Mavi ekran sebebi nedir?

İşletim sistemi
Windows 10

okan_46

Yoctopat
Katılım
28 Haziran 2024
Mesajlar
1
Daha fazla  
Cinsiyet
Erkek
Merhaba arkadaşlar. Bir konuda tecrübelerinize ve yardımınıza ihtiyacım var. Sürekli mavi ekran hatası alıyorum çözüm bulamadım. Minidump dosyalarının analizi aşağıdaki gibi. Windows kuruyorum kurarken mavi ekran hatası veriyor kurduktan sonra güncelleme yaparken yine aynı sorun. Driver yüklüyorum yine aynı sorun oyun indirirken aynı sorun. Yardımcı olan ve emeği geçen arkadaşlara şimdiden teşekkür ediyorum.

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly Memory. The guilty driver is on the.
Stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (unicode string) is printed on.
The bugcheck screen and saved in kibugcheckdriver.
Arguments:
Arg1: FffFF8051B5F3355, Virtual address for the attempted write.
Arg2: 09000000055F3121, pte contents.
Arg3: FffFD70D993F4dB0, (reserved)
Arg4: 000000000000000A, (reserved)

Debugging details:
------------------

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 4202.

Key: Analysis. Elapsed. Msec.
Value: 9643.

Key: Analysis. IO. Other. MB.
Value: 0

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 0

Key: Analysis. Init. CPU. Msec.
Value: 436.

Key: Analysis. Init. Elapsed. Msec.
Value: 1890.

Key: Analysis. Memory.commitpeak. MB.
Value: 97.

Key: Bugcheck. Code. Legacyapı.
Value: 0xbe.

Key: Bugcheck. Code. Targetmodel.
Value: 0xbe.

Key: Failure. Bucket.
Value: Av_nt! Miraisedırqlfault.

Key: Failure. Hash.
Value: {3B24175F-7F5b-9C9F-8AAF-822C248BF0F5}

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Version.
Value: 10.0.19041.1

Bugcheck_code: Be.

Bugcheck_p1: FffFF8051B5F3355.

Bugcheck_p2: 9000000055F3121.

Bugcheck_p3: FffFD70D993F4dB0.

Bugcheck_p4: A

Fıle_ın_cab: 062824-4796-01.dmp

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: WerFaultSecure.exe

Trap_frame: FffFD70D993F4dB0 -- (.trap 0xffffd70d993f4db0)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = 000000000000B48B rbx = 0000000000000000 rcx = 000000000000A48B.
Rdx = 0000000000001000 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = FFFFF80519A12FD2 rsp = fffFD70D993F4F40 rbp = fffFD70D993F5040.
R8 = 0000000000000000 R9 = fffFB38C0F010fd8 R10 = fffFB38C0F010340.
R11 = 00000000000000E0 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei ng nzna po nc.
NT! Rtlphplfhslotallocate+0x322:
Fffff805'19A12fd2 66F00FB14F20 lock cmpxchg Word ptr [rdi+20h],CX DS: 00000000'00000020=?
Resetting default scope.

Stack_text:
Ffffd70D'993F4bb8 fffff805'19C69FE4: 00000000'000000BE fffff805'1B5F3355 09000000'055F3121 ffffd70D'993F4dB0: NT! Kebugcheckex.
Ffffd70D'993F4bc0 fffff805'19a6e89F: 09000000'055F3121 00000000'00000003 ffffd70D'993F4e30 00000000'00000000: NT! Miraisedırqlfault+0x163D6C
Ffffd70D'993F4C10 fffff805'19C0b7D8: 00000000'00000006 00000000'00000000 ffffffff'ffffffe0 00000000'00000004: NT! Mmaccessfault+0x4ef
Ffffd70D'993F4dB0 fffff805'19A12fd2: Ffffb38C'10ff6ca0 ffffd70D'00000000 0000B000'993F5000 0000B000'00000000: NT! Kipagefault+0x358
Ffffd70D'993F4F40 fffff805'19A12331: Ffffb38C'0F010340 ffffb38C'0F010D80 ffffb38C'0F010FC0 ffffd70D'00000070: NT! Rtlphplfhslotallocate+0x322
Ffffd70D'993F5090 fffff805'1A1b7074: Ffffb38C'00000000 00000000'00012000 ffffd70D'4966744E ffffb38C'1C366818: NT! Exallocateheappool+0x2B1
Ffffd70D'993F51D0 fffff805'1B5F718F: Ffffb38C'1402F040 ffffd70D'993F5460 ffffb38C'1498B101 ffffb38C'00000000: NT! Exallocatepoolwithtag+0x64
Ffffd70D'993F5220 fffff805'1B5F926C: Ffffb38C'193C0A28 ffffb38C'1C166B00 ffffb38C'1C166B00 00000000'00000030: NTFS! Ntfscommonread+0x76F
Ffffd70D'993F5430 fffff805'19A11385: Ffffb38C'1C366730 ffffb38C'1C166B00 ffffb38C'1C166B00 ffffb38C'1480BD60: NTFS! Ntfsfsdread+0x1FC
Ffffd70D'993F5500 fffff805'1560710F: 00000000'00000005 00000000'00000000 ffffd70D'993F5608 fffff805'19a1e9C2: NT! Iofcalldriver+0x55
Ffffd70D'993F5540 fffff805'15604A43: Ffffd70D'993F55D0 ffffb38C'1480BD60 ffffb38C'147026C0 00000000'00000000: Fltmgr! Fltplegacyprocessingafterprecallbackscompleted+0x28F
Ffffd70D'993F55b0 fffff805'19A11385: Ffffb38C'1C166B00 fffff805'19a4E501 00000000'00000000 00000000'00000000: Fltmgr! Fltpdispatch+0xa3
Ffffd70D'993F5610 fffff805'19a4e407: 00000000'00000000 ffffb38C'1C166B00 ffffb38C'1C9DC080 ffffb38C'1796B8C0: NT! Iofcalldriver+0x55
Ffffd70D'993F5650 fffff805'19a4e224: Ffffb38C'1C9DC030 fffff805'19AA0422 ffffb38C'1C9DC090 ffffb38C'1C9DC050: NT! Iopagereadex+0x1D7
Ffffd70D'993F56C0 fffff805'19E58b0D: Ffffb38C'1C9DC030 ffffb38C'1bc23080 ffffb38C'15C18370 fffff805'19a2D3A6: NT! Mipageread+0x28
Ffffd70D'993F5710 fffff805'19E58201: 00000000'00000001 00000000'00000076 00000000'00000099 00000000'00000000: NT! Mipfexecutereadlist+0XF9
Ffffd70D'993F5780 fffff805'19ee7C19: 00000000'00000000 ffff988b'B7343000 ffffd70D'993F5AE8 ffffb38C'19C92010: NT! Mmprefetchpagesex+0x159
Ffffd70D'993F57F0 fffff805'19ee79e0: Ffff988b'B7343000 ffffb38C'1567EAE0 ffffd70D'993F5A80 00000000'00000001: NT! Pfsnprefetchsections+0x1F5
Ffffd70D'993F5A10 fffff805'19ee77bd: 00000000'00000002 00000000'00000001 00000000'000000E6 ffff988b'B7351950: NT! Pfsnasyncprefetchstep+0x3C
Ffffd70D'993F5A50 fffff805'19a8e5C5: Ffffb38C'1bc23080 ffffb38C'1bc23080 ffffb38C'0E86F520 ffffb38C'1567EAE0: NT! Pfsnasyncprefetchworker+0x1CD
Ffffd70D'993F5b70 fffff805'19b265F5: Ffffb38C'1bc23080 00000000'00000080 ffffb38C'0E8e1140 000F8067'bcbbbdff: NT! Expworkerthread+0x105
Ffffd70D'993F5C10 fffff805'19C048D8: Ffffc601'C1879180 ffffb38C'1bc23080 fffff805'19b265a0 00000000'00000000: NT! Pspsystemthreadstartup+0x55
Ffffd70D'993F5C60 00000000'00000000: Ffffd70D'993F6000 ffffd70D'993F0000 00000000'00000000 00000000'00000000: NT! Kistartsystemthread+0x28

Symbol_name: NT! Miraisedırqlfault+163D6C

Module_name: NT.

Image_versıon: 10.0.19041.2965

Stack_command: Cxr. Ecxr; KB.

Image_name: ntkrnlmp.exe

Bucket_ıd_func_offset: 163D6C.

Faılure_bucket_ıd: Av_nt! Miraisedırqlfault.

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {3B24175F-7F5b-9C9F-8AAF-822C248BF0F5}

Followup: Machineowner.

UNEXPECTED_KERNEL_MODE_TRAP (7F)
This means a trap occurred in kernel mode, and it's a trap of a kind.
That the kernel isn't allowed to have/catch (bound trap) or that.
İs always instant death (double fault). The first number in the.
Bugcheck params is the number of the trap (8 = double fault, ETC)
Consult an Intel X86 family manual to learn more about what these.
Traps are. Here is a portion of those codes:
If kv shows a taskgate.
Use. Tss on the part before the colon, then kv.
Else if kv shows a trapframe.
Use. Trap on that Value.
Else.
Trap on the appropriate frame will show where the trap was taken.
(On X86, this will be the ebp that goes with the procedure kitrap)
Endif.
KB will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, exceptıon_double_fault
Arg2: FffFF8032C2b3e70.
Arg3: FffFF8032C28C000.
Arg4: FffFF803250218F4.

Debugging details:
------------------

*** Warnıng: Unable to verify timestamp for clipsp.sys

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 2827.

Key: Analysis. Elapsed. Msec.
Value: 4043.

Key: Analysis. IO. Other. MB.
Value: 0

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 0

Key: Analysis. Init. CPU. Msec.
Value: 452.

Key: Analysis. Init. Elapsed. Msec.
Value: 1776.

Key: Analysis. Memory.commitpeak. MB.
Value: 81.

Key: Bugcheck. Code. Legacyapı.
Value: 0x7f.

Key: Bugcheck. Code. Targetmodel.
Value: 0x7f.

Key: Failure. Bucket.
Value: 0x7f_8_clipsp! unknown_function.

Key: Failure. Hash.
Value: {70F97FAA-81F5-2397-3988-64F90513B2D8}

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Version.
Value: 10.0.19041.1

Bugcheck_code: 7F.

Bugcheck_p1: 8

Bugcheck_p2: FffFF8032C2b3e70.

Bugcheck_p3: FffFF8032C28C000.

Bugcheck_p4: FffFF803250218F4.

Fıle_ın_cab: 062824-6015-01.dmp

Trap_frame: FFFFF8032C2B3E70 -- (.trap 0xfffff8032c2b3e70)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = 0000000000000000 rbx = 0000000000000000 rcx = fffFF803250228D0.
Rdx = 00000061b87fed38 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = FFFFF803250218F4 rsp = FFFFF8032C28C000 rbp = fffffd8A97E1A920.
R8 = 0000000000000082 R9 = 00000000665C9F97 R10 = fffFF803250F1F90.
R11 = 0000000000001000 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei pl zrna po nc.
Clipsp+0x318F4:
Fffff803'250218F4 51 push rcx.
Resetting default scope.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: svchost.exe

Stack_text:
Fffff803'2C2b3D28 fffff803'26a0fd29: 00000000'0000007F 00000000'00000008 fffff803'2C2b3e70 fffff803'2C28C000: NT! Kebugcheckex.
Fffff803'2C2b3D30 fffff803'26a0A43D: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kibugcheckdispatch+0x69
Fffff803'2C2b3e70 fffff803'250218F4: 97e1bc90'00000000 00000000'fffffd8a 00000000'00000000 00000000'00000000: NT! Kidoublefaultabort+0x2bd
Fffff803'2C28C000 97e1bc90'00000000: 00000000'fffffd8a 00000000'00000000 00000000'00000000 2C2b4000'00000000: Clipsp+0x318F4
Fffff803'2C28C008 00000000'fffffd8a: 00000000'00000000 00000000'00000000 2C2b4000'00000000 2C2C2000'fffff803: 0x97e1bc90`00000000
Fffff803'2C28C010 00000000'00000000: 00000000'00000000 2C2b4000'00000000 2C2C2000'fffff803 2C2bb000'fffff803: 0xfffffd8a.

Symbol_name: Clipsp+318F4

Module_name: Clipsp.

Image_name: clipsp.sys

Stack_command: Cxr. Ecxr; KB.

Bucket_ıd_func_offset: 318F4.

Faılure_bucket_ıd: 0x7f_8_clipsp! unknown_function.

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {70F97FAA-81F5-2397-3988-64F90513B2D8}

Followup: Machineowner.

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to Access'a pageable (or completely invalid) address at an.
İnterrupt request level (IRQL) that is too high. This is usually.
Caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: Ffff8C0187BCc844, Memory referenced.
Arg2: 00000000000000FF, IRQL.
Arg3: 000000000000006A, bitfield:
Bit 0: Value 0 = read operation, 1 = write operation.
Bit 3: Value 0 = not an execute operation, 1 = execute operation (only on chips which Support this level of status)
Arg4: FffFF8000AB65cdb, address which referenced Memory.

Debugging details:
------------------

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 2749.

Key: Analysis. Elapsed. Msec.
Value: 6155.

Key: Analysis. IO. Other. MB.
Value: 0

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 0

Key: Analysis. Init. CPU. Msec.
Value: 483.

Key: Analysis. Init. Elapsed. Msec.
Value: 5957.

Key: Analysis. Memory.commitpeak. MB.
Value: 82.

Key: Bugcheck. Code. Legacyapı.
Value: 0xa.

Key: Bugcheck. Code. Targetmodel.
Value: 0xa.

Key: Dump. Attributes. Asulong.
Value: 9

Key: Dump. Attributes. Kernelgeneratedtriagedump
Value: 1

Key: Failure. Bucket.
Value: Av_code_av_nt! Rtlcompressbufferxpresshuffstandard

Key: Failure. Hash.
Value: {7B2E76BD-084C-5A0F-B0B1-C832E9EDad19}

Bugcheck_code: A

Bugcheck_p1: Ffff8C0187BCc844.

Bugcheck_p2: Ff.

Bugcheck_p3: 6a.

Bugcheck_p4: FffFF8000AB65cdb.

Fıle_ın_cab: 062824-6031-01.dmp

Dump_fıle_attrıbutes: 0x9.
Hiber crash dump.
Kernel generated triage dump.

Read_address: FffFF8000B4fb390: Unable to get mivisiblestate.
Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
Unable to get NT! Mmspecialpagesınuse.
Ffff8C0187BCc844.

Customer_crash_count: 1

Trap_frame: FffFF4082ACd7ee0 -- (.trap 0xfffff4082acd7ee0)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = 00000000000002E4 rbx = 0000000000000000 rcx = 0000000000000008.
Rdx = FFFFA48D6A801040 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF8000AB65cdb rsp = FFFFF4082ACD8070 rbp = 00000000000000D4.
R8 = 0000000000000172 R9 = ffff8C0187BCc844 R10 = ffff8C0187D4D40D.
R11 = ffff8C0187D4D40C R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up di pl nzna po nc.
NT! Rtlcompressbufferxpresshuffstandard+0x18b:
Fffff800'0ab65cdb 413809 cmp byte ptr [r9],CL DS: Ffff8C01'87bcc844=?
Resetting default scope.

Stack_text:
Fffff408'2acd7D98 fffff800'0AC0fd29: 00000000'0000000A ffff8C01'87bcc844 00000000'000000FF 00000000'0000006A: NT! Kebugcheckex.
Fffff408'2acd7da0 fffff800'0AC0b8e3: 00000000'00000001 ffffa48D'6174FB20 ffffc600'B06a9F38 ffffa48D'6A82646C: NT! Kibugcheckdispatch+0x69
Fffff408'2acd7ee0 fffff800'0ab65cdb: Ffffa48D'6A826470 00000000'00000001 80000000'00000000 8A000000'bee16963: NT! Kipagefault+0x463
Fffff408'2acd8070 fffff800'0AC9207C: Ffff8C01'87D40000 ffffc600'B06a9D00 ffffa48D'6D392000 00000000'00000000: NT! Rtlcompressbufferxpresshuffstandard+0x18b
Fffff408'2acd8170 fffff800'0B1974A5: 00000028'ffe0587a 00000000'00000002 fffff800'00000001 00000001'93abf000: NT! Rtlcompressbufferprogress+0x10F0BC
Fffff408'2acd81D0 fffff800'0B196D4D: Ffffa48D'6174F9B0 fffff408'00000000 ffffa48D'6A800000 00000000'00000010: NT! Popaddpagestocompressedpageset+0xb1
Fffff408'2acd8250 fffff800'0B1A6884: Ffffa48D'6174F9B0 00000000'0043972A 00000000'001D0000 ffffc600'B06a9F38: NT! Popwritehiberımage+0xd9
Fffff408'2acd8410 fffff800'0AC05105: 00000000'00000000 00000000'0000000C 00000000'00000000 00000000'00000015: NT! Popsavehibercontext+0x100e4
Fffff408'2acd86F0 fffff800'0ab8535a: Fffff800'06b4B180 fffff800'0AC70010 fffff800'06b4B180 fffff800'0AC050D0: NT! Popsavehibercontextwrapper+0x35
Fffff408'2acd8720 fffff800'0B1962CC: Fffff408'2acd8900 fffff408'2acd8940 fffff800'06b4B180 00000000'0000000C: NT! Haliacpisleep+0x20a
Fffff408'2acd87b0 fffff800'0B196026: Fffff800'0B4504E0 fffff408'2acd8930 fffff800'0B4504E0 00000000'00000000: NT! Pophandlenextstate+0x1FC
Fffff408'2acd8800 fffff800'0B195D21: 00000000'00000100 fffff800'0B4504E0 00000000'0D26FF13 00000000'00989680: NT! Popıssuenextstate+0x1a
Fffff408'2acd8830 fffff800'0B199439: Fffff408'2acd8b20 00000000'00000000 00000000'00000000 fffff800'0B1991BF: NT! Popınvokesystemstatehandler+0x2b9
Fffff408'2acd8A30 fffff800'0B198D'da: Ffffffff'00000000 ffffffff'ffffffff 00000000'00000000 00000000'00000000: NT! Popendmirroring+0x1e9
Fffff408'2acd8af0 fffff800'0B198AC5: 00000000'00000000 00000000'00000000 00000000'00000001 ffffa48D'5B6a0140: NT! Mmduplicatememory+0x2be
Fffff408'2acd8b80 fffff800'0ab265F5: Ffffa48D'668A5000 ffffa48D'668A5040 fffff800'0B198990 000F8067'bcbbbdff: NT! Poptransitiontosleep+0x135
Fffff408'2acd8C10 fffff800'0AC048D8: Ffff8C01'84300180 ffffa48D'668A5040 fffff800'0ab265a0 00000000'00000000: NT! Pspsystemthreadstartup+0x55
Fffff408'2acd8C60 00000000'00000000: Fffff408'2acd9000 fffff408'2acd3000 00000000'00000000 00000000'00000000: NT! Kistartsystemthread+0x28

Symbol_name: NT! Rtlcompressbufferxpresshuffstandard+18b

Module_name: NT.

Image_name: ntkrnlmp.exe

Image_versıon: 10.0.19041.2965

Stack_command: Cxr. Ecxr; KB.

Bucket_ıd_func_offset: 18b.

Faılure_bucket_ıd: Av_code_av_nt! Rtlcompressbufferxpresshuffstandard

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {7B2E76BD-084C-5A0F-B0B1-C832E9EDad19}

Process_name: Unknown.

Followup: Machineowner.

KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap Manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, type of corruption detected.
Arg2: FffFC19BC0200100, address of the heap that reported the corruption.
Arg3: FffFC19BC0721000, address at which the corruption was detected.
Arg4: 0000000000000000.

Debugging details:
------------------

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 2671.

Key: Analysis. Elapsed. Msec.
Value: 10237.

Key: Analysis. IO. Other. MB.
Value: 0

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 0

Key: Analysis. Init. CPU. Msec.
Value: 437.

Key: Analysis. Init. Elapsed. Msec.
Value: 1648.

Key: Analysis. Memory.commitpeak. MB.
Value: 101.

Key: Bugcheck. Code. Legacyapı.
Value: 0x13a.

Key: Bugcheck. Code. Targetmodel.
Value: 0x13a.

Key: Failure. Bucket.
Value: 0x13a_12_wIN32KFULl! WIN32FREEpoolımpl.

Key: Failure. Hash.
Value: {843942D0-6E70-720F-A960-947D2A487C6F}

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Version.
Value: 10.0.19041.1

Bugcheck_code: 13a.

Bugcheck_p1: 12.

Bugcheck_p2: FffFC19BC0200100.

Bugcheck_p3: FffFC19BC0721000.

Bugcheck_p4: 0

Fıle_ın_cab: 062824-6125-01.dmp

Corruptıng_pool_address: FffFF801432fb390: Unable to get mivisiblestate.
Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
Unable to get NT! Mmspecialpagesınuse.
FffFC19BC0721000.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: Nvd.

Stack_text:
Ffff810e'0dd4F2C8 fffff801'42b91edc: 00000000'0000013A 00000000'00000012 ffffc19b'C0200100 ffffc19b'C0721000: NT! Kebugcheckex.
Ffff810e'0dd4F2D0 fffff801'42b91F3C: 00000000'00000012 ffff810e'0dd4F3e0 ffffc19b'C0200100 ffffc19b'C07ed9D0: NT! Rtlpheaphandleerror+0x40
Ffff810e'0dd4F310 fffff801'42b91b69: Ffffc19b'C0721000 ffffc19b'C0200280 33333333'33333333 ffffc19b'C0200280: NT! Rtlphpheaphandleerror+0x58
Ffff810e'0dd4F340 fffff801'42A22310: 00000083'00000000 ffffc19b'C07df000 ffffc19b'C0200280 ffff810e'0dd4F418: NT! Rtlplogheapfailure+0x45
Ffff810e'0dd4F370 fffff801'42817BB4: 00000000'00000000 00000000'00000083 00000000'00000000 fffff801'00000000: NT! Rtlphpvscontextfree+0x20CA00
Ffff810e'0dd4F410 fffff801'42fb70b9: 00000000'00000210 00000000'00000002 ffffc1EA'909C72e0 01000000'00100000: NT! Exfreeheappool+0x4D4
Ffff810e'0dd4F4F0 ffffc1EA'909C7332: 00000000'00000000 ffffc19b'C060CA90 ffffc19b'C5e07040 ffff810e'0dd4F680: NT! Exfreepool+0x9
Ffff810e'0dd4F520 ffffc1EA'90657A87: 00000000'00000000 ffffc19b'C5e06ad0 ffffc19b'C5e06ad0 ffffc19b'C5e07040: WIN32KFULl! WIN32FREEpoolımpl+0x52
Ffff810e'0dd4F550 ffffc1EA'9065721F: 00000000'00000000 00000000'00000000 ffff810e'0dd4F6a0 fffff801'42C68e4a: WIN32KBASe! WIN32FREEpool+0x37
Ffff810e'0dd4F580 ffffc1EA'90655F0C: 00000000'00000000 00000000'00000000 ffffc19b'C060CA90 ffffc19b'C5e05C10: WIN32KBASe! Drvgetregistryhandlefromdevicemap+0x36b
Ffff810e'0dd4F810 ffffc1EA'90653326: Ffff8C0C'BE73F040 00000000'00000000 00000000'00000000 ffff8C0C'BD12B088: WIN32KBASe! Drvenumdisplaydevices+0x3ec
Ffff810e'0dd4fa00 ffffc1EA'90dee5F1: 00000000'00000020 fffff801'511136FB ffff8C0C'BE73F040 0000026B'99AE6010: WIN32KBASe! Ntuserenumdisplaydevices+0x86
Ffff810e'0dd4fac0 fffff801'42a0F4F8: 000000A7'6F0fa7e0 ffff8C0C'BE73F040 0000026B'998F76b0 00000000'00000000: Win32K! Ntuserenumdisplaydevices+0x15
Ffff810e'0dd4fb00 00007FFC'D51b2D84: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x28
000000A7'6F0fa278 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffc`d51b2d84

Symbol_name: WIN32KFULl! WIN32FREEpoolımpl+52

Module_name: WIN32KFULl.

Image_name: win32kfull.sys

Image_versıon: 10.0.19041.2965

Stack_command: Cxr. Ecxr; KB.

Bucket_ıd_func_offset: 52.

Faılure_bucket_ıd: 0x13a_12_wIN32KFULl! WIN32FREEpoolımpl.

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {843942D0-6E70-720F-A960-947D2A487C6F}

Followup: Machineowner.
 

Technopat Haberler

Geri
Yukarı