000103 00000000`00000000 : nt!RtlpHpVsContextFree+0x424
ffffaa02`c9cb4dc0 fffff800`50d6f0a9 : ffff808f`d84d9080 ffff808f`00000260 ffffffff`ffffffff 01000000`00100000 : nt!ExFreeHeapPool+0x56d
ffffaa02`c9cb4ee0 fffff800`5214edae : ffff808f`d84d9080 ffff808f`dbb6b248 ffffb10a`2efdab48 ffff808f`d563f4a0 : nt!ExFreePool+0x9
ffffaa02`c9cb4f10 fffff800`5214d906 : fffff800`52139060 ffff808f`d563f4a0 ffff808f`00000001 ffff808f`d563f4a0 : FLTMGR!FltReleaseFileNameInformation+0x12e
ffffaa02`c9cb4f50 fffff800`5214efaa : ffff808f`dbb6b1e0 ffff808f`00008000 00000000`00000000 ffff808f`dbb6b1e0 : FLTMGR!CleanupStreamListCtrl+0x2a6
ffffaa02`c9cb4fd0 fffff800`510704fb : ffffb10a`2f3ad700 ffff808f`dbb6b1e8 ffffb10a`00000001 ffff808f`db53a8d8 : FLTMGR!DeleteStreamListCtrlCallback+0xba
ffffaa02`c9cb5010 fffff800`52ceee21 : ffffb10a`2f3ad700 ffffaa02`c9cb5148 ffff808f`db53a8d8 00000000`00000705 : nt!FsRtlTeardownPerStreamContexts+0xcb
ffffaa02`c9cb5050 fffff800`52cef772 : ffffb10a`2f3ad700 fffff800`52c1a12a ffffb10a`00000203 00000000`00008000 : Ntfs!NtfsDeleteScb+0x161
ffffaa02`c9cb50e0 fffff800`52c14225 : ffffb10a`2f3ad5e0 ffffb10a`2f3ad700 ffffb10a`2f3ad5a0 ffffb10a`2f3ad700 : Ntfs!NtfsRemoveScb+0xba
ffffaa02`c9cb5140 fffff800`52cef4b0 : ffff808f`db53a8d8 ffffaa02`c9cb5850 ffffb10a`2f3ad5a0 ffffb10a`2f3ad900 : Ntfs!NtfsPrepareFcbForRemoval+0x75
ffffaa02`c9cb5180 fffff800`52c1892a : ffff808f`db53a8d8 ffffaa02`c9cb5281 ffffb10a`2f3ad9e8 ffff808f`db53a8d8 : Ntfs!NtfsTeardownStructures+0xa0
ffffaa02`c9cb5200 fffff800`52d10cec : ffffaa02`c9cb5300 ffffb10a`00000000 ffff808f`00000001 ffff808f`db53a8d8 : Ntfs!NtfsDecrementCloseCounts+0xaa
ffffaa02`c9cb5240 fffff800`52d0fc31 : ffff808f`db53a8d8 ffffb10a`2f3ad700 ffffb10a`2f3ad5a0 ffff808f`d5641180 : Ntfs!NtfsCommonClose+0x45c
ffffaa02`c9cb5320 fffff800`52d4d580 : 00000000`00000003 00000000`00000018 00000000`00000003 00000000`00000003 : Ntfs!NtfsFspCloseInternal+0x241
ffffaa02`c9cb5480 fffff800`52c2a577 : ffffb10a`324e7320 ffff808f`d8d644b0 ffffb10a`324e7320 ffff808f`d8d644b0 : Ntfs!NtfsFlushVolume+0x130
ffffaa02`c9cb55a0 fffff800`52c18527 : ffff808f`db662c68 ffff808f`d8d644b0 ffff808f`d5567d30 00000000`00000001 : Ntfs!NtfsVolumeDasdIo+0x1ef
ffffaa02`c9cb5660 fffff800`52c1641c : ffffaa02`c9cb5860 ffff808f`d8d644b0 ffffaa02`c9cb5860 ffff808f`db662c68 : Ntfs!NtfsCommonRead+0x1ef7
ffffaa02`c9cb5820 fffff800`50a31f79 : ffff808f`daa7cb20 ffff808f`d8d644b0 ffff808f`d8d648e0 00000000`00000000 : Ntfs!NtfsFsdRead+0x20c
ffffaa02`c9cb58e0 fffff800`521155d9 : 00000000`00000000 ffffaa02`c9cb59c0 ffff808f`d8d644b0 ffffaa02`c9cb59d0 : nt!IofCallDriver+0x59
ffffaa02`c9cb5920 fffff800`52113f16 : ffffaa02`c9cb59c0 ffff9800`01721bb0 ffffaa02`c9cb5b01 fffff800`50ff1225 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x159
ffffaa02`c9cb59a0 fffff800`50a31f79 : ffff808f`d8d644b0 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltpDispatch+0xb6
ffffaa02`c9cb5a00 fffff800`50fe95e5 : 00000000`00000000 ffff808f`ddd595d0 ffff808f`ddd59620 ffff808f`ddd595d0 : nt!IofCallDriver+0x59
ffffaa02`c9cb5a40 fffff800`50fe57bf : ffff808f`00000000 00000000`00000000 00000000`00000000 ffffaa02`c9cb5cc0 : nt!IopSynchronousServiceTail+0x1a5
ffffaa02`c9cb5ae0 fffff800`50bd2d15 : 00000000`00000700 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x59f
ffffaa02`c9cb5bd0 00007ffb`1b1dc184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000002a`de5fc3f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1b1dc184


THREAD_SHA1_HASH_MOD_FUNC:  7e51b40fd81bf91ed8e7eef428d88e4d26b2be94

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  07f3390cfa4fb35ff031f86b8ab2539578faec8e

THREAD_SHA1_HASH_MOD:  ee35321f7d3ac590bd1e1143242b279f6fdac538

SYMBOL_NAME:  PAGE_NOT_ZERO

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  PAGE_NOT_ZERO_AV

PRIMARY_PROBLEM_CLASS:  PAGE_NOT_ZERO_AV

FAILURE_BUCKET_ID:  PAGE_NOT_ZERO_AV

TARGET_TIME:  2020-04-01T20:44:04.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  19ca

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:page_not_zero_av

FAILURE_ID_HASH:  {91fefd05-7a2b-5d37-e27f-7af624353ffc}

Followup:     MachineOwner
---------

*** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.
Biraz baktım ama anladığım kadarı ile Memtest86 testini istedim, biraz ilerleme var gibi:)
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Yeni konular

Geri
Yukarı