RTX 2060 sistemde KERNEL_SECURITY_CHECK_FAILURE hatası

Hayır, direkt olarak bilgisayarınızın mavi ekran verip vermeme durumundan bahsetmiştim. Dediğim gibi, sorun muhtemelen çözüldü ama sizin yine de 1 hafta boyunca sistemi gözlemlemeniz bizim için de en doğrusu olacaktır.
 
Selamlar, BIOS'tan XMP'yi kapatıp MemTest86 testi uygular mısınız? Sonuçları paylaşırsanız sevinirim.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff5010eced680, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff5010eced5d8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 10921

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 43432

Key : Analysis.Init.CPU.mSec
Value: 1140

Key : Analysis.Init.Elapsed.mSec
Value: 6074

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021322-9218-01.dmp

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff5010eced680

BUGCHECK_P3: fffff5010eced5d8

BUGCHECK_P4: 0

TRAP_FRAME: fffff5010eced680 -- (.trap 0xfffff5010eced680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc089f19c2388 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064641bacc rsp=fffff5010eced810 rbp=0000000000000000
r8=ffffc089f19c2380 r9=0000000000000080 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!KeRemoveQueueEx+0x20c6cc:
fffff806`4641bacc cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffff5010eced5d8 -- (.exr 0xfffff5010eced5d8)
ExceptionAddress: fffff8064641bacc (nt!KeRemoveQueueEx+0x000000000020c6cc)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
fffff501`0eced358 fffff806`46409169 : 00000000`00000139 00000000`00000003 fffff501`0eced680 fffff501`0eced5d8 : nt!KeBugCheckEx
fffff501`0eced360 fffff806`46409590 : ffff8380`f6f0b340 ffffc089`f1965080 ffff8380`f6f00180 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff501`0eced4a0 fffff806`46407923 : ffff8380`00000000 ffff8380`f6e4b340 00000000`00000005 fffff806`46519e5e : nt!KiFastFailDispatch+0xd0
fffff501`0eced680 fffff806`4641bacc : ffffc089`f19a7290 ffffc089`f1807f70 00000000`00000000 fffff806`4628f6f5 : nt!KiRaiseSecurityCheckFailure+0x323
fffff501`0eced810 fffff806`4620f098 : ffffc089`f19c2380 00000000`00000001 ffffc089`f19a7290 fffff806`00000000 : nt!KeRemoveQueueEx+0x20c6cc
fffff501`0eced8b0 fffff806`466d6f2d : 00000000`00000000 00000000`00000000 ffff8380`f7079180 fffff806`46286ada : nt!IoRemoveIoCompletion+0x98
fffff501`0eced9e0 fffff806`46408bb8 : ffffc089`f1965080 00000000`13c2eba8 fffff501`0ecedaa8 00000000`5a175198 : nt!NtRemoveIoCompletion+0x13d
fffff501`0eceda90 00000000`77a51cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`13c2eb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a51cfc


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffd2bd06a40040-ffffd2bd06a40091 82 bytes - win32kbase!ResetOrg+7b0
[ 00 41 0f b7 c6 0b d0 44:48 8b 02 49 3b 00 77 09 ]
ffffd2bd06a40093-ffffd2bd06a4009c 10 bytes - win32kbase!ResetOrg+803 (+0x53)
[ 48 8b f7 44 3b 7b 14 0f:00 8d 4a 58 eb 08 b8 40 ]
ffffd2bd06a4009e-ffffd2bd06a400c6 41 bytes - win32kbase!ResetOrg+80e (+0x0b)
[ 00 00 41 8b c7 48 c1 e8:8d 48 10 49 8d 14 0a 48 ]
ffffd2bd06a400c9-ffffd2bd06a400d7 15 bytes - win32kbase!ResetOrg+839 (+0x2b)
[ 00 48 8b 08 4a 8b 04 01:8d 4a 5b eb d3 b8 00 10 ]
ffffd2bd06a400e4-ffffd2bd06a400e9 6 bytes - win32kbase!ResetOrg+854 (+0x1b)
[ 48 8b 4d 78 33 d2:eb bb b8 00 04 00 ]
ffffd2bd06a400f6-ffffd2bd06a400fe 9 bytes - win32kbase!ResetOrg+866 (+0x12)
[ 44 3b 7b 14 0f 83 b0 bf:00 b9 6c 00 00 00 eb a3 ]
ffffd2bd06a40100-ffffd2bd06a40129 42 bytes - win32kbase!ResetOrg+870 (+0x0a)
[ 48 8b 43 18 48 8b 08 48:02 00 00 b9 68 00 00 00 ]
ffffd2bd06a4012b - win32kbase!ResetOrg+89b (+0x2b)
[ 00:01 ]
ffffd2bd06a4012d-ffffd2bd06a40133 7 bytes - win32kbase!ResetOrg+89d (+0x02)
[ 49 03 c5 48 8d 0c c5:00 48 8b 05 7b 6b 20 ]
ffffd2bd06a40135-ffffd2bd06a40137 3 bytes - win32kbase!ResetOrg+8a5 (+0x08)
[ 00 00 00:48 33 c4 ]
ffffd2bd06a40139-ffffd2bd06a4013f 7 bytes - win32kbase!ResetOrg+8a9 (+0x04)
[ 8b 03 83 4c 01 08 01:89 45 27 44 8b fa 89 ]
ffffd2bd06a49d80-ffffd2bd06a49d9b 28 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+578 (+0x9c47)
[ 01 00 00 48 8d 15 e6 e6:48 83 ec 28 48 8b ca e8 ]
ffffd2bd06a49da8-ffffd2bd06a49db4 13 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5a0 (+0x28)
[ 48 8b 05 79 34 20 00 48:c9 0f 95 c2 41 83 e8 05 ]
ffffd2bd06a49db6-ffffd2bd06a49dc1 12 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5ae (+0x0e)
[ 48 85 c0 48 8d 4c 24 50:41 83 e8 01 0f 84 d2 3d ]
ffffd2bd06a49dce-ffffd2bd06a49df8 43 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5c6 (+0x18)
[ e9 75 fb ff ff 48 8d 15:e8 02 0f 84 85 3d 0a 00 ]
ffffd2bd06a49dfb-ffffd2bd06a49dfe 4 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5f3 (+0x2d)
[ 48 89 5d 88:74 44 48 8b ]
ffffd2bd06a49e00-ffffd2bd06a49e23 36 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5f8 (+0x05)
[ 3b e0 49 8b c8 44 0f 47:24 28 44 89 89 48 01 00 ]
ffffd2bd06a49e25-ffffd2bd06a49e35 17 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+61d (+0x25)
[ 4a 8d 04 6d 0c 00 00 00:e2 03 80 e1 f7 48 8b 44 ]
ffffd2bd06a49e38-ffffd2bd06a49e3c 5 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+630 (+0x13)
[ 00 48 89 5d c0:c6 00 01 41 0f ]
ffffd2bd06a49e3e-ffffd2bd06a49e79 60 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+636 (+0x06)
[ 47 64 72 73 41 b8 01 00:6a 10 09 41 8b c3 c3 cc ]
ffffd2bd06a49e7b-ffffd2bd06a49e7f 5 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+673 (+0x3d)
[ d1 eb 4d 03 c6:89 74 24 20 57 ]
ffffd2bd06a4be90-ffffd2bd06a4beb9 42 bytes - win32kbase!DirectComposition::CApplicationChannel::CreateInternalResource+e60 (+0x2015)
[ ba 44 43 7a 72 b9 60 00:48 83 ec 28 8b ca 45 33 ]
ffffd2bd06a4bebb-ffffd2bd06a4bed2 24 bytes - win32kbase!DirectComposition::CApplicationChannel::CreateInternalResource+e8b (+0x2b)
[ 89 03 44 89 63 50 e9 23:8d 05 df 3e 1b 00 8b da ]
ffffd2bd06a4bed5-ffffd2bd06a4bed6 2 bytes - win32kbase!DirectComposition::CApplicationChannel::CreateInternalResource+ea5 (+0x1a)
[ d8 48:cf e8 ]
ffffd2bd06a4bed8-ffffd2bd06a4bf54 125 bytes - win32kbase!DirectComposition::CApplicationChannel::CreateInternalResource+ea8 (+0x03)
[ c0 74 1b 4c 89 60 14 4c:b0 04 00 48 8b 5c 24 30 ]
ffffd2bd06a4bf56-ffffd2bd06a4bf6f 26 bytes - win32kbase!DirectComposition::CLinearObjectTableBase::InsertObject+4e (+0x7e)
[ 89 6c 24 40 48 0f af cf:8b 05 e4 63 22 00 48 3b ]
ffffd2bd06a4bf72-ffffd2bd06a4bf76 5 bytes - win32kbase!DirectComposition::CLinearObjectTableBase::InsertObject+6a (+0x1c)
[ 5c 24 48 8b c6:05 c9 63 22 00 ]
ffffd2bd06a4bf79-ffffd2bd06a4bf8f 23 bytes - win32kbase!DirectComposition::CLinearObjectTableBase::InsertObject+71 (+0x07)
[ 6c 24 50 48 83 c4 20 41:08 c6 01 00 eb c5 0f 10 ]
693 errors : !win32kbase (ffffd2bd06a40040-ffffd2bd06a4bf8f)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

MEMORY_CORRUPTOR: LARGE

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132892460807368677
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : STORAGE\Volume\_??_USBSTOR#Disk&Ven_Generic&Prod_Masstorage&Rev_1.00#20180624905933&0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
VetoString :
[/CODE]
 
Selamlar, BIOS'tan XMP'yi kapatıp Memtest86 testi uygular mısınız? Sonuçları paylaşırsanız sevinirim.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff5010eced680, Address of the trap frame for the exception that caused the BugCheck.
Arg3: fffff5010eced5d8, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 10921.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 43432.

Key : Analysis.Init.CPU.mSec
Value: 1140.

Key : Analysis.Init.Elapsed.mSec
Value: 6074.

Key : Analysis.Memory.CommitPeak.Mb
Value: 77.

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 021322-9218-01.dmp

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: fffff5010eced680.

BUGCHECK_P3: fffff5010eced5d8.

BUGCHECK_P4: 0

TRAP_FRAME: fffff5010eced680 -- (.trap 0xfffff5010eced680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc089f19c2388 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064641bacc rsp=fffff5010eced810 rbp=0000000000000000
r8=ffffc089f19c2380 r9=0000000000000080 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy.
nt!KeRemoveQueueEx+0x20c6cc:
fffff806`4641bacc cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: fffff5010eced5d8 -- (.exr 0xfffff5010eced5d8)
ExceptionAddress: fffff8064641bacc (nt!KeRemoveQueueEx+0x000000000020c6cc)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
fffff501`0eced358 fffff806`46409169 : 00000000`00000139 00000000`00000003 fffff501`0eced680 fffff501`0eced5d8 : nt!KeBugCheckEx
fffff501`0eced360 fffff806`46409590 : ffff8380`f6f0b340 ffffc089`f1965080 ffff8380`f6f00180 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff501`0eced4a0 fffff806`46407923 : ffff8380`00000000 ffff8380`f6e4b340 00000000`00000005 fffff806`46519e5e : nt!KiFastFailDispatch+0xd0
fffff501`0eced680 fffff806`4641bacc : ffffc089`f19a7290 ffffc089`f1807f70 00000000`00000000 fffff806`4628f6f5 : nt!KiRaiseSecurityCheckFailure+0x323
fffff501`0eced810 fffff806`4620f098 : ffffc089`f19c2380 00000000`00000001 ffffc089`f19a7290 fffff806`00000000 : nt!KeRemoveQueueEx+0x20c6cc
fffff501`0eced8b0 fffff806`466d6f2d : 00000000`00000000 00000000`00000000 ffff8380`f7079180 fffff806`46286ada : nt!IoRemoveIoCompletion+0x98
fffff501`0eced9e0 fffff806`46408bb8 : ffffc089`f1965080 00000000`13c2eba8 fffff501`0ecedaa8 00000000`5a175198 : nt!NtRemoveIoCompletion+0x13d
fffff501`0eceda90 00000000`77a51cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`13c2eb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a51cfc.

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffd2bd06a40040-ffffd2bd06a40091 82 bytes - win32kbase!ResetOrg+7b0
[ 00 41 0f b7 c6 0b d0 44:48 8b 02 49 3b 00 77 09 ]
ffffd2bd06a40093-ffffd2bd06a4009c 10 bytes - win32kbase!ResetOrg+803 (+0x53)
[ 48 8b f7 44 3b 7b 14 0f:00 8d 4a 58 eb 08 b8 40 ]
ffffd2bd06a4009e-ffffd2bd06a400c6 41 bytes - win32kbase!ResetOrg+80e (+0x0b)
[ 00 00 41 8b c7 48 c1 e8:8d 48 10 49 8d 14 0a 48 ]
ffffd2bd06a400c9-ffffd2bd06a400d7 15 bytes - win32kbase!ResetOrg+839 (+0x2b)
[ 00 48 8b 08 4a 8b 04 01:8d 4a 5b eb d3 b8 00 10 ]
ffffd2bd06a400e4-ffffd2bd06a400e9 6 bytes - win32kbase!ResetOrg+854 (+0x1b)
[ 48 8b 4d 78 33 d2:eb bb b8 00 04 00 ]
ffffd2bd06a400f6-ffffd2bd06a400fe 9 bytes - win32kbase!ResetOrg+866 (+0x12)
[ 44 3b 7b 14 0f 83 b0 bf:00 b9 6c 00 00 00 eb a3 ]
ffffd2bd06a40100-ffffd2bd06a40129 42 bytes - win32kbase!ResetOrg+870 (+0x0a)
[ 48 8b 43 18 48 8b 08 48:02 00 00 b9 68 00 00 00 ]
ffffd2bd06a4012b - win32kbase!ResetOrg+89b (+0x2b)
[ 00:01 ]
ffffd2bd06a4012d-ffffd2bd06a40133 7 bytes - win32kbase!ResetOrg+89d (+0x02)
[ 49 03 c5 48 8d 0c c5:00 48 8b 05 7b 6b 20 ]
ffffd2bd06a40135-ffffd2bd06a40137 3 bytes - win32kbase!ResetOrg+8a5 (+0x08)
[ 00 00 00:48 33 c4 ]
ffffd2bd06a40139-ffffd2bd06a4013f 7 bytes - win32kbase!ResetOrg+8a9 (+0x04)
[ 8b 03 83 4c 01 08 01:89 45 27 44 8b fa 89 ]
ffffd2bd06a49d80-ffffd2bd06a49d9b 28 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+578 (+0x9c47)
[ 01 00 00 48 8d 15 e6 e6:48 83 ec 28 48 8b ca e8 ]
ffffd2bd06a49da8-ffffd2bd06a49db4 13 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5a0 (+0x28)
[ 48 8b 05 79 34 20 00 48:c9 0f 95 c2 41 83 e8 05 ]
ffffd2bd06a49db6-ffffd2bd06a49dc1 12 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5ae (+0x0e)
[ 48 85 c0 48 8d 4c 24 50:41 83 e8 01 0f 84 d2 3d ]
ffffd2bd06a49dce-ffffd2bd06a49df8 43 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5c6 (+0x18)
[ e9 75 fb ff ff 48 8d 15:e8 02 0f 84 85 3d 0a 00 ]
ffffd2bd06a49dfb-ffffd2bd06a49dfe 4 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5f3 (+0x2d)
[ 48 89 5d 88:74 44 48 8b ]
ffffd2bd06a49e00-ffffd2bd06a49e23 36 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5f8 (+0x05)
[ 3b e0 49 8b c8 44 0f 47:24 28 44 89 89 48 01 00 ]
ffffd2bd06a49e25-ffffd2bd06a49e35 17 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+61d (+0x25)
[ 4a 8d 04 6d 0c 00 00 00:e2 03 80 e1 f7 48 8b 44 ]
ffffd2bd06a49e38-ffffd2bd06a49e3c 5 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+630 (+0x13)
[ 00 48 89 5d c0:c6 00 01 41 0f ]
ffffd2bd06a49e3e-ffffd2bd06a49e79 60 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+636 (+0x06)
[ 47 64 72 73 41 b8 01 00:6a 10 09 41 8b c3 c3 cc ]
ffffd2bd06a49e7b-ffffd2bd06a49e7f 5 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+673 (+0x3d)
[ d1 eb 4d 03 c6:89 74 24 20 57 ]
ffffd2bd06a4be90-ffffd2bd06a4beb9 42 bytes - win32kbase!DirectComposition::CApplicationChannel::CreateInternalResource+e60 (+0x2015)
[ ba 44 43 7a 72 b9 60 00:48 83 ec 28 8b ca 45 33 ]
ffffd2bd06a4bebb-ffffd2bd06a4bed2 24 bytes - win32kbase!DirectComposition::CApplicationChannel::CreateInternalResource+e8b (+0x2b)
[ 89 03 44 89 63 50 e9 23:8d 05 df 3e 1b 00 8b da ]
ffffd2bd06a4bed5-ffffd2bd06a4bed6 2 bytes - win32kbase!DirectComposition::CApplicationChannel::CreateInternalResource+ea5 (+0x1a)
[ d8 48:cf e8 ]
ffffd2bd06a4bed8-ffffd2bd06a4bf54 125 bytes - win32kbase!DirectComposition::CApplicationChannel::CreateInternalResource+ea8 (+0x03)
[ c0 74 1b 4c 89 60 14 4c:b0 04 00 48 8b 5c 24 30 ]
ffffd2bd06a4bf56-ffffd2bd06a4bf6f 26 bytes - win32kbase!DirectComposition::CLinearObjectTableBase::InsertObject+4e (+0x7e)
[ 89 6c 24 40 48 0f af cf:8b 05 e4 63 22 00 48 3b ]
ffffd2bd06a4bf72-ffffd2bd06a4bf76 5 bytes - win32kbase!DirectComposition::CLinearObjectTableBase::InsertObject+6a (+0x1c)
[ 5c 24 48 8b c6:05 c9 63 22 00 ]
ffffd2bd06a4bf79-ffffd2bd06a4bf8f 23 bytes - win32kbase!DirectComposition::CLinearObjectTableBase::InsertObject+71 (+0x07)
[ 6c 24 50 48 83 c4 20 41:08 c6 01 00 eb c5 0f 10 ]
693 errors : !win32kbase (ffffd2bd06a40040-ffffd2bd06a4bf8f)

MODULE_NAME: memory_corruption.

IMAGE_NAME: memory_corruption.

MEMORY_CORRUPTOR: LARGE.

STACK_COMMAND: .cxr; .ecxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption.
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132892460807368677.
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24.
PnpVetoType : 0
DeviceId : STORAGE\Volume\_??_USBSTOR#Disk&Ven_Generic&Prod_Masstorage&Rev_1.00#20180624905933&0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
VetoString :
[/CODE]

Daha önce de yapmıştım temiz çıkmıştı. Şimdi XMP kapatıp tekrardan yapıyorum. İşlemciyle ilgili bir sorun olabilir mi? Yaklaşık 2 senedir termal macunu değiştirmedim ve stok soğutucu kullanıyorum. Bunun etkisi olabilir mi?

Selamlar, BIOS'tan XMP'yi kapatıp Memtest86 testi uygular mısınız? Sonuçları paylaşırsanız sevinirim.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff5010eced680, Address of the trap frame for the exception that caused the BugCheck.
Arg3: fffff5010eced5d8, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 10921.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 43432.

Key : Analysis.Init.CPU.mSec
Value: 1140.

Key : Analysis.Init.Elapsed.mSec
Value: 6074.

Key : Analysis.Memory.CommitPeak.Mb
Value: 77.

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 021322-9218-01.dmp

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: fffff5010eced680.

BUGCHECK_P3: fffff5010eced5d8.

BUGCHECK_P4: 0

TRAP_FRAME: fffff5010eced680 -- (.trap 0xfffff5010eced680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc089f19c2388 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064641bacc rsp=fffff5010eced810 rbp=0000000000000000
r8=ffffc089f19c2380 r9=0000000000000080 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy.
nt!KeRemoveQueueEx+0x20c6cc:
fffff806`4641bacc cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: fffff5010eced5d8 -- (.exr 0xfffff5010eced5d8)
ExceptionAddress: fffff8064641bacc (nt!KeRemoveQueueEx+0x000000000020c6cc)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
fffff501`0eced358 fffff806`46409169 : 00000000`00000139 00000000`00000003 fffff501`0eced680 fffff501`0eced5d8 : nt!KeBugCheckEx
fffff501`0eced360 fffff806`46409590 : ffff8380`f6f0b340 ffffc089`f1965080 ffff8380`f6f00180 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff501`0eced4a0 fffff806`46407923 : ffff8380`00000000 ffff8380`f6e4b340 00000000`00000005 fffff806`46519e5e : nt!KiFastFailDispatch+0xd0
fffff501`0eced680 fffff806`4641bacc : ffffc089`f19a7290 ffffc089`f1807f70 00000000`00000000 fffff806`4628f6f5 : nt!KiRaiseSecurityCheckFailure+0x323
fffff501`0eced810 fffff806`4620f098 : ffffc089`f19c2380 00000000`00000001 ffffc089`f19a7290 fffff806`00000000 : nt!KeRemoveQueueEx+0x20c6cc
fffff501`0eced8b0 fffff806`466d6f2d : 00000000`00000000 00000000`00000000 ffff8380`f7079180 fffff806`46286ada : nt!IoRemoveIoCompletion+0x98
fffff501`0eced9e0 fffff806`46408bb8 : ffffc089`f1965080 00000000`13c2eba8 fffff501`0ecedaa8 00000000`5a175198 : nt!NtRemoveIoCompletion+0x13d
fffff501`0eceda90 00000000`77a51cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`13c2eb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a51cfc.

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffd2bd06a40040-ffffd2bd06a40091 82 bytes - win32kbase!ResetOrg+7b0
[ 00 41 0f b7 c6 0b d0 44:48 8b 02 49 3b 00 77 09 ]
ffffd2bd06a40093-ffffd2bd06a4009c 10 bytes - win32kbase!ResetOrg+803 (+0x53)
[ 48 8b f7 44 3b 7b 14 0f:00 8d 4a 58 eb 08 b8 40 ]
ffffd2bd06a4009e-ffffd2bd06a400c6 41 bytes - win32kbase!ResetOrg+80e (+0x0b)
[ 00 00 41 8b c7 48 c1 e8:8d 48 10 49 8d 14 0a 48 ]
ffffd2bd06a400c9-ffffd2bd06a400d7 15 bytes - win32kbase!ResetOrg+839 (+0x2b)
[ 00 48 8b 08 4a 8b 04 01:8d 4a 5b eb d3 b8 00 10 ]
ffffd2bd06a400e4-ffffd2bd06a400e9 6 bytes - win32kbase!ResetOrg+854 (+0x1b)
[ 48 8b 4d 78 33 d2:eb bb b8 00 04 00 ]
ffffd2bd06a400f6-ffffd2bd06a400fe 9 bytes - win32kbase!ResetOrg+866 (+0x12)
[ 44 3b 7b 14 0f 83 b0 bf:00 b9 6c 00 00 00 eb a3 ]
ffffd2bd06a40100-ffffd2bd06a40129 42 bytes - win32kbase!ResetOrg+870 (+0x0a)
[ 48 8b 43 18 48 8b 08 48:02 00 00 b9 68 00 00 00 ]
ffffd2bd06a4012b - win32kbase!ResetOrg+89b (+0x2b)
[ 00:01 ]
ffffd2bd06a4012d-ffffd2bd06a40133 7 bytes - win32kbase!ResetOrg+89d (+0x02)
[ 49 03 c5 48 8d 0c c5:00 48 8b 05 7b 6b 20 ]
ffffd2bd06a40135-ffffd2bd06a40137 3 bytes - win32kbase!ResetOrg+8a5 (+0x08)
[ 00 00 00:48 33 c4 ]
ffffd2bd06a40139-ffffd2bd06a4013f 7 bytes - win32kbase!ResetOrg+8a9 (+0x04)
[ 8b 03 83 4c 01 08 01:89 45 27 44 8b fa 89 ]
ffffd2bd06a49d80-ffffd2bd06a49d9b 28 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+578 (+0x9c47)
[ 01 00 00 48 8d 15 e6 e6:48 83 ec 28 48 8b ca e8 ]
ffffd2bd06a49da8-ffffd2bd06a49db4 13 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5a0 (+0x28)
[ 48 8b 05 79 34 20 00 48:c9 0f 95 c2 41 83 e8 05 ]
ffffd2bd06a49db6-ffffd2bd06a49dc1 12 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5ae (+0x0e)
[ 48 85 c0 48 8d 4c 24 50:41 83 e8 01 0f 84 d2 3d ]
ffffd2bd06a49dce-ffffd2bd06a49df8 43 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5c6 (+0x18)
[ e9 75 fb ff ff 48 8d 15:e8 02 0f 84 85 3d 0a 00 ]
ffffd2bd06a49dfb-ffffd2bd06a49dfe 4 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5f3 (+0x2d)
[ 48 89 5d 88:74 44 48 8b ]
ffffd2bd06a49e00-ffffd2bd06a49e23 36 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+5f8 (+0x05)
[ 3b e0 49 8b c8 44 0f 47:24 28 44 89 89 48 01 00 ]
ffffd2bd06a49e25-ffffd2bd06a49e35 17 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+61d (+0x25)
[ 4a 8d 04 6d 0c 00 00 00:e2 03 80 e1 f7 48 8b 44 ]
ffffd2bd06a49e38-ffffd2bd06a49e3c 5 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+630 (+0x13)
[ 00 48 89 5d c0:c6 00 01 41 0f ]
ffffd2bd06a49e3e-ffffd2bd06a49e79 60 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+636 (+0x06)
[ 47 64 72 73 41 b8 01 00:6a 10 09 41 8b c3 c3 cc ]
ffffd2bd06a49e7b-ffffd2bd06a49e7f 5 bytes - win32kbase!DrvGetRegistryHandleFromDeviceMap+673 (+0x3d)
[ d1 eb 4d 03 c6:89 74 24 20 57 ]
ffffd2bd06a4be90-ffffd2bd06a4beb9 42 bytes - win32kbase!DirectComposition::CApplicationChannel::CreateInternalResource+e60 (+0x2015)
[ ba 44 43 7a 72 b9 60 00:48 83 ec 28 8b ca 45 33 ]
ffffd2bd06a4bebb-ffffd2bd06a4bed2 24 bytes - win32kbase!DirectComposition::CApplicationChannel::CreateInternalResource+e8b (+0x2b)
[ 89 03 44 89 63 50 e9 23:8d 05 df 3e 1b 00 8b da ]
ffffd2bd06a4bed5-ffffd2bd06a4bed6 2 bytes - win32kbase!DirectComposition::CApplicationChannel::CreateInternalResource+ea5 (+0x1a)
[ d8 48:cf e8 ]
ffffd2bd06a4bed8-ffffd2bd06a4bf54 125 bytes - win32kbase!DirectComposition::CApplicationChannel::CreateInternalResource+ea8 (+0x03)
[ c0 74 1b 4c 89 60 14 4c:b0 04 00 48 8b 5c 24 30 ]
ffffd2bd06a4bf56-ffffd2bd06a4bf6f 26 bytes - win32kbase!DirectComposition::CLinearObjectTableBase::InsertObject+4e (+0x7e)
[ 89 6c 24 40 48 0f af cf:8b 05 e4 63 22 00 48 3b ]
ffffd2bd06a4bf72-ffffd2bd06a4bf76 5 bytes - win32kbase!DirectComposition::CLinearObjectTableBase::InsertObject+6a (+0x1c)
[ 5c 24 48 8b c6:05 c9 63 22 00 ]
ffffd2bd06a4bf79-ffffd2bd06a4bf8f 23 bytes - win32kbase!DirectComposition::CLinearObjectTableBase::InsertObject+71 (+0x07)
[ 6c 24 50 48 83 c4 20 41:08 c6 01 00 eb c5 0f 10 ]
693 errors : !win32kbase (ffffd2bd06a40040-ffffd2bd06a4bf8f)

MODULE_NAME: memory_corruption.

IMAGE_NAME: memory_corruption.

MEMORY_CORRUPTOR: LARGE.

STACK_COMMAND: .cxr; .ecxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption.
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132892460807368677.
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24.
PnpVetoType : 0
DeviceId : STORAGE\Volume\_??_USBSTOR#Disk&Ven_Generic&Prod_Masstorage&Rev_1.00#20180624905933&0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
VetoString :
[/CODE]

XMP kapatıp tekrardan RAM testini yaptım. 0 hata aldım.
 
Son düzenleyen: Moderatör:
Olabilir, en iyisi temizliğini yapın. Tekrar mavi ekran alırsanız yeni dumpları paylaşırsınız. :)
Kasanın temizliğini yaptım. Artctic Freezer 34 eSports Duo soğutucu taktım. Termal macunu yeniledim. Sürücüleri güncelledim. sfc scannow komutlarını da uyguladım. Tüm bunlara rağmen az önce mavi ekran aldım hocam. ntkrnlmp.exe'den kaynaklı PAGE_FAULT_IN_NONPAGED_AREA kodlu mavi ekran hatasının dosyasını paylaşıyorum.

 
Yeniden merhaba, sistemdeki RAM'lerinizi Memtest86 ile test etmenizi rica edeceğim. Sonucu sonrasında bizimle paylaşırsanız sevinirim.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffe8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8057340e3d5, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

Key : AV.Type
Value: Read

Key : Analysis.CPU.mSec
Value: 9280

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 17766

Key : Analysis.Init.CPU.mSec
Value: 999

Key : Analysis.Init.Elapsed.mSec
Value: 2303

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021722-11296-01.dmp

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffffffffffffe8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8057340e3d5

BUGCHECK_P4: 2

READ_ADDRESS: fffff80573efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffe8

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

TRAP_FRAME: ffff8281530928c0 -- (.trap 0xffff8281530928c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00ffffffffffffff rbx=0000000000000000 rcx=ffffffffffffffd0
rdx=00000000000000ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057340e3d5 rsp=ffff828153092a58 rbp=ffff828153092b80
r8=ffffc00d732e6220 r9=fffff80573efbe80 r10=0000000000000000
r11=ffff9182731bd240 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!ObpGetWaitObject+0x15:
fffff805`7340e3d5 0fb64118 movzx eax,byte ptr [rcx+18h] ds:ffffffff`ffffffe8=??
Resetting default scope

STACK_TEXT:
ffff8281`53092618 fffff805`7364a86f : 00000000`00000050 ffffffff`ffffffe8 00000000`00000000 ffff8281`530928c0 : nt!KeBugCheckEx
ffff8281`53092620 fffff805`7349f540 : 00000000`00000000 00000000`00000000 ffff8281`53092940 00000000`00000000 : nt!MiSystemFault+0x18d30f
ffff8281`53092720 fffff805`7360575e : ffffffff`ffffffff fffff805`737a44f8 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff8281`530928c0 fffff805`7340e3d5 : fffff805`737f87ac ffff8281`53092b80 00000000`00501802 00000000`777c0f33 : nt!KiPageFault+0x35e
ffff8281`53092a58 fffff805`737f87ac : ffff8281`53092b80 00000000`00501802 00000000`777c0f33 00000000`00501802 : nt!ObpGetWaitObject+0x15
ffff8281`53092a60 fffff805`737f888a : ffffc00d`858e7080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x5c
ffff8281`53092ac0 fffff805`736094f1 : ffffc00d`858e7080 00000000`0000000e ffff8281`53092b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffff8281`53092b00 00000000`777c1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000000`1302f258 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777c1cfc


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffbfe5ce89a8d0-ffffbfe5ce89a8d4 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+510
[ 9c 24 b0 03 00:48 8b 02 49 3b ]
ffffbfe5ce89a8d6-ffffbfe5ce89a8df 10 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+516 (+0x06)
[ 48 81 c4 a0 03 00 00 5d:77 09 1b c0 f7 d0 83 e0 ]
ffffbfe5ce89a8e1-ffffbfe5ce89a8e6 6 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+521 (+0x0b)
[ cc cc cc cc cc cc:b8 01 00 00 00 c3 ]
ffffbfe5ce89a8e8-ffffbfe5ce89a8fe 23 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __ (+0x07)
[ 40 55 48 8d ac 24 80 fe:cc cc cc cc cc cc cc cc ]
ffffbfe5ce89a900-ffffbfe5ce89a91b 28 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+18 (+0x18)
[ 48 33 c4 48 89 85 70 01:00 83 ea 01 74 7c 83 ea ]
ffffbfe5ce89a91d-ffffbfe5ce89a92a 14 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+35 (+0x1d)
[ 00 00 48 89 85 50 01 00:75 2c b8 80 00 00 00 8d ]
ffffbfe5ce89a92d-ffffbfe5ce89a935 9 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+45 (+0x10)
[ 48 89 85 40 01 00 00 48:00 8d 48 10 49 8d 14 0a ]
ffffbfe5ce89a937-ffffbfe5ce89a94c 22 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+4f (+0x0a)
[ a0 02 00 00 48 89 85 30:d2 74 0c f3 0f 11 12 41 ]
ffffbfe5ce89a94e-ffffbfe5ce89a954 7 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+66 (+0x17)
[ 00 00 48 8b 85 90 02:0f 85 c2 d2 06 00 b8 ]
ffffbfe5ce89a956-ffffbfe5ce89a96a 21 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+6e (+0x08)
[ 00 48 89 85 10 01 00 00:08 00 00 8d 4a 5b eb d3 ]
ffffbfe5ce89a96c-ffffbfe5ce89a970 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+84 (+0x16)
[ 48 8b 85 80 02:01 00 00 b9 60 ]
ffffbfe5ce89a973-ffffbfe5ce89a976 4 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+8b (+0x07)
[ 48 89 85 f0:00 eb bb b8 ]
ffffbfe5ce89a978 - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+90 (+0x05)
[ 00:04 ]
ffffbfe5ce89a97a-ffffbfe5ce89a97e 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+92 (+0x02)
[ 48 8b 85 78 02:00 b9 54 00 00 ]
ffffbfe5ce89a980-ffffbfe5ce89a984 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+98 (+0x06)
[ 00 48 89 85 e0:eb af b8 00 20 ]
ffffbfe5ce89a987-ffffbfe5ce89a994 14 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+9f (+0x07)
[ 00 48 8b 85 70 02 00 00:b9 6c 00 00 00 eb a3 b8 ]
ffffbfe5ce89a996-ffffbfe5ce89a9b1 28 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+ae (+0x0f)
[ 48 8b 85 68 02 00 00 48:00 00 eb 97 cc cc cc cc ]
ffffbfe5ce89a9b3-ffffbfe5ce89a9bc 10 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+cb (+0x1d)
[ 8b 85 58 02 00 00 48 89:8d 6c 24 c9 48 81 ec 00 ]
ffffbfe5ce89a9be-ffffbfe5ce89a9cf 18 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+d6 (+0x0b)
[ 00 00 48 8b 85 50 02 00:48 8b 05 db c2 1a 00 48 ]
ffffbfe5ce8a3f00-ffffbfe5ce8a3f1d 30 bytes - win32kbase!UserGetDesktopDC+c8 (+0x9542)
[ 05 e8 9a 09 fa ff 48 8b:48 83 ec 28 48 8b ca e8 ]
ffffbfe5ce8a3f1f-ffffbfe5ce8a3f78 90 bytes - win32kbase!UserGetDesktopDC+e7 (+0x1f)
[ 45 33 c0 8b d7 85 f6 48:cc 45 33 db 4c 8b d1 4d ]
ffffbfe5ce8a3f7a-ffffbfe5ce8a3f93 26 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+1a (+0x5b)
[ 40 32 ff 84 c0 74 72 8b:00 74 44 48 8b 44 24 28 ]
ffffbfe5ce8a3f95-ffffbfe5ce8a3fb0 28 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+35 (+0x1b)
[ 5c 24 40 0f ba e0 09 73:4c 01 00 00 8a c1 c0 e8 ]
ffffbfe5ce8a3fb2-ffffbfe5ce8a3fff 78 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+52 (+0x1d)
[ 0f ba 73 10 09 8b 43 10:88 92 4c 01 00 00 c6 00 ]
ffffbfe5ce8a6561-ffffbfe5ce8a6585 37 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+c5 (+0x25af)
[ 8b 4e 58 49 23 d2 0f 10:83 ec 28 8b ca 45 33 c0 ]
ffffbfe5ce8a6587-ffffbfe5ce8a6589 3 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+eb (+0x26)
[ 8b 74 24:83 ec 20 ]
ffffbfe5ce8a658b-ffffbfe5ce8a65bf 53 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+ef (+0x04)
[ 48 83 c4 20 5f c3 cc 48:8d 05 2f 9d 15 00 8b da ]
ffffbfe5ce8a65c2-ffffbfe5ce8a65fb 58 bytes - win32kbase!DirectComposition::CAnimationMarshaler::`vector deleting destructor'+e (+0x37)
[ f9 e8 24 00 00 00 f6 c3:c4 48 89 58 10 89 48 08 ]
ffffbfe5ce8a65fd-ffffbfe5ce8a664b 79 bytes - win32kbase!DirectComposition::CAnimationMarshaler::~CAnimationMarshaler+11 (+0x3b)
[ 48 8b f9 48 89 01 48 8d:00 00 49 8d 48 08 49 3b ]
ffffbfe5ce8a664d-ffffbfe5ce8a665f 19 bytes - win32kbase!DirectComposition::CAnimationMarshaler::~CAnimationMarshaler+61 (+0x50)
[ 00 48 89 5f 48 48 85 db:eb c5 0f 10 02 f3 0f 7f ]
736 errors : !win32kbase (ffffbfe5ce89a8d0-ffffbfe5ce8a665f)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

MEMORY_CORRUPTOR: LARGE

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132895967657919551
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : USB\VID_8087&PID_1024\20180624905925
VetoString : [/CODE]
 
Yeniden merhaba, sistemdeki RAM'lerinizi Memtest86 ile test etmenizi rica edeceğim. Sonucu sonrasında bizimle paylaşırsanız sevinirim.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffe8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8057340e3d5, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

Key : AV.Type
Value: Read

Key : Analysis.CPU.mSec
Value: 9280

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 17766

Key : Analysis.Init.CPU.mSec
Value: 999

Key : Analysis.Init.Elapsed.mSec
Value: 2303

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021722-11296-01.dmp

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffffffffffffe8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8057340e3d5

BUGCHECK_P4: 2

READ_ADDRESS: fffff80573efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffe8

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

TRAP_FRAME: ffff8281530928c0 -- (.trap 0xffff8281530928c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00ffffffffffffff rbx=0000000000000000 rcx=ffffffffffffffd0
rdx=00000000000000ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057340e3d5 rsp=ffff828153092a58 rbp=ffff828153092b80
r8=ffffc00d732e6220 r9=fffff80573efbe80 r10=0000000000000000
r11=ffff9182731bd240 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!ObpGetWaitObject+0x15:
fffff805`7340e3d5 0fb64118 movzx eax,byte ptr [rcx+18h] ds:ffffffff`ffffffe8=??
Resetting default scope

STACK_TEXT:
ffff8281`53092618 fffff805`7364a86f : 00000000`00000050 ffffffff`ffffffe8 00000000`00000000 ffff8281`530928c0 : nt!KeBugCheckEx
ffff8281`53092620 fffff805`7349f540 : 00000000`00000000 00000000`00000000 ffff8281`53092940 00000000`00000000 : nt!MiSystemFault+0x18d30f
ffff8281`53092720 fffff805`7360575e : ffffffff`ffffffff fffff805`737a44f8 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff8281`530928c0 fffff805`7340e3d5 : fffff805`737f87ac ffff8281`53092b80 00000000`00501802 00000000`777c0f33 : nt!KiPageFault+0x35e
ffff8281`53092a58 fffff805`737f87ac : ffff8281`53092b80 00000000`00501802 00000000`777c0f33 00000000`00501802 : nt!ObpGetWaitObject+0x15
ffff8281`53092a60 fffff805`737f888a : ffffc00d`858e7080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x5c
ffff8281`53092ac0 fffff805`736094f1 : ffffc00d`858e7080 00000000`0000000e ffff8281`53092b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffff8281`53092b00 00000000`777c1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000000`1302f258 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777c1cfc


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffbfe5ce89a8d0-ffffbfe5ce89a8d4 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+510
[ 9c 24 b0 03 00:48 8b 02 49 3b ]
ffffbfe5ce89a8d6-ffffbfe5ce89a8df 10 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+516 (+0x06)
[ 48 81 c4 a0 03 00 00 5d:77 09 1b c0 f7 d0 83 e0 ]
ffffbfe5ce89a8e1-ffffbfe5ce89a8e6 6 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+521 (+0x0b)
[ cc cc cc cc cc cc:b8 01 00 00 00 c3 ]
ffffbfe5ce89a8e8-ffffbfe5ce89a8fe 23 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __ (+0x07)
[ 40 55 48 8d ac 24 80 fe:cc cc cc cc cc cc cc cc ]
ffffbfe5ce89a900-ffffbfe5ce89a91b 28 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+18 (+0x18)
[ 48 33 c4 48 89 85 70 01:00 83 ea 01 74 7c 83 ea ]
ffffbfe5ce89a91d-ffffbfe5ce89a92a 14 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+35 (+0x1d)
[ 00 00 48 89 85 50 01 00:75 2c b8 80 00 00 00 8d ]
ffffbfe5ce89a92d-ffffbfe5ce89a935 9 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+45 (+0x10)
[ 48 89 85 40 01 00 00 48:00 8d 48 10 49 8d 14 0a ]
ffffbfe5ce89a937-ffffbfe5ce89a94c 22 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+4f (+0x0a)
[ a0 02 00 00 48 89 85 30:d2 74 0c f3 0f 11 12 41 ]
ffffbfe5ce89a94e-ffffbfe5ce89a954 7 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+66 (+0x17)
[ 00 00 48 8b 85 90 02:0f 85 c2 d2 06 00 b8 ]
ffffbfe5ce89a956-ffffbfe5ce89a96a 21 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+6e (+0x08)
[ 00 48 89 85 10 01 00 00:08 00 00 8d 4a 5b eb d3 ]
ffffbfe5ce89a96c-ffffbfe5ce89a970 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+84 (+0x16)
[ 48 8b 85 80 02:01 00 00 b9 60 ]
ffffbfe5ce89a973-ffffbfe5ce89a976 4 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+8b (+0x07)
[ 48 89 85 f0:00 eb bb b8 ]
ffffbfe5ce89a978 - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+90 (+0x05)
[ 00:04 ]
ffffbfe5ce89a97a-ffffbfe5ce89a97e 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+92 (+0x02)
[ 48 8b 85 78 02:00 b9 54 00 00 ]
ffffbfe5ce89a980-ffffbfe5ce89a984 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+98 (+0x06)
[ 00 48 89 85 e0:eb af b8 00 20 ]
ffffbfe5ce89a987-ffffbfe5ce89a994 14 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+9f (+0x07)
[ 00 48 8b 85 70 02 00 00:b9 6c 00 00 00 eb a3 b8 ]
ffffbfe5ce89a996-ffffbfe5ce89a9b1 28 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+ae (+0x0f)
[ 48 8b 85 68 02 00 00 48:00 00 eb 97 cc cc cc cc ]
ffffbfe5ce89a9b3-ffffbfe5ce89a9bc 10 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+cb (+0x1d)
[ 8b 85 58 02 00 00 48 89:8d 6c 24 c9 48 81 ec 00 ]
ffffbfe5ce89a9be-ffffbfe5ce89a9cf 18 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+d6 (+0x0b)
[ 00 00 48 8b 85 50 02 00:48 8b 05 db c2 1a 00 48 ]
ffffbfe5ce8a3f00-ffffbfe5ce8a3f1d 30 bytes - win32kbase!UserGetDesktopDC+c8 (+0x9542)
[ 05 e8 9a 09 fa ff 48 8b:48 83 ec 28 48 8b ca e8 ]
ffffbfe5ce8a3f1f-ffffbfe5ce8a3f78 90 bytes - win32kbase!UserGetDesktopDC+e7 (+0x1f)
[ 45 33 c0 8b d7 85 f6 48:cc 45 33 db 4c 8b d1 4d ]
ffffbfe5ce8a3f7a-ffffbfe5ce8a3f93 26 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+1a (+0x5b)
[ 40 32 ff 84 c0 74 72 8b:00 74 44 48 8b 44 24 28 ]
ffffbfe5ce8a3f95-ffffbfe5ce8a3fb0 28 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+35 (+0x1b)
[ 5c 24 40 0f ba e0 09 73:4c 01 00 00 8a c1 c0 e8 ]
ffffbfe5ce8a3fb2-ffffbfe5ce8a3fff 78 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+52 (+0x1d)
[ 0f ba 73 10 09 8b 43 10:88 92 4c 01 00 00 c6 00 ]
ffffbfe5ce8a6561-ffffbfe5ce8a6585 37 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+c5 (+0x25af)
[ 8b 4e 58 49 23 d2 0f 10:83 ec 28 8b ca 45 33 c0 ]
ffffbfe5ce8a6587-ffffbfe5ce8a6589 3 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+eb (+0x26)
[ 8b 74 24:83 ec 20 ]
ffffbfe5ce8a658b-ffffbfe5ce8a65bf 53 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+ef (+0x04)
[ 48 83 c4 20 5f c3 cc 48:8d 05 2f 9d 15 00 8b da ]
ffffbfe5ce8a65c2-ffffbfe5ce8a65fb 58 bytes - win32kbase!DirectComposition::CAnimationMarshaler::`vector deleting destructor'+e (+0x37)
[ f9 e8 24 00 00 00 f6 c3:c4 48 89 58 10 89 48 08 ]
ffffbfe5ce8a65fd-ffffbfe5ce8a664b 79 bytes - win32kbase!DirectComposition::CAnimationMarshaler::~CAnimationMarshaler+11 (+0x3b)
[ 48 8b f9 48 89 01 48 8d:00 00 49 8d 48 08 49 3b ]
ffffbfe5ce8a664d-ffffbfe5ce8a665f 19 bytes - win32kbase!DirectComposition::CAnimationMarshaler::~CAnimationMarshaler+61 (+0x50)
[ 00 48 89 5f 48 48 85 db:eb c5 0f 10 02 f3 0f 7f ]
736 errors : !win32kbase (ffffbfe5ce89a8d0-ffffbfe5ce8a665f)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

MEMORY_CORRUPTOR: LARGE

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132895967657919551
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : USB\VID_8087&PID_1024\20180624905925
VetoString : [/CODE]
Hocam testi yaptım temiz çıktı.
Az önce bir hata daha aldım.
 
Son düzenleme:
Olay Görüntüleyicisinde Sistem logunu paylaşır mısınız? Rehber aşağıda mevcut.

 

Yeni konular

Geri
Yukarı