Lenovo IdeaPad Gaming 3 15ACH6 laptopta SYSTEM_SERVICE_EXCEPTION hatası

İşletim sistemi
Windows 11
Easy Anti-Cheat'i kaldırmalısınız. Ek olarak kaldırabiliyorsanız Lenovo Diagnostic Tool'u kaldırır mısınız? Önerilerimi uyguladıktan sonra sonucu belirtirseniz sevinirim.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8012421f9b0, Address of the instruction which caused the BugCheck
Arg3: ffffcd00f129e900, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3937

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6907

    Key  : Analysis.Init.CPU.mSec
    Value: 655

    Key  : Analysis.Init.Elapsed.mSec
    Value: 68831

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 97

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  062222-12046-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8012421f9b0

BUGCHECK_P3: ffffcd00f129e900

BUGCHECK_P4: 0

CONTEXT:  ffffcd00f129e900 -- (.cxr 0xffffcd00f129e900)
rax=0000000000000805 rbx=ffffcd00f0938180 rcx=ffffb58fbb097c80
rdx=0000000000000000 rsi=ffffa3058719f080 rdi=ffffa305962c6080
rip=fffff8012421f9b0 rsp=ffffb58fbb0974b0 rbp=004fe067bcbbbdff
 r8=ffffa305980460c0  r9=0000000100000073 r10=0000000000000500
r11=ffffcd00f0938180 r12=00000000000005ac r13=fffff80124af8b00
r14=ffffa305980460c0 r15=ffffcd00f0947000
iopl=0         nv up ei pl zr ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050257
nt!SwapContext+0x3b0:
fffff801`2421f9b0 0fc719          xrstors [rcx]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedgewebview2

STACK_TEXT: 
ffffb58f`bb0974b0 fffff801`2421f316     : ffffb58f`bb097828 00000000`00000006 fffff801`24a1bcc0 ffffdf5b`0e67654a : nt!SwapContext+0x3b0
ffffb58f`bb0974f0 fffff801`240842c7     : ffffcd00`f0c91180 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!KiSwapContext+0x76
ffffb58f`bb097630 fffff801`24086179     : ffffe185`00000002 00000000`00000006 00000000`00000000 ffffa305`00000000 : nt!KiSwapThread+0x3a7
ffffb58f`bb097710 fffff801`24088bd6     : ffffe185`00000000 fffff801`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x159
ffffb58f`bb0977b0 fffff801`240885e8     : ffffa305`94c79200 00000000`00000001 00000000`00000000 ffffa305`00000000 : nt!KeRemoveQueueEx+0x2b6
ffffb58f`bb097860 fffff801`24490b6d     : 00000005`00000000 ffffa305`980460c0 ffffb58f`bb097a78 00000000`00000000 : nt!IoRemoveIoCompletion+0x98
ffffb58f`bb097980 fffff801`24229e78     : ffffa305`8719f080 00000060`90fff938 ffffb58f`bb097a48 00000000`00000000 : nt!NtRemoveIoCompletion+0x13d
ffffb58f`bb097a30 00007ffe`fd303fd4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000060`90fff918 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`fd303fd4


SYMBOL_NAME:  nt!SwapContext+3b0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.739

STACK_COMMAND:  .cxr 0xffffcd00f129e900 ; kb

BUCKET_ID_FUNC_OFFSET:  3b0

FAILURE_BUCKET_ID:  AV_nt!SwapContext

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {47b746a3-60bf-1f5a-5fa5-88903b6a3204}

Followup:     MachineOwner
---------
 
Easy Anti-Cheat'i kaldırmalısınız. Ek olarak kaldırabiliyorsanız Lenovo diagnostic Tool'u kaldırır mısınız? Önerilerimi uyguladıktan sonra sonucu belirtirseniz sevinirim.

Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff8012421f9b0, Address of the instruction which caused the BugCheck.
Arg3: ffffcd00f129e900, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 3937.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 6907.

 Key : Analysis.Init.CPU.mSec
 Value: 655.

 Key : Analysis.Init.Elapsed.mSec
 Value: 68831.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 97.

 Key : Dump.Attributes.AsUlong
 Value: 1008.

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

FILE_IN_CAB: 062222-12046-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008.
 Kernel Generated Triage Dump.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff8012421f9b0.

BUGCHECK_P3: ffffcd00f129e900.

BUGCHECK_P4: 0

CONTEXT: ffffcd00f129e900 -- (.cxr 0xffffcd00f129e900)
rax=0000000000000805 rbx=ffffcd00f0938180 rcx=ffffb58fbb097c80
rdx=0000000000000000 rsi=ffffa3058719f080 rdi=ffffa305962c6080
rip=fffff8012421f9b0 rsp=ffffb58fbb0974b0 rbp=004fe067bcbbbdff
 r8=ffffa305980460c0 r9=0000000100000073 r10=0000000000000500
r11=ffffcd00f0938180 r12=00000000000005ac r13=fffff80124af8b00
r14=ffffa305980460c0 r15=ffffcd00f0947000
iopl=0 nv up ei pl zr ac po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050257
nt!SwapContext+0x3b0:
fffff801`2421f9b0 0fc719 xrstors [rcx]
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: msedgewebview2.

STACK_TEXT:
ffffb58f`bb0974b0 fffff801`2421f316 : ffffb58f`bb097828 00000000`00000006 fffff801`24a1bcc0 ffffdf5b`0e67654a : nt!SwapContext+0x3b0
ffffb58f`bb0974f0 fffff801`240842c7 : ffffcd00`f0c91180 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!KiSwapContext+0x76
ffffb58f`bb097630 fffff801`24086179 : ffffe185`00000002 00000000`00000006 00000000`00000000 ffffa305`00000000 : nt!KiSwapThread+0x3a7
ffffb58f`bb097710 fffff801`24088bd6 : ffffe185`00000000 fffff801`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x159
ffffb58f`bb0977b0 fffff801`240885e8 : ffffa305`94c79200 00000000`00000001 00000000`00000000 ffffa305`00000000 : nt!KeRemoveQueueEx+0x2b6
ffffb58f`bb097860 fffff801`24490b6d : 00000005`00000000 ffffa305`980460c0 ffffb58f`bb097a78 00000000`00000000 : nt!IoRemoveIoCompletion+0x98
ffffb58f`bb097980 fffff801`24229e78 : ffffa305`8719f080 00000060`90fff938 ffffb58f`bb097a48 00000000`00000000 : nt!NtRemoveIoCompletion+0x13d
ffffb58f`bb097a30 00007ffe`fd303fd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000060`90fff918 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`fd303fd4

SYMBOL_NAME: nt!SwapContext+3b0

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22000.739

STACK_COMMAND: .cxr 0xffffcd00f129e900 ; kb.

BUCKET_ID_FUNC_OFFSET: 3b0.

FAILURE_BUCKET_ID: AV_nt!SwapContext

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {47b746a3-60bf-1f5a-5fa5-88903b6a3204}

Followup: MachineOwner.
---------

Hiçbiri yok ki.

Easy Anti-Cheat'i kaldırmalısınız. Ek olarak kaldırabiliyorsanız Lenovo diagnostic Tool'u kaldırır mısınız? Önerilerimi uyguladıktan sonra sonucu belirtirseniz sevinirim.

Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff8012421f9b0, Address of the instruction which caused the BugCheck.
Arg3: ffffcd00f129e900, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 3937.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 6907.

 Key : Analysis.Init.CPU.mSec
 Value: 655.

 Key : Analysis.Init.Elapsed.mSec
 Value: 68831.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 97.

 Key : Dump.Attributes.AsUlong
 Value: 1008.

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

FILE_IN_CAB: 062222-12046-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008.
 Kernel Generated Triage Dump.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff8012421f9b0.

BUGCHECK_P3: ffffcd00f129e900.

BUGCHECK_P4: 0

CONTEXT: ffffcd00f129e900 -- (.cxr 0xffffcd00f129e900)
rax=0000000000000805 rbx=ffffcd00f0938180 rcx=ffffb58fbb097c80
rdx=0000000000000000 rsi=ffffa3058719f080 rdi=ffffa305962c6080
rip=fffff8012421f9b0 rsp=ffffb58fbb0974b0 rbp=004fe067bcbbbdff
 r8=ffffa305980460c0 r9=0000000100000073 r10=0000000000000500
r11=ffffcd00f0938180 r12=00000000000005ac r13=fffff80124af8b00
r14=ffffa305980460c0 r15=ffffcd00f0947000
iopl=0 nv up ei pl zr ac po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050257
nt!SwapContext+0x3b0:
fffff801`2421f9b0 0fc719 xrstors [rcx]
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: msedgewebview2.

STACK_TEXT:
ffffb58f`bb0974b0 fffff801`2421f316 : ffffb58f`bb097828 00000000`00000006 fffff801`24a1bcc0 ffffdf5b`0e67654a : nt!SwapContext+0x3b0
ffffb58f`bb0974f0 fffff801`240842c7 : ffffcd00`f0c91180 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!KiSwapContext+0x76
ffffb58f`bb097630 fffff801`24086179 : ffffe185`00000002 00000000`00000006 00000000`00000000 ffffa305`00000000 : nt!KiSwapThread+0x3a7
ffffb58f`bb097710 fffff801`24088bd6 : ffffe185`00000000 fffff801`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x159
ffffb58f`bb0977b0 fffff801`240885e8 : ffffa305`94c79200 00000000`00000001 00000000`00000000 ffffa305`00000000 : nt!KeRemoveQueueEx+0x2b6
ffffb58f`bb097860 fffff801`24490b6d : 00000005`00000000 ffffa305`980460c0 ffffb58f`bb097a78 00000000`00000000 : nt!IoRemoveIoCompletion+0x98
ffffb58f`bb097980 fffff801`24229e78 : ffffa305`8719f080 00000060`90fff938 ffffb58f`bb097a48 00000000`00000000 : nt!NtRemoveIoCompletion+0x13d
ffffb58f`bb097a30 00007ffe`fd303fd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000060`90fff918 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`fd303fd4

SYMBOL_NAME: nt!SwapContext+3b0

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22000.739

STACK_COMMAND: .cxr 0xffffcd00f129e900 ; kb.

BUCKET_ID_FUNC_OFFSET: 3b0.

FAILURE_BUCKET_ID: AV_nt!SwapContext

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {47b746a3-60bf-1f5a-5fa5-88903b6a3204}

Followup: MachineOwner.
---------

Easy Anti-Cheat kaldırılırsa GameLoop açılmaz diye biliyorum. Bu hatayı sistemi kapat dedikten sonra aldım, bir sıkıntı olmaz değil mi? Yani donanımsal bir şey değil Memtest'te 3 saatten fazla test yaptırdım hiç hata yok.
 
Son düzenleyen: Moderatör:
RAM'le alakalı bir durum görünmediği için Memtest86'yı kullanmanızı yazmamıştım ama sorun yok, neticede siz yapmışsınız. Easy Anti-Cheat'i de kaldırdıktan sonra kurabileceğiniz için istediğiniz yazılımı ya da oyunu açarsınız. Dediğim gibi, sonucu belirtirseniz sevinirim.
 
RAM'le alakalı bir durum görünmediği için Memtest86'yı kullanmanızı yazmamıştım ama sorun yok, neticede siz yapmışsınız. Easy Anti-Cheat'i de kaldırdıktan sonra kurabileceğiniz için istediğiniz yazılımı ya da oyunu açarsınız. Dediğim gibi, sonucu belirtirseniz sevinirim.

Düzelmedi bugün Microsoft Edge ile YouTube'da video izlerken tekrar şöyle bir hata aldım.
 
DDU ile ekran kartınızın sürücüsünü kaldırıp güncel sürücüyü kurmanız gerekiyor. Gerekli rehber aşağıda mevcut.


Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff89840b7274c0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff89840b727418, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8536

    Key  : Analysis.Init.CPU.mSec
    Value: 358

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10288

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x139

    Key  : Bugcheck.Code.Register
    Value: 0x139

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3


FILE_IN_CAB:  062422-10828-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff89840b7274c0

BUGCHECK_P3: ffff89840b727418

BUGCHECK_P4: 0

TRAP_FRAME:  ffff89840b7274c0 -- (.trap 0xffff89840b7274c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd601570c07f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013bd7a8fa rsp=ffff89840b727650 rbp=ffffd601634eeb30
 r8=0000000000000000  r9=ffff9b095bb2fdb0 r10=0000000000000001
r11=fffff8013bcb0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
dxgmms2!VIDMM_DEVICE::RemoveCommitment+0x2fb42:
fffff801`3bd7a8fa cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff89840b727418 -- (.exr 0xffff89840b727418)
ExceptionAddress: fffff8013bd7a8fa (dxgmms2!VIDMM_DEVICE::RemoveCommitment+0x000000000002fb42)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff8984`0b727198 fffff801`3ec2a4a9     : 00000000`00000139 00000000`00000003 ffff8984`0b7274c0 ffff8984`0b727418 : nt!KeBugCheckEx
ffff8984`0b7271a0 fffff801`3ec2a8f2     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8984`0b7272e0 fffff801`3ec28bd2     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xb2
ffff8984`0b7274c0 fffff801`3bd7a8fa     : 00000000`00000002 ffff8984`0b7276e0 00000000`00000000 fffff801`3bcddf82 : nt!KiRaiseSecurityCheckFailure+0x312
ffff8984`0b727650 fffff801`3bd4ad26     : ffffd601`634eeb30 ffff9b09`5ce8d001 ffff9b09`68c48310 00000000`00000000 : dxgmms2!VIDMM_DEVICE::RemoveCommitment+0x2fb42
ffff8984`0b7276a0 fffff801`3bd4aaa9     : ffff9b09`68c48310 ffff9b09`5ce8d000 ffff9b09`5ce8d001 ffffd601`634eeb30 : dxgmms2!VIDMM_GLOBAL::NotifyAllocationEviction+0x4a
ffff8984`0b7276d0 fffff801`3bd43746     : ffff9b09`673462a0 ffff8984`0b727820 ffff9b09`5ce8d000 ffff9b09`5b3e7750 : dxgmms2!VIDMM_GLOBAL::EvictOneAllocation+0x59
ffff8984`0b727720 fffff801`3bd5b817     : ffffd601`5ddbf4e8 ffff9b09`673462a0 00000000`00000001 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xa76
ffff8984`0b727940 fffff801`3bd67b09     : ffffd601`528b9010 ffff9b09`5b6a9001 00000000`ffffff00 00000000`06dd9500 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x7d7
ffff8984`0b727b80 fffff801`3ead5ad5     : ffff9b09`5b6a9080 fffff801`3bd67b00 ffffd601`528b9010 004fe067`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff8984`0b727bb0 fffff801`3ec1b904     : ffffad81`185ca180 ffff9b09`5b6a9080 fffff801`3ead5a80 3fea2e9e`e348cc6c : nt!PspSystemThreadStartup+0x55
ffff8984`0b727c00 00000000`00000000     : ffff8984`0b728000 ffff8984`0b721000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34


SYMBOL_NAME:  dxgmms2!VIDMM_DEVICE::RemoveCommitment+2fb42

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.22000.740

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  2fb42

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_DEVICE::RemoveCommitment

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4e4755b8-5f03-2166-fbc0-9b2f8143b884}

Followup:     MachineOwner
---------
 
DDU ile ekran kartınızın sürücüsünü kaldırıp güncel sürücüyü kurmanız gerekiyor. Gerekli rehber aşağıda mevcut.


Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff89840b7274c0, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffff89840b727418, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1687.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 8536.

 Key : Analysis.Init.CPU.mSec
 Value: 358.

 Key : Analysis.Init.Elapsed.mSec
 Value: 10288.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 88.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x139.

 Key : Bugcheck.Code.Register
 Value: 0x139.

 Key : Dump.Attributes.AsUlong
 Value: 1008.

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

 Key : FailFast.Name
 Value: CORRUPT_LIST_ENTRY.

 Key : FailFast.Type
 Value: 3

FILE_IN_CAB: 062422-10828-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008.
 Kernel Generated Triage Dump.

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffff89840b7274c0.

BUGCHECK_P3: ffff89840b727418.

BUGCHECK_P4: 0

TRAP_FRAME: ffff89840b7274c0 -- (.trap 0xffff89840b7274c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd601570c07f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013bd7a8fa rsp=ffff89840b727650 rbp=ffffd601634eeb30
 r8=0000000000000000 r9=ffff9b095bb2fdb0 r10=0000000000000001
r11=fffff8013bcb0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
dxgmms2!VIDMM_DEVICE::RemoveCommitment+0x2fb42:
fffff801`3bd7a8fa cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffff89840b727418 -- (.exr 0xffff89840b727418)
ExceptionAddress: fffff8013bd7a8fa (dxgmms2!VIDMM_DEVICE::RemoveCommitment+0x000000000002fb42)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffff8984`0b727198 fffff801`3ec2a4a9 : 00000000`00000139 00000000`00000003 ffff8984`0b7274c0 ffff8984`0b727418 : nt!KeBugCheckEx
ffff8984`0b7271a0 fffff801`3ec2a8f2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8984`0b7272e0 fffff801`3ec28bd2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xb2
ffff8984`0b7274c0 fffff801`3bd7a8fa : 00000000`00000002 ffff8984`0b7276e0 00000000`00000000 fffff801`3bcddf82 : nt!KiRaiseSecurityCheckFailure+0x312
ffff8984`0b727650 fffff801`3bd4ad26 : ffffd601`634eeb30 ffff9b09`5ce8d001 ffff9b09`68c48310 00000000`00000000 : dxgmms2!VIDMM_DEVICE::RemoveCommitment+0x2fb42
ffff8984`0b7276a0 fffff801`3bd4aaa9 : ffff9b09`68c48310 ffff9b09`5ce8d000 ffff9b09`5ce8d001 ffffd601`634eeb30 : dxgmms2!VIDMM_GLOBAL::NotifyAllocationEviction+0x4a
ffff8984`0b7276d0 fffff801`3bd43746 : ffff9b09`673462a0 ffff8984`0b727820 ffff9b09`5ce8d000 ffff9b09`5b3e7750 : dxgmms2!VIDMM_GLOBAL::EvictOneAllocation+0x59
ffff8984`0b727720 fffff801`3bd5b817 : ffffd601`5ddbf4e8 ffff9b09`673462a0 00000000`00000001 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xa76
ffff8984`0b727940 fffff801`3bd67b09 : ffffd601`528b9010 ffff9b09`5b6a9001 00000000`ffffff00 00000000`06dd9500 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x7d7
ffff8984`0b727b80 fffff801`3ead5ad5 : ffff9b09`5b6a9080 fffff801`3bd67b00 ffffd601`528b9010 004fe067`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff8984`0b727bb0 fffff801`3ec1b904 : ffffad81`185ca180 ffff9b09`5b6a9080 fffff801`3ead5a80 3fea2e9e`e348cc6c : nt!PspSystemThreadStartup+0x55
ffff8984`0b727c00 00000000`00000000 : ffff8984`0b728000 ffff8984`0b721000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34

SYMBOL_NAME: dxgmms2!VIDMM_DEVICE::RemoveCommitment+2fb42

MODULE_NAME: dxgmms2.

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.22000.740

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2fb42.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_DEVICE::RemoveCommitment

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {4e4755b8-5f03-2166-fbc0-9b2f8143b884}

Followup: MachineOwner.
---------

DDU ile kaldırdım NVIDIA sürücüsünü tekrardan Experience ile güncel sürücüyü kurdum şu an bir sıkıntı yok ama benim sistemde AMD dahili ekran kartıda var ona dokunmadım. Onu da mı kaldırmalıyım ve tekrar yüklemeliyim?

DDU ile ekran kartınızın sürücüsünü kaldırıp güncel sürücüyü kurmanız gerekiyor. Gerekli rehber aşağıda mevcut.


Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff89840b7274c0, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffff89840b727418, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1687.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 8536.

 Key : Analysis.Init.CPU.mSec
 Value: 358.

 Key : Analysis.Init.Elapsed.mSec
 Value: 10288.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 88.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x139.

 Key : Bugcheck.Code.Register
 Value: 0x139.

 Key : Dump.Attributes.AsUlong
 Value: 1008.

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

 Key : FailFast.Name
 Value: CORRUPT_LIST_ENTRY.

 Key : FailFast.Type
 Value: 3

FILE_IN_CAB: 062422-10828-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008.
 Kernel Generated Triage Dump.

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffff89840b7274c0.

BUGCHECK_P3: ffff89840b727418.

BUGCHECK_P4: 0

TRAP_FRAME: ffff89840b7274c0 -- (.trap 0xffff89840b7274c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd601570c07f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013bd7a8fa rsp=ffff89840b727650 rbp=ffffd601634eeb30
 r8=0000000000000000 r9=ffff9b095bb2fdb0 r10=0000000000000001
r11=fffff8013bcb0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
dxgmms2!VIDMM_DEVICE::RemoveCommitment+0x2fb42:
fffff801`3bd7a8fa cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffff89840b727418 -- (.exr 0xffff89840b727418)
ExceptionAddress: fffff8013bd7a8fa (dxgmms2!VIDMM_DEVICE::RemoveCommitment+0x000000000002fb42)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffff8984`0b727198 fffff801`3ec2a4a9 : 00000000`00000139 00000000`00000003 ffff8984`0b7274c0 ffff8984`0b727418 : nt!KeBugCheckEx
ffff8984`0b7271a0 fffff801`3ec2a8f2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8984`0b7272e0 fffff801`3ec28bd2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xb2
ffff8984`0b7274c0 fffff801`3bd7a8fa : 00000000`00000002 ffff8984`0b7276e0 00000000`00000000 fffff801`3bcddf82 : nt!KiRaiseSecurityCheckFailure+0x312
ffff8984`0b727650 fffff801`3bd4ad26 : ffffd601`634eeb30 ffff9b09`5ce8d001 ffff9b09`68c48310 00000000`00000000 : dxgmms2!VIDMM_DEVICE::RemoveCommitment+0x2fb42
ffff8984`0b7276a0 fffff801`3bd4aaa9 : ffff9b09`68c48310 ffff9b09`5ce8d000 ffff9b09`5ce8d001 ffffd601`634eeb30 : dxgmms2!VIDMM_GLOBAL::NotifyAllocationEviction+0x4a
ffff8984`0b7276d0 fffff801`3bd43746 : ffff9b09`673462a0 ffff8984`0b727820 ffff9b09`5ce8d000 ffff9b09`5b3e7750 : dxgmms2!VIDMM_GLOBAL::EvictOneAllocation+0x59
ffff8984`0b727720 fffff801`3bd5b817 : ffffd601`5ddbf4e8 ffff9b09`673462a0 00000000`00000001 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xa76
ffff8984`0b727940 fffff801`3bd67b09 : ffffd601`528b9010 ffff9b09`5b6a9001 00000000`ffffff00 00000000`06dd9500 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x7d7
ffff8984`0b727b80 fffff801`3ead5ad5 : ffff9b09`5b6a9080 fffff801`3bd67b00 ffffd601`528b9010 004fe067`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff8984`0b727bb0 fffff801`3ec1b904 : ffffad81`185ca180 ffff9b09`5b6a9080 fffff801`3ead5a80 3fea2e9e`e348cc6c : nt!PspSystemThreadStartup+0x55
ffff8984`0b727c00 00000000`00000000 : ffff8984`0b728000 ffff8984`0b721000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34

SYMBOL_NAME: dxgmms2!VIDMM_DEVICE::RemoveCommitment+2fb42

MODULE_NAME: dxgmms2.

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.22000.740

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2fb42.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_DEVICE::RemoveCommitment

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {4e4755b8-5f03-2166-fbc0-9b2f8143b884}

Followup: MachineOwner.
---------

Bugün de şöyle bir hata aldım ve bu hata Microsoft Edge ile gezerken oldu diğer 2 hata da aynı şekil.
 
Son düzenleme:
Merhaba, Memtest86 testi uygulayıp sonucu paylaşırsanız sevinirim.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff286a2517330, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff286a2517288, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3046

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9729

    Key  : Analysis.Init.CPU.mSec
    Value: 2046

    Key  : Analysis.Init.Elapsed.mSec
    Value: 40123

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 109

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x139

    Key  : Bugcheck.Code.Register
    Value: 0x139

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3


FILE_IN_CAB:  062722-10750-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff286a2517330

BUGCHECK_P3: fffff286a2517288

BUGCHECK_P4: 0

TRAP_FRAME:  fffff286a2517330 -- (.trap 0xfffff286a2517330)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800261594510 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012712c7f2 rsp=fffff286a25174c0 rbp=ffffffffffffffff
 r8=0000000000000000  r9=0000000000000000 r10=fffff8012712c490
r11=fffff286a2517440 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!ExDeleteResourceLite+0x362:
fffff801`2712c7f2 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff286a2517288 -- (.exr 0xfffff286a2517288)
ExceptionAddress: fffff8012712c7f2 (nt!ExDeleteResourceLite+0x0000000000000362)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffff286`a2517008 fffff801`2722a1a9     : 00000000`00000139 00000000`00000003 fffff286`a2517330 fffff286`a2517288 : nt!KeBugCheckEx
fffff286`a2517010 fffff801`2722a5f2     : fffff286`a25171c8 00000000`00000000 fffff286`a25171d0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff286`a2517150 fffff801`272288d2     : 00000000`00000000 00000000`00000000 fffff286`a2517388 00000000`00000004 : nt!KiFastFailDispatch+0xb2
fffff286`a2517330 fffff801`2712c7f2     : 00000000`00000000 fffff286`a2517440 fffff801`270b8f50 fffff73e`3022ccef : nt!KiRaiseSecurityCheckFailure+0x312
fffff286`a25174c0 fffff73e`3022cc4d     : 00000000`00000000 ffff8002`54e96180 fffff286`a2517619 ffff8002`54e96160 : nt!ExDeleteResourceLite+0x362
fffff286`a2517510 fffff73e`302d33e9     : fffff758`823188c0 ffff8002`6d1dd610 fffff286`a2517619 00000000`00000001 : win32kbase!GreDeleteSemaphore+0x2d
fffff286`a2517540 fffff73e`30793f15     : ffff8002`6d1dd610 fffff286`a2517619 00000000`00000000 ffffd27b`85600000 : win32kbase!EngDeleteSemaphore+0x9
fffff286`a2517570 fffff73e`30c3801c     : 00000000`00000000 fffff758`8074ce01 ffffd437`4a70aff0 ffffd437`4a70afc0 : win32k!EngDeleteSemaphore+0x15
fffff286`a25175a0 fffff73e`30c373f1     : fffff758`807c5020 fffff286`a2517619 fffff758`807c5020 00000000`00000000 : cdd!CddBitmap::Release+0x3c
fffff286`a25175d0 fffff73e`30c3eddd     : fffff286`a2517770 fffff758`823188c0 00000000`00000000 fffff804`bec91000 : cdd!CddBitmapHw::Release+0x1d1
fffff286`a2517680 fffff73e`3024bd5a     : 00000000`00000000 fffff804`bec91000 00000000`00000000 fffff804`bec91000 : cdd!DrvDeleteDeviceBitmapEx+0x7d
fffff286`a25176b0 fffff73e`319f99a2     : fffff804`00000000 00000000`00000000 fffff804`c8a38580 fffff758`00000001 : win32kbase!SURFACE::bDeleteSurface+0xfda
fffff286`a25178a0 fffff73e`319f0acd     : fffff758`8069fcd0 ffffffff`c0120d8f 000001d5`bc49e401 00000000`00000001 : win32kfull!GreDereferenceObject+0x72
fffff286`a25178e0 fffff73e`319f2543     : fffff804`c8a38580 00000000`00000000 ffffffff`c0120d8f 00000000`00000001 : win32kfull!SFMLOGICALSURFACE::CleanupShape+0x29
fffff286`a2517910 fffff73e`319f2488     : 00000000`00000000 ffffffff`c0120d8f ffffffff`c0120d8f 00000000`00000000 : win32kfull!SFMLOGICALSURFACE::DeInitialize+0x83
fffff286`a2517950 fffff73e`319f1030     : 00000000`00000000 fffff286`a25179c0 fffff804`bec91000 fffff758`8069fcd0 : win32kfull!bhLSurfDestroyLogicalSurfaceObject+0x80
fffff286`a2517990 fffff73e`319f0d67     : ffffcbe5`00000001 00000000`c000000d 00000000`00000000 ffffffff`c0120d8f : win32kfull!GreSfmCloseCompositorRef+0xfc
fffff286`a25179e0 fffff73e`3079d3bd     : ffff8002`5454d080 000001d5`bc4756c8 00000000`00000003 00000000`00000000 : win32kfull!NtGdiHLSurfSetInformation+0x277
fffff286`a2517a60 fffff801`27229b78     : 00000000`00000000 fffff286`a2517b20 000001d5`b7855c20 00000000`00000230 : win32k!NtGdiHLSurfSetInformation+0x15
fffff286`a2517aa0 00007ff9`233a6f34     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000085`3687f1d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`233a6f34


MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_IMAGE_memory_corruption

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6b711939-e5de-38cb-287e-eb7d8c867a90}

Followup:     memory_corruption
---------

0: kd> !blackboxpnp
    PnpActivityId      : {00000000-0000-0000-0000-000000000000}
    PnpActivityTime    : 133007945022341752
    PnpEventInformation: 3
    PnpEventInProgress : 0
    PnpProblemCode     : 24
    PnpVetoType        : 0
    DeviceId           : SW\{96E080C7-143C-11D1-B40F-00A0C9223196}\{3C0D501A-140B-11D1-B40F-00A0C9223196}
    VetoString         :

0: kd> lm
start             end                 module name
fffff73e`30200000 fffff73e`30541000   win32kbase   (pdb symbols)          C:\ProgramData\Dbg\sym\win32kbase.pdb\B08B676107371F07B79E770BC28B22631\win32kbase.pdb
fffff73e`30790000 fffff73e`3083a000   win32k   # (pdb symbols)          C:\ProgramData\Dbg\sym\win32k.pdb\653AFD8E51947FC205FFB0435AB815451\win32k.pdb
fffff73e`30c30000 fffff73e`30c73000   cdd        (pdb symbols)          C:\ProgramData\Dbg\sym\cdd.pdb\A57A3E6A76B5BE3982A44F80A230B6F41\cdd.pdb
fffff73e`31970000 fffff73e`31d22000   win32kfull   (pdb symbols)          C:\ProgramData\Dbg\sym\win32kfull.pdb\E645F796A3426C655D22C47EA02D51D11\win32kfull.pdb
fffff801`24cb0000 fffff801`24ce4000   mcupdate   (deferred)             
fffff801`24cf0000 fffff801`24cf6000   hal        (deferred)             
fffff801`24d00000 fffff801`24d0b000   kdcom      (deferred)             
fffff801`24d10000 fffff801`24d38000   tm         (deferred)             
fffff801`24d40000 fffff801`24dac000   CLFS       (deferred)             
fffff801`24db0000 fffff801`24dca000   PSHED      (deferred)             
fffff801`24dd0000 fffff801`24ddb000   BOOTVID    (deferred)             
fffff801`24de0000 fffff801`24dee000   cmimcext   (deferred)             
fffff801`24df0000 fffff801`24dfc000   ntosext    (deferred)             
fffff801`25a00000 fffff801`25a85000   cldflt     (deferred)             
fffff801`25a90000 fffff801`25aaa000   storqosflt   (deferred)             
fffff801`25ab0000 fffff801`25ad9000   bindflt    (deferred)             
fffff801`25b00000 fffff801`25b18000   lltdio     (deferred)             
fffff801`25b20000 fffff801`25b38000   mslldp     (deferred)             
fffff801`25b40000 fffff801`25b5b000   rspndr     (deferred)             
fffff801`25b60000 fffff801`25b7d000   wanarp     (deferred)             
fffff801`25b80000 fffff801`25b98000   ndisuio    (deferred)             
fffff801`25ba0000 fffff801`25c58000   nwifi      (deferred)             
fffff801`25c60000 fffff801`25cc3000   msquic     (deferred)             
fffff801`25cd0000 fffff801`25e70000   HTTP       (deferred)             
fffff801`25e80000 fffff801`25ea6000   bowser     (deferred)             
fffff801`25eb0000 fffff801`25ecb000   mpsdrv     (deferred)             
fffff801`25ed0000 fffff801`25f6a000   mrxsmb     (deferred)             
fffff801`25f70000 fffff801`25fba000   mrxsmb20   (deferred)             
fffff801`25fc0000 fffff801`2601a000   srvnet     (deferred)             
fffff801`26020000 fffff801`26073000   mrxsmb10   (deferred)             
fffff801`26080000 fffff801`260a8000   Ndu        (deferred)             
fffff801`260b0000 fffff801`260c4000   tcpipreg   (deferred)             
fffff801`260d0000 fffff801`2619e000   peauth     (deferred)             
fffff801`261a0000 fffff801`26270000   srv2       (deferred)             
fffff801`26280000 fffff801`26293000   condrv     (deferred)             
fffff801`262a0000 fffff801`262b3000   vwifimp    (deferred)             
fffff801`26300000 fffff801`2632a000   amdfendr   (deferred)             
fffff801`26780000 fffff801`26883000   dxgmms2    (deferred)             
fffff801`26890000 fffff801`268e6000   WUDFRd     (deferred)             
fffff801`268f0000 fffff801`2691b000   luafv      (deferred)             
fffff801`26920000 fffff801`26958000   wcifs      (deferred)             
fffff801`26960000 fffff801`26974000   mmcss      (deferred)             
fffff801`26e00000 fffff801`27e47000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\5BF6877F491DBF792927C6DCB3E02FB11\ntkrnlmp.pdb
fffff801`2a200000 fffff801`2a312000   clipsp     (deferred)             
fffff801`2a320000 fffff801`2a393000   FLTMGR     (deferred)             
fffff801`2a3a0000 fffff801`2a3c9000   ksecdd     (deferred)             
fffff801`2a3d0000 fffff801`2a433000   msrpc      (deferred)             
fffff801`2a440000 fffff801`2a454000   werkernel   (deferred)             
fffff801`2a460000 fffff801`2a544000   CI         (deferred)             
fffff801`2a550000 fffff801`2a60d000   cng        (deferred)             
fffff801`2a610000 fffff801`2a6e3000   Wdf01000   (deferred)             
fffff801`2a6f0000 fffff801`2a704000   WDFLDR     (deferred)             
fffff801`2a710000 fffff801`2a71d000   PRM        (deferred)             
fffff801`2a720000 fffff801`2a746000   acpiex     (deferred)             
fffff801`2a750000 fffff801`2a762000   WppRecorder   (deferred)             
fffff801`2a770000 fffff801`2a78b000   SgrmAgent   (deferred)             
fffff801`2a790000 fffff801`2a85c000   ACPI       (deferred)             
fffff801`2a860000 fffff801`2a86c000   WMILIB     (deferred)             
fffff801`2a870000 fffff801`2a87b000   msisadrv   (deferred)             
fffff801`2a880000 fffff801`2a902000   pci        (deferred)             
fffff801`2a910000 fffff801`2a963000   tpm        (deferred)             
fffff801`2a990000 fffff801`2aa03000   intelpep   (deferred)             
fffff801`2aa10000 fffff801`2aa27000   WindowsTrustedRT   (deferred)             
fffff801`2aa30000 fffff801`2aa40000   IntelPMT   (deferred)             
fffff801`2aa50000 fffff801`2aa5b000   WindowsTrustedRTProxy   (deferred)             
fffff801`2aa60000 fffff801`2aa74000   pcw        (deferred)             
fffff801`2aa80000 fffff801`2aa97000   vdrvroot   (deferred)             
fffff801`2aaa0000 fffff801`2aacf000   pdc        (deferred)             
fffff801`2aad0000 fffff801`2aae7000   CEA        (deferred)             
fffff801`2aaf0000 fffff801`2ab22000   partmgr    (deferred)             
fffff801`2ab30000 fffff801`2abff000   spaceport   (deferred)             
fffff801`2ac00000 fffff801`2ac1b000   volmgr     (deferred)             
fffff801`2ac20000 fffff801`2ac84000   volmgrx    (deferred)             
fffff801`2ac90000 fffff801`2acae000   mountmgr   (deferred)             
fffff801`2acb0000 fffff801`2ace5000   stornvme   (deferred)             
fffff801`2acf0000 fffff801`2add1000   storport   (deferred)             
fffff801`2ade0000 fffff801`2ae02000   EhStorClass   (deferred)             
fffff801`2ae10000 fffff801`2ae2b000   fileinfo   (deferred)             
fffff801`2ae30000 fffff801`2ae73000   Wof        (deferred)             
fffff801`2ae80000 fffff801`2aef2000   WdFilter   (deferred)             
fffff801`2af00000 fffff801`2b213000   Ntfs       (deferred)             
fffff801`2b220000 fffff801`2b22d000   Fs_Rec     (deferred)             
fffff801`2b230000 fffff801`2b3b1000   ndis       (deferred)             
fffff801`2b3c0000 fffff801`2b45b000   NETIO      (deferred)             
fffff801`2b460000 fffff801`2b493000   ksecpkg    (deferred)             
fffff801`2b4a0000 fffff801`2b4ad000   amdpsp     (deferred)             
fffff801`2b4b0000 fffff801`2b7c6000   tcpip      (deferred)             
fffff801`2b7d0000 fffff801`2b851000   fwpkclnt   (deferred)             
fffff801`2b860000 fffff801`2b890000   wfplwfs    (deferred)             
fffff801`2b8a0000 fffff801`2b970000   fvevol     (deferred)             
fffff801`2b980000 fffff801`2b98b000   volume     (deferred)             
fffff801`2b990000 fffff801`2ba03000   volsnap    (deferred)             
fffff801`2ba10000 fffff801`2ba5f000   rdyboost   (deferred)             
fffff801`2ba60000 fffff801`2ba86000   mup        (deferred)             
fffff801`2ba90000 fffff801`2baa2000   iorate     (deferred)             
fffff801`2bad0000 fffff801`2baec000   disk       (deferred)             
fffff801`2baf0000 fffff801`2bb5f000   CLASSPNP   (deferred)             
fffff801`33200000 fffff801`33223000   crashdmp   (deferred)             
fffff801`33230000 fffff801`3324d000   dump_dumpfve   (deferred)             
fffff801`33310000 fffff801`33340000   cdrom      (deferred)             
fffff801`33350000 fffff801`33365000   filecrypt   (deferred)             
fffff801`33370000 fffff801`3337e000   tbs        (deferred)             
fffff801`33380000 fffff801`3338a000   Null       (deferred)             
fffff801`33390000 fffff801`3339a000   Beep       (deferred)             
fffff801`333a0000 fffff801`3380f000   dxgkrnl    (deferred)             
fffff801`33810000 fffff801`3382e000   watchdog   (deferred)             
fffff801`33830000 fffff801`33845000   BasicDisplay   (deferred)             
fffff801`33850000 fffff801`33861000   BasicRender   (deferred)             
fffff801`33870000 fffff801`3388c000   Npfs       (deferred)             
fffff801`33890000 fffff801`338a1000   Msfs       (deferred)             
fffff801`338b0000 fffff801`338d5000   CimFS      (deferred)             
fffff801`338e0000 fffff801`33903000   tdx        (deferred)             
fffff801`33910000 fffff801`33920000   TDI        (deferred)             
fffff801`33930000 fffff801`3398a000   netbt      (deferred)             
fffff801`33990000 fffff801`339a4000   afunix     (deferred)             
fffff801`339b0000 fffff801`33a54000   afd        (deferred)             
fffff801`33a60000 fffff801`33a7a000   vwififlt   (deferred)             
fffff801`33a80000 fffff801`33aab000   pacer      (deferred)             
fffff801`33ab0000 fffff801`33ac3000   ndiscap    (deferred)             
fffff801`33ad0000 fffff801`33ae4000   netbios    (deferred)             
fffff801`33af0000 fffff801`33ba5000   Vid        (deferred)             
fffff801`33bb0000 fffff801`33bd5000   winhvr     (deferred)             
fffff801`33be0000 fffff801`33c5a000   rdbss      (deferred)             
fffff801`33c60000 fffff801`33c72000   nsiproxy   (deferred)             
fffff801`33c80000 fffff801`33c8f000   npsvctrig   (deferred)             
fffff801`33c90000 fffff801`33ca0000   mssmbios   (deferred)             
fffff801`33cb0000 fffff801`33cba000   gpuenergydrv   (deferred)             
fffff801`33cc0000 fffff801`33cec000   dfsc       (deferred)             
fffff801`33d20000 fffff801`33d8c000   fastfat    (deferred)             
fffff801`33d90000 fffff801`33da8000   bam        (deferred)             
fffff801`35c00000 fffff801`35c1e000   hvservice   (deferred)             
fffff801`35c20000 fffff801`35c33000   CompositeBus   (deferred)             
fffff801`35c40000 fffff801`35c4e000   kdnic      (deferred)             
fffff801`35c50000 fffff801`35c66000   umbus      (deferred)             
fffff801`35c70000 fffff801`35c85000   CAD        (deferred)             
fffff801`35c90000 fffff801`35cd4000   amdppm     (deferred)             
fffff801`35ce0000 fffff801`35d88000   UsbHub3    (deferred)             
fffff801`35e10000 fffff801`36444000   RTKVHD64   (deferred)             
fffff801`36450000 fffff801`36625000   BTHport    (deferred)             
fffff801`36630000 fffff801`36687000   usbvideo   (deferred)             
fffff801`36690000 fffff801`366a1000   kbdhid     (deferred)             
fffff801`36740000 fffff801`36775000   dump_stornvme   (deferred)             
fffff801`36790000 fffff801`367e3000   ahcache    (deferred)             
fffff801`41000000 fffff801`4111a000   rt640x64   (deferred)             
fffff801`41120000 fffff801`4135d000   mtkwl6ex   (deferred)             
fffff801`41360000 fffff801`41456000   wdiwifi    (deferred)             
fffff801`41460000 fffff801`4146e000   vwifibus   (deferred)             
fffff801`41470000 fffff801`414a4000   usbccgp    (deferred)             
fffff801`414b0000 fffff801`414c2000   hidusb     (deferred)             
fffff801`414d0000 fffff801`414fc000   HDAudBus   (deferred)             
fffff801`41500000 fffff801`41571000   portcls    (deferred)             
fffff801`41580000 fffff801`415a1000   drmk       (deferred)             
fffff801`415b0000 fffff801`41631000   ks         (deferred)             
fffff801`41640000 fffff801`416de000   USBXHCI    (deferred)             
fffff801`416e0000 fffff801`41726000   ucx01000   (deferred)             
fffff801`41730000 fffff801`41756000   i8042prt   (deferred)             
fffff801`41760000 fffff801`41774000   kbdclass   (deferred)             
fffff801`41780000 fffff801`41794000   AcpiVpc    (deferred)             
fffff801`417a0000 fffff801`417b1000   CmBatt     (deferred)             
fffff801`417c0000 fffff801`417d8000   BATTC      (deferred)             
fffff801`417e0000 fffff801`417ed000   amdgpio2   (deferred)             
fffff801`417f0000 fffff801`41821000   msgpioclx   (deferred)             
fffff801`41830000 fffff801`41842000   amdi2c     (deferred)             
fffff801`41850000 fffff801`4186b000   SpbCx      (deferred)             
fffff801`41870000 fffff801`4187c000   wmiacpi    (deferred)             
fffff801`41880000 fffff801`418bb000   nvpcf      (deferred)             
fffff801`418c0000 fffff801`418d0000   UEFI       (deferred)             
fffff801`418e0000 fffff801`418f0000   nvvad64v   (deferred)             
fffff801`41900000 fffff801`41911000   ksthunk    (deferred)             
fffff801`41920000 fffff801`4192d000   NvModuleTracker   (deferred)             
fffff801`41930000 fffff801`41940000   nvvhci     (deferred)             
fffff801`41950000 fffff801`4195d000   NdisVirtualBus   (deferred)             
fffff801`41960000 fffff801`4196c000   swenum     (deferred)             
fffff801`41970000 fffff801`419b3000   mtkbtfilterx   (deferred)             
fffff801`419c0000 fffff801`419cf000   dump_storport   (deferred)             
fffff801`419d0000 fffff801`419df000   rdpbus     (deferred)             
fffff801`419e0000 fffff801`419f5000   hidi2c     (deferred)             
fffff801`41a00000 fffff801`41a0b000   mshidkmdf   (deferred)             
fffff801`41a10000 fffff801`41a53000   HIDCLASS   (deferred)             
fffff801`41a60000 fffff801`41a73000   HIDPARSE   (deferred)             
fffff801`41a80000 fffff801`41a8e000   USBD       (deferred)             
fffff801`41a90000 fffff801`41aa0000   mouhid     (deferred)             
fffff801`41ac0000 fffff801`44560000   nvlddmkm   (deferred)             
fffff801`44570000 fffff801`44584000   mouclass   (deferred)             
fffff801`44590000 fffff801`4459c000   MTConfig   (deferred)             
fffff801`445a0000 fffff801`445b6000   NahimicBTLink   (deferred)             
fffff801`445c0000 fffff801`445d6000   Nahimic_Mirroring   (deferred)             
fffff801`445e0000 fffff801`445fd000   BTHUSB     (deferred)             
fffff802`67400000 fffff802`6c38c000   amdkmdag   (deferred)             
fffff802`6cf00000 fffff802`6cf0a000   amdfendrmgr   (deferred)             
fffff802`6cf20000 fffff802`6cf5e000   AtihdWT6   (deferred)             
fffff802`6cf80000 fffff802`6cf9c000   amdsafd    (deferred)             
fffff802`a6e20000 fffff802`a6e3d000   monitor    (deferred)             
fffff802`a6e60000 fffff802`a6e6d000   rdpvideominiport   (deferred)             
fffff802`a7110000 fffff802`a712b000   WdNisDrv   (deferred)             
fffff802`a7190000 fffff802`a71a4000   qwavedrv   (deferred)             
fffff802`a76e0000 fffff802`a7c78000   amdacpbus   (deferred)             
fffff802`a7c80000 fffff802`a7c9d000   rassstp    (deferred)             
fffff802`a7ca0000 fffff802`a7cbd000   NDProxy    (deferred)             
fffff802`a7cc0000 fffff802`a7ce7000   AgileVpn   (deferred)             
fffff802`a7cf0000 fffff802`a7d10000   rasl2tp    (deferred)             
fffff802`a7d20000 fffff802`a7d41000   raspptp    (deferred)             
fffff802`a7d50000 fffff802`a7d6c000   raspppoe   (deferred)             
fffff802`a7d70000 fffff802`a7d7f000   ndistapi   (deferred)             
fffff802`a7d80000 fffff802`a7dba000   ndiswan    (deferred)             

Unloaded modules:
fffff802`a70b0000 fffff802`a70c1000   MSKSSRV.sys
fffff802`a7020000 fffff802`a7031000   MSKSSRV.sys
fffff802`a7040000 fffff802`a7050000   hiber_storpo
fffff802`a7050000 fffff802`a7086000   hiber_stornv
fffff802`a7090000 fffff802`a70ae000   hiber_dumpfv
fffff802`a7000000 fffff802`a7011000   MSKSSRV.sys
fffff802`a6fd0000 fffff802`a6fe1000   MSKSSRV.sys
fffff802`a6ff0000 fffff802`a6ffc000   LenovoDiagno
fffff802`a71b0000 fffff802`a7682000   navagio.sys
fffff802`6ca10000 fffff802`6cd42000   BEDaisy.sys
fffff802`a6e70000 fffff802`a6fcb000   xhunter1.sys
fffff802`a7690000 fffff802`a76a1000   MSKSSRV.sys
fffff802`a71b0000 fffff802`a7682000   navagio.sys
fffff802`6c6d0000 fffff802`6ca02000   BEDaisy.sys
fffff802`a6e70000 fffff802`a6fcb000   xhunter1.sys
fffff802`a71b0000 fffff802`a7682000   navagio.sys
fffff802`6c390000 fffff802`6c6c2000   BEDaisy.sys
fffff802`a7210000 fffff802`a7221000   MSKSSRV.sys
fffff802`a71f0000 fffff802`a7201000   MSKSSRV.sys
fffff802`a71d0000 fffff802`a71e1000   MSKSSRV.sys
fffff802`a71b0000 fffff802`a71c1000   MSKSSRV.sys
fffff802`a7080000 fffff802`a70c2000   usbaudio.sys
fffff802`a7170000 fffff802`a7181000   MSKSSRV.sys
fffff802`a7150000 fffff802`a7161000   MSKSSRV.sys
fffff802`a7130000 fffff802`a7141000   MSKSSRV.sys
fffff802`a70f0000 fffff802`a7101000   MSKSSRV.sys
fffff801`262c0000 fffff801`262dc000   WdNisDrv.sys
fffff802`a70d0000 fffff802`a70e1000   MSKSSRV.sys
fffff802`a7060000 fffff802`a7071000   MSKSSRV.sys
fffff802`a7040000 fffff802`a7051000   MSKSSRV.sys
fffff802`a7020000 fffff802`a7031000   MSKSSRV.sys
fffff802`a6fb0000 fffff802`a6fc0000   hiber_storpo
fffff802`a6fc0000 fffff802`a6ff6000   hiber_stornv
fffff802`a7000000 fffff802`a701e000   hiber_dumpfv
fffff802`a6f00000 fffff802`a6f42000   usbaudio.sys
fffff802`a6f90000 fffff802`a6fa1000   MSKSSRV.sys
fffff802`a6f70000 fffff802`a6f81000   MSKSSRV.sys
fffff802`a6f50000 fffff802`a6f61000   MSKSSRV.sys
fffff802`a6ee0000 fffff802`a6ef1000   MSKSSRV.sys
fffff802`a6e70000 fffff802`a6e80000   hiber_storpo
fffff802`a6e80000 fffff802`a6eb6000   hiber_stornv
fffff802`a6ec0000 fffff802`a6ede000   hiber_dumpfv
fffff801`366b0000 fffff801`366f2000   usbaudio.sys
fffff802`a6e40000 fffff802`a6e51000   MSKSSRV.sys
fffff802`a6e00000 fffff802`a6e1e000   monitor.sys
fffff802`678b0000 fffff802`6cef7000   amdkmdag.sys
fffff802`6cf60000 fffff802`6cf7e000   monitor.sys
fffff802`a7df0000 fffff802`a7dfc000   LenovoDiagno
fffff802`a7de0000 fffff802`a7dec000   LenovoDiagno
fffff802`a7dd0000 fffff802`a7ddc000   LenovoDiagno
 
Merhaba, Memtest86 testi uygulayıp sonucu paylaşırsanız sevinirim.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff286a2517330, Address of the trap frame for the exception that caused the BugCheck.
Arg3: fffff286a2517288, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 3046.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 9729.

 Key : Analysis.Init.CPU.mSec
 Value: 2046.

 Key : Analysis.Init.Elapsed.mSec
 Value: 40123.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 109.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x139.

 Key : Bugcheck.Code.Register
 Value: 0x139.

 Key : Dump.Attributes.AsUlong
 Value: 1008.

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

 Key : FailFast.Name
 Value: CORRUPT_LIST_ENTRY.

 Key : FailFast.Type
 Value: 3

FILE_IN_CAB: 062722-10750-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008.
 Kernel Generated Triage Dump.

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: fffff286a2517330.

BUGCHECK_P3: fffff286a2517288.

BUGCHECK_P4: 0

TRAP_FRAME: fffff286a2517330 -- (.trap 0xfffff286a2517330)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800261594510 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012712c7f2 rsp=fffff286a25174c0 rbp=ffffffffffffffff
 r8=0000000000000000 r9=0000000000000000 r10=fffff8012712c490
r11=fffff286a2517440 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
nt!ExDeleteResourceLite+0x362:
fffff801`2712c7f2 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: fffff286a2517288 -- (.exr 0xfffff286a2517288)
ExceptionAddress: fffff8012712c7f2 (nt!ExDeleteResourceLite+0x0000000000000362)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dwm.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
fffff286`a2517008 fffff801`2722a1a9 : 00000000`00000139 00000000`00000003 fffff286`a2517330 fffff286`a2517288 : nt!KeBugCheckEx
fffff286`a2517010 fffff801`2722a5f2 : fffff286`a25171c8 00000000`00000000 fffff286`a25171d0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff286`a2517150 fffff801`272288d2 : 00000000`00000000 00000000`00000000 fffff286`a2517388 00000000`00000004 : nt!KiFastFailDispatch+0xb2
fffff286`a2517330 fffff801`2712c7f2 : 00000000`00000000 fffff286`a2517440 fffff801`270b8f50 fffff73e`3022ccef : nt!KiRaiseSecurityCheckFailure+0x312
fffff286`a25174c0 fffff73e`3022cc4d : 00000000`00000000 ffff8002`54e96180 fffff286`a2517619 ffff8002`54e96160 : nt!ExDeleteResourceLite+0x362
fffff286`a2517510 fffff73e`302d33e9 : fffff758`823188c0 ffff8002`6d1dd610 fffff286`a2517619 00000000`00000001 : win32kbase!GreDeleteSemaphore+0x2d
fffff286`a2517540 fffff73e`30793f15 : ffff8002`6d1dd610 fffff286`a2517619 00000000`00000000 ffffd27b`85600000 : win32kbase!EngDeleteSemaphore+0x9
fffff286`a2517570 fffff73e`30c3801c : 00000000`00000000 fffff758`8074ce01 ffffd437`4a70aff0 ffffd437`4a70afc0 : win32k!EngDeleteSemaphore+0x15
fffff286`a25175a0 fffff73e`30c373f1 : fffff758`807c5020 fffff286`a2517619 fffff758`807c5020 00000000`00000000 : cdd!CddBitmap::Release+0x3c
fffff286`a25175d0 fffff73e`30c3eddd : fffff286`a2517770 fffff758`823188c0 00000000`00000000 fffff804`bec91000 : cdd!CddBitmapHw::Release+0x1d1
fffff286`a2517680 fffff73e`3024bd5a : 00000000`00000000 fffff804`bec91000 00000000`00000000 fffff804`bec91000 : cdd!DrvDeleteDeviceBitmapEx+0x7d
fffff286`a25176b0 fffff73e`319f99a2 : fffff804`00000000 00000000`00000000 fffff804`c8a38580 fffff758`00000001 : win32kbase!SURFACE::bDeleteSurface+0xfda
fffff286`a25178a0 fffff73e`319f0acd : fffff758`8069fcd0 ffffffff`c0120d8f 000001d5`bc49e401 00000000`00000001 : win32kfull!GreDereferenceObject+0x72
fffff286`a25178e0 fffff73e`319f2543 : fffff804`c8a38580 00000000`00000000 ffffffff`c0120d8f 00000000`00000001 : win32kfull!SFMLOGICALSURFACE::CleanupShape+0x29
fffff286`a2517910 fffff73e`319f2488 : 00000000`00000000 ffffffff`c0120d8f ffffffff`c0120d8f 00000000`00000000 : win32kfull!SFMLOGICALSURFACE::DeInitialize+0x83
fffff286`a2517950 fffff73e`319f1030 : 00000000`00000000 fffff286`a25179c0 fffff804`bec91000 fffff758`8069fcd0 : win32kfull!bhLSurfDestroyLogicalSurfaceObject+0x80
fffff286`a2517990 fffff73e`319f0d67 : ffffcbe5`00000001 00000000`c000000d 00000000`00000000 ffffffff`c0120d8f : win32kfull!GreSfmCloseCompositorRef+0xfc
fffff286`a25179e0 fffff73e`3079d3bd : ffff8002`5454d080 000001d5`bc4756c8 00000000`00000003 00000000`00000000 : win32kfull!NtGdiHLSurfSetInformation+0x277
fffff286`a2517a60 fffff801`27229b78 : 00000000`00000000 fffff286`a2517b20 000001d5`b7855c20 00000000`00000230 : win32k!NtGdiHLSurfSetInformation+0x15
fffff286`a2517aa0 00007ff9`233a6f34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000085`3687f1d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`233a6f34

MODULE_NAME: memory_corruption.

IMAGE_NAME: memory_corruption.

STACK_COMMAND: .cxr; .ecxr ; kb.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_IMAGE_memory_corruption

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {6b711939-e5de-38cb-287e-eb7d8c867a90}

Followup: memory_corruption.
---------

0: kd> !blackboxpnp
 PnpActivityId : {00000000-0000-0000-0000-000000000000}
 PnpActivityTime : 133007945022341752.
 PnpEventInformation: 3
 PnpEventInProgress : 0
 PnpProblemCode : 24.
 PnpVetoType : 0
 DeviceId : SW\{96E080C7-143C-11D1-B40F-00A0C9223196}\{3C0D501A-140B-11D1-B40F-00A0C9223196}
 VetoString :

0: kd> lm.
start end module name.
fffff73e`30200000 fffff73e`30541000 win32kbase (pdb symbols) C:\ProgramData\Dbg\sym\win32kbase.pdb\B08B676107371F07B79E770BC28B22631\win32kbase.pdb
fffff73e`30790000 fffff73e`3083a000 win32k # (pdb symbols) C:\ProgramData\Dbg\sym\win32k.pdb\653AFD8E51947FC205FFB0435AB815451\win32k.pdb
fffff73e`30c30000 fffff73e`30c73000 cdd (pdb symbols) C:\ProgramData\Dbg\sym\cdd.pdb\A57A3E6A76B5BE3982A44F80A230B6F41\cdd.pdb
fffff73e`31970000 fffff73e`31d22000 win32kfull (pdb symbols) C:\ProgramData\Dbg\sym\win32kfull.pdb\E645F796A3426C655D22C47EA02D51D11\win32kfull.pdb
fffff801`24cb0000 fffff801`24ce4000 mcupdate (deferred)
fffff801`24cf0000 fffff801`24cf6000 hal (deferred)
fffff801`24d00000 fffff801`24d0b000 kdcom (deferred)
fffff801`24d10000 fffff801`24d38000 tm (deferred)
fffff801`24d40000 fffff801`24dac000 CLFS (deferred)
fffff801`24db0000 fffff801`24dca000 PSHED (deferred)
fffff801`24dd0000 fffff801`24ddb000 BOOTVID (deferred)
fffff801`24de0000 fffff801`24dee000 cmimcext (deferred)
fffff801`24df0000 fffff801`24dfc000 ntosext (deferred)
fffff801`25a00000 fffff801`25a85000 cldflt (deferred)
fffff801`25a90000 fffff801`25aaa000 storqosflt (deferred)
fffff801`25ab0000 fffff801`25ad9000 bindflt (deferred)
fffff801`25b00000 fffff801`25b18000 lltdio (deferred)
fffff801`25b20000 fffff801`25b38000 mslldp (deferred)
fffff801`25b40000 fffff801`25b5b000 rspndr (deferred)
fffff801`25b60000 fffff801`25b7d000 wanarp (deferred)
fffff801`25b80000 fffff801`25b98000 ndisuio (deferred)
fffff801`25ba0000 fffff801`25c58000 nwifi (deferred)
fffff801`25c60000 fffff801`25cc3000 msquic (deferred)
fffff801`25cd0000 fffff801`25e70000 HTTP (deferred)
fffff801`25e80000 fffff801`25ea6000 bowser (deferred)
fffff801`25eb0000 fffff801`25ecb000 mpsdrv (deferred)
fffff801`25ed0000 fffff801`25f6a000 mrxsmb (deferred)
fffff801`25f70000 fffff801`25fba000 mrxsmb20 (deferred)
fffff801`25fc0000 fffff801`2601a000 srvnet (deferred)
fffff801`26020000 fffff801`26073000 mrxsmb10 (deferred)
fffff801`26080000 fffff801`260a8000 Ndu (deferred)
fffff801`260b0000 fffff801`260c4000 tcpipreg (deferred)
fffff801`260d0000 fffff801`2619e000 peauth (deferred)
fffff801`261a0000 fffff801`26270000 srv2 (deferred)
fffff801`26280000 fffff801`26293000 condrv (deferred)
fffff801`262a0000 fffff801`262b3000 vwifimp (deferred)
fffff801`26300000 fffff801`2632a000 amdfendr (deferred)
fffff801`26780000 fffff801`26883000 dxgmms2 (deferred)
fffff801`26890000 fffff801`268e6000 WUDFRd (deferred)
fffff801`268f0000 fffff801`2691b000 luafv (deferred)
fffff801`26920000 fffff801`26958000 wcifs (deferred)
fffff801`26960000 fffff801`26974000 mmcss (deferred)
fffff801`26e00000 fffff801`27e47000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\5BF6877F491DBF792927C6DCB3E02FB11\ntkrnlmp.pdb
fffff801`2a200000 fffff801`2a312000 clipsp (deferred)
fffff801`2a320000 fffff801`2a393000 FLTMGR (deferred)
fffff801`2a3a0000 fffff801`2a3c9000 ksecdd (deferred)
fffff801`2a3d0000 fffff801`2a433000 msrpc (deferred)
fffff801`2a440000 fffff801`2a454000 werkernel (deferred)
fffff801`2a460000 fffff801`2a544000 CI (deferred)
fffff801`2a550000 fffff801`2a60d000 cng (deferred)
fffff801`2a610000 fffff801`2a6e3000 Wdf01000 (deferred)
fffff801`2a6f0000 fffff801`2a704000 WDFLDR (deferred)
fffff801`2a710000 fffff801`2a71d000 PRM (deferred)
fffff801`2a720000 fffff801`2a746000 acpiex (deferred)
fffff801`2a750000 fffff801`2a762000 WppRecorder (deferred)
fffff801`2a770000 fffff801`2a78b000 SgrmAgent (deferred)
fffff801`2a790000 fffff801`2a85c000 ACPI (deferred)
fffff801`2a860000 fffff801`2a86c000 WMILIB (deferred)
fffff801`2a870000 fffff801`2a87b000 msisadrv (deferred)
fffff801`2a880000 fffff801`2a902000 pci (deferred)
fffff801`2a910000 fffff801`2a963000 tpm (deferred)
fffff801`2a990000 fffff801`2aa03000 intelpep (deferred)
fffff801`2aa10000 fffff801`2aa27000 WindowsTrustedRT (deferred)
fffff801`2aa30000 fffff801`2aa40000 IntelPMT (deferred)
fffff801`2aa50000 fffff801`2aa5b000 WindowsTrustedRTProxy (deferred)
fffff801`2aa60000 fffff801`2aa74000 pcw (deferred)
fffff801`2aa80000 fffff801`2aa97000 vdrvroot (deferred)
fffff801`2aaa0000 fffff801`2aacf000 pdc (deferred)
fffff801`2aad0000 fffff801`2aae7000 CEA (deferred)
fffff801`2aaf0000 fffff801`2ab22000 partmgr (deferred)
fffff801`2ab30000 fffff801`2abff000 spaceport (deferred)
fffff801`2ac00000 fffff801`2ac1b000 volmgr (deferred)
fffff801`2ac20000 fffff801`2ac84000 volmgrx (deferred)
fffff801`2ac90000 fffff801`2acae000 mountmgr (deferred)
fffff801`2acb0000 fffff801`2ace5000 stornvme (deferred)
fffff801`2acf0000 fffff801`2add1000 storport (deferred)
fffff801`2ade0000 fffff801`2ae02000 EhStorClass (deferred)
fffff801`2ae10000 fffff801`2ae2b000 fileinfo (deferred)
fffff801`2ae30000 fffff801`2ae73000 Wof (deferred)
fffff801`2ae80000 fffff801`2aef2000 WdFilter (deferred)
fffff801`2af00000 fffff801`2b213000 Ntfs (deferred)
fffff801`2b220000 fffff801`2b22d000 Fs_Rec (deferred)
fffff801`2b230000 fffff801`2b3b1000 ndis (deferred)
fffff801`2b3c0000 fffff801`2b45b000 NETIO (deferred)
fffff801`2b460000 fffff801`2b493000 ksecpkg (deferred)
fffff801`2b4a0000 fffff801`2b4ad000 amdpsp (deferred)
fffff801`2b4b0000 fffff801`2b7c6000 tcpip (deferred)
fffff801`2b7d0000 fffff801`2b851000 fwpkclnt (deferred)
fffff801`2b860000 fffff801`2b890000 wfplwfs (deferred)
fffff801`2b8a0000 fffff801`2b970000 fvevol (deferred)
fffff801`2b980000 fffff801`2b98b000 volume (deferred)
fffff801`2b990000 fffff801`2ba03000 volsnap (deferred)
fffff801`2ba10000 fffff801`2ba5f000 rdyboost (deferred)
fffff801`2ba60000 fffff801`2ba86000 mup (deferred)
fffff801`2ba90000 fffff801`2baa2000 iorate (deferred)
fffff801`2bad0000 fffff801`2baec000 disk (deferred)
fffff801`2baf0000 fffff801`2bb5f000 CLASSPNP (deferred)
fffff801`33200000 fffff801`33223000 crashdmp (deferred)
fffff801`33230000 fffff801`3324d000 dump_dumpfve (deferred)
fffff801`33310000 fffff801`33340000 cdrom (deferred)
fffff801`33350000 fffff801`33365000 filecrypt (deferred)
fffff801`33370000 fffff801`3337e000 tbs (deferred)
fffff801`33380000 fffff801`3338a000 Null (deferred)
fffff801`33390000 fffff801`3339a000 Beep (deferred)
fffff801`333a0000 fffff801`3380f000 dxgkrnl (deferred)
fffff801`33810000 fffff801`3382e000 watchdog (deferred)
fffff801`33830000 fffff801`33845000 BasicDisplay (deferred)
fffff801`33850000 fffff801`33861000 BasicRender (deferred)
fffff801`33870000 fffff801`3388c000 Npfs (deferred)
fffff801`33890000 fffff801`338a1000 Msfs (deferred)
fffff801`338b0000 fffff801`338d5000 CimFS (deferred)
fffff801`338e0000 fffff801`33903000 tdx (deferred)
fffff801`33910000 fffff801`33920000 TDI (deferred)
fffff801`33930000 fffff801`3398a000 netbt (deferred)
fffff801`33990000 fffff801`339a4000 afunix (deferred)
fffff801`339b0000 fffff801`33a54000 afd (deferred)
fffff801`33a60000 fffff801`33a7a000 vwififlt (deferred)
fffff801`33a80000 fffff801`33aab000 pacer (deferred)
fffff801`33ab0000 fffff801`33ac3000 ndiscap (deferred)
fffff801`33ad0000 fffff801`33ae4000 netbios (deferred)
fffff801`33af0000 fffff801`33ba5000 Vid (deferred)
fffff801`33bb0000 fffff801`33bd5000 winhvr (deferred)
fffff801`33be0000 fffff801`33c5a000 rdbss (deferred)
fffff801`33c60000 fffff801`33c72000 nsiproxy (deferred)
fffff801`33c80000 fffff801`33c8f000 npsvctrig (deferred)
fffff801`33c90000 fffff801`33ca0000 mssmbios (deferred)
fffff801`33cb0000 fffff801`33cba000 gpuenergydrv (deferred)
fffff801`33cc0000 fffff801`33cec000 dfsc (deferred)
fffff801`33d20000 fffff801`33d8c000 fastfat (deferred)
fffff801`33d90000 fffff801`33da8000 bam (deferred)
fffff801`35c00000 fffff801`35c1e000 hvservice (deferred)
fffff801`35c20000 fffff801`35c33000 CompositeBus (deferred)
fffff801`35c40000 fffff801`35c4e000 kdnic (deferred)
fffff801`35c50000 fffff801`35c66000 umbus (deferred)
fffff801`35c70000 fffff801`35c85000 CAD (deferred)
fffff801`35c90000 fffff801`35cd4000 amdppm (deferred)
fffff801`35ce0000 fffff801`35d88000 UsbHub3 (deferred)
fffff801`35e10000 fffff801`36444000 RTKVHD64 (deferred)
fffff801`36450000 fffff801`36625000 BTHport (deferred)
fffff801`36630000 fffff801`36687000 usbvideo (deferred)
fffff801`36690000 fffff801`366a1000 kbdhid (deferred)
fffff801`36740000 fffff801`36775000 dump_stornvme (deferred)
fffff801`36790000 fffff801`367e3000 ahcache (deferred)
fffff801`41000000 fffff801`4111a000 rt640x64 (deferred)
fffff801`41120000 fffff801`4135d000 mtkwl6ex (deferred)
fffff801`41360000 fffff801`41456000 wdiwifi (deferred)
fffff801`41460000 fffff801`4146e000 vwifibus (deferred)
fffff801`41470000 fffff801`414a4000 usbccgp (deferred)
fffff801`414b0000 fffff801`414c2000 hidusb (deferred)
fffff801`414d0000 fffff801`414fc000 HDAudBus (deferred)
fffff801`41500000 fffff801`41571000 portcls (deferred)
fffff801`41580000 fffff801`415a1000 drmk (deferred)
fffff801`415b0000 fffff801`41631000 ks (deferred)
fffff801`41640000 fffff801`416de000 USBXHCI (deferred)
fffff801`416e0000 fffff801`41726000 ucx01000 (deferred)
fffff801`41730000 fffff801`41756000 i8042prt (deferred)
fffff801`41760000 fffff801`41774000 kbdclass (deferred)
fffff801`41780000 fffff801`41794000 AcpiVpc (deferred)
fffff801`417a0000 fffff801`417b1000 CmBatt (deferred)
fffff801`417c0000 fffff801`417d8000 BATTC (deferred)
fffff801`417e0000 fffff801`417ed000 amdgpio2 (deferred)
fffff801`417f0000 fffff801`41821000 msgpioclx (deferred)
fffff801`41830000 fffff801`41842000 amdi2c (deferred)
fffff801`41850000 fffff801`4186b000 SpbCx (deferred)
fffff801`41870000 fffff801`4187c000 wmiacpi (deferred)
fffff801`41880000 fffff801`418bb000 nvpcf (deferred)
fffff801`418c0000 fffff801`418d0000 UEFI (deferred)
fffff801`418e0000 fffff801`418f0000 nvvad64v (deferred)
fffff801`41900000 fffff801`41911000 ksthunk (deferred)
fffff801`41920000 fffff801`4192d000 NvModuleTracker (deferred)
fffff801`41930000 fffff801`41940000 nvvhci (deferred)
fffff801`41950000 fffff801`4195d000 NdisVirtualBus (deferred)
fffff801`41960000 fffff801`4196c000 swenum (deferred)
fffff801`41970000 fffff801`419b3000 mtkbtfilterx (deferred)
fffff801`419c0000 fffff801`419cf000 dump_storport (deferred)
fffff801`419d0000 fffff801`419df000 rdpbus (deferred)
fffff801`419e0000 fffff801`419f5000 hidi2c (deferred)
fffff801`41a00000 fffff801`41a0b000 mshidkmdf (deferred)
fffff801`41a10000 fffff801`41a53000 HIDCLASS (deferred)
fffff801`41a60000 fffff801`41a73000 HIDPARSE (deferred)
fffff801`41a80000 fffff801`41a8e000 USBD (deferred)
fffff801`41a90000 fffff801`41aa0000 mouhid (deferred)
fffff801`41ac0000 fffff801`44560000 nvlddmkm (deferred)
fffff801`44570000 fffff801`44584000 mouclass (deferred)
fffff801`44590000 fffff801`4459c000 MTConfig (deferred)
fffff801`445a0000 fffff801`445b6000 NahimicBTLink (deferred)
fffff801`445c0000 fffff801`445d6000 Nahimic_Mirroring (deferred)
fffff801`445e0000 fffff801`445fd000 BTHUSB (deferred)
fffff802`67400000 fffff802`6c38c000 amdkmdag (deferred)
fffff802`6cf00000 fffff802`6cf0a000 amdfendrmgr (deferred)
fffff802`6cf20000 fffff802`6cf5e000 AtihdWT6 (deferred)
fffff802`6cf80000 fffff802`6cf9c000 amdsafd (deferred)
fffff802`a6e20000 fffff802`a6e3d000 monitor (deferred)
fffff802`a6e60000 fffff802`a6e6d000 rdpvideominiport (deferred)
fffff802`a7110000 fffff802`a712b000 WdNisDrv (deferred)
fffff802`a7190000 fffff802`a71a4000 qwavedrv (deferred)
fffff802`a76e0000 fffff802`a7c78000 amdacpbus (deferred)
fffff802`a7c80000 fffff802`a7c9d000 rassstp (deferred)
fffff802`a7ca0000 fffff802`a7cbd000 NDProxy (deferred)
fffff802`a7cc0000 fffff802`a7ce7000 AgileVpn (deferred)
fffff802`a7cf0000 fffff802`a7d10000 rasl2tp (deferred)
fffff802`a7d20000 fffff802`a7d41000 raspptp (deferred)
fffff802`a7d50000 fffff802`a7d6c000 raspppoe (deferred)
fffff802`a7d70000 fffff802`a7d7f000 ndistapi (deferred)
fffff802`a7d80000 fffff802`a7dba000 ndiswan (deferred)

Unloaded modules:
fffff802`a70b0000 fffff802`a70c1000 MSKSSRV.sys
fffff802`a7020000 fffff802`a7031000 MSKSSRV.sys
fffff802`a7040000 fffff802`a7050000 hiber_storpo.
fffff802`a7050000 fffff802`a7086000 hiber_stornv.
fffff802`a7090000 fffff802`a70ae000 hiber_dumpfv.
fffff802`a7000000 fffff802`a7011000 MSKSSRV.sys
fffff802`a6fd0000 fffff802`a6fe1000 MSKSSRV.sys
fffff802`a6ff0000 fffff802`a6ffc000 LenovoDiagno.
fffff802`a71b0000 fffff802`a7682000 navagio.sys
fffff802`6ca10000 fffff802`6cd42000 BEDaisy.sys
fffff802`a6e70000 fffff802`a6fcb000 xhunter1.sys
fffff802`a7690000 fffff802`a76a1000 MSKSSRV.sys
fffff802`a71b0000 fffff802`a7682000 navagio.sys
fffff802`6c6d0000 fffff802`6ca02000 BEDaisy.sys
fffff802`a6e70000 fffff802`a6fcb000 xhunter1.sys
fffff802`a71b0000 fffff802`a7682000 navagio.sys
fffff802`6c390000 fffff802`6c6c2000 BEDaisy.sys
fffff802`a7210000 fffff802`a7221000 MSKSSRV.sys
fffff802`a71f0000 fffff802`a7201000 MSKSSRV.sys
fffff802`a71d0000 fffff802`a71e1000 MSKSSRV.sys
fffff802`a71b0000 fffff802`a71c1000 MSKSSRV.sys
fffff802`a7080000 fffff802`a70c2000 usbaudio.sys
fffff802`a7170000 fffff802`a7181000 MSKSSRV.sys
fffff802`a7150000 fffff802`a7161000 MSKSSRV.sys
fffff802`a7130000 fffff802`a7141000 MSKSSRV.sys
fffff802`a70f0000 fffff802`a7101000 MSKSSRV.sys
fffff801`262c0000 fffff801`262dc000 WdNisDrv.sys
fffff802`a70d0000 fffff802`a70e1000 MSKSSRV.sys
fffff802`a7060000 fffff802`a7071000 MSKSSRV.sys
fffff802`a7040000 fffff802`a7051000 MSKSSRV.sys
fffff802`a7020000 fffff802`a7031000 MSKSSRV.sys
fffff802`a6fb0000 fffff802`a6fc0000 hiber_storpo.
fffff802`a6fc0000 fffff802`a6ff6000 hiber_stornv.
fffff802`a7000000 fffff802`a701e000 hiber_dumpfv.
fffff802`a6f00000 fffff802`a6f42000 usbaudio.sys
fffff802`a6f90000 fffff802`a6fa1000 MSKSSRV.sys
fffff802`a6f70000 fffff802`a6f81000 MSKSSRV.sys
fffff802`a6f50000 fffff802`a6f61000 MSKSSRV.sys
fffff802`a6ee0000 fffff802`a6ef1000 MSKSSRV.sys
fffff802`a6e70000 fffff802`a6e80000 hiber_storpo.
fffff802`a6e80000 fffff802`a6eb6000 hiber_stornv.
fffff802`a6ec0000 fffff802`a6ede000 hiber_dumpfv.
fffff801`366b0000 fffff801`366f2000 usbaudio.sys
fffff802`a6e40000 fffff802`a6e51000 MSKSSRV.sys
fffff802`a6e00000 fffff802`a6e1e000 monitor.sys
fffff802`678b0000 fffff802`6cef7000 amdkmdag.sys
fffff802`6cf60000 fffff802`6cf7e000 monitor.sys
fffff802`a7df0000 fffff802`a7dfc000 LenovoDiagno.
fffff802`a7de0000 fffff802`a7dec000 LenovoDiagno.
fffff802`a7dd0000 fffff802`a7ddc000 LenovoDiagno

Memtest 0 hata hiç hata yok gösterdi yaklaşık 3 saat sürdü test, Microsoft'un bellek testini de yaptım onda da hata çıkmadı.
 

Yeni konular

Geri
Yukarı