Mavi ekran hatası

karakusmehmet

Centipat
Katılım
18 Nisan 2020
Mesajlar
47
Memory management mavi ekran hatası.

Minidump dosyaları ektedir.

Bazen günde bir bazen ise 3 4 güne bir mavi ekran alınmakta.

  • XMP kapalı.
  • Memtest86 testi yapıldı. (Bir kez) hata alınmadı.
  • Driverlar ve Windows son sürüm güncel.
  • 2060 ASUS ekran kartım var.
  • Ryzen 5 3600 işlemci.
  • Crucial 16 GB RAM.
  • 500 GB SSD.
İlgilenirseniz sevinirim.

 
Son düzenleyen: Moderatör:
BIOS ayarlarını sıfırlayın öyle deneyin. Ayrıca RAM'leri anakarta şu şekilde takmalısınız.

Çift kanal kullanıyorsanız:

CPU fan bölümünden sıra olarak bakıp bir RAM'ı 1. slota diğeri 3. slota takmalısınız. Ardından sistemi çalıştırın bu dediklerimi yapıp ve sonuçları paylaşın.

BIOS ayarları sıfırlanıp güncellenmişti. RAM tek parça ve birinci slotta.
 
Serviste yaptılar diyorsun ama emin olmak adına şu Memtest86 ile bellek testini bir de kendin yap. Bunun dışındaki öneriler zaten verilmiş.
Serviste gereken tüm testlerin yapıldığı, iki farklı anakart ile denendiği, Memtest ve bencmark testinden geçildiği ve 0 error alındığı ve oyunlarda test edildiği söylendi.
 
Sorun zaten belleklerdense niye tekrardan bellek testi yapsın arkadaş? Servis yapmışsa yapmıştır arkadaşın kendisinin testi yapma ihtimalini düşünmediler heralde. Kendiside bellek testini yaptığını söylemiş.
Dediğin işlemlerin hepsi daha önce yapıldı dostum.
Yapmadıysa yapsın ama gereksiz RAM bozuk dosyalar bozuk olduğunu söylüyor.
 
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff828000078fc0
Arg3: 0000000089000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3967

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7032

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff828000078fc0

BUGCHECK_P3: 89000000

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT:
fffffe8b`ab7bd0d8 fffff800`3354c03a     : 00000000`0000001a 00000000`00041792 ffff8280`00078fc0 00000000`89000000 : nt!KeBugCheckEx
fffffe8b`ab7bd0e0 fffff800`3354a86f     : ffffe289`f2c99740 00000000`00000000 ffff8280`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
fffffe8b`ab7bd1e0 fffff800`33522ae0     : 00000000`00000001 fffffe8b`00000000 ffffe289`f2c99590 ffffe289`f088c080 : nt!MiDeletePagablePteRange+0x48f
fffffe8b`ab7bd4f0 fffff800`33904aa9     : ffffe289`f4b0ad20 00000000`00000000 ffffe289`00000000 ffffe289`00000000 : nt!MiDeleteVad+0x360
fffffe8b`ab7bd600 fffff800`33903908     : ffffe289`f4b0ad20 ffffe289`f1da5a60 ffffe289`f088c080 00000000`00000000 : nt!MiUnmapVad+0x49
fffffe8b`ab7bd630 fffff800`339027af     : ffffe289`f097ee00 ffffe289`f097ee00 ffffe289`f4b0ad20 ffffe289`f2c990c0 : nt!MiCleanVad+0x30
fffffe8b`ab7bd660 fffff800`337f164f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe289`f2c990c0 : nt!MmCleanProcessAddressSpace+0x137
fffffe8b`ab7bd6e0 fffff800`337e6f96     : ffffe289`f2c990c0 ffff8b80`4515c060 fffffe8b`ab7bd920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
fffffe8b`ab7bd760 fffff800`3387a978     : 00000000`40010004 00000000`00000001 00000000`00000000 00000000`09e4e000 : nt!PspExitThread+0x5f6
fffffe8b`ab7bd860 fffff800`334e2707     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffffe8b`ab7bd8a0 fffff800`335f8b40     : 00000000`116cfe8c fffffe8b`ab7bd950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
fffffe8b`ab7bd950 fffff800`3360605f     : ffffe289`f088c080 00000000`115ce288 fffffe8b`ab7bdaa8 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffffe8b`ab7bda90 00007ffd`70e39014     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`115ce278 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`70e39014


SYMBOL_NAME:  nt!MiDeleteVa+153a

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  153a

FAILURE_BUCKET_ID:  0x1a_41792_nt!MiDeleteVa

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8065f2d8f61, Address of the instruction which caused the bugcheck
Arg3: ffffeb02cf114d70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4140

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 26336

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8065f2d8f61

BUGCHECK_P3: ffffeb02cf114d70

BUGCHECK_P4: 0

CONTEXT:  ffffeb02cf114d70 -- (.cxr 0xffffeb02cf114d70)
rax=ffffeb02cf115830 rbx=0000000000000001 rcx=ffffdb0b448b9fe0
rdx=0000000000000000 rsi=ffffdb0b448b9fe0 rdi=00000000a8ffffe0
rip=fffff8065f2d8f61 rsp=ffffeb02cf115770 rbp=ffffeb02cf115959
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=ffff9f78d3800000 r12=0000000000000000 r13=ffffc487f7c97c40
r14=ffffdb0b448b9fb0 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!SeDefaultObjectMethod+0xb1:
fffff806`5f2d8f61 488b4708        mov     rax,qword ptr [rdi+8] ds:002b:00000000`a8ffffe8=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVDi

STACK_TEXT:
ffffeb02`cf115770 fffff806`5f2bff56     : ffffdb0b`448b9fb0 ffffeb02`cf115959 00000000`00000000 00000000`00000000 : nt!SeDefaultObjectMethod+0xb1
ffffeb02`cf1157d0 fffff806`5eedbaa7     : 00000000`00000000 00000000`00000000 ffffeb02`cf115959 ffffdb0b`448b9fe0 : nt!ObpRemoveObjectRoutine+0xd6
ffffeb02`cf115830 fffff806`5f2ed70e     : ffffdb0b`31cadf00 00000000`00000001 00000000`00000000 ffffffff`ffffffff : nt!ObfDereferenceObjectWithTag+0xc7
ffffeb02`cf115870 fffff806`5f2a4dc5     : 00000000`00000103 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
ffffeb02`cf1159b0 fffff806`5f2a70ad     : 00000000`00000000 ffffdb0b`3d86e580 ffffffff`ffffff01 ffffdb0b`3ecc5518 : nt!ExSweepHandleTable+0xd5
ffffeb02`cf115a60 fffff806`5f1f1647     : ffffffff`ffffffff ffffdb0b`3ecc50c0 ffffeb02`cf115ab0 ffffdb0b`00000000 : nt!ObKillProcess+0x35
ffffeb02`cf115a90 fffff806`5f1e6f96     : ffffdb0b`3ecc50c0 ffffc487`f571f060 ffffeb02`cf115cd0 00000000`00000000 : nt!PspRundownSingleProcess+0x133
ffffeb02`cf115b10 fffff806`5f27a978     : 00000000`40010004 00000000`00000001 00000000`00000000 00000034`915c9000 : nt!PspExitThread+0x5f6
ffffeb02`cf115c10 fffff806`5eee2707     : 00000000`00000000 00000000`09d8fe1c ffffffff`ffffffb3 00000000`76fa1cfc : nt!KiSchedulerApcTerminate+0x38
ffffeb02`cf115c50 fffff806`5eff8b40     : 00000000`00000000 ffffeb02`cf115d00 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffffeb02`cf115d00 fffff806`5f00605f     : ffffdb0b`3d86e500 00000165`812e0000 ffffeb02`d1579b80 ffffdb0b`3ecc50c0 : nt!KiInitiateUserApc+0x70
ffffeb02`cf115e40 00007ff8`e828fba0     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000034`913ae690 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e828fba0


SYMBOL_NAME:  nt!SeDefaultObjectMethod+b1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffeb02cf114d70 ; kb

BUCKET_ID_FUNC_OFFSET:  b1

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!SeDefaultObjectMethod

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0efa101b-e9d0-1362-a826-cbc49be172a8}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80031ed8f61, Address of the instruction which caused the bugcheck
Arg3: ffffaa0da41da9c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7155

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 34188

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80031ed8f61

BUGCHECK_P3: ffffaa0da41da9c0

BUGCHECK_P4: 0

CONTEXT:  ffffaa0da41da9c0 -- (.cxr 0xffffaa0da41da9c0)
rax=ffffaa0da41db480 rbx=0000000000000001 rcx=ffff9888fd9d8fe0
rdx=0000000000000000 rsi=ffff9888fd9d8fe0 rdi=0000000080ffffe0
rip=fffff80031ed8f61 rsp=ffffaa0da41db3c0 rbp=ffffaa0da41db5a9
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=ffffd4fce5400000 r12=0000000000000000 r13=ffffb00ea186bbc0
r14=ffff9888fd9d8fb0 r15=00000000ffff8006
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!SeDefaultObjectMethod+0xb1:
fffff800`31ed8f61 488b4708        mov     rax,qword ptr [rdi+8] ds:002b:00000000`80ffffe8=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MsMpEng.exe

STACK_TEXT:
ffffaa0d`a41db3c0 fffff800`31ebff56     : ffff9888`fd9d8fb0 ffffaa0d`a41db5a9 00000000`00000000 00000000`00000000 : nt!SeDefaultObjectMethod+0xb1
ffffaa0d`a41db420 fffff800`31adbaa7     : 00000000`00000000 00000000`00000000 ffffaa0d`a41db5a9 ffff9888`fd9d8fe0 : nt!ObpRemoveObjectRoutine+0xd6
ffffaa0d`a41db480 fffff800`31eed70e     : ffff9888`e46ab640 00000000`00000001 00000000`00000000 ffffffff`ffffffff : nt!ObfDereferenceObjectWithTag+0xc7
ffffaa0d`a41db4c0 fffff800`31ea4dc5     : 00000000`00000103 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
ffffaa0d`a41db600 fffff800`31ea70ad     : 00000000`00000000 ffff9888`efcb9080 ffffffff`ffffff01 ffff9888`ef2b64d8 : nt!ExSweepHandleTable+0xd5
ffffaa0d`a41db6b0 fffff800`31df1647     : ffffffff`ffffffff ffff9888`ef2b6080 ffffaa0d`a41db700 ffff9888`00000000 : nt!ObKillProcess+0x35
ffffaa0d`a41db6e0 fffff800`31de6f96     : ffff9888`ef2b6080 ffffb00e`a177d970 ffffaa0d`a41db920 00000000`00000000 : nt!PspRundownSingleProcess+0x133
ffffaa0d`a41db760 fffff800`31e7a978     : 00000000`c0000005 ffff9888`00000001 00000086`44cff410 00000086`4380a000 : nt!PspExitThread+0x5f6
ffffaa0d`a41db860 fffff800`31ae2707     : ffffaa0d`a41dba68 fffff800`31ae2950 ffff9888`eeaecb80 00000000`00000001 : nt!KiSchedulerApcTerminate+0x38
ffffaa0d`a41db8a0 fffff800`31bf8b40     : 00000202`e5b14a80 ffffaa0d`a41db950 00000000`80070057 00000086`00000000 : nt!KiDeliverApc+0x487
ffffaa0d`a41db950 fffff800`31c0605f     : ffff9888`efcb9080 00000086`44cff3e8 ffffaa0d`a41dbaa8 ffff9888`ee62a090 : nt!KiInitiateUserApc+0x70
ffffaa0d`a41dba90 00007ffd`b288beb4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000086`44cff3c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b288beb4


SYMBOL_NAME:  nt!SeDefaultObjectMethod+b1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffaa0da41da9c0 ; kb

BUCKET_ID_FUNC_OFFSET:  b1

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!SeDefaultObjectMethod

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0efa101b-e9d0-1362-a826-cbc49be172a8}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: fffff882df298f50, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff882df298ea8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5483

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10272

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 1d

BUGCHECK_P2: fffff882df298f50

BUGCHECK_P3: fffff882df298ea8

BUGCHECK_P4: 0

TRAP_FRAME:  fffff882df298f50 -- (.trap 0xfffff882df298f50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa70f530b1fb8 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffa70f4a66afb8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060ae67319 rsp=fffff882df2990e8 rbp=000000000000005a
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=ffffa70f54eeafb8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!RtlRbRemoveNode+0x19df99:
fffff806`0ae67319 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff882df298ea8 -- (.exr 0xfffff882df298ea8)
ExceptionAddress: fffff8060ae67319 (nt!RtlRbRemoveNode+0x000000000019df99)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffff882`df298c28 fffff806`0ae06569     : 00000000`00000139 00000000`0000001d fffff882`df298f50 fffff882`df298ea8 : nt!KeBugCheckEx
fffff882`df298c30 fffff806`0ae06990     : fffff806`0b64f1c0 fffff806`0acec946 ffff8000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff882`df298d70 fffff806`0ae04d23     : 00000000`00000000 fffffa7d`29c3d1c8 fffff882`df2992b0 ffffa180`001e6600 : nt!KiFastFailDispatch+0xd0
fffff882`df298f50 fffff806`0ae67319     : 00000023`00030000 00010003`005a0003 fffff806`0acc9140 00000000`0000005a : nt!KiRaiseSecurityCheckFailure+0x323
fffff882`df2990e8 fffff806`0acc9140     : 00000000`0000005a ffffa70f`4a66afe0 00000000`00000000 ffffa70f`4a66afb0 : nt!RtlRbRemoveNode+0x19df99
fffff882`df299100 fffff806`0acc8b88     : ffffa70f`3e000280 ffffa70f`4a668000 00000000`00000023 fffff882`df299208 : nt!RtlpHpVsChunkCoalesce+0xb0
fffff882`df299160 fffff806`0acc7514     : 00000000`00000000 ffffa70f`00000000 00000000`00000000 ffff8b88`00000000 : nt!RtlpHpVsContextFree+0x188
fffff882`df299200 fffff806`0b3b1019     : fffff882`00000220 00000000`00000000 ffffa70f`4ac315b8 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffff882`df2992e0 fffff806`08d4cca7     : ffff8b88`f13cc500 ffff8b88`f29dda58 00000000`ffff7fff ffffa70f`4ac315b8 : nt!ExFreePool+0x9
fffff882`df299310 fffff806`08d4c7c6     : ffffa70f`4ac315b8 fffff806`08d3a060 ffffa70f`00000000 ffffffff`ffffffff : FLTMGR!FltReleaseFileNameInformation+0x127
fffff882`df299350 fffff806`08d4c858     : ffff8b88`f29dd9f0 ffff8b88`ed0cd0a0 00000000`00000705 ffffffff`ffffffff : FLTMGR!DeleteNameCacheNodes+0x196
fffff882`df2993b0 fffff806`08d4cd8a     : ffff8b88`f29dd9f0 ffff8b88`f29dd9f8 ffff8b88`f29dd9f0 ffff8b88`f29dd9f0 : FLTMGR!CleanupStreamListCtrl+0x80
fffff882`df2993f0 fffff806`0afcfb09     : ffffa70f`496f3738 ffff8b88`f29dd9f8 00000000`00000000 fffff882`df2998f0 : FLTMGR!DeleteStreamListCtrlCallback+0xba
fffff882`df299430 fffff806`0f10c17b     : ffffa70f`496f3700 fffff882`df299578 fffff882`df2998f0 00000000`00000705 : nt!FsRtlTeardownPerStreamContexts+0xc9
fffff882`df299470 fffff806`0f10bf06     : ffffa70f`496f3700 ffffa70f`4ac26800 ffffa70f`000001b8 fffff806`0f01db42 : Ntfs!NtfsDeleteScb+0x17b
fffff882`df299510 fffff806`0f017b95     : 00000000`00000000 ffffa70f`496f3700 ffffa70f`4ac2d468 00000000`00000000 : Ntfs!NtfsRemoveScb+0x66
fffff882`df299570 fffff806`0f10bc9c     : fffff882`df2998f0 fffff806`0f1579a0 ffffa70f`496f35a0 ffffa70f`496f3900 : Ntfs!NtfsPrepareFcbForRemoval+0x75
fffff882`df2995b0 fffff806`0f01bd40     : fffff882`df2998f0 fffff882`df2996b2 ffffa70f`496f39f8 ffffa70f`496f35a0 : Ntfs!NtfsTeardownStructures+0x9c
fffff882`df299630 fffff806`0f13b547     : fffff882`df299700 ffffa70f`00000000 00000000`00000000 ffffa70f`496f3500 : Ntfs!NtfsDecrementCloseCounts+0xb0
fffff882`df299670 fffff806`0f138061     : fffff882`df2998f0 ffffa70f`496f3700 ffffa70f`496f35a0 ffff8b88`ed0d8180 : Ntfs!NtfsCommonClose+0x467
fffff882`df299750 fffff806`0f157a28     : 00000000`0000001c fffff806`0b725440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
fffff882`df2998b0 fffff806`0ad035f5     : ffff8b88`f13cc500 fffff806`0ac51340 ffff8b88`e6f13a60 ffff8b88`00000000 : Ntfs!NtfsFspClose+0x88
fffff882`df299b70 fffff806`0aca2ae5     : ffff8b88`f13cc500 00000000`00000080 ffff8b88`e6e79040 00000000`00000007 : nt!ExpWorkerThread+0x105
fffff882`df299c10 fffff806`0adfbbf8     : fffff806`078bc180 ffff8b88`f13cc500 fffff806`0aca2a90 00000000`00000007 : nt!PspSystemThreadStartup+0x55
fffff882`df299c60 00000000`00000000     : fffff882`df29a000 fffff882`df294000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.572

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ab43366d-59cb-5971-8e17-b53398bf3f90}

Followup:     Pool_corruption
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff5914c6ad758, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff5d3822be105, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4733

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7403

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff5914c6ad758

BUGCHECK_P2: 0

BUGCHECK_P3: fffff5d3822be105

BUGCHECK_P4: 2

READ_ADDRESS: fffff80664efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80664e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80664e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff5914c6ad758

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  StartMenuExperienceHost.exe

TRAP_FRAME:  fffffe82f4d64990 -- (.trap 0xfffffe82f4d64990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff591c4749a10
rdx=fffffe82f4d64b80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff5d3822be105 rsp=fffffe82f4d64b28 rbp=fffff591c465cc80
r8=fffff5914c6ad758  r9=fffff591c4735008 r10=0000fffff5d3822b
r11=ffffaffedd600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
win32kbase!DirectComposition::CGenericTable<DirectComposition::CResourceMarshaler * __ptr64,DirectComposition::CWeakReferenceBase,1953973060,1>::CompareTableEntries+0x5:
fffff5d3`822be105 498b10          mov     rdx,qword ptr [r8] ds:fffff591`4c6ad758=????????????????
Resetting default scope

STACK_TEXT:
fffffe82`f4d646e8 fffff806`64679b57     : 00000000`00000050 fffff591`4c6ad758 00000000`00000000 fffffe82`f4d64990 : nt!KeBugCheckEx
fffffe82`f4d646f0 fffff806`644ea5e0     : 00000000`00000000 00000000`00000000 fffffe82`f4d64a10 00000000`00000000 : nt!MiSystemFault+0x1716c7
fffffe82`f4d647f0 fffff806`6460275e     : 00000000`00000000 00000000`00000020 fffffe82`f4d64c10 00000000`74774344 : nt!MmAccessFault+0x400
fffffe82`f4d64990 fffff5d3`822be105     : fffff806`64476ee0 fffff806`64bb1010 fffff5d3`814e40b2 00000000`00000000 : nt!KiPageFault+0x35e
fffffe82`f4d64b28 fffff806`64476ee0     : fffff806`64bb1010 fffff5d3`814e40b2 00000000`00000000 fffffe82`f4d64b98 : win32kbase!DirectComposition::CGenericTable<DirectComposition::CResourceMarshaler * __ptr64,DirectComposition::CWeakReferenceBase,1953973060,1>::CompareTableEntries+0x5
fffffe82`f4d64b30 fffff5d3`822bd1e7     : 00000000`00000000 fffff591`c465cc80 00000000`00000000 fffff591`c4735b40 : nt!RtlLookupElementGenericTable+0x30
fffffe82`f4d64b60 fffff5d3`822bd1af     : fffff591`c4749a10 fffffe82`f4d64c10 00000000`00000010 fffffe82`f4d64c80 : win32kbase!DirectComposition::CGenericTable<DirectComposition::CResourceMarshaler * __ptr64,DirectComposition::CWeakReferenceBase,1953973060,1>::RemoveObject+0x2b
fffffe82`f4d64ba0 fffff5d3`822bd146     : fffff591`c4736050 00000000`00000100 00000000`00000000 fffff5d3`823fcf1d : win32kbase!DirectComposition::CApplicationChannel::ReleaseWeakReference+0x3f
fffffe82`f4d64bd0 fffff5d3`822bcf2f     : fffff591`c4736050 00000000`00000000 00000000`00000000 ffffaffe`dd600000 : win32kbase!DirectComposition::CBaseExpressionMarshaler::ReleaseAllReferences+0x26
fffffe82`f4d64c00 fffff5d3`822589ff     : fffff591`c4736050 fffff591`c465cc80 00000000`00000000 00000000`00989680 : win32kbase!DirectComposition::CKeyframeAnimationMarshaler::ReleaseAllReferences+0x1f
fffffe82`f4d64c30 fffff5d3`8225889a     : 00000000`00000000 fffff591`c48a0268 fffff591`c48a02ac 00000000`00000d78 : win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x11b
fffffe82`f4d64c60 fffff5d3`82257245     : fffff591`c465cc80 fffffe82`f4d64ec0 fffff591`c48a02ac fffff591`c48a0280 : win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x82
fffffe82`f4d64ca0 fffff5d3`82256be1     : fffff591`c465cc80 00000000`00000000 00000000`00000000 ffff840c`323d0801 : win32kbase!DirectComposition::CApplicationChannel::ProcessCommandBufferIterator+0x5a5
fffffe82`f4d64d60 fffff5d3`812bedfd     : fffff806`645f0690 fffff806`00000ff8 00000057`a07fdde0 00000057`a07fdde8 : win32kbase!NtDCompositionProcessChannelBatchBuffer+0x1a1
fffffe82`f4d64e00 fffff806`64605fb8     : 00000237`058a0310 ffff840c`2de08540 00000237`799c4440 ffff840c`00000000 : win32k!NtDCompositionProcessChannelBatchBuffer+0x15
fffffe82`f4d64e40 00007ffe`67123724     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000057`a07fdd58 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`67123724


SYMBOL_NAME:  win32kbase!DirectComposition::CGenericTable<DirectComposition::CResourceMarshaler * __ptr64,DirectComposition::CWeakReferenceBase,1953973060,1>::CompareTableEntries+5

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5

FAILURE_BUCKET_ID:  AV_R_INVALID_win32kbase!DirectComposition::CGenericTable_DirectComposition::CResourceMarshaler_*___ptr64,DirectComposition::CWeakReferenceBase,1953973060,1_::CompareTableEntries

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0aa74454-1f18-e53c-a0a5-219090e65132}

Followup:     MachineOwner
---------

Bunları yaptıktan sonra mutlaka geri dönüş yapın. Yeni mavi ekran alırsanız gönderin.
 
Kod:
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff828000078fc0.
Arg3: 0000000089000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3967.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 7032.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41792.

BUGCHECK_P2: ffff828000078fc0.

BUGCHECK_P3: 89000000.

BUGCHECK_P4: 0.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: Discord.exe.

STACK_TEXT:
fffffe8b`ab7bd0d8 fffff800`3354c03a : 00000000`0000001a 00000000`00041792 ffff8280`00078fc0 00000000`89000000 : nt!KeBugCheckEx.
fffffe8b`ab7bd0e0 fffff800`3354a86f : ffffe289`f2c99740 00000000`00000000 ffff8280`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a.
fffffe8b`ab7bd1e0 fffff800`33522ae0 : 00000000`00000001 fffffe8b`00000000 ffffe289`f2c99590 ffffe289`f088c080 : nt!MiDeletePagablePteRange+0x48f.
fffffe8b`ab7bd4f0 fffff800`33904aa9 : ffffe289`f4b0ad20 00000000`00000000 ffffe289`00000000 ffffe289`00000000 : nt!MiDeleteVad+0x360.
fffffe8b`ab7bd600 fffff800`33903908 : ffffe289`f4b0ad20 ffffe289`f1da5a60 ffffe289`f088c080 00000000`00000000 : nt!MiUnmapVad+0x49.
fffffe8b`ab7bd630 fffff800`339027af : ffffe289`f097ee00 ffffe289`f097ee00 ffffe289`f4b0ad20 ffffe289`f2c990c0 : nt!MiCleanVad+0x30.
fffffe8b`ab7bd660 fffff800`337f164f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe289`f2c990c0 : nt!MmCleanProcessAddressSpace+0x137.
fffffe8b`ab7bd6e0 fffff800`337e6f96 : ffffe289`f2c990c0 ffff8b80`4515c060 fffffe8b`ab7bd920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b.
fffffe8b`ab7bd760 fffff800`3387a978 : 00000000`40010004 00000000`00000001 00000000`00000000 00000000`09e4e000 : nt!PspExitThread+0x5f6.
fffffe8b`ab7bd860 fffff800`334e2707 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38.
fffffe8b`ab7bd8a0 fffff800`335f8b40 : 00000000`116cfe8c fffffe8b`ab7bd950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487.
fffffe8b`ab7bd950 fffff800`3360605f : ffffe289`f088c080 00000000`115ce288 fffffe8b`ab7bdaa8 00000000`00000000 : nt!KiInitiateUserApc+0x70.
fffffe8b`ab7bda90 00007ffd`70e39014 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f.
00000000`115ce278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`70e39014.

SYMBOL_NAME: nt!MiDeleteVa+153a.

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.19041.572.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrnlmp.exe.

BUCKET_ID_FUNC_OFFSET: 153a.

FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}

Followup: MachineOwner.
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff8065f2d8f61, Address of the instruction which caused the bugcheck.
Arg3: ffffeb02cf114d70, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4140.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 26336.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff8065f2d8f61.

BUGCHECK_P3: ffffeb02cf114d70.

BUGCHECK_P4: 0.

CONTEXT: ffffeb02cf114d70 -- (.cxr 0xffffeb02cf114d70)
rax=ffffeb02cf115830 rbx=0000000000000001 rcx=ffffdb0b448b9fe0.
rdx=0000000000000000 rsi=ffffdb0b448b9fe0 rdi=00000000a8ffffe0.
rip=fffff8065f2d8f61 rsp=ffffeb02cf115770 rbp=ffffeb02cf115959.
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000.
r11=ffff9f78d3800000 r12=0000000000000000 r13=ffffc487f7c97c40.
r14=ffffdb0b448b9fb0 r15=0000000000000000.
iopl=0 nv up ei pl nz na pe nc.
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050202.
nt!SeDefaultObjectMethod+0xb1:
fffff806`5f2d8f61 488b4708 mov rax,qword ptr [rdi+8] ds:002b:00000000`a8ffffe8=????????????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: NVDi.

STACK_TEXT:
ffffeb02`cf115770 fffff806`5f2bff56 : ffffdb0b`448b9fb0 ffffeb02`cf115959 00000000`00000000 00000000`00000000 : nt!SeDefaultObjectMethod+0xb1.
ffffeb02`cf1157d0 fffff806`5eedbaa7 : 00000000`00000000 00000000`00000000 ffffeb02`cf115959 ffffdb0b`448b9fe0 : nt!ObpRemoveObjectRoutine+0xd6.
ffffeb02`cf115830 fffff806`5f2ed70e : ffffdb0b`31cadf00 00000000`00000001 00000000`00000000 ffffffff`ffffffff : nt!ObfDereferenceObjectWithTag+0xc7.
ffffeb02`cf115870 fffff806`5f2a4dc5 : 00000000`00000103 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e.
ffffeb02`cf1159b0 fffff806`5f2a70ad : 00000000`00000000 ffffdb0b`3d86e580 ffffffff`ffffff01 ffffdb0b`3ecc5518 : nt!ExSweepHandleTable+0xd5.
ffffeb02`cf115a60 fffff806`5f1f1647 : ffffffff`ffffffff ffffdb0b`3ecc50c0 ffffeb02`cf115ab0 ffffdb0b`00000000 : nt!ObKillProcess+0x35.
ffffeb02`cf115a90 fffff806`5f1e6f96 : ffffdb0b`3ecc50c0 ffffc487`f571f060 ffffeb02`cf115cd0 00000000`00000000 : nt!PspRundownSingleProcess+0x133.
ffffeb02`cf115b10 fffff806`5f27a978 : 00000000`40010004 00000000`00000001 00000000`00000000 00000034`915c9000 : nt!PspExitThread+0x5f6.
ffffeb02`cf115c10 fffff806`5eee2707 : 00000000`00000000 00000000`09d8fe1c ffffffff`ffffffb3 00000000`76fa1cfc : nt!KiSchedulerApcTerminate+0x38.
ffffeb02`cf115c50 fffff806`5eff8b40 : 00000000`00000000 ffffeb02`cf115d00 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487.
ffffeb02`cf115d00 fffff806`5f00605f : ffffdb0b`3d86e500 00000165`812e0000 ffffeb02`d1579b80 ffffdb0b`3ecc50c0 : nt!KiInitiateUserApc+0x70.
ffffeb02`cf115e40 00007ff8`e828fba0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f.
00000034`913ae690 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e828fba0.

SYMBOL_NAME: nt!SeDefaultObjectMethod+b1.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.572.

STACK_COMMAND: .cxr 0xffffeb02cf114d70 ; kb.

BUCKET_ID_FUNC_OFFSET: b1.

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!SeDefaultObjectMethod.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {0efa101b-e9d0-1362-a826-cbc49be172a8}

Followup: MachineOwner.
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff80031ed8f61, Address of the instruction which caused the bugcheck.
Arg3: ffffaa0da41da9c0, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 7155.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 34188.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 82.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80031ed8f61.

BUGCHECK_P3: ffffaa0da41da9c0.

BUGCHECK_P4: 0.

CONTEXT: ffffaa0da41da9c0 -- (.cxr 0xffffaa0da41da9c0)
rax=ffffaa0da41db480 rbx=0000000000000001 rcx=ffff9888fd9d8fe0.
rdx=0000000000000000 rsi=ffff9888fd9d8fe0 rdi=0000000080ffffe0.
rip=fffff80031ed8f61 rsp=ffffaa0da41db3c0 rbp=ffffaa0da41db5a9.
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000.
r11=ffffd4fce5400000 r12=0000000000000000 r13=ffffb00ea186bbc0.
r14=ffff9888fd9d8fb0 r15=00000000ffff8006.
iopl=0 nv up ei pl nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202.
nt!SeDefaultObjectMethod+0xb1:
fffff800`31ed8f61 488b4708 mov rax,qword ptr [rdi+8] ds:002b:00000000`80ffffe8=????????????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: MsMpEng.exe.

STACK_TEXT:
ffffaa0d`a41db3c0 fffff800`31ebff56 : ffff9888`fd9d8fb0 ffffaa0d`a41db5a9 00000000`00000000 00000000`00000000 : nt!SeDefaultObjectMethod+0xb1.
ffffaa0d`a41db420 fffff800`31adbaa7 : 00000000`00000000 00000000`00000000 ffffaa0d`a41db5a9 ffff9888`fd9d8fe0 : nt!ObpRemoveObjectRoutine+0xd6.
ffffaa0d`a41db480 fffff800`31eed70e : ffff9888`e46ab640 00000000`00000001 00000000`00000000 ffffffff`ffffffff : nt!ObfDereferenceObjectWithTag+0xc7.
ffffaa0d`a41db4c0 fffff800`31ea4dc5 : 00000000`00000103 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e.
ffffaa0d`a41db600 fffff800`31ea70ad : 00000000`00000000 ffff9888`efcb9080 ffffffff`ffffff01 ffff9888`ef2b64d8 : nt!ExSweepHandleTable+0xd5.
ffffaa0d`a41db6b0 fffff800`31df1647 : ffffffff`ffffffff ffff9888`ef2b6080 ffffaa0d`a41db700 ffff9888`00000000 : nt!ObKillProcess+0x35.
ffffaa0d`a41db6e0 fffff800`31de6f96 : ffff9888`ef2b6080 ffffb00e`a177d970 ffffaa0d`a41db920 00000000`00000000 : nt!PspRundownSingleProcess+0x133.
ffffaa0d`a41db760 fffff800`31e7a978 : 00000000`c0000005 ffff9888`00000001 00000086`44cff410 00000086`4380a000 : nt!PspExitThread+0x5f6.
ffffaa0d`a41db860 fffff800`31ae2707 : ffffaa0d`a41dba68 fffff800`31ae2950 ffff9888`eeaecb80 00000000`00000001 : nt!KiSchedulerApcTerminate+0x38.
ffffaa0d`a41db8a0 fffff800`31bf8b40 : 00000202`e5b14a80 ffffaa0d`a41db950 00000000`80070057 00000086`00000000 : nt!KiDeliverApc+0x487.
ffffaa0d`a41db950 fffff800`31c0605f : ffff9888`efcb9080 00000086`44cff3e8 ffffaa0d`a41dbaa8 ffff9888`ee62a090 : nt!KiInitiateUserApc+0x70.
ffffaa0d`a41dba90 00007ffd`b288beb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f.
00000086`44cff3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b288beb4.

SYMBOL_NAME: nt!SeDefaultObjectMethod+b1.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.572.

STACK_COMMAND: .cxr 0xffffaa0da41da9c0 ; kb.

BUCKET_ID_FUNC_OFFSET: b1.

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!SeDefaultObjectMethod.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {0efa101b-e9d0-1362-a826-cbc49be172a8}

Followup: MachineOwner.
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation.
Arg2: fffff882df298f50, Address of the trap frame for the exception that caused the bugcheck.
Arg3: fffff882df298ea8, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 5483.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 10272.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 90.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 139.

BUGCHECK_P1: 1d.

BUGCHECK_P2: fffff882df298f50.

BUGCHECK_P3: fffff882df298ea8.

BUGCHECK_P4: 0.

TRAP_FRAME: fffff882df298f50 -- (.trap 0xfffff882df298f50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa70f530b1fb8 rbx=0000000000000000 rcx=000000000000001d.
rdx=ffffa70f4a66afb8 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8060ae67319 rsp=fffff882df2990e8 rbp=000000000000005a.
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000.
r11=ffffa70f54eeafb8 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po nc.
nt!RtlRbRemoveNode+0x19df99:
fffff806`0ae67319 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: fffff882df298ea8 -- (.exr 0xfffff882df298ea8)
ExceptionAddress: fffff8060ae67319 (nt!RtlRbRemoveNode+0x000000000019df99)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1.
Parameter[0]: 000000000000001d.
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 000000000000001d.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
fffff882`df298c28 fffff806`0ae06569 : 00000000`00000139 00000000`0000001d fffff882`df298f50 fffff882`df298ea8 : nt!KeBugCheckEx.
fffff882`df298c30 fffff806`0ae06990 : fffff806`0b64f1c0 fffff806`0acec946 ffff8000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69.
fffff882`df298d70 fffff806`0ae04d23 : 00000000`00000000 fffffa7d`29c3d1c8 fffff882`df2992b0 ffffa180`001e6600 : nt!KiFastFailDispatch+0xd0.
fffff882`df298f50 fffff806`0ae67319 : 00000023`00030000 00010003`005a0003 fffff806`0acc9140 00000000`0000005a : nt!KiRaiseSecurityCheckFailure+0x323.
fffff882`df2990e8 fffff806`0acc9140 : 00000000`0000005a ffffa70f`4a66afe0 00000000`00000000 ffffa70f`4a66afb0 : nt!RtlRbRemoveNode+0x19df99.
fffff882`df299100 fffff806`0acc8b88 : ffffa70f`3e000280 ffffa70f`4a668000 00000000`00000023 fffff882`df299208 : nt!RtlpHpVsChunkCoalesce+0xb0.
fffff882`df299160 fffff806`0acc7514 : 00000000`00000000 ffffa70f`00000000 00000000`00000000 ffff8b88`00000000 : nt!RtlpHpVsContextFree+0x188.
fffff882`df299200 fffff806`0b3b1019 : fffff882`00000220 00000000`00000000 ffffa70f`4ac315b8 01000000`00100000 : nt!ExFreeHeapPool+0x4d4.
fffff882`df2992e0 fffff806`08d4cca7 : ffff8b88`f13cc500 ffff8b88`f29dda58 00000000`ffff7fff ffffa70f`4ac315b8 : nt!ExFreePool+0x9.
fffff882`df299310 fffff806`08d4c7c6 : ffffa70f`4ac315b8 fffff806`08d3a060 ffffa70f`00000000 ffffffff`ffffffff : FLTMGR!FltReleaseFileNameInformation+0x127.
fffff882`df299350 fffff806`08d4c858 : ffff8b88`f29dd9f0 ffff8b88`ed0cd0a0 00000000`00000705 ffffffff`ffffffff : FLTMGR!DeleteNameCacheNodes+0x196.
fffff882`df2993b0 fffff806`08d4cd8a : ffff8b88`f29dd9f0 ffff8b88`f29dd9f8 ffff8b88`f29dd9f0 ffff8b88`f29dd9f0 : FLTMGR!CleanupStreamListCtrl+0x80.
fffff882`df2993f0 fffff806`0afcfb09 : ffffa70f`496f3738 ffff8b88`f29dd9f8 00000000`00000000 fffff882`df2998f0 : FLTMGR!DeleteStreamListCtrlCallback+0xba.
fffff882`df299430 fffff806`0f10c17b : ffffa70f`496f3700 fffff882`df299578 fffff882`df2998f0 00000000`00000705 : nt!FsRtlTeardownPerStreamContexts+0xc9.
fffff882`df299470 fffff806`0f10bf06 : ffffa70f`496f3700 ffffa70f`4ac26800 ffffa70f`000001b8 fffff806`0f01db42 : Ntfs!NtfsDeleteScb+0x17b.
fffff882`df299510 fffff806`0f017b95 : 00000000`00000000 ffffa70f`496f3700 ffffa70f`4ac2d468 00000000`00000000 : Ntfs!NtfsRemoveScb+0x66.
fffff882`df299570 fffff806`0f10bc9c : fffff882`df2998f0 fffff806`0f1579a0 ffffa70f`496f35a0 ffffa70f`496f3900 : Ntfs!NtfsPrepareFcbForRemoval+0x75.
fffff882`df2995b0 fffff806`0f01bd40 : fffff882`df2998f0 fffff882`df2996b2 ffffa70f`496f39f8 ffffa70f`496f35a0 : Ntfs!NtfsTeardownStructures+0x9c.
fffff882`df299630 fffff806`0f13b547 : fffff882`df299700 ffffa70f`00000000 00000000`00000000 ffffa70f`496f3500 : Ntfs!NtfsDecrementCloseCounts+0xb0.
fffff882`df299670 fffff806`0f138061 : fffff882`df2998f0 ffffa70f`496f3700 ffffa70f`496f35a0 ffff8b88`ed0d8180 : Ntfs!NtfsCommonClose+0x467.
fffff882`df299750 fffff806`0f157a28 : 00000000`0000001c fffff806`0b725440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241.
fffff882`df2998b0 fffff806`0ad035f5 : ffff8b88`f13cc500 fffff806`0ac51340 ffff8b88`e6f13a60 ffff8b88`00000000 : Ntfs!NtfsFspClose+0x88.
fffff882`df299b70 fffff806`0aca2ae5 : ffff8b88`f13cc500 00000000`00000080 ffff8b88`e6e79040 00000000`00000007 : nt!ExpWorkerThread+0x105.
fffff882`df299c10 fffff806`0adfbbf8 : fffff806`078bc180 ffff8b88`f13cc500 fffff806`0aca2a90 00000000`00000007 : nt!PspSystemThreadStartup+0x55.
fffff882`df299c60 00000000`00000000 : fffff882`df29a000 fffff882`df294000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28.

SYMBOL_NAME: nt!ExFreePool+9.

IMAGE_NAME: Pool_Corruption.

IMAGE_VERSION: 10.0.19041.572.

MODULE_NAME: Pool_Corruption.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 9.

FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {ab43366d-59cb-5971-8e17-b53398bf3f90}

Followup: Pool_corruption.
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff5914c6ad758, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff5d3822be105, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4733.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 7403.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 85.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 50.

BUGCHECK_P1: fffff5914c6ad758.

BUGCHECK_P2: 0.

BUGCHECK_P3: fffff5d3822be105.

BUGCHECK_P4: 2.

READ_ADDRESS: fffff80664efb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80664e0f340: Unable to get Flags value from nt!KdVersionBlock.
fffff80664e0f340: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
fffff5914c6ad758.

MM_INTERNAL_CODE: 2.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: StartMenuExperienceHost.exe.

TRAP_FRAME: fffffe82f4d64990 -- (.trap 0xfffffe82f4d64990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff591c4749a10.
rdx=fffffe82f4d64b80 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff5d3822be105 rsp=fffffe82f4d64b28 rbp=fffff591c465cc80.
r8=fffff5914c6ad758 r9=fffff591c4735008 r10=0000fffff5d3822b.
r11=ffffaffedd600000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
win32kbase!DirectComposition::CGenericTable<DirectComposition::CResourceMarshaler * __ptr64,DirectComposition::CWeakReferenceBase,1953973060,1>::CompareTableEntries+0x5:
fffff5d3`822be105 498b10 mov rdx,qword ptr [r8] ds:fffff591`4c6ad758=????????????????
Resetting default scope.

STACK_TEXT:
fffffe82`f4d646e8 fffff806`64679b57 : 00000000`00000050 fffff591`4c6ad758 00000000`00000000 fffffe82`f4d64990 : nt!KeBugCheckEx.
fffffe82`f4d646f0 fffff806`644ea5e0 : 00000000`00000000 00000000`00000000 fffffe82`f4d64a10 00000000`00000000 : nt!MiSystemFault+0x1716c7.
fffffe82`f4d647f0 fffff806`6460275e : 00000000`00000000 00000000`00000020 fffffe82`f4d64c10 00000000`74774344 : nt!MmAccessFault+0x400.
fffffe82`f4d64990 fffff5d3`822be105 : fffff806`64476ee0 fffff806`64bb1010 fffff5d3`814e40b2 00000000`00000000 : nt!KiPageFault+0x35e.
fffffe82`f4d64b28 fffff806`64476ee0 : fffff806`64bb1010 fffff5d3`814e40b2 00000000`00000000 fffffe82`f4d64b98 : win32kbase!DirectComposition::CGenericTable<DirectComposition::CResourceMarshaler * __ptr64,DirectComposition::CWeakReferenceBase,1953973060,1>::CompareTableEntries+0x5.
fffffe82`f4d64b30 fffff5d3`822bd1e7 : 00000000`00000000 fffff591`c465cc80 00000000`00000000 fffff591`c4735b40 : nt!RtlLookupElementGenericTable+0x30.
fffffe82`f4d64b60 fffff5d3`822bd1af : fffff591`c4749a10 fffffe82`f4d64c10 00000000`00000010 fffffe82`f4d64c80 : win32kbase!DirectComposition::CGenericTable<DirectComposition::CResourceMarshaler * __ptr64,DirectComposition::CWeakReferenceBase,1953973060,1>::RemoveObject+0x2b.
fffffe82`f4d64ba0 fffff5d3`822bd146 : fffff591`c4736050 00000000`00000100 00000000`00000000 fffff5d3`823fcf1d : win32kbase!DirectComposition::CApplicationChannel::ReleaseWeakReference+0x3f.
fffffe82`f4d64bd0 fffff5d3`822bcf2f : fffff591`c4736050 00000000`00000000 00000000`00000000 ffffaffe`dd600000 : win32kbase!DirectComposition::CBaseExpressionMarshaler::ReleaseAllReferences+0x26.
fffffe82`f4d64c00 fffff5d3`822589ff : fffff591`c4736050 fffff591`c465cc80 00000000`00000000 00000000`00989680 : win32kbase!DirectComposition::CKeyframeAnimationMarshaler::ReleaseAllReferences+0x1f.
fffffe82`f4d64c30 fffff5d3`8225889a : 00000000`00000000 fffff591`c48a0268 fffff591`c48a02ac 00000000`00000d78 : win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x11b.
fffffe82`f4d64c60 fffff5d3`82257245 : fffff591`c465cc80 fffffe82`f4d64ec0 fffff591`c48a02ac fffff591`c48a0280 : win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x82.
fffffe82`f4d64ca0 fffff5d3`82256be1 : fffff591`c465cc80 00000000`00000000 00000000`00000000 ffff840c`323d0801 : win32kbase!DirectComposition::CApplicationChannel::processCommandBufferIterator+0x5a5.
fffffe82`f4d64d60 fffff5d3`812bedfd : fffff806`645f0690 fffff806`00000ff8 00000057`a07fdde0 00000057`a07fdde8 : win32kbase!NtDCompositionProcessChannelBatchBuffer+0x1a1.
fffffe82`f4d64e00 fffff806`64605fb8 : 00000237`058a0310 ffff840c`2de08540 00000237`799c4440 ffff840c`00000000 : win32k!NtDCompositionProcessChannelBatchBuffer+0x15.
fffffe82`f4d64e40 00007ffe`67123724 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000057`a07fdd58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`67123724.

SYMBOL_NAME: win32kbase!DirectComposition::CGenericTable<DirectComposition::CResourceMarshaler * __ptr64,DirectComposition::CWeakReferenceBase,1953973060,1>::CompareTableEntries+5.

MODULE_NAME: win32kbase.

IMAGE_NAME: win32kbase.sys.

IMAGE_VERSION: 10.0.19041.572.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 5.

FAILURE_BUCKET_ID: AV_R_INVALID_win32kbase!DirectComposition::CGenericTable_DirectComposition::CResourceMarshaler_*___ptr64,DirectComposition::CWeakReferenceBase,1953973060,1_::CompareTableEntries.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {0aa74454-1f18-e53c-a0a5-219090e65132}

Followup: MachineOwner.
---------

Bunları yaptıktan sonra mutlaka geri dönüş yapın. Yeni mavi ekran alırsanız gönderin.

RAM garantiye gitti ve 2 hafta sonra geri geldi hiçbir sorun yokmus.
 
RAM garantiye gitti ve 2 hafta sonra geri geldi. Hiçbir sorun yokmuş.
Ben de diyorum ki, RAM'lerde sorun var. Daha önce de MemTest86 yapmanız söylendi ancak hiçbir test sonucu paylaşmamışsınız. Denileni yapmayacaksanız yeni konu açıp durmayın.
 

Geri
Yukarı