Çözüldü Mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

Dosya Ekleri

  • 1600765289388.png
    1600765289388.png
    37,3 KB · Görüntüleme: 30
İnatla bellek hatası görüyorum, bellekleri kesin olarak değiştirin. Elinizde başka uyumlu bellek varsa şimdilik onu kullanabilirsiniz.

Önce Kaspersky, sonra da Kaspersky'yi silip Malwarebytes ile tam tarama yapın sisteme. Formatta kullandığınız ISO dosyasını nereden indirmiştiniz?
 
İnatla bellek hatası görüyorum, bellekleri kesin olarak değiştirin. Elinizde başka uyumlu bellek varsa şimdilik onu kullanabilirsiniz.

Önce Kaspersky, sonra da Kaspersky'yi silip Malwarebytes ile tam tarama yapın sisteme. Formatta kullandığınız ISO dosyasını nereden indirmiştiniz?

Windows'un sitesinden indirdim.
 
Health sekmesinin boş olduğunu bilmiyordum. CrystalDiskInfo ile paylaşın birde. Genel olarak bellek hatası var değiştirin.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80511e3185f, address which referenced memory

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'srvnet' and 'dump_storpor' overlap

WRITE_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 0000000000000000

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiAcquireKobjectLockSafe+f
fffff805`11e3185f f00fba2907      lock bts dword ptr [rcx],7

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  HDTunePro.exe

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  fffffd0de1230110 -- (.trap 0xfffffd0de1230110)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80511e3185f rsp=fffffd0de12302a0 rbp=ffffb98020189180
 r8=0000000000000002  r9=0000000000000000 r10=0000fffff8051200
r11=fffffd0de1230318 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiAcquireKobjectLockSafe+0xf:
fffff805`11e3185f f00fba2907      lock bts dword ptr [rcx],7 ds:00000000`00000000=00000000
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80511fefe29 to fffff80511fddf40

STACK_TEXT: 
fffffd0d`e122ffc8 fffff805`11fefe29 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffffd0d`e122ffd0 fffff805`11fec129 : fffffd0d`e12308d0 fffffd0d`e12306ec 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffd0d`e1230110 fffff805`11e3185f : 00000000`00003dff ffffe689`ff6710c0 00000000`00000002 fffffd0d`e12305a8 : nt!KiPageFault+0x469
fffffd0d`e12302a0 fffff805`11e3b29a : 00000000`00000000 fffff805`00000002 ffffe689`f6ec2d20 ffffe689`00000000 : nt!KiAcquireKobjectLockSafe+0xf
fffffd0d`e12302d0 fffff805`1220c5a2 : 00000000`00000000 00000000`00000000 ffffe68a`02413d30 00000000`00000000 : nt!IoSetIoCompletionEx+0x9a
fffffd0d`e1230320 fffff805`11fef878 : fffffd0d`e12305a8 ffffe689`ff6710c0 fffffd0d`e1230470 fffffd0d`e1230398 : nt!NtSetIoCompletionEx+0xf2
fffffd0d`e1230380 fffff805`11fe1da0 : ffffa58c`2d3a6454 ffffa5bf`4425f010 fffffd0d`e1230b80 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
fffffd0d`e1230588 ffffa58c`2d3a6454 : ffffa5bf`4425f010 fffffd0d`e1230b80 00000000`00000000 fffffd0d`e12305a0 : nt!KiServiceLinkage
fffffd0d`e1230590 ffffa58c`2d3a5e32 : fffffd0d`e1230a78 00000000`0009e500 00000000`00000000 00000000`00000000 : win32kfull!xxxRealInternalGetMessage+0x3e4
fffffd0d`e1230a30 ffffa58c`2dcf6275 : ffffe689`ff6710c0 00007ffa`4a7f3970 00000000`00000020 00000000`0036f000 : win32kfull!NtUserGetMessage+0x92
fffffd0d`e1230ac0 fffff805`11fef878 : 00000000`00000216 fffffd0d`e1230b80 00000000`00000000 ffffa58c`2dcf6c88 : win32k!NtUserGetMessage+0x15
fffffd0d`e1230b00 00007ffa`4a800004 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0009e5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4a800004


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffa58c2d013bf7-ffffa58c2d013bfc  6 bytes - win32kbase!DirectComposition::CResourceMarshaler::EmitCreationCommand+57
    [ ff 15 bb b3 26 00:e8 a4 c6 2c 00 90 ]
    ffffa58c2d013f7c-ffffa58c2d013f7d  2 bytes - win32kbase!DirectComposition::CCompositionSurfaceBitmapMarshaler::EmitUpdateCommands+3c (+0x385)
    [ 48 ff:4c 8b ]
    ffffa58c2d013f83-ffffa58c2d013f86  4 bytes - win32kbase!DirectComposition::CCompositionSurfaceBitmapMarshaler::EmitUpdateCommands+43 (+0x07)
    [ 0f 1f 44 00:e8 98 c4 2c ]
    ffffa58c2d038141-ffffa58c2d038142  2 bytes - win32kbase!EnterCrit+231 (+0x241be)
    [ 48 ff:4c 8b ]
    ffffa58c2d038148-ffffa58c2d03814b  4 bytes - win32kbase!EnterCrit+238 (+0x07)
    [ 0f 1f 44 00:e8 d3 82 2a ]
    ffffa58c2d038150-ffffa58c2d038151  2 bytes - win32kbase!EnterCrit+240 (+0x08)
    [ 48 ff:4c 8b ]
    ffffa58c2d038157-ffffa58c2d03815a  4 bytes - win32kbase!EnterCrit+247 (+0x07)
    [ 0f 1f 44 00:e8 c4 82 2a ]
    ffffa58c2d03815e-ffffa58c2d03815f  2 bytes - win32kbase!EnterCrit+24e (+0x07)
    [ 48 ff:4c 8b ]
    ffffa58c2d038165-ffffa58c2d038168  4 bytes - win32kbase!EnterCrit+255 (+0x07)
    [ 0f 1f 44 00:e8 b6 82 2a ]
    ffffa58c2d03816d-ffffa58c2d03816e  2 bytes - win32kbase!EnterCrit+25d (+0x08)
    [ 48 ff:4c 8b ]
    ffffa58c2d038174-ffffa58c2d038177  4 bytes - win32kbase!EnterCrit+264 (+0x07)
    [ 0f 1f 44 00:e8 a7 82 2a ]
    ffffa58c2d0381b3-ffffa58c2d0381b4  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+23 (+0x3f)
    [ 48 ff:4c 8b ]
    ffffa58c2d0381ba-ffffa58c2d0381bd  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+2a (+0x07)
    [ 0f 1f 44 00:e8 61 82 2a ]
    ffffa58c2d0381fd-ffffa58c2d0381fe  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+6d (+0x43)
    [ 48 ff:4c 8b ]
    ffffa58c2d038204-ffffa58c2d038207  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+74 (+0x07)
    [ 0f 1f 44 00:e8 17 82 2a ]
    ffffa58c2d038524-ffffa58c2d038525  2 bytes - win32kbase!IsThreadCrossSessionAttached+4 (+0x320)
    [ 48 ff:4c 8b ]
    ffffa58c2d0a05a4-ffffa58c2d0a05a5  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+2c (+0x68080)
    [ 48 ff:4c 8b ]
    ffffa58c2d0a05ab-ffffa58c2d0a05ae  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+33 (+0x07)
    [ 0f 1f 44 00:e8 70 fe 23 ]
    ffffa58c2d0a05b5-ffffa58c2d0a05b6  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+3d (+0x0a)
    [ 48 ff:4c 8b ]
    ffffa58c2d0a05bc-ffffa58c2d0a05bf  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+44 (+0x07)
    [ 0f 1f 44 00:e8 5f fe 23 ]
    ffffa58c2d0a05f9-ffffa58c2d0a05fa  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+81 (+0x3d)
    [ 48 ff:4c 8b ]
    ffffa58c2d0a0600-ffffa58c2d0a0603  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+88 (+0x07)
    [ 0f 1f 44 00:e8 1b fe 23 ]
    ffffa58c2d0a0605-ffffa58c2d0a0606  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+8d (+0x05)
    [ 48 ff:4c 8b ]
    ffffa58c2d0a060c-ffffa58c2d0a060f  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+94 (+0x07)
    [ 0f 1f 44 00:e8 0f fe 23 ]
    ffffa58c2d0bca7e-ffffa58c2d0bca7f  2 bytes - win32kbase!IsSessionDisabled+62 (+0x1c472)
    [ 48 ff:4c 8b ]
    ffffa58c2d0bca85-ffffa58c2d0bca88  4 bytes - win32kbase!IsSessionDisabled+69 (+0x07)
    [ 0f 1f 44 00:e8 96 39 22 ]
    ffffa58c2d0bcab9-ffffa58c2d0bcaba  2 bytes - win32kbase!IsSessionDisabled+9d (+0x34)
    [ 48 ff:4c 8b ]
    ffffa58c2d0bcac0-ffffa58c2d0bcac3  4 bytes - win32kbase!IsSessionDisabled+a4 (+0x07)
    [ 0f 1f 44 00:e8 5b 39 22 ]
    ffffa58c2d286167-ffffa58c2d286168  2 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+6b
    [ 48 ff:4c 8b ]
    ffffa58c2d28616e-ffffa58c2d286171  4 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+72 (+0x07)
    [ 0f 1f 44 00:e8 ad a2 05 ]
    ffffa58c2d2861dc-ffffa58c2d2861dd  2 bytes - win32kbase!CreateTlgAggregateSession+40 (+0x6e)
    [ 48 ff:4c 8b ]
    ffffa58c2d2861e3-ffffa58c2d2861e6  4 bytes - win32kbase!CreateTlgAggregateSession+47 (+0x07)
    [ 0f 1f 44 00:e8 38 a2 05 ]
    ffffa58c2d286545-ffffa58c2d28654a  6 bytes - win32kbase!tlgEnableCallback+45 (+0x362)
    [ ff 15 6d 8a ff ff:e8 56 9d 05 00 90 ]
    ffffa58c2d2865c8-ffffa58c2d2865c9  2 bytes - win32kbase!WmsgpPostMessage+4c (+0x83)
    [ 48 ff:4c 8b ]
    ffffa58c2d2865cf-ffffa58c2d2865d2  4 bytes - win32kbase!WmsgpPostMessage+53 (+0x07)
    [ 0f 1f 44 00:e8 4c 9e 05 ]
    ffffa58c2d2865e6-ffffa58c2d2865e7  2 bytes - win32kbase!WmsgpPostMessage+6a (+0x17)
    [ 48 ff:4c 8b ]
    ffffa58c2d2865ed-ffffa58c2d2865f0  4 bytes - win32kbase!WmsgpPostMessage+71 (+0x07)
    [ 0f 1f 44 00:e8 2e 9e 05 ]
116 errors : !win32kbase (ffffa58c2d013bf7-ffffa58c2d2865f0)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80312436c6d, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 0000000000000000

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiTimerWaitTest+19d
fffff803`12436c6d f02107          lock and dword ptr [rdi],eax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

DPC_STACK_BASE:  FFFF948D3E668FB0

TRAP_FRAME:  ffff948d3e6616a0 -- (.trap 0xffff948d3e6616a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000ffff7f rbx=0000000000000000 rcx=0000000000000005
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80312436c6d rsp=ffff948d3e661830 rbp=ffff9b05e1c70040
 r8=0000000000000001  r9=0000000000000000 r10=fffff8030f04eac0
r11=00000000ec29d966 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         ov up ei ng nz ac po nc
nt!KiTimerWaitTest+0x19d:
fffff803`12436c6d f02107          lock and dword ptr [rdi],eax ds:00000000`00000000=00000000
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff803125efe29 to fffff803125ddf40

STACK_TEXT: 
ffff948d`3e661558 fffff803`125efe29 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff948d`3e661560 fffff803`125ec129 : 00000000`00000003 00000000`0000630d ffffc381`51189180 fffff803`124cca80 : nt!KiBugCheckDispatch+0x69
ffff948d`3e6616a0 fffff803`12436c6d : ffff9b05`dde9f078 00000000`00000000 ffff9b05`e1c70040 00000000`00000000 : nt!KiPageFault+0x469
ffff948d`3e661830 fffff803`1243685c : ffff9b05`dde9f070 00000000`00000000 ffff948d`3e661b18 00000000`00000000 : nt!KiTimerWaitTest+0x19d
ffff948d`3e6618e0 fffff803`12439d8d : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00003b22 : nt!KiProcessExpiredTimerList+0xdc
ffff948d`3e6619d0 fffff803`125e1aae : ffffffff`00000000 ffffc381`51189180 ffffc381`511941c0 ffff9b05`e2073080 : nt!KiRetireDpcList+0x5dd
ffff948d`3e661c60 00000000`00000000 : ffff948d`3e662000 ffff948d`3e65c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8031258516e-fffff80312585171  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:80 3b 77 ee ]
    fffff803125dfab8-fffff803125dfab9  2 bytes - nt!KiInterruptDispatch+b8 (+0x5a94a)
    [ 48 ff:4c 8b ]
    fffff803125dfabf-fffff803125dfac2  4 bytes - nt!KiInterruptDispatch+bf (+0x07)
    [ 0f 1f 44 00:e8 5c 59 64 ]
10 errors : !nt (fffff8031258516e-fffff803125dfac2)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8053a840bd1, Address of the instruction which caused the bugcheck
Arg3: ffff9180774d5820, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
nt!ExFreeHeapPool+4a1
fffff805`3a840bd1 ff411c          inc     dword ptr [rcx+1Ch]

CONTEXT:  ffff9180774d5820 -- (.cxr 0xffff9180774d5820;r)
rax=fffff8053a600000 rbx=ffffd30bb6010100 rcx=0000000002000ac3
rdx=0000000002000103 rsi=0000000000000000 rdi=ffffd30bc0643040
rip=fffff8053a840bd1 rsp=ffff9180774d6220 rbp=ffff9180774d6450
 r8=0000000000000018  r9=ffff8180dafc0000 r10=0000000000000000
r11=0000000000000fff r12=000000000000000a r13=0000000000000306
r14=0000000000000590 r15=0000000020707249
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!ExFreeHeapPool+0x4a1:
fffff805`3a840bd1 ff411c          inc     dword ptr [rcx+1Ch] ds:002b:00000000`02000adf=????????
Last set context:
rax=fffff8053a600000 rbx=ffffd30bb6010100 rcx=0000000002000ac3
rdx=0000000002000103 rsi=0000000000000000 rdi=ffffd30bc0643040
rip=fffff8053a840bd1 rsp=ffff9180774d6220 rbp=ffff9180774d6450
 r8=0000000000000018  r9=ffff8180dafc0000 r10=0000000000000000
r11=0000000000000fff r12=000000000000000a r13=0000000000000306
r14=0000000000000590 r15=0000000020707249
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!ExFreeHeapPool+0x4a1:
fffff805`3a840bd1 ff411c          inc     dword ptr [rcx+1Ch] ds:002b:00000000`02000adf=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x3B

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  1

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8053afc2019 to fffff8053a840bd1

STACK_TEXT: 
ffff9180`774d6220 fffff805`3afc2019 : ffffd30b`00000700 fffff805`3a83db58 ffffd30b`c0643050 01000000`00100000 : nt!ExFreeHeapPool+0x4a1
ffff9180`774d6300 fffff805`3a848106 : fffff805`3ad12f40 ffffd042`c76baa40 ffffd30b`becb6000 ffffd30b`becb60c8 : nt!ExFreePool+0x9
ffff9180`774d6330 fffff805`3a847fb3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopFreeIrp+0x136
ffff9180`774d6370 fffff805`3ad12f4d : 00000000`00000000 fffff805`3a83d750 ffffd30b`becb5118 ffffd30b`c06430c8 : nt!IoFreeIrp+0x13
ffff9180`774d63a0 fffff805`3a82a335 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd30b`c0643050 : nt!IopUserCompletion+0xd
ffff9180`774d63d0 fffff805`3a8280c7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00030d40 : nt!KiDeliverApc+0x2b5
ffff9180`774d6480 fffff805`3a8272cf : ffffd042`00000005 ffffd042`00000002 ffff9180`774d6670 00000000`00000000 : nt!KiSwapThread+0x827
ffff9180`774d6530 fffff805`3a831e6e : ffffd30b`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffff9180`774d65d0 ffffd042`c765ef08 : 00000000`00000006 ffffd042`c7859240 00000000`00000006 ffffd05f`c067c4c0 : nt!KeWaitForMultipleObjects+0x2be
ffff9180`774d66e0 ffffd042`c7992918 : ffffd05f`c062b8a0 ffffd05f`c062b8a0 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x88
ffff9180`774d6810 ffffd042`c79924e4 : 00000000`00000004 00000000`00000004 00000000`0000000d ffffd042`c785aa10 : win32kfull!xxxDesktopThreadWaiter+0x130
ffff9180`774d6890 ffffd042`c76c7153 : ffffd30b`becb5080 ffffd30b`becb5080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x544
ffff9180`774d6970 ffffd042`c79a1250 : ffffd30b`becb5080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff9180`774d6aa0 ffffd042`c84d474d : ffffd30b`becb5080 ffffd30b`becb5080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff9180`774d6ad0 fffff805`3a9ef878 : ffffd30b`00000005 00000000`00000005 0000017f`17c040d0 00000000`0000039c : win32k!NtUserCallNoParam+0x15
ffff9180`774d6b00 00007ffd`f11c10e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000006`e1b7fb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`f11c10e4


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffd042c7613bf7-ffffd042c7613bfc  6 bytes - win32kbase!DirectComposition::CResourceMarshaler::EmitCreationCommand+57
    [ ff 15 bb b3 26 00:e8 a4 c6 2c 00 90 ]
    ffffd042c7625594-ffffd042c7625595  2 bytes - win32kbase!UserSessionSwitchLeaveCrit+94 (+0x1199d)
    [ 48 ff:4c 8b ]
    ffffd042c762559b-ffffd042c762559e  4 bytes - win32kbase!UserSessionSwitchLeaveCrit+9b (+0x07)
    [ 0f 1f 44 00:e8 80 ae 2b ]
    ffffd042c765eefc-ffffd042c765eefd  2 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+7c (+0x39961)
    [ 48 ff:4c 8b ]
    ffffd042c765ef03-ffffd042c765ef06  4 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+83 (+0x07)
    [ 0f 1f 44 00:e8 18 15 28 ]
    ffffd042c765ef85-ffffd042c765ef86  2 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+105 (+0x82)
    [ 48 ff:4c 8b ]
    ffffd042c765ef8c-ffffd042c765ef8f  4 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+10c (+0x07)
    [ 0f 1f 44 00:e8 8f 14 28 ]
    ffffd042c765ef9b-ffffd042c765ef9c  2 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+11b (+0x0f)
    [ 48 ff:4c 8b ]
    ffffd042c765efa2-ffffd042c765efa5  4 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+122 (+0x07)
    [ 0f 1f 44 00:e8 79 14 28 ]
    ffffd042c765efcf-ffffd042c765efd0  2 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+14f (+0x2d)
    [ 48 ff:4c 8b ]
    ffffd042c765efd6-ffffd042c765efd9  4 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+156 (+0x07)
    [ 0f 1f 44 00:e8 45 14 28 ]
    ffffd042c765efe3-ffffd042c765efe4  2 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+163 (+0x0d)
    [ 48 ff:4c 8b ]
    ffffd042c765efea-ffffd042c765efed  4 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+16a (+0x07)
    [ 0f 1f 44 00:e8 31 14 28 ]
    ffffd042c765effd-ffffd042c765effe  2 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+17d (+0x13)
    [ 48 ff:4c 8b ]
    ffffd042c765f004-ffffd042c765f007  4 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+184 (+0x07)
    [ 0f 1f 44 00:e8 17 14 28 ]
    ffffd042c765fba8-ffffd042c765fba9  2 bytes - win32kbase!RIMDropAndReAcquireSyncLock::~RIMDropAndReAcquireSyncLock+24 (+0xba4)
    [ 48 ff:4c 8b ]
    ffffd042c765fbaf-ffffd042c765fbb2  4 bytes - win32kbase!RIMDropAndReAcquireSyncLock::~RIMDropAndReAcquireSyncLock+2b (+0x07)
    [ 0f 1f 44 00:e8 6c 08 28 ]
    ffffd042c769423e-ffffd042c7694243  6 bytes - win32kbase!CBaseInput::OnDispatcherObjectSignaled+3e (+0x3468f)
    [ ff 15 74 ad 1e 00:e8 5d c0 24 00 90 ]
    ffffd042c76942e9-ffffd042c76942ea  2 bytes - win32kbase!CBaseInput::OnDispatcherObjectSignaled+e9 (+0xab)
    [ 48 ff:4c 8b ]
    ffffd042c76942f0-ffffd042c76942f1  2 bytes - win32kbase!CBaseInput::OnDispatcherObjectSignaled+f0 (+0x07)
    [ 0f 1f:e8 2b ]
    ffffd042c76a05a4-ffffd042c76a05a5  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+2c (+0xc2b4)
    [ 48 ff:4c 8b ]
    ffffd042c76a05ab-ffffd042c76a05ae  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+33 (+0x07)
    [ 0f 1f 44 00:e8 70 fe 23 ]
    ffffd042c76a05b5-ffffd042c76a05b6  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+3d (+0x0a)
    [ 48 ff:4c 8b ]
    ffffd042c76a05bc-ffffd042c76a05bf  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+44 (+0x07)
    [ 0f 1f 44 00:e8 5f fe 23 ]
    ffffd042c76a05f9-ffffd042c76a05fa  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+81 (+0x3d)
    [ 48 ff:4c 8b ]
    ffffd042c76a0600-ffffd042c76a0603  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+88 (+0x07)
    [ 0f 1f 44 00:e8 1b fe 23 ]
    ffffd042c76a0605-ffffd042c76a0606  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+8d (+0x05)
    [ 48 ff:4c 8b ]
    ffffd042c76a060c-ffffd042c76a060f  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+94 (+0x07)
    [ 0f 1f 44 00:e8 0f fe 23 ]
    ffffd042c76ac34d-ffffd042c76ac34e  2 bytes - win32kbase!CMouseProcessor::CMouseProcessor+21 (+0xbd41)
    [ 48 ff:4c 8b ]
    ffffd042c76bab31-ffffd042c76bab32  2 bytes - win32kbase!rimInputApc+f1 (+0xe7e4)
    [ 48 ff:4c 8b ]
    ffffd042c76bab38-ffffd042c76bab3b  4 bytes - win32kbase!rimInputApc+f8 (+0x07)
    [ 0f 1f 44 00:e8 e3 58 22 ]
    ffffd042c76c1c20-ffffd042c76c1c21  2 bytes - win32kbase!CInputConfig::Iter::Entry+10 (+0x70e8)
    [ 48 ff:4c 8b ]
    ffffd042c76c1c27-ffffd042c76c1c2a  4 bytes - win32kbase!CInputConfig::Iter::Entry+17 (+0x07)
    [ 0f 1f 44 00:e8 f4 e7 21 ]
    ffffd042c76c2e0b-ffffd042c76c2e10  6 bytes - win32kbase!DrvDxgkWriteDiagEntry+b (+0x11e4)
    [ ff 15 a7 c1 1b 00:e8 90 d4 21 00 90 ]
    ffffd042c76c7153-ffffd042c76c7155  3 bytes - win32kbase!xxxCreateSystemThreads+c3 (+0x4348)
    [ 00 48 ff:90 4c 8b ]
    ffffd042c76c715b-ffffd042c76c715e  4 bytes - win32kbase!xxxCreateSystemThreads+cb (+0x08)
    [ 0f 1f 44 00:e8 c0 92 21 ]
    ffffd042c76c716a-ffffd042c76c716b  2 bytes - win32kbase!xxxCreateSystemThreads+da (+0x0f)
    [ 48 ff:4c 8b ]
    ffffd042c76c7171-ffffd042c76c7174  4 bytes - win32kbase!xxxCreateSystemThreads+e1 (+0x07)
    [ 0f 1f 44 00:e8 aa 92 21 ]
    ffffd042c76c71b0-ffffd042c76c71b1  2 bytes - win32kbase!xxxCreateSystemThreads+120 (+0x3f)
    [ 48 ff:4c 8b ]
    ffffd042c76c71b7-ffffd042c76c71ba  4 bytes - win32kbase!xxxCreateSystemThreads+127 (+0x07)
    [ 0f 1f 44 00:e8 64 92 21 ]
    ffffd042c76c71c4-ffffd042c76c71c5  2 bytes - win32kbase!xxxCreateSystemThreads+134 (+0x0d)
    [ 48 ff:4c 8b ]
    ffffd042c76c71cb-ffffd042c76c71ce  4 bytes - win32kbase!xxxCreateSystemThreads+13b (+0x07)
    [ 0f 1f 44 00:e8 50 92 21 ]
    ffffd042c76c71de-ffffd042c76c71df  2 bytes - win32kbase!xxxCreateSystemThreads+14e (+0x13)
    [ 48 ff:4c 8b ]
    ffffd042c76c71e5-ffffd042c76c71e8  4 bytes - win32kbase!xxxCreateSystemThreads+155 (+0x07)
    [ 0f 1f 44 00:e8 36 92 21 ]
    ffffd042c76c7224-ffffd042c76c7225  2 bytes - win32kbase!xxxCreateSystemThreads+194 (+0x3f)
    [ 48 ff:4c 8b ]
    ffffd042c76c722b-ffffd042c76c722e  4 bytes - win32kbase!xxxCreateSystemThreads+19b (+0x07)
    [ 0f 1f 44 00:e8 f0 91 21 ]
    ffffd042c76c7250-ffffd042c76c7251  2 bytes - win32kbase!xxxCreateSystemThreads+1c0 (+0x25)
    [ 48 ff:4c 8b ]
    ffffd042c76d47f0-ffffd042c76d47f2  3 bytes - win32kbase!purecall (+0xd5a0)
    [ 48 ff 25:4c 8b 15 ]
    ffffd042c76d47f7-ffffd042c76d47fb  5 bytes - win32kbase!purecall+7 (+0x07)
    [ cc cc cc cc cc:e9 24 bc 20 00 ]
    ffffd042c76d4896-ffffd042c76d4898  3 bytes - win32kbase!RtlUpcaseUnicodeToMultiByteN (+0x9f)
    [ 48 ff 25:4c 8b 15 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
    ffffd042c7886167-ffffd042c7886168  2 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+6b
    [ 48 ff:4c 8b ]
    ffffd042c788616e-ffffd042c7886171  4 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+72 (+0x07)
    [ 0f 1f 44 00:e8 ad a2 05 ]
    ffffd042c78861dc-ffffd042c78861dd  2 bytes - win32kbase!CreateTlgAggregateSession+40 (+0x6e)
    [ 48 ff:4c 8b ]
    ffffd042c78861e3-ffffd042c78861e6  4 bytes - win32kbase!CreateTlgAggregateSession+47 (+0x07)
    [ 0f 1f 44 00:e8 38 a2 05 ]
    ffffd042c7886545-ffffd042c788654a  6 bytes - win32kbase!tlgEnableCallback+45 (+0x362)
    [ ff 15 6d 8a ff ff:e8 56 9d 05 00 90 ]
    ffffd042c78865c8-ffffd042c78865c9  2 bytes - win32kbase!WmsgpPostMessage+4c (+0x83)
    [ 48 ff:4c 8b ]
    ffffd042c78865cf-ffffd042c78865d2  4 bytes - win32kbase!WmsgpPostMessage+53 (+0x07)
    [ 0f 1f 44 00:e8 4c 9e 05 ]
    ffffd042c78865e6-ffffd042c78865e7  2 bytes - win32kbase!WmsgpPostMessage+6a (+0x17)
    [ 48 ff:4c 8b ]
    ffffd042c78865ed-ffffd042c78865f0  4 bytes - win32kbase!WmsgpPostMessage+71 (+0x07)
    [ 0f 1f 44 00:e8 2e 9e 05 ]
207 errors : !win32kbase (ffffd042c7613bf7-ffffd042c78865f0)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffff9180774d5820 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff00b6af5a7e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff00b6af5a738, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


TRAP_FRAME:  fffff00b6af5a7e0 -- (.trap 0xfffff00b6af5a7e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff858a1f2affe8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80217c0c643 rsp=fffff00b6af5a970 rbp=fffff00b6af5aa01
 r8=0000000000000000  r9=00000000647741b2 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KeWaitForSingleObject+0x1e5d03:
fffff802`17c0c643 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff00b6af5a738 -- (.exr 0xfffff00b6af5a738)
ExceptionAddress: fffff80217c0c643 (nt!KeWaitForSingleObject+0x00000000001e5d03)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x139

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

EXCEPTION_STR:  0x0

LAST_CONTROL_TRANSFER:  from fffff80217befe29 to fffff80217bddf40

STACK_TEXT: 
fffff00b`6af5a4b8 fffff802`17befe29 : 00000000`00000139 00000000`00000003 fffff00b`6af5a7e0 fffff00b`6af5a738 : nt!KeBugCheckEx
fffff00b`6af5a4c0 fffff802`17bf0250 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff00b`6af5a600 fffff802`17bee5e3 : ffffc200`13b5c100 ffff4488`9040c3cd 00000000`00000001 ffff858a`1c944180 : nt!KiFastFailDispatch+0xd0
fffff00b`6af5a7e0 fffff802`17c0c643 : ffff858a`0000002b fffff802`17df95b1 00000000`00040201 ffff858a`1c9441c0 : nt!KiRaiseSecurityCheckFailure+0x323
fffff00b`6af5a970 fffff802`17dfb6b1 : ffff858a`1f2affe0 00000000`00000006 00000000`00000001 ffff858a`1f2bac00 : nt!KeWaitForSingleObject+0x1e5d03
fffff00b`6af5aa60 fffff802`17dfb75a : ffff858a`1c944080 0000008e`6f5fe998 00000000`00000000 00000204`e6e70f90 : nt!ObWaitForSingleObject+0x91
fffff00b`6af5aac0 fffff802`17bef878 : ffff858a`1c944080 00000000`1677e000 fffff00b`6af5ab18 ffffffff`ff9927e0 : nt!NtWaitForSingleObject+0x6a
fffff00b`6af5ab00 00007ff8`48d6be44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008e`6f5fe968 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`48d6be44


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff8021364cd05-fffff8021364cd06  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
    [ 48 ff:4c 8b ]
    fffff8021364cd0c-fffff8021364cd10  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
    [ 0f 1f 44 00 00:e8 cf 50 4c 04 ]
    fffff8021364cd1a-fffff8021364cd1b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
    [ 48 ff:4c 8b ]
    fffff8021364cd21-fffff8021364cd25  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
    [ 0f 1f 44 00 00:e8 fa 63 3d 04 ]
    fffff8021364cd6a-fffff8021364cd6b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
    [ 48 ff:4c 8b ]
    fffff8021364cd71-fffff8021364cd77  7 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
    [ 0f 1f 44 00 00 48 ff:e8 fa 5b 3d 04 4c 8b ]
    fffff8021364cd7d-fffff8021364cd81  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x0c)
    [ 0f 1f 44 00 00:e8 0e e1 4a 04 ]
28 errors : !FLTMGR (fffff8021364cd05-fffff8021364cd81)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
Unknown bugcheck code (197)
Unknown bugcheck description
Arguments:
Arg1: 0000000000000001
Arg2: fffff434042137e0
Arg3: fffff43400c00000
Arg4: 0000000000000001

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'bindflt' and 'dump_storpor' overlap

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x197

PROCESS_NAME:  Taskmgr.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff4068e4db11e to fffff80557fddf40

STACK_TEXT: 
fffffd02`95cde5a8 fffff406`8e4db11e : 00000000`00000197 00000000`00000001 fffff434`042137e0 fffff434`00c00000 : nt!KeBugCheckEx
fffffd02`95cde5b0 fffff406`8e3ef291 : fffff434`042137e0 00000000`00000000 00000000`00000000 00000000`01090440 : win32kfull!xxxSendTransformableMessageTimeout+0xe149e
fffffd02`95cde700 fffff406`8e3eedd2 : fffff434`042137e0 fffffd02`95cdf300 fffffd02`95cdf300 fffff434`042137e0 : win32kfull!xxxDCEWindowHitTest2Internal+0x3b1
fffffd02`95cde7f0 fffff406`8e3ef12f : 00000109`00000440 00000109`00000440 fffffd02`95cdf300 00000109`00000440 : win32kfull!xxxDCEWindowHitTestIndirect+0x182
fffffd02`95cde870 fffff406`8e3eedd2 : fffff434`04212690 fffffd02`95cdf300 fffff406`8d083c00 fffff434`04213690 : win32kfull!xxxDCEWindowHitTest2Internal+0x24f
fffffd02`95cde960 fffff406`8e3ef12f : 00000109`00000440 00000109`00000440 fffffd02`95cdf300 fffff805`57f93df7 : win32kfull!xxxDCEWindowHitTestIndirect+0x182
fffffd02`95cde9e0 fffff406`8e3eedd2 : fffff434`04211e70 fffffd02`95cdf300 fffff406`8d083c00 fffff434`04211e70 : win32kfull!xxxDCEWindowHitTest2Internal+0x24f
fffffd02`95cdead0 fffff406`8e3ef12f : 00000109`00000440 00000109`00000440 fffffd02`95cdf300 00000000`00000000 : win32kfull!xxxDCEWindowHitTestIndirect+0x182
fffffd02`95cdeb50 fffff406`8e3eedd2 : fffff434`04211d20 fffffd02`95cdf300 fffff406`8d083c00 fffff434`04211d20 : win32kfull!xxxDCEWindowHitTest2Internal+0x24f
fffffd02`95cdec40 fffff406`8e3ef12f : 00000109`00000440 00000109`00000440 fffffd02`95cdf300 ffffcb01`00006011 : win32kfull!xxxDCEWindowHitTestIndirect+0x182
fffffd02`95cdecc0 fffff406`8e3eedd2 : fffff434`00839000 fffffd02`95cdf300 fffffd02`00000000 fffff434`00831930 : win32kfull!xxxDCEWindowHitTest2Internal+0x24f
fffffd02`95cdedb0 fffff406`8e3ef12f : 00000109`00000440 00000109`00000440 fffffd02`95cdf300 fffff406`8e374469 : win32kfull!xxxDCEWindowHitTestIndirect+0x182
fffffd02`95cdee30 fffff406`8e3eedd2 : fffff434`00830930 fffffd02`95cdf300 ffff8781`c7389180 fffff434`00830930 : win32kfull!xxxDCEWindowHitTest2Internal+0x24f
fffffd02`95cdef20 fffff406`8e3f30c3 : 00000109`00000440 00000109`00000440 fffff434`05fe59d0 00000000`00000000 : win32kfull!xxxDCEWindowHitTestIndirect+0x182
fffffd02`95cdefa0 fffff406`8e3f6f56 : fffff434`05ff5950 fffffd02`95cdfd38 00000000`00000000 00000000`00000000 : win32kfull!xxxScanSysQueue+0xfb3
fffffd02`95cdf850 fffff406`8e42ad0e : fffffd02`95cdfd38 00000000`00000000 00000000`00000000 00000045`0027f9c8 : win32kfull!xxxRealInternalGetMessage+0xee6
fffffd02`95cdfcf0 fffff406`8d3b7435 : ffffcb01`e76f8080 00000045`0027f888 fffffd02`95cdfde8 00000045`0027f8c0 : win32kfull!NtUserRealInternalGetMessage+0x7e
fffffd02`95cdfd80 fffff805`57fef878 : 00000000`00000000 00000000`00000003 00000000`ffffffff 00000000`00000000 : win32k!NtUserRealInternalGetMessage+0x29
fffffd02`95cdfdd0 00007ffc`a36e2be4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000045`0027f868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`a36e2be4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    fffff4068d038141-fffff4068d038142  2 bytes - win32kbase!EnterCrit+231
    [ 48 ff:4c 8b ]
    fffff4068d038148-fffff4068d03814b  4 bytes - win32kbase!EnterCrit+238 (+0x07)
    [ 0f 1f 44 00:e8 d3 82 2a ]
    fffff4068d038150-fffff4068d038151  2 bytes - win32kbase!EnterCrit+240 (+0x08)
    [ 48 ff:4c 8b ]
    fffff4068d038157-fffff4068d03815a  4 bytes - win32kbase!EnterCrit+247 (+0x07)
    [ 0f 1f 44 00:e8 c4 82 2a ]
    fffff4068d03815e-fffff4068d03815f  2 bytes - win32kbase!EnterCrit+24e (+0x07)
    [ 48 ff:4c 8b ]
    fffff4068d038165-fffff4068d038168  4 bytes - win32kbase!EnterCrit+255 (+0x07)
    [ 0f 1f 44 00:e8 b6 82 2a ]
    fffff4068d03816d-fffff4068d03816e  2 bytes - win32kbase!EnterCrit+25d (+0x08)
    [ 48 ff:4c 8b ]
    fffff4068d038174-fffff4068d038177  4 bytes - win32kbase!EnterCrit+264 (+0x07)
    [ 0f 1f 44 00:e8 a7 82 2a ]
    fffff4068d0381b3-fffff4068d0381b4  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+23 (+0x3f)
    [ 48 ff:4c 8b ]
    fffff4068d0381ba-fffff4068d0381bd  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+2a (+0x07)
    [ 0f 1f 44 00:e8 61 82 2a ]
    fffff4068d0381fd-fffff4068d0381fe  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+6d (+0x43)
    [ 48 ff:4c 8b ]
    fffff4068d038204-fffff4068d038207  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+74 (+0x07)
    [ 0f 1f 44 00:e8 17 82 2a ]
    fffff4068d038524-fffff4068d038525  2 bytes - win32kbase!IsThreadCrossSessionAttached+4 (+0x320)
    [ 48 ff:4c 8b ]
    fffff4068d083c92-fffff4068d083c93  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<28672,112>::Free+32 (+0x4b76e)
    [ 48 ff:4c 8b ]
    fffff4068d083c99-fffff4068d083c9c  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<28672,112>::Free+39 (+0x07)
    [ 0f 1f 44 00:e8 82 c7 25 ]
    fffff4068d083ca3-fffff4068d083ca4  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<28672,112>::Free+43 (+0x0a)
    [ 48 ff:4c 8b ]
    fffff4068d083caa-fffff4068d083cad  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<28672,112>::Free+4a (+0x07)
    [ 0f 1f 44 00:e8 71 c7 25 ]
    fffff4068d08e2bc-fffff4068d08e2bd  2 bytes - win32kbase!EtwTraceQueueMessage+7c (+0xa612)
    [ 48 ff:4c 8b ]
    fffff4068d08e2c3-fffff4068d08e2c6  4 bytes - win32kbase!EtwTraceQueueMessage+83 (+0x07)
    [ 0f 1f 44 00:e8 58 21 25 ]
    fffff4068d08e2d6-fffff4068d08e2d7  2 bytes - win32kbase!EtwTraceQueueMessage+96 (+0x13)
    [ 48 ff:4c 8b ]
    fffff4068d08e2dd-fffff4068d08e2e0  4 bytes - win32kbase!EtwTraceQueueMessage+9d (+0x07)
    [ 0f 1f 44 00:e8 3e 21 25 ]
    fffff4068d08e2f4-fffff4068d08e2f5  2 bytes - win32kbase!EtwTraceQueueMessage+b4 (+0x17)
    [ 48 ff:4c 8b ]
    fffff4068d08e2fb-fffff4068d08e2fe  4 bytes - win32kbase!EtwTraceQueueMessage+bb (+0x07)
    [ 0f 1f 44 00:e8 20 21 25 ]
    fffff4068d286167-fffff4068d286168  2 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+6b
    [ 48 ff:4c 8b ]
    fffff4068d28616e-fffff4068d286171  4 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+72 (+0x07)
    [ 0f 1f 44 00:e8 ad a2 05 ]
    fffff4068d2861dc-fffff4068d2861dd  2 bytes - win32kbase!CreateTlgAggregateSession+40 (+0x6e)
    [ 48 ff:4c 8b ]
    fffff4068d2861e3-fffff4068d2861e6  4 bytes - win32kbase!CreateTlgAggregateSession+47 (+0x07)
    [ 0f 1f 44 00:e8 38 a2 05 ]
    fffff4068d286545-fffff4068d28654a  6 bytes - win32kbase!tlgEnableCallback+45 (+0x362)
    [ ff 15 6d 8a ff ff:e8 56 9d 05 00 90 ]
    fffff4068d2865c8-fffff4068d2865c9  2 bytes - win32kbase!WmsgpPostMessage+4c (+0x83)
    [ 48 ff:4c 8b ]
    fffff4068d2865cf-fffff4068d2865d2  4 bytes - win32kbase!WmsgpPostMessage+53 (+0x07)
    [ 0f 1f 44 00:e8 4c 9e 05 ]
    fffff4068d2865e6-fffff4068d2865e7  2 bytes - win32kbase!WmsgpPostMessage+6a (+0x17)
    [ 48 ff:4c 8b ]
    fffff4068d2865ed-fffff4068d2865f0  4 bytes - win32kbase!WmsgpPostMessage+71 (+0x07)
    [ 0f 1f 44 00:e8 2e 9e 05 ]
98 errors : !win32kbase (fffff4068d038141-fffff4068d2865f0)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
 
Bellekleri tek tek dener misiniz? Hangi slotlara takılı?
Health sekmesinin boş olduğunu bilmiyordum. CrystalDiskInfo ile paylaşın birde. Genel olarak bellek hatası var değiştirin.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80511e3185f, address which referenced memory

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'srvnet' and 'dump_storpor' overlap

WRITE_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000000000000000

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiAcquireKobjectLockSafe+f
fffff805`11e3185f f00fba2907      lock bts dword ptr [rcx],7

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  HDTunePro.exe

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  fffffd0de1230110 -- (.trap 0xfffffd0de1230110)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80511e3185f rsp=fffffd0de12302a0 rbp=ffffb98020189180
r8=0000000000000002  r9=0000000000000000 r10=0000fffff8051200
r11=fffffd0de1230318 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiAcquireKobjectLockSafe+0xf:
fffff805`11e3185f f00fba2907      lock bts dword ptr [rcx],7 ds:00000000`00000000=00000000
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80511fefe29 to fffff80511fddf40

STACK_TEXT:
fffffd0d`e122ffc8 fffff805`11fefe29 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffffd0d`e122ffd0 fffff805`11fec129 : fffffd0d`e12308d0 fffffd0d`e12306ec 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffd0d`e1230110 fffff805`11e3185f : 00000000`00003dff ffffe689`ff6710c0 00000000`00000002 fffffd0d`e12305a8 : nt!KiPageFault+0x469
fffffd0d`e12302a0 fffff805`11e3b29a : 00000000`00000000 fffff805`00000002 ffffe689`f6ec2d20 ffffe689`00000000 : nt!KiAcquireKobjectLockSafe+0xf
fffffd0d`e12302d0 fffff805`1220c5a2 : 00000000`00000000 00000000`00000000 ffffe68a`02413d30 00000000`00000000 : nt!IoSetIoCompletionEx+0x9a
fffffd0d`e1230320 fffff805`11fef878 : fffffd0d`e12305a8 ffffe689`ff6710c0 fffffd0d`e1230470 fffffd0d`e1230398 : nt!NtSetIoCompletionEx+0xf2
fffffd0d`e1230380 fffff805`11fe1da0 : ffffa58c`2d3a6454 ffffa5bf`4425f010 fffffd0d`e1230b80 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
fffffd0d`e1230588 ffffa58c`2d3a6454 : ffffa5bf`4425f010 fffffd0d`e1230b80 00000000`00000000 fffffd0d`e12305a0 : nt!KiServiceLinkage
fffffd0d`e1230590 ffffa58c`2d3a5e32 : fffffd0d`e1230a78 00000000`0009e500 00000000`00000000 00000000`00000000 : win32kfull!xxxRealInternalGetMessage+0x3e4
fffffd0d`e1230a30 ffffa58c`2dcf6275 : ffffe689`ff6710c0 00007ffa`4a7f3970 00000000`00000020 00000000`0036f000 : win32kfull!NtUserGetMessage+0x92
fffffd0d`e1230ac0 fffff805`11fef878 : 00000000`00000216 fffffd0d`e1230b80 00000000`00000000 ffffa58c`2dcf6c88 : win32k!NtUserGetMessage+0x15
fffffd0d`e1230b00 00007ffa`4a800004 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0009e5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4a800004


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffa58c2d013bf7-ffffa58c2d013bfc  6 bytes - win32kbase!DirectComposition::CResourceMarshaler::EmitCreationCommand+57
    [ ff 15 bb b3 26 00:e8 a4 c6 2c 00 90 ]
    ffffa58c2d013f7c-ffffa58c2d013f7d  2 bytes - win32kbase!DirectComposition::CCompositionSurfaceBitmapMarshaler::EmitUpdateCommands+3c (+0x385)
    [ 48 ff:4c 8b ]
    ffffa58c2d013f83-ffffa58c2d013f86  4 bytes - win32kbase!DirectComposition::CCompositionSurfaceBitmapMarshaler::EmitUpdateCommands+43 (+0x07)
    [ 0f 1f 44 00:e8 98 c4 2c ]
    ffffa58c2d038141-ffffa58c2d038142  2 bytes - win32kbase!EnterCrit+231 (+0x241be)
    [ 48 ff:4c 8b ]
    ffffa58c2d038148-ffffa58c2d03814b  4 bytes - win32kbase!EnterCrit+238 (+0x07)
    [ 0f 1f 44 00:e8 d3 82 2a ]
    ffffa58c2d038150-ffffa58c2d038151  2 bytes - win32kbase!EnterCrit+240 (+0x08)
    [ 48 ff:4c 8b ]
    ffffa58c2d038157-ffffa58c2d03815a  4 bytes - win32kbase!EnterCrit+247 (+0x07)
    [ 0f 1f 44 00:e8 c4 82 2a ]
    ffffa58c2d03815e-ffffa58c2d03815f  2 bytes - win32kbase!EnterCrit+24e (+0x07)
    [ 48 ff:4c 8b ]
    ffffa58c2d038165-ffffa58c2d038168  4 bytes - win32kbase!EnterCrit+255 (+0x07)
    [ 0f 1f 44 00:e8 b6 82 2a ]
    ffffa58c2d03816d-ffffa58c2d03816e  2 bytes - win32kbase!EnterCrit+25d (+0x08)
    [ 48 ff:4c 8b ]
    ffffa58c2d038174-ffffa58c2d038177  4 bytes - win32kbase!EnterCrit+264 (+0x07)
    [ 0f 1f 44 00:e8 a7 82 2a ]
    ffffa58c2d0381b3-ffffa58c2d0381b4  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+23 (+0x3f)
    [ 48 ff:4c 8b ]
    ffffa58c2d0381ba-ffffa58c2d0381bd  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+2a (+0x07)
    [ 0f 1f 44 00:e8 61 82 2a ]
    ffffa58c2d0381fd-ffffa58c2d0381fe  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+6d (+0x43)
    [ 48 ff:4c 8b ]
    ffffa58c2d038204-ffffa58c2d038207  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+74 (+0x07)
    [ 0f 1f 44 00:e8 17 82 2a ]
    ffffa58c2d038524-ffffa58c2d038525  2 bytes - win32kbase!IsThreadCrossSessionAttached+4 (+0x320)
    [ 48 ff:4c 8b ]
    ffffa58c2d0a05a4-ffffa58c2d0a05a5  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+2c (+0x68080)
    [ 48 ff:4c 8b ]
    ffffa58c2d0a05ab-ffffa58c2d0a05ae  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+33 (+0x07)
    [ 0f 1f 44 00:e8 70 fe 23 ]
    ffffa58c2d0a05b5-ffffa58c2d0a05b6  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+3d (+0x0a)
    [ 48 ff:4c 8b ]
    ffffa58c2d0a05bc-ffffa58c2d0a05bf  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+44 (+0x07)
    [ 0f 1f 44 00:e8 5f fe 23 ]
    ffffa58c2d0a05f9-ffffa58c2d0a05fa  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+81 (+0x3d)
    [ 48 ff:4c 8b ]
    ffffa58c2d0a0600-ffffa58c2d0a0603  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+88 (+0x07)
    [ 0f 1f 44 00:e8 1b fe 23 ]
    ffffa58c2d0a0605-ffffa58c2d0a0606  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+8d (+0x05)
    [ 48 ff:4c 8b ]
    ffffa58c2d0a060c-ffffa58c2d0a060f  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+94 (+0x07)
    [ 0f 1f 44 00:e8 0f fe 23 ]
    ffffa58c2d0bca7e-ffffa58c2d0bca7f  2 bytes - win32kbase!IsSessionDisabled+62 (+0x1c472)
    [ 48 ff:4c 8b ]
    ffffa58c2d0bca85-ffffa58c2d0bca88  4 bytes - win32kbase!IsSessionDisabled+69 (+0x07)
    [ 0f 1f 44 00:e8 96 39 22 ]
    ffffa58c2d0bcab9-ffffa58c2d0bcaba  2 bytes - win32kbase!IsSessionDisabled+9d (+0x34)
    [ 48 ff:4c 8b ]
    ffffa58c2d0bcac0-ffffa58c2d0bcac3  4 bytes - win32kbase!IsSessionDisabled+a4 (+0x07)
    [ 0f 1f 44 00:e8 5b 39 22 ]
    ffffa58c2d286167-ffffa58c2d286168  2 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+6b
    [ 48 ff:4c 8b ]
    ffffa58c2d28616e-ffffa58c2d286171  4 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+72 (+0x07)
    [ 0f 1f 44 00:e8 ad a2 05 ]
    ffffa58c2d2861dc-ffffa58c2d2861dd  2 bytes - win32kbase!CreateTlgAggregateSession+40 (+0x6e)
    [ 48 ff:4c 8b ]
    ffffa58c2d2861e3-ffffa58c2d2861e6  4 bytes - win32kbase!CreateTlgAggregateSession+47 (+0x07)
    [ 0f 1f 44 00:e8 38 a2 05 ]
    ffffa58c2d286545-ffffa58c2d28654a  6 bytes - win32kbase!tlgEnableCallback+45 (+0x362)
    [ ff 15 6d 8a ff ff:e8 56 9d 05 00 90 ]
    ffffa58c2d2865c8-ffffa58c2d2865c9  2 bytes - win32kbase!WmsgpPostMessage+4c (+0x83)
    [ 48 ff:4c 8b ]
    ffffa58c2d2865cf-ffffa58c2d2865d2  4 bytes - win32kbase!WmsgpPostMessage+53 (+0x07)
    [ 0f 1f 44 00:e8 4c 9e 05 ]
    ffffa58c2d2865e6-ffffa58c2d2865e7  2 bytes - win32kbase!WmsgpPostMessage+6a (+0x17)
    [ 48 ff:4c 8b ]
    ffffa58c2d2865ed-ffffa58c2d2865f0  4 bytes - win32kbase!WmsgpPostMessage+71 (+0x07)
    [ 0f 1f 44 00:e8 2e 9e 05 ]
116 errors : !win32kbase (ffffa58c2d013bf7-ffffa58c2d2865f0)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80312436c6d, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000000000000000

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiTimerWaitTest+19d
fffff803`12436c6d f02107          lock and dword ptr [rdi],eax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

DPC_STACK_BASE:  FFFF948D3E668FB0

TRAP_FRAME:  ffff948d3e6616a0 -- (.trap 0xffff948d3e6616a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000ffff7f rbx=0000000000000000 rcx=0000000000000005
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80312436c6d rsp=ffff948d3e661830 rbp=ffff9b05e1c70040
r8=0000000000000001  r9=0000000000000000 r10=fffff8030f04eac0
r11=00000000ec29d966 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         ov up ei ng nz ac po nc
nt!KiTimerWaitTest+0x19d:
fffff803`12436c6d f02107          lock and dword ptr [rdi],eax ds:00000000`00000000=00000000
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff803125efe29 to fffff803125ddf40

STACK_TEXT:
ffff948d`3e661558 fffff803`125efe29 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff948d`3e661560 fffff803`125ec129 : 00000000`00000003 00000000`0000630d ffffc381`51189180 fffff803`124cca80 : nt!KiBugCheckDispatch+0x69
ffff948d`3e6616a0 fffff803`12436c6d : ffff9b05`dde9f078 00000000`00000000 ffff9b05`e1c70040 00000000`00000000 : nt!KiPageFault+0x469
ffff948d`3e661830 fffff803`1243685c : ffff9b05`dde9f070 00000000`00000000 ffff948d`3e661b18 00000000`00000000 : nt!KiTimerWaitTest+0x19d
ffff948d`3e6618e0 fffff803`12439d8d : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00003b22 : nt!KiProcessExpiredTimerList+0xdc
ffff948d`3e6619d0 fffff803`125e1aae : ffffffff`00000000 ffffc381`51189180 ffffc381`511941c0 ffff9b05`e2073080 : nt!KiRetireDpcList+0x5dd
ffff948d`3e661c60 00000000`00000000 : ffff948d`3e662000 ffff948d`3e65c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8031258516e-fffff80312585171  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:80 3b 77 ee ]
    fffff803125dfab8-fffff803125dfab9  2 bytes - nt!KiInterruptDispatch+b8 (+0x5a94a)
    [ 48 ff:4c 8b ]
    fffff803125dfabf-fffff803125dfac2  4 bytes - nt!KiInterruptDispatch+bf (+0x07)
    [ 0f 1f 44 00:e8 5c 59 64 ]
10 errors : !nt (fffff8031258516e-fffff803125dfac2)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8053a840bd1, Address of the instruction which caused the bugcheck
Arg3: ffff9180774d5820, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
nt!ExFreeHeapPool+4a1
fffff805`3a840bd1 ff411c          inc     dword ptr [rcx+1Ch]

CONTEXT:  ffff9180774d5820 -- (.cxr 0xffff9180774d5820;r)
rax=fffff8053a600000 rbx=ffffd30bb6010100 rcx=0000000002000ac3
rdx=0000000002000103 rsi=0000000000000000 rdi=ffffd30bc0643040
rip=fffff8053a840bd1 rsp=ffff9180774d6220 rbp=ffff9180774d6450
r8=0000000000000018  r9=ffff8180dafc0000 r10=0000000000000000
r11=0000000000000fff r12=000000000000000a r13=0000000000000306
r14=0000000000000590 r15=0000000020707249
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!ExFreeHeapPool+0x4a1:
fffff805`3a840bd1 ff411c          inc     dword ptr [rcx+1Ch] ds:002b:00000000`02000adf=????????
Last set context:
rax=fffff8053a600000 rbx=ffffd30bb6010100 rcx=0000000002000ac3
rdx=0000000002000103 rsi=0000000000000000 rdi=ffffd30bc0643040
rip=fffff8053a840bd1 rsp=ffff9180774d6220 rbp=ffff9180774d6450
r8=0000000000000018  r9=ffff8180dafc0000 r10=0000000000000000
r11=0000000000000fff r12=000000000000000a r13=0000000000000306
r14=0000000000000590 r15=0000000020707249
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!ExFreeHeapPool+0x4a1:
fffff805`3a840bd1 ff411c          inc     dword ptr [rcx+1Ch] ds:002b:00000000`02000adf=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x3B

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  1

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8053afc2019 to fffff8053a840bd1

STACK_TEXT:
ffff9180`774d6220 fffff805`3afc2019 : ffffd30b`00000700 fffff805`3a83db58 ffffd30b`c0643050 01000000`00100000 : nt!ExFreeHeapPool+0x4a1
ffff9180`774d6300 fffff805`3a848106 : fffff805`3ad12f40 ffffd042`c76baa40 ffffd30b`becb6000 ffffd30b`becb60c8 : nt!ExFreePool+0x9
ffff9180`774d6330 fffff805`3a847fb3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopFreeIrp+0x136
ffff9180`774d6370 fffff805`3ad12f4d : 00000000`00000000 fffff805`3a83d750 ffffd30b`becb5118 ffffd30b`c06430c8 : nt!IoFreeIrp+0x13
ffff9180`774d63a0 fffff805`3a82a335 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd30b`c0643050 : nt!IopUserCompletion+0xd
ffff9180`774d63d0 fffff805`3a8280c7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00030d40 : nt!KiDeliverApc+0x2b5
ffff9180`774d6480 fffff805`3a8272cf : ffffd042`00000005 ffffd042`00000002 ffff9180`774d6670 00000000`00000000 : nt!KiSwapThread+0x827
ffff9180`774d6530 fffff805`3a831e6e : ffffd30b`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffff9180`774d65d0 ffffd042`c765ef08 : 00000000`00000006 ffffd042`c7859240 00000000`00000006 ffffd05f`c067c4c0 : nt!KeWaitForMultipleObjects+0x2be
ffff9180`774d66e0 ffffd042`c7992918 : ffffd05f`c062b8a0 ffffd05f`c062b8a0 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x88
ffff9180`774d6810 ffffd042`c79924e4 : 00000000`00000004 00000000`00000004 00000000`0000000d ffffd042`c785aa10 : win32kfull!xxxDesktopThreadWaiter+0x130
ffff9180`774d6890 ffffd042`c76c7153 : ffffd30b`becb5080 ffffd30b`becb5080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x544
ffff9180`774d6970 ffffd042`c79a1250 : ffffd30b`becb5080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff9180`774d6aa0 ffffd042`c84d474d : ffffd30b`becb5080 ffffd30b`becb5080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff9180`774d6ad0 fffff805`3a9ef878 : ffffd30b`00000005 00000000`00000005 0000017f`17c040d0 00000000`0000039c : win32k!NtUserCallNoParam+0x15
ffff9180`774d6b00 00007ffd`f11c10e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000006`e1b7fb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`f11c10e4


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffd042c7613bf7-ffffd042c7613bfc  6 bytes - win32kbase!DirectComposition::CResourceMarshaler::EmitCreationCommand+57
    [ ff 15 bb b3 26 00:e8 a4 c6 2c 00 90 ]
    ffffd042c7625594-ffffd042c7625595  2 bytes - win32kbase!UserSessionSwitchLeaveCrit+94 (+0x1199d)
    [ 48 ff:4c 8b ]
    ffffd042c762559b-ffffd042c762559e  4 bytes - win32kbase!UserSessionSwitchLeaveCrit+9b (+0x07)
    [ 0f 1f 44 00:e8 80 ae 2b ]
    ffffd042c765eefc-ffffd042c765eefd  2 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+7c (+0x39961)
    [ 48 ff:4c 8b ]
    ffffd042c765ef03-ffffd042c765ef06  4 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+83 (+0x07)
    [ 0f 1f 44 00:e8 18 15 28 ]
    ffffd042c765ef85-ffffd042c765ef86  2 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+105 (+0x82)
    [ 48 ff:4c 8b ]
    ffffd042c765ef8c-ffffd042c765ef8f  4 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+10c (+0x07)
    [ 0f 1f 44 00:e8 8f 14 28 ]
    ffffd042c765ef9b-ffffd042c765ef9c  2 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+11b (+0x0f)
    [ 48 ff:4c 8b ]
    ffffd042c765efa2-ffffd042c765efa5  4 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+122 (+0x07)
    [ 0f 1f 44 00:e8 79 14 28 ]
    ffffd042c765efcf-ffffd042c765efd0  2 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+14f (+0x2d)
    [ 48 ff:4c 8b ]
    ffffd042c765efd6-ffffd042c765efd9  4 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+156 (+0x07)
    [ 0f 1f 44 00:e8 45 14 28 ]
    ffffd042c765efe3-ffffd042c765efe4  2 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+163 (+0x0d)
    [ 48 ff:4c 8b ]
    ffffd042c765efea-ffffd042c765efed  4 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+16a (+0x07)
    [ 0f 1f 44 00:e8 31 14 28 ]
    ffffd042c765effd-ffffd042c765effe  2 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+17d (+0x13)
    [ 48 ff:4c 8b ]
    ffffd042c765f004-ffffd042c765f007  4 bytes - win32kbase!LegacyInputDispatcher::WaitAndDispatch+184 (+0x07)
    [ 0f 1f 44 00:e8 17 14 28 ]
    ffffd042c765fba8-ffffd042c765fba9  2 bytes - win32kbase!RIMDropAndReAcquireSyncLock::~RIMDropAndReAcquireSyncLock+24 (+0xba4)
    [ 48 ff:4c 8b ]
    ffffd042c765fbaf-ffffd042c765fbb2  4 bytes - win32kbase!RIMDropAndReAcquireSyncLock::~RIMDropAndReAcquireSyncLock+2b (+0x07)
    [ 0f 1f 44 00:e8 6c 08 28 ]
    ffffd042c769423e-ffffd042c7694243  6 bytes - win32kbase!CBaseInput::OnDispatcherObjectSignaled+3e (+0x3468f)
    [ ff 15 74 ad 1e 00:e8 5d c0 24 00 90 ]
    ffffd042c76942e9-ffffd042c76942ea  2 bytes - win32kbase!CBaseInput::OnDispatcherObjectSignaled+e9 (+0xab)
    [ 48 ff:4c 8b ]
    ffffd042c76942f0-ffffd042c76942f1  2 bytes - win32kbase!CBaseInput::OnDispatcherObjectSignaled+f0 (+0x07)
    [ 0f 1f:e8 2b ]
    ffffd042c76a05a4-ffffd042c76a05a5  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+2c (+0xc2b4)
    [ 48 ff:4c 8b ]
    ffffd042c76a05ab-ffffd042c76a05ae  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+33 (+0x07)
    [ 0f 1f 44 00:e8 70 fe 23 ]
    ffffd042c76a05b5-ffffd042c76a05b6  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+3d (+0x0a)
    [ 48 ff:4c 8b ]
    ffffd042c76a05bc-ffffd042c76a05bf  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+44 (+0x07)
    [ 0f 1f 44 00:e8 5f fe 23 ]
    ffffd042c76a05f9-ffffd042c76a05fa  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+81 (+0x3d)
    [ 48 ff:4c 8b ]
    ffffd042c76a0600-ffffd042c76a0603  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+88 (+0x07)
    [ 0f 1f 44 00:e8 1b fe 23 ]
    ffffd042c76a0605-ffffd042c76a0606  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+8d (+0x05)
    [ 48 ff:4c 8b ]
    ffffd042c76a060c-ffffd042c76a060f  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<40960,160>::Free+94 (+0x07)
    [ 0f 1f 44 00:e8 0f fe 23 ]
    ffffd042c76ac34d-ffffd042c76ac34e  2 bytes - win32kbase!CMouseProcessor::CMouseProcessor+21 (+0xbd41)
    [ 48 ff:4c 8b ]
    ffffd042c76bab31-ffffd042c76bab32  2 bytes - win32kbase!rimInputApc+f1 (+0xe7e4)
    [ 48 ff:4c 8b ]
    ffffd042c76bab38-ffffd042c76bab3b  4 bytes - win32kbase!rimInputApc+f8 (+0x07)
    [ 0f 1f 44 00:e8 e3 58 22 ]
    ffffd042c76c1c20-ffffd042c76c1c21  2 bytes - win32kbase!CInputConfig::Iter::Entry+10 (+0x70e8)
    [ 48 ff:4c 8b ]
    ffffd042c76c1c27-ffffd042c76c1c2a  4 bytes - win32kbase!CInputConfig::Iter::Entry+17 (+0x07)
    [ 0f 1f 44 00:e8 f4 e7 21 ]
    ffffd042c76c2e0b-ffffd042c76c2e10  6 bytes - win32kbase!DrvDxgkWriteDiagEntry+b (+0x11e4)
    [ ff 15 a7 c1 1b 00:e8 90 d4 21 00 90 ]
    ffffd042c76c7153-ffffd042c76c7155  3 bytes - win32kbase!xxxCreateSystemThreads+c3 (+0x4348)
    [ 00 48 ff:90 4c 8b ]
    ffffd042c76c715b-ffffd042c76c715e  4 bytes - win32kbase!xxxCreateSystemThreads+cb (+0x08)
    [ 0f 1f 44 00:e8 c0 92 21 ]
    ffffd042c76c716a-ffffd042c76c716b  2 bytes - win32kbase!xxxCreateSystemThreads+da (+0x0f)
    [ 48 ff:4c 8b ]
    ffffd042c76c7171-ffffd042c76c7174  4 bytes - win32kbase!xxxCreateSystemThreads+e1 (+0x07)
    [ 0f 1f 44 00:e8 aa 92 21 ]
    ffffd042c76c71b0-ffffd042c76c71b1  2 bytes - win32kbase!xxxCreateSystemThreads+120 (+0x3f)
    [ 48 ff:4c 8b ]
    ffffd042c76c71b7-ffffd042c76c71ba  4 bytes - win32kbase!xxxCreateSystemThreads+127 (+0x07)
    [ 0f 1f 44 00:e8 64 92 21 ]
    ffffd042c76c71c4-ffffd042c76c71c5  2 bytes - win32kbase!xxxCreateSystemThreads+134 (+0x0d)
    [ 48 ff:4c 8b ]
    ffffd042c76c71cb-ffffd042c76c71ce  4 bytes - win32kbase!xxxCreateSystemThreads+13b (+0x07)
    [ 0f 1f 44 00:e8 50 92 21 ]
    ffffd042c76c71de-ffffd042c76c71df  2 bytes - win32kbase!xxxCreateSystemThreads+14e (+0x13)
    [ 48 ff:4c 8b ]
    ffffd042c76c71e5-ffffd042c76c71e8  4 bytes - win32kbase!xxxCreateSystemThreads+155 (+0x07)
    [ 0f 1f 44 00:e8 36 92 21 ]
    ffffd042c76c7224-ffffd042c76c7225  2 bytes - win32kbase!xxxCreateSystemThreads+194 (+0x3f)
    [ 48 ff:4c 8b ]
    ffffd042c76c722b-ffffd042c76c722e  4 bytes - win32kbase!xxxCreateSystemThreads+19b (+0x07)
    [ 0f 1f 44 00:e8 f0 91 21 ]
    ffffd042c76c7250-ffffd042c76c7251  2 bytes - win32kbase!xxxCreateSystemThreads+1c0 (+0x25)
    [ 48 ff:4c 8b ]
    ffffd042c76d47f0-ffffd042c76d47f2  3 bytes - win32kbase!purecall (+0xd5a0)
    [ 48 ff 25:4c 8b 15 ]
    ffffd042c76d47f7-ffffd042c76d47fb  5 bytes - win32kbase!purecall+7 (+0x07)
    [ cc cc cc cc cc:e9 24 bc 20 00 ]
    ffffd042c76d4896-ffffd042c76d4898  3 bytes - win32kbase!RtlUpcaseUnicodeToMultiByteN (+0x9f)
    [ 48 ff 25:4c 8b 15 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
    ffffd042c7886167-ffffd042c7886168  2 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+6b
    [ 48 ff:4c 8b ]
    ffffd042c788616e-ffffd042c7886171  4 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+72 (+0x07)
    [ 0f 1f 44 00:e8 ad a2 05 ]
    ffffd042c78861dc-ffffd042c78861dd  2 bytes - win32kbase!CreateTlgAggregateSession+40 (+0x6e)
    [ 48 ff:4c 8b ]
    ffffd042c78861e3-ffffd042c78861e6  4 bytes - win32kbase!CreateTlgAggregateSession+47 (+0x07)
    [ 0f 1f 44 00:e8 38 a2 05 ]
    ffffd042c7886545-ffffd042c788654a  6 bytes - win32kbase!tlgEnableCallback+45 (+0x362)
    [ ff 15 6d 8a ff ff:e8 56 9d 05 00 90 ]
    ffffd042c78865c8-ffffd042c78865c9  2 bytes - win32kbase!WmsgpPostMessage+4c (+0x83)
    [ 48 ff:4c 8b ]
    ffffd042c78865cf-ffffd042c78865d2  4 bytes - win32kbase!WmsgpPostMessage+53 (+0x07)
    [ 0f 1f 44 00:e8 4c 9e 05 ]
    ffffd042c78865e6-ffffd042c78865e7  2 bytes - win32kbase!WmsgpPostMessage+6a (+0x17)
    [ 48 ff:4c 8b ]
    ffffd042c78865ed-ffffd042c78865f0  4 bytes - win32kbase!WmsgpPostMessage+71 (+0x07)
    [ 0f 1f 44 00:e8 2e 9e 05 ]
207 errors : !win32kbase (ffffd042c7613bf7-ffffd042c78865f0)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffff9180774d5820 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff00b6af5a7e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff00b6af5a738, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


TRAP_FRAME:  fffff00b6af5a7e0 -- (.trap 0xfffff00b6af5a7e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff858a1f2affe8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80217c0c643 rsp=fffff00b6af5a970 rbp=fffff00b6af5aa01
r8=0000000000000000  r9=00000000647741b2 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KeWaitForSingleObject+0x1e5d03:
fffff802`17c0c643 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff00b6af5a738 -- (.exr 0xfffff00b6af5a738)
ExceptionAddress: fffff80217c0c643 (nt!KeWaitForSingleObject+0x00000000001e5d03)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x139

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

EXCEPTION_STR:  0x0

LAST_CONTROL_TRANSFER:  from fffff80217befe29 to fffff80217bddf40

STACK_TEXT:
fffff00b`6af5a4b8 fffff802`17befe29 : 00000000`00000139 00000000`00000003 fffff00b`6af5a7e0 fffff00b`6af5a738 : nt!KeBugCheckEx
fffff00b`6af5a4c0 fffff802`17bf0250 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff00b`6af5a600 fffff802`17bee5e3 : ffffc200`13b5c100 ffff4488`9040c3cd 00000000`00000001 ffff858a`1c944180 : nt!KiFastFailDispatch+0xd0
fffff00b`6af5a7e0 fffff802`17c0c643 : ffff858a`0000002b fffff802`17df95b1 00000000`00040201 ffff858a`1c9441c0 : nt!KiRaiseSecurityCheckFailure+0x323
fffff00b`6af5a970 fffff802`17dfb6b1 : ffff858a`1f2affe0 00000000`00000006 00000000`00000001 ffff858a`1f2bac00 : nt!KeWaitForSingleObject+0x1e5d03
fffff00b`6af5aa60 fffff802`17dfb75a : ffff858a`1c944080 0000008e`6f5fe998 00000000`00000000 00000204`e6e70f90 : nt!ObWaitForSingleObject+0x91
fffff00b`6af5aac0 fffff802`17bef878 : ffff858a`1c944080 00000000`1677e000 fffff00b`6af5ab18 ffffffff`ff9927e0 : nt!NtWaitForSingleObject+0x6a
fffff00b`6af5ab00 00007ff8`48d6be44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008e`6f5fe968 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`48d6be44


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff8021364cd05-fffff8021364cd06  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
    [ 48 ff:4c 8b ]
    fffff8021364cd0c-fffff8021364cd10  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
    [ 0f 1f 44 00 00:e8 cf 50 4c 04 ]
    fffff8021364cd1a-fffff8021364cd1b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
    [ 48 ff:4c 8b ]
    fffff8021364cd21-fffff8021364cd25  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
    [ 0f 1f 44 00 00:e8 fa 63 3d 04 ]
    fffff8021364cd6a-fffff8021364cd6b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
    [ 48 ff:4c 8b ]
    fffff8021364cd71-fffff8021364cd77  7 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
    [ 0f 1f 44 00 00 48 ff:e8 fa 5b 3d 04 4c 8b ]
    fffff8021364cd7d-fffff8021364cd81  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x0c)
    [ 0f 1f 44 00 00:e8 0e e1 4a 04 ]
28 errors : !FLTMGR (fffff8021364cd05-fffff8021364cd81)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
Unknown bugcheck code (197)
Unknown bugcheck description
Arguments:
Arg1: 0000000000000001
Arg2: fffff434042137e0
Arg3: fffff43400c00000
Arg4: 0000000000000001

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'bindflt' and 'dump_storpor' overlap

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x197

PROCESS_NAME:  Taskmgr.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff4068e4db11e to fffff80557fddf40

STACK_TEXT:
fffffd02`95cde5a8 fffff406`8e4db11e : 00000000`00000197 00000000`00000001 fffff434`042137e0 fffff434`00c00000 : nt!KeBugCheckEx
fffffd02`95cde5b0 fffff406`8e3ef291 : fffff434`042137e0 00000000`00000000 00000000`00000000 00000000`01090440 : win32kfull!xxxSendTransformableMessageTimeout+0xe149e
fffffd02`95cde700 fffff406`8e3eedd2 : fffff434`042137e0 fffffd02`95cdf300 fffffd02`95cdf300 fffff434`042137e0 : win32kfull!xxxDCEWindowHitTest2Internal+0x3b1
fffffd02`95cde7f0 fffff406`8e3ef12f : 00000109`00000440 00000109`00000440 fffffd02`95cdf300 00000109`00000440 : win32kfull!xxxDCEWindowHitTestIndirect+0x182
fffffd02`95cde870 fffff406`8e3eedd2 : fffff434`04212690 fffffd02`95cdf300 fffff406`8d083c00 fffff434`04213690 : win32kfull!xxxDCEWindowHitTest2Internal+0x24f
fffffd02`95cde960 fffff406`8e3ef12f : 00000109`00000440 00000109`00000440 fffffd02`95cdf300 fffff805`57f93df7 : win32kfull!xxxDCEWindowHitTestIndirect+0x182
fffffd02`95cde9e0 fffff406`8e3eedd2 : fffff434`04211e70 fffffd02`95cdf300 fffff406`8d083c00 fffff434`04211e70 : win32kfull!xxxDCEWindowHitTest2Internal+0x24f
fffffd02`95cdead0 fffff406`8e3ef12f : 00000109`00000440 00000109`00000440 fffffd02`95cdf300 00000000`00000000 : win32kfull!xxxDCEWindowHitTestIndirect+0x182
fffffd02`95cdeb50 fffff406`8e3eedd2 : fffff434`04211d20 fffffd02`95cdf300 fffff406`8d083c00 fffff434`04211d20 : win32kfull!xxxDCEWindowHitTest2Internal+0x24f
fffffd02`95cdec40 fffff406`8e3ef12f : 00000109`00000440 00000109`00000440 fffffd02`95cdf300 ffffcb01`00006011 : win32kfull!xxxDCEWindowHitTestIndirect+0x182
fffffd02`95cdecc0 fffff406`8e3eedd2 : fffff434`00839000 fffffd02`95cdf300 fffffd02`00000000 fffff434`00831930 : win32kfull!xxxDCEWindowHitTest2Internal+0x24f
fffffd02`95cdedb0 fffff406`8e3ef12f : 00000109`00000440 00000109`00000440 fffffd02`95cdf300 fffff406`8e374469 : win32kfull!xxxDCEWindowHitTestIndirect+0x182
fffffd02`95cdee30 fffff406`8e3eedd2 : fffff434`00830930 fffffd02`95cdf300 ffff8781`c7389180 fffff434`00830930 : win32kfull!xxxDCEWindowHitTest2Internal+0x24f
fffffd02`95cdef20 fffff406`8e3f30c3 : 00000109`00000440 00000109`00000440 fffff434`05fe59d0 00000000`00000000 : win32kfull!xxxDCEWindowHitTestIndirect+0x182
fffffd02`95cdefa0 fffff406`8e3f6f56 : fffff434`05ff5950 fffffd02`95cdfd38 00000000`00000000 00000000`00000000 : win32kfull!xxxScanSysQueue+0xfb3
fffffd02`95cdf850 fffff406`8e42ad0e : fffffd02`95cdfd38 00000000`00000000 00000000`00000000 00000045`0027f9c8 : win32kfull!xxxRealInternalGetMessage+0xee6
fffffd02`95cdfcf0 fffff406`8d3b7435 : ffffcb01`e76f8080 00000045`0027f888 fffffd02`95cdfde8 00000045`0027f8c0 : win32kfull!NtUserRealInternalGetMessage+0x7e
fffffd02`95cdfd80 fffff805`57fef878 : 00000000`00000000 00000000`00000003 00000000`ffffffff 00000000`00000000 : win32k!NtUserRealInternalGetMessage+0x29
fffffd02`95cdfdd0 00007ffc`a36e2be4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000045`0027f868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`a36e2be4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    fffff4068d038141-fffff4068d038142  2 bytes - win32kbase!EnterCrit+231
    [ 48 ff:4c 8b ]
    fffff4068d038148-fffff4068d03814b  4 bytes - win32kbase!EnterCrit+238 (+0x07)
    [ 0f 1f 44 00:e8 d3 82 2a ]
    fffff4068d038150-fffff4068d038151  2 bytes - win32kbase!EnterCrit+240 (+0x08)
    [ 48 ff:4c 8b ]
    fffff4068d038157-fffff4068d03815a  4 bytes - win32kbase!EnterCrit+247 (+0x07)
    [ 0f 1f 44 00:e8 c4 82 2a ]
    fffff4068d03815e-fffff4068d03815f  2 bytes - win32kbase!EnterCrit+24e (+0x07)
    [ 48 ff:4c 8b ]
    fffff4068d038165-fffff4068d038168  4 bytes - win32kbase!EnterCrit+255 (+0x07)
    [ 0f 1f 44 00:e8 b6 82 2a ]
    fffff4068d03816d-fffff4068d03816e  2 bytes - win32kbase!EnterCrit+25d (+0x08)
    [ 48 ff:4c 8b ]
    fffff4068d038174-fffff4068d038177  4 bytes - win32kbase!EnterCrit+264 (+0x07)
    [ 0f 1f 44 00:e8 a7 82 2a ]
    fffff4068d0381b3-fffff4068d0381b4  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+23 (+0x3f)
    [ 48 ff:4c 8b ]
    fffff4068d0381ba-fffff4068d0381bd  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+2a (+0x07)
    [ 0f 1f 44 00:e8 61 82 2a ]
    fffff4068d0381fd-fffff4068d0381fe  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+6d (+0x43)
    [ 48 ff:4c 8b ]
    fffff4068d038204-fffff4068d038207  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+74 (+0x07)
    [ 0f 1f 44 00:e8 17 82 2a ]
    fffff4068d038524-fffff4068d038525  2 bytes - win32kbase!IsThreadCrossSessionAttached+4 (+0x320)
    [ 48 ff:4c 8b ]
    fffff4068d083c92-fffff4068d083c93  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<28672,112>::Free+32 (+0x4b76e)
    [ 48 ff:4c 8b ]
    fffff4068d083c99-fffff4068d083c9c  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<28672,112>::Free+39 (+0x07)
    [ 0f 1f 44 00:e8 82 c7 25 ]
    fffff4068d083ca3-fffff4068d083ca4  2 bytes - win32kbase!NSInstrumentation::CTypeIsolation<28672,112>::Free+43 (+0x0a)
    [ 48 ff:4c 8b ]
    fffff4068d083caa-fffff4068d083cad  4 bytes - win32kbase!NSInstrumentation::CTypeIsolation<28672,112>::Free+4a (+0x07)
    [ 0f 1f 44 00:e8 71 c7 25 ]
    fffff4068d08e2bc-fffff4068d08e2bd  2 bytes - win32kbase!EtwTraceQueueMessage+7c (+0xa612)
    [ 48 ff:4c 8b ]
    fffff4068d08e2c3-fffff4068d08e2c6  4 bytes - win32kbase!EtwTraceQueueMessage+83 (+0x07)
    [ 0f 1f 44 00:e8 58 21 25 ]
    fffff4068d08e2d6-fffff4068d08e2d7  2 bytes - win32kbase!EtwTraceQueueMessage+96 (+0x13)
    [ 48 ff:4c 8b ]
    fffff4068d08e2dd-fffff4068d08e2e0  4 bytes - win32kbase!EtwTraceQueueMessage+9d (+0x07)
    [ 0f 1f 44 00:e8 3e 21 25 ]
    fffff4068d08e2f4-fffff4068d08e2f5  2 bytes - win32kbase!EtwTraceQueueMessage+b4 (+0x17)
    [ 48 ff:4c 8b ]
    fffff4068d08e2fb-fffff4068d08e2fe  4 bytes - win32kbase!EtwTraceQueueMessage+bb (+0x07)
    [ 0f 1f 44 00:e8 20 21 25 ]
    fffff4068d286167-fffff4068d286168  2 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+6b
    [ 48 ff:4c 8b ]
    fffff4068d28616e-fffff4068d286171  4 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+72 (+0x07)
    [ 0f 1f 44 00:e8 ad a2 05 ]
    fffff4068d2861dc-fffff4068d2861dd  2 bytes - win32kbase!CreateTlgAggregateSession+40 (+0x6e)
    [ 48 ff:4c 8b ]
    fffff4068d2861e3-fffff4068d2861e6  4 bytes - win32kbase!CreateTlgAggregateSession+47 (+0x07)
    [ 0f 1f 44 00:e8 38 a2 05 ]
    fffff4068d286545-fffff4068d28654a  6 bytes - win32kbase!tlgEnableCallback+45 (+0x362)
    [ ff 15 6d 8a ff ff:e8 56 9d 05 00 90 ]
    fffff4068d2865c8-fffff4068d2865c9  2 bytes - win32kbase!WmsgpPostMessage+4c (+0x83)
    [ 48 ff:4c 8b ]
    fffff4068d2865cf-fffff4068d2865d2  4 bytes - win32kbase!WmsgpPostMessage+53 (+0x07)
    [ 0f 1f 44 00:e8 4c 9e 05 ]
    fffff4068d2865e6-fffff4068d2865e7  2 bytes - win32kbase!WmsgpPostMessage+6a (+0x17)
    [ 48 ff:4c 8b ]
    fffff4068d2865ed-fffff4068d2865f0  4 bytes - win32kbase!WmsgpPostMessage+71 (+0x07)
    [ 0f 1f 44 00:e8 2e 9e 05 ]
98 errors : !win32kbase (fffff4068d038141-fffff4068d2865f0)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
1600766197468.png
 
Durum
Mesaj gönderimine kapalı.

Yeni konular

Geri
Yukarı