Çözüldü Mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

ahmetecemis_51

Decapat
Katılım
1 Aralık 2019
Mesajlar
822
Makaleler
1
Sürekli mavi ekran almaktayım, 2 adet minidump dosayasını gönderiyorum.
Format attığım için eski minidump dosyaları gitmiş o yüzden onları atamadım.
Şimdiden teşekkürler.
 
DDU ile ekran kartı sürücüsünü kaldırıp güncelini yükleyin. Core temp kaldırın. Sorun devam ederse Memtest86 ile bellek testi yapınız.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8061db82980, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80641a29280, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 fffff8061db82980

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiInsertTimerTable+d0
fffff806`41a29280 4c8b42f8        mov     r8,qword ptr [rdx-8]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  ffffaa098d9b07b0 -- (.trap 0xffffaa098d9b07b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000100 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8061db82988 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80641a29280 rsp=ffffaa098d9b0940 rbp=00000003039870fc
 r8=0000000000000000  r9=fffff80641800000 r10=fffff8063db7eac0
r11=ffffaa098d9b0a00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiInsertTimerTable+0xd0:
fffff806`41a29280 4c8b42f8        mov     r8,qword ptr [rdx-8] ds:fffff806`1db82980=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80641bef929 to fffff80641bdda20

STACK_TEXT: 
ffffaa09`8d9b0668 fffff806`41bef929 : 00000000`0000000a fffff806`1db82980 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffaa09`8d9b0670 fffff806`41bebc29 : ffff9605`032de080 ffffaa09`8d9b0800 00000000`00000000 fffff806`41be47a6 : nt!KiBugCheckDispatch+0x69
ffffaa09`8d9b07b0 fffff806`41a29280 : 00000000`00000000 00000000`63c80180 00000000`00000000 fffff806`41be4866 : nt!KiPageFault+0x469
ffffaa09`8d9b0940 fffff806`41a2751d : ffff9605`00e39080 00001f80`0000000a ffffaa09`8d9b0b00 ffff9605`00000000 : nt!KiInsertTimerTable+0xd0
ffffaa09`8d9b09c0 fffff806`41a31e4e : 00000000`000000e6 00000000`00000000 ffffe400`63c8e001 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
ffffaa09`8d9b0a60 fffff806`41e0b050 : ffffaa09`8d9b0e20 00000000`00000001 ffff9605`01982d10 fffff806`41d25a38 : nt!KeWaitForMultipleObjects+0x2be
ffffaa09`8d9b0b70 fffff5e2`81d9fb72 : 00000000`000186a0 00000000`00030d40 fffff594`8073fa10 ffff9604`fc23b1f0 : nt!ObWaitForMultipleObjects+0x2f0
ffffaa09`8d9b1070 fffff5e2`81cf979e : 0000009b`00000001 fffff594`8073fa10 00000000`00007530 00000000`00001cff : win32kfull!xxxMsgWaitForMultipleObjectsEx+0xde
ffffaa09`8d9b1120 fffff5e2`81456fcf : 00007ffb`fcb70000 0000009b`5117faa0 00000000`00007530 00000000`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x3fe
ffffaa09`8d9b1a50 fffff806`41bef378 : 000001bd`17957840 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
ffffaa09`8d9b1a90 00007ffc`208aa104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000009b`5117f988 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`208aa104


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    fffff5e28101c469-fffff5e28101c46e  6 bytes - win32kbase!Win32FreePool+19
    [ ff 15 49 7b 26 00:e8 32 8e 2c 00 90 ]
    fffff5e28101c482-fffff5e28101c487  6 bytes - win32kbase!Win32FreePool+32 (+0x19)
    [ ff 15 30 7b 26 00:e8 19 8e 2c 00 90 ]
    fffff5e28101c4cb-fffff5e28101c4cc  2 bytes - win32kbase!AllocAce+2b (+0x49)
    [ 48 ff:4c 8b ]
    fffff5e28101c4d2-fffff5e28101c4d5  4 bytes - win32kbase!AllocAce+32 (+0x07)
    [ 0f 1f 44 00:e8 49 8f 2c ]
    fffff5e28101c513-fffff5e28101c518  6 bytes - win32kbase!AllocAce+73 (+0x41)
    [ ff 15 9f 7a 26 00:e8 88 8d 2c 00 90 ]
    fffff5e28101c53f-fffff5e28101c544  6 bytes - win32kbase!AllocAce+9f (+0x2c)
    [ ff 15 73 7a 26 00:e8 5c 8d 2c 00 90 ]
    fffff5e28102ad84-fffff5e28102ad85  2 bytes - win32kbase!UserSessionSwitchLeaveCrit+94 (+0xe845)
    [ 48 ff:4c 8b ]
    fffff5e28102ad8b-fffff5e28102ad8e  4 bytes - win32kbase!UserSessionSwitchLeaveCrit+9b (+0x07)
    [ 0f 1f 44 00:e8 90 a6 2b ]
    fffff5e28128b167-fffff5e28128b168  2 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+6b
    [ 48 ff:4c 8b ]
    fffff5e28128b16e-fffff5e28128b171  4 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+72 (+0x07)
    [ 0f 1f 44 00:e8 ad a2 05 ]
    fffff5e28128b1dc-fffff5e28128b1dd  2 bytes - win32kbase!CreateTlgAggregateSession+40 (+0x6e)
    [ 48 ff:4c 8b ]
    fffff5e28128b1e3-fffff5e28128b1e6  4 bytes - win32kbase!CreateTlgAggregateSession+47 (+0x07)
    [ 0f 1f 44 00:e8 38 a2 05 ]
    fffff5e28128b545-fffff5e28128b54a  6 bytes - win32kbase!tlgEnableCallback+45 (+0x362)
    [ ff 15 6d 8a ff ff:e8 56 9d 05 00 90 ]
    fffff5e28128b5c8-fffff5e28128b5c9  2 bytes - win32kbase!WmsgpPostMessage+4c (+0x83)
    [ 48 ff:4c 8b ]
    fffff5e28128b5cf-fffff5e28128b5d2  4 bytes - win32kbase!WmsgpPostMessage+53 (+0x07)
    [ 0f 1f 44 00:e8 4c 9e 05 ]
    fffff5e28128b5e6-fffff5e28128b5e7  2 bytes - win32kbase!WmsgpPostMessage+6a (+0x17)
    [ 48 ff:4c 8b ]
    fffff5e28128b5ed-fffff5e28128b5f0  4 bytes - win32kbase!WmsgpPostMessage+71 (+0x07)
    [ 0f 1f 44 00:e8 2e 9e 05 ]
    fffff5e28128c2c9-fffff5e28128c2ca  2 bytes - win32kbase!TlgAggregateInternalProviderCallback+19 (+0xcdc)
    [ 48 ff:4c 8b ]
    fffff5e28128c2d0-fffff5e28128c2d3  4 bytes - win32kbase!TlgAggregateInternalProviderCallback+20 (+0x07)
    [ 0f 1f 44 00:e8 4b 91 05 ]
    fffff5e28128c2ff-fffff5e28128c300  2 bytes - win32kbase!TlgAggregateInternalProviderCallback+4f (+0x2f)
    [ 48 ff:4c 8b ]
    fffff5e28128c306-fffff5e28128c309  4 bytes - win32kbase!TlgAggregateInternalProviderCallback+56 (+0x07)
    [ 0f 1f 44 00:e8 15 91 05 ]
    fffff5e28128c366-fffff5e28128c36b  6 bytes - win32kbase!TlgAggregateInternalRegisteredProviderEtwCallback+46 (+0x60)
    [ ff 15 4c 7c ff ff:e8 35 8f 05 00 90 ]
84 errors : !win32kbase (fffff5e28101c469-fffff5e28128c36b)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: ffff91287702d401, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 0000000000000000

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
win32kbase!ThreadUnlock1+51
ffff9128`7702d401 488b01          mov     rax,qword ptr [rcx]

BUGCHECK_STR:  0x1E_c0000005_R

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  Core Temp.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

EXCEPTION_RECORD:  ffffad01d85e97f0 -- (.exr 0xffffad01d85e97f0)
ExceptionAddress: 0000000042000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

TRAP_FRAME:  ffffad01d85e9770 -- (.trap 0xffffad01d85e9770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc309a964e0a0 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffff91287702d401 rsp=ffffad01d85e9908 rbp=ffffad01d85e99d9
 r8=0000000000000001  r9=0000000000000000 r10=fffff8023f718620
r11=ffffad01d85e9898 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
win32kbase!ThreadUnlock1+0x51:
ffff9128`7702d401 488b01          mov     rax,qword ptr [rcx] ds:00000000`00000000=0000000000000000
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8023f82edf9 to fffff8023f7dda20

STACK_TEXT: 
ffffad01`d85e8ec8 fffff802`3f82edf9 : 00000000`0000001e ffffffff`c0000005 ffff9128`7702d401 00000000`00000000 : nt!KeBugCheckEx
ffffad01`d85e8ed0 fffff802`3f7efa6c : ffffad01`d85e97f0 00000000`00001000 ffffad01`d85e9770 ffff8000`00000000 : nt!KiDispatchException+0x1b3d59
ffffad01`d85e9590 fffff802`3f7ebc03 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffad01`d85e9770 ffff9128`7702d401 : ffff9154`40697620 ffff9154`00000001 00000000`00000000 ffffad01`d85e9898 : nt!KiPageFault+0x443
ffffad01`d85e9908 ffff9128`774866b6 : ffff9154`40626230 ffff9154`40697620 ffff9154`40697620 ffffc309`a67b6b70 : win32kbase!ThreadUnlock1+0x51
ffffad01`d85e9938 00000000`00000001 : ffff9154`00000440 00000000`000302c2 00000000`0000badf 00000000`00000000 : win32kfull!_PostTransformableMessageExtended+0xe8386
ffffad01`d85e9a38 ffff9154`00000440 : 00000000`000302c2 00000000`0000badf 00000000`00000000 00000000`00000001 : 0x1
ffffad01`d85e9a40 00000000`000302c2 : 00000000`0000badf 00000000`00000000 00000000`00000001 00000000`00000005 : 0xffff9154`00000440
ffffad01`d85e9a48 00000000`0000badf : 00000000`00000000 00000000`00000001 00000000`00000005 fffff802`000002b1 : 0x302c2
ffffad01`d85e9a50 00000000`00000000 : 00000000`00000001 00000000`00000005 fffff802`000002b1 ffffad01`00000000 : 0xbadf


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffff91287701c469-ffff91287701c46e  6 bytes - win32kbase!Win32FreePool+19
    [ ff 15 49 7b 26 00:e8 32 8e 2c 00 90 ]
    ffff91287701c482-ffff91287701c487  6 bytes - win32kbase!Win32FreePool+32 (+0x19)
    [ ff 15 30 7b 26 00:e8 19 8e 2c 00 90 ]
    ffff91287701c4cb-ffff91287701c4cc  2 bytes - win32kbase!AllocAce+2b (+0x49)
    [ 48 ff:4c 8b ]
    ffff91287701c4d2-ffff91287701c4d5  4 bytes - win32kbase!AllocAce+32 (+0x07)
    [ 0f 1f 44 00:e8 49 8f 2c ]
    ffff91287701c513-ffff91287701c518  6 bytes - win32kbase!AllocAce+73 (+0x41)
    [ ff 15 9f 7a 26 00:e8 88 8d 2c 00 90 ]
    ffff91287701c53f-ffff91287701c544  6 bytes - win32kbase!AllocAce+9f (+0x2c)
    [ ff 15 73 7a 26 00:e8 5c 8d 2c 00 90 ]
    ffff91287702d150-ffff91287702d151  2 bytes - win32kbase!W32GetThreadWin32Thread+14 (+0x10c11)
    [ 48 ff:4c 8b ]
    ffff91287702d157-ffff91287702d15a  4 bytes - win32kbase!W32GetThreadWin32Thread+1b (+0x07)
    [ 0f 1f 44 00:e8 c4 82 2b ]
    ffff91287702d167-ffff91287702d168  2 bytes - win32kbase!W32GetThreadWin32Thread+2b (+0x10)
    [ 48 ff:4c 8b ]
    ffff91287702d16e-ffff91287702d171  4 bytes - win32kbase!W32GetThreadWin32Thread+32 (+0x07)
    [ 0f 1f 44 00:e8 ad 82 2b ]
    ffff91287702d3ca-ffff91287702d3cb  2 bytes - win32kbase!ThreadUnlock1+1a (+0x25c)
    [ 48 ff:4c 8b ]
    ffff91287702d3d1-ffff91287702d3d4  4 bytes - win32kbase!ThreadUnlock1+21 (+0x07)
    [ 0f 1f 44 00:e8 4a 80 2b ]
    ffff91287702d3e1-ffff91287702d3e2  2 bytes - win32kbase!ThreadUnlock1+31 (+0x10)
    [ 48 ff:4c 8b ]
    ffff91287702d3e8-ffff91287702d3eb  4 bytes - win32kbase!ThreadUnlock1+38 (+0x07)
    [ 0f 1f 44 00:e8 33 80 2b ]
    ffff91287702d4f3-ffff91287702d4f4  2 bytes - win32kbase!EnterCrit+33 (+0x10b)
    [ 48 ff:4c 8b ]
    ffff91287702d4fa-ffff91287702d4fd  4 bytes - win32kbase!EnterCrit+3a (+0x07)
    [ 0f 1f 44 00:e8 21 7f 2b ]
    ffff91287702d509-ffff91287702d50a  2 bytes - win32kbase!EnterCrit+49 (+0x0f)
    [ 48 ff:4c 8b ]
    ffff91287702d510-ffff91287702d513  4 bytes - win32kbase!EnterCrit+50 (+0x07)
    [ 0f 1f 44 00:e8 0b 7f 2b ]
    ffff91287702d53e-ffff91287702d53f  2 bytes - win32kbase!EnterCrit+7e (+0x2e)
    [ 48 ff:4c 8b ]
    ffff91287702d545-ffff91287702d548  4 bytes - win32kbase!EnterCrit+85 (+0x07)
    [ 0f 1f 44 00:e8 d6 7e 2b ]
    ffff91287702d552-ffff91287702d553  2 bytes - win32kbase!EnterCrit+92 (+0x0d)
    [ 48 ff:4c 8b ]
    ffff91287702d559-ffff91287702d55c  4 bytes - win32kbase!EnterCrit+99 (+0x07)
    [ 0f 1f 44 00:e8 c2 7e 2b ]
    ffff91287702d570-ffff91287702d571  2 bytes - win32kbase!EnterCrit+b0 (+0x17)
    [ 48 ff:4c 8b ]
    ffff91287702d577-ffff91287702d57a  4 bytes - win32kbase!EnterCrit+b7 (+0x07)
    [ 0f 1f 44 00:e8 a4 7e 2b ]
    ffff91287702d5b6-ffff91287702d5b7  2 bytes - win32kbase!EnterCrit+f6 (+0x3f)
    [ 48 ff:4c 8b ]
    ffff91287702d5bd-ffff91287702d5c0  4 bytes - win32kbase!EnterCrit+fd (+0x07)
    [ 0f 1f 44 00:e8 5e 7e 2b ]
    ffff91287702d5e2-ffff91287702d5e3  2 bytes - win32kbase!EnterCrit+122 (+0x25)
    [ 48 ff:4c 8b ]
    ffff91287702d5e9-ffff91287702d5ec  4 bytes - win32kbase!EnterCrit+129 (+0x07)
    [ 0f 1f 44 00:e8 32 7e 2b ]
    ffff91287702d5f6-ffff91287702d5f7  2 bytes - win32kbase!EnterCrit+136 (+0x0d)
    [ 48 ff:4c 8b ]
    ffff91287702d5fd-ffff91287702d600  4 bytes - win32kbase!EnterCrit+13d (+0x07)
    [ 0f 1f 44 00:e8 1e 7e 2b ]
    ffff91287702d65f-ffff91287702d660  2 bytes - win32kbase!EnterCrit+19f (+0x62)
    [ 48 ff:4c 8b ]
    ffff91287702d666-ffff91287702d669  4 bytes - win32kbase!EnterCrit+1a6 (+0x07)
    [ 0f 1f 44 00:e8 b5 7d 2b ]
    ffff91287702d676-ffff91287702d677  2 bytes - win32kbase!EnterCrit+1b6 (+0x10)
    [ 48 ff:4c 8b ]
    ffff91287702d67d-ffff91287702d680  4 bytes - win32kbase!EnterCrit+1bd (+0x07)
    [ 0f 1f 44 00:e8 9e 7d 2b ]
    ffff91287702d695-ffff91287702d696  2 bytes - win32kbase!EnterCrit+1d5 (+0x18)
    [ 48 ff:4c 8b ]
    ffff91287702d69c-ffff91287702d69f  4 bytes - win32kbase!EnterCrit+1dc (+0x07)
    [ 0f 1f 44 00:e8 7f 7d 2b ]
    ffff91287702d6f1-ffff91287702d6f2  2 bytes - win32kbase!EnterCrit+231 (+0x55)
    [ 48 ff:4c 8b ]
    ffff91287702d6f8-ffff91287702d6fb  4 bytes - win32kbase!EnterCrit+238 (+0x07)
    [ 0f 1f 44 00:e8 23 7d 2b ]
    ffff91287702d700-ffff91287702d701  2 bytes - win32kbase!EnterCrit+240 (+0x08)
    [ 48 ff:4c 8b ]
    ffff91287702d707-ffff91287702d70a  4 bytes - win32kbase!EnterCrit+247 (+0x07)
    [ 0f 1f 44 00:e8 14 7d 2b ]
    ffff91287702d70e-ffff91287702d70f  2 bytes - win32kbase!EnterCrit+24e (+0x07)
    [ 48 ff:4c 8b ]
    ffff91287702d715-ffff91287702d718  4 bytes - win32kbase!EnterCrit+255 (+0x07)
    [ 0f 1f 44 00:e8 06 7d 2b ]
    ffff91287702d71d-ffff91287702d71e  2 bytes - win32kbase!EnterCrit+25d (+0x08)
    [ 48 ff:4c 8b ]
    ffff91287702d724-ffff91287702d727  4 bytes - win32kbase!EnterCrit+264 (+0x07)
    [ 0f 1f 44 00:e8 f7 7c 2b ]
    ffff91287702d763-ffff91287702d764  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+23 (+0x3f)
    [ 48 ff:4c 8b ]
    ffff91287702d76a-ffff91287702d76d  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+2a (+0x07)
    [ 0f 1f 44 00:e8 b1 7c 2b ]
    ffff91287702d7ad-ffff91287702d7ae  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+6d (+0x43)
    [ 48 ff:4c 8b ]
    ffff91287702d7b4-ffff91287702d7b7  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+74 (+0x07)
    [ 0f 1f 44 00:e8 67 7c 2b ]
    ffff91287702d8d6-ffff91287702d8d7  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+196 (+0x122)
    [ 48 ff:4c 8b ]
    ffff91287702d8dd-ffff91287702d8e0  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+19d (+0x07)
    [ 0f 1f 44 00:e8 3e 7b 2b ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
234 errors : !win32kbase (ffff91287701c469-ffff91287702dff9)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
 

Yeni konular

Geri
Yukarı