Bellek testi yapın.
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Ek MSI yazılımlarını, EAC'i kaldırın. Afterburner ile ekran kartına herhangi bir işlem yaptıysanız sıfırlayın.
Easy anti cheat.EAC ne demek?
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80669abf23a, Address of the instruction which caused the bugcheck
Arg3: ffffec0c00ec9d30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4890
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12125
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80669abf23a
BUGCHECK_P3: ffffec0c00ec9d30
BUGCHECK_P4: 0
CONTEXT: ffffec0c00ec9d30 -- (.cxr 0xffffec0c00ec9d30)
rax=0000000000000000 rbx=9711302f03f00196 rcx=0000000000000011
rdx=fffff8066a124f60 rsi=fffff8066a124f60 rdi=ffff568eac125080
rip=fffff80669abf23a rsp=ffffec0c00eca730 rbp=ffffa902aa3e7080
r8=ffffec0c00eca740 r9=ffffd68eaf929580 r10=ffffd68eaf929580
r11=0000000000000673 r12=ffffd68eaf929490 r13=000000000000005c
r14=ffffd68ec1e8fe80 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!ObLogSecurityDescriptor+0x9a:
fffff806`69abf23a 48395f10 cmp qword ptr [rdi+10h],rbx ds:002b:ffff568e`ac125090=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffec0c`00eca730 fffff806`69abe63c : ffffec0c`000000f4 ffffec0c`00eca7e8 00000000`00000010 00000000`000000f4 : nt!ObLogSecurityDescriptor+0x9a
ffffec0c`00eca7b0 fffff806`69abf05a : 00000000`00000000 ffffd68e`b55ef0a0 00000000`00000000 ffffd68e`b55ef0a0 : nt!ObSetSecurityDescriptorInfo+0x9c
ffffec0c`00eca810 fffff806`69ac02b9 : 00000000`000f01ff 00000000`00000000 ffffd68e`b45ecb50 fffff806`69aafb96 : nt!SeDefaultObjectMethod+0x11a
ffffec0c`00eca870 fffff806`69abe95c : ffffd68e`b0b64420 ffffd68e`00000004 00000000`00000002 ffffd68e`b0b64450 : nt!ObSetSecurityObjectByPointer+0x89
ffffec0c`00eca8d0 fffff806`699fbc7e : ffffd68e`ba3c7c01 00000000`00000000 00000000`00000000 ffffec0c`00ecab80 : nt!SepAppendAceToTokenObjectAcl+0x22c
ffffec0c`00eca9a0 fffff806`698058b8 : 00000086`241fde10 ffffa902`aa3e7080 00000086`241fdd88 00000086`241fde78 : nt!NtCreateLowBoxToken+0x4ee
ffffec0c`00ecaa90 00007ffa`3b74d3d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000086`241fdd68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`3b74d3d4
SYMBOL_NAME: nt!ObLogSecurityDescriptor+9a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .cxr 0xffffec0c00ec9d30 ; kb
BUCKET_ID_FUNC_OFFSET: 9a
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObLogSecurityDescriptor
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c7451bc4-8d5e-bc70-86b5-535f25d13589}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: fffffd005cade490, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffd005cade3e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3561
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5965
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: fffffd005cade490
BUGCHECK_P3: fffffd005cade3e8
BUGCHECK_P4: 0
TRAP_FRAME: fffffd005cade490 -- (.trap 0xfffffd005cade490)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbe80d7010f78 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff9e80d7010f78 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807054666c7 rsp=fffffd005cade628 rbp=0000000000000076
r8=0000000000000000 r9=ffff9e80e71fcf78 r10=0000000000000000
r11=ffff9e80d5cbbf78 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlRbRemoveNode+0x198c17:
fffff807`054666c7 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffd005cade3e8 -- (.exr 0xfffffd005cade3e8)
ExceptionAddress: fffff807054666c7 (nt!RtlRbRemoveNode+0x0000000000198c17)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffd00`5cade168 fffff807`05405e69 : 00000000`00000139 00000000`0000001d fffffd00`5cade490 fffffd00`5cade3e8 : nt!KeBugCheckEx
fffffd00`5cade170 fffff807`05406290 : ffff9e80`dd96dde0 00000000`000000c0 00000000`000000e0 ffff9e80`00000001 : nt!KiBugCheckDispatch+0x69
fffffd00`5cade2b0 fffff807`05404623 : 00000000`00001001 00000000`00000fff 00000000`000f01ff 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffd00`5cade490 fffff807`054666c7 : 00000022`00070000 00010007`00760001 fffff807`052cd870 00000000`00000076 : nt!KiRaiseSecurityCheckFailure+0x323
fffffd00`5cade628 fffff807`052cd870 : 00000000`00000076 ffff9e80`d7010fe0 00000000`00000000 ffff9e80`d7010f70 : nt!RtlRbRemoveNode+0x198c17
fffffd00`5cade640 fffff807`052cd2b8 : ffff9e80`d3200280 ffff9e80`d7002000 ffff9e80`d3200280 fffffd00`5cade748 : nt!RtlpHpVsChunkCoalesce+0xb0
fffffd00`5cade6a0 fffff807`052cbc44 : 00000000`00000000 ffffda87`00000000 00000000`00000000 fffffd00`00000000 : nt!RtlpHpVsContextFree+0x188
fffffd00`5cade740 fffff807`059b2019 : 00000000`00000750 ffff9e80`dc6bf010 00000000`000006c0 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffffd00`5cade820 fffff807`056a4b84 : ffff9e80`dc6bf030 ffff9e80`dc6bf030 ffffda87`b76ab900 ffffda87`c29f0c40 : nt!ExFreePool+0x9
fffffd00`5cade850 fffff807`056a4998 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194
fffffd00`5cade8b0 fffff807`052dffc7 : 00000000`00000000 00000000`00000000 fffffd00`5cadea39 ffff9e80`dc6bf060 : nt!ObpRemoveObjectRoutine+0x88
fffffd00`5cade910 fffff807`056d243e : ffffda87`b76ab900 00000000`00000001 ffffffff`ffffffff ffff9e80`e2cd7180 : nt!ObfDereferenceObjectWithTag+0xc7
fffffd00`5cade950 fffff807`056d60bc : 00000000`00001460 ffffda87`c31ef040 000000f6`d90ff218 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
fffffd00`5cadea90 fffff807`054058b8 : ffffda87`c31ef000 ffffda87`c303edd0 fffffd00`5cadeb80 ffffda87`0000a048 : nt!NtClose+0xec
fffffd00`5cadeb00 00007ff9`06d6bfa4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f6`d90ff438 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`06d6bfa4
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.508
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ab43366d-59cb-5971-8e17-b53398bf3f90}
Followup: Pool_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd2092175d3b0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8035f5dd3cf, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4718
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 64341
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffd2092175d3b0
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8035f5dd3cf
BUGCHECK_P4: 2
READ_ADDRESS: fffff8034d4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8034d40f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8034d40f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffd2092175d3b0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LockApp.exe
TRAP_FRAME: fffff004daab5530 -- (.trap 0xfffff004daab5530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8035f5dd3cf rbx=0000000000000000 rcx=fffff004daab57a8
rdx=ffffda0917e75000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8035f5dd3cf rsp=fffff004daab56c0 rbp=ffffda0917e75000
r8=0000000000000000 r9=0000000000000000 r10=0000fffff8035f63
r11=ffffb7785c000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nvlddmkm+0xc1d3cf:
fffff803`5f5dd3cf 8b9ef0000000 mov ebx,dword ptr [rsi+0F0h] ds:00000000`000000f0=????????
Resetting default scope
STACK_TEXT:
fffff004`daab5288 fffff803`4cc86729 : 00000000`00000050 ffffd209`2175d3b0 00000000`00000000 fffff004`daab5530 : nt!KeBugCheckEx
fffff004`daab5290 fffff803`4caeeb80 : ffffda09`1a130101 00000000`00000000 fffff004`daab55b0 00000000`00000000 : nt!MiSystemFault+0x13faf9
fffff004`daab5390 fffff803`4cc0205e : 00000000`00000040 00000000`000005e4 00000000`00000002 ffffda09`24ae6780 : nt!MmAccessFault+0x400
fffff004`daab5530 fffff803`5f5dd3cf : ffffda09`17e75000 ffffda09`17e75000 ffffda09`1a9e6010 fffff004`daab5819 : nt!KiPageFault+0x35e
fffff004`daab56c0 ffffda09`17e75000 : ffffda09`17e75000 ffffda09`1a9e6010 fffff004`daab5819 ffffda09`17c52dd0 : nvlddmkm+0xc1d3cf
fffff004`daab56c8 ffffda09`17e75000 : ffffda09`1a9e6010 fffff004`daab5819 ffffda09`17c52dd0 01000000`00100000 : 0xffffda09`17e75000
fffff004`daab56d0 ffffda09`1a9e6010 : fffff004`daab5819 ffffda09`17c52dd0 01000000`00100000 ffffda09`22a232b0 : 0xffffda09`17e75000
fffff004`daab56d8 fffff004`daab5819 : ffffda09`17c52dd0 01000000`00100000 ffffda09`22a232b0 fffff803`5f1cd9cf : 0xffffda09`1a9e6010
fffff004`daab56e0 ffffda09`17c52dd0 : 01000000`00100000 ffffda09`22a232b0 fffff803`5f1cd9cf 00000000`00000000 : 0xfffff004`daab5819
fffff004`daab56e8 01000000`00100000 : ffffda09`22a232b0 fffff803`5f1cd9cf 00000000`00000000 fffff803`4cc6c387 : 0xffffda09`17c52dd0
fffff004`daab56f0 ffffda09`22a232b0 : fffff803`5f1cd9cf 00000000`00000000 fffff803`4cc6c387 ffffda09`18362a10 : 0x01000000`00100000
fffff004`daab56f8 fffff803`5f1cd9cf : 00000000`00000000 fffff803`4cc6c387 ffffda09`18362a10 fffff004`daab5769 : 0xffffda09`22a232b0
fffff004`daab5700 00000000`00000000 : fffff803`4cc6c387 ffffda09`18362a10 fffff004`daab5769 00000000`00000001 : nvlddmkm+0x80d9cf
SYMBOL_NAME: nvlddmkm+c1d3cf
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: c1d3cf
FAILURE_BUCKET_ID: AV_R_INVALID_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e90a4ef4-7822-d3fe-1570-e91273858ed6}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8046c8c932c, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3061
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3867
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8046c8c932c
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff8046d2fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8046d20f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8046d20f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
BAD_STACK_POINTER: fffff80471880158
STACK_TEXT:
fffff804`71880158 fffff804`6caf4d4e : 00000000`0000001e ffffffff`c0000005 fffff804`6c8c932c 00000000`00000000 : nt!KeBugCheckEx
fffff804`71880160 fffff804`6c9fcd62 : fffff804`6caf4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff804`718801a0 fffff804`6c885027 : fffff804`71880710 00000000`00000000 fffff804`71872fb0 fffff804`6c9faee5 : nt!RtlpExecuteHandlerForException+0x12
fffff804`718801d0 fffff804`6c883ce6 : fffff804`71872108 fffff804`71880e20 fffff804`71872108 00000000`00000000 : nt!RtlDispatchException+0x297
fffff804`718808f0 fffff804`6c9f4d32 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff804`71880fb0 fffff804`6c9f4d00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff804`71871fc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
SYMBOL_NAME: nt!KeSetEvent+12c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12c
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!KeSetEvent
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5b67424c-419d-c5a3-8e34-77d4a1bf1db0}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff8a8103ce4038
Arg3: 0000020000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3311
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3310
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff8a8103ce4038
BUGCHECK_P3: 20000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RuntimeBroker.exe
STACK_TEXT:
ffffda06`693a2d58 fffff804`1692abba : 00000000`0000001a 00000000`00041792 ffff8a81`03ce4038 00000200`00000000 : nt!KeBugCheckEx
ffffda06`693a2d60 fffff804`168edc06 : 00000000`00000000 ffffda06`693a3330 00000000`00000026 ffff8a81`03ce4038 : nt!MiDeleteVa+0x153a
ffffda06`693a2e60 fffff804`168edd1b : ffff8ac5`4081e720 ffffe006`ad5a8700 ffffda06`00000000 ffffda06`693a32d0 : nt!MiWalkPageTablesRecursively+0x776
ffffda06`693a2f00 fffff804`168edd1b : ffff8ac5`62a040f0 ffffe006`ad5a8700 ffffda06`00000001 ffffda06`693a32e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffda06`693a2fa0 fffff804`168edd1b : ffff8ac5`62a04000 ffffe006`ad5a8700 ffffda06`00000002 ffffda06`693a32f0 : nt!MiWalkPageTablesRecursively+0x88b
ffffda06`693a3040 fffff804`168dcbfb : 00000000`00000000 ffffe006`ad5a8700 00000000`00000003 ffffda06`693a3300 : nt!MiWalkPageTablesRecursively+0x88b
ffffda06`693a30e0 fffff804`16929451 : ffffda06`693a3280 ffffe006`00000000 ffff8a81`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffda06`693a31e0 fffff804`16901670 : 00000000`00000001 ffffda06`00000000 ffffe006`ad5a8550 ffffe006`b252a640 : nt!MiDeletePagablePteRange+0x4f1
ffffda06`693a34f0 fffff804`16c999e9 : ffffe006`b83c0440 00000000`00000000 ffffe006`00000000 ffffe006`00000000 : nt!MiDeleteVad+0x360
ffffda06`693a3600 fffff804`16c9938c : ffffe006`b83c0440 ffffe006`addedc00 ffffe006`b252a640 00000000`00000000 : nt!MiUnmapVad+0x49
ffffda06`693a3630 fffff804`16ce4dd3 : ffffe006`b83c2380 ffffe006`b83c2380 ffffe006`b83c0440 ffffe006`ad5a8080 : nt!MiCleanVad+0x30
ffffda06`693a3660 fffff804`16c81f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe006`ad5a8080 : nt!MmCleanProcessAddressSpace+0x137
ffffda06`693a36e0 fffff804`16c9ea8a : ffffe006`ad5a8080 ffffc90d`d2eef730 ffffda06`693a3920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffda06`693a3760 fffff804`16bf4558 : 00000000`40010004 00000000`00000001 00000000`00000000 0000001c`915dc000 : nt!PspExitThread+0x5f6
ffffda06`693a3860 fffff804`168e6ca7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffda06`693a38a0 fffff804`169f8440 : 00000207`9c506030 ffffda06`693a3950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffffda06`693a3950 fffff804`16a0595f : ffffe006`b252a640 ffffda06`693a3b80 0000001c`9187f3f8 ffffda06`693a3aa8 : nt!KiInitiateUserApc+0x70
ffffda06`693a3a90 00007ffc`0130a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000001c`9187fa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0130a104
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
Belleklerinizde sorun var. İlk olarak bir test edin:
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80669abf23a, Address of the instruction which caused the bugcheck Arg3: ffffec0c00ec9d30, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4890 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 12125 Key : Analysis.Memory.CommitPeak.Mb Value: 77 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80669abf23a BUGCHECK_P3: ffffec0c00ec9d30 BUGCHECK_P4: 0 CONTEXT: ffffec0c00ec9d30 -- (.cxr 0xffffec0c00ec9d30) rax=0000000000000000 rbx=9711302f03f00196 rcx=0000000000000011 rdx=fffff8066a124f60 rsi=fffff8066a124f60 rdi=ffff568eac125080 rip=fffff80669abf23a rsp=ffffec0c00eca730 rbp=ffffa902aa3e7080 r8=ffffec0c00eca740 r9=ffffd68eaf929580 r10=ffffd68eaf929580 r11=0000000000000673 r12=ffffd68eaf929490 r13=000000000000005c r14=ffffd68ec1e8fe80 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282 nt!ObLogSecurityDescriptor+0x9a: fffff806`69abf23a 48395f10 cmp qword ptr [rdi+10h],rbx ds:002b:ffff568e`ac125090=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe STACK_TEXT: ffffec0c`00eca730 fffff806`69abe63c : ffffec0c`000000f4 ffffec0c`00eca7e8 00000000`00000010 00000000`000000f4 : nt!ObLogSecurityDescriptor+0x9a ffffec0c`00eca7b0 fffff806`69abf05a : 00000000`00000000 ffffd68e`b55ef0a0 00000000`00000000 ffffd68e`b55ef0a0 : nt!ObSetSecurityDescriptorInfo+0x9c ffffec0c`00eca810 fffff806`69ac02b9 : 00000000`000f01ff 00000000`00000000 ffffd68e`b45ecb50 fffff806`69aafb96 : nt!SeDefaultObjectMethod+0x11a ffffec0c`00eca870 fffff806`69abe95c : ffffd68e`b0b64420 ffffd68e`00000004 00000000`00000002 ffffd68e`b0b64450 : nt!ObSetSecurityObjectByPointer+0x89 ffffec0c`00eca8d0 fffff806`699fbc7e : ffffd68e`ba3c7c01 00000000`00000000 00000000`00000000 ffffec0c`00ecab80 : nt!SepAppendAceToTokenObjectAcl+0x22c ffffec0c`00eca9a0 fffff806`698058b8 : 00000086`241fde10 ffffa902`aa3e7080 00000086`241fdd88 00000086`241fde78 : nt!NtCreateLowBoxToken+0x4ee ffffec0c`00ecaa90 00007ffa`3b74d3d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000086`241fdd68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`3b74d3d4 SYMBOL_NAME: nt!ObLogSecurityDescriptor+9a MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.508 STACK_COMMAND: .cxr 0xffffec0c00ec9d30 ; kb BUCKET_ID_FUNC_OFFSET: 9a FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObLogSecurityDescriptor OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c7451bc4-8d5e-bc70-86b5-535f25d13589} Followup: MachineOwner --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 000000000000001d, Type of memory safety violation Arg2: fffffd005cade490, Address of the trap frame for the exception that caused the bugcheck Arg3: fffffd005cade3e8, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3561 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 5965 Key : Analysis.Memory.CommitPeak.Mb Value: 82 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 139 BUGCHECK_P1: 1d BUGCHECK_P2: fffffd005cade490 BUGCHECK_P3: fffffd005cade3e8 BUGCHECK_P4: 0 TRAP_FRAME: fffffd005cade490 -- (.trap 0xfffffd005cade490) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffbe80d7010f78 rbx=0000000000000000 rcx=000000000000001d rdx=ffff9e80d7010f78 rsi=0000000000000000 rdi=0000000000000000 rip=fffff807054666c7 rsp=fffffd005cade628 rbp=0000000000000076 r8=0000000000000000 r9=ffff9e80e71fcf78 r10=0000000000000000 r11=ffff9e80d5cbbf78 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!RtlRbRemoveNode+0x198c17: fffff807`054666c7 cd29 int 29h Resetting default scope EXCEPTION_RECORD: fffffd005cade3e8 -- (.exr 0xfffffd005cade3e8) ExceptionAddress: fffff807054666c7 (nt!RtlRbRemoveNode+0x0000000000198c17) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 000000000000001d Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 000000000000001d EXCEPTION_STR: 0xc0000409 STACK_TEXT: fffffd00`5cade168 fffff807`05405e69 : 00000000`00000139 00000000`0000001d fffffd00`5cade490 fffffd00`5cade3e8 : nt!KeBugCheckEx fffffd00`5cade170 fffff807`05406290 : ffff9e80`dd96dde0 00000000`000000c0 00000000`000000e0 ffff9e80`00000001 : nt!KiBugCheckDispatch+0x69 fffffd00`5cade2b0 fffff807`05404623 : 00000000`00001001 00000000`00000fff 00000000`000f01ff 00000000`00000000 : nt!KiFastFailDispatch+0xd0 fffffd00`5cade490 fffff807`054666c7 : 00000022`00070000 00010007`00760001 fffff807`052cd870 00000000`00000076 : nt!KiRaiseSecurityCheckFailure+0x323 fffffd00`5cade628 fffff807`052cd870 : 00000000`00000076 ffff9e80`d7010fe0 00000000`00000000 ffff9e80`d7010f70 : nt!RtlRbRemoveNode+0x198c17 fffffd00`5cade640 fffff807`052cd2b8 : ffff9e80`d3200280 ffff9e80`d7002000 ffff9e80`d3200280 fffffd00`5cade748 : nt!RtlpHpVsChunkCoalesce+0xb0 fffffd00`5cade6a0 fffff807`052cbc44 : 00000000`00000000 ffffda87`00000000 00000000`00000000 fffffd00`00000000 : nt!RtlpHpVsContextFree+0x188 fffffd00`5cade740 fffff807`059b2019 : 00000000`00000750 ffff9e80`dc6bf010 00000000`000006c0 01000000`00100000 : nt!ExFreeHeapPool+0x4d4 fffffd00`5cade820 fffff807`056a4b84 : ffff9e80`dc6bf030 ffff9e80`dc6bf030 ffffda87`b76ab900 ffffda87`c29f0c40 : nt!ExFreePool+0x9 fffffd00`5cade850 fffff807`056a4998 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194 fffffd00`5cade8b0 fffff807`052dffc7 : 00000000`00000000 00000000`00000000 fffffd00`5cadea39 ffff9e80`dc6bf060 : nt!ObpRemoveObjectRoutine+0x88 fffffd00`5cade910 fffff807`056d243e : ffffda87`b76ab900 00000000`00000001 ffffffff`ffffffff ffff9e80`e2cd7180 : nt!ObfDereferenceObjectWithTag+0xc7 fffffd00`5cade950 fffff807`056d60bc : 00000000`00001460 ffffda87`c31ef040 000000f6`d90ff218 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e fffffd00`5cadea90 fffff807`054058b8 : ffffda87`c31ef000 ffffda87`c303edd0 fffffd00`5cadeb80 ffffda87`0000a048 : nt!NtClose+0xec fffffd00`5cadeb00 00007ff9`06d6bfa4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000f6`d90ff438 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`06d6bfa4 SYMBOL_NAME: nt!ExFreePool+9 IMAGE_NAME: Pool_Corruption IMAGE_VERSION: 10.0.19041.508 MODULE_NAME: Pool_Corruption STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {ab43366d-59cb-5971-8e17-b53398bf3f90} Followup: Pool_corruption --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffd2092175d3b0, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff8035f5dd3cf, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4718 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 64341 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: ffffd2092175d3b0 BUGCHECK_P2: 0 BUGCHECK_P3: fffff8035f5dd3cf BUGCHECK_P4: 2 READ_ADDRESS: fffff8034d4fa390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8034d40f2e0: Unable to get Flags value from nt!KdVersionBlock fffff8034d40f2e0: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffd2092175d3b0 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: LockApp.exe TRAP_FRAME: fffff004daab5530 -- (.trap 0xfffff004daab5530) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8035f5dd3cf rbx=0000000000000000 rcx=fffff004daab57a8 rdx=ffffda0917e75000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8035f5dd3cf rsp=fffff004daab56c0 rbp=ffffda0917e75000 r8=0000000000000000 r9=0000000000000000 r10=0000fffff8035f63 r11=ffffb7785c000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nvlddmkm+0xc1d3cf: fffff803`5f5dd3cf 8b9ef0000000 mov ebx,dword ptr [rsi+0F0h] ds:00000000`000000f0=???????? Resetting default scope STACK_TEXT: fffff004`daab5288 fffff803`4cc86729 : 00000000`00000050 ffffd209`2175d3b0 00000000`00000000 fffff004`daab5530 : nt!KeBugCheckEx fffff004`daab5290 fffff803`4caeeb80 : ffffda09`1a130101 00000000`00000000 fffff004`daab55b0 00000000`00000000 : nt!MiSystemFault+0x13faf9 fffff004`daab5390 fffff803`4cc0205e : 00000000`00000040 00000000`000005e4 00000000`00000002 ffffda09`24ae6780 : nt!MmAccessFault+0x400 fffff004`daab5530 fffff803`5f5dd3cf : ffffda09`17e75000 ffffda09`17e75000 ffffda09`1a9e6010 fffff004`daab5819 : nt!KiPageFault+0x35e fffff004`daab56c0 ffffda09`17e75000 : ffffda09`17e75000 ffffda09`1a9e6010 fffff004`daab5819 ffffda09`17c52dd0 : nvlddmkm+0xc1d3cf fffff004`daab56c8 ffffda09`17e75000 : ffffda09`1a9e6010 fffff004`daab5819 ffffda09`17c52dd0 01000000`00100000 : 0xffffda09`17e75000 fffff004`daab56d0 ffffda09`1a9e6010 : fffff004`daab5819 ffffda09`17c52dd0 01000000`00100000 ffffda09`22a232b0 : 0xffffda09`17e75000 fffff004`daab56d8 fffff004`daab5819 : ffffda09`17c52dd0 01000000`00100000 ffffda09`22a232b0 fffff803`5f1cd9cf : 0xffffda09`1a9e6010 fffff004`daab56e0 ffffda09`17c52dd0 : 01000000`00100000 ffffda09`22a232b0 fffff803`5f1cd9cf 00000000`00000000 : 0xfffff004`daab5819 fffff004`daab56e8 01000000`00100000 : ffffda09`22a232b0 fffff803`5f1cd9cf 00000000`00000000 fffff803`4cc6c387 : 0xffffda09`17c52dd0 fffff004`daab56f0 ffffda09`22a232b0 : fffff803`5f1cd9cf 00000000`00000000 fffff803`4cc6c387 ffffda09`18362a10 : 0x01000000`00100000 fffff004`daab56f8 fffff803`5f1cd9cf : 00000000`00000000 fffff803`4cc6c387 ffffda09`18362a10 fffff004`daab5769 : 0xffffda09`22a232b0 fffff004`daab5700 00000000`00000000 : fffff803`4cc6c387 ffffda09`18362a10 fffff004`daab5769 00000000`00000001 : nvlddmkm+0x80d9cf SYMBOL_NAME: nvlddmkm+c1d3cf MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: c1d3cf FAILURE_BUCKET_ID: AV_R_INVALID_nvlddmkm!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e90a4ef4-7822-d3fe-1570-e91273858ed6} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8046c8c932c, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3061 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 3867 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8046c8c932c BUGCHECK_P3: 0 BUGCHECK_P4: ffffffffffffffff READ_ADDRESS: fffff8046d2fa390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8046d20f2e0: Unable to get Flags value from nt!KdVersionBlock fffff8046d20f2e0: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffffffffffffff EXCEPTION_PARAMETER2: ffffffffffffffff BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: steamwebhelper.exe BAD_STACK_POINTER: fffff80471880158 STACK_TEXT: fffff804`71880158 fffff804`6caf4d4e : 00000000`0000001e ffffffff`c0000005 fffff804`6c8c932c 00000000`00000000 : nt!KeBugCheckEx fffff804`71880160 fffff804`6c9fcd62 : fffff804`6caf4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22 fffff804`718801a0 fffff804`6c885027 : fffff804`71880710 00000000`00000000 fffff804`71872fb0 fffff804`6c9faee5 : nt!RtlpExecuteHandlerForException+0x12 fffff804`718801d0 fffff804`6c883ce6 : fffff804`71872108 fffff804`71880e20 fffff804`71872108 00000000`00000000 : nt!RtlDispatchException+0x297 fffff804`718808f0 fffff804`6c9f4d32 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186 fffff804`71880fb0 fffff804`6c9f4d00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12 fffff804`71871fc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue SYMBOL_NAME: nt!KeSetEvent+12c MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.508 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 12c FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!KeSetEvent OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {5b67424c-419d-c5a3-8e34-77d4a1bf1db0} Followup: MachineOwner --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: ffff8a8103ce4038 Arg3: 0000020000000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3311 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 3310 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: ffff8a8103ce4038 BUGCHECK_P3: 20000000000 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: RuntimeBroker.exe STACK_TEXT: ffffda06`693a2d58 fffff804`1692abba : 00000000`0000001a 00000000`00041792 ffff8a81`03ce4038 00000200`00000000 : nt!KeBugCheckEx ffffda06`693a2d60 fffff804`168edc06 : 00000000`00000000 ffffda06`693a3330 00000000`00000026 ffff8a81`03ce4038 : nt!MiDeleteVa+0x153a ffffda06`693a2e60 fffff804`168edd1b : ffff8ac5`4081e720 ffffe006`ad5a8700 ffffda06`00000000 ffffda06`693a32d0 : nt!MiWalkPageTablesRecursively+0x776 ffffda06`693a2f00 fffff804`168edd1b : ffff8ac5`62a040f0 ffffe006`ad5a8700 ffffda06`00000001 ffffda06`693a32e0 : nt!MiWalkPageTablesRecursively+0x88b ffffda06`693a2fa0 fffff804`168edd1b : ffff8ac5`62a04000 ffffe006`ad5a8700 ffffda06`00000002 ffffda06`693a32f0 : nt!MiWalkPageTablesRecursively+0x88b ffffda06`693a3040 fffff804`168dcbfb : 00000000`00000000 ffffe006`ad5a8700 00000000`00000003 ffffda06`693a3300 : nt!MiWalkPageTablesRecursively+0x88b ffffda06`693a30e0 fffff804`16929451 : ffffda06`693a3280 ffffe006`00000000 ffff8a81`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b ffffda06`693a31e0 fffff804`16901670 : 00000000`00000001 ffffda06`00000000 ffffe006`ad5a8550 ffffe006`b252a640 : nt!MiDeletePagablePteRange+0x4f1 ffffda06`693a34f0 fffff804`16c999e9 : ffffe006`b83c0440 00000000`00000000 ffffe006`00000000 ffffe006`00000000 : nt!MiDeleteVad+0x360 ffffda06`693a3600 fffff804`16c9938c : ffffe006`b83c0440 ffffe006`addedc00 ffffe006`b252a640 00000000`00000000 : nt!MiUnmapVad+0x49 ffffda06`693a3630 fffff804`16ce4dd3 : ffffe006`b83c2380 ffffe006`b83c2380 ffffe006`b83c0440 ffffe006`ad5a8080 : nt!MiCleanVad+0x30 ffffda06`693a3660 fffff804`16c81f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe006`ad5a8080 : nt!MmCleanProcessAddressSpace+0x137 ffffda06`693a36e0 fffff804`16c9ea8a : ffffe006`ad5a8080 ffffc90d`d2eef730 ffffda06`693a3920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b ffffda06`693a3760 fffff804`16bf4558 : 00000000`40010004 00000000`00000001 00000000`00000000 0000001c`915dc000 : nt!PspExitThread+0x5f6 ffffda06`693a3860 fffff804`168e6ca7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38 ffffda06`693a38a0 fffff804`169f8440 : 00000207`9c506030 ffffda06`693a3950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487 ffffda06`693a3950 fffff804`16a0595f : ffffe006`b252a640 ffffda06`693a3b80 0000001c`9187f3f8 ffffda06`693a3aa8 : nt!KiInitiateUserApc+0x70 ffffda06`693a3a90 00007ffc`0130a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 0000001c`9187fa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0130a104 MODULE_NAME: hardware IMAGE_NAME: memory_corruption STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner ---------
Minidump dökümünde de öyle görünüyordu zaten, bellekler hatalı. Birden fazla modül varsa tek tek test yapıp hangisinin hatalı olduğunu bulmaya çalışın ve hatalı olanı değiştirin.