SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffd90ee19dab22, Address of the instruction which caused the bugcheck
Arg3: ffffd18d63e98920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 6
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 13
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffd90ee19dab22
BUGCHECK_P3: ffffd18d63e98920
BUGCHECK_P4: 0
CONTEXT: ffffd18d63e98920 -- (.cxr 0xffffd18d63e98920)
rax=ffffd95640a12168 rbx=00000000110a0c0f rcx=000000000000184d
rdx=ffffd95640a12168 rsi=ffffd95641a12168 rdi=0000000000000000
rip=ffffd90ee19dab22 rsp=ffffd18d63e99310 rbp=000000000000000a
r8=ffffd18d63e99288 r9=0000000000000000 r10=fffff80148312460
r11=ffffd18d63e992e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kbase!HmgShareLock+0x62:
ffffd90e`e19dab22 40386e0e cmp byte ptr [rsi+0Eh],bpl ds:002b:ffffd956`41a12176=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ts3client_win64.exe
STACK_TEXT:
ffffd18d`63e99310 ffffd90e`e16d9e8d : 00000000`110a0c0f ffffd18d`63e99618 ffffdd8f`5ecb2c60 ffffd18d`63e99418 : win32kbase!HmgShareLock+0x62
ffffd18d`63e99380 ffffd90e`e16be38f : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000228 : win32kfull!NtGdiGetRealizationInfo+0x48d
ffffd18d`63e995e0 ffffd90e`e16be26d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!NtGdiGetCharABCWidthsW+0x1ff
ffffd18d`63e99a00 fffff801`483d3c18 : ffffffff`a4010be9 ffffd90e`0000001d ffffdd8f`00000001 00000000`00000000 : win32kfull!NtGdiGetCharABCWidthsW+0xdd
ffffd18d`63e99a90 00007ffe`7ae36564 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e7`d84f6818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7ae36564
SYMBOL_NAME: win32kbase!HmgShareLock+62
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .cxr 0xffffd18d63e98920 ; kb
BUCKET_ID_FUNC_OFFSET: 62
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!HmgShareLock
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f8d7532b-024c-73a1-ea86-fe13f10138bd}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80710455a1c, Address of the instruction which caused the bugcheck
Arg3: fffff10e236c2d40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 8
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80710455a1c
BUGCHECK_P3: fffff10e236c2d40
BUGCHECK_P4: 0
CONTEXT: fffff10e236c2d40 -- (.cxr 0xfffff10e236c2d40)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc00010bb9180
rdx=0000000000000000 rsi=0000000001000000 rdi=0000000001000000
rip=fffff80710455a1c rsp=fffff10e236c3730 rbp=ffffd48d7c09f7a0
r8=0000000001000000 r9=00000000ffffffff r10=7ffffffffffffffc
r11=fffff10e236c3710 r12=ffffd48d7c09f7d8 r13=0000000001000000
r14=ffffd48d7bb5d840 r15=ffffffffffffffff
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!MiFinishVadDeletion+0x16484c:
fffff807`10455a1c 488b1f mov rbx,qword ptr [rdi] ds:002b:00000000`01000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
fffff10e`236c3730 fffff807`102f1059 : ffffffff`00000000 00000000`00000001 ffffd48d`00000000 00000000`00000000 : nt!MiFinishVadDeletion+0x16484c
fffff10e`236c37e0 fffff807`1087979d : 00000000`00000000 ffffd48d`7ba5eb70 ffffd48d`7ba5eb70 00000000`00000000 : nt!MiDeleteVad+0x19a9
fffff10e`236c39a0 fffff807`10879593 : ffffd48d`7c09f7a0 00000000`00000000 000001bc`9cad0000 00000000`00000000 : nt!MiUnmapVad+0x49
fffff10e`236c39d0 fffff807`10879429 : ffffd48d`7bb5d340 000001bc`00000008 ffffd48d`712a64e0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
fffff10e`236c3ab0 fffff807`103d3c18 : ffffd48d`79793080 000001bc`9cad0000 00000000`0000fefb ffffd48d`7bb5d340 : nt!NtUnmapViewOfSectionEx+0x99
fffff10e`236c3b00 00007ffb`93fdf924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000079`2387d488 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`93fdf924
SYMBOL_NAME: nt!MiFinishVadDeletion+16484c
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .cxr 0xfffff10e236c2d40 ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 16484c
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!MiFinishVadDeletion
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2657f179-9eb8-9bfb-ae5c-b5b05e603b62}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff930d6f3dab22, Address of the instruction which caused the bugcheck
Arg3: fffff98b3381a920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 27
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff930d6f3dab22
BUGCHECK_P3: fffff98b3381a920
BUGCHECK_P4: 0
CONTEXT: fffff98b3381a920 -- (.cxr 0xfffff98b3381a920)
rax=ffff934a00a1b1b0 rbx=00000000220a1212 rcx=00000000000028c9
rdx=ffff934a00a1b1b0 rsi=ffff934a01a1b1b0 rdi=0000000000000000
rip=ffff930d6f3dab22 rsp=fffff98b3381b310 rbp=000000000000000a
r8=fffff98b3381b288 r9=0000000000000000 r10=fffff80029112460
r11=fffff98b3381b2e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kbase!HmgShareLock+0x62:
ffff930d`6f3dab22 40386e0e cmp byte ptr [rsi+0Eh],bpl ds:002b:ffff934a`01a1b1be=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ts3client_win64.exe
STACK_TEXT:
fffff98b`3381b310 ffff930d`6f0d9e8d : 00000000`220a1212 fffff98b`3381b618 ffffbd07`79aae680 fffff98b`3381b418 : win32kbase!HmgShareLock+0x62
fffff98b`3381b380 00000000`220a1212 : fffff98b`3381b618 ffffbd07`79aae680 fffff98b`3381b418 fffff98b`00000000 : win32kfull+0xd9e8d
fffff98b`3381b388 fffff98b`3381b618 : ffffbd07`79aae680 fffff98b`3381b418 fffff98b`00000000 fffff98b`3381b418 : 0x220a1212
fffff98b`3381b390 ffffbd07`79aae680 : fffff98b`3381b418 fffff98b`00000000 fffff98b`3381b418 00000000`00000000 : 0xfffff98b`3381b618
fffff98b`3381b398 fffff98b`3381b418 : fffff98b`00000000 fffff98b`3381b418 00000000`00000000 00000000`00000000 : 0xffffbd07`79aae680
fffff98b`3381b3a0 fffff98b`00000000 : fffff98b`3381b418 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff98b`3381b418
fffff98b`3381b3a8 fffff98b`3381b418 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff98b`00000000
fffff98b`3381b3b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000001 : 0xfffff98b`3381b418
SYMBOL_NAME: win32kbase!HmgShareLock+62
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .cxr 0xfffff98b3381a920 ; kb
BUCKET_ID_FUNC_OFFSET: 62
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!HmgShareLock
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f8d7532b-024c-73a1-ea86-fe13f10138bd}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffac8aeabf3300, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffac8aeabf3300
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0xf05c4080 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {45119e30-277b-48e3-a025-83d2e8dc2ad8}
IMAGE_NAME: unknown
MODULE_NAME: unknown
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
fffffd86`04026938 fffff804`676cb8a9 : 00000000`000000ef ffffac8a`eabf3300 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffd86`04026940 fffff804`675ecbdf : ffffac8a`eabf3300 fffff804`66e88065 ffffac8a`eabf3300 fffff804`66e880e0 : nt!PspCatchCriticalBreak+0x115
fffffd86`040269e0 fffff804`674700c0 : ffffac8a`00000000 00000000`00000000 ffffac8a`eabf3300 ffffac8a`eabf3300 : nt!PspTerminateAllThreads+0x17b193
fffffd86`04026a50 fffff804`6746fce9 : ffffffff`ffffffff fffffd86`04026b80 ffffac8a`eabf3300 fffff804`67479401 : nt!PspTerminateProcess+0xe0
fffffd86`04026a90 fffff804`66fd3c18 : ffffac8a`000003ec ffffac8a`f05c4080 ffffac8a`eabf3300 00000090`c17ff8cc : nt!NtTerminateProcess+0xa9
fffffd86`04026b00 00007ffd`78d3c5f4 : 00007ffd`78dafc1f 00007ffd`78ddf980 00000090`c17ff890 00000000`00002970 : nt!KiSystemServiceCopyEnd+0x28
00000090`c17fda28 00007ffd`78dafc1f : 00007ffd`78ddf980 00000090`c17ff890 00000000`00002970 00000000`00002e00 : 0x00007ffd`78d3c5f4
00000090`c17fda30 00007ffd`78ddf980 : 00000090`c17ff890 00000000`00002970 00000000`00002e00 00000000`00000004 : 0x00007ffd`78dafc1f
00000090`c17fda38 00000090`c17ff890 : 00000000`00002970 00000000`00002e00 00000000`00000004 00007ffd`78d43c9d : 0x00007ffd`78ddf980
00000090`c17fda40 00000000`00002970 : 00000000`00002e00 00000000`00000004 00007ffd`78d43c9d 00007ffd`78ddf980 : 0x00000090`c17ff890
00000090`c17fda48 00000000`00002e00 : 00000000`00000004 00007ffd`78d43c9d 00007ffd`78ddf980 00000000`00000008 : 0x2970
00000090`c17fda50 00000000`00000004 : 00007ffd`78d43c9d 00007ffd`78ddf980 00000000`00000008 00000000`00000ea0 : 0x2e00
00000090`c17fda58 00007ffd`78d43c9d : 00007ffd`78ddf980 00000000`00000008 00000000`00000ea0 00000000`00f800f6 : 0x4
00000090`c17fda60 00007ffd`78ddf980 : 00000000`00000008 00000000`00000ea0 00000000`00f800f6 000001fc`7c720790 : 0x00007ffd`78d43c9d
00000090`c17fda68 00000000`00000008 : 00000000`00000ea0 00000000`00f800f6 000001fc`7c720790 00000000`010000fe : 0x00007ffd`78ddf980
00000090`c17fda70 00000000`00000ea0 : 00000000`00f800f6 000001fc`7c720790 00000000`010000fe 00000000`00034142 : 0x8
00000090`c17fda78 00000000`00f800f6 : 000001fc`7c720790 00000000`010000fe 00000000`00034142 00007ffd`78d2c656 : 0xea0
00000090`c17fda80 000001fc`7c720790 : 00000000`010000fe 00000000`00034142 00007ffd`78d2c656 00000000`00000000 : 0xf800f6
00000090`c17fda88 00000000`010000fe : 00000000`00034142 00007ffd`78d2c656 00000000`00000000 00000000`00000000 : 0x000001fc`7c720790
00000090`c17fda90 00000000`00034142 : 00007ffd`78d2c656 00000000`00000000 00000000`00000000 00000000`00000000 : 0x10000fe
00000090`c17fda98 00007ffd`78d2c656 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x34142
00000090`c17fdaa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000548c8 : 0x00007ffd`78d2c656
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_f05c4080_unknown!_IMAGE_unknown
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {35ebf339-bc0d-079a-7e9c-e93c394acd32}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffc08f65de3340, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 12
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffc08f65de3340
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x65f95080 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {4ebc216d-9ff9-425c-8715-b9c0839cbe1c}
IMAGE_NAME: RPCRT4.dll
MODULE_NAME: RPCRT4
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffff8400`41364938 fffff806`154cb8a9 : 00000000`000000ef ffffc08f`65de3340 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8400`41364940 fffff806`153ecbdf : ffffc08f`65de3340 fffff806`14c88065 ffffc08f`65de3340 fffff806`14c880e0 : nt!PspCatchCriticalBreak+0x115
ffff8400`413649e0 fffff806`152700c0 : ffffc08f`00000000 00000000`00000000 ffffc08f`65de3340 ffffc08f`65de3340 : nt!PspTerminateAllThreads+0x17b193
ffff8400`41364a50 fffff806`1526fce9 : ffffffff`ffffffff ffff8400`41364b80 ffffc08f`65de3340 fffff806`15279401 : nt!PspTerminateProcess+0xe0
ffff8400`41364a90 fffff806`14dd3c18 : ffffc08f`000003dc ffffc08f`65f95080 ffffc08f`65de3340 0000007b`4287fb9c : nt!NtTerminateProcess+0xa9
ffff8400`41364b00 00007ffe`98dbc5f4 : 00007ffe`98e2fc1f 00007ffe`98e5f980 0000007b`4287fb60 0000007b`4287dce8 : nt!KiSystemServiceCopyEnd+0x28
0000007b`4287dc68 00007ffe`98e2fc1f : 00007ffe`98e5f980 0000007b`4287fb60 0000007b`4287dce8 00007ffe`96277751 : 0x00007ffe`98dbc5f4
0000007b`4287dc70 00007ffe`98e5f980 : 0000007b`4287fb60 0000007b`4287dce8 00007ffe`96277751 00000000`00000004 : 0x00007ffe`98e2fc1f
0000007b`4287dc78 0000007b`4287fb60 : 0000007b`4287dce8 00007ffe`96277751 00000000`00000004 00007ffe`98dc3c9d : 0x00007ffe`98e5f980
0000007b`4287dc80 0000007b`4287dce8 : 00007ffe`96277751 00000000`00000004 00007ffe`98dc3c9d 00007ffe`98e5f980 : 0x0000007b`4287fb60
0000007b`4287dc88 00007ffe`96277751 : 00000000`00000004 00007ffe`98dc3c9d 00007ffe`98e5f980 00000000`00000008 : 0x0000007b`4287dce8
0000007b`4287dc90 00000000`00000004 : 00007ffe`98dc3c9d 00007ffe`98e5f980 00000000`00000008 00000000`00000000 : 0x00007ffe`96277751
0000007b`4287dc98 00007ffe`98dc3c9d : 00007ffe`98e5f980 00000000`00000008 00000000`00000000 00000000`00000000 : 0x4
0000007b`4287dca0 00007ffe`98e5f980 : 00000000`00000008 00000000`00000000 00000000`00000000 00000002`01500128 : 0x00007ffe`98dc3c9d
0000007b`4287dca8 00000000`00000008 : 00000000`00000000 00000000`00000000 00000002`01500128 00000000`0000024c : 0x00007ffe`98e5f980
0000007b`4287dcb0 00000000`00000000 : 00000000`00000000 00000002`01500128 00000000`0000024c 00000000`00034142 : 0x8
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_65f95080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c9b07d51-52b3-8e99-79df-e09c154c955b}
Followup: MachineOwner
---------
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Bellekleri test edin.
Komut satırını (CMD) yönetici olarak başlatın ve komutları yazın;
Bunları uyguladıktan sonra bilgisayarı yeniden başlatın.
- Sfc /scannow.
- DISM.exe /Online /cleanup-image /scanhealth.
- DISM.exe /Online /cleanup-image /restorehealth.
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: ffffd90ee19dab22, Address of the instruction which caused the bugcheck. Arg3: ffffd18d63e98920, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.Sec. Value: 6. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-VFOM7MS. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.Sec. Value: 13. Key : Analysis.Memory.CommitPeak.Mb. Value: 80. Key : Analysis.System. Value: CreateObject. ADDITIONAL_XML: 1. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: ffffd90ee19dab22. BUGCHECK_P3: ffffd18d63e98920. BUGCHECK_P4: 0. CONTEXT: ffffd18d63e98920 -- (.cxr 0xffffd18d63e98920) rax=ffffd95640a12168 rbx=00000000110a0c0f rcx=000000000000184d. rdx=ffffd95640a12168 rsi=ffffd95641a12168 rdi=0000000000000000. rip=ffffd90ee19dab22 rsp=ffffd18d63e99310 rbp=000000000000000a. r8=ffffd18d63e99288 r9=0000000000000000 r10=fffff80148312460. r11=ffffd18d63e992e0 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000001. iopl=0 nv up ei pl nz na pe nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202. win32kbase!HmgShareLock+0x62: ffffd90e`e19dab22 40386e0e cmp byte ptr [rsi+0Eh],bpl ds:002b:ffffd956`41a12176=?? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: ts3client_win64.exe. STACK_TEXT: ffffd18d`63e99310 ffffd90e`e16d9e8d : 00000000`110a0c0f ffffd18d`63e99618 ffffdd8f`5ecb2c60 ffffd18d`63e99418 : win32kbase!HmgShareLock+0x62. ffffd18d`63e99380 ffffd90e`e16be38f : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000228 : win32kfull!NtGdiGetRealizationInfo+0x48d. ffffd18d`63e995e0 ffffd90e`e16be26d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!NtGdiGetCharABCWidthsW+0x1ff. ffffd18d`63e99a00 fffff801`483d3c18 : ffffffff`a4010be9 ffffd90e`0000001d ffffdd8f`00000001 00000000`00000000 : win32kfull!NtGdiGetCharABCWidthsW+0xdd. ffffd18d`63e99a90 00007ffe`7ae36564 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 000000e7`d84f6818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7ae36564. SYMBOL_NAME: win32kbase!HmgShareLock+62. MODULE_NAME: win32kbase. IMAGE_NAME: win32kbase.sys. IMAGE_VERSION: 10.0.18362.778. STACK_COMMAND: .cxr 0xffffd18d63e98920 ; kb. BUCKET_ID_FUNC_OFFSET: 62. FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!HmgShareLock. OS_VERSION: 10.0.18362.1. BUILDLAB_STR: 19h1_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {f8d7532b-024c-73a1-ea86-fe13f10138bd} Followup: MachineOwner. --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff80710455a1c, Address of the instruction which caused the bugcheck. Arg3: fffff10e236c2d40, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.Sec. Value: 4. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-VFOM7MS. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.Sec. Value: 8. Key : Analysis.Memory.CommitPeak.Mb. Value: 69. Key : Analysis.System. Value: CreateObject. ADDITIONAL_XML: 1. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff80710455a1c. BUGCHECK_P3: fffff10e236c2d40. BUGCHECK_P4: 0. CONTEXT: fffff10e236c2d40 -- (.cxr 0xfffff10e236c2d40) rax=0000000000000000 rbx=0000000000000000 rcx=ffffc00010bb9180. rdx=0000000000000000 rsi=0000000001000000 rdi=0000000001000000. rip=fffff80710455a1c rsp=fffff10e236c3730 rbp=ffffd48d7c09f7a0. r8=0000000001000000 r9=00000000ffffffff r10=7ffffffffffffffc. r11=fffff10e236c3710 r12=ffffd48d7c09f7d8 r13=0000000001000000. r14=ffffd48d7bb5d840 r15=ffffffffffffffff. iopl=0 nv up ei pl nz na po nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206. nt!MiFinishVadDeletion+0x16484c: fffff807`10455a1c 488b1f mov rbx,qword ptr [rdi] ds:002b:00000000`01000000=???????????????? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: svchost.exe. STACK_TEXT: fffff10e`236c3730 fffff807`102f1059 : ffffffff`00000000 00000000`00000001 ffffd48d`00000000 00000000`00000000 : nt!MiFinishVadDeletion+0x16484c. fffff10e`236c37e0 fffff807`1087979d : 00000000`00000000 ffffd48d`7ba5eb70 ffffd48d`7ba5eb70 00000000`00000000 : nt!MiDeleteVad+0x19a9. fffff10e`236c39a0 fffff807`10879593 : ffffd48d`7c09f7a0 00000000`00000000 000001bc`9cad0000 00000000`00000000 : nt!MiUnmapVad+0x49. fffff10e`236c39d0 fffff807`10879429 : ffffd48d`7bb5d340 000001bc`00000008 ffffd48d`712a64e0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133. fffff10e`236c3ab0 fffff807`103d3c18 : ffffd48d`79793080 000001bc`9cad0000 00000000`0000fefb ffffd48d`7bb5d340 : nt!NtUnmapViewOfSectionEx+0x99. fffff10e`236c3b00 00007ffb`93fdf924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 00000079`2387d488 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`93fdf924. SYMBOL_NAME: nt!MiFinishVadDeletion+16484c. MODULE_NAME: nt. IMAGE_VERSION: 10.0.18362.778. STACK_COMMAND: .cxr 0xfffff10e236c2d40 ; kb. IMAGE_NAME: memory_corruption. BUCKET_ID_FUNC_OFFSET: 16484c. FAILURE_BUCKET_ID: 0x3B_c0000005_nt!MiFinishVadDeletion. OS_VERSION: 10.0.18362.1. BUILDLAB_STR: 19h1_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {2657f179-9eb8-9bfb-ae5c-b5b05e603b62} Followup: MachineOwner. --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: ffff930d6f3dab22, Address of the instruction which caused the bugcheck. Arg3: fffff98b3381a920, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32kfull.sys. *** WARNING: Unable to verify timestamp for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.Sec. Value: 4. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-VFOM7MS. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.Sec. Value: 27. Key : Analysis.Memory.CommitPeak.Mb. Value: 76. Key : Analysis.System. Value: CreateObject. ADDITIONAL_XML: 1. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: ffff930d6f3dab22. BUGCHECK_P3: fffff98b3381a920. BUGCHECK_P4: 0. CONTEXT: fffff98b3381a920 -- (.cxr 0xfffff98b3381a920) rax=ffff934a00a1b1b0 rbx=00000000220a1212 rcx=00000000000028c9. rdx=ffff934a00a1b1b0 rsi=ffff934a01a1b1b0 rdi=0000000000000000. rip=ffff930d6f3dab22 rsp=fffff98b3381b310 rbp=000000000000000a. r8=fffff98b3381b288 r9=0000000000000000 r10=fffff80029112460. r11=fffff98b3381b2e0 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000001. iopl=0 nv up ei pl nz na pe nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202. win32kbase!HmgShareLock+0x62: ffff930d`6f3dab22 40386e0e cmp byte ptr [rsi+0Eh],bpl ds:002b:ffff934a`01a1b1be=?? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: ts3client_win64.exe. STACK_TEXT: fffff98b`3381b310 ffff930d`6f0d9e8d : 00000000`220a1212 fffff98b`3381b618 ffffbd07`79aae680 fffff98b`3381b418 : win32kbase!HmgShareLock+0x62. fffff98b`3381b380 00000000`220a1212 : fffff98b`3381b618 ffffbd07`79aae680 fffff98b`3381b418 fffff98b`00000000 : win32kfull+0xd9e8d. fffff98b`3381b388 fffff98b`3381b618 : ffffbd07`79aae680 fffff98b`3381b418 fffff98b`00000000 fffff98b`3381b418 : 0x220a1212. fffff98b`3381b390 ffffbd07`79aae680 : fffff98b`3381b418 fffff98b`00000000 fffff98b`3381b418 00000000`00000000 : 0xfffff98b`3381b618. fffff98b`3381b398 fffff98b`3381b418 : fffff98b`00000000 fffff98b`3381b418 00000000`00000000 00000000`00000000 : 0xffffbd07`79aae680. fffff98b`3381b3a0 fffff98b`00000000 : fffff98b`3381b418 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff98b`3381b418. fffff98b`3381b3a8 fffff98b`3381b418 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff98b`00000000. fffff98b`3381b3b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000001 : 0xfffff98b`3381b418. SYMBOL_NAME: win32kbase!HmgShareLock+62. MODULE_NAME: win32kbase. IMAGE_NAME: win32kbase.sys. IMAGE_VERSION: 10.0.18362.778. STACK_COMMAND: .cxr 0xfffff98b3381a920 ; kb. BUCKET_ID_FUNC_OFFSET: 62. FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!HmgShareLock. OS_VERSION: 10.0.18362.1. BUILDLAB_STR: 19h1_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {f8d7532b-024c-73a1-ea86-fe13f10138bd} Followup: MachineOwner. --------- CRITICAL_PROCESS_DIED (ef) A critical system process died. Arguments: Arg1: ffffac8aeabf3300, Process object or thread object. Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died. Arg3: 0000000000000000. Arg4: 0000000000000000. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.Sec. Value: 4. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-VFOM7MS. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.Sec. Value: 5. Key : Analysis.Memory.CommitPeak.Mb. Value: 71. Key : Analysis.System. Value: CreateObject. ADDITIONAL_XML: 1. BUGCHECK_CODE: ef. BUGCHECK_P1: ffffac8aeabf3300. BUGCHECK_P2: 0. BUGCHECK_P3: 0. BUGCHECK_P4: 0. PROCESS_NAME: svchost.exe. CRITICAL_PROCESS: svchost.exe. ERROR_CODE: (NTSTATUS) 0xf05c4080 - <Unable to get error code text> CRITICAL_PROCESS_REPORTGUID: {45119e30-277b-48e3-a025-83d2e8dc2ad8} IMAGE_NAME: unknown. MODULE_NAME: unknown. FAULTING_MODULE: 0000000000000000. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. STACK_TEXT: fffffd86`04026938 fffff804`676cb8a9 : 00000000`000000ef ffffac8a`eabf3300 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx. fffffd86`04026940 fffff804`675ecbdf : ffffac8a`eabf3300 fffff804`66e88065 ffffac8a`eabf3300 fffff804`66e880e0 : nt!PspCatchCriticalBreak+0x115. fffffd86`040269e0 fffff804`674700c0 : ffffac8a`00000000 00000000`00000000 ffffac8a`eabf3300 ffffac8a`eabf3300 : nt!PspTerminateAllThreads+0x17b193. fffffd86`04026a50 fffff804`6746fce9 : ffffffff`ffffffff fffffd86`04026b80 ffffac8a`eabf3300 fffff804`67479401 : nt!PspTerminateProcess+0xe0. fffffd86`04026a90 fffff804`66fd3c18 : ffffac8a`000003ec ffffac8a`f05c4080 ffffac8a`eabf3300 00000090`c17ff8cc : nt!NtTerminateProcess+0xa9. fffffd86`04026b00 00007ffd`78d3c5f4 : 00007ffd`78dafc1f 00007ffd`78ddf980 00000090`c17ff890 00000000`00002970 : nt!KiSystemServiceCopyEnd+0x28. 00000090`c17fda28 00007ffd`78dafc1f : 00007ffd`78ddf980 00000090`c17ff890 00000000`00002970 00000000`00002e00 : 0x00007ffd`78d3c5f4. 00000090`c17fda30 00007ffd`78ddf980 : 00000090`c17ff890 00000000`00002970 00000000`00002e00 00000000`00000004 : 0x00007ffd`78dafc1f. 00000090`c17fda38 00000090`c17ff890 : 00000000`00002970 00000000`00002e00 00000000`00000004 00007ffd`78d43c9d : 0x00007ffd`78ddf980. 00000090`c17fda40 00000000`00002970 : 00000000`00002e00 00000000`00000004 00007ffd`78d43c9d 00007ffd`78ddf980 : 0x00000090`c17ff890. 00000090`c17fda48 00000000`00002e00 : 00000000`00000004 00007ffd`78d43c9d 00007ffd`78ddf980 00000000`00000008 : 0x2970. 00000090`c17fda50 00000000`00000004 : 00007ffd`78d43c9d 00007ffd`78ddf980 00000000`00000008 00000000`00000ea0 : 0x2e00. 00000090`c17fda58 00007ffd`78d43c9d : 00007ffd`78ddf980 00000000`00000008 00000000`00000ea0 00000000`00f800f6 : 0x4. 00000090`c17fda60 00007ffd`78ddf980 : 00000000`00000008 00000000`00000ea0 00000000`00f800f6 000001fc`7c720790 : 0x00007ffd`78d43c9d. 00000090`c17fda68 00000000`00000008 : 00000000`00000ea0 00000000`00f800f6 000001fc`7c720790 00000000`010000fe : 0x00007ffd`78ddf980. 00000090`c17fda70 00000000`00000ea0 : 00000000`00f800f6 000001fc`7c720790 00000000`010000fe 00000000`00034142 : 0x8. 00000090`c17fda78 00000000`00f800f6 : 000001fc`7c720790 00000000`010000fe 00000000`00034142 00007ffd`78d2c656 : 0xea0. 00000090`c17fda80 000001fc`7c720790 : 00000000`010000fe 00000000`00034142 00007ffd`78d2c656 00000000`00000000 : 0xf800f6. 00000090`c17fda88 00000000`010000fe : 00000000`00034142 00007ffd`78d2c656 00000000`00000000 00000000`00000000 : 0x000001fc`7c720790. 00000090`c17fda90 00000000`00034142 : 00007ffd`78d2c656 00000000`00000000 00000000`00000000 00000000`00000000 : 0x10000fe. 00000090`c17fda98 00007ffd`78d2c656 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x34142. 00000090`c17fdaa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000548c8 : 0x00007ffd`78d2c656. STACK_COMMAND: .thread ; .cxr ; kb. FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_f05c4080_unknown!_IMAGE_unknown. OS_VERSION: 10.0.18362.1. BUILDLAB_STR: 19h1_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {35ebf339-bc0d-079a-7e9c-e93c394acd32} Followup: MachineOwner. --------- CRITICAL_PROCESS_DIED (ef) A critical system process died. Arguments: Arg1: ffffc08f65de3340, Process object or thread object. Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died. Arg3: 0000000000000000. Arg4: 0000000000000000. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.Sec. Value: 3. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-VFOM7MS. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.Sec. Value: 12. Key : Analysis.Memory.CommitPeak.Mb. Value: 72. Key : Analysis.System. Value: CreateObject. ADDITIONAL_XML: 1. BUGCHECK_CODE: ef. BUGCHECK_P1: ffffc08f65de3340. BUGCHECK_P2: 0. BUGCHECK_P3: 0. BUGCHECK_P4: 0. PROCESS_NAME: svchost.exe. CRITICAL_PROCESS: svchost.exe. ERROR_CODE: (NTSTATUS) 0x65f95080 - <Unable to get error code text> CRITICAL_PROCESS_REPORTGUID: {4ebc216d-9ff9-425c-8715-b9c0839cbe1c} IMAGE_NAME: RPCRT4.dll. MODULE_NAME: RPCRT4. FAULTING_MODULE: 0000000000000000. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. STACK_TEXT: ffff8400`41364938 fffff806`154cb8a9 : 00000000`000000ef ffffc08f`65de3340 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx. ffff8400`41364940 fffff806`153ecbdf : ffffc08f`65de3340 fffff806`14c88065 ffffc08f`65de3340 fffff806`14c880e0 : nt!PspCatchCriticalBreak+0x115. ffff8400`413649e0 fffff806`152700c0 : ffffc08f`00000000 00000000`00000000 ffffc08f`65de3340 ffffc08f`65de3340 : nt!PspTerminateAllThreads+0x17b193. ffff8400`41364a50 fffff806`1526fce9 : ffffffff`ffffffff ffff8400`41364b80 ffffc08f`65de3340 fffff806`15279401 : nt!PspTerminateProcess+0xe0. ffff8400`41364a90 fffff806`14dd3c18 : ffffc08f`000003dc ffffc08f`65f95080 ffffc08f`65de3340 0000007b`4287fb9c : nt!NtTerminateProcess+0xa9. ffff8400`41364b00 00007ffe`98dbc5f4 : 00007ffe`98e2fc1f 00007ffe`98e5f980 0000007b`4287fb60 0000007b`4287dce8 : nt!KiSystemServiceCopyEnd+0x28. 0000007b`4287dc68 00007ffe`98e2fc1f : 00007ffe`98e5f980 0000007b`4287fb60 0000007b`4287dce8 00007ffe`96277751 : 0x00007ffe`98dbc5f4. 0000007b`4287dc70 00007ffe`98e5f980 : 0000007b`4287fb60 0000007b`4287dce8 00007ffe`96277751 00000000`00000004 : 0x00007ffe`98e2fc1f. 0000007b`4287dc78 0000007b`4287fb60 : 0000007b`4287dce8 00007ffe`96277751 00000000`00000004 00007ffe`98dc3c9d : 0x00007ffe`98e5f980. 0000007b`4287dc80 0000007b`4287dce8 : 00007ffe`96277751 00000000`00000004 00007ffe`98dc3c9d 00007ffe`98e5f980 : 0x0000007b`4287fb60. 0000007b`4287dc88 00007ffe`96277751 : 00000000`00000004 00007ffe`98dc3c9d 00007ffe`98e5f980 00000000`00000008 : 0x0000007b`4287dce8. 0000007b`4287dc90 00000000`00000004 : 00007ffe`98dc3c9d 00007ffe`98e5f980 00000000`00000008 00000000`00000000 : 0x00007ffe`96277751. 0000007b`4287dc98 00007ffe`98dc3c9d : 00007ffe`98e5f980 00000000`00000008 00000000`00000000 00000000`00000000 : 0x4. 0000007b`4287dca0 00007ffe`98e5f980 : 00000000`00000008 00000000`00000000 00000000`00000000 00000002`01500128 : 0x00007ffe`98dc3c9d. 0000007b`4287dca8 00000000`00000008 : 00000000`00000000 00000000`00000000 00000002`01500128 00000000`0000024c : 0x00007ffe`98e5f980. 0000007b`4287dcb0 00000000`00000000 : 00000000`00000000 00000002`01500128 00000000`0000024c 00000000`00034142 : 0x8. STACK_COMMAND: .thread ; .cxr ; kb. FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_65f95080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll. OS_VERSION: 10.0.18362.1. BUILDLAB_STR: 19h1_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {c9b07d51-52b3-8e99-79df-e09c154c955b} Followup: MachineOwner. ---------
Tekrar mavi ekran aldınız mı? Alırsanız yeni dump dosyalarını paylaşın.