PAGE_FAULT_IN_NONPAGED_AREA mavi ekran hatası

Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


HD Tune programı ile sisteme takılı tüm depolama birimlerinin Error Scan ve Health sonuçlarını fotoğraf şeklinde paylaş.
Error Scan testinde Quick Scan yapma.

İşletim sistemi dosyaların bozuk olabilir.
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffff, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80350822bec, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  ASUSTeK Computer Inc.

SYSTEM_PRODUCT_NAME:  K53SV

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  K53SV.324

BIOS_DATE:  12/30/2011

BASEBOARD_MANUFACTURER:  ASUSTeK Computer Inc.

BASEBOARD_PRODUCT:  K53SV

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffffffffff

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80350822bec

BUGCHECK_P4: 2

READ_ADDRESS: fffff8034d1733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffffffffffffff

FAULTING_IP:
Ntfs!PromoteNode+0
fffff803`50822bec 488b01          mov     rax,qword ptr [rcx]

MM_INTERNAL_CODE:  2

CPU_COUNT: 4

CPU_MHZ: 82f

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 2F'00000000 (cache) 2F'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

CURRENT_IRQL:  1

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-19-2020 14:44:28.0229

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff20f0e5d42b0 -- (.trap 0xfffff20f0e5d42b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=ffffffffffffffff
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80350822bec rsp=fffff20f0e5d4448 rbp=fffff80350945310
 r8=ffffd906bd7334b0  r9=ffffd906bd7334b0 r10=ffffd906bd72ba01
r11=ffffd906bfa4da40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
Ntfs!PromoteNode:
fffff803`50822bec 488b01          mov     rax,qword ptr [rcx] ds:ffffffff`ffffffff=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8034ce2dd34 to fffff8034cdc2390

STACK_TEXT: 
fffff20f`0e5d4008 fffff803`4ce2dd34 : 00000000`00000050 ffffffff`ffffffff 00000000`00000000 fffff20f`0e5d42b0 : nt!KeBugCheckEx
fffff20f`0e5d4010 fffff803`4ccc91af : ffff9f87`5b4d8500 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!MiSystemFault+0x195c94
fffff20f`0e5d4110 fffff803`4cdd041e : ffff9f87`5536c6b8 00000000`00000000 00000000`00000001 00000000`ffffdfff : nt!MmAccessFault+0x34f
fffff20f`0e5d42b0 fffff803`50822bec : fffff803`50814cfa ffffd906`bfa49850 ffffd906`bfa49660 ffff9f87`5ce933c0 : nt!KiPageFault+0x35e
fffff20f`0e5d4448 fffff803`50814cfa : ffffd906`bfa49850 ffffd906`bfa49660 ffff9f87`5ce933c0 fffff803`4cd1254d : Ntfs!PromoteNode
fffff20f`0e5d4450 fffff803`50814b69 : ffffd906`bd72ba58 00000000`00000000 ffff9f87`5ce93040 ffff9f87`59095918 : Ntfs!DeleteNodeFromTree+0x182
fffff20f`0e5d4480 fffff803`508f115e : ffffd906`bfa49b78 00000000`00000000 ffffd906`00000001 00000000`00000000 : Ntfs!FsLibRemoveElementGenericTableAvlEx+0x11
fffff20f`0e5d44b0 fffff803`508f0f3d : ffffd906`bfa49b78 fffff803`50945310 ffffd906`bfa50010 fffff20f`00000000 : Ntfs!NtfsRemovePrefix+0x4e
fffff20f`0e5d44e0 fffff803`50814443 : fffff20f`0e5d48f0 ffffd906`bfa50010 ffffd906`bfa50010 ffffd906`bfa49660 : Ntfs!NtfsFullDeleteLcb+0x2d
fffff20f`0e5d4510 fffff803`508ef3be : fffff20f`0e5d48f0 ffff9f87`55ef6180 ffffd906`bfa50010 ffffd906`bfa50458 : Ntfs!NtfsTeardownFromLcb+0x1a3
fffff20f`0e5d45b0 fffff803`5081892a : fffff20f`0e5d48f0 fffff20f`0e5d46b1 ffffd906`bfa50458 fffff20f`0e5d48f0 : Ntfs!NtfsTeardownStructures+0xee
fffff20f`0e5d4630 fffff803`50910bac : fffff20f`0e5d4700 ffffd906`00000000 fffff20f`00000000 fffff20f`0e5d48f0 : Ntfs!NtfsDecrementCloseCounts+0xaa
fffff20f`0e5d4670 fffff803`5090faf1 : fffff20f`0e5d48f0 ffffd906`bfa50170 ffffd906`bfa50010 ffff9f87`55ef6180 : Ntfs!NtfsCommonClose+0x45c
fffff20f`0e5d4750 fffff803`50945398 : 00000000`0000001c fffff803`4d18f240 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
fffff20f`0e5d48b0 fffff803`4ccf43b5 : ffff9f87`53a4ec50 ffff9f87`5ce93000 ffff9f87`53a4ec00 00000000`00000002 : Ntfs!NtfsFspClose+0x88
fffff20f`0e5d4b70 fffff803`4cc6bcd5 : ffff9f87`5ce93040 00000000`00000080 ffff9f87`53a7a080 00000000`00000001 : nt!ExpWorkerThread+0x105
fffff20f`0e5d4c10 fffff803`4cdc9998 : ffffc700`020c0180 ffff9f87`5ce93040 fffff803`4cc6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff20f`0e5d4c60 00000000`00000000 : fffff20f`0e5d5000 fffff20f`0e5cf000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


THREAD_SHA1_HASH_MOD_FUNC:  feeddf01d7cae67655d557b1f118049ae81d4e36

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  277a64872e2ee5902657ef3c9f436a0c98e64bdf

THREAD_SHA1_HASH_MOD:  9b20696211daac033e0b83042d0a02a88306df6b

FOLLOWUP_IP:
Ntfs!PromoteNode+0
fffff803`50822bec 488b01          mov     rax,qword ptr [rcx]

FAULT_INSTR_CODE:  48018b48

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  Ntfs!PromoteNode+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.719

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  AV_R_INVALID_Ntfs!PromoteNode

BUCKET_ID:  AV_R_INVALID_Ntfs!PromoteNode

PRIMARY_PROBLEM_CLASS:  AV_R_INVALID_Ntfs!PromoteNode

TARGET_TIME:  2020-04-16T14:21:14.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2e28

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_r_invalid_ntfs!promotenode

FAILURE_ID_HASH:  {c66ea78a-33cb-b0de-2858-dd3b483092c5}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8076bb3e801, The address that the exception occurred at
Arg3: ffff95840e096ac8, Exception Record Address
Arg4: ffffae0024dbf930, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  ASUSTeK Computer Inc.

SYSTEM_PRODUCT_NAME:  K53SV

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  K53SV.324

BIOS_DATE:  12/30/2011

BASEBOARD_MANUFACTURER:  ASUSTeK Computer Inc.

BASEBOARD_PRODUCT:  K53SV

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8076bb3e801

BUGCHECK_P3: ffff95840e096ac8

BUGCHECK_P4: ffffae0024dbf930

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!MiDemoteCombinedPte+51
fffff807`6bb3e801 498378f001      cmp     qword ptr [r8-10h],1

EXCEPTION_RECORD:  ffff95840e096ac8 -- (.exr 0xffff95840e096ac8)
ExceptionAddress: fffff8076bb3e801 (nt!MiDemoteCombinedPte+0x0000000000000051)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffae0024dbf930 -- (.cxr 0xffffae0024dbf930)
rax=ffff984c26130000 rbx=820000086263e847 rcx=ffffd50206c76580
rdx=ffff980167e07780 rsi=ffff980167e07780 rdi=ffff95840e097310
rip=fffff8076bb3e801 rsp=ffff95840e096d00 rbp=000002cfc0ef0000
 r8=8000000000000000  r9=ffffd50206c76ba0 r10=0000000000000000
r11=ffff980000000000 r12=0000000000000000 r13=ffff95840e097410
r14=8000000000000000 r15=ffffd50206c76580
iopl=0         nv up ei ng nz na pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010283
nt!MiDemoteCombinedPte+0x51:
fffff807`6bb3e801 498378f001      cmp     qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: 82f

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 2F'00000000 (cache) 2F'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

FOLLOWUP_IP:
nt!MiDemoteCombinedPte+51
fffff807`6bb3e801 498378f001      cmp     qword ptr [r8-10h],1

BUGCHECK_STR:  AV

READ_ADDRESS: fffff8076bf733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-19-2020 14:44:30.0700

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

BAD_STACK_POINTER:  ffffae0024dbf0c8

LAST_CONTROL_TRANSFER:  from fffff8076bae7557 to fffff8076bb3e801

STACK_TEXT: 
ffff9584`0e096d00 fffff807`6bae7557 : 00000000`00000000 ffff9801`67e07778 00000000`00000003 00000000`00000000 : nt!MiDemoteCombinedPte+0x51
ffff9584`0e096dd0 fffff807`6bae3d07 : 00000000`00000000 ffff9584`0e097410 00000000`00000000 00000000`00000000 : nt!MiAgePte+0x427
ffff9584`0e096e70 fffff807`6bae41c1 : ffff9584`0e097410 ffff9584`0e097410 ffffd502`00000000 ffff984c`00b3f038 : nt!MiWalkPageTablesRecursively+0x1e7
ffff9584`0e096f30 fffff807`6bae41c1 : ffff9584`0e097410 ffff9584`0e097410 ffffd502`00000000 ffff984c`260059f8 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9584`0e096ff0 fffff807`6bae41c1 : ffff9584`0e097410 ffff9584`0e097410 ffffd502`00000000 ffff984c`26130028 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9584`0e0970b0 fffff807`6bae394c : ffff9584`0e097410 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9584`0e097170 fffff807`6bae33d7 : ffff9584`0e097410 ffff9584`00000002 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffff9584`0e097270 fffff807`6bae2ec0 : ffffd502`04f92080 fffff807`00000000 00000003`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3a7
ffff9584`0e097790 fffff807`6bae242a : ffffd502`06c76580 ffff9584`0e097a50 00000000`00000000 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x760
ffff9584`0e097880 fffff807`6bae0b40 : fffff807`00000002 00000000`00000000 fffff807`6be6a400 ffffd502`00044010 : nt!MiProcessWorkingSets+0x1fa
ffff9584`0e097a30 fffff807`6bcca5c6 : 00000000`00000001 00000000`00000002 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xc8
ffff9584`0e097af0 fffff807`6bb8c8f5 : 00000000`00000002 00000000`ffffffff fffff807`6be6a400 00000000`00000154 : nt!MmWorkingSetManager+0x12
ffff9584`0e097b20 fffff807`6ba6bcd5 : ffffd502`00146080 00000000`00000080 fffff807`6bb8c7a0 00000001`40399418 : nt!KeBalanceSetManager+0x155
ffff9584`0e097c10 fffff807`6bbc9998 : fffff807`68262180 ffffd502`00146080 fffff807`6ba6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff9584`0e097c60 00000000`00000000 : ffff9584`0e098000 ffff9584`0e092000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


THREAD_SHA1_HASH_MOD_FUNC:  b7db9ad0a77622195141f6732227a097c9448076

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a3e4722f2fb5e93365e66a747023b65ecb98d960

THREAD_SHA1_HASH_MOD:  38bc5fec3f0409c265cf5c87da6f8f8859d0711c

FAULT_INSTR_CODE:  f0788349

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiDemoteCombinedPte+51

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5629d63a

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .cxr 0xffffae0024dbf930 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  51

FAILURE_BUCKET_ID:  AV_STACKPTR_ERROR_nt!MiDemoteCombinedPte

BUCKET_ID:  AV_STACKPTR_ERROR_nt!MiDemoteCombinedPte

PRIMARY_PROBLEM_CLASS:  AV_STACKPTR_ERROR_nt!MiDemoteCombinedPte

TARGET_TIME:  2020-04-16T18:36:43.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  d16

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_stackptr_error_nt!midemotecombinedpte

FAILURE_ID_HASH:  {51bd6656-a4b2-8d9b-1231-94678dd83b3a}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe7029fb95010, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe7029fb94f68, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  ASUSTeK Computer Inc.

SYSTEM_PRODUCT_NAME:  K53SV

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  K53SV.324

BIOS_DATE:  12/30/2011

BASEBOARD_MANUFACTURER:  ASUSTeK Computer Inc.

BASEBOARD_PRODUCT:  K53SV

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffe7029fb95010

BUGCHECK_P3: ffffe7029fb94f68

BUGCHECK_P4: 0

TRAP_FRAME:  ffffe7029fb95010 -- (.trap 0xffffe7029fb95010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc007e74a76c0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc007ef6384b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80658e38623 rsp=ffffe7029fb951a0 rbp=0000000000000000
 r8=ffffaf8782bf41c8  r9=0000000000000000 r10=fffff8065660bf30
r11=00000000000000ab r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
Ntfs!NtfsRemoveClose+0x22a53:
fffff806`58e38623 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffe7029fb94f68 -- (.exr 0xffffe7029fb94f68)
ExceptionAddress: fffff80658e38623 (Ntfs!NtfsRemoveClose+0x0000000000022a53)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: 82f

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 2F'00000000 (cache) 2F'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  MsMpEng.exe

CURRENT_IRQL:  1

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-19-2020 14:44:34.0650

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

DEVICE_OBJECT: ffffaf8700000000

LAST_CONTROL_TRANSFER:  from fffff806567d41e9 to fffff806567c2390

STACK_TEXT: 
ffffe702`9fb94ce8 fffff806`567d41e9 : 00000000`00000139 00000000`00000003 ffffe702`9fb95010 ffffe702`9fb94f68 : nt!KeBugCheckEx
ffffe702`9fb94cf0 fffff806`567d4610 : 00000000`00000000 00000000`00000000 fffff806`5696f010 ffffaf87`89e9aa00 : nt!KiBugCheckDispatch+0x69
ffffe702`9fb94e30 fffff806`567d29a3 : ffffaf87`89e9ab28 00000000`00000000 ffffaf87`01a00070 fffff806`00000000 : nt!KiFastFailDispatch+0xd0
ffffe702`9fb95010 fffff806`58e38623 : 00000000`00000000 ffffc007`f03b7c00 00000000`00000001 00000000`00000002 : nt!KiRaiseSecurityCheckFailure+0x323
ffffe702`9fb951a0 fffff806`58f0f9d1 : 00000000`00000000 ffffe702`9fb95710 ffffc007`f03b7c80 ffffaf87`89e9aa18 : Ntfs!NtfsRemoveClose+0x22a53
ffffe702`9fb951e0 fffff806`58f4d440 : fffff806`00000001 00000000`00000000 00000000`00000000 ffffaf87`89243680 : Ntfs!NtfsFspCloseInternal+0x121
ffffe702`9fb95340 fffff806`58e2a577 : ffffc007`ea0e6700 ffffaf87`8bdbd050 ffffc007`ea0e6700 ffffaf87`8bdbd050 : Ntfs!NtfsFlushVolume+0x130
ffffe702`9fb95460 fffff806`58e18527 : ffffaf87`8a569d78 ffffaf87`8bdbd050 ffffaf87`82aefca0 00000000`00000001 : Ntfs!NtfsVolumeDasdIo+0x1ef
ffffe702`9fb95520 fffff806`58e1641c : ffffe702`9fb95720 ffffaf87`8bdbd050 ffffe702`9fb95720 ffffaf87`8a569d78 : Ntfs!NtfsCommonRead+0x1ef7
ffffe702`9fb956e0 fffff806`5670a929 : ffffaf87`8bcc4ba0 ffffaf87`8bdbd050 ffffaf87`8bdbd480 00000000`00000000 : Ntfs!NtfsFsdRead+0x20c
ffffe702`9fb957a0 fffff806`583355de : 00000000`00000000 ffffe702`9fb95880 ffffaf87`8bdbd050 ffffe702`9fb95890 : nt!IofCallDriver+0x59
ffffe702`9fb957e0 fffff806`58333f16 : ffffe702`9fb95880 00000000`00000001 ffffaf87`89243501 fffff806`56cba885 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffffe702`9fb95860 fffff806`5670a929 : ffffaf87`8bdbd050 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltpDispatch+0xb6
ffffe702`9fb958c0 fffff806`56cb2c45 : 00000000`00000000 ffffaf87`8b0d62c0 ffffaf87`8b0d6310 ffffaf87`8b0d62c0 : nt!IofCallDriver+0x59
ffffe702`9fb95900 fffff806`56caee3f : ffffaf87`00000000 00000000`00000000 00000000`00000000 ffffe702`9fb95b80 : nt!IopSynchronousServiceTail+0x1a5
ffffe702`9fb959a0 fffff806`567d3c18 : 00000000`00001a24 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x59f
ffffe702`9fb95a90 00007ffc`af71c134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ed`1c4fc518 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`af71c134


THREAD_SHA1_HASH_MOD_FUNC:  15c9278a033007cc50c7d700879e19652a987cfa

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6e94a66985e0c326aa2c5a4ca720ea329cbfe0b5

THREAD_SHA1_HASH_MOD:  d76a0bcce70b0f1946e92358c0d912972d85b8b4

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff806`567d4610 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5629d63a

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

TARGET_TIME:  2020-04-18T17:10:11.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1af7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffaf8f92231080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  ASUSTeK Computer Inc.

SYSTEM_PRODUCT_NAME:  K53SV

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  K53SV.324

BIOS_DATE:  12/30/2011

BASEBOARD_MANUFACTURER:  ASUSTeK Computer Inc.

BASEBOARD_PRODUCT:  K53SV

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffaf8f92231080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

EXCEPTION_CODE: (NTSTATUS) 0x91bc6040 - <Unable to get error code text>

ERROR_CODE: (NTSTATUS) 0x91bc6040 - <Unable to get error code text>

CRITICAL_PROCESS_REPORTGUID:  {048c177c-e588-4579-8250-3c72ff9a7e01}

IMAGE_NAME:  psmserviceexthost.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: psmserviceexthost

FAULTING_MODULE: 0000000000000000

CPU_COUNT: 4

CPU_MHZ: 82f

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 2F'00000000 (cache) 2F'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xEF

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-19-2020 14:44:43.0364

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8052bacb8a9 to fffff8052b3c2390

STACK_TEXT: 
ffffaa08`c926f938 fffff805`2bacb8a9 : 00000000`000000ef ffffaf8f`92231080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffaa08`c926f940 fffff805`2b9ecbdf : ffffaf8f`92231080 fffff805`2b288065 ffffaf8f`92231080 fffff805`2b2880e0 : nt!PspCatchCriticalBreak+0x115
ffffaa08`c926f9e0 fffff805`2b8700c0 : ffffaf8f`00000000 00000000`00000000 ffffaf8f`92231080 ffffaf8f`92231080 : nt!PspTerminateAllThreads+0x17b193
ffffaa08`c926fa50 fffff805`2b86fce9 : ffffffff`ffffffff ffffaa08`c926fb80 ffffaf8f`92231080 fffff805`2b879401 : nt!PspTerminateProcess+0xe0
ffffaa08`c926fa90 fffff805`2b3d3c18 : ffffaf8f`000003ac ffffaf8f`91bc6040 ffffaf8f`92231080 000000c8`0e87f94c : nt!NtTerminateProcess+0xa9
ffffaa08`c926fb00 00007ffb`2571c5f4 : 00007ffb`2578fc1f 00007ffb`257bf980 000000c8`0e87f910 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c8`0e87d968 00007ffb`2578fc1f : 00007ffb`257bf980 000000c8`0e87f910 00000000`00000000 000000c8`0e87db20 : 0x00007ffb`2571c5f4
000000c8`0e87d970 00007ffb`257bf980 : 000000c8`0e87f910 00000000`00000000 000000c8`0e87db20 00000000`00000004 : 0x00007ffb`2578fc1f
000000c8`0e87d978 000000c8`0e87f910 : 00000000`00000000 000000c8`0e87db20 00000000`00000004 00007ffb`25723c9d : 0x00007ffb`257bf980
000000c8`0e87d980 00000000`00000000 : 000000c8`0e87db20 00000000`00000004 00007ffb`25723c9d 00007ffb`257bf980 : 0x000000c8`0e87f910


THREAD_SHA1_HASH_MOD_FUNC:  042a2b51772309c39e12d732cc93cacf0af3064e

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  f3390daa4e7d305510ebc53d68d6f54646545f69

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_NAME:  MachineOwner

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_91bc6040_psmserviceexthost.dll!HampActClose_IMAGE_psmserviceexthost.dll

BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_91bc6040_psmserviceexthost.dll!HampActClose_IMAGE_psmserviceexthost.dll

PRIMARY_PROBLEM_CLASS:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_91bc6040_psmserviceexthost.dll!HampActClose_IMAGE_psmserviceexthost.dll

TARGET_TIME:  2020-04-18T21:20:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1fe7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xef_svchost.exe_bugcheck_critical_process_91bc6040_psmserviceexthost.dll!hampactclose_image_psmserviceexthost.dll

FAILURE_ID_HASH:  {d51d6f55-5efa-5689-c3d3-4919ddd10b0e}

Followup:     MachineOwner
---------

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff8a01dd42af90
Arg3: 00000000fcc9f7d8
Arg4: fffff8002760f533

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  ASUSTeK Computer Inc.

SYSTEM_PRODUCT_NAME:  K53SV

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  K53SV.324

BIOS_DATE:  12/30/2011

BASEBOARD_MANUFACTURER:  ASUSTeK Computer Inc.

BASEBOARD_PRODUCT:  K53SV

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: ffff8a01dd42af90

BUGCHECK_P3: fcc9f7d8

BUGCHECK_P4: fffff8002760f533

BUGCHECK_STR:  0x7f_8

TRAP_FRAME:  ffff8a01dd42af90 -- (.trap 0xffff8a01dd42af90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc28b0afd0018 rbx=0000000000000000 rcx=ffff8686fcc9f898
rdx=ffffc28b0afd0018 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8002760f533 rsp=00000000fcc9f7d8 rbp=ffffc28b0980e000
 r8=ffff8686fcc9f898  r9=ffffc28b0afd0010 r10=ffffc28b0cacebf0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nvlddmkm+0x20f533:
fffff800`2760f533 ff9090010000    call    qword ptr [rax+190h] ds:ffffc28b`0afd01a8=fffff80027738670
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: 82f

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 2F'00000000 (cache) 2F'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  csgo.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-19-2020 14:44:39.0143

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

BAD_STACK_POINTER:  00000000fcc9f7d8

LAST_CONTROL_TRANSFER:  from fffff80020fd41e9 to fffff80020fc2390

STACK_TEXT: 
ffff8a01`dd42ae48 fffff800`20fd41e9 : 00000000`0000007f 00000000`00000008 ffff8a01`dd42af90 00000000`fcc9f7d8 : nt!KeBugCheckEx
ffff8a01`dd42ae50 fffff800`20fcf043 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8a01`dd42af90 fffff800`2760f533 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`fcc9f7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x20f533


THREAD_SHA1_HASH_MOD_FUNC:  e636d4ec340919d2f06ae79550c90fca55a5b946

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  4204bdb508bbf560c9d33ca223cd0af89c72f865

THREAD_SHA1_HASH_MOD:  99270aa9efddf51499339f5ea82e28c2a8c9f7b4

FOLLOWUP_IP:
nvlddmkm+20f533
fffff800`2760f533 ff9090010000    call    qword ptr [rax+190h]

FAULT_INSTR_CODE:  19090ff

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nvlddmkm+20f533

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5ab5877e

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  20f533

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nvlddmkm!unknown_function

BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nvlddmkm!unknown_function

PRIMARY_PROBLEM_CLASS:  0x7f_8_STACKPTR_ERROR_nvlddmkm!unknown_function

TARGET_TIME:  2020-04-18T20:22:55.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  14fcf

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x7f_8_stackptr_error_nvlddmkm!unknown_function

FAILURE_ID_HASH:  {a6a9f385-3944-d532-1786-ddbcad5847ca}

Followup:     MachineOwner
---------
 
Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

HD Tune programı ile sisteme takılı tüm depolama birimlerinin error scan ve health sonuçlarını fotoğraf şeklinde paylaş.
error scan testinde quick scan yapma.

İşletim sistemi dosyaların bozuk olabilir.
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffff, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80350822bec, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name.
*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

SYSTEM_MANUFACTURER: ASUSTeK Computer Inc.

SYSTEM_PRODUCT_NAME: K53SV.

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: K53SV.324.

BIOS_DATE: 12/30/2011.

BASEBOARD_MANUFACTURER: ASUSTeK Computer Inc.

BASEBOARD_PRODUCT: K53SV.

BASEBOARD_VERSION: 1.0.

DUMP_TYPE: 2.

BUGCHECK_P1: ffffffffffffffff.

BUGCHECK_P2: 0.

BUGCHECK_P3: fffff80350822bec.

BUGCHECK_P4: 2.

READ_ADDRESS: fffff8034d1733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
ffffffffffffffff.

FAULTING_IP:
Ntfs!PromoteNode+0.
fffff803`50822bec 488b01 mov rax,qword ptr [rcx]

MM_INTERNAL_CODE: 2.

CPU_COUNT: 4.

CPU_MHZ: 82f.

CPU_VENDOR: GenuineIntel.

CPU_FAMILY: 6.

CPU_MODEL: 2a.

CPU_STEPPING: 7.

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 2F'00000000 (cache) 2F'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

BUGCHECK_STR: AV.

PROCESS_NAME: System.

CURRENT_IRQL: 1.

ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB.

ANALYSIS_SESSION_TIME: 04-19-2020 14:44:28.0229.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

TRAP_FRAME: fffff20f0e5d42b0 -- (.trap 0xfffff20f0e5d42b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=ffffffffffffffff.
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80350822bec rsp=fffff20f0e5d4448 rbp=fffff80350945310.
r8=ffffd906bd7334b0 r9=ffffd906bd7334b0 r10=ffffd906bd72ba01.
r11=ffffd906bfa4da40 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
Ntfs!PromoteNode:
fffff803`50822bec 488b01 mov rax,qword ptr [rcx] ds:ffffffff`ffffffff=????????????????
Resetting default scope.

LAST_CONTROL_TRANSFER: from fffff8034ce2dd34 to fffff8034cdc2390.

STACK_TEXT:
fffff20f`0e5d4008 fffff803`4ce2dd34 : 00000000`00000050 ffffffff`ffffffff 00000000`00000000 fffff20f`0e5d42b0 : nt!KeBugCheckEx.
fffff20f`0e5d4010 fffff803`4ccc91af : ffff9f87`5b4d8500 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!MiSystemFault+0x195c94.
fffff20f`0e5d4110 fffff803`4cdd041e : ffff9f87`5536c6b8 00000000`00000000 00000000`00000001 00000000`ffffdfff : nt!MmAccessFault+0x34f.
fffff20f`0e5d42b0 fffff803`50822bec : fffff803`50814cfa ffffd906`bfa49850 ffffd906`bfa49660 ffff9f87`5ce933c0 : nt!KiPageFault+0x35e.
fffff20f`0e5d4448 fffff803`50814cfa : ffffd906`bfa49850 ffffd906`bfa49660 ffff9f87`5ce933c0 fffff803`4cd1254d : Ntfs!PromoteNode.
fffff20f`0e5d4450 fffff803`50814b69 : ffffd906`bd72ba58 00000000`00000000 ffff9f87`5ce93040 ffff9f87`59095918 : Ntfs!DeleteNodeFromTree+0x182.
fffff20f`0e5d4480 fffff803`508f115e : ffffd906`bfa49b78 00000000`00000000 ffffd906`00000001 00000000`00000000 : Ntfs!FsLibRemoveElementGenericTableAvlEx+0x11.
fffff20f`0e5d44b0 fffff803`508f0f3d : ffffd906`bfa49b78 fffff803`50945310 ffffd906`bfa50010 fffff20f`00000000 : Ntfs!NtfsRemovePrefix+0x4e.
fffff20f`0e5d44e0 fffff803`50814443 : fffff20f`0e5d48f0 ffffd906`bfa50010 ffffd906`bfa50010 ffffd906`bfa49660 : Ntfs!NtfsFullDeleteLcb+0x2d.
fffff20f`0e5d4510 fffff803`508ef3be : fffff20f`0e5d48f0 ffff9f87`55ef6180 ffffd906`bfa50010 ffffd906`bfa50458 : Ntfs!NtfsTeardownFromLcb+0x1a3.
fffff20f`0e5d45b0 fffff803`5081892a : fffff20f`0e5d48f0 fffff20f`0e5d46b1 ffffd906`bfa50458 fffff20f`0e5d48f0 : Ntfs!NtfsTeardownStructures+0xee.
fffff20f`0e5d4630 fffff803`50910bac : fffff20f`0e5d4700 ffffd906`00000000 fffff20f`00000000 fffff20f`0e5d48f0 : Ntfs!NtfsDecrementCloseCounts+0xaa.
fffff20f`0e5d4670 fffff803`5090faf1 : fffff20f`0e5d48f0 ffffd906`bfa50170 ffffd906`bfa50010 ffff9f87`55ef6180 : Ntfs!NtfsCommonClose+0x45c.
fffff20f`0e5d4750 fffff803`50945398 : 00000000`0000001c fffff803`4d18f240 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241.
fffff20f`0e5d48b0 fffff803`4ccf43b5 : ffff9f87`53a4ec50 ffff9f87`5ce93000 ffff9f87`53a4ec00 00000000`00000002 : Ntfs!NtfsFspClose+0x88.
fffff20f`0e5d4b70 fffff803`4cc6bcd5 : ffff9f87`5ce93040 00000000`00000080 ffff9f87`53a7a080 00000000`00000001 : nt!ExpWorkerThread+0x105.
fffff20f`0e5d4c10 fffff803`4cdc9998 : ffffc700`020c0180 ffff9f87`5ce93040 fffff803`4cc6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55.
fffff20f`0e5d4c60 00000000`00000000 : fffff20f`0e5d5000 fffff20f`0e5cf000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28.

THREAD_SHA1_HASH_MOD_FUNC: feeddf01d7cae67655d557b1f118049ae81d4e36.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 277a64872e2ee5902657ef3c9f436a0c98e64bdf.

THREAD_SHA1_HASH_MOD: 9b20696211daac033e0b83042d0a02a88306df6b.

FOLLOWUP_IP:
Ntfs!PromoteNode+0.
fffff803`50822bec 488b01 mov rax,qword ptr [rcx]

FAULT_INSTR_CODE: 48018b48.

SYMBOL_STACK_INDEX: 4.

SYMBOL_NAME: Ntfs!PromoteNode+0.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: Ntfs.

IMAGE_NAME: Ntfs.sys.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

IMAGE_VERSION: 10.0.18362.719.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 0.

FAILURE_BUCKET_ID: AV_R_INVALID_Ntfs!PromoteNode.

BUCKET_ID: AV_R_INVALID_Ntfs!PromoteNode.

PRIMARY_PROBLEM_CLASS: AV_R_INVALID_Ntfs!PromoteNode.

TARGET_TIME: 2020-04-16T14:21:14.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 778.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: 2015-10-23 09:39:54.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 2e28.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:av_r_invalid_ntfs!promotenode.

FAILURE_ID_HASH: {c66ea78a-33cb-b0de-2858-dd3b483092c5}

Followup: MachineOwner.
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard.
coded breakpoint or assertion was hit, but this system was booted.
/NODEBUG. This is not supposed to happen as developers should never have.
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the.
system is booted /DEBUG. This will let us see why this breakpoint is.
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff8076bb3e801, The address that the exception occurred at.
Arg3: ffff95840e096ac8, Exception Record Address.
Arg4: ffffae0024dbf930, Context Record Address.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : AV.Fault.
Value: Read.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

SYSTEM_MANUFACTURER: ASUSTeK Computer Inc.

SYSTEM_PRODUCT_NAME: K53SV.

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: K53SV.324.

BIOS_DATE: 12/30/2011.

BASEBOARD_MANUFACTURER: ASUSTeK Computer Inc.

BASEBOARD_PRODUCT: K53SV.

BASEBOARD_VERSION: 1.0.

DUMP_TYPE: 2.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff8076bb3e801.

BUGCHECK_P3: ffff95840e096ac8.

BUGCHECK_P4: ffffae0024dbf930.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!MiDemoteCombinedPte+51.
fffff807`6bb3e801 498378f001 cmp qword ptr [r8-10h],1.

EXCEPTION_RECORD: ffff95840e096ac8 -- (.exr 0xffff95840e096ac8)
ExceptionAddress: fffff8076bb3e801 (nt!MiDemoteCombinedPte+0x0000000000000051)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2.
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.

CONTEXT: ffffae0024dbf930 -- (.cxr 0xffffae0024dbf930)
rax=ffff984c26130000 rbx=820000086263e847 rcx=ffffd50206c76580.
rdx=ffff980167e07780 rsi=ffff980167e07780 rdi=ffff95840e097310.
rip=fffff8076bb3e801 rsp=ffff95840e096d00 rbp=000002cfc0ef0000.
r8=8000000000000000 r9=ffffd50206c76ba0 r10=0000000000000000.
r11=ffff980000000000 r12=0000000000000000 r13=ffff95840e097410.
r14=8000000000000000 r15=ffffd50206c76580.
iopl=0 nv up ei ng nz na pe cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010283.
nt!MiDemoteCombinedPte+0x51:
fffff807`6bb3e801 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope.

CPU_COUNT: 4.

CPU_MHZ: 82f.

CPU_VENDOR: GenuineIntel.

CPU_FAMILY: 6.

CPU_MODEL: 2a.

CPU_STEPPING: 7.

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 2F'00000000 (cache) 2F'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

PROCESS_NAME: svchost.exe.

CURRENT_IRQL: 2.

FOLLOWUP_IP:
nt!MiDemoteCombinedPte+51.
fffff807`6bb3e801 498378f001 cmp qword ptr [r8-10h],1.

BUGCHECK_STR: AV.

READ_ADDRESS: fffff8076bf733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
ffffffffffffffff.

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR: c0000005.

EXCEPTION_PARAMETER1: 0000000000000000.

EXCEPTION_PARAMETER2: ffffffffffffffff.

ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB.

ANALYSIS_SESSION_TIME: 04-19-2020 14:44:30.0700.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

BAD_STACK_POINTER: ffffae0024dbf0c8.

LAST_CONTROL_TRANSFER: from fffff8076bae7557 to fffff8076bb3e801.

STACK_TEXT:
ffff9584`0e096d00 fffff807`6bae7557 : 00000000`00000000 ffff9801`67e07778 00000000`00000003 00000000`00000000 : nt!MiDemoteCombinedPte+0x51.
ffff9584`0e096dd0 fffff807`6bae3d07 : 00000000`00000000 ffff9584`0e097410 00000000`00000000 00000000`00000000 : nt!MiAgePte+0x427.
ffff9584`0e096e70 fffff807`6bae41c1 : ffff9584`0e097410 ffff9584`0e097410 ffffd502`00000000 ffff984c`00b3f038 : nt!MiWalkPageTablesRecursively+0x1e7.
ffff9584`0e096f30 fffff807`6bae41c1 : ffff9584`0e097410 ffff9584`0e097410 ffffd502`00000000 ffff984c`260059f8 : nt!MiWalkPageTablesRecursively+0x6a1.
ffff9584`0e096ff0 fffff807`6bae41c1 : ffff9584`0e097410 ffff9584`0e097410 ffffd502`00000000 ffff984c`26130028 : nt!MiWalkPageTablesRecursively+0x6a1.
ffff9584`0e0970b0 fffff807`6bae394c : ffff9584`0e097410 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1.
ffff9584`0e097170 fffff807`6bae33d7 : ffff9584`0e097410 ffff9584`00000002 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36c.
ffff9584`0e097270 fffff807`6bae2ec0 : ffffd502`04f92080 fffff807`00000000 00000003`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3a7.
ffff9584`0e097790 fffff807`6bae242a : ffffd502`06c76580 ffff9584`0e097a50 00000000`00000000 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x760.
ffff9584`0e097880 fffff807`6bae0b40 : fffff807`00000002 00000000`00000000 fffff807`6be6a400 ffffd502`00044010 : nt!MiProcessWorkingSets+0x1fa.
ffff9584`0e097a30 fffff807`6bcca5c6 : 00000000`00000001 00000000`00000002 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xc8.
ffff9584`0e097af0 fffff807`6bb8c8f5 : 00000000`00000002 00000000`ffffffff fffff807`6be6a400 00000000`00000154 : nt!MmWorkingSetManager+0x12.
ffff9584`0e097b20 fffff807`6ba6bcd5 : ffffd502`00146080 00000000`00000080 fffff807`6bb8c7a0 00000001`40399418 : nt!KeBalanceSetManager+0x155.
ffff9584`0e097c10 fffff807`6bbc9998 : fffff807`68262180 ffffd502`00146080 fffff807`6ba6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55.
ffff9584`0e097c60 00000000`00000000 : ffff9584`0e098000 ffff9584`0e092000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28.

THREAD_SHA1_HASH_MOD_FUNC: b7db9ad0a77622195141f6732227a097c9448076.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a3e4722f2fb5e93365e66a747023b65ecb98d960.

THREAD_SHA1_HASH_MOD: 38bc5fec3f0409c265cf5c87da6f8f8859d0711c.

FAULT_INSTR_CODE: f0788349.

SYMBOL_STACK_INDEX: 0.

SYMBOL_NAME: nt!MiDemoteCombinedPte+51.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: nt.

DEBUG_FLR_IMAGE_TIMESTAMP: 5629d63a.

IMAGE_VERSION: 10.0.18362.778.

STACK_COMMAND: .cxr 0xffffae0024dbf930 ; kb.

IMAGE_NAME: memory_corruption.

BUCKET_ID_FUNC_OFFSET: 51.

FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!MiDemoteCombinedPte.

BUCKET_ID: AV_STACKPTR_ERROR_nt!MiDemoteCombinedPte.

PRIMARY_PROBLEM_CLASS: AV_STACKPTR_ERROR_nt!MiDemoteCombinedPte.

TARGET_TIME: 2020-04-16T18:36:43.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 778.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: 2015-10-23 09:39:54.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: d16.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:av_stackptr_error_nt!midemotecombinedpte.

FAILURE_ID_HASH: {51bd6656-a4b2-8d9b-1231-94678dd83b3a}

Followup: MachineOwner.
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe7029fb95010, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffffe7029fb94f68, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

SYSTEM_MANUFACTURER: ASUSTeK Computer Inc.

SYSTEM_PRODUCT_NAME: K53SV.

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: K53SV.324.

BIOS_DATE: 12/30/2011.

BASEBOARD_MANUFACTURER: ASUSTeK Computer Inc.

BASEBOARD_PRODUCT: K53SV.

BASEBOARD_VERSION: 1.0.

DUMP_TYPE: 2.

BUGCHECK_P1: 3.

BUGCHECK_P2: ffffe7029fb95010.

BUGCHECK_P3: ffffe7029fb94f68.

BUGCHECK_P4: 0.

TRAP_FRAME: ffffe7029fb95010 -- (.trap 0xffffe7029fb95010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc007e74a76c0 rbx=0000000000000000 rcx=0000000000000003.
rdx=ffffc007ef6384b0 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80658e38623 rsp=ffffe7029fb951a0 rbp=0000000000000000.
r8=ffffaf8782bf41c8 r9=0000000000000000 r10=fffff8065660bf30.
r11=00000000000000ab r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po nc.
Ntfs!NtfsRemoveClose+0x22a53:
fffff806`58e38623 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffffe7029fb94f68 -- (.exr 0xffffe7029fb94f68)
ExceptionAddress: fffff80658e38623 (Ntfs!NtfsRemoveClose+0x0000000000022a53)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1.
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY.

CPU_COUNT: 4.

CPU_MHZ: 82f.

CPU_VENDOR: GenuineIntel.

CPU_FAMILY: 6.

CPU_MODEL: 2a.

CPU_STEPPING: 7.

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 2F'00000000 (cache) 2F'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

BUGCHECK_STR: 0x139.

PROCESS_NAME: MsMpEng.exe.

CURRENT_IRQL: 1.

DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY.

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB.

ANALYSIS_SESSION_TIME: 04-19-2020 14:44:34.0650.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

DEVICE_OBJECT: ffffaf8700000000.

LAST_CONTROL_TRANSFER: from fffff806567d41e9 to fffff806567c2390.

STACK_TEXT:
ffffe702`9fb94ce8 fffff806`567d41e9 : 00000000`00000139 00000000`00000003 ffffe702`9fb95010 ffffe702`9fb94f68 : nt!KeBugCheckEx.
ffffe702`9fb94cf0 fffff806`567d4610 : 00000000`00000000 00000000`00000000 fffff806`5696f010 ffffaf87`89e9aa00 : nt!KiBugCheckDispatch+0x69.
ffffe702`9fb94e30 fffff806`567d29a3 : ffffaf87`89e9ab28 00000000`00000000 ffffaf87`01a00070 fffff806`00000000 : nt!KiFastFailDispatch+0xd0.
ffffe702`9fb95010 fffff806`58e38623 : 00000000`00000000 ffffc007`f03b7c00 00000000`00000001 00000000`00000002 : nt!KiRaiseSecurityCheckFailure+0x323.
ffffe702`9fb951a0 fffff806`58f0f9d1 : 00000000`00000000 ffffe702`9fb95710 ffffc007`f03b7c80 ffffaf87`89e9aa18 : Ntfs!NtfsRemoveClose+0x22a53.
ffffe702`9fb951e0 fffff806`58f4d440 : fffff806`00000001 00000000`00000000 00000000`00000000 ffffaf87`89243680 : Ntfs!NtfsFspCloseInternal+0x121.
ffffe702`9fb95340 fffff806`58e2a577 : ffffc007`ea0e6700 ffffaf87`8bdbd050 ffffc007`ea0e6700 ffffaf87`8bdbd050 : Ntfs!NtfsFlushVolume+0x130.
ffffe702`9fb95460 fffff806`58e18527 : ffffaf87`8a569d78 ffffaf87`8bdbd050 ffffaf87`82aefca0 00000000`00000001 : Ntfs!NtfsVolumeDasdIo+0x1ef.
ffffe702`9fb95520 fffff806`58e1641c : ffffe702`9fb95720 ffffaf87`8bdbd050 ffffe702`9fb95720 ffffaf87`8a569d78 : Ntfs!NtfsCommonRead+0x1ef7.
ffffe702`9fb956e0 fffff806`5670a929 : ffffaf87`8bcc4ba0 ffffaf87`8bdbd050 ffffaf87`8bdbd480 00000000`00000000 : Ntfs!NtfsFsdRead+0x20c.
ffffe702`9fb957a0 fffff806`583355de : 00000000`00000000 ffffe702`9fb95880 ffffaf87`8bdbd050 ffffe702`9fb95890 : nt!IofCallDriver+0x59.
ffffe702`9fb957e0 fffff806`58333f16 : ffffe702`9fb95880 00000000`00000001 ffffaf87`89243501 fffff806`56cba885 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e.
ffffe702`9fb95860 fffff806`5670a929 : ffffaf87`8bdbd050 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltpDispatch+0xb6.
ffffe702`9fb958c0 fffff806`56cb2c45 : 00000000`00000000 ffffaf87`8b0d62c0 ffffaf87`8b0d6310 ffffaf87`8b0d62c0 : nt!IofCallDriver+0x59.
ffffe702`9fb95900 fffff806`56caee3f : ffffaf87`00000000 00000000`00000000 00000000`00000000 ffffe702`9fb95b80 : nt!IopSynchronousServiceTail+0x1a5.
ffffe702`9fb959a0 fffff806`567d3c18 : 00000000`00001a24 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x59f.
ffffe702`9fb95a90 00007ffc`af71c134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
000000ed`1c4fc518 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`af71c134.

THREAD_SHA1_HASH_MOD_FUNC: 15c9278a033007cc50c7d700879e19652a987cfa.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e94a66985e0c326aa2c5a4ca720ea329cbfe0b5.

THREAD_SHA1_HASH_MOD: d76a0bcce70b0f1946e92358c0d912972d85b8b4.

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0.
fffff806`567d4610 c644242000 mov byte ptr [rsp+20h],0.

FAULT_INSTR_CODE: 202444c6.

SYMBOL_STACK_INDEX: 2.

SYMBOL_NAME: nt!KiFastFailDispatch+d0.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

DEBUG_FLR_IMAGE_TIMESTAMP: 5629d63a.

IMAGE_VERSION: 10.0.18362.778.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: d0.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch.

BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch.

PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch.

TARGET_TIME: 2020-04-18T17:10:11.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 778.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: 2015-10-23 09:39:54.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 1af7.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch.

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner.
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died.
Arguments:
Arg1: ffffaf8f92231080, Process object or thread object.
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

SYSTEM_MANUFACTURER: ASUSTeK Computer Inc.

SYSTEM_PRODUCT_NAME: K53SV.

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: K53SV.324.

BIOS_DATE: 12/30/2011.

BASEBOARD_MANUFACTURER: ASUSTeK Computer Inc.

BASEBOARD_PRODUCT: K53SV.

BASEBOARD_VERSION: 1.0.

DUMP_TYPE: 2.

BUGCHECK_P1: ffffaf8f92231080.

BUGCHECK_P2: 0.

BUGCHECK_P3: 0.

BUGCHECK_P4: 0.

PROCESS_NAME: svchost.exe.

CRITICAL_PROCESS: svchost.exe.

EXCEPTION_CODE: (NTSTATUS) 0x91bc6040 - <Unable to get error code text>

ERROR_CODE: (NTSTATUS) 0x91bc6040 - <Unable to get error code text>

CRITICAL_PROCESS_REPORTGUID: {048c177c-e588-4579-8250-3c72ff9a7e01}

IMAGE_NAME: psmserviceexthost.dll.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

MODULE_NAME: psmserviceexthost.

FAULTING_MODULE: 0000000000000000.

CPU_COUNT: 4.

CPU_MHZ: 82f.

CPU_VENDOR: GenuineIntel.

CPU_FAMILY: 6.

CPU_MODEL: 2a.

CPU_STEPPING: 7.

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 2F'00000000 (cache) 2F'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

BUGCHECK_STR: 0xEF.

CURRENT_IRQL: 0.

ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB.

ANALYSIS_SESSION_TIME: 04-19-2020 14:44:43.0364.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

LAST_CONTROL_TRANSFER: from fffff8052bacb8a9 to fffff8052b3c2390.

STACK_TEXT:
ffffaa08`c926f938 fffff805`2bacb8a9 : 00000000`000000ef ffffaf8f`92231080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx.
ffffaa08`c926f940 fffff805`2b9ecbdf : ffffaf8f`92231080 fffff805`2b288065 ffffaf8f`92231080 fffff805`2b2880e0 : nt!PspCatchCriticalBreak+0x115.
ffffaa08`c926f9e0 fffff805`2b8700c0 : ffffaf8f`00000000 00000000`00000000 ffffaf8f`92231080 ffffaf8f`92231080 : nt!PspTerminateAllThreads+0x17b193.
ffffaa08`c926fa50 fffff805`2b86fce9 : ffffffff`ffffffff ffffaa08`c926fb80 ffffaf8f`92231080 fffff805`2b879401 : nt!PspTerminateProcess+0xe0.
ffffaa08`c926fa90 fffff805`2b3d3c18 : ffffaf8f`000003ac ffffaf8f`91bc6040 ffffaf8f`92231080 000000c8`0e87f94c : nt!NtTerminateProcess+0xa9.
ffffaa08`c926fb00 00007ffb`2571c5f4 : 00007ffb`2578fc1f 00007ffb`257bf980 000000c8`0e87f910 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
000000c8`0e87d968 00007ffb`2578fc1f : 00007ffb`257bf980 000000c8`0e87f910 00000000`00000000 000000c8`0e87db20 : 0x00007ffb`2571c5f4.
000000c8`0e87d970 00007ffb`257bf980 : 000000c8`0e87f910 00000000`00000000 000000c8`0e87db20 00000000`00000004 : 0x00007ffb`2578fc1f.
000000c8`0e87d978 000000c8`0e87f910 : 00000000`00000000 000000c8`0e87db20 00000000`00000004 00007ffb`25723c9d : 0x00007ffb`257bf980.
000000c8`0e87d980 00000000`00000000 : 000000c8`0e87db20 00000000`00000004 00007ffb`25723c9d 00007ffb`257bf980 : 0x000000c8`0e87f910.

THREAD_SHA1_HASH_MOD_FUNC: 042a2b51772309c39e12d732cc93cacf0af3064e.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f3390daa4e7d305510ebc53d68d6f54646545f69.

THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693.

FOLLOWUP_NAME: MachineOwner.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_91bc6040_psmserviceexthost.dll!HampActClose_IMAGE_psmserviceexthost.dll.

BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_91bc6040_psmserviceexthost.dll!HampActClose_IMAGE_psmserviceexthost.dll.

PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_91bc6040_psmserviceexthost.dll!HampActClose_IMAGE_psmserviceexthost.dll.

TARGET_TIME: 2020-04-18T21:20:48.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 778.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: 2015-10-23 09:39:54.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 1fe7.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_91bc6040_psmserviceexthost.dll!hampactclose_image_psmserviceexthost.dll.

FAILURE_ID_HASH: {d51d6f55-5efa-5689-c3d3-4919ddd10b0e}

Followup: MachineOwner.
---------

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind.
that the kernel isn't allowed to have/catch (bound trap) or that.
is always instant death (double fault). The first number in the.
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these.
traps are. Here is a *portion* of those codes:
If kv shows a taskGate.
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe.
use .trap on that value.
Else.
.trap on the appropriate frame will show where the trap was taken.
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif.
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT.
Arg2: ffff8a01dd42af90.
Arg3: 00000000fcc9f7d8.
Arg4: fffff8002760f533.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys.

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

SYSTEM_MANUFACTURER: ASUSTeK Computer Inc.

SYSTEM_PRODUCT_NAME: K53SV.

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: K53SV.324.

BIOS_DATE: 12/30/2011.

BASEBOARD_MANUFACTURER: ASUSTeK Computer Inc.

BASEBOARD_PRODUCT: K53SV.

BASEBOARD_VERSION: 1.0.

DUMP_TYPE: 2.

BUGCHECK_P1: 8.

BUGCHECK_P2: ffff8a01dd42af90.

BUGCHECK_P3: fcc9f7d8.

BUGCHECK_P4: fffff8002760f533.

BUGCHECK_STR: 0x7f_8.

TRAP_FRAME: ffff8a01dd42af90 -- (.trap 0xffff8a01dd42af90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc28b0afd0018 rbx=0000000000000000 rcx=ffff8686fcc9f898.
rdx=ffffc28b0afd0018 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8002760f533 rsp=00000000fcc9f7d8 rbp=ffffc28b0980e000.
r8=ffff8686fcc9f898 r9=ffffc28b0afd0010 r10=ffffc28b0cacebf0.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na pe nc.
nvlddmkm+0x20f533:
fffff800`2760f533 ff9090010000 call qword ptr [rax+190h] ds:ffffc28b`0afd01a8=fffff80027738670.
Resetting default scope.

CPU_COUNT: 4.

CPU_MHZ: 82f.

CPU_VENDOR: GenuineIntel.

CPU_FAMILY: 6.

CPU_MODEL: 2a.

CPU_STEPPING: 7.

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 2F'00000000 (cache) 2F'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

PROCESS_NAME: csgo.exe.

CURRENT_IRQL: 0.

ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB.

ANALYSIS_SESSION_TIME: 04-19-2020 14:44:39.0143.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

BAD_STACK_POINTER: 00000000fcc9f7d8.

LAST_CONTROL_TRANSFER: from fffff80020fd41e9 to fffff80020fc2390.

STACK_TEXT:
ffff8a01`dd42ae48 fffff800`20fd41e9 : 00000000`0000007f 00000000`00000008 ffff8a01`dd42af90 00000000`fcc9f7d8 : nt!KeBugCheckEx.
ffff8a01`dd42ae50 fffff800`20fcf043 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69.
ffff8a01`dd42af90 fffff800`2760f533 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3.
00000000`fcc9f7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x20f533.

THREAD_SHA1_HASH_MOD_FUNC: e636d4ec340919d2f06ae79550c90fca55a5b946.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4204bdb508bbf560c9d33ca223cd0af89c72f865.

THREAD_SHA1_HASH_MOD: 99270aa9efddf51499339f5ea82e28c2a8c9f7b4.

FOLLOWUP_IP:
nvlddmkm+20f533.
fffff800`2760f533 ff9090010000 call qword ptr [rax+190h]

FAULT_INSTR_CODE: 19090ff.

SYMBOL_STACK_INDEX: 3.

SYMBOL_NAME: nvlddmkm+20f533.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: nvlddmkm.

IMAGE_NAME: nvlddmkm.sys.

DEBUG_FLR_IMAGE_TIMESTAMP: 5ab5877e.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 20f533.

FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nvlddmkm!unknown_function.

BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nvlddmkm!unknown_function.

PRIMARY_PROBLEM_CLASS: 0x7f_8_STACKPTR_ERROR_nvlddmkm!unknown_function.

TARGET_TIME: 2020-04-18T20:22:55.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 778.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: 2015-10-23 09:39:54.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 14fcf.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:0x7f_8_stackptr_error_nvlddmkm!unknown_function.

FAILURE_ID_HASH: {a6a9f385-3944-d532-1786-ddbcad5847ca}

Followup: MachineOwner.
---------

Memtest86 olmuyordu USB yazdiriyorum BIOS'tan seçiyorum ama açmiyordu USB bende microsoft Windows bellek tanılama programindan yaptim temiz çikti.
 

Dosya Ekleri

  • A4dsız.png
    A4dsız.png
    42,4 KB · Görüntüleme: 29
  • Adsız.png
    Adsız.png
    45 KB · Görüntüleme: 30
İşletim sistemi dosyaların bozuk olabilir.
İşletim sistemini tekrar kurun ve sonuç bildirin.
 
Bellekler testten geçse bile bellek nedenli bir problem var, kusura bakmayın farklı bir önerim bulunmuyor.
Kod:
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39fcfe6c738d7af, Reserved
Arg2: b3b6dc6d19b72055, Reserved
Arg3: fffff807419fb240, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  ASUSTeK Computer Inc.

SYSTEM_PRODUCT_NAME:  K53SV

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  K53SV.324

BIOS_DATE:  12/30/2011

BASEBOARD_MANUFACTURER:  ASUSTeK Computer Inc.

BASEBOARD_PRODUCT:  K53SV

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: a39fcfe6c738d7af

BUGCHECK_P2: b3b6dc6d19b72055

BUGCHECK_P3: fffff807419fb240

BUGCHECK_P4: 1

PG_MISMATCH:  1

MEMORY_CORRUPTOR:  ONE_BIT

FAULTING_IP:
nt!ObCheckObjectAccess+0
fffff807`419fb240 4c8bdc          mov     r11,rsp

CPU_COUNT: 4

CPU_MHZ: 82f

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 2E'00000000 (cache) 2E'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x109

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-20-2020 17:01:39.0837

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

STACK_TEXT:
ffffb502`b38b4e98 00000000`00000000 : 00000000`00000109 a39fcfe6`c738d7af b3b6dc6d`19b72055 fffff807`419fb240 : nt!KeBugCheckEx


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff807419fb334 - nt!ObCheckObjectAccess+f4
    [ f7:f6 ]
1 error : !nt (fffff807419fb334)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-04-20T13:45:04.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1898

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------
 
Bellekler testten geçse bile bellek nedenli bir problem var, kusura bakmayın farklı bir önerim bulunmuyor.
Kod:
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39fcfe6c738d7af, Reserved
Arg2: b3b6dc6d19b72055, Reserved
Arg3: fffff807419fb240, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  ASUSTeK Computer Inc.

SYSTEM_PRODUCT_NAME:  K53SV

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  K53SV.324

BIOS_DATE:  12/30/2011

BASEBOARD_MANUFACTURER:  ASUSTeK Computer Inc.

BASEBOARD_PRODUCT:  K53SV

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: a39fcfe6c738d7af

BUGCHECK_P2: b3b6dc6d19b72055

BUGCHECK_P3: fffff807419fb240

BUGCHECK_P4: 1

PG_MISMATCH:  1

MEMORY_CORRUPTOR:  ONE_BIT

FAULTING_IP:
nt!ObCheckObjectAccess+0
fffff807`419fb240 4c8bdc          mov     r11,rsp

CPU_COUNT: 4

CPU_MHZ: 82f

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 2a

CPU_STEPPING: 7

CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 2E'00000000 (cache) 2E'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x109

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-20-2020 17:01:39.0837

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

STACK_TEXT:
ffffb502`b38b4e98 00000000`00000000 : 00000000`00000109 a39fcfe6`c738d7af b3b6dc6d`19b72055 fffff807`419fb240 : nt!KeBugCheckEx


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff807419fb334 - nt!ObCheckObjectAccess+f4
    [ f7:f6 ]
1 error : !nt (fffff807419fb334)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-04-20T13:45:04.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1898

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------
Yardımın için teşekkürler.
 

Geri
Yukarı