Dosyaya Drive'da sağ tıklayıp paylaşıma açabilir misin? Ya da Mediafire gibi başka bir dosya paylaşım sitesine yükleyebilir misin?
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000031, The subtype of the bugcheck.
Arg2: ffff820bde544010
Arg3: ffff9a80b3f9e000
Arg4: ffffc90215c22952
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_31
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: Spotify.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff800231f7059 to fffff80022bc23c0
STACK_TEXT:
ffffb08c`38ed1528 fffff800`231f7059 : 00000000`0000001a 00000000`00000031 ffff820b`de544010 ffff9a80`b3f9e000 : nt!KeBugCheckEx
ffffb08c`38ed1530 fffff800`230e06f0 : ffffc902`15c22010 00000000`0000001e ffff9a80`b3f9e000 00000000`00000000 : nt!MiApplyCompressedFixups+0x1167f9
ffffb08c`38ed1590 fffff800`22fe8481 : 00000000`0000001e ffff820b`de175080 ffffec00`03c15d20 00000000`639b0000 : nt!MiPerformFixups+0x80
ffffb08c`38ed1630 fffff800`22a93840 : 00000000`00000000 ffff820b`e3fca1d0 ffff820b`e3fca218 00000000`00000018 : nt!MiRelocateImagePfn+0x191
ffffb08c`38ed16a0 fffff800`22a942c8 : ffff820b`00000000 fffff800`00000000 00000000`00000000 ffff820b`de544218 : nt!MiValidateInPage+0x250
ffffb08c`38ed1750 fffff800`22a9471d : 00000000`00000003 ffffb08c`00000000 ffffb08c`38ed1908 fffff800`00000000 : nt!MiWaitForInPageComplete+0x278
ffffb08c`38ed1860 fffff800`22a5881b : 00000000`c0033333 00000000`00000001 00000000`739ce820 00000000`0d27d000 : nt!MiIssueHardFault+0x1ad
ffffb08c`38ed1960 fffff800`22bd041e : ffff820b`de175080 00000000`00000000 00000000`0024e000 00000000`00000000 : nt!MmAccessFault+0x40b
ffffb08c`38ed1b00 00000000`739ce820 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0720d3e4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x739ce820
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
fffff4094bd271f9-fffff4094bd271fe 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49
[ ff 15 b1 f5 19 00:e8 a2 f0 20 00 90 ]
fffff4094bd27269-fffff4094bd2726a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x70)
[ 48 ff:4c 8b ]
fffff4094bd27270-fffff4094bd27273 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07)
[ 0f 1f 44 00:e8 ab f1 20 ]
fffff4094bd283d5-fffff4094bd283d6 2 bytes - win32kbase!GreSfmDwmShutdown+35 (+0x1165)
[ 48 ff:4c 8b ]
fffff4094bd283dc-fffff4094bd283df 4 bytes - win32kbase!GreSfmDwmShutdown+3c (+0x07)
[ 0f 1f 44 00:e8 3f e0 20 ]
fffff4094bd283e5-fffff4094bd283e6 2 bytes - win32kbase!GreSfmDwmShutdown+45 (+0x09)
[ 48 ff:4c 8b ]
fffff4094bd283ec-fffff4094bd283ef 4 bytes - win32kbase!GreSfmDwmShutdown+4c (+0x07)
[ 0f 1f 44 00:e8 2f e0 20 ]
24 errors : !win32kbase (fffff4094bd271f9-fffff4094bd283ef)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8071f8a2652, Address of the instruction which caused the bugcheck
Arg3: ffffe9838b47c1b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
nt!KeAbPostRelease+122
fffff807`1f8a2652 8bd8 mov ebx,eax
CONTEXT: ffffe9838b47c1b0 -- (.cxr 0xffffe9838b47c1b0;r)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000060
rdx=0000000000000001 rsi=ffffb68d049cb400 rdi=ffffb68d049cb080
rip=fffff8071f8a2652 rsp=ffffe9838b47cba0 rbp=ffffb68cf8652bb8
r8=00000000ffffffff r9=7fffb68cf8652bb8 r10=7ffffffffffffffc
r11=0000000000000000 r12=ffff890bfdeddb80 r13=ffffb68d04a2c6a4
r14=0000000000000001 r15=ffffb68d04a2c6e0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!KeAbPostRelease+0x122:
fffff807`1f8a2652 8bd8 mov ebx,eax
Last set context:
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000060
rdx=0000000000000001 rsi=ffffb68d049cb400 rdi=ffffb68d049cb080
rip=fffff8071f8a2652 rsp=ffffe9838b47cba0 rbp=ffffb68cf8652bb8
r8=00000000ffffffff r9=7fffb68cf8652bb8 r10=7ffffffffffffffc
r11=0000000000000000 r12=ffff890bfdeddb80 r13=ffffb68d04a2c6a4
r14=0000000000000001 r15=ffffb68d04a2c6e0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!KeAbPostRelease+0x122:
fffff807`1f8a2652 8bd8 mov ebx,eax
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: Skype.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff8071f80c854 to fffff8071f8a2652
STACK_TEXT:
ffffe983`8b47cba0 fffff807`1f80c854 : ffffb68d`00000000 ffffb68d`00000001 ffffb68d`04a2c708 ffffb68c`f8652bb8 : nt!KeAbPostRelease+0x122
ffffe983`8b47cbf0 fffff807`244e75f7 : ffffb68d`043b3210 ffffb68d`04a2c708 ffffb68d`00000001 ffffb68d`04a2c708 : nt!KeReleaseGuardedMutex+0x44
ffffe983`8b47cc20 fffff807`244e8325 : 00000000`00004000 00000000`ffffbfff ffffb68d`04a2c6a0 00000000`00000000 : FLTMGR!FltpGetFileNameInformation+0x5e7
ffffe983`8b47ccc0 fffff807`3384e487 : ffffb68d`049cb3a0 ffffb68d`043b3a90 ffffb68d`049cb080 ffff890b`feecd1b8 : FLTMGR!FltGetFileNameInformation+0x195
ffffe983`8b47cd40 fffff807`2451e6fe : 00000000`00000001 00000000`00000000 ffffb68d`043b3a90 fffff807`1f8a112d : luafv!LuafvGenerateFileName+0x57
ffffe983`8b47cd70 fffff807`2451e01b : ffffb68c`f8652500 ffffb68d`043b3a90 ffffb68d`04a2c708 fffff807`1f8a1d3d : FLTMGR!FltpCallOpenedFileNameHandler+0x7e
ffffe983`8b47cdd0 fffff807`244e74cf : ffffb68d`04a2c708 ffffb68d`00000000 ffffb68d`04918940 ffffb68d`04a2c708 : FLTMGR!FltpCreateFileNameInformation+0x19b
ffffe983`8b47ce30 fffff807`244e8325 : ffffb68d`00004000 00000000`ffffbfff ffffb68d`04a2c6a0 ffffb68c`fb6fc010 : FLTMGR!FltpGetFileNameInformation+0x4bf
ffffe983`8b47ced0 fffff807`24ee422a : ffffb68d`044cb0f8 ffffb68d`044cb0f8 00000000`0000206c ffff890b`fe98a300 : FLTMGR!FltGetFileNameInformation+0x195
ffffe983`8b47cf50 ffffb68d`044cb0f8 : ffffb68d`044cb0f8 00000000`0000206c ffff890b`fe98a300 ffff890b`00000004 : WdFilter+0x4422a
ffffe983`8b47cf58 ffffb68d`044cb0f8 : 00000000`0000206c ffff890b`fe98a300 ffff890b`00000004 00000000`00000000 : 0xffffb68d`044cb0f8
ffffe983`8b47cf60 00000000`0000206c : ffff890b`fe98a300 ffff890b`00000004 00000000`00000000 00000000`00000000 : 0xffffb68d`044cb0f8
ffffe983`8b47cf68 ffff890b`fe98a300 : ffff890b`00000004 00000000`00000000 00000000`00000000 01d66c35`8dbb796e : 0x206c
ffffe983`8b47cf70 ffff890b`00000004 : 00000000`00000000 00000000`00000000 01d66c35`8dbb796e 01d66c35`a4b48b53 : 0xffff890b`fe98a300
ffffe983`8b47cf78 00000000`00000000 : 00000000`00000000 01d66c35`8dbb796e 01d66c35`a4b48b53 01d66c35`a4b48b53 : 0xffff890b`00000004
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffc7dc89e471f9-ffffc7dc89e471fe 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49
[ ff 15 b1 f5 19 00:e8 a2 f0 20 00 90 ]
ffffc7dc89e47269-ffffc7dc89e4726a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x70)
[ 48 ff:4c 8b ]
ffffc7dc89e47270-ffffc7dc89e47273 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07)
[ 0f 1f 44 00:e8 ab f1 20 ]
ffffc7dc89e483d5-ffffc7dc89e483d6 2 bytes - win32kbase!GreSfmDwmShutdown+35 (+0x1165)
[ 48 ff:4c 8b ]
ffffc7dc89e483dc-ffffc7dc89e483df 4 bytes - win32kbase!GreSfmDwmShutdown+3c (+0x07)
[ 0f 1f 44 00:e8 3f e0 20 ]
ffffc7dc89e483e5-ffffc7dc89e483e6 2 bytes - win32kbase!GreSfmDwmShutdown+45 (+0x09)
[ 48 ff:4c 8b ]
ffffc7dc89e483ec-ffffc7dc89e483ef 4 bytes - win32kbase!GreSfmDwmShutdown+4c (+0x07)
[ 0f 1f 44 00:e8 2f e0 20 ]
24 errors : !win32kbase (ffffc7dc89e471f9-ffffc7dc89e483ef)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xffffe9838b47c1b0 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8047ad40941, The address that the exception occurred at
Arg3: fffff50a0f496ac8, Exception Record Address
Arg4: fffff8047fe7c930, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
nt!MiDemoteCombinedPte+51
fffff804`7ad40941 498378f001 cmp qword ptr [r8-10h],1
EXCEPTION_RECORD: fffff50a0f496ac8 -- (.exr 0xfffff50a0f496ac8)
ExceptionAddress: fffff8047ad40941 (nt!MiDemoteCombinedPte+0x0000000000000051)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff8047fe7c930 -- (.cxr 0xfffff8047fe7c930;r)
rax=ffff86432190c000 rbx=0000000000000000 rcx=ffff8f06b18d7580
rdx=ffff863ffc7a2928 rsi=ffff863ffc7a2928 rdi=fffff50a0f497310
rip=fffff8047ad40941 rsp=fffff50a0f496d00 rbp=00007ff8f4525000
r8=8000000000000000 r9=ffff8f06adffb2c0 r10=0000000000000000
r11=ffff860000000000 r12=0000000000000000 r13=fffff50a0f497410
r14=8000000000000000 r15=ffff8f06b18d7580
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
nt!MiDemoteCombinedPte+0x51:
fffff804`7ad40941 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
Last set context:
rax=ffff86432190c000 rbx=0000000000000000 rcx=ffff8f06b18d7580
rdx=ffff863ffc7a2928 rsi=ffff863ffc7a2928 rdi=fffff50a0f497310
rip=fffff8047ad40941 rsp=fffff50a0f496d00 rbp=00007ff8f4525000
r8=8000000000000000 r9=ffff8f06adffb2c0 r10=0000000000000000
r11=ffff860000000000 r12=0000000000000000 r13=fffff50a0f497410
r14=8000000000000000 r15=ffff8f06b18d7580
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
nt!MiDemoteCombinedPte+0x51:
fffff804`7ad40941 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffffffffffffff
FOLLOWUP_IP:
nt!MiDemoteCombinedPte+51
fffff804`7ad40941 498378f001 cmp qword ptr [r8-10h],1
BUGCHECK_STR: AV
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
EXCEPTION_STR: 0x0
LAST_CONTROL_TRANSFER: from fffff8047ac76b07 to fffff8047ad40941
STACK_TEXT:
fffff50a`0f496d00 fffff804`7ac76b07 : 00000000`00000000 ffff863f`fc7a28f8 00000000`00000002 00000000`00000000 : nt!MiDemoteCombinedPte+0x51
fffff50a`0f496dd0 fffff804`7ac732b7 : 00000000`00000000 fffff50a`0f497410 00000000`00000000 00000000`00000000 : nt!MiAgePte+0x427
fffff50a`0f496e70 fffff804`7ac73771 : fffff50a`0f497410 fffff50a`0f497410 ffff8f06`00000000 ffff8643`1ffe3d10 : nt!MiWalkPageTablesRecursively+0x1e7
fffff50a`0f496f30 fffff804`7ac73771 : fffff50a`0f497410 fffff50a`0f497410 ffff8f06`00000000 ffff8643`218fff18 : nt!MiWalkPageTablesRecursively+0x6a1
fffff50a`0f496ff0 fffff804`7ac73771 : fffff50a`0f497410 fffff50a`0f497410 ffff8f06`00000000 ffff8643`2190c7f8 : nt!MiWalkPageTablesRecursively+0x6a1
fffff50a`0f4970b0 fffff804`7ac72efc : fffff50a`0f497410 00000000`00000004 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffff50a`0f497170 fffff804`7ac72987 : fffff50a`0f497410 fffff50a`00000002 00000000`00000002 ffff8f06`00000000 : nt!MiWalkPageTables+0x36c
fffff50a`0f497270 fffff804`7ac720c2 : ffff8f06`b1509080 fffff804`00000000 00000003`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3a7
fffff50a`0f497790 fffff804`7ac719da : ffff8f06`b18d7580 fffff50a`0f497a50 00000000`00000000 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3b2
fffff50a`0f497880 fffff804`7ac700f0 : fffff804`00000000 fffff804`00000000 fffff804`7b06a340 ffff8f06`a0e43500 : nt!MiProcessWorkingSets+0x1fa
fffff50a`0f497a30 fffff804`7aeca5c6 : 00000000`00000001 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xc8
fffff50a`0f497af0 fffff804`7ad8c925 : 00000000`00000004 00000000`ffffffff fffff804`7b06a340 00000000`000000af : nt!MmWorkingSetManager+0x12
fffff50a`0f497b20 fffff804`7ad1e155 : ffff8f06`a0fd2080 00000000`00000080 fffff804`7ad8c7d0 00000000`00640078 : nt!KeBalanceSetManager+0x155
fffff50a`0f497c10 fffff804`7adc99c8 : fffff804`78326180 ffff8f06`a0fd2080 fffff804`7ad1e100 006f0048`00630076 : nt!PspSystemThreadStartup+0x55
fffff50a`0f497c60 00000000`00000000 : fffff50a`0f498000 fffff50a`0f492000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffff8da99c4971f9-ffff8da99c4971fe 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49
[ ff 15 b1 f5 19 00:e8 a2 f0 20 00 90 ]
ffff8da99c497269-ffff8da99c49726a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x70)
[ 48 ff:4c 8b ]
ffff8da99c497270-ffff8da99c497273 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07)
[ 0f 1f 44 00:e8 ab f1 20 ]
ffff8da99c4983d5-ffff8da99c4983d6 2 bytes - win32kbase!GreSfmDwmShutdown+35 (+0x1165)
[ 48 ff:4c 8b ]
ffff8da99c4983dc-ffff8da99c4983df 4 bytes - win32kbase!GreSfmDwmShutdown+3c (+0x07)
[ 0f 1f 44 00:e8 3f e0 20 ]
ffff8da99c4983e5-ffff8da99c4983e6 2 bytes - win32kbase!GreSfmDwmShutdown+45 (+0x09)
[ 48 ff:4c 8b ]
ffff8da99c4983ec-ffff8da99c4983ef 4 bytes - win32kbase!GreSfmDwmShutdown+4c (+0x07)
[ 0f 1f 44 00:e8 2f e0 20 ]
24 errors : !win32kbase (ffff8da99c4971f9-ffff8da99c4983ef)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xfffff8047fe7c930 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffc78ca15ca000, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff803599d5550, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffc78ca15ca000
FAULTING_IP:
nt!memset+d0
fffff803`599d5550 0f1101 movups xmmword ptr [rcx],xmm0
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: lsass.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
TRAP_FRAME: ffffc78ca15c92b0 -- (.trap 0xffffc78ca15c92b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc78ca15c9520 rbx=0000000000000000 rcx=ffffc78ca15ca000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803599d5550 rsp=ffffc78ca15c9448 rbp=ffffc78ca15c9550
r8=0000000000000018 r9=ffffffffffffff64 r10=7ffffffffffffffc
r11=ffffc78ca15c9848 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!memset+0xd0:
fffff803`599d5550 0f1101 movups xmmword ptr [rcx],xmm0 ds:ffffc78c`a15ca000=????????????????????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803599ecf1a to fffff803599c23c0
STACK_TEXT:
ffffc78c`a15c9008 fffff803`599ecf1a : 00000000`00000050 ffffc78c`a15ca000 00000000`00000002 ffffc78c`a15c92b0 : nt!KeBugCheckEx
ffffc78c`a15c9010 fffff803`5985875f : ffffdc86`b1a7d570 00000000`00000002 00000000`00000000 ffffc78c`a15ca000 : nt!MiSystemFault+0x1c5aba
ffffc78c`a15c9110 fffff803`599d041e : 00000000`00000040 00000000`00000000 000000c4`8227e360 ffffc78c`a15c9578 : nt!MmAccessFault+0x34f
ffffc78c`a15c92b0 fffff803`599d5550 : fffff803`59e137f7 ffffb68d`e22023a0 fffff803`598a1b7d ffffb68d`e2202080 : nt!KiPageFault+0x35e
ffffc78c`a15c9448 fffff803`59e137f7 : ffffb68d`e22023a0 fffff803`598a1b7d ffffb68d`e2202080 ffffdc86`b0e32540 : nt!memset+0xd0
ffffc78c`a15c9450 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmKeyBodyRemapToVirtualForEnum+0x67
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8035985878b-fffff8035985878f 5 bytes - nt!MmAccessFault+37b
[ df be 7d fb f6:1f 3f 7e fc f8 ]
fffff803598587b8-fffff803598587bc 5 bytes - nt!MmAccessFault+3a8 (+0x2d)
[ d7 be 7d fb f6:17 3f 7e fc f8 ]
fffff803599ecfcf - nt!MiSystemFault+1c5b6f (+0x194817)
[ f6:f8 ]
fffff803599ecfe5 - nt!MiSystemFault+1c5b85 (+0x16)
[ f6:f8 ]
12 errors : !nt (fffff8035985878b-fffff803599ecfe5)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff8073487ee70
Arg3: 0000000047940cf0
Arg4: fffff8073159d2d4
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: Spotify.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff807315d41e9 to fffff807315c23c0
STACK_TEXT:
fffff807`3487ed28 fffff807`315d41e9 : 00000000`0000007f 00000000`00000008 fffff807`3487ee70 00000000`47940cf0 : nt!KeBugCheckEx
fffff807`3487ed30 fffff807`315cf043 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`3487ee70 fffff807`3159d2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`47940cf0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!_security_check_cookie+0x4
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffabe5164471f9-ffffabe5164471fe 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49
[ ff 15 b1 f5 19 00:e8 a2 f0 20 00 90 ]
ffffabe516447269-ffffabe51644726a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x70)
[ 48 ff:4c 8b ]
ffffabe516447270-ffffabe516447273 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07)
[ 0f 1f 44 00:e8 ab f1 20 ]
ffffabe5164483d5-ffffabe5164483d6 2 bytes - win32kbase!GreSfmDwmShutdown+35 (+0x1165)
[ 48 ff:4c 8b ]
ffffabe5164483dc-ffffabe5164483df 4 bytes - win32kbase!GreSfmDwmShutdown+3c (+0x07)
[ 0f 1f 44 00:e8 3f e0 20 ]
ffffabe5164483e5-ffffabe5164483e6 2 bytes - win32kbase!GreSfmDwmShutdown+45 (+0x09)
[ 48 ff:4c 8b ]
ffffabe5164483ec-ffffabe5164483ef 4 bytes - win32kbase!GreSfmDwmShutdown+4c (+0x07)
[ 0f 1f 44 00:e8 2f e0 20 ]
24 errors : !win32kbase (ffffabe5164471f9-ffffabe5164483ef)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
Testi yapıp bildireceğim fakat şuanlık kaldırabilirmisiniz derken? Oyunu mu sileyim?Memtest86 ile bellek testi yapar mısınız? Valorant oynuyorsunuz şu anlık kaldırabilir misiniz?
Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000000031, The subtype of the bugcheck. Arg2: ffff820bde544010 Arg3: ffff9a80b3f9e000 Arg4: ffffc90215c22952 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_31 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION PROCESS_NAME: Spotify.exe CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre LAST_CONTROL_TRANSFER: from fffff800231f7059 to fffff80022bc23c0 STACK_TEXT: ffffb08c`38ed1528 fffff800`231f7059 : 00000000`0000001a 00000000`00000031 ffff820b`de544010 ffff9a80`b3f9e000 : nt!KeBugCheckEx ffffb08c`38ed1530 fffff800`230e06f0 : ffffc902`15c22010 00000000`0000001e ffff9a80`b3f9e000 00000000`00000000 : nt!MiApplyCompressedFixups+0x1167f9 ffffb08c`38ed1590 fffff800`22fe8481 : 00000000`0000001e ffff820b`de175080 ffffec00`03c15d20 00000000`639b0000 : nt!MiPerformFixups+0x80 ffffb08c`38ed1630 fffff800`22a93840 : 00000000`00000000 ffff820b`e3fca1d0 ffff820b`e3fca218 00000000`00000018 : nt!MiRelocateImagePfn+0x191 ffffb08c`38ed16a0 fffff800`22a942c8 : ffff820b`00000000 fffff800`00000000 00000000`00000000 ffff820b`de544218 : nt!MiValidateInPage+0x250 ffffb08c`38ed1750 fffff800`22a9471d : 00000000`00000003 ffffb08c`00000000 ffffb08c`38ed1908 fffff800`00000000 : nt!MiWaitForInPageComplete+0x278 ffffb08c`38ed1860 fffff800`22a5881b : 00000000`c0033333 00000000`00000001 00000000`739ce820 00000000`0d27d000 : nt!MiIssueHardFault+0x1ad ffffb08c`38ed1960 fffff800`22bd041e : ffff820b`de175080 00000000`00000000 00000000`0024e000 00000000`00000000 : nt!MmAccessFault+0x40b ffffb08c`38ed1b00 00000000`739ce820 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e 00000000`0720d3e4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x739ce820 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase fffff4094bd271f9-fffff4094bd271fe 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49 [ ff 15 b1 f5 19 00:e8 a2 f0 20 00 90 ] fffff4094bd27269-fffff4094bd2726a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x70) [ 48 ff:4c 8b ] fffff4094bd27270-fffff4094bd27273 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07) [ 0f 1f 44 00:e8 ab f1 20 ] fffff4094bd283d5-fffff4094bd283d6 2 bytes - win32kbase!GreSfmDwmShutdown+35 (+0x1165) [ 48 ff:4c 8b ] fffff4094bd283dc-fffff4094bd283df 4 bytes - win32kbase!GreSfmDwmShutdown+3c (+0x07) [ 0f 1f 44 00:e8 3f e0 20 ] fffff4094bd283e5-fffff4094bd283e6 2 bytes - win32kbase!GreSfmDwmShutdown+45 (+0x09) [ 48 ff:4c 8b ] fffff4094bd283ec-fffff4094bd283ef 4 bytes - win32kbase!GreSfmDwmShutdown+4c (+0x07) [ 0f 1f 44 00:e8 2f e0 20 ] 24 errors : !win32kbase (fffff4094bd271f9-fffff4094bd283ef) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: LARGE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE BUCKET_ID: MEMORY_CORRUPTION_LARGE ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_large FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8071f8a2652, Address of the instruction which caused the bugcheck Arg3: ffffe9838b47c1b0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba FAULTING_IP: nt!KeAbPostRelease+122 fffff807`1f8a2652 8bd8 mov ebx,eax CONTEXT: ffffe9838b47c1b0 -- (.cxr 0xffffe9838b47c1b0;r) rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000060 rdx=0000000000000001 rsi=ffffb68d049cb400 rdi=ffffb68d049cb080 rip=fffff8071f8a2652 rsp=ffffe9838b47cba0 rbp=ffffb68cf8652bb8 r8=00000000ffffffff r9=7fffb68cf8652bb8 r10=7ffffffffffffffc r11=0000000000000000 r12=ffff890bfdeddb80 r13=ffffb68d04a2c6a4 r14=0000000000000001 r15=ffffb68d04a2c6e0 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!KeAbPostRelease+0x122: fffff807`1f8a2652 8bd8 mov ebx,eax Last set context: rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000060 rdx=0000000000000001 rsi=ffffb68d049cb400 rdi=ffffb68d049cb080 rip=fffff8071f8a2652 rsp=ffffe9838b47cba0 rbp=ffffb68cf8652bb8 r8=00000000ffffffff r9=7fffb68cf8652bb8 r10=7ffffffffffffffc r11=0000000000000000 r12=ffff890bfdeddb80 r13=ffffb68d04a2c6a4 r14=0000000000000001 r15=ffffb68d04a2c6e0 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!KeAbPostRelease+0x122: fffff807`1f8a2652 8bd8 mov ebx,eax Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0x3B PROCESS_NAME: Skype.exe CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre LAST_CONTROL_TRANSFER: from fffff8071f80c854 to fffff8071f8a2652 STACK_TEXT: ffffe983`8b47cba0 fffff807`1f80c854 : ffffb68d`00000000 ffffb68d`00000001 ffffb68d`04a2c708 ffffb68c`f8652bb8 : nt!KeAbPostRelease+0x122 ffffe983`8b47cbf0 fffff807`244e75f7 : ffffb68d`043b3210 ffffb68d`04a2c708 ffffb68d`00000001 ffffb68d`04a2c708 : nt!KeReleaseGuardedMutex+0x44 ffffe983`8b47cc20 fffff807`244e8325 : 00000000`00004000 00000000`ffffbfff ffffb68d`04a2c6a0 00000000`00000000 : FLTMGR!FltpGetFileNameInformation+0x5e7 ffffe983`8b47ccc0 fffff807`3384e487 : ffffb68d`049cb3a0 ffffb68d`043b3a90 ffffb68d`049cb080 ffff890b`feecd1b8 : FLTMGR!FltGetFileNameInformation+0x195 ffffe983`8b47cd40 fffff807`2451e6fe : 00000000`00000001 00000000`00000000 ffffb68d`043b3a90 fffff807`1f8a112d : luafv!LuafvGenerateFileName+0x57 ffffe983`8b47cd70 fffff807`2451e01b : ffffb68c`f8652500 ffffb68d`043b3a90 ffffb68d`04a2c708 fffff807`1f8a1d3d : FLTMGR!FltpCallOpenedFileNameHandler+0x7e ffffe983`8b47cdd0 fffff807`244e74cf : ffffb68d`04a2c708 ffffb68d`00000000 ffffb68d`04918940 ffffb68d`04a2c708 : FLTMGR!FltpCreateFileNameInformation+0x19b ffffe983`8b47ce30 fffff807`244e8325 : ffffb68d`00004000 00000000`ffffbfff ffffb68d`04a2c6a0 ffffb68c`fb6fc010 : FLTMGR!FltpGetFileNameInformation+0x4bf ffffe983`8b47ced0 fffff807`24ee422a : ffffb68d`044cb0f8 ffffb68d`044cb0f8 00000000`0000206c ffff890b`fe98a300 : FLTMGR!FltGetFileNameInformation+0x195 ffffe983`8b47cf50 ffffb68d`044cb0f8 : ffffb68d`044cb0f8 00000000`0000206c ffff890b`fe98a300 ffff890b`00000004 : WdFilter+0x4422a ffffe983`8b47cf58 ffffb68d`044cb0f8 : 00000000`0000206c ffff890b`fe98a300 ffff890b`00000004 00000000`00000000 : 0xffffb68d`044cb0f8 ffffe983`8b47cf60 00000000`0000206c : ffff890b`fe98a300 ffff890b`00000004 00000000`00000000 00000000`00000000 : 0xffffb68d`044cb0f8 ffffe983`8b47cf68 ffff890b`fe98a300 : ffff890b`00000004 00000000`00000000 00000000`00000000 01d66c35`8dbb796e : 0x206c ffffe983`8b47cf70 ffff890b`00000004 : 00000000`00000000 00000000`00000000 01d66c35`8dbb796e 01d66c35`a4b48b53 : 0xffff890b`fe98a300 ffffe983`8b47cf78 00000000`00000000 : 00000000`00000000 01d66c35`8dbb796e 01d66c35`a4b48b53 01d66c35`a4b48b53 : 0xffff890b`00000004 CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase ffffc7dc89e471f9-ffffc7dc89e471fe 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49 [ ff 15 b1 f5 19 00:e8 a2 f0 20 00 90 ] ffffc7dc89e47269-ffffc7dc89e4726a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x70) [ 48 ff:4c 8b ] ffffc7dc89e47270-ffffc7dc89e47273 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07) [ 0f 1f 44 00:e8 ab f1 20 ] ffffc7dc89e483d5-ffffc7dc89e483d6 2 bytes - win32kbase!GreSfmDwmShutdown+35 (+0x1165) [ 48 ff:4c 8b ] ffffc7dc89e483dc-ffffc7dc89e483df 4 bytes - win32kbase!GreSfmDwmShutdown+3c (+0x07) [ 0f 1f 44 00:e8 3f e0 20 ] ffffc7dc89e483e5-ffffc7dc89e483e6 2 bytes - win32kbase!GreSfmDwmShutdown+45 (+0x09) [ 48 ff:4c 8b ] ffffc7dc89e483ec-ffffc7dc89e483ef 4 bytes - win32kbase!GreSfmDwmShutdown+4c (+0x07) [ 0f 1f 44 00:e8 2f e0 20 ] 24 errors : !win32kbase (ffffc7dc89e471f9-ffffc7dc89e483ef) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: LARGE STACK_COMMAND: .cxr 0xffffe9838b47c1b0 ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE BUCKET_ID: MEMORY_CORRUPTION_LARGE ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_large FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8047ad40941, The address that the exception occurred at Arg3: fffff50a0f496ac8, Exception Record Address Arg4: fffff8047fe7c930, Context Record Address Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba FAULTING_IP: nt!MiDemoteCombinedPte+51 fffff804`7ad40941 498378f001 cmp qword ptr [r8-10h],1 EXCEPTION_RECORD: fffff50a0f496ac8 -- (.exr 0xfffff50a0f496ac8) ExceptionAddress: fffff8047ad40941 (nt!MiDemoteCombinedPte+0x0000000000000051) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff CONTEXT: fffff8047fe7c930 -- (.cxr 0xfffff8047fe7c930;r) rax=ffff86432190c000 rbx=0000000000000000 rcx=ffff8f06b18d7580 rdx=ffff863ffc7a2928 rsi=ffff863ffc7a2928 rdi=fffff50a0f497310 rip=fffff8047ad40941 rsp=fffff50a0f496d00 rbp=00007ff8f4525000 r8=8000000000000000 r9=ffff8f06adffb2c0 r10=0000000000000000 r11=ffff860000000000 r12=0000000000000000 r13=fffff50a0f497410 r14=8000000000000000 r15=ffff8f06b18d7580 iopl=0 nv up ei ng nz na po cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287 nt!MiDemoteCombinedPte+0x51: fffff804`7ad40941 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=???????????????? Last set context: rax=ffff86432190c000 rbx=0000000000000000 rcx=ffff8f06b18d7580 rdx=ffff863ffc7a2928 rsi=ffff863ffc7a2928 rdi=fffff50a0f497310 rip=fffff8047ad40941 rsp=fffff50a0f496d00 rbp=00007ff8f4525000 r8=8000000000000000 r9=ffff8f06adffb2c0 r10=0000000000000000 r11=ffff860000000000 r12=0000000000000000 r13=fffff50a0f497410 r14=8000000000000000 r15=ffff8f06b18d7580 iopl=0 nv up ei ng nz na po cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287 nt!MiDemoteCombinedPte+0x51: fffff804`7ad40941 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: unable to get nt!MmSpecialPoolStart unable to get nt!MmSpecialPoolEnd unable to get nt!MmPagedPoolEnd unable to get nt!MmNonPagedPoolStart unable to get nt!MmSizeOfNonPagedPoolInBytes ffffffffffffffff FOLLOWUP_IP: nt!MiDemoteCombinedPte+51 fffff804`7ad40941 498378f001 cmp qword ptr [r8-10h],1 BUGCHECK_STR: AV ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre EXCEPTION_STR: 0x0 LAST_CONTROL_TRANSFER: from fffff8047ac76b07 to fffff8047ad40941 STACK_TEXT: fffff50a`0f496d00 fffff804`7ac76b07 : 00000000`00000000 ffff863f`fc7a28f8 00000000`00000002 00000000`00000000 : nt!MiDemoteCombinedPte+0x51 fffff50a`0f496dd0 fffff804`7ac732b7 : 00000000`00000000 fffff50a`0f497410 00000000`00000000 00000000`00000000 : nt!MiAgePte+0x427 fffff50a`0f496e70 fffff804`7ac73771 : fffff50a`0f497410 fffff50a`0f497410 ffff8f06`00000000 ffff8643`1ffe3d10 : nt!MiWalkPageTablesRecursively+0x1e7 fffff50a`0f496f30 fffff804`7ac73771 : fffff50a`0f497410 fffff50a`0f497410 ffff8f06`00000000 ffff8643`218fff18 : nt!MiWalkPageTablesRecursively+0x6a1 fffff50a`0f496ff0 fffff804`7ac73771 : fffff50a`0f497410 fffff50a`0f497410 ffff8f06`00000000 ffff8643`2190c7f8 : nt!MiWalkPageTablesRecursively+0x6a1 fffff50a`0f4970b0 fffff804`7ac72efc : fffff50a`0f497410 00000000`00000004 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1 fffff50a`0f497170 fffff804`7ac72987 : fffff50a`0f497410 fffff50a`00000002 00000000`00000002 ffff8f06`00000000 : nt!MiWalkPageTables+0x36c fffff50a`0f497270 fffff804`7ac720c2 : ffff8f06`b1509080 fffff804`00000000 00000003`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3a7 fffff50a`0f497790 fffff804`7ac719da : ffff8f06`b18d7580 fffff50a`0f497a50 00000000`00000000 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3b2 fffff50a`0f497880 fffff804`7ac700f0 : fffff804`00000000 fffff804`00000000 fffff804`7b06a340 ffff8f06`a0e43500 : nt!MiProcessWorkingSets+0x1fa fffff50a`0f497a30 fffff804`7aeca5c6 : 00000000`00000001 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xc8 fffff50a`0f497af0 fffff804`7ad8c925 : 00000000`00000004 00000000`ffffffff fffff804`7b06a340 00000000`000000af : nt!MmWorkingSetManager+0x12 fffff50a`0f497b20 fffff804`7ad1e155 : ffff8f06`a0fd2080 00000000`00000080 fffff804`7ad8c7d0 00000000`00640078 : nt!KeBalanceSetManager+0x155 fffff50a`0f497c10 fffff804`7adc99c8 : fffff804`78326180 ffff8f06`a0fd2080 fffff804`7ad1e100 006f0048`00630076 : nt!PspSystemThreadStartup+0x55 fffff50a`0f497c60 00000000`00000000 : fffff50a`0f498000 fffff50a`0f492000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase ffff8da99c4971f9-ffff8da99c4971fe 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49 [ ff 15 b1 f5 19 00:e8 a2 f0 20 00 90 ] ffff8da99c497269-ffff8da99c49726a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x70) [ 48 ff:4c 8b ] ffff8da99c497270-ffff8da99c497273 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07) [ 0f 1f 44 00:e8 ab f1 20 ] ffff8da99c4983d5-ffff8da99c4983d6 2 bytes - win32kbase!GreSfmDwmShutdown+35 (+0x1165) [ 48 ff:4c 8b ] ffff8da99c4983dc-ffff8da99c4983df 4 bytes - win32kbase!GreSfmDwmShutdown+3c (+0x07) [ 0f 1f 44 00:e8 3f e0 20 ] ffff8da99c4983e5-ffff8da99c4983e6 2 bytes - win32kbase!GreSfmDwmShutdown+45 (+0x09) [ 48 ff:4c 8b ] ffff8da99c4983ec-ffff8da99c4983ef 4 bytes - win32kbase!GreSfmDwmShutdown+4c (+0x07) [ 0f 1f 44 00:e8 2f e0 20 ] 24 errors : !win32kbase (ffff8da99c4971f9-ffff8da99c4983ef) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: LARGE STACK_COMMAND: .cxr 0xfffff8047fe7c930 ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE BUCKET_ID: MEMORY_CORRUPTION_LARGE ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_large FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffc78ca15ca000, memory referenced. Arg2: 0000000000000002, value 0 = read operation, 1 = write operation. Arg3: fffff803599d5550, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: unable to get nt!MmSpecialPoolStart unable to get nt!MmSpecialPoolEnd unable to get nt!MmPagedPoolEnd unable to get nt!MmNonPagedPoolStart unable to get nt!MmSizeOfNonPagedPoolInBytes ffffc78ca15ca000 FAULTING_IP: nt!memset+d0 fffff803`599d5550 0f1101 movups xmmword ptr [rcx],xmm0 MM_INTERNAL_CODE: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: AV PROCESS_NAME: lsass.exe CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre TRAP_FRAME: ffffc78ca15c92b0 -- (.trap 0xffffc78ca15c92b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffc78ca15c9520 rbx=0000000000000000 rcx=ffffc78ca15ca000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff803599d5550 rsp=ffffc78ca15c9448 rbp=ffffc78ca15c9550 r8=0000000000000018 r9=ffffffffffffff64 r10=7ffffffffffffffc r11=ffffc78ca15c9848 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc nt!memset+0xd0: fffff803`599d5550 0f1101 movups xmmword ptr [rcx],xmm0 ds:ffffc78c`a15ca000=???????????????????????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff803599ecf1a to fffff803599c23c0 STACK_TEXT: ffffc78c`a15c9008 fffff803`599ecf1a : 00000000`00000050 ffffc78c`a15ca000 00000000`00000002 ffffc78c`a15c92b0 : nt!KeBugCheckEx ffffc78c`a15c9010 fffff803`5985875f : ffffdc86`b1a7d570 00000000`00000002 00000000`00000000 ffffc78c`a15ca000 : nt!MiSystemFault+0x1c5aba ffffc78c`a15c9110 fffff803`599d041e : 00000000`00000040 00000000`00000000 000000c4`8227e360 ffffc78c`a15c9578 : nt!MmAccessFault+0x34f ffffc78c`a15c92b0 fffff803`599d5550 : fffff803`59e137f7 ffffb68d`e22023a0 fffff803`598a1b7d ffffb68d`e2202080 : nt!KiPageFault+0x35e ffffc78c`a15c9448 fffff803`59e137f7 : ffffb68d`e22023a0 fffff803`598a1b7d ffffb68d`e2202080 ffffdc86`b0e32540 : nt!memset+0xd0 ffffc78c`a15c9450 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmKeyBodyRemapToVirtualForEnum+0x67 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt fffff8035985878b-fffff8035985878f 5 bytes - nt!MmAccessFault+37b [ df be 7d fb f6:1f 3f 7e fc f8 ] fffff803598587b8-fffff803598587bc 5 bytes - nt!MmAccessFault+3a8 (+0x2d) [ d7 be 7d fb f6:17 3f 7e fc f8 ] fffff803599ecfcf - nt!MiSystemFault+1c5b6f (+0x194817) [ f6:f8 ] fffff803599ecfe5 - nt!MiSystemFault+1c5b85 (+0x16) [ f6:f8 ] 12 errors : !nt (fffff8035985878b-fffff803599ecfe5) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: LARGE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE BUCKET_ID: MEMORY_CORRUPTION_LARGE ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_large FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption --------- UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: fffff8073487ee70 Arg3: 0000000047940cf0 Arg4: fffff8073159d2d4 Debugging Details: ------------------ BUGCHECK_STR: 0x7f_8 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION PROCESS_NAME: Spotify.exe CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre LAST_CONTROL_TRANSFER: from fffff807315d41e9 to fffff807315c23c0 STACK_TEXT: fffff807`3487ed28 fffff807`315d41e9 : 00000000`0000007f 00000000`00000008 fffff807`3487ee70 00000000`47940cf0 : nt!KeBugCheckEx fffff807`3487ed30 fffff807`315cf043 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff807`3487ee70 fffff807`3159d2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3 00000000`47940cf0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!_security_check_cookie+0x4 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase ffffabe5164471f9-ffffabe5164471fe 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49 [ ff 15 b1 f5 19 00:e8 a2 f0 20 00 90 ] ffffabe516447269-ffffabe51644726a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x70) [ 48 ff:4c 8b ] ffffabe516447270-ffffabe516447273 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07) [ 0f 1f 44 00:e8 ab f1 20 ] ffffabe5164483d5-ffffabe5164483d6 2 bytes - win32kbase!GreSfmDwmShutdown+35 (+0x1165) [ 48 ff:4c 8b ] ffffabe5164483dc-ffffabe5164483df 4 bytes - win32kbase!GreSfmDwmShutdown+3c (+0x07) [ 0f 1f 44 00:e8 3f e0 20 ] ffffabe5164483e5-ffffabe5164483e6 2 bytes - win32kbase!GreSfmDwmShutdown+45 (+0x09) [ 48 ff:4c 8b ] ffffabe5164483ec-ffffabe5164483ef 4 bytes - win32kbase!GreSfmDwmShutdown+4c (+0x07) [ 0f 1f 44 00:e8 2f e0 20 ] 24 errors : !win32kbase (ffffabe5164471f9-ffffabe5164483ef) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: LARGE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE BUCKET_ID: MEMORY_CORRUPTION_LARGE ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_large FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption ---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\gahra\Desktop\ss\090520-22203-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff800`22a00000 PsLoadedModuleList = 0xfffff800`22e480f0
Debug session time: Sat Sep 5 12:17:20.426 2020 (UTC + 2:00)
System Uptime: 0 days 0:02:11.163
Loading Kernel Symbols
...............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`22bc23c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb08c`38ed1530=000000000000001a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000031, The subtype of the bugcheck.
Arg2: ffff820bde544010
Arg3: ffff9a80b3f9e000
Arg4: ffffc90215c22952
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 16874
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-8S1E2KF
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 91000
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 31
BUGCHECK_P2: ffff820bde544010
BUGCHECK_P3: ffff9a80b3f9e000
BUGCHECK_P4: ffffc90215c22952
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Spotify.exe
STACK_TEXT:
ffffb08c`38ed1528 fffff800`231f7059 : 00000000`0000001a 00000000`00000031 ffff820b`de544010 ffff9a80`b3f9e000 : nt!KeBugCheckEx
ffffb08c`38ed1530 fffff800`230e06f0 : ffffc902`15c22010 00000000`0000001e ffff9a80`b3f9e000 00000000`00000000 : nt!MiApplyCompressedFixups+0x1167f9
ffffb08c`38ed1590 fffff800`22fe8481 : 00000000`0000001e ffff820b`de175080 ffffec00`03c15d20 00000000`639b0000 : nt!MiPerformFixups+0x80
ffffb08c`38ed1630 fffff800`22a93840 : 00000000`00000000 ffff820b`e3fca1d0 ffff820b`e3fca218 00000000`00000018 : nt!MiRelocateImagePfn+0x191
ffffb08c`38ed16a0 fffff800`22a942c8 : ffff820b`00000000 fffff800`00000000 00000000`00000000 ffff820b`de544218 : nt!MiValidateInPage+0x250
ffffb08c`38ed1750 fffff800`22a9471d : 00000000`00000003 ffffb08c`00000000 ffffb08c`38ed1908 fffff800`00000000 : nt!MiWaitForInPageComplete+0x278
ffffb08c`38ed1860 fffff800`22a5881b : 00000000`c0033333 00000000`00000001 00000000`739ce820 00000000`0d27d000 : nt!MiIssueHardFault+0x1ad
ffffb08c`38ed1960 fffff800`22bd041e : ffff820b`de175080 00000000`00000000 00000000`0024e000 00000000`00000000 : nt!MmAccessFault+0x40b
ffffb08c`38ed1b00 00000000`739ce820 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0720d3e4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x739ce820
SYMBOL_NAME: nt!MiApplyCompressedFixups+1167f9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.1016
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1167f9
FAILURE_BUCKET_ID: 0x1a_31_nt!MiApplyCompressedFixups
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c331f2d1-f573-4955-bed6-0e48314e3a31}
Followup: MachineOwner
---------
0: kd> lm
start end module name
fffff409`4ac00000 fffff409`4afa2000 win32kfull (deferred)
fffff409`4b200000 fffff409`4b28c000 win32k # (pdb symbols) C:\ProgramData\Dbg\sym\win32k.pdb\F8FDF1ED06F162C3E2A9AA5BCAAEC6971\win32k.pdb
fffff409`4bc90000 fffff409`4bf36000 win32kbase (deferred)
fffff409`4bf40000 fffff409`4bf88000 cdd (deferred)
fffff800`2295c000 fffff800`22a00000 hal (deferred)
fffff800`22a00000 fffff800`234b7000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\512C583E636270A8A26A461F4B383A091\ntkrnlmp.pdb
fffff800`26800000 fffff800`2680b000 kd (deferred)
fffff800`26810000 fffff800`26832000 mcupdate_AuthenticAMD (deferred)
fffff800`26840000 fffff800`26851000 werkernel (deferred)
fffff800`26860000 fffff800`2688a000 ksecdd (deferred)
fffff800`26890000 fffff800`268f0000 msrpc (deferred)
fffff800`26900000 fffff800`26927000 tm (deferred)
fffff800`26930000 fffff800`26998000 CLFS (deferred)
fffff800`269a0000 fffff800`269ba000 PSHED (deferred)
fffff800`269c0000 fffff800`269cb000 BOOTVID (deferred)
fffff800`269d0000 fffff800`26ad5000 clipsp (deferred)
fffff800`26ae0000 fffff800`26b51000 FLTMGR (deferred)
fffff800`26b60000 fffff800`26b6e000 cmimcext (deferred)
fffff800`26b70000 fffff800`26b7c000 ntosext (deferred)
fffff800`26b80000 fffff800`26c5d000 CI (deferred)
fffff800`26c60000 fffff800`26d1c000 cng (deferred)
fffff800`26d20000 fffff800`26df5000 Wdf01000 (deferred)
fffff800`26e00000 fffff800`26e13000 WDFLDR (deferred)
fffff800`26e20000 fffff800`26e2f000 SleepStudyHelper (deferred)
fffff800`26e30000 fffff800`26e40000 WppRecorder (deferred)
fffff800`26e50000 fffff800`26e75000 acpiex (deferred)
fffff800`26e80000 fffff800`26ec8000 mssecflt (deferred)
fffff800`26ed0000 fffff800`26eea000 SgrmAgent (deferred)
fffff800`26ef0000 fffff800`26fbc000 ACPI (deferred)
fffff800`26fc0000 fffff800`26fcc000 WMILIB (deferred)
fffff800`26ff0000 fffff800`26ffb000 WindowsTrustedRTProxy (deferred)
fffff800`27000000 fffff800`2705b000 intelpep (deferred)
fffff800`27060000 fffff800`27077000 WindowsTrustedRT (deferred)
fffff800`27080000 fffff800`27095000 pcw (deferred)
fffff800`270a0000 fffff800`270ab000 msisadrv (deferred)
fffff800`270b0000 fffff800`2711f000 pci (deferred)
fffff800`27120000 fffff800`27133000 vdrvroot (deferred)
fffff800`27140000 fffff800`27173000 pdc (deferred)
fffff800`27180000 fffff800`27199000 CEA (deferred)
fffff800`271a0000 fffff800`271d0000 partmgr (deferred)
fffff800`271e0000 fffff800`27285000 spaceport (deferred)
fffff800`27290000 fffff800`272aa000 volmgr (deferred)
fffff800`272b0000 fffff800`27313000 volmgrx (deferred)
fffff800`27320000 fffff800`2733f000 mountmgr (deferred)
fffff800`27340000 fffff800`2736e000 storahci (deferred)
fffff800`27370000 fffff800`27412000 storport (deferred)
fffff800`27420000 fffff800`2743b000 EhStorClass (deferred)
fffff800`27440000 fffff800`2745a000 fileinfo (deferred)
fffff800`27460000 fffff800`2749d000 Wof (deferred)
fffff800`274a0000 fffff800`2750c000 WdFilter (deferred)
fffff800`27510000 fffff800`277ad000 Ntfs (deferred)
fffff800`277b0000 fffff800`277bd000 Fs_Rec (deferred)
fffff800`277c0000 fffff800`277f2000 ksecpkg (deferred)
fffff800`27800000 fffff800`27972000 ndis (deferred)
fffff800`27980000 fffff800`27a14000 NETIO (deferred)
fffff800`27a20000 fffff800`27a5c000 amdpsp (deferred)
fffff800`27a60000 fffff800`27d49000 tcpip (deferred)
fffff800`27d50000 fffff800`27dca000 fwpkclnt (deferred)
fffff800`27dd0000 fffff800`27e00000 wfplwfs (deferred)
fffff800`27e10000 fffff800`27ed9000 fvevol (deferred)
fffff800`27ee0000 fffff800`27eeb000 volume (deferred)
fffff800`27ef0000 fffff800`27f5d000 volsnap (deferred)
fffff800`27f60000 fffff800`27fae000 rdyboost (deferred)
fffff800`27fb0000 fffff800`27fd5000 mup (deferred)
fffff800`27fe0000 fffff800`27ff2000 iorate (deferred)
fffff800`28020000 fffff800`2803c000 disk (deferred)
fffff800`28040000 fffff800`280ab000 CLASSPNP (deferred)
fffff800`308c0000 fffff800`308d0000 TDI (deferred)
fffff800`308e0000 fffff800`30939000 netbt (deferred)
fffff800`30940000 fffff800`30953000 afunix (deferred)
fffff800`309e0000 fffff800`309fd000 crashdmp (deferred)
fffff800`31000000 fffff800`31371000 dxgkrnl (deferred)
fffff800`31380000 fffff800`31396000 watchdog (deferred)
fffff800`313a0000 fffff800`318bf000 vgk (deferred)
fffff800`318c0000 fffff800`318f0000 cdrom (deferred)
fffff800`31900000 fffff800`31915000 filecrypt (deferred)
fffff800`31920000 fffff800`3192e000 tbs (deferred)
fffff800`31930000 fffff800`3193a000 Null (deferred)
fffff800`31940000 fffff800`3194a000 Beep (deferred)
fffff800`31950000 fffff800`31966000 BasicDisplay (deferred)
fffff800`31970000 fffff800`31981000 BasicRender (deferred)
fffff800`31990000 fffff800`319ac000 Npfs (deferred)
fffff800`319b0000 fffff800`319c1000 Msfs (deferred)
fffff800`319d0000 fffff800`319f6000 tdx (deferred)
fffff800`31a00000 fffff800`31a7b000 rdbss (deferred)
fffff800`31a80000 fffff800`31b14000 csc (deferred)
fffff800`31b20000 fffff800`31b32000 nsiproxy (deferred)
fffff800`31b40000 fffff800`31b4d000 npsvctrig (deferred)
fffff800`31b50000 fffff800`31b60000 mssmbios (deferred)
fffff800`31b70000 fffff800`31b81000 MpKslDrv (deferred)
fffff800`31b90000 fffff800`31b9a000 gpuenergydrv (deferred)
fffff800`31ba0000 fffff800`31bcc000 dfsc (deferred)
fffff800`31bf0000 fffff800`31c5b000 fastfat (deferred)
fffff800`31c60000 fffff800`31c76000 bam (deferred)
fffff800`31c80000 fffff800`31ccf000 ahcache (deferred)
fffff800`31cd0000 fffff800`31d5c000 Vid (deferred)
fffff800`31d60000 fffff800`31d7f000 winhvr (deferred)
fffff800`31d80000 fffff800`31d91000 CompositeBus (deferred)
fffff800`31da0000 fffff800`31dad000 kdnic (deferred)
fffff800`31db0000 fffff800`31dc5000 umbus (deferred)
fffff800`322a0000 fffff800`32347000 afd (deferred)
fffff800`32350000 fffff800`3236a000 vwififlt (deferred)
fffff800`32370000 fffff800`3239b000 pacer (deferred)
fffff800`323a0000 fffff800`323b4000 netbios (deferred)
fffff800`32e00000 fffff800`32e77000 cldflt (deferred)
fffff800`32e80000 fffff800`32e9a000 storqosflt (deferred)
fffff800`32ea0000 fffff800`32eb8000 lltdio (deferred)
fffff800`32ec0000 fffff800`32ed9000 mslldp (deferred)
fffff800`32ee0000 fffff800`32efb000 rspndr (deferred)
fffff800`32f00000 fffff800`32f1d000 wanarp (deferred)
fffff800`32f20000 fffff800`32fd2000 nwifi (deferred)
fffff800`32fe0000 fffff800`32ff8000 ndisuio (deferred)
fffff800`33000000 fffff800`33038000 winquic (deferred)
fffff800`33040000 fffff800`33065000 bowser (deferred)
fffff800`33070000 fffff800`3308a000 mpsdrv (deferred)
fffff800`33090000 fffff800`330a4000 mmcss (deferred)
fffff800`330b0000 fffff800`3318a000 dxgmms2 (deferred)
fffff800`33190000 fffff800`331ba000 luafv (deferred)
fffff800`331c0000 fffff800`331f7000 wcifs (deferred)
fffff800`33200000 fffff800`33245000 mrxsmb20 (deferred)
fffff800`33250000 fffff800`33a53000 rtwlanu (deferred)
fffff800`33a60000 fffff800`33b4a000 wdiwifi (deferred)
fffff800`33b50000 fffff800`33b5e000 vwifibus (deferred)
fffff800`33b60000 fffff800`33b97000 usbaudio (deferred)
fffff800`33ba0000 fffff800`33bf3000 srvnet (deferred)
fffff800`33e00000 fffff800`33e67000 portcls (deferred)
fffff800`33e70000 fffff800`33e91000 drmk (deferred)
fffff800`33ea0000 fffff800`33f18000 ks (deferred)
fffff800`33f20000 fffff800`33fa9000 USBXHCI (deferred)
fffff800`33fb0000 fffff800`33ff1000 ucx01000 (deferred)
fffff800`34000000 fffff800`340a6000 rt640x64 (deferred)
fffff800`340b0000 fffff800`340bb000 AMDPCIDev (deferred)
fffff800`340c0000 fffff800`340dc000 serial (deferred)
fffff800`340e0000 fffff800`340ef000 serenum (deferred)
fffff800`340f0000 fffff800`340fd000 amdgpio2 (deferred)
fffff800`34100000 fffff800`34130000 msgpioclx (deferred)
fffff800`34140000 fffff800`3414c000 wmiacpi (deferred)
fffff800`34150000 fffff800`3418a000 amdppm (deferred)
fffff800`34190000 fffff800`3419a000 amdgpio3 (deferred)
fffff800`341a0000 fffff800`341ae000 UEFI (deferred)
fffff800`341b0000 fffff800`341c1000 nvvad64v (deferred)
fffff800`341d0000 fffff800`341df000 ksthunk (deferred)
fffff800`341e0000 fffff800`341ed000 NvModuleTracker (deferred)
fffff800`341f0000 fffff800`34200000 nvvhci (deferred)
fffff800`34210000 fffff800`3421d000 NdisVirtualBus (deferred)
fffff800`34220000 fffff800`3422c000 swenum (deferred)
fffff800`34230000 fffff800`3423e000 rdpbus (deferred)
fffff800`34240000 fffff800`342e0000 UsbHub3 (deferred)
fffff800`342f0000 fffff800`342fe000 USBD (deferred)
fffff800`34300000 fffff800`34338000 nvhda64v (deferred)
fffff800`34340000 fffff800`343ae000 HdAudio (deferred)
fffff800`343b0000 fffff800`343e3000 usbccgp (deferred)
fffff800`343f0000 fffff800`34402000 hidusb (deferred)
fffff800`34410000 fffff800`3444b000 HIDCLASS (deferred)
fffff800`34450000 fffff800`34463000 HIDPARSE (deferred)
fffff800`34470000 fffff800`34480000 mouhid (deferred)
fffff800`34490000 fffff800`344a3000 mouclass (deferred)
fffff800`344b0000 fffff800`344c1000 kbdhid (deferred)
fffff800`344d0000 fffff800`344e4000 kbdclass (deferred)
fffff800`344f0000 fffff800`34634000 HTTP (deferred)
fffff800`34640000 fffff800`346cf000 mrxsmb (deferred)
fffff800`346d0000 fffff800`346f7000 Ndu (deferred)
fffff800`34700000 fffff800`347c5000 srv2 (deferred)
fffff800`347d0000 fffff800`348a6000 peauth (deferred)
fffff800`348b0000 fffff800`348c4000 tcpipreg (deferred)
fffff800`348d0000 fffff800`348e6000 WdNisDrv (deferred)
fffff800`348f0000 fffff800`34908000 monitor (deferred)
fffff800`34910000 fffff800`3492d000 rassstp (deferred)
fffff800`34930000 fffff800`34971000 NDProxy (deferred)
fffff800`34980000 fffff800`34993000 condrv (deferred)
fffff800`349a0000 fffff800`349c7000 AgileVpn (deferred)
fffff800`349e0000 fffff800`349ee000 dump_diskdump (deferred)
fffff800`34a20000 fffff800`34a4e000 dump_storahci (deferred)
fffff800`34a70000 fffff800`34a8d000 dump_dumpfve (deferred)
fffff800`34a90000 fffff800`34aa3000 vwifimp (deferred)
fffff800`34ab0000 fffff800`34ad2000 rasl2tp (deferred)
fffff800`34ae0000 fffff800`34b00000 raspptp (deferred)
fffff800`34b10000 fffff800`34b2c000 raspppoe (deferred)
fffff800`34b30000 fffff800`34b3f000 ndistapi (deferred)
fffff800`34b40000 fffff800`34b7a000 ndiswan (deferred)
fffff800`34b90000 fffff800`36393000 nvlddmkm (deferred)
fffff800`363a0000 fffff800`363c2000 HDAudBus (deferred)
fffff800`363d0000 fffff800`363f1000 bindflt (deferred)
Unloaded modules:
fffff800`30810000 fffff800`3081f000 dump_storpor
fffff800`30850000 fffff800`3087f000 dump_storahc
fffff800`308a0000 fffff800`308be000 dump_dumpfve
fffff800`31bd0000 fffff800`31bee000 dam.sys
fffff800`26fd0000 fffff800`26fe1000 WdBoot.sys
fffff800`28000000 fffff800`28011000 hwpolicy.sys
0: kd> !sysinfo machineid [-csv [-noheaders]]
2,8,0,2446,5,14,255,255,American Megatrends Inc.,2.GQ,12/02/2019,Micro-Star International Co., Ltd,MS-7B38,To be filled by O.E.M.,1.0,To be filled by O.E.M.,Micro-Star International Co., Ltd,B350M PRO-VD PLUS (MS-7B38),1.0
Kaldırdım.Yani Valorant anti-cheat yazılımını kaldırınız. Kaldırabiliyorsanız.
Skype ve Spotify’ı kaldırdım RAM 1.5 saattir test oluyor. Suan 4/4 herhangi bir hata yok bitince daha detaylı yazacağım.Spotify kullanıyorsunuz. Mavi ekran hatanızın birinde sorun oradan oluşmuş. Spotify ve skype uygulamalarından kurtulup birde öyle deneyin. Diğerlerine baktığımda ise RAM kısmınıda test etmeniz gerektiğini düşünüyorum. Memtest86 ile sistemi boot edin testi gerçekleştirip sonucunu bizimle paylaşırsanız bellekler hakkında bilgiye de ulaşmış oluruz.
Kaldırdım Vanguard’ı. Bios güncelleyeceğim ayrıca RAM’i memtestten sonra deneyeceğim.
- RAM testi gerçekleştirin Memtest86 üzerinden. Ayrıyeten Windows Memory Diagnostic üzerinden de test yapın.
- Vanguard kaldırın.
- BIOS güncellemesi yapın.
MSI Global - The Leading Brand in High-end Gaming & Professional Creation
As a world leading gaming brand, MSI is the most trusted name in gaming and eSports. We stand by our principles of breakthroughs in design, and roll out the amazing gaming gear like motherboards, graphics cards, laptops and desktops.www.msi.com
Kod:Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\gahra\Desktop\ss\090520-22203-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 18362 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202 Machine Name: Kernel base = 0xfffff800`22a00000 PsLoadedModuleList = 0xfffff800`22e480f0 Debug session time: Sat Sep 5 12:17:20.426 2020 (UTC + 2:00) System Uptime: 0 days 0:02:11.163 Loading Kernel Symbols ............................................................... ................................................................ ....................................................... Loading User Symbols Loading unloaded module list ...... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff800`22bc23c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb08c`38ed1530=000000000000001a 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000000031, The subtype of the bugcheck. Arg2: ffff820bde544010 Arg3: ffff9a80b3f9e000 Arg4: ffffc90215c22952 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 16874 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-8S1E2KF Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 91000 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: 19h1_release Key : WER.OS.Timestamp Value: 2019-03-18T12:02:00Z Key : WER.OS.Version Value: 10.0.18362.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 31 BUGCHECK_P2: ffff820bde544010 BUGCHECK_P3: ffff9a80b3f9e000 BUGCHECK_P4: ffffc90215c22952 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Spotify.exe STACK_TEXT: ffffb08c`38ed1528 fffff800`231f7059 : 00000000`0000001a 00000000`00000031 ffff820b`de544010 ffff9a80`b3f9e000 : nt!KeBugCheckEx ffffb08c`38ed1530 fffff800`230e06f0 : ffffc902`15c22010 00000000`0000001e ffff9a80`b3f9e000 00000000`00000000 : nt!MiApplyCompressedFixups+0x1167f9 ffffb08c`38ed1590 fffff800`22fe8481 : 00000000`0000001e ffff820b`de175080 ffffec00`03c15d20 00000000`639b0000 : nt!MiPerformFixups+0x80 ffffb08c`38ed1630 fffff800`22a93840 : 00000000`00000000 ffff820b`e3fca1d0 ffff820b`e3fca218 00000000`00000018 : nt!MiRelocateImagePfn+0x191 ffffb08c`38ed16a0 fffff800`22a942c8 : ffff820b`00000000 fffff800`00000000 00000000`00000000 ffff820b`de544218 : nt!MiValidateInPage+0x250 ffffb08c`38ed1750 fffff800`22a9471d : 00000000`00000003 ffffb08c`00000000 ffffb08c`38ed1908 fffff800`00000000 : nt!MiWaitForInPageComplete+0x278 ffffb08c`38ed1860 fffff800`22a5881b : 00000000`c0033333 00000000`00000001 00000000`739ce820 00000000`0d27d000 : nt!MiIssueHardFault+0x1ad ffffb08c`38ed1960 fffff800`22bd041e : ffff820b`de175080 00000000`00000000 00000000`0024e000 00000000`00000000 : nt!MmAccessFault+0x40b ffffb08c`38ed1b00 00000000`739ce820 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e 00000000`0720d3e4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x739ce820 SYMBOL_NAME: nt!MiApplyCompressedFixups+1167f9 MODULE_NAME: nt IMAGE_VERSION: 10.0.18362.1016 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 1167f9 FAILURE_BUCKET_ID: 0x1a_31_nt!MiApplyCompressedFixups OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c331f2d1-f573-4955-bed6-0e48314e3a31} Followup: MachineOwner --------- 0: kd> lm start end module name fffff409`4ac00000 fffff409`4afa2000 win32kfull (deferred) fffff409`4b200000 fffff409`4b28c000 win32k # (pdb symbols) C:\ProgramData\Dbg\sym\win32k.pdb\F8FDF1ED06F162C3E2A9AA5BCAAEC6971\win32k.pdb fffff409`4bc90000 fffff409`4bf36000 win32kbase (deferred) fffff409`4bf40000 fffff409`4bf88000 cdd (deferred) fffff800`2295c000 fffff800`22a00000 hal (deferred) fffff800`22a00000 fffff800`234b7000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\512C583E636270A8A26A461F4B383A091\ntkrnlmp.pdb fffff800`26800000 fffff800`2680b000 kd (deferred) fffff800`26810000 fffff800`26832000 mcupdate_AuthenticAMD (deferred) fffff800`26840000 fffff800`26851000 werkernel (deferred) fffff800`26860000 fffff800`2688a000 ksecdd (deferred) fffff800`26890000 fffff800`268f0000 msrpc (deferred) fffff800`26900000 fffff800`26927000 tm (deferred) fffff800`26930000 fffff800`26998000 CLFS (deferred) fffff800`269a0000 fffff800`269ba000 PSHED (deferred) fffff800`269c0000 fffff800`269cb000 BOOTVID (deferred) fffff800`269d0000 fffff800`26ad5000 clipsp (deferred) fffff800`26ae0000 fffff800`26b51000 FLTMGR (deferred) fffff800`26b60000 fffff800`26b6e000 cmimcext (deferred) fffff800`26b70000 fffff800`26b7c000 ntosext (deferred) fffff800`26b80000 fffff800`26c5d000 CI (deferred) fffff800`26c60000 fffff800`26d1c000 cng (deferred) fffff800`26d20000 fffff800`26df5000 Wdf01000 (deferred) fffff800`26e00000 fffff800`26e13000 WDFLDR (deferred) fffff800`26e20000 fffff800`26e2f000 SleepStudyHelper (deferred) fffff800`26e30000 fffff800`26e40000 WppRecorder (deferred) fffff800`26e50000 fffff800`26e75000 acpiex (deferred) fffff800`26e80000 fffff800`26ec8000 mssecflt (deferred) fffff800`26ed0000 fffff800`26eea000 SgrmAgent (deferred) fffff800`26ef0000 fffff800`26fbc000 ACPI (deferred) fffff800`26fc0000 fffff800`26fcc000 WMILIB (deferred) fffff800`26ff0000 fffff800`26ffb000 WindowsTrustedRTProxy (deferred) fffff800`27000000 fffff800`2705b000 intelpep (deferred) fffff800`27060000 fffff800`27077000 WindowsTrustedRT (deferred) fffff800`27080000 fffff800`27095000 pcw (deferred) fffff800`270a0000 fffff800`270ab000 msisadrv (deferred) fffff800`270b0000 fffff800`2711f000 pci (deferred) fffff800`27120000 fffff800`27133000 vdrvroot (deferred) fffff800`27140000 fffff800`27173000 pdc (deferred) fffff800`27180000 fffff800`27199000 CEA (deferred) fffff800`271a0000 fffff800`271d0000 partmgr (deferred) fffff800`271e0000 fffff800`27285000 spaceport (deferred) fffff800`27290000 fffff800`272aa000 volmgr (deferred) fffff800`272b0000 fffff800`27313000 volmgrx (deferred) fffff800`27320000 fffff800`2733f000 mountmgr (deferred) fffff800`27340000 fffff800`2736e000 storahci (deferred) fffff800`27370000 fffff800`27412000 storport (deferred) fffff800`27420000 fffff800`2743b000 EhStorClass (deferred) fffff800`27440000 fffff800`2745a000 fileinfo (deferred) fffff800`27460000 fffff800`2749d000 Wof (deferred) fffff800`274a0000 fffff800`2750c000 WdFilter (deferred) fffff800`27510000 fffff800`277ad000 Ntfs (deferred) fffff800`277b0000 fffff800`277bd000 Fs_Rec (deferred) fffff800`277c0000 fffff800`277f2000 ksecpkg (deferred) fffff800`27800000 fffff800`27972000 ndis (deferred) fffff800`27980000 fffff800`27a14000 NETIO (deferred) fffff800`27a20000 fffff800`27a5c000 amdpsp (deferred) fffff800`27a60000 fffff800`27d49000 tcpip (deferred) fffff800`27d50000 fffff800`27dca000 fwpkclnt (deferred) fffff800`27dd0000 fffff800`27e00000 wfplwfs (deferred) fffff800`27e10000 fffff800`27ed9000 fvevol (deferred) fffff800`27ee0000 fffff800`27eeb000 volume (deferred) fffff800`27ef0000 fffff800`27f5d000 volsnap (deferred) fffff800`27f60000 fffff800`27fae000 rdyboost (deferred) fffff800`27fb0000 fffff800`27fd5000 mup (deferred) fffff800`27fe0000 fffff800`27ff2000 iorate (deferred) fffff800`28020000 fffff800`2803c000 disk (deferred) fffff800`28040000 fffff800`280ab000 CLASSPNP (deferred) fffff800`308c0000 fffff800`308d0000 TDI (deferred) fffff800`308e0000 fffff800`30939000 netbt (deferred) fffff800`30940000 fffff800`30953000 afunix (deferred) fffff800`309e0000 fffff800`309fd000 crashdmp (deferred) fffff800`31000000 fffff800`31371000 dxgkrnl (deferred) fffff800`31380000 fffff800`31396000 watchdog (deferred) fffff800`313a0000 fffff800`318bf000 vgk (deferred) fffff800`318c0000 fffff800`318f0000 cdrom (deferred) fffff800`31900000 fffff800`31915000 filecrypt (deferred) fffff800`31920000 fffff800`3192e000 tbs (deferred) fffff800`31930000 fffff800`3193a000 Null (deferred) fffff800`31940000 fffff800`3194a000 Beep (deferred) fffff800`31950000 fffff800`31966000 BasicDisplay (deferred) fffff800`31970000 fffff800`31981000 BasicRender (deferred) fffff800`31990000 fffff800`319ac000 Npfs (deferred) fffff800`319b0000 fffff800`319c1000 Msfs (deferred) fffff800`319d0000 fffff800`319f6000 tdx (deferred) fffff800`31a00000 fffff800`31a7b000 rdbss (deferred) fffff800`31a80000 fffff800`31b14000 csc (deferred) fffff800`31b20000 fffff800`31b32000 nsiproxy (deferred) fffff800`31b40000 fffff800`31b4d000 npsvctrig (deferred) fffff800`31b50000 fffff800`31b60000 mssmbios (deferred) fffff800`31b70000 fffff800`31b81000 MpKslDrv (deferred) fffff800`31b90000 fffff800`31b9a000 gpuenergydrv (deferred) fffff800`31ba0000 fffff800`31bcc000 dfsc (deferred) fffff800`31bf0000 fffff800`31c5b000 fastfat (deferred) fffff800`31c60000 fffff800`31c76000 bam (deferred) fffff800`31c80000 fffff800`31ccf000 ahcache (deferred) fffff800`31cd0000 fffff800`31d5c000 Vid (deferred) fffff800`31d60000 fffff800`31d7f000 winhvr (deferred) fffff800`31d80000 fffff800`31d91000 CompositeBus (deferred) fffff800`31da0000 fffff800`31dad000 kdnic (deferred) fffff800`31db0000 fffff800`31dc5000 umbus (deferred) fffff800`322a0000 fffff800`32347000 afd (deferred) fffff800`32350000 fffff800`3236a000 vwififlt (deferred) fffff800`32370000 fffff800`3239b000 pacer (deferred) fffff800`323a0000 fffff800`323b4000 netbios (deferred) fffff800`32e00000 fffff800`32e77000 cldflt (deferred) fffff800`32e80000 fffff800`32e9a000 storqosflt (deferred) fffff800`32ea0000 fffff800`32eb8000 lltdio (deferred) fffff800`32ec0000 fffff800`32ed9000 mslldp (deferred) fffff800`32ee0000 fffff800`32efb000 rspndr (deferred) fffff800`32f00000 fffff800`32f1d000 wanarp (deferred) fffff800`32f20000 fffff800`32fd2000 nwifi (deferred) fffff800`32fe0000 fffff800`32ff8000 ndisuio (deferred) fffff800`33000000 fffff800`33038000 winquic (deferred) fffff800`33040000 fffff800`33065000 bowser (deferred) fffff800`33070000 fffff800`3308a000 mpsdrv (deferred) fffff800`33090000 fffff800`330a4000 mmcss (deferred) fffff800`330b0000 fffff800`3318a000 dxgmms2 (deferred) fffff800`33190000 fffff800`331ba000 luafv (deferred) fffff800`331c0000 fffff800`331f7000 wcifs (deferred) fffff800`33200000 fffff800`33245000 mrxsmb20 (deferred) fffff800`33250000 fffff800`33a53000 rtwlanu (deferred) fffff800`33a60000 fffff800`33b4a000 wdiwifi (deferred) fffff800`33b50000 fffff800`33b5e000 vwifibus (deferred) fffff800`33b60000 fffff800`33b97000 usbaudio (deferred) fffff800`33ba0000 fffff800`33bf3000 srvnet (deferred) fffff800`33e00000 fffff800`33e67000 portcls (deferred) fffff800`33e70000 fffff800`33e91000 drmk (deferred) fffff800`33ea0000 fffff800`33f18000 ks (deferred) fffff800`33f20000 fffff800`33fa9000 USBXHCI (deferred) fffff800`33fb0000 fffff800`33ff1000 ucx01000 (deferred) fffff800`34000000 fffff800`340a6000 rt640x64 (deferred) fffff800`340b0000 fffff800`340bb000 AMDPCIDev (deferred) fffff800`340c0000 fffff800`340dc000 serial (deferred) fffff800`340e0000 fffff800`340ef000 serenum (deferred) fffff800`340f0000 fffff800`340fd000 amdgpio2 (deferred) fffff800`34100000 fffff800`34130000 msgpioclx (deferred) fffff800`34140000 fffff800`3414c000 wmiacpi (deferred) fffff800`34150000 fffff800`3418a000 amdppm (deferred) fffff800`34190000 fffff800`3419a000 amdgpio3 (deferred) fffff800`341a0000 fffff800`341ae000 UEFI (deferred) fffff800`341b0000 fffff800`341c1000 nvvad64v (deferred) fffff800`341d0000 fffff800`341df000 ksthunk (deferred) fffff800`341e0000 fffff800`341ed000 NvModuleTracker (deferred) fffff800`341f0000 fffff800`34200000 nvvhci (deferred) fffff800`34210000 fffff800`3421d000 NdisVirtualBus (deferred) fffff800`34220000 fffff800`3422c000 swenum (deferred) fffff800`34230000 fffff800`3423e000 rdpbus (deferred) fffff800`34240000 fffff800`342e0000 UsbHub3 (deferred) fffff800`342f0000 fffff800`342fe000 USBD (deferred) fffff800`34300000 fffff800`34338000 nvhda64v (deferred) fffff800`34340000 fffff800`343ae000 HdAudio (deferred) fffff800`343b0000 fffff800`343e3000 usbccgp (deferred) fffff800`343f0000 fffff800`34402000 hidusb (deferred) fffff800`34410000 fffff800`3444b000 HIDCLASS (deferred) fffff800`34450000 fffff800`34463000 HIDPARSE (deferred) fffff800`34470000 fffff800`34480000 mouhid (deferred) fffff800`34490000 fffff800`344a3000 mouclass (deferred) fffff800`344b0000 fffff800`344c1000 kbdhid (deferred) fffff800`344d0000 fffff800`344e4000 kbdclass (deferred) fffff800`344f0000 fffff800`34634000 HTTP (deferred) fffff800`34640000 fffff800`346cf000 mrxsmb (deferred) fffff800`346d0000 fffff800`346f7000 Ndu (deferred) fffff800`34700000 fffff800`347c5000 srv2 (deferred) fffff800`347d0000 fffff800`348a6000 peauth (deferred) fffff800`348b0000 fffff800`348c4000 tcpipreg (deferred) fffff800`348d0000 fffff800`348e6000 WdNisDrv (deferred) fffff800`348f0000 fffff800`34908000 monitor (deferred) fffff800`34910000 fffff800`3492d000 rassstp (deferred) fffff800`34930000 fffff800`34971000 NDProxy (deferred) fffff800`34980000 fffff800`34993000 condrv (deferred) fffff800`349a0000 fffff800`349c7000 AgileVpn (deferred) fffff800`349e0000 fffff800`349ee000 dump_diskdump (deferred) fffff800`34a20000 fffff800`34a4e000 dump_storahci (deferred) fffff800`34a70000 fffff800`34a8d000 dump_dumpfve (deferred) fffff800`34a90000 fffff800`34aa3000 vwifimp (deferred) fffff800`34ab0000 fffff800`34ad2000 rasl2tp (deferred) fffff800`34ae0000 fffff800`34b00000 raspptp (deferred) fffff800`34b10000 fffff800`34b2c000 raspppoe (deferred) fffff800`34b30000 fffff800`34b3f000 ndistapi (deferred) fffff800`34b40000 fffff800`34b7a000 ndiswan (deferred) fffff800`34b90000 fffff800`36393000 nvlddmkm (deferred) fffff800`363a0000 fffff800`363c2000 HDAudBus (deferred) fffff800`363d0000 fffff800`363f1000 bindflt (deferred) Unloaded modules: fffff800`30810000 fffff800`3081f000 dump_storpor fffff800`30850000 fffff800`3087f000 dump_storahc fffff800`308a0000 fffff800`308be000 dump_dumpfve fffff800`31bd0000 fffff800`31bee000 dam.sys fffff800`26fd0000 fffff800`26fe1000 WdBoot.sys fffff800`28000000 fffff800`28011000 hwpolicy.sys 0: kd> !sysinfo machineid [-csv [-noheaders]] 2,8,0,2446,5,14,255,255,American Megatrends Inc.,2.GQ,12/02/2019,Micro-Star International Co., Ltd,MS-7B38,To be filled by O.E.M.,1.0,To be filled by O.E.M.,Micro-Star International Co., Ltd,B350M PRO-VD PLUS (MS-7B38),1.0