kado1082
Picopat
- Katılım
- 8 Eylül 2020
- Mesajlar
- 270
Minidump dosyalarım: Yeni klasör (4).rar. Hepsine sebep olanları yazar mısınız?
Son düzenleyen: Moderatör:
Bellek testi yapın.
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Ek MSI yazılımlarını, EAC'i kaldırın. Afterburner ile ekran kartına herhangi bir işlem yaptıysanız sıfırlayın.
Easy anti cheat.EAC ne demek?
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80669abf23a, Address of the instruction which caused the bugcheck
Arg3: ffffec0c00ec9d30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4890
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12125
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80669abf23a
BUGCHECK_P3: ffffec0c00ec9d30
BUGCHECK_P4: 0
CONTEXT: ffffec0c00ec9d30 -- (.cxr 0xffffec0c00ec9d30)
rax=0000000000000000 rbx=9711302f03f00196 rcx=0000000000000011
rdx=fffff8066a124f60 rsi=fffff8066a124f60 rdi=ffff568eac125080
rip=fffff80669abf23a rsp=ffffec0c00eca730 rbp=ffffa902aa3e7080
r8=ffffec0c00eca740 r9=ffffd68eaf929580 r10=ffffd68eaf929580
r11=0000000000000673 r12=ffffd68eaf929490 r13=000000000000005c
r14=ffffd68ec1e8fe80 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!ObLogSecurityDescriptor+0x9a:
fffff806`69abf23a 48395f10 cmp qword ptr [rdi+10h],rbx ds:002b:ffff568e`ac125090=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffec0c`00eca730 fffff806`69abe63c : ffffec0c`000000f4 ffffec0c`00eca7e8 00000000`00000010 00000000`000000f4 : nt!ObLogSecurityDescriptor+0x9a
ffffec0c`00eca7b0 fffff806`69abf05a : 00000000`00000000 ffffd68e`b55ef0a0 00000000`00000000 ffffd68e`b55ef0a0 : nt!ObSetSecurityDescriptorInfo+0x9c
ffffec0c`00eca810 fffff806`69ac02b9 : 00000000`000f01ff 00000000`00000000 ffffd68e`b45ecb50 fffff806`69aafb96 : nt!SeDefaultObjectMethod+0x11a
ffffec0c`00eca870 fffff806`69abe95c : ffffd68e`b0b64420 ffffd68e`00000004 00000000`00000002 ffffd68e`b0b64450 : nt!ObSetSecurityObjectByPointer+0x89
ffffec0c`00eca8d0 fffff806`699fbc7e : ffffd68e`ba3c7c01 00000000`00000000 00000000`00000000 ffffec0c`00ecab80 : nt!SepAppendAceToTokenObjectAcl+0x22c
ffffec0c`00eca9a0 fffff806`698058b8 : 00000086`241fde10 ffffa902`aa3e7080 00000086`241fdd88 00000086`241fde78 : nt!NtCreateLowBoxToken+0x4ee
ffffec0c`00ecaa90 00007ffa`3b74d3d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000086`241fdd68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`3b74d3d4
SYMBOL_NAME: nt!ObLogSecurityDescriptor+9a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .cxr 0xffffec0c00ec9d30 ; kb
BUCKET_ID_FUNC_OFFSET: 9a
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObLogSecurityDescriptor
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c7451bc4-8d5e-bc70-86b5-535f25d13589}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: fffffd005cade490, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffd005cade3e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3561
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5965
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: fffffd005cade490
BUGCHECK_P3: fffffd005cade3e8
BUGCHECK_P4: 0
TRAP_FRAME: fffffd005cade490 -- (.trap 0xfffffd005cade490)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbe80d7010f78 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff9e80d7010f78 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807054666c7 rsp=fffffd005cade628 rbp=0000000000000076
r8=0000000000000000 r9=ffff9e80e71fcf78 r10=0000000000000000
r11=ffff9e80d5cbbf78 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlRbRemoveNode+0x198c17:
fffff807`054666c7 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffd005cade3e8 -- (.exr 0xfffffd005cade3e8)
ExceptionAddress: fffff807054666c7 (nt!RtlRbRemoveNode+0x0000000000198c17)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffd00`5cade168 fffff807`05405e69 : 00000000`00000139 00000000`0000001d fffffd00`5cade490 fffffd00`5cade3e8 : nt!KeBugCheckEx
fffffd00`5cade170 fffff807`05406290 : ffff9e80`dd96dde0 00000000`000000c0 00000000`000000e0 ffff9e80`00000001 : nt!KiBugCheckDispatch+0x69
fffffd00`5cade2b0 fffff807`05404623 : 00000000`00001001 00000000`00000fff 00000000`000f01ff 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffd00`5cade490 fffff807`054666c7 : 00000022`00070000 00010007`00760001 fffff807`052cd870 00000000`00000076 : nt!KiRaiseSecurityCheckFailure+0x323
fffffd00`5cade628 fffff807`052cd870 : 00000000`00000076 ffff9e80`d7010fe0 00000000`00000000 ffff9e80`d7010f70 : nt!RtlRbRemoveNode+0x198c17
fffffd00`5cade640 fffff807`052cd2b8 : ffff9e80`d3200280 ffff9e80`d7002000 ffff9e80`d3200280 fffffd00`5cade748 : nt!RtlpHpVsChunkCoalesce+0xb0
fffffd00`5cade6a0 fffff807`052cbc44 : 00000000`00000000 ffffda87`00000000 00000000`00000000 fffffd00`00000000 : nt!RtlpHpVsContextFree+0x188
fffffd00`5cade740 fffff807`059b2019 : 00000000`00000750 ffff9e80`dc6bf010 00000000`000006c0 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffffd00`5cade820 fffff807`056a4b84 : ffff9e80`dc6bf030 ffff9e80`dc6bf030 ffffda87`b76ab900 ffffda87`c29f0c40 : nt!ExFreePool+0x9
fffffd00`5cade850 fffff807`056a4998 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194
fffffd00`5cade8b0 fffff807`052dffc7 : 00000000`00000000 00000000`00000000 fffffd00`5cadea39 ffff9e80`dc6bf060 : nt!ObpRemoveObjectRoutine+0x88
fffffd00`5cade910 fffff807`056d243e : ffffda87`b76ab900 00000000`00000001 ffffffff`ffffffff ffff9e80`e2cd7180 : nt!ObfDereferenceObjectWithTag+0xc7
fffffd00`5cade950 fffff807`056d60bc : 00000000`00001460 ffffda87`c31ef040 000000f6`d90ff218 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
fffffd00`5cadea90 fffff807`054058b8 : ffffda87`c31ef000 ffffda87`c303edd0 fffffd00`5cadeb80 ffffda87`0000a048 : nt!NtClose+0xec
fffffd00`5cadeb00 00007ff9`06d6bfa4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f6`d90ff438 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`06d6bfa4
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.508
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ab43366d-59cb-5971-8e17-b53398bf3f90}
Followup: Pool_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd2092175d3b0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8035f5dd3cf, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4718
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 64341
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffd2092175d3b0
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8035f5dd3cf
BUGCHECK_P4: 2
READ_ADDRESS: fffff8034d4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8034d40f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8034d40f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffd2092175d3b0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LockApp.exe
TRAP_FRAME: fffff004daab5530 -- (.trap 0xfffff004daab5530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8035f5dd3cf rbx=0000000000000000 rcx=fffff004daab57a8
rdx=ffffda0917e75000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8035f5dd3cf rsp=fffff004daab56c0 rbp=ffffda0917e75000
r8=0000000000000000 r9=0000000000000000 r10=0000fffff8035f63
r11=ffffb7785c000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nvlddmkm+0xc1d3cf:
fffff803`5f5dd3cf 8b9ef0000000 mov ebx,dword ptr [rsi+0F0h] ds:00000000`000000f0=????????
Resetting default scope
STACK_TEXT:
fffff004`daab5288 fffff803`4cc86729 : 00000000`00000050 ffffd209`2175d3b0 00000000`00000000 fffff004`daab5530 : nt!KeBugCheckEx
fffff004`daab5290 fffff803`4caeeb80 : ffffda09`1a130101 00000000`00000000 fffff004`daab55b0 00000000`00000000 : nt!MiSystemFault+0x13faf9
fffff004`daab5390 fffff803`4cc0205e : 00000000`00000040 00000000`000005e4 00000000`00000002 ffffda09`24ae6780 : nt!MmAccessFault+0x400
fffff004`daab5530 fffff803`5f5dd3cf : ffffda09`17e75000 ffffda09`17e75000 ffffda09`1a9e6010 fffff004`daab5819 : nt!KiPageFault+0x35e
fffff004`daab56c0 ffffda09`17e75000 : ffffda09`17e75000 ffffda09`1a9e6010 fffff004`daab5819 ffffda09`17c52dd0 : nvlddmkm+0xc1d3cf
fffff004`daab56c8 ffffda09`17e75000 : ffffda09`1a9e6010 fffff004`daab5819 ffffda09`17c52dd0 01000000`00100000 : 0xffffda09`17e75000
fffff004`daab56d0 ffffda09`1a9e6010 : fffff004`daab5819 ffffda09`17c52dd0 01000000`00100000 ffffda09`22a232b0 : 0xffffda09`17e75000
fffff004`daab56d8 fffff004`daab5819 : ffffda09`17c52dd0 01000000`00100000 ffffda09`22a232b0 fffff803`5f1cd9cf : 0xffffda09`1a9e6010
fffff004`daab56e0 ffffda09`17c52dd0 : 01000000`00100000 ffffda09`22a232b0 fffff803`5f1cd9cf 00000000`00000000 : 0xfffff004`daab5819
fffff004`daab56e8 01000000`00100000 : ffffda09`22a232b0 fffff803`5f1cd9cf 00000000`00000000 fffff803`4cc6c387 : 0xffffda09`17c52dd0
fffff004`daab56f0 ffffda09`22a232b0 : fffff803`5f1cd9cf 00000000`00000000 fffff803`4cc6c387 ffffda09`18362a10 : 0x01000000`00100000
fffff004`daab56f8 fffff803`5f1cd9cf : 00000000`00000000 fffff803`4cc6c387 ffffda09`18362a10 fffff004`daab5769 : 0xffffda09`22a232b0
fffff004`daab5700 00000000`00000000 : fffff803`4cc6c387 ffffda09`18362a10 fffff004`daab5769 00000000`00000001 : nvlddmkm+0x80d9cf
SYMBOL_NAME: nvlddmkm+c1d3cf
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: c1d3cf
FAILURE_BUCKET_ID: AV_R_INVALID_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e90a4ef4-7822-d3fe-1570-e91273858ed6}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8046c8c932c, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3061
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3867
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8046c8c932c
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff8046d2fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8046d20f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8046d20f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
BAD_STACK_POINTER: fffff80471880158
STACK_TEXT:
fffff804`71880158 fffff804`6caf4d4e : 00000000`0000001e ffffffff`c0000005 fffff804`6c8c932c 00000000`00000000 : nt!KeBugCheckEx
fffff804`71880160 fffff804`6c9fcd62 : fffff804`6caf4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff804`718801a0 fffff804`6c885027 : fffff804`71880710 00000000`00000000 fffff804`71872fb0 fffff804`6c9faee5 : nt!RtlpExecuteHandlerForException+0x12
fffff804`718801d0 fffff804`6c883ce6 : fffff804`71872108 fffff804`71880e20 fffff804`71872108 00000000`00000000 : nt!RtlDispatchException+0x297
fffff804`718808f0 fffff804`6c9f4d32 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff804`71880fb0 fffff804`6c9f4d00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff804`71871fc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
SYMBOL_NAME: nt!KeSetEvent+12c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12c
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!KeSetEvent
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5b67424c-419d-c5a3-8e34-77d4a1bf1db0}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff8a8103ce4038
Arg3: 0000020000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3311
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3310
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff8a8103ce4038
BUGCHECK_P3: 20000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RuntimeBroker.exe
STACK_TEXT:
ffffda06`693a2d58 fffff804`1692abba : 00000000`0000001a 00000000`00041792 ffff8a81`03ce4038 00000200`00000000 : nt!KeBugCheckEx
ffffda06`693a2d60 fffff804`168edc06 : 00000000`00000000 ffffda06`693a3330 00000000`00000026 ffff8a81`03ce4038 : nt!MiDeleteVa+0x153a
ffffda06`693a2e60 fffff804`168edd1b : ffff8ac5`4081e720 ffffe006`ad5a8700 ffffda06`00000000 ffffda06`693a32d0 : nt!MiWalkPageTablesRecursively+0x776
ffffda06`693a2f00 fffff804`168edd1b : ffff8ac5`62a040f0 ffffe006`ad5a8700 ffffda06`00000001 ffffda06`693a32e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffda06`693a2fa0 fffff804`168edd1b : ffff8ac5`62a04000 ffffe006`ad5a8700 ffffda06`00000002 ffffda06`693a32f0 : nt!MiWalkPageTablesRecursively+0x88b
ffffda06`693a3040 fffff804`168dcbfb : 00000000`00000000 ffffe006`ad5a8700 00000000`00000003 ffffda06`693a3300 : nt!MiWalkPageTablesRecursively+0x88b
ffffda06`693a30e0 fffff804`16929451 : ffffda06`693a3280 ffffe006`00000000 ffff8a81`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffda06`693a31e0 fffff804`16901670 : 00000000`00000001 ffffda06`00000000 ffffe006`ad5a8550 ffffe006`b252a640 : nt!MiDeletePagablePteRange+0x4f1
ffffda06`693a34f0 fffff804`16c999e9 : ffffe006`b83c0440 00000000`00000000 ffffe006`00000000 ffffe006`00000000 : nt!MiDeleteVad+0x360
ffffda06`693a3600 fffff804`16c9938c : ffffe006`b83c0440 ffffe006`addedc00 ffffe006`b252a640 00000000`00000000 : nt!MiUnmapVad+0x49
ffffda06`693a3630 fffff804`16ce4dd3 : ffffe006`b83c2380 ffffe006`b83c2380 ffffe006`b83c0440 ffffe006`ad5a8080 : nt!MiCleanVad+0x30
ffffda06`693a3660 fffff804`16c81f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe006`ad5a8080 : nt!MmCleanProcessAddressSpace+0x137
ffffda06`693a36e0 fffff804`16c9ea8a : ffffe006`ad5a8080 ffffc90d`d2eef730 ffffda06`693a3920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffda06`693a3760 fffff804`16bf4558 : 00000000`40010004 00000000`00000001 00000000`00000000 0000001c`915dc000 : nt!PspExitThread+0x5f6
ffffda06`693a3860 fffff804`168e6ca7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffda06`693a38a0 fffff804`169f8440 : 00000207`9c506030 ffffda06`693a3950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffffda06`693a3950 fffff804`16a0595f : ffffe006`b252a640 ffffda06`693a3b80 0000001c`9187f3f8 ffffda06`693a3aa8 : nt!KiInitiateUserApc+0x70
ffffda06`693a3a90 00007ffc`0130a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000001c`9187fa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0130a104
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
Belleklerinizde sorun var. İlk olarak bir test edin:
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80669abf23a, Address of the instruction which caused the bugcheck Arg3: ffffec0c00ec9d30, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4890 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 12125 Key : Analysis.Memory.CommitPeak.Mb Value: 77 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80669abf23a BUGCHECK_P3: ffffec0c00ec9d30 BUGCHECK_P4: 0 CONTEXT: ffffec0c00ec9d30 -- (.cxr 0xffffec0c00ec9d30) rax=0000000000000000 rbx=9711302f03f00196 rcx=0000000000000011 rdx=fffff8066a124f60 rsi=fffff8066a124f60 rdi=ffff568eac125080 rip=fffff80669abf23a rsp=ffffec0c00eca730 rbp=ffffa902aa3e7080 r8=ffffec0c00eca740 r9=ffffd68eaf929580 r10=ffffd68eaf929580 r11=0000000000000673 r12=ffffd68eaf929490 r13=000000000000005c r14=ffffd68ec1e8fe80 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282 nt!ObLogSecurityDescriptor+0x9a: fffff806`69abf23a 48395f10 cmp qword ptr [rdi+10h],rbx ds:002b:ffff568e`ac125090=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe STACK_TEXT: ffffec0c`00eca730 fffff806`69abe63c : ffffec0c`000000f4 ffffec0c`00eca7e8 00000000`00000010 00000000`000000f4 : nt!ObLogSecurityDescriptor+0x9a ffffec0c`00eca7b0 fffff806`69abf05a : 00000000`00000000 ffffd68e`b55ef0a0 00000000`00000000 ffffd68e`b55ef0a0 : nt!ObSetSecurityDescriptorInfo+0x9c ffffec0c`00eca810 fffff806`69ac02b9 : 00000000`000f01ff 00000000`00000000 ffffd68e`b45ecb50 fffff806`69aafb96 : nt!SeDefaultObjectMethod+0x11a ffffec0c`00eca870 fffff806`69abe95c : ffffd68e`b0b64420 ffffd68e`00000004 00000000`00000002 ffffd68e`b0b64450 : nt!ObSetSecurityObjectByPointer+0x89 ffffec0c`00eca8d0 fffff806`699fbc7e : ffffd68e`ba3c7c01 00000000`00000000 00000000`00000000 ffffec0c`00ecab80 : nt!SepAppendAceToTokenObjectAcl+0x22c ffffec0c`00eca9a0 fffff806`698058b8 : 00000086`241fde10 ffffa902`aa3e7080 00000086`241fdd88 00000086`241fde78 : nt!NtCreateLowBoxToken+0x4ee ffffec0c`00ecaa90 00007ffa`3b74d3d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000086`241fdd68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`3b74d3d4 SYMBOL_NAME: nt!ObLogSecurityDescriptor+9a MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.508 STACK_COMMAND: .cxr 0xffffec0c00ec9d30 ; kb BUCKET_ID_FUNC_OFFSET: 9a FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObLogSecurityDescriptor OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c7451bc4-8d5e-bc70-86b5-535f25d13589} Followup: MachineOwner --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 000000000000001d, Type of memory safety violation Arg2: fffffd005cade490, Address of the trap frame for the exception that caused the bugcheck Arg3: fffffd005cade3e8, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3561 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 5965 Key : Analysis.Memory.CommitPeak.Mb Value: 82 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 139 BUGCHECK_P1: 1d BUGCHECK_P2: fffffd005cade490 BUGCHECK_P3: fffffd005cade3e8 BUGCHECK_P4: 0 TRAP_FRAME: fffffd005cade490 -- (.trap 0xfffffd005cade490) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffbe80d7010f78 rbx=0000000000000000 rcx=000000000000001d rdx=ffff9e80d7010f78 rsi=0000000000000000 rdi=0000000000000000 rip=fffff807054666c7 rsp=fffffd005cade628 rbp=0000000000000076 r8=0000000000000000 r9=ffff9e80e71fcf78 r10=0000000000000000 r11=ffff9e80d5cbbf78 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!RtlRbRemoveNode+0x198c17: fffff807`054666c7 cd29 int 29h Resetting default scope EXCEPTION_RECORD: fffffd005cade3e8 -- (.exr 0xfffffd005cade3e8) ExceptionAddress: fffff807054666c7 (nt!RtlRbRemoveNode+0x0000000000198c17) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 000000000000001d Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 000000000000001d EXCEPTION_STR: 0xc0000409 STACK_TEXT: fffffd00`5cade168 fffff807`05405e69 : 00000000`00000139 00000000`0000001d fffffd00`5cade490 fffffd00`5cade3e8 : nt!KeBugCheckEx fffffd00`5cade170 fffff807`05406290 : ffff9e80`dd96dde0 00000000`000000c0 00000000`000000e0 ffff9e80`00000001 : nt!KiBugCheckDispatch+0x69 fffffd00`5cade2b0 fffff807`05404623 : 00000000`00001001 00000000`00000fff 00000000`000f01ff 00000000`00000000 : nt!KiFastFailDispatch+0xd0 fffffd00`5cade490 fffff807`054666c7 : 00000022`00070000 00010007`00760001 fffff807`052cd870 00000000`00000076 : nt!KiRaiseSecurityCheckFailure+0x323 fffffd00`5cade628 fffff807`052cd870 : 00000000`00000076 ffff9e80`d7010fe0 00000000`00000000 ffff9e80`d7010f70 : nt!RtlRbRemoveNode+0x198c17 fffffd00`5cade640 fffff807`052cd2b8 : ffff9e80`d3200280 ffff9e80`d7002000 ffff9e80`d3200280 fffffd00`5cade748 : nt!RtlpHpVsChunkCoalesce+0xb0 fffffd00`5cade6a0 fffff807`052cbc44 : 00000000`00000000 ffffda87`00000000 00000000`00000000 fffffd00`00000000 : nt!RtlpHpVsContextFree+0x188 fffffd00`5cade740 fffff807`059b2019 : 00000000`00000750 ffff9e80`dc6bf010 00000000`000006c0 01000000`00100000 : nt!ExFreeHeapPool+0x4d4 fffffd00`5cade820 fffff807`056a4b84 : ffff9e80`dc6bf030 ffff9e80`dc6bf030 ffffda87`b76ab900 ffffda87`c29f0c40 : nt!ExFreePool+0x9 fffffd00`5cade850 fffff807`056a4998 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194 fffffd00`5cade8b0 fffff807`052dffc7 : 00000000`00000000 00000000`00000000 fffffd00`5cadea39 ffff9e80`dc6bf060 : nt!ObpRemoveObjectRoutine+0x88 fffffd00`5cade910 fffff807`056d243e : ffffda87`b76ab900 00000000`00000001 ffffffff`ffffffff ffff9e80`e2cd7180 : nt!ObfDereferenceObjectWithTag+0xc7 fffffd00`5cade950 fffff807`056d60bc : 00000000`00001460 ffffda87`c31ef040 000000f6`d90ff218 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e fffffd00`5cadea90 fffff807`054058b8 : ffffda87`c31ef000 ffffda87`c303edd0 fffffd00`5cadeb80 ffffda87`0000a048 : nt!NtClose+0xec fffffd00`5cadeb00 00007ff9`06d6bfa4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000f6`d90ff438 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`06d6bfa4 SYMBOL_NAME: nt!ExFreePool+9 IMAGE_NAME: Pool_Corruption IMAGE_VERSION: 10.0.19041.508 MODULE_NAME: Pool_Corruption STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {ab43366d-59cb-5971-8e17-b53398bf3f90} Followup: Pool_corruption --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffd2092175d3b0, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff8035f5dd3cf, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4718 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 64341 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: ffffd2092175d3b0 BUGCHECK_P2: 0 BUGCHECK_P3: fffff8035f5dd3cf BUGCHECK_P4: 2 READ_ADDRESS: fffff8034d4fa390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8034d40f2e0: Unable to get Flags value from nt!KdVersionBlock fffff8034d40f2e0: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffd2092175d3b0 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: LockApp.exe TRAP_FRAME: fffff004daab5530 -- (.trap 0xfffff004daab5530) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8035f5dd3cf rbx=0000000000000000 rcx=fffff004daab57a8 rdx=ffffda0917e75000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8035f5dd3cf rsp=fffff004daab56c0 rbp=ffffda0917e75000 r8=0000000000000000 r9=0000000000000000 r10=0000fffff8035f63 r11=ffffb7785c000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nvlddmkm+0xc1d3cf: fffff803`5f5dd3cf 8b9ef0000000 mov ebx,dword ptr [rsi+0F0h] ds:00000000`000000f0=???????? Resetting default scope STACK_TEXT: fffff004`daab5288 fffff803`4cc86729 : 00000000`00000050 ffffd209`2175d3b0 00000000`00000000 fffff004`daab5530 : nt!KeBugCheckEx fffff004`daab5290 fffff803`4caeeb80 : ffffda09`1a130101 00000000`00000000 fffff004`daab55b0 00000000`00000000 : nt!MiSystemFault+0x13faf9 fffff004`daab5390 fffff803`4cc0205e : 00000000`00000040 00000000`000005e4 00000000`00000002 ffffda09`24ae6780 : nt!MmAccessFault+0x400 fffff004`daab5530 fffff803`5f5dd3cf : ffffda09`17e75000 ffffda09`17e75000 ffffda09`1a9e6010 fffff004`daab5819 : nt!KiPageFault+0x35e fffff004`daab56c0 ffffda09`17e75000 : ffffda09`17e75000 ffffda09`1a9e6010 fffff004`daab5819 ffffda09`17c52dd0 : nvlddmkm+0xc1d3cf fffff004`daab56c8 ffffda09`17e75000 : ffffda09`1a9e6010 fffff004`daab5819 ffffda09`17c52dd0 01000000`00100000 : 0xffffda09`17e75000 fffff004`daab56d0 ffffda09`1a9e6010 : fffff004`daab5819 ffffda09`17c52dd0 01000000`00100000 ffffda09`22a232b0 : 0xffffda09`17e75000 fffff004`daab56d8 fffff004`daab5819 : ffffda09`17c52dd0 01000000`00100000 ffffda09`22a232b0 fffff803`5f1cd9cf : 0xffffda09`1a9e6010 fffff004`daab56e0 ffffda09`17c52dd0 : 01000000`00100000 ffffda09`22a232b0 fffff803`5f1cd9cf 00000000`00000000 : 0xfffff004`daab5819 fffff004`daab56e8 01000000`00100000 : ffffda09`22a232b0 fffff803`5f1cd9cf 00000000`00000000 fffff803`4cc6c387 : 0xffffda09`17c52dd0 fffff004`daab56f0 ffffda09`22a232b0 : fffff803`5f1cd9cf 00000000`00000000 fffff803`4cc6c387 ffffda09`18362a10 : 0x01000000`00100000 fffff004`daab56f8 fffff803`5f1cd9cf : 00000000`00000000 fffff803`4cc6c387 ffffda09`18362a10 fffff004`daab5769 : 0xffffda09`22a232b0 fffff004`daab5700 00000000`00000000 : fffff803`4cc6c387 ffffda09`18362a10 fffff004`daab5769 00000000`00000001 : nvlddmkm+0x80d9cf SYMBOL_NAME: nvlddmkm+c1d3cf MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: c1d3cf FAILURE_BUCKET_ID: AV_R_INVALID_nvlddmkm!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e90a4ef4-7822-d3fe-1570-e91273858ed6} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8046c8c932c, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3061 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 3867 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8046c8c932c BUGCHECK_P3: 0 BUGCHECK_P4: ffffffffffffffff READ_ADDRESS: fffff8046d2fa390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8046d20f2e0: Unable to get Flags value from nt!KdVersionBlock fffff8046d20f2e0: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffffffffffffff EXCEPTION_PARAMETER2: ffffffffffffffff BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: steamwebhelper.exe BAD_STACK_POINTER: fffff80471880158 STACK_TEXT: fffff804`71880158 fffff804`6caf4d4e : 00000000`0000001e ffffffff`c0000005 fffff804`6c8c932c 00000000`00000000 : nt!KeBugCheckEx fffff804`71880160 fffff804`6c9fcd62 : fffff804`6caf4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22 fffff804`718801a0 fffff804`6c885027 : fffff804`71880710 00000000`00000000 fffff804`71872fb0 fffff804`6c9faee5 : nt!RtlpExecuteHandlerForException+0x12 fffff804`718801d0 fffff804`6c883ce6 : fffff804`71872108 fffff804`71880e20 fffff804`71872108 00000000`00000000 : nt!RtlDispatchException+0x297 fffff804`718808f0 fffff804`6c9f4d32 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186 fffff804`71880fb0 fffff804`6c9f4d00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12 fffff804`71871fc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue SYMBOL_NAME: nt!KeSetEvent+12c MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.508 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 12c FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!KeSetEvent OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {5b67424c-419d-c5a3-8e34-77d4a1bf1db0} Followup: MachineOwner --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: ffff8a8103ce4038 Arg3: 0000020000000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3311 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 3310 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: ffff8a8103ce4038 BUGCHECK_P3: 20000000000 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: RuntimeBroker.exe STACK_TEXT: ffffda06`693a2d58 fffff804`1692abba : 00000000`0000001a 00000000`00041792 ffff8a81`03ce4038 00000200`00000000 : nt!KeBugCheckEx ffffda06`693a2d60 fffff804`168edc06 : 00000000`00000000 ffffda06`693a3330 00000000`00000026 ffff8a81`03ce4038 : nt!MiDeleteVa+0x153a ffffda06`693a2e60 fffff804`168edd1b : ffff8ac5`4081e720 ffffe006`ad5a8700 ffffda06`00000000 ffffda06`693a32d0 : nt!MiWalkPageTablesRecursively+0x776 ffffda06`693a2f00 fffff804`168edd1b : ffff8ac5`62a040f0 ffffe006`ad5a8700 ffffda06`00000001 ffffda06`693a32e0 : nt!MiWalkPageTablesRecursively+0x88b ffffda06`693a2fa0 fffff804`168edd1b : ffff8ac5`62a04000 ffffe006`ad5a8700 ffffda06`00000002 ffffda06`693a32f0 : nt!MiWalkPageTablesRecursively+0x88b ffffda06`693a3040 fffff804`168dcbfb : 00000000`00000000 ffffe006`ad5a8700 00000000`00000003 ffffda06`693a3300 : nt!MiWalkPageTablesRecursively+0x88b ffffda06`693a30e0 fffff804`16929451 : ffffda06`693a3280 ffffe006`00000000 ffff8a81`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b ffffda06`693a31e0 fffff804`16901670 : 00000000`00000001 ffffda06`00000000 ffffe006`ad5a8550 ffffe006`b252a640 : nt!MiDeletePagablePteRange+0x4f1 ffffda06`693a34f0 fffff804`16c999e9 : ffffe006`b83c0440 00000000`00000000 ffffe006`00000000 ffffe006`00000000 : nt!MiDeleteVad+0x360 ffffda06`693a3600 fffff804`16c9938c : ffffe006`b83c0440 ffffe006`addedc00 ffffe006`b252a640 00000000`00000000 : nt!MiUnmapVad+0x49 ffffda06`693a3630 fffff804`16ce4dd3 : ffffe006`b83c2380 ffffe006`b83c2380 ffffe006`b83c0440 ffffe006`ad5a8080 : nt!MiCleanVad+0x30 ffffda06`693a3660 fffff804`16c81f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe006`ad5a8080 : nt!MmCleanProcessAddressSpace+0x137 ffffda06`693a36e0 fffff804`16c9ea8a : ffffe006`ad5a8080 ffffc90d`d2eef730 ffffda06`693a3920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b ffffda06`693a3760 fffff804`16bf4558 : 00000000`40010004 00000000`00000001 00000000`00000000 0000001c`915dc000 : nt!PspExitThread+0x5f6 ffffda06`693a3860 fffff804`168e6ca7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38 ffffda06`693a38a0 fffff804`169f8440 : 00000207`9c506030 ffffda06`693a3950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487 ffffda06`693a3950 fffff804`16a0595f : ffffe006`b252a640 ffffda06`693a3b80 0000001c`9187f3f8 ffffda06`693a3aa8 : nt!KiInitiateUserApc+0x70 ffffda06`693a3a90 00007ffc`0130a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 0000001c`9187fa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0130a104 MODULE_NAME: hardware IMAGE_NAME: memory_corruption STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner ---------
Minidump dökümünde de öyle görünüyordu zaten, bellekler hatalı. Birden fazla modül varsa tek tek test yapıp hangisinin hatalı olduğunu bulmaya çalışın ve hatalı olanı değiştirin.
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.