necmiboraobuz
Hectopat
- Katılım
- 28 Ocak 2020
- Mesajlar
- 21
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80678845d9d, Address of the instruction which caused the bugcheck
Arg3: fffff50b3aba25c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5220
BIOS_DATE: 09/12/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X370-PRO
BASEBOARD_VERSION: Rev X.0x
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80678845d9d
BUGCHECK_P3: fffff50b3aba25c0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExFreeHeapPool+21d
fffff806`78845d9d 488b5328 mov rdx,qword ptr [rbx+28h]
CONTEXT: fffff50b3aba25c0 -- (.cxr 0xfffff50b3aba25c0)
rax=0000000000000ed0 rbx=d5ad2e1bd0963492 rcx=ffffc60dc00034f8
rdx=0000000000000020 rsi=ffffc63684a76320 rdi=ffffc63684a76310
rip=fffff80678845d9d rsp=fffff50b3aba2fb0 rbp=0000000079737355
r8=0000000000000030 r9=ffffc60dc0001000 r10=0000000000000020
r11=00000000000000ff r12=00000000000000a9 r13=0000000000000001
r14=0000000000000030 r15=000000000000002b
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ExFreeHeapPool+0x21d:
fffff806`78845d9d 488b5328 mov rdx,qword ptr [rbx+28h] ds:002b:d5ad2e1b`d09634ba=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Discord.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-28-2020 21:53:19.0574
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80678b6f0a9 to fffff80678845d9d
STACK_TEXT:
fffff50b`3aba2fb0 fffff806`78b6f0a9 : ffffc88a`8e6ab005 ffffc619`83dd4801 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x21d
fffff50b`3aba30d0 ffffc619`83af06c2 : 00000000`00000000 ffffc636`8467c010 00000000`00000000 ffffa5fd`e6a00000 : nt!ExFreePool+0x9
fffff50b`3aba3100 ffffc619`83de806c : 00000000`00000000 ffffc636`84a76320 ffffc636`84a76320 ffffc636`8467c010 : win32kfull!Win32FreePoolImpl+0x52
fffff50b`3aba3130 ffffc619`83a2aba2 : 00000000`00000002 ffffc636`8467c010 00000000`ffffffff 00000000`00000002 : win32kbase!Win32FreePool+0x2c
fffff50b`3aba3160 fffff806`789d2d18 : ffffc88a`8e6ab080 00000000`1fe0e958 00000000`ffffffff ffff8d84`00001cbf : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x4c2
fffff50b`3aba3a90 00007ff8`b4218694 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1fe0e938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b4218694
THREAD_SHA1_HASH_MOD_FUNC: 8f2c9be91f516881ba934f4b4e1f6809179fc188
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 95fa05418c9f13803c32dc6c50e69b8d1d4b0874
THREAD_SHA1_HASH_MOD: 740a44c1f2944413577e37a9081003b6157fbce6
FOLLOWUP_IP:
nt!ExFreePool+9
fffff806`78b6f0a9 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExFreePool+9
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.535
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff50b3aba25c0 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!ExFreePool
TARGET_TIME: 2020-01-01T12:00:00.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.535
ANALYSIS_SESSION_ELAPSED_TIME: 170c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!exfreepool
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffffb98b4b010100, Address of the heap that reported the corruption
Arg3: ffffb98b5de16000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 12
BUGCHECK_P2: ffffb98b4b010100
BUGCHECK_P3: ffffb98b5de16000
BUGCHECK_P4: 0
CORRUPTING_POOL_ADDRESS: fffff801755733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffb98b5de16000
FAULTING_IP:
nt!ExFreePool+9
fffff801`7536f0a9 4883c428 add rsp,28h
BUGCHECK_STR: 0x13a_12
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-28-2020 21:53:23.0026
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8017531ac78 to fffff801751c14e0
STACK_TEXT:
fffff801`78266f88 fffff801`7531ac78 : 00000000`0000013a 00000000`00000012 ffffb98b`4b010100 ffffb98b`5de16000 : nt!KeBugCheckEx
fffff801`78266f90 fffff801`7531acd8 : 00000000`00000012 ffffb98b`4b010280 ffffb98b`4b010100 00000000`00000000 : nt!RtlpHeapHandleError+0x40
fffff801`78266fd0 fffff801`7531a901 : ffffb98b`5de13fe0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58
fffff801`78267000 fffff801`751faa26 : 00000000`00000000 00000000`00000000 fffff801`83f2fc10 ffffb98b`52c6f290 : nt!RtlpLogHeapFailure+0x45
fffff801`78267030 fffff801`750460ed : ffffb98b`5de14000 ffffb98b`4b010000 fffff801`782670f8 00000000`00000000 : nt!RtlpHpVsContextFree+0x1b6d36
fffff801`782670d0 fffff801`7536f0a9 : fffff801`74f61e70 fffff801`83f1d716 00000000`00000081 01000000`00100000 : nt!ExFreeHeapPool+0x56d
fffff801`782671f0 fffff801`83ef777e : fffff801`78267230 fffff801`83f03a9e 00000000`00000000 00000000`00000000 : nt!ExFreePool+0x9
fffff801`78267220 fffff801`83ef70fe : ffffb98b`53817e70 ffffb98b`00000000 ffffb98b`00000000 ffffb98b`00000000 : dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x2be
fffff801`782673d0 fffff801`83ef479b : ffffb98b`53817e02 00000000`00000001 fffff801`78267629 00000000`00000000 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x6ee
fffff801`78267530 fffff801`7fa44711 : fffff801`78267629 ffffb98b`536ef000 ffffb98b`52f776e8 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x22b
fffff801`782675e0 fffff801`81c17cb4 : ffffb98b`52f77030 00000000`00000000 ffffb98b`52f77030 ffffb98b`52f55000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff801`78267690 ffffb98b`52f77030 : 00000000`00000000 ffffb98b`52f77030 ffffb98b`52f55000 fffff801`81c17c47 : nvlddmkm+0xa7cb4
fffff801`78267698 00000000`00000000 : ffffb98b`52f77030 ffffb98b`52f55000 fffff801`81c17c47 ffffb98b`52f55000 : 0xffffb98b`52f77030
THREAD_SHA1_HASH_MOD_FUNC: 57a748b76e85c86c9516e8b5ba4295dbc76c4391
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 438fa957cd00259f022ef234fadec3d9573e5f42
THREAD_SHA1_HASH_MOD: 67df1a950c2b3dc4b5c6ec38e0e1ad109a0309b1
FOLLOWUP_IP:
nt!ExFreePool+9
fffff801`7536f0a9 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: nt!ExFreePool+9
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.535
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x13a_12_nt!ExFreePool
BUCKET_ID: 0x13a_12_nt!ExFreePool
PRIMARY_PROBLEM_CLASS: 0x13a_12_nt!ExFreePool
TARGET_TIME: 2020-01-16T13:51:22.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.535
ANALYSIS_SESSION_ELAPSED_TIME: ec3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x13a_12_nt!exfreepool
FAILURE_ID_HASH: {0e8bc89c-9b1f-e697-ed6c-83210db041e2}
Followup: Pool_corruption
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff8024de0904b, The address that the exception occurred at
Arg3: ffffcb8fef9d1580, Parameter 0 of the exception
Arg4: fffff8024203eed0, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff8024de0904b
BUGCHECK_P3: ffffcb8fef9d1580
BUGCHECK_P4: fffff8024203eed0
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>
FAULTING_IP:
pacer!PcpSchedulerBatchAndSendOrDropNblChain+1b
fffff802`4de0904b 41 ???
EXCEPTION_PARAMETER1: ffffcb8fef9d1580
EXCEPTION_PARAMETER2: fffff8024203eed0
BUGCHECK_STR: 0x1E_c000001d
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: Discord.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-28-2020 21:53:26.0831
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: ffff8d81ce1f58f8
LAST_CONTROL_TRANSFER: from fffff8024222fda7 to fffff802421c14e0
FAILED_INSTRUCTION_ADDRESS:
pacer!PcpSchedulerBatchAndSendOrDropNblChain+1b
fffff802`4de0904b 41 ???
STACK_TEXT:
ffff8d81`ce1f58f8 fffff802`4222fda7 : 00000000`0000001e ffffffff`c000001d fffff802`4de0904b ffffcb8f`ef9d1580 : nt!KeBugCheckEx
ffff8d81`ce1f5900 fffff802`421c2362 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1689d7
ffff8d81`ce1f5fb0 fffff802`421c2330 : fffff802`421d3416 ffffcb8f`d743e8a0 00000000`00000010 ffffcb8f`d7440780 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffb409`4fd0ec78 fffff802`421d3416 : ffffcb8f`d743e8a0 00000000`00000010 ffffcb8f`d7440780 ffffb409`4fd0f1a8 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffb409`4fd0ec80 fffff802`421cd9ab : 0000001d`21a45885 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116
ffffb409`4fd0ee60 fffff802`4de0904b : fffff802`4de09529 ffffcb8f`e3f1d6e0 ffffb409`4fd0f089 ffffcb8f`db3f4190 : nt!KiInvalidOpcodeFault+0x32b
ffffb409`4fd0eff8 ffffcb8f`00000000 : ffffb409`000000f9 00000000`00000000 00000000`00000002 ffffcb8f`ea5479d0 : pacer!PcpSchedulerBatchAndSendOrDropNblChain+0x1b
ffffb409`4fd0f028 ffffb409`000000f9 : 00000000`00000000 00000000`00000002 ffffcb8f`ea5479d0 00000000`00000000 : 0xffffcb8f`00000000
ffffb409`4fd0f030 00000000`00000000 : 00000000`00000002 ffffcb8f`ea5479d0 00000000`00000000 0000001e`0f5d7d6a : 0xffffb409`000000f9
CHKIMG_EXTENSION: !chkimg -lo 50 -d !pacer
fffff8024de09040 - pacer!PcpSchedulerBatchAndSendOrDropNblChain+10
[ 89:81 ]
1 error : !pacer (fffff8024de09040)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-01-21T20:05:31.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: 2406
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff91e70083971e, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffff9109ee480dd9, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffff91e70083971e
BUGCHECK_P2: 0
BUGCHECK_P3: ffff9109ee480dd9
BUGCHECK_P4: 2
READ_ADDRESS: fffff8074f5733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff91e70083971e
FAULTING_IP:
win32kfull!IsWindowHolographicForHitTest+19
ffff9109`ee480dd9 488b4368 mov rax,qword ptr [rbx+68h]
MM_INTERNAL_CODE: 2
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: Pacify-Win64-S
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-28-2020 21:53:30.0515
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffa88880b3f6a0 -- (.trap 0xffffa88880b3f6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff914200839690
rdx=000000000000c035 rsi=0000000000000000 rdi=0000000000000000
rip=ffff9109ee480dd9 rsp=ffffa88880b3f830 rbp=ffffa88880b3f909
r8=0000000000000001 r9=0000000000000001 r10=ffff9109ee824140
r11=00000000000001a7 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
win32kfull!IsWindowHolographicForHitTest+0x19:
ffff9109`ee480dd9 488b4368 mov rax,qword ptr [rbx+68h] ds:00000000`00000068=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8074f1e35d6 to fffff8074f1c14e0
STACK_TEXT:
ffffa888`80b3f3f8 fffff807`4f1e35d6 : 00000000`00000050 ffff91e7`0083971e 00000000`00000000 ffffa888`80b3f6a0 : nt!KeBugCheckEx
ffffa888`80b3f400 fffff807`4f072eef : 00000000`00000000 00000000`00000000 00000000`00000000 ffff91e7`0083971e : nt!MiSystemFault+0x1d6866
ffffa888`80b3f500 fffff807`4f1cf520 : ffffc080`441d4000 ffffd70c`a4880040 00000000`00000000 00000000`000000d2 : nt!MmAccessFault+0x34f
ffffa888`80b3f6a0 ffff9109`ee480dd9 : ffff9142`00e02c00 ffffa888`80b3fab0 ffff9109`ee82d570 ffff9109`ee4991ee : nt!KiPageFault+0x360
ffffa888`80b3f830 ffff9109`ee4808dd : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc080`441c0100 : win32kfull!IsWindowHolographicForHitTest+0x19
ffffa888`80b3f890 ffff9109`ee4807d7 : ffffa888`80b3f9e0 ffffa888`80b3f9e8 00000000`00000060 ffff9142`00839690 : win32kfull!xxxDCEWindowHitTest2Internal+0xad
ffffa888`80b3f970 ffff9109`ee509963 : 000001a7`000000a6 000001a7`000000a6 00000000`00000000 00000000`00000000 : win32kfull!xxxDCEWindowHitTestIndirect+0x207
ffffa888`80b3f9e0 ffff9109`ee5098d7 : 000001a7`000000a6 00000160`d45629b0 00000000`00000000 000001a7`000000a6 : win32kfull!xxxDCEWindowHitTest+0x47
ffffa888`80b3fa50 ffff9109`ee5097b4 : 000001a7`000000a6 00000160`d45629b0 00000000`00000020 00000000`00000020 : win32kfull!xxxWindowFromPoint+0xfb
ffffa888`80b3fad0 fffff807`4f1d2d18 : ffffd70c`b1df6080 00000160`d45629b0 00000000`00000000 ffffd70c`aec13ae0 : win32kfull!NtUserWindowFromPhysicalPoint+0x24
ffffa888`80b3fb00 00007ffc`a5101324 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000031`7f2cf4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`a5101324
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kfull
ffff9109ee480dc7 - win32kfull!IsWindowHolographicForHitTest+7
[ 8b:0b ]
1 error : !win32kfull (ffff9109ee480dc7)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-01-28T13:17:52.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: 2540
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffff900d29f48470, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff900d29f483c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 2
BUGCHECK_P2: ffff900d29f48470
BUGCHECK_P3: ffff900d29f483c8
BUGCHECK_P4: 0
TRAP_FRAME: ffff900d29f48470 -- (.trap 0xffff900d29f48470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002
rdx=000000000000000b rsi=0000000000000000 rdi=0000000000000000
rip=ffff8044dba6cd35 rsp=ffff900d29f48608 rbp=ffff900d29f48718
r8=0000000000000000 r9=0000000000000000 r10=ffffad8104d39180
r11=ffffd486ec5a9200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
win32kbase!_report_gsfailure+0x5:
ffff8044`dba6cd35 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff900d29f483c8 -- (.exr 0xffff900d29f483c8)
ExceptionAddress: ffff8044dba6cd35 (win32kbase!_report_gsfailure+0x0000000000000005)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: FAIL_FAST_STACK_COOKIE_CHECK_FAILURE
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000002
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-28-2020 21:53:34.0166
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff802185d32e9 to fffff802185c14e0
STACK_TEXT:
ffff900d`29f48148 fffff802`185d32e9 : 00000000`00000139 00000000`00000002 ffff900d`29f48470 ffff900d`29f483c8 : nt!KeBugCheckEx
ffff900d`29f48150 fffff802`185d3710 : 00000000`00000000 00000000`0000ffff ffffd486`f127c090 ffffad81`05513180 : nt!KiBugCheckDispatch+0x69
ffff900d`29f48290 fffff802`185d1aa5 : 00000000`00000000 ffff9d78`00000000 00000000`00000001 ffff8044`db9d8be7 : nt!KiFastFailDispatch+0xd0
ffff900d`29f48470 ffff8044`dba6cd35 : ffff8044`dba09cd6 ffffffff`fffe7960 00000000`00000000 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0x325
ffff900d`29f48608 ffff8044`dba09cd6 : ffffffff`fffe7960 00000000`00000000 00000000`00000001 00000000`00000002 : win32kbase!_report_gsfailure+0x5
ffff900d`29f48610 ffff8044`db60c77e : 00000000`00000001 00000000`00000001 ffff8044`db921308 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0xd6
ffff900d`29f48740 ffff8044`dba4e883 : ffffd486`eba9b0c0 ffffd486`eba9b0c0 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x95e
ffff900d`29f489c0 ffff8044`db62afef : ffffd486`eba9b0c0 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0xa3
ffff900d`29f48ad0 fffff802`185d2d18 : ffffd486`eba9b0c0 00000000`00000005 0000017f`84e043f0 00000000`00000438 : win32kfull!NtUserCallNoParam+0x6f
ffff900d`29f48b00 00007ffc`afbb1144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001b`fbdffc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`afbb1144
THREAD_SHA1_HASH_MOD_FUNC: 8846e88a50dbcff0796ed0225021e4f14f233ddd
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 43ae892547a2feaf4802930fdb18ab63a029393e
THREAD_SHA1_HASH_MOD: 8c3e00e3f749e53147a6392df0a63353834bc109
FOLLOWUP_IP:
win32kbase!_report_gsfailure+5
ffff8044`dba6cd35 cd29 int 29h
FAULT_INSTR_CODE: cccc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: win32kbase!_report_gsfailure+5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
BUCKET_ID: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
TARGET_TIME: 2019-12-20T20:59:10.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.535
ANALYSIS_SESSION_ELAPSED_TIME: b4e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_win32kbase!_report_gsfailure
FAILURE_ID_HASH: {f22c2e43-4b0d-a5dc-7d6c-399075f6e217}
Followup: MachineOwner
---------
Memtest86 testi yap.
AMD Ryzen Master, Kaspersky, ASUS, Hamachi yazılımlarını kaldır.
Komut satırını(CMD) yönetici olarak başlatın "sfc /scannow" yazın işlemi başlatın, işlem bitince bilgisayarı yeniden başlatın.
Virüs taraması yap.
Thank you for downloading Malwarebytes for Windows | Malwarebytes
Malwarebytes free anti-malware software uses industry-leading technology to detect and remove worms, Trojans, rootkits, rogues, dialers, spyware, and more.www.malwarebytes.com
Bellekleri XMP açık test yap, kapalı şekilde yaparsan bir anlamı olmaz.
Bellekleri bu şekilde tak.
Eki Görüntüle 493445
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80678845d9d, Address of the instruction which caused the bugcheck Arg3: fffff50b3aba25c0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800) SYSTEM_MANUFACTURER: System manufacturer SYSTEM_PRODUCT_NAME: System Product Name SYSTEM_SKU: SKU SYSTEM_VERSION: System Version BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 5220 BIOS_DATE: 09/12/2019 BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: PRIME X370-PRO BASEBOARD_VERSION: Rev X.0x DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump DUMP_TYPE: 2 BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80678845d9d BUGCHECK_P3: fffff50b3aba25c0 BUGCHECK_P4: 0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!ExFreeHeapPool+21d fffff806`78845d9d 488b5328 mov rdx,qword ptr [rbx+28h] CONTEXT: fffff50b3aba25c0 -- (.cxr 0xfffff50b3aba25c0) rax=0000000000000ed0 rbx=d5ad2e1bd0963492 rcx=ffffc60dc00034f8 rdx=0000000000000020 rsi=ffffc63684a76320 rdi=ffffc63684a76310 rip=fffff80678845d9d rsp=fffff50b3aba2fb0 rbp=0000000079737355 r8=0000000000000030 r9=ffffc60dc0001000 r10=0000000000000020 r11=00000000000000ff r12=00000000000000a9 r13=0000000000000001 r14=0000000000000030 r15=000000000000002b iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!ExFreeHeapPool+0x21d: fffff806`78845d9d 488b5328 mov rdx,qword ptr [rbx+28h] ds:002b:d5ad2e1b`d09634ba=???????????????? Resetting default scope BUGCHECK_STR: 0x3B_c0000005 CPU_COUNT: 10 CPU_MHZ: bb2 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 1 CPU_STEPPING: 1 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: Discord.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-28-2020 21:53:19.0574 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff80678b6f0a9 to fffff80678845d9d STACK_TEXT: fffff50b`3aba2fb0 fffff806`78b6f0a9 : ffffc88a`8e6ab005 ffffc619`83dd4801 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x21d fffff50b`3aba30d0 ffffc619`83af06c2 : 00000000`00000000 ffffc636`8467c010 00000000`00000000 ffffa5fd`e6a00000 : nt!ExFreePool+0x9 fffff50b`3aba3100 ffffc619`83de806c : 00000000`00000000 ffffc636`84a76320 ffffc636`84a76320 ffffc636`8467c010 : win32kfull!Win32FreePoolImpl+0x52 fffff50b`3aba3130 ffffc619`83a2aba2 : 00000000`00000002 ffffc636`8467c010 00000000`ffffffff 00000000`00000002 : win32kbase!Win32FreePool+0x2c fffff50b`3aba3160 fffff806`789d2d18 : ffffc88a`8e6ab080 00000000`1fe0e958 00000000`ffffffff ffff8d84`00001cbf : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x4c2 fffff50b`3aba3a90 00007ff8`b4218694 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`1fe0e938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b4218694 THREAD_SHA1_HASH_MOD_FUNC: 8f2c9be91f516881ba934f4b4e1f6809179fc188 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 95fa05418c9f13803c32dc6c50e69b8d1d4b0874 THREAD_SHA1_HASH_MOD: 740a44c1f2944413577e37a9081003b6157fbce6 FOLLOWUP_IP: nt!ExFreePool+9 fffff806`78b6f0a9 4883c428 add rsp,28h FAULT_INSTR_CODE: 28c48348 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!ExFreePool+9 FOLLOWUP_NAME: Pool_corruption IMAGE_NAME: Pool_Corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.535 MODULE_NAME: Pool_Corruption STACK_COMMAND: .cxr 0xfffff50b3aba25c0 ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool BUCKET_ID: 0x3B_c0000005_nt!ExFreePool PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!ExFreePool TARGET_TIME: 2020-01-01T12:00:00.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 160101.0800 BUILDLAB_STR: WinBuild BUILDOSVER_STR: 10.0.18362.535 ANALYSIS_SESSION_ELAPSED_TIME: 170c ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!exfreepool FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064} Followup: Pool_corruption --------- KERNEL_MODE_HEAP_CORRUPTION (13a) The kernel mode heap manager has detected corruption in a heap. Arguments: Arg1: 0000000000000012, Type of corruption detected Arg2: ffffb98b4b010100, Address of the heap that reported the corruption Arg3: ffffb98b5de16000, Address at which the corruption was detected Arg4: 0000000000000000 Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nvlddmkm.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800) DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump DUMP_TYPE: 2 BUGCHECK_P1: 12 BUGCHECK_P2: ffffb98b4b010100 BUGCHECK_P3: ffffb98b5de16000 BUGCHECK_P4: 0 CORRUPTING_POOL_ADDRESS: fffff801755733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffffb98b5de16000 FAULTING_IP: nt!ExFreePool+9 fffff801`7536f0a9 4883c428 add rsp,28h BUGCHECK_STR: 0x13a_12 CPU_COUNT: 10 CPU_MHZ: bb2 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 1 CPU_STEPPING: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-28-2020 21:53:23.0026 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8017531ac78 to fffff801751c14e0 STACK_TEXT: fffff801`78266f88 fffff801`7531ac78 : 00000000`0000013a 00000000`00000012 ffffb98b`4b010100 ffffb98b`5de16000 : nt!KeBugCheckEx fffff801`78266f90 fffff801`7531acd8 : 00000000`00000012 ffffb98b`4b010280 ffffb98b`4b010100 00000000`00000000 : nt!RtlpHeapHandleError+0x40 fffff801`78266fd0 fffff801`7531a901 : ffffb98b`5de13fe0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58 fffff801`78267000 fffff801`751faa26 : 00000000`00000000 00000000`00000000 fffff801`83f2fc10 ffffb98b`52c6f290 : nt!RtlpLogHeapFailure+0x45 fffff801`78267030 fffff801`750460ed : ffffb98b`5de14000 ffffb98b`4b010000 fffff801`782670f8 00000000`00000000 : nt!RtlpHpVsContextFree+0x1b6d36 fffff801`782670d0 fffff801`7536f0a9 : fffff801`74f61e70 fffff801`83f1d716 00000000`00000081 01000000`00100000 : nt!ExFreeHeapPool+0x56d fffff801`782671f0 fffff801`83ef777e : fffff801`78267230 fffff801`83f03a9e 00000000`00000000 00000000`00000000 : nt!ExFreePool+0x9 fffff801`78267220 fffff801`83ef70fe : ffffb98b`53817e70 ffffb98b`00000000 ffffb98b`00000000 ffffb98b`00000000 : dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x2be fffff801`782673d0 fffff801`83ef479b : ffffb98b`53817e02 00000000`00000001 fffff801`78267629 00000000`00000000 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x6ee fffff801`78267530 fffff801`7fa44711 : fffff801`78267629 ffffb98b`536ef000 ffffb98b`52f776e8 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x22b fffff801`782675e0 fffff801`81c17cb4 : ffffb98b`52f77030 00000000`00000000 ffffb98b`52f77030 ffffb98b`52f55000 : dxgkrnl!DxgNotifyDpcCB+0x91 fffff801`78267690 ffffb98b`52f77030 : 00000000`00000000 ffffb98b`52f77030 ffffb98b`52f55000 fffff801`81c17c47 : nvlddmkm+0xa7cb4 fffff801`78267698 00000000`00000000 : ffffb98b`52f77030 ffffb98b`52f55000 fffff801`81c17c47 ffffb98b`52f55000 : 0xffffb98b`52f77030 THREAD_SHA1_HASH_MOD_FUNC: 57a748b76e85c86c9516e8b5ba4295dbc76c4391 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 438fa957cd00259f022ef234fadec3d9573e5f42 THREAD_SHA1_HASH_MOD: 67df1a950c2b3dc4b5c6ec38e0e1ad109a0309b1 FOLLOWUP_IP: nt!ExFreePool+9 fffff801`7536f0a9 4883c428 add rsp,28h FAULT_INSTR_CODE: 28c48348 SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: nt!ExFreePool+9 FOLLOWUP_NAME: Pool_corruption IMAGE_NAME: Pool_Corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.535 MODULE_NAME: Pool_Corruption STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: 0x13a_12_nt!ExFreePool BUCKET_ID: 0x13a_12_nt!ExFreePool PRIMARY_PROBLEM_CLASS: 0x13a_12_nt!ExFreePool TARGET_TIME: 2020-01-16T13:51:22.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 160101.0800 BUILDLAB_STR: WinBuild BUILDOSVER_STR: 10.0.18362.535 ANALYSIS_SESSION_ELAPSED_TIME: ec3 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x13a_12_nt!exfreepool FAILURE_ID_HASH: {0e8bc89c-9b1f-e697-ed6c-83210db041e2} Followup: Pool_corruption --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc000001d, The exception code that was not handled Arg2: fffff8024de0904b, The address that the exception occurred at Arg3: ffffcb8fef9d1580, Parameter 0 of the exception Arg4: fffff8024203eed0, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800) DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump DUMP_TYPE: 2 BUGCHECK_P1: ffffffffc000001d BUGCHECK_P2: fffff8024de0904b BUGCHECK_P3: ffffcb8fef9d1580 BUGCHECK_P4: fffff8024203eed0 EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text> FAULTING_IP: pacer!PcpSchedulerBatchAndSendOrDropNblChain+1b fffff802`4de0904b 41 ??? EXCEPTION_PARAMETER1: ffffcb8fef9d1580 EXCEPTION_PARAMETER2: fffff8024203eed0 BUGCHECK_STR: 0x1E_c000001d CPU_COUNT: 10 CPU_MHZ: bb2 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 1 CPU_STEPPING: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION PROCESS_NAME: Discord.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-28-2020 21:53:26.0831 ANALYSIS_VERSION: 10.0.18362.1 x86fre BAD_STACK_POINTER: ffff8d81ce1f58f8 LAST_CONTROL_TRANSFER: from fffff8024222fda7 to fffff802421c14e0 FAILED_INSTRUCTION_ADDRESS: pacer!PcpSchedulerBatchAndSendOrDropNblChain+1b fffff802`4de0904b 41 ??? STACK_TEXT: ffff8d81`ce1f58f8 fffff802`4222fda7 : 00000000`0000001e ffffffff`c000001d fffff802`4de0904b ffffcb8f`ef9d1580 : nt!KeBugCheckEx ffff8d81`ce1f5900 fffff802`421c2362 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1689d7 ffff8d81`ce1f5fb0 fffff802`421c2330 : fffff802`421d3416 ffffcb8f`d743e8a0 00000000`00000010 ffffcb8f`d7440780 : nt!KxExceptionDispatchOnExceptionStack+0x12 ffffb409`4fd0ec78 fffff802`421d3416 : ffffcb8f`d743e8a0 00000000`00000010 ffffcb8f`d7440780 ffffb409`4fd0f1a8 : nt!KiExceptionDispatchOnExceptionStackContinue ffffb409`4fd0ec80 fffff802`421cd9ab : 0000001d`21a45885 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116 ffffb409`4fd0ee60 fffff802`4de0904b : fffff802`4de09529 ffffcb8f`e3f1d6e0 ffffb409`4fd0f089 ffffcb8f`db3f4190 : nt!KiInvalidOpcodeFault+0x32b ffffb409`4fd0eff8 ffffcb8f`00000000 : ffffb409`000000f9 00000000`00000000 00000000`00000002 ffffcb8f`ea5479d0 : pacer!PcpSchedulerBatchAndSendOrDropNblChain+0x1b ffffb409`4fd0f028 ffffb409`000000f9 : 00000000`00000000 00000000`00000002 ffffcb8f`ea5479d0 00000000`00000000 : 0xffffcb8f`00000000 ffffb409`4fd0f030 00000000`00000000 : 00000000`00000002 ffffcb8f`ea5479d0 00000000`00000000 0000001e`0f5d7d6a : 0xffffb409`000000f9 CHKIMG_EXTENSION: !chkimg -lo 50 -d !pacer fffff8024de09040 - pacer!PcpSchedulerBatchAndSendOrDropNblChain+10 [ 89:81 ] 1 error : !pacer (fffff8024de09040) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: ONE_BIT STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT TARGET_TIME: 2020-01-21T20:05:31.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 160101.0800 BUILDLAB_STR: WinBuild BUILDOSVER_STR: 10.0.18362.592 ANALYSIS_SESSION_ELAPSED_TIME: 2406 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: memory_corruption --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffff91e70083971e, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: ffff9109ee480dd9, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800) DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump DUMP_TYPE: 2 BUGCHECK_P1: ffff91e70083971e BUGCHECK_P2: 0 BUGCHECK_P3: ffff9109ee480dd9 BUGCHECK_P4: 2 READ_ADDRESS: fffff8074f5733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffff91e70083971e FAULTING_IP: win32kfull!IsWindowHolographicForHitTest+19 ffff9109`ee480dd9 488b4368 mov rax,qword ptr [rbx+68h] MM_INTERNAL_CODE: 2 CPU_COUNT: 10 CPU_MHZ: bb2 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 1 CPU_STEPPING: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: AV PROCESS_NAME: Pacify-Win64-S CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-28-2020 21:53:30.0515 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: ffffa88880b3f6a0 -- (.trap 0xffffa88880b3f6a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffff914200839690 rdx=000000000000c035 rsi=0000000000000000 rdi=0000000000000000 rip=ffff9109ee480dd9 rsp=ffffa88880b3f830 rbp=ffffa88880b3f909 r8=0000000000000001 r9=0000000000000001 r10=ffff9109ee824140 r11=00000000000001a7 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc win32kfull!IsWindowHolographicForHitTest+0x19: ffff9109`ee480dd9 488b4368 mov rax,qword ptr [rbx+68h] ds:00000000`00000068=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8074f1e35d6 to fffff8074f1c14e0 STACK_TEXT: ffffa888`80b3f3f8 fffff807`4f1e35d6 : 00000000`00000050 ffff91e7`0083971e 00000000`00000000 ffffa888`80b3f6a0 : nt!KeBugCheckEx ffffa888`80b3f400 fffff807`4f072eef : 00000000`00000000 00000000`00000000 00000000`00000000 ffff91e7`0083971e : nt!MiSystemFault+0x1d6866 ffffa888`80b3f500 fffff807`4f1cf520 : ffffc080`441d4000 ffffd70c`a4880040 00000000`00000000 00000000`000000d2 : nt!MmAccessFault+0x34f ffffa888`80b3f6a0 ffff9109`ee480dd9 : ffff9142`00e02c00 ffffa888`80b3fab0 ffff9109`ee82d570 ffff9109`ee4991ee : nt!KiPageFault+0x360 ffffa888`80b3f830 ffff9109`ee4808dd : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc080`441c0100 : win32kfull!IsWindowHolographicForHitTest+0x19 ffffa888`80b3f890 ffff9109`ee4807d7 : ffffa888`80b3f9e0 ffffa888`80b3f9e8 00000000`00000060 ffff9142`00839690 : win32kfull!xxxDCEWindowHitTest2Internal+0xad ffffa888`80b3f970 ffff9109`ee509963 : 000001a7`000000a6 000001a7`000000a6 00000000`00000000 00000000`00000000 : win32kfull!xxxDCEWindowHitTestIndirect+0x207 ffffa888`80b3f9e0 ffff9109`ee5098d7 : 000001a7`000000a6 00000160`d45629b0 00000000`00000000 000001a7`000000a6 : win32kfull!xxxDCEWindowHitTest+0x47 ffffa888`80b3fa50 ffff9109`ee5097b4 : 000001a7`000000a6 00000160`d45629b0 00000000`00000020 00000000`00000020 : win32kfull!xxxWindowFromPoint+0xfb ffffa888`80b3fad0 fffff807`4f1d2d18 : ffffd70c`b1df6080 00000160`d45629b0 00000000`00000000 ffffd70c`aec13ae0 : win32kfull!NtUserWindowFromPhysicalPoint+0x24 ffffa888`80b3fb00 00007ffc`a5101324 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000031`7f2cf4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`a5101324 CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kfull ffff9109ee480dc7 - win32kfull!IsWindowHolographicForHitTest+7 [ 8b:0b ] 1 error : !win32kfull (ffff9109ee480dc7) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: ONE_BIT STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT TARGET_TIME: 2020-01-28T13:17:52.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 160101.0800 BUILDLAB_STR: WinBuild BUILDOSVER_STR: 10.0.18362.592 ANALYSIS_SESSION_ELAPSED_TIME: 2540 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: memory_corruption --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based buffer overrun. Arg2: ffff900d29f48470, Address of the trap frame for the exception that caused the bugcheck Arg3: ffff900d29f483c8, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800) DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump DUMP_TYPE: 2 BUGCHECK_P1: 2 BUGCHECK_P2: ffff900d29f48470 BUGCHECK_P3: ffff900d29f483c8 BUGCHECK_P4: 0 TRAP_FRAME: ffff900d29f48470 -- (.trap 0xffff900d29f48470) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002 rdx=000000000000000b rsi=0000000000000000 rdi=0000000000000000 rip=ffff8044dba6cd35 rsp=ffff900d29f48608 rbp=ffff900d29f48718 r8=0000000000000000 r9=0000000000000000 r10=ffffad8104d39180 r11=ffffd486ec5a9200 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz ac po cy win32kbase!_report_gsfailure+0x5: ffff8044`dba6cd35 cd29 int 29h Resetting default scope EXCEPTION_RECORD: ffff900d29f483c8 -- (.exr 0xffff900d29f483c8) ExceptionAddress: ffff8044dba6cd35 (win32kbase!_report_gsfailure+0x0000000000000005) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000002 Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE CPU_COUNT: 10 CPU_MHZ: bb2 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 1 CPU_STEPPING: 1 CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x139 PROCESS_NAME: csrss.exe CURRENT_IRQL: 0 DEFAULT_BUCKET_ID: FAIL_FAST_STACK_COOKIE_CHECK_FAILURE WATSON_BKT_EVENT: BEX ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000002 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-28-2020 21:53:34.0166 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff802185d32e9 to fffff802185c14e0 STACK_TEXT: ffff900d`29f48148 fffff802`185d32e9 : 00000000`00000139 00000000`00000002 ffff900d`29f48470 ffff900d`29f483c8 : nt!KeBugCheckEx ffff900d`29f48150 fffff802`185d3710 : 00000000`00000000 00000000`0000ffff ffffd486`f127c090 ffffad81`05513180 : nt!KiBugCheckDispatch+0x69 ffff900d`29f48290 fffff802`185d1aa5 : 00000000`00000000 ffff9d78`00000000 00000000`00000001 ffff8044`db9d8be7 : nt!KiFastFailDispatch+0xd0 ffff900d`29f48470 ffff8044`dba6cd35 : ffff8044`dba09cd6 ffffffff`fffe7960 00000000`00000000 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0x325 ffff900d`29f48608 ffff8044`dba09cd6 : ffffffff`fffe7960 00000000`00000000 00000000`00000001 00000000`00000002 : win32kbase!_report_gsfailure+0x5 ffff900d`29f48610 ffff8044`db60c77e : 00000000`00000001 00000000`00000001 ffff8044`db921308 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0xd6 ffff900d`29f48740 ffff8044`dba4e883 : ffffd486`eba9b0c0 ffffd486`eba9b0c0 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x95e ffff900d`29f489c0 ffff8044`db62afef : ffffd486`eba9b0c0 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0xa3 ffff900d`29f48ad0 fffff802`185d2d18 : ffffd486`eba9b0c0 00000000`00000005 0000017f`84e043f0 00000000`00000438 : win32kfull!NtUserCallNoParam+0x6f ffff900d`29f48b00 00007ffc`afbb1144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 0000001b`fbdffc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`afbb1144 THREAD_SHA1_HASH_MOD_FUNC: 8846e88a50dbcff0796ed0225021e4f14f233ddd THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 43ae892547a2feaf4802930fdb18ab63a029393e THREAD_SHA1_HASH_MOD: 8c3e00e3f749e53147a6392df0a63353834bc109 FOLLOWUP_IP: win32kbase!_report_gsfailure+5 ffff8044`dba6cd35 cd29 int 29h FAULT_INSTR_CODE: cccc29cd SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: win32kbase!_report_gsfailure+5 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32kbase IMAGE_NAME: win32kbase.sys DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.535 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 5 FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure BUCKET_ID: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure TARGET_TIME: 2019-12-20T20:59:10.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 160101.0800 BUILDLAB_STR: WinBuild BUILDOSVER_STR: 10.0.18362.535 ANALYSIS_SESSION_ELAPSED_TIME: b4e ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_win32kbase!_report_gsfailure FAILURE_ID_HASH: {f22c2e43-4b0d-a5dc-7d6c-399075f6e217} Followup: MachineOwner ---------
Bu 11 tehdit bahsettiğiniz modüller olabilir mi? Yazılım karantinaya almış ek yapmam gereken bir şey var mıdır?-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 309484
Threats Detected: 11
Threats Quarantined: 11
Time Elapsed: 1 min, 6 sec