Çözüldü PFN_LIST_CORRUPT Mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

Jorquen

Megapat
Katılım
15 Haziran 2017
Mesajlar
264
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Son günlerde çok mavi ekran almaya başladım maalesef bunun nedeni nedir? Nasıl çözebiliriz?


Cidden sistem bozulacak diye korkuyorum ki galiba zaten bozuldu.
Neyse inşallah çözeriz.

Ryzen 5 2600.
MSI B450 GAMING Plus.
G-skill 8+8 GB 3000MHz RAM.
ASUS Expedition 1050 Ti.
Kingston A400SSD.
Daha lazımsa yazarsınız.
 
Son düzenleyen: Moderatör:
Windows 10 sürüm V2004 sorunlu sizle kaynaklı bir durum değil. Dönebiliyorsanız V1909'a dönün.
Sorunun 2004 sürümüyle ilgili olduğunu nereden biliyorsunuz? Bilip bilmeden mesaj atmayın lütfen.Evet 2004 sürümü sorunlu ancak arkadaşın sorununu bilmeden ezbere cevap vermek yersiz olur.
 
Windows 10 sürüm V2004 sorunlu sizle kaynaklı bir durum değil. Dönebiliyorsanız V1909'a dönün.

1591015824674.png


Sorunun 2004 sürümüyle ilgili olduğunu nereden biliyorsunuz? Bilip bilmeden mesaj atmayın lütfen. Evet 2004 sürümü sorunlu ancak arkadaşın sorununu bilmeden ezbere cevap vermek yersiz olur.

1909 zaten.
 
İnternet bağdaştırıcınızı sıfırlayın. DDU ile ekran kartı sürücünüzü kaldırıp tekrar yükleyin. Düzelmez ise Memtest ile RAM testi yapıp, HDD Sentinel ile de disk testi yapın. Ayrıca BIOS güncellemesi yapın, sürümünüz çok eski.
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80131899068, Address of the instruction which caused the bugcheck
Arg3: ffffa28950bc55b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 5

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 6

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80131899068

BUGCHECK_P3: ffffa28950bc55b0

BUGCHECK_P4: 0

CONTEXT:  ffffa28950bc55b0 -- (.cxr 0xffffa28950bc55b0)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000043
rdx=ffffa28950bc6090 rsi=ffffa48eeb703790 rdi=ffffa28950bc6080
rip=fffff80131899068 rsp=ffffa28950bc5fa0 rbp=ffffa28950bc60a0
 r8=0000000000000001  r9=0000000000000000 r10=fffff80125805ab0
r11=ffffa28950bc5ef0 r12=0000000000000004 r13=ffffa48ef2a02b70
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
dxgkrnl!CTokenManager::ProcessDxgkAdapterTokens+0x358:
fffff801`31899068 6641c745580000  mov     word ptr [r13+58h],0 ds:002b:ffffa48e`f2a02bc8=0101
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT: 
ffffa289`50bc5fa0 fffff801`31898c6a : ffffa48e`f3705780 ffffa48e`00000000 ffffa48e`f3705780 00000000`00000000 : dxgkrnl!CTokenManager::ProcessDxgkAdapterTokens+0x358
ffffa289`50bc68d0 fffff801`318aa149 : 00000000`00000000 ffff848f`c1baa7e0 ffffa48e`eb703790 fffff801`318a2b23 : dxgkrnl!CTokenManager::ProcessTokens+0x18a
ffffa289`50bc6990 fffff801`318a2a5c : 00000000`00000000 ffffa289`50bc6b80 ffffa48e`eb703790 fffff801`25e97f96 : dxgkrnl!CTokenManager::TokenThread+0x79
ffffa289`50bc69e0 fffff801`259d3c18 : ffff848f`b96ec540 00000000`00000000 00000000`00000020 00000000`00000000 : dxgkrnl!NtTokenManagerThread+0x1cc
ffffa289`50bc6b00 00007ffa`a7477de4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e1`9eb9fcc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a7477de4


SYMBOL_NAME:  dxgkrnl!CTokenManager::ProcessDxgkAdapterTokens+358

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.18362.836

STACK_COMMAND:  .cxr 0xffffa28950bc55b0 ; kb

BUCKET_ID_FUNC_OFFSET:  358

FAILURE_BUCKET_ID:  0x3B_c0000005_dxgkrnl!CTokenManager::ProcessDxgkAdapterTokens

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b487b2bf-d4ab-763c-6535-357c26c5ace3}

Followup:     MachineOwner
---------
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8025ee7f632, Address of the instruction which caused the bugcheck
Arg3: ffffe303737f6ab0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 6

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 28

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8025ee7f632

BUGCHECK_P3: ffffe303737f6ab0

BUGCHECK_P4: 0

CONTEXT:  ffffe303737f6ab0 -- (.cxr 0xffffe303737f6ab0)
rax=ffffbe8d8498b888 rbx=000000000000048c rcx=ffffbe8d866e1790
rdx=0000000000000000 rsi=00000000c0000001 rdi=0000000000000004
rip=fffff8025ee7f632 rsp=ffffe303737f74a0 rbp=ffffe303737f75e9
 r8=00000000ffffffff  r9=7fffbe8d866e18f0 r10=7ffffffffffffffc
r11=ffffe303737f7470 r12=0000000000000000 r13=0000000000000000
r14=0000025cb5d3a620 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nt!NtAlpcSendWaitReceivePort+0x172:
fffff802`5ee7f632 090f            or      dword ptr [rdi],ecx ds:002b:00000000`00000004=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

MISALIGNED_IP:
nt!NtAlpcSendWaitReceivePort+172
fffff802`5ee7f632 090f            or      dword ptr [rdi],ecx

STACK_TEXT: 
ffffe303`737f74a0 fffff802`699e7caa : 00000000`0000048c ffffe303`737f75e9 00000000`00000004 00000000`00000000 : nt!NtAlpcSendWaitReceivePort+0x172
ffffe303`737f7560 00000000`0000048c : ffffe303`737f75e9 00000000`00000004 00000000`00000000 0000025c`b5d3dc10 : klgse+0x17caa
ffffe303`737f7568 ffffe303`737f75e9 : 00000000`00000004 00000000`00000000 0000025c`b5d3dc10 000000b7`baf7f478 : 0x48c
ffffe303`737f7570 00000000`00000004 : 00000000`00000000 0000025c`b5d3dc10 000000b7`baf7f478 0000025c`b5d3a620 : 0xffffe303`737f75e9
ffffe303`737f7578 00000000`00000000 : 0000025c`b5d3dc10 000000b7`baf7f478 0000025c`b5d3a620 00000000`00000000 : 0x4


SYMBOL_NAME:  klgse+17caa

IMAGE_NAME:  hardware

STACK_COMMAND:  .cxr 0xffffe303737f6ab0 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup:     MachineOwner
---------
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000098, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8040e85fa97, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 6

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 23

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 98

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8040e85fa97

READ_ADDRESS: fffff804095733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8040942a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8040942a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000098

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

TRAP_FRAME:  ffff850cd4eb4a20 -- (.trap 0xffff850cd4eb4a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb18f69d599f0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040e85fa97 rsp=ffff850cd4eb4bb0 rbp=ffff850cd4eb4c69
 r8=0000000000000008  r9=0000000000000000 r10=fffff80409117700
r11=ffff7cfec8600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
tcpip+0xfa97:
fffff804`0e85fa97 488b8098000000  mov     rax,qword ptr [rax+98h] ds:00000000`00000098=????????????????
Resetting default scope

STACK_TEXT: 
ffff850c`d4eb48d8 fffff804`091d41e9 : 00000000`0000000a 00000000`00000098 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff850c`d4eb48e0 fffff804`091d0529 : 00000000`00000000 ffffb18f`6eebc050 ffffb18f`661e68a0 00000000`00000002 : nt!KiBugCheckDispatch+0x69
ffff850c`d4eb4a20 fffff804`0e85fa97 : ffffb18f`660c4be0 00000000`000000bc ffffb18f`6ee97260 fffff804`0e8900da : nt!KiPageFault+0x469
ffff850c`d4eb4bb0 fffff804`0e8b6e11 : ffffb18f`69d599f0 ffff850c`d4eb4da8 00000000`0000bb01 ffffb18f`00000000 : tcpip+0xfa97
ffff850c`d4eb4cd0 fffff804`0e8ba415 : 00000000`00000000 00000000`00000200 00000000`00000000 00000000`00000000 : tcpip+0x66e11
ffff850c`d4eb4f50 fffff804`0e8ba1d5 : 00000000`00000200 00000000`00000200 ffffb18f`6eebc2d0 00000000`00000000 : tcpip+0x6a415
ffff850c`d4eb5030 fffff804`0e8b9c08 : 00000000`00000006 ffffb18f`6d9f9260 00000000`00000000 ffffb18f`6d9f9260 : tcpip+0x6a1d5
ffff850c`d4eb5250 fffff804`0e8b996f : ffffb18f`6d9f9518 ffffb18f`6eebc050 ffffb18f`6eebc050 00000000`00000000 : tcpip+0x69c08
ffff850c`d4eb5360 fffff804`0e8b95aa : ffffb18f`6fde8050 ffffb18f`6fde8050 ffffb18f`6d9f9260 ffffb18f`66197d18 : tcpip+0x6996f
ffff850c`d4eb54a0 fffff804`0e8b8f4c : 00000000`00000000 ffffb18f`6bbf7b80 ffffb18f`6bbf7b50 ffffb18f`6e223b88 : tcpip+0x695aa
ffff850c`d4eb5620 fffff804`1788d066 : ffffb18f`6bbf7b50 ffffb18f`6bbf7b50 ffffb18f`6bbf7b50 00000000`00000000 : tcpip+0x68f4c
ffff850c`d4eb5650 fffff804`17897bfc : ffffb18f`6e2239e0 ffffb18f`6e223b88 00000000`00000000 ffffb18f`6bbf7b01 : afd!AfdConnect+0x6d6
ffff850c`d4eb57f0 fffff804`0910a929 : ffffb18f`6e2239e0 00000000`00000000 00000000`00000003 00000000`00000028 : afd!AfdDispatchDeviceControl+0x7c
ffff850c`d4eb5820 fffff804`096b3115 : ffffb18f`6e2239e0 00000000`00000000 ffffb18f`6e2239e0 00000000`00000000 : nt!IofCallDriver+0x59
ffff850c`d4eb5860 fffff804`096b2f20 : 00000000`00000000 00000000`00000000 ffffb18f`6f245860 ffff850c`d4eb5b80 : nt!IopSynchronousServiceTail+0x1a5
ffff850c`d4eb5900 fffff804`096b22f6 : b18f6c39`39309a5d 00000000`00000000 00000000`00000000 00000232`44f58890 : nt!IopXxxControlFile+0xc10
ffff850c`d4eb5a20 fffff804`091d3c18 : 00000000`00000001 00000043`329fe301 00000000`00000000 ffff850c`d4eb5a00 : nt!NtDeviceIoControlFile+0x56
ffff850c`d4eb5a90 00007ff8`8991c154 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000043`329fe108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`8991c154


SYMBOL_NAME:  tcpip+fa97

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

IMAGE_VERSION:  10.0.18362.836

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  fa97

FAILURE_BUCKET_ID:  AV_tcpip!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c94484cf-8655-07ec-34a0-1379f617a790}

Followup:     MachineOwner
---------
Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffab01b288b1b0
Arg3: ffffab01b2894000
Arg4: fffff80025c00b74

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 7

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 11

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffab01b288b1b0

BUGCHECK_P3: ffffab01b2894000

BUGCHECK_P4: fffff80025c00b74

TRAP_FRAME:  ffffab01b288b1b0 -- (.trap 0xffffab01b288b1b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff80025c02250
rdx=000000b4e8dfec68 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80025c00b74 rsp=ffffab01b2894000 rbp=ffffbb00fa1e1ed0
 r8=00000000626078d8  r9=00000000a58edb7b r10=0000000000002427
r11=00000000242766f5 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
clipsp+0x30b74:
fffff800`25c00b74 51              push    rcx
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

BAD_STACK_POINTER:  ffffab01b2894000

STACK_TEXT: 
ffffab01`b288b068 fffff800`249d41e9 : 00000000`0000007f 00000000`00000008 ffffab01`b288b1b0 ffffab01`b2894000 : nt!KeBugCheckEx
ffffab01`b288b070 fffff800`249cf043 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffab01`b288b1b0 fffff800`25c00b74 : fa1e2c90`00000000 00000000`ffffbb00 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
ffffab01`b2894000 fa1e2c90`00000000 : 00000000`ffffbb00 00000000`00000000 00000000`00000000 b288b340`00000000 : clipsp+0x30b74
ffffab01`b2894008 00000000`ffffbb00 : 00000000`00000000 00000000`00000000 b288b340`00000000 b288d340`ffffab01 : 0xfa1e2c90`00000000
ffffab01`b2894010 00000000`00000000 : 00000000`00000000 b288b340`00000000 b288d340`ffffab01 b2891340`ffffab01 : 0xffffbb00


SYMBOL_NAME:  clipsp+30b74

MODULE_NAME: clipsp

IMAGE_NAME:  clipsp.sys

IMAGE_VERSION:  10.0.18362.387

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  30b74

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_clipsp!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {48f2dfdf-6e28-ad4e-f693-f41bb475ff86}

Followup:     MachineOwner
---------
Kod:
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000041b92, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0a0000c0000c2593, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 8

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 99

BUGCHECK_P2: 41b92

BUGCHECK_P3: 2

BUGCHECK_P4: a0000c0000c2593

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT: 
ffff9b0d`d2978ab8 fffff804`4724a091 : 00000000`0000004e 00000000`00000099 00000000`00041b92 00000000`00000002 : nt!KeBugCheckEx
ffff9b0d`d2978ac0 fffff804`470af33f : 1a000000`435df867 ffff9b0d`d29797c0 ffff9b0d`d2978b81 00000000`00000200 : nt!MiDecrementShareCount+0x16fed1
ffff9b0d`d2978b00 fffff804`470f32fb : ffff9b0d`d2978f10 ffffaf0c`de33d4c0 00000000`00000001 ffff9b0d`d29797c0 : nt!MiDeletePteList+0x55f
ffff9b0d`d2978be0 fffff804`476945cd : 00000000`00000002 ffffaf0c`de33d4c0 00000000`1c88f000 ffffaf0c`e8013bb0 : nt!MiDecommitPages+0x153b
ffff9b0d`d2979780 fffff804`47694b1b : 00000000`00013000 00000000`00000000 ffff9b0d`d2979a60 ffffffff`ffffffff : nt!MiDecommitRegion+0xbd
ffff9b0d`d2979960 fffff804`4769480b : 00000000`00000000 00000000`00000000 ffff3983`7fcd96ab 00000000`00000004 : nt!MmFreeVirtualMemory+0x2db
ffff9b0d`d2979aa0 fffff804`471d3c18 : ffffaf0c`eb1de500 ffff9b0d`d2979b80 00000000`00000000 ffffaf0c`e4330660 : nt!NtFreeVirtualMemory+0x8b
ffff9b0d`d2979b00 00007ffb`6631c434 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`09f1dd88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`6631c434


SYMBOL_NAME:  nt!MiDecrementShareCount+16fed1

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.836

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  16fed1

FAILURE_BUCKET_ID:  0x4E_99_nt!MiDecrementShareCount

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {add373c4-2fe4-723e-d1db-12fcb6adef02}

Followup:     MachineOwner
---------

@Murat5038
 
Windows 10 sürüm V2004 sorunlu. Sizle kaynaklı bir durum değil. Dönebiliyorsanız V1909'a dönün.
Dosyayı analiz bile etmeden 2004 sorunlu. Nesi sorunlu? Minidump dosyasını açıp bakmadan yazmayalım lütfen. 2004 sürümü gayet sorunsuz çalışıyor.
 
İnternet bağdaştırıcınızı sıfırlayın. DDU ile ekran kartı sürücünüzü kaldırıp tekrar yükleyin. Düzelmez ise Memtest ile RAM testi yapıp, HDD sentinel ile de disk testi yapın. Ayrıca BIOS güncellemesi yapın, sürümünüz çok eski.
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff80131899068, Address of the instruction which caused the bugcheck.
Arg3: ffffa28950bc55b0, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 5.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-JC78BRD.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 6.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80131899068.

BUGCHECK_P3: ffffa28950bc55b0.

BUGCHECK_P4: 0.

CONTEXT: ffffa28950bc55b0 -- (.cxr 0xffffa28950bc55b0)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000043.
rdx=ffffa28950bc6090 rsi=ffffa48eeb703790 rdi=ffffa28950bc6080.
rip=fffff80131899068 rsp=ffffa28950bc5fa0 rbp=ffffa28950bc60a0.
r8=0000000000000001 r9=0000000000000000 r10=fffff80125805ab0.
r11=ffffa28950bc5ef0 r12=0000000000000004 r13=ffffa48ef2a02b70.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246.
dxgkrnl!CTokenManager::processDxgkAdapterTokens+0x358:
fffff801`31899068 6641c745580000 mov word ptr [r13+58h],0 ds:002b:ffffa48e`f2a02bc8=0101.
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: dwm.exe.

STACK_TEXT:
ffffa289`50bc5fa0 fffff801`31898c6a : ffffa48e`f3705780 ffffa48e`00000000 ffffa48e`f3705780 00000000`00000000 : dxgkrnl!CTokenManager::processDxgkAdapterTokens+0x358.
ffffa289`50bc68d0 fffff801`318aa149 : 00000000`00000000 ffff848f`c1baa7e0 ffffa48e`eb703790 fffff801`318a2b23 : dxgkrnl!CTokenManager::processTokens+0x18a.
ffffa289`50bc6990 fffff801`318a2a5c : 00000000`00000000 ffffa289`50bc6b80 ffffa48e`eb703790 fffff801`25e97f96 : dxgkrnl!CTokenManager::TokenThread+0x79.
ffffa289`50bc69e0 fffff801`259d3c18 : ffff848f`b96ec540 00000000`00000000 00000000`00000020 00000000`00000000 : dxgkrnl!NtTokenManagerThread+0x1cc.
ffffa289`50bc6b00 00007ffa`a7477de4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
000000e1`9eb9fcc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a7477de4.

SYMBOL_NAME: dxgkrnl!CTokenManager::processDxgkAdapterTokens+358.

MODULE_NAME: dxgkrnl.

IMAGE_NAME: dxgkrnl.sys.

IMAGE_VERSION: 10.0.18362.836.

STACK_COMMAND: .cxr 0xffffa28950bc55b0 ; kb.

BUCKET_ID_FUNC_OFFSET: 358.

FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!CTokenManager::processDxgkAdapterTokens.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b487b2bf-d4ab-763c-6535-357c26c5ace3}

Followup: MachineOwner.
---------
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff8025ee7f632, Address of the instruction which caused the bugcheck.
Arg3: ffffe303737f6ab0, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 6.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-JC78BRD.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 28.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 71.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff8025ee7f632.

BUGCHECK_P3: ffffe303737f6ab0.

BUGCHECK_P4: 0.

CONTEXT: ffffe303737f6ab0 -- (.cxr 0xffffe303737f6ab0)
rax=ffffbe8d8498b888 rbx=000000000000048c rcx=ffffbe8d866e1790.
rdx=0000000000000000 rsi=00000000c0000001 rdi=0000000000000004.
rip=fffff8025ee7f632 rsp=ffffe303737f74a0 rbp=ffffe303737f75e9.
r8=00000000ffffffff r9=7fffbe8d866e18f0 r10=7ffffffffffffffc.
r11=ffffe303737f7470 r12=0000000000000000 r13=0000000000000000.
r14=0000025cb5d3a620 r15=0000000000000000.
iopl=0 nv up ei ng nz na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286.
nt!NtAlpcSendWaitReceivePort+0x172:
fffff802`5ee7f632 090f or dword ptr [rdi],ecx ds:002b:00000000`00000004=????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: dwm.exe.

MISALIGNED_IP:
nt!NtAlpcSendWaitReceivePort+172.
fffff802`5ee7f632 090f or dword ptr [rdi],ecx.

STACK_TEXT:
ffffe303`737f74a0 fffff802`699e7caa : 00000000`0000048c ffffe303`737f75e9 00000000`00000004 00000000`00000000 : nt!NtAlpcSendWaitReceivePort+0x172.
ffffe303`737f7560 00000000`0000048c : ffffe303`737f75e9 00000000`00000004 00000000`00000000 0000025c`b5d3dc10 : klgse+0x17caa.
ffffe303`737f7568 ffffe303`737f75e9 : 00000000`00000004 00000000`00000000 0000025c`b5d3dc10 000000b7`baf7f478 : 0x48c.
ffffe303`737f7570 00000000`00000004 : 00000000`00000000 0000025c`b5d3dc10 000000b7`baf7f478 0000025c`b5d3a620 : 0xffffe303`737f75e9.
ffffe303`737f7578 00000000`00000000 : 0000025c`b5d3dc10 000000b7`baf7f478 0000025c`b5d3a620 00000000`00000000 : 0x4.

SYMBOL_NAME: klgse+17caa.

IMAGE_NAME: hardware.

STACK_COMMAND: .cxr 0xffffe303737f6ab0 ; kb.

MODULE_NAME: hardware.

FAILURE_BUCKET_ID: IP_MISALIGNED.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup: MachineOwner.
---------
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000098, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8040e85fa97, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 6.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-JC78BRD.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 23.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: d1.

BUGCHECK_P1: 98.

BUGCHECK_P2: 2.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff8040e85fa97.

READ_ADDRESS: fffff804095733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8040942a3d8: Unable to get Flags value from nt!KdVersionBlock.
fffff8040942a3d8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000098.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: opera.exe.

TRAP_FRAME: ffff850cd4eb4a20 -- (.trap 0xffff850cd4eb4a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb18f69d599f0.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8040e85fa97 rsp=ffff850cd4eb4bb0 rbp=ffff850cd4eb4c69.
r8=0000000000000008 r9=0000000000000000 r10=fffff80409117700.
r11=ffff7cfec8600000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na pe nc.
tcpip+0xfa97:
fffff804`0e85fa97 488b8098000000 mov rax,qword ptr [rax+98h] ds:00000000`00000098=????????????????
Resetting default scope.

STACK_TEXT:
ffff850c`d4eb48d8 fffff804`091d41e9 : 00000000`0000000a 00000000`00000098 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
ffff850c`d4eb48e0 fffff804`091d0529 : 00000000`00000000 ffffb18f`6eebc050 ffffb18f`661e68a0 00000000`00000002 : nt!KiBugCheckDispatch+0x69.
ffff850c`d4eb4a20 fffff804`0e85fa97 : ffffb18f`660c4be0 00000000`000000bc ffffb18f`6ee97260 fffff804`0e8900da : nt!KiPageFault+0x469.
ffff850c`d4eb4bb0 fffff804`0e8b6e11 : ffffb18f`69d599f0 ffff850c`d4eb4da8 00000000`0000bb01 ffffb18f`00000000 : tcpip+0xfa97.
ffff850c`d4eb4cd0 fffff804`0e8ba415 : 00000000`00000000 00000000`00000200 00000000`00000000 00000000`00000000 : tcpip+0x66e11.
ffff850c`d4eb4f50 fffff804`0e8ba1d5 : 00000000`00000200 00000000`00000200 ffffb18f`6eebc2d0 00000000`00000000 : tcpip+0x6a415.
ffff850c`d4eb5030 fffff804`0e8b9c08 : 00000000`00000006 ffffb18f`6d9f9260 00000000`00000000 ffffb18f`6d9f9260 : tcpip+0x6a1d5.
ffff850c`d4eb5250 fffff804`0e8b996f : ffffb18f`6d9f9518 ffffb18f`6eebc050 ffffb18f`6eebc050 00000000`00000000 : tcpip+0x69c08.
ffff850c`d4eb5360 fffff804`0e8b95aa : ffffb18f`6fde8050 ffffb18f`6fde8050 ffffb18f`6d9f9260 ffffb18f`66197d18 : tcpip+0x6996f.
ffff850c`d4eb54a0 fffff804`0e8b8f4c : 00000000`00000000 ffffb18f`6bbf7b80 ffffb18f`6bbf7b50 ffffb18f`6e223b88 : tcpip+0x695aa.
ffff850c`d4eb5620 fffff804`1788d066 : ffffb18f`6bbf7b50 ffffb18f`6bbf7b50 ffffb18f`6bbf7b50 00000000`00000000 : tcpip+0x68f4c.
ffff850c`d4eb5650 fffff804`17897bfc : ffffb18f`6e2239e0 ffffb18f`6e223b88 00000000`00000000 ffffb18f`6bbf7b01 : afd!AfdConnect+0x6d6.
ffff850c`d4eb57f0 fffff804`0910a929 : ffffb18f`6e2239e0 00000000`00000000 00000000`00000003 00000000`00000028 : afd!AfdDispatchDeviceControl+0x7c.
ffff850c`d4eb5820 fffff804`096b3115 : ffffb18f`6e2239e0 00000000`00000000 ffffb18f`6e2239e0 00000000`00000000 : nt!IofCallDriver+0x59.
ffff850c`d4eb5860 fffff804`096b2f20 : 00000000`00000000 00000000`00000000 ffffb18f`6f245860 ffff850c`d4eb5b80 : nt!IopSynchronousServiceTail+0x1a5.
ffff850c`d4eb5900 fffff804`096b22f6 : b18f6c39`39309a5d 00000000`00000000 00000000`00000000 00000232`44f58890 : nt!IopXxxControlFile+0xc10.
ffff850c`d4eb5a20 fffff804`091d3c18 : 00000000`00000001 00000043`329fe301 00000000`00000000 ffff850c`d4eb5a00 : nt!NtDeviceIoControlFile+0x56.
ffff850c`d4eb5a90 00007ff8`8991c154 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000043`329fe108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`8991c154.

SYMBOL_NAME: tcpip+fa97.

MODULE_NAME: tcpip.

IMAGE_NAME: tcpip.sys.

IMAGE_VERSION: 10.0.18362.836.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: fa97.

FAILURE_BUCKET_ID: AV_tcpip!unknown_function.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {c94484cf-8655-07ec-34a0-1379f617a790}

Followup: MachineOwner.
---------
Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind.
that the kernel isn't allowed to have/catch (bound trap) or that.
is always instant death (double fault). The first number in the.
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these.
traps are. Here is a *portion* of those codes:
If kv shows a taskGate.
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe.
use .trap on that value.
Else.
.trap on the appropriate frame will show where the trap was taken.
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif.
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT.
Arg2: ffffab01b288b1b0.
Arg3: ffffab01b2894000.
Arg4: fffff80025c00b74.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 7.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-JC78BRD.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 11.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 72.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: 7f.

BUGCHECK_P1: 8.

BUGCHECK_P2: ffffab01b288b1b0.

BUGCHECK_P3: ffffab01b2894000.

BUGCHECK_P4: fffff80025c00b74.

TRAP_FRAME: ffffab01b288b1b0 -- (.trap 0xffffab01b288b1b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff80025c02250.
rdx=000000b4e8dfec68 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80025c00b74 rsp=ffffab01b2894000 rbp=ffffbb00fa1e1ed0.
r8=00000000626078d8 r9=00000000a58edb7b r10=0000000000002427.
r11=00000000242766f5 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
clipsp+0x30b74:
fffff800`25c00b74 51 push rcx.
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: svchost.exe.

BAD_STACK_POINTER: ffffab01b2894000.

STACK_TEXT:
ffffab01`b288b068 fffff800`249d41e9 : 00000000`0000007f 00000000`00000008 ffffab01`b288b1b0 ffffab01`b2894000 : nt!KeBugCheckEx.
ffffab01`b288b070 fffff800`249cf043 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69.
ffffab01`b288b1b0 fffff800`25c00b74 : fa1e2c90`00000000 00000000`ffffbb00 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3.
ffffab01`b2894000 fa1e2c90`00000000 : 00000000`ffffbb00 00000000`00000000 00000000`00000000 b288b340`00000000 : clipsp+0x30b74.
ffffab01`b2894008 00000000`ffffbb00 : 00000000`00000000 00000000`00000000 b288b340`00000000 b288d340`ffffab01 : 0xfa1e2c90`00000000.
ffffab01`b2894010 00000000`00000000 : 00000000`00000000 b288b340`00000000 b288d340`ffffab01 b2891340`ffffab01 : 0xffffbb00.

SYMBOL_NAME: clipsp+30b74.

MODULE_NAME: clipsp.

IMAGE_NAME: clipsp.sys.

IMAGE_VERSION: 10.0.18362.387.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 30b74.

FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_clipsp!unknown_function.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {48f2dfdf-6e28-ad4e-f693-f41bb475ff86}

Followup: MachineOwner.
---------
Kod:
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling.
MmUnlockPages twice with the same list, etc). If a kernel debugger is.
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt.
Arg2: 0000000000041b92, page frame number.
Arg3: 0000000000000002, current page state.
Arg4: 0a0000c0000c2593, 0.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 4.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-JC78BRD.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 8.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 69.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: 4e.

BUGCHECK_P1: 99.

BUGCHECK_P2: 41b92.

BUGCHECK_P3: 2.

BUGCHECK_P4: a0000c0000c2593.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: Discord.exe.

STACK_TEXT:
ffff9b0d`d2978ab8 fffff804`4724a091 : 00000000`0000004e 00000000`00000099 00000000`00041b92 00000000`00000002 : nt!KeBugCheckEx.
ffff9b0d`d2978ac0 fffff804`470af33f : 1a000000`435df867 ffff9b0d`d29797c0 ffff9b0d`d2978b81 00000000`00000200 : nt!MiDecrementShareCount+0x16fed1.
ffff9b0d`d2978b00 fffff804`470f32fb : ffff9b0d`d2978f10 ffffaf0c`de33d4c0 00000000`00000001 ffff9b0d`d29797c0 : nt!MiDeletePteList+0x55f.
ffff9b0d`d2978be0 fffff804`476945cd : 00000000`00000002 ffffaf0c`de33d4c0 00000000`1c88f000 ffffaf0c`e8013bb0 : nt!MiDecommitPages+0x153b.
ffff9b0d`d2979780 fffff804`47694b1b : 00000000`00013000 00000000`00000000 ffff9b0d`d2979a60 ffffffff`ffffffff : nt!MiDecommitRegion+0xbd.
ffff9b0d`d2979960 fffff804`4769480b : 00000000`00000000 00000000`00000000 ffff3983`7fcd96ab 00000000`00000004 : nt!MmFreeVirtualMemory+0x2db.
ffff9b0d`d2979aa0 fffff804`471d3c18 : ffffaf0c`eb1de500 ffff9b0d`d2979b80 00000000`00000000 ffffaf0c`e4330660 : nt!NtFreeVirtualMemory+0x8b.
ffff9b0d`d2979b00 00007ffb`6631c434 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000000`09f1dd88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`6631c434.

SYMBOL_NAME: nt!MiDecrementShareCount+16fed1.

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.18362.836.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: memory_corruption.

BUCKET_ID_FUNC_OFFSET: 16fed1.

FAILURE_BUCKET_ID: 0x4E_99_nt!MiDecrementShareCount.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {add373c4-2fe4-723e-d1db-12fcb6adef02}

Followup: MachineOwner.
---------

@Murat5038

1591019786646.png


Silip tekrar yüklerken böyle bir hata oldu.
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı