minidump klasörünü nasıl oluşturabilirimMinidump dosyası oluşturun ve bu konuya atınız. @MayCrasH @Murat5038
Minidump Dosyalarını Paylaşın
23.06.2025 tarihinde yapılan güncel rehbere aşağıdaki linkten erişebilirsiniz: https://www.technopat.net/sosyal/konu/minidump-nedir-nasil-paylasilir.3817531/ Minidump dosyaları, bilgisayarınız mavi ekran verdiğinde belleğin ufak bir dökümünü barındıran dosyalardır. Bunları analiz ederek mavi...www.technopat.net
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: ffffd900f3ec4158
Arg3: 91000001d6e80005
Arg4: ffffd901050ee2c0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 403
BUGCHECK_P2: ffffd900f3ec4158
BUGCHECK_P3: 91000001d6e80005
BUGCHECK_P4: ffffd901050ee2c0
BUGCHECK_STR: 0x1a_403
CPU_COUNT: 4
CPU_MHZ: c14
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 30
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Microsoft.Photo
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-06-2020 18:31:19.0222
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff803657e9730 to fffff803657c14e0
STACK_TEXT:
fffffb0b`e1f9ea28 fffff803`657e9730 : 00000000`0000001a 00000000`00000403 ffffd900`f3ec4158 91000001`d6e80005 : nt!KeBugCheckEx
fffffb0b`e1f9ea30 fffff803`656b11f7 : 00000000`00000003 fffffb0b`e1f9f180 fffffb0b`e1f9f180 fffffb0b`e1f9f0d0 : nt!MiDeletePteRun+0x1d3490
fffffb0b`e1f9ec50 fffff803`656acd12 : ffffc907`7e04e580 ffffd900`f3ec5000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
fffffb0b`e1f9ec80 fffff803`656acea1 : fffffb0b`e1f9f0d0 ffffd96c`8079f620 00000000`00000000 0a000001`65887867 : nt!MiWalkPageTablesRecursively+0x512
fffffb0b`e1f9ed40 fffff803`656acea1 : fffffb0b`e1f9f0d0 ffffd96c`b6403cf8 00000000`00000000 0a000001`92e85867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffb0b`e1f9ee00 fffff803`656acea1 : fffffb0b`e1f9f0d0 ffffd96c`b65b2018 ffffd96c`00000000 0a000002`034f8867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffb0b`e1f9eec0 fffff803`656ac62c : fffffb0b`e1f9f0d0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffffb0b`e1f9ef80 fffff803`656aaa98 : fffffb0b`e1f9f0d0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffffb0b`e1f9f080 fffff803`656b8bf0 : ffffffff`ffffffff ffffc907`7e04e3f8 fffffb0b`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffffb0b`e1f9f420 fffff803`65bc7a5d : ffffc907`7d621080 ffffc907`7d621080 ffffc907`7561e590 ffffc907`7e04e3f0 : nt!MiDeleteVad+0x860
fffffb0b`e1f9f5e0 fffff803`65bd9e14 : ffffc907`7561e590 ffffc907`7fdc7a40 ffffc907`7d621080 00000000`00000000 : nt!MiUnmapVad+0x49
fffffb0b`e1f9f610 fffff803`65bd98cf : ffffc907`7561e8b0 ffffc907`7561e8b0 ffffc907`7e04e080 fffff803`65a6a3c0 : nt!MiCleanVad+0x30
fffffb0b`e1f9f640 fffff803`65c38771 : ffffffff`00000000 ffffffff`ffffffff fffffb0b`e1f9f801 ffffc907`7e04e080 : nt!MmCleanProcessAddressSpace+0x137
fffffb0b`e1f9f6c0 fffff803`65c5e6d3 : ffffc907`7e04e080 ffffda81`0da4e060 fffffb0b`e1f9f8e9 00000000`00000000 : nt!PspRundownSingleProcess+0x139
fffffb0b`e1f9f740 fffff803`65ccd143 : 00000000`00000001 00000000`00000001 000000a3`2a306000 00000000`00000000 : nt!PspExitThread+0x60b
fffffb0b`e1f9f850 fffff803`6563e551 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
fffffb0b`e1f9f890 fffff803`657c5a60 : 00000000`00000001 fffffb0b`e1f9f950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
fffffb0b`e1f9f950 fffff803`657d2dbf : ffffc907`7d621080 000000a3`2bbff3c8 00000000`00007530 00000000`00001cff : nt!KiInitiateUserApc+0x70
fffffb0b`e1f9fa90 00007ffa`2e939a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000a3`2bbff3a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`2e939a84
THREAD_SHA1_HASH_MOD_FUNC: cf5c972d8494816023066845de37f86a3bfa7253
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 81ac82b94939ed2fe2da690766838295e8f0d74e
THREAD_SHA1_HASH_MOD: a9ca63faa9e43cc61ef524ad38163e6a9ae5c358
FOLLOWUP_IP:
nt!MiDeletePteRun+1d3490
fffff803`657e9730 cc int 3
FAULT_INSTR_CODE: c78b4ccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeletePteRun+1d3490
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1d3490
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
PRIMARY_PROBLEM_CLASS: 0x1a_403_nt!MiDeletePteRun
TARGET_TIME: 2019-12-29T08:51:29.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4340
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_403_nt!mideletepterun
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80027fc89e5, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80027fc89e5
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff800283733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!SwapContext+4a5
fffff800`27fc89e5 c3 ret
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 4
CPU_MHZ: c14
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 30
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-06-2020 18:31:16.0670
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: fffff8002e67c8f8
LAST_CONTROL_TRANSFER: from fffff8002802fda7 to fffff80027fc14e0
STACK_TEXT:
fffff800`2e67c8f8 fffff800`2802fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`27fc89e5 00000000`00000000 : nt!KeBugCheckEx
fffff800`2e67c900 fffff800`27fc2362 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1689d7
fffff800`2e67cfb0 fffff800`27fc2330 : fffff800`27fd3416 00000000`00000001 ffffa886`0223e7c0 00000000`00000001 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffa886`0223dbe8 fffff800`27fd3416 : 00000000`00000001 ffffa886`0223e7c0 00000000`00000001 00000000`00000001 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffa886`0223dbf0 fffff800`27fcf1a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116
ffffa886`0223ddd0 fffff800`27fc89e5 : ffeff800`27fc8266 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x322
ffffa886`0223df68 ffeff800`27fc8266 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SwapContext+0x4a5
ffffa886`0223df70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffeff800`27fc8266
THREAD_SHA1_HASH_MOD_FUNC: bbdc858bba54202f2407b02fd047b4a2666b54ef
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2c0aa6993d12be31889f79c5881d2a355c4a027b
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!SwapContext+4a5
fffff800`27fc89e5 c3 ret
FAULT_INSTR_CODE: cb8b48c3
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: nt!SwapContext+4a5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4a5
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!SwapContext
BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!SwapContext
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_STACKPTR_ERROR_nt!SwapContext
TARGET_TIME: 2020-01-02T10:01:26.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: b11
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_stackptr_error_nt!swapcontext
FAILURE_ID_HASH: {bd591bce-fa9d-a983-0398-0157fd169b8e}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80410e03612, Address of the instruction which caused the bugcheck
Arg3: ffff83826143d3b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80410e03612
BUGCHECK_P3: ffff83826143d3b0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
Ntfs!ReadIndexBuffer+f2
fffff804`10e03612 49397d10 cmp qword ptr [r13+10h],rdi
CONTEXT: ffff83826143d3b0 -- (.cxr 0xffff83826143d3b0)
rax=ffff890a98d31d01 rbx=ffff890a98d31da8 rcx=ffff9d06154e23b9
rdx=0000000000000000 rsi=fff7ae8e562c0018 rdi=0000000000000000
rip=fffff80410e03612 rsp=ffff83826143dda0 rbp=ffff83826143de10
r8=000000000000000f r9=0000000000000000 r10=0000000000000004
r11=0000000000000002 r12=ffff890a98d31da0 r13=fff7ae8e562c0000
r14=0000000000001000 r15=ffff890a990fb170
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
Ntfs!ReadIndexBuffer+0xf2:
fffff804`10e03612 49397d10 cmp qword ptr [r13+10h],rdi ds:002b:fff7ae8e`562c0010=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 4
CPU_MHZ: c14
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 30
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: nvcontainer.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-06-2020 18:31:13.0876
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DEVICE_OBJECT: 0000000000000ba8
LAST_CONTROL_TRANSFER: from fffff80410e03022 to fffff80410e03612
STACK_TEXT:
ffff8382`6143dda0 fffff804`10e03022 : ffff9d06`1ab96ac8 00000000`00000000 ffff890a`98d31cf0 fffff804`00000004 : Ntfs!ReadIndexBuffer+0xf2
ffff8382`6143de50 fffff804`10dfe80e : ffff890a`990fb170 ffffae8e`31fcad00 00000000`00000000 fffff804`00000000 : Ntfs!FindFirstIndexEntry+0x182
ffff8382`6143df10 fffff804`10e0142b : 00000000`00000000 ffff890a`990fb170 ffff9d06`1ab96ac8 ffff9d06`1ab96ac8 : Ntfs!NtfsRestartIndexEnumeration+0x176
ffff8382`6143e1a0 fffff804`10dffb0c : ffff9d06`1ab96ac8 ffff9d06`1f1f4010 ffff9d06`15fd8180 ffff890a`990fb170 : Ntfs!NtfsQueryDirectory+0xecb
ffff8382`6143e400 fffff804`10dffa1e : 00000000`00000000 00000000`00000008 ffff9d06`1f1f4010 00000000`00000000 : Ntfs!NtfsCommonDirectoryControl+0xa4
ffff8382`6143e440 fffff804`0ea31f79 : 00000000`00000000 ffff9d06`1f1f4010 ffff9d06`1ab96ac8 ffff8382`6143e468 : Ntfs!NtfsFsdDirectoryControl+0xbe
ffff8382`6143e4b0 fffff804`102e55d9 : 00000000`00000000 00000000`00000000 ffff9d06`1c7b10f8 ffff890a`96e75bb0 : nt!IofCallDriver+0x59
ffff8382`6143e4f0 fffff804`102e2bee : ffff8382`6143e590 ffff9d06`190759a8 00000000`00000001 ffff9d06`1c7b10f8 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x159
ffff8382`6143e570 fffff804`10c7ef68 : ffff9d06`1c7b1010 00000000`0000027c ffff8382`6143e789 00000000`00000000 : FLTMGR!FltPerformSynchronousIo+0x2ee
ffff8382`6143e610 fffff804`102e4a5d : ffff9d06`1d484548 ffff8382`6143e768 ffff9d06`00000001 00000000`0000003c : Wof!WofPreDirectoryControlCallback+0x288
ffff8382`6143e6e0 fffff804`102e45a0 : ffff8382`6143e8c0 00000000`00000000 ffff9d06`1d2e600c 00000000`00060800 : FLTMGR!FltpPerformPreCallbacks+0x2fd
ffff8382`6143e7f0 fffff804`102e4112 : 00000000`00000000 ffff8382`6143e8c0 ffff9d06`1d2e6010 ffff8382`6143e8d0 : FLTMGR!FltpPassThroughInternal+0x90
ffff8382`6143e820 fffff804`102e3efe : ffff9d06`1dbce080 00000000`00000001 00000000`00000020 00000000`00000001 : FLTMGR!FltpPassThrough+0x162
ffff8382`6143e8a0 fffff804`0ea31f79 : ffff9d06`1d2e6010 00000000`00000004 ffff8382`6143ea60 00000000`00000000 : FLTMGR!FltpDispatch+0x9e
ffff8382`6143e900 fffff804`0efe95e5 : ffff8382`6143eb80 ffff9d06`1d2e6010 00000000`00000001 ffff9d06`1ff44950 : nt!IofCallDriver+0x59
ffff8382`6143e940 fffff804`0f004acf : 00000000`00000ba8 00000000`00000000 00000000`00000000 ffff8382`6143eb80 : nt!IopSynchronousServiceTail+0x1a5
ffff8382`6143e9e0 fffff804`0ebd2d15 : 00000000`000009c8 ffff8382`6143eb80 ffff9d06`1dda4de0 fffff804`0f0b077d : nt!NtQueryDirectoryFileEx+0xbf
ffff8382`6143ea90 00007ff9`7c07e834 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000009f`b1efe5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`7c07e834
THREAD_SHA1_HASH_MOD_FUNC: a84a5d15e2cbcf3fbd2be6ff09739b0da6138956
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 58aeeffb373f31d2a861e2ceca3346c587e2c955
THREAD_SHA1_HASH_MOD: 613dbbc6a918d2074553db4e5eb05ec378e079e0
FOLLOWUP_IP:
Wof!WofPreDirectoryControlCallback+288
fffff804`10c7ef68 0f1f440000 nop dword ptr [rax+rax]
FAULT_INSTR_CODE: 441f0f
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: Wof!WofPreDirectoryControlCallback+288
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Wof
IMAGE_NAME: Wof.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .cxr 0xffff83826143d3b0 ; kb
BUCKET_ID_FUNC_OFFSET: 288
FAILURE_BUCKET_ID: 0x3B_c0000005_Wof!WofPreDirectoryControlCallback
BUCKET_ID: 0x3B_c0000005_Wof!WofPreDirectoryControlCallback
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_Wof!WofPreDirectoryControlCallback
TARGET_TIME: 2020-01-02T10:07:13.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 26b3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_wof!wofpredirectorycontrolcallback
FAILURE_ID_HASH: {c4606a74-b269-5e61-6320-9f10cc3e0751}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8056c7fa0bb, The address that the exception occurred at
Arg3: ffff8b0c38445768, Exception Record Address
Arg4: ffff8b0c38444fb0, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8056c7fa0bb
BUGCHECK_P3: ffff8b0c38445768
BUGCHECK_P4: ffff8b0c38444fb0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ObpRemoveObjectRoutine+5b
fffff805`6c7fa0bb 488b8788000000 mov rax,qword ptr [rdi+88h]
EXCEPTION_RECORD: ffff8b0c38445768 -- (.exr 0xffff8b0c38445768)
ExceptionAddress: fffff8056c7fa0bb (nt!ObpRemoveObjectRoutine+0x000000000000005b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000088
Attempt to read from address 0000000000000088
CONTEXT: ffff8b0c38444fb0 -- (.cxr 0xffff8b0c38444fb0)
rax=0000000000000000 rbx=ffff990eb2fec330 rcx=00000000000000aa
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8056c7fa0bb rsp=ffff8b0c384459a0 rbp=ffffae89ab1799e0
r8=000000000000000f r9=ffffae89b0b8e340 r10=ffffae89b0ec84b0
r11=ffff8b0c38445a10 r12=ffffae89ab179a60 r13=0000000000000001
r14=ffffae89ab1799e0 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210246
nt!ObpRemoveObjectRoutine+0x5b:
fffff805`6c7fa0bb 488b8788000000 mov rax,qword ptr [rdi+88h] ds:002b:00000000`00000088=????????????????
Resetting default scope
CPU_COUNT: 4
CPU_MHZ: c14
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 30
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
nt!ObpRemoveObjectRoutine+5b
fffff805`6c7fa0bb 488b8788000000 mov rax,qword ptr [rdi+88h]
BUGCHECK_STR: AV
READ_ADDRESS: fffff8056c7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000088
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000088
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-06-2020 18:31:11.0189
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8056c2390c4 to fffff8056c7fa0bb
STACK_TEXT:
ffff8b0c`384459a0 fffff805`6c2390c4 : 00000000`00000000 00000000`00000000 ffffae89`ab1799e0 ffff990e`b2fec360 : nt!ObpRemoveObjectRoutine+0x5b
ffff8b0c`38445a00 fffff805`6c28aa73 : ffff8b0c`38445a00 ffff8b0c`38445ae8 ffffae89`ab1799e0 ffff8b0c`38445ae8 : nt!ObfDereferenceObject+0xa4
ffff8b0c`38445a40 fffff805`6c28b940 : 00000000`0000529a ffff8b0c`38445b09 ffffae89`b8d187e0 00000000`00000000 : nt!CcDeleteSharedCacheMap+0x157
ffff8b0c`38445a90 fffff805`6c2bd095 : ffffae89`ab088900 ffffae89`00000000 00000000`0000529a ffff8b0c`3ade7a90 : nt!CcWriteBehindInternal+0x3a0
ffff8b0c`38445b70 fffff805`6c32a7a5 : ffffae89`abde8600 00000000`00000080 ffffae89`ab077040 00000224`bcbbbdfe : nt!ExpWorkerThread+0x105
ffff8b0c`38445c10 fffff805`6c3c8b2a : ffffd681`d3d51180 ffffae89`abde8600 fffff805`6c32a750 73657547`63496d56 : nt!PspSystemThreadStartup+0x55
ffff8b0c`38445c60 00000000`00000000 : ffff8b0c`38446000 ffff8b0c`38440000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: da0edd7bd400f10487369d4d6c75049c64954ec5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 555b579c211d36a1d9bd3fe968f8bdb876ce0152
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FAULT_INSTR_CODE: 88878b48
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpRemoveObjectRoutine+5b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .cxr 0xffff8b0c38444fb0 ; kb
BUCKET_ID_FUNC_OFFSET: 5b
FAILURE_BUCKET_ID: AV_nt!ObpRemoveObjectRoutine
BUCKET_ID: AV_nt!ObpRemoveObjectRoutine
PRIMARY_PROBLEM_CLASS: AV_nt!ObpRemoveObjectRoutine
TARGET_TIME: 2020-01-04T09:13:48.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1c05
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!obpremoveobjectroutine
FAILURE_ID_HASH: {e17dac7a-8c25-c4a4-6b6a-1087fb87207e}
Followup: MachineOwner
---------
RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffff9a0cdaf687a0, Address of resource
Arg2: ffff9a0cd8dec043, Address of thread
Arg3: ffff9a0cdaee9f50, Address of owner table if there is one
Arg4: 0000000000000002
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffff9a0cdaf687a0
BUGCHECK_P2: ffff9a0cd8dec043
BUGCHECK_P3: ffff9a0cdaee9f50
BUGCHECK_P4: 2
CPU_COUNT: 4
CPU_MHZ: c14
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 30
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xE3
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-06-2020 18:31:09.0126
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff800335f5d2f to fffff800335c14e0
STACK_TEXT:
fffffa02`6f844ee8 fffff800`335f5d2f : 00000000`000000e3 ffff9a0c`daf687a0 ffff9a0c`d8dec043 ffff9a0c`daee9f50 : nt!KeBugCheckEx
fffffa02`6f844ef0 fffff800`33501497 : ffff9a0c`0000000e 00000000`00000000 ffff9a0c`d4936af8 ffff9a0c`da2301f0 : nt!ExpReleaseResourceSharedForThreadLite+0x1bf1df
fffffa02`6f844fa0 fffff800`3511e2c9 : ffff9a0c`d4936af8 ffff9a0c`cfa17e40 ffff9a0c`cfe68180 fffff800`3346b53d : nt!ExReleaseResourceForThreadLite+0xe7
fffffa02`6f845000 fffff800`334477d9 : ffff9a0c`d5f0f9a0 ffff9a0c`cfdd0040 ffff9a0c`d5f0f9a0 ffff9a0c`d5f0f9a0 : Ntfs!NtfsMasterIrpAsyncCompletionRoutine+0x219
fffffa02`6f845160 fffff800`334476a7 : ffff9a0c`cfd62060 ffff9a0c`cfd62101 ffff9a0c`d5f0f9a0 ffff9a0c`d5f0fb48 : nt!IopfCompleteRequest+0x119
fffffa02`6f845270 fffff800`35be6e40 : 0000015b`acc2151b ffff9a0c`d62b0ac0 fffffa02`6f8453a0 ffff9a0c`d62b0ac0 : nt!IofCompleteRequest+0x17
fffffa02`6f8452a0 fffff800`334477d9 : ffff9a0c`d963714b 00000000`00000000 732555e1`68744d05 00000000`00000000 : CLASSPNP!TransferPktComplete+0x640
fffffa02`6f8454a0 fffff800`334476a7 : 00000000`01008000 ffff9a0c`cfa21101 ffff9a0c`cfa211b0 ffff8680`63e32fa0 : nt!IopfCompleteRequest+0x119
fffffa02`6f8455b0 fffff800`34f7999d : fffff800`34909980 ffff9a0c`cfa1d260 fffffa02`6f8457b0 00000000`00000000 : nt!IofCompleteRequest+0x17
fffffa02`6f8455e0 fffff800`34f7928a : 00000000`00000000 00000000`00989680 fffffa02`6f8457b0 ffff8680`63e32ef0 : storport!RaidCompleteRequestEx+0x8d
fffffa02`6f8456b0 fffff800`34f8d60c : ffff9a0c`d3d98108 00000000`00000000 00000000`00000000 00000000`00000000 : storport!RaidUnitCompleteRequest+0x5da
fffffa02`6f845850 fffff800`3346ae95 : ffff9a0c`cfac0180 00000000`00000001 fffffa02`6f8458a8 00000000`00000000 : storport!RaidpAdapterRedirectDpcRoutine+0x8c
fffffa02`6f8458f0 fffff800`3346a4ef : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
fffffa02`6f845a30 fffff800`335c5024 : ffffffff`00000000 ffff8680`63942180 ffff8680`63953140 ffff9a0c`d81d9080 : nt!KiRetireDpcList+0x1ef
fffffa02`6f845c60 00000000`00000000 : fffffa02`6f846000 fffffa02`6f840000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84
THREAD_SHA1_HASH_MOD_FUNC: 19f1d0adaf60b1c4cd2620e8b26a8cd66e17ffa1
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8bed40e28526d9d2230eedeef96ee9da399e619e
THREAD_SHA1_HASH_MOD: eb76f151b80048f989eee82c67cf5bd99ef89187
FOLLOWUP_IP:
CLASSPNP!TransferPktComplete+640
fffff800`35be6e40 0f1f440000 nop dword ptr [rax+rax]
FAULT_INSTR_CODE: 441f0f
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: CLASSPNP!TransferPktComplete+640
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: CLASSPNP
IMAGE_NAME: CLASSPNP.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 9ed6e49
IMAGE_VERSION: 10.0.18362.1216
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 640
FAILURE_BUCKET_ID: 0xE3_CLASSPNP!TransferPktComplete
BUCKET_ID: 0xE3_CLASSPNP!TransferPktComplete
PRIMARY_PROBLEM_CLASS: 0xE3_CLASSPNP!TransferPktComplete
TARGET_TIME: 2020-01-06T14:51:38.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1d1c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xe3_classpnp!transferpktcomplete
FAILURE_ID_HASH: {6048cf18-0ef5-4393-3d1d-855a2eb9f6c8}
Followup: MachineOwner
---------
BIOS güncelledimBios u güncelleyin
HD Tune'daki testleri yaptım ikisi de sağlıklı çıktı fakat Memtest86 yapmak için USB sürücümü seçiyorum ve program hata verip USB sürücüme yazmıyor.Windows dosyaların hasarlı temiz kurulum dene.
Fakat emin olmak için şu testleri de yap;
HDtune(Error scan, Health), Memtest86 testi yap, sonuçları fotoğraf şeklinde paylaş.
Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000000403, The subtype of the bugcheck. Arg2: ffffd900f3ec4158 Arg3: 91000001d6e80005 Arg4: ffffd901050ee2c0 Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 403 BUGCHECK_P2: ffffd900f3ec4158 BUGCHECK_P3: 91000001d6e80005 BUGCHECK_P4: ffffd901050ee2c0 BUGCHECK_STR: 0x1a_403 CPU_COUNT: 4 CPU_MHZ: c14 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 15 CPU_MODEL: 30 CPU_STEPPING: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: Microsoft.Photo CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-06-2020 18:31:19.0222 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff803657e9730 to fffff803657c14e0 STACK_TEXT: fffffb0b`e1f9ea28 fffff803`657e9730 : 00000000`0000001a 00000000`00000403 ffffd900`f3ec4158 91000001`d6e80005 : nt!KeBugCheckEx fffffb0b`e1f9ea30 fffff803`656b11f7 : 00000000`00000003 fffffb0b`e1f9f180 fffffb0b`e1f9f180 fffffb0b`e1f9f0d0 : nt!MiDeletePteRun+0x1d3490 fffffb0b`e1f9ec50 fffff803`656acd12 : ffffc907`7e04e580 ffffd900`f3ec5000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77 fffffb0b`e1f9ec80 fffff803`656acea1 : fffffb0b`e1f9f0d0 ffffd96c`8079f620 00000000`00000000 0a000001`65887867 : nt!MiWalkPageTablesRecursively+0x512 fffffb0b`e1f9ed40 fffff803`656acea1 : fffffb0b`e1f9f0d0 ffffd96c`b6403cf8 00000000`00000000 0a000001`92e85867 : nt!MiWalkPageTablesRecursively+0x6a1 fffffb0b`e1f9ee00 fffff803`656acea1 : fffffb0b`e1f9f0d0 ffffd96c`b65b2018 ffffd96c`00000000 0a000002`034f8867 : nt!MiWalkPageTablesRecursively+0x6a1 fffffb0b`e1f9eec0 fffff803`656ac62c : fffffb0b`e1f9f0d0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1 fffffb0b`e1f9ef80 fffff803`656aaa98 : fffffb0b`e1f9f0d0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c fffffb0b`e1f9f080 fffff803`656b8bf0 : ffffffff`ffffffff ffffc907`7e04e3f8 fffffb0b`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268 fffffb0b`e1f9f420 fffff803`65bc7a5d : ffffc907`7d621080 ffffc907`7d621080 ffffc907`7561e590 ffffc907`7e04e3f0 : nt!MiDeleteVad+0x860 fffffb0b`e1f9f5e0 fffff803`65bd9e14 : ffffc907`7561e590 ffffc907`7fdc7a40 ffffc907`7d621080 00000000`00000000 : nt!MiUnmapVad+0x49 fffffb0b`e1f9f610 fffff803`65bd98cf : ffffc907`7561e8b0 ffffc907`7561e8b0 ffffc907`7e04e080 fffff803`65a6a3c0 : nt!MiCleanVad+0x30 fffffb0b`e1f9f640 fffff803`65c38771 : ffffffff`00000000 ffffffff`ffffffff fffffb0b`e1f9f801 ffffc907`7e04e080 : nt!MmCleanProcessAddressSpace+0x137 fffffb0b`e1f9f6c0 fffff803`65c5e6d3 : ffffc907`7e04e080 ffffda81`0da4e060 fffffb0b`e1f9f8e9 00000000`00000000 : nt!PspRundownSingleProcess+0x139 fffffb0b`e1f9f740 fffff803`65ccd143 : 00000000`00000001 00000000`00000001 000000a3`2a306000 00000000`00000000 : nt!PspExitThread+0x60b fffffb0b`e1f9f850 fffff803`6563e551 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33 fffffb0b`e1f9f890 fffff803`657c5a60 : 00000000`00000001 fffffb0b`e1f9f950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481 fffffb0b`e1f9f950 fffff803`657d2dbf : ffffc907`7d621080 000000a3`2bbff3c8 00000000`00007530 00000000`00001cff : nt!KiInitiateUserApc+0x70 fffffb0b`e1f9fa90 00007ffa`2e939a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 000000a3`2bbff3a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`2e939a84 THREAD_SHA1_HASH_MOD_FUNC: cf5c972d8494816023066845de37f86a3bfa7253 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 81ac82b94939ed2fe2da690766838295e8f0d74e THREAD_SHA1_HASH_MOD: a9ca63faa9e43cc61ef524ad38163e6a9ae5c358 FOLLOWUP_IP: nt!MiDeletePteRun+1d3490 fffff803`657e9730 cc int 3 FAULT_INSTR_CODE: c78b4ccc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!MiDeletePteRun+1d3490 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470 IMAGE_VERSION: 10.0.18362.535 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 1d3490 FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun BUCKET_ID: 0x1a_403_nt!MiDeletePteRun PRIMARY_PROBLEM_CLASS: 0x1a_403_nt!MiDeletePteRun TARGET_TIME: 2019-12-29T08:51:29.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 4340 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1a_403_nt!mideletepterun FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80027fc89e5, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff80027fc89e5 BUGCHECK_P3: 0 BUGCHECK_P4: ffffffffffffffff READ_ADDRESS: fffff800283733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffffffffffffffff EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!SwapContext+4a5 fffff800`27fc89e5 c3 ret EXCEPTION_PARAMETER2: ffffffffffffffff BUGCHECK_STR: 0x1E_c0000005_R CPU_COUNT: 4 CPU_MHZ: c14 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 15 CPU_MODEL: 30 CPU_STEPPING: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-06-2020 18:31:16.0670 ANALYSIS_VERSION: 10.0.18362.1 x86fre BAD_STACK_POINTER: fffff8002e67c8f8 LAST_CONTROL_TRANSFER: from fffff8002802fda7 to fffff80027fc14e0 STACK_TEXT: fffff800`2e67c8f8 fffff800`2802fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`27fc89e5 00000000`00000000 : nt!KeBugCheckEx fffff800`2e67c900 fffff800`27fc2362 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1689d7 fffff800`2e67cfb0 fffff800`27fc2330 : fffff800`27fd3416 00000000`00000001 ffffa886`0223e7c0 00000000`00000001 : nt!KxExceptionDispatchOnExceptionStack+0x12 ffffa886`0223dbe8 fffff800`27fd3416 : 00000000`00000001 ffffa886`0223e7c0 00000000`00000001 00000000`00000001 : nt!KiExceptionDispatchOnExceptionStackContinue ffffa886`0223dbf0 fffff800`27fcf1a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116 ffffa886`0223ddd0 fffff800`27fc89e5 : ffeff800`27fc8266 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x322 ffffa886`0223df68 ffeff800`27fc8266 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SwapContext+0x4a5 ffffa886`0223df70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffeff800`27fc8266 THREAD_SHA1_HASH_MOD_FUNC: bbdc858bba54202f2407b02fd047b4a2666b54ef THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2c0aa6993d12be31889f79c5881d2a355c4a027b THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6 FOLLOWUP_IP: nt!SwapContext+4a5 fffff800`27fc89e5 c3 ret FAULT_INSTR_CODE: cb8b48c3 SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: nt!SwapContext+4a5 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470 IMAGE_VERSION: 10.0.18362.535 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 4a5 FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!SwapContext BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!SwapContext PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_STACKPTR_ERROR_nt!SwapContext TARGET_TIME: 2020-01-02T10:01:26.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: b11 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_stackptr_error_nt!swapcontext FAILURE_ID_HASH: {bd591bce-fa9d-a983-0398-0157fd169b8e} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80410e03612, Address of the instruction which caused the bugcheck Arg3: ffff83826143d3b0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80410e03612 BUGCHECK_P3: ffff83826143d3b0 BUGCHECK_P4: 0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: Ntfs!ReadIndexBuffer+f2 fffff804`10e03612 49397d10 cmp qword ptr [r13+10h],rdi CONTEXT: ffff83826143d3b0 -- (.cxr 0xffff83826143d3b0) rax=ffff890a98d31d01 rbx=ffff890a98d31da8 rcx=ffff9d06154e23b9 rdx=0000000000000000 rsi=fff7ae8e562c0018 rdi=0000000000000000 rip=fffff80410e03612 rsp=ffff83826143dda0 rbp=ffff83826143de10 r8=000000000000000f r9=0000000000000000 r10=0000000000000004 r11=0000000000000002 r12=ffff890a98d31da0 r13=fff7ae8e562c0000 r14=0000000000001000 r15=ffff890a990fb170 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 Ntfs!ReadIndexBuffer+0xf2: fffff804`10e03612 49397d10 cmp qword ptr [r13+10h],rdi ds:002b:fff7ae8e`562c0010=???????????????? Resetting default scope BUGCHECK_STR: 0x3B_c0000005 CPU_COUNT: 4 CPU_MHZ: c14 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 15 CPU_MODEL: 30 CPU_STEPPING: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: nvcontainer.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-06-2020 18:31:13.0876 ANALYSIS_VERSION: 10.0.18362.1 x86fre DEVICE_OBJECT: 0000000000000ba8 LAST_CONTROL_TRANSFER: from fffff80410e03022 to fffff80410e03612 STACK_TEXT: ffff8382`6143dda0 fffff804`10e03022 : ffff9d06`1ab96ac8 00000000`00000000 ffff890a`98d31cf0 fffff804`00000004 : Ntfs!ReadIndexBuffer+0xf2 ffff8382`6143de50 fffff804`10dfe80e : ffff890a`990fb170 ffffae8e`31fcad00 00000000`00000000 fffff804`00000000 : Ntfs!FindFirstIndexEntry+0x182 ffff8382`6143df10 fffff804`10e0142b : 00000000`00000000 ffff890a`990fb170 ffff9d06`1ab96ac8 ffff9d06`1ab96ac8 : Ntfs!NtfsRestartIndexEnumeration+0x176 ffff8382`6143e1a0 fffff804`10dffb0c : ffff9d06`1ab96ac8 ffff9d06`1f1f4010 ffff9d06`15fd8180 ffff890a`990fb170 : Ntfs!NtfsQueryDirectory+0xecb ffff8382`6143e400 fffff804`10dffa1e : 00000000`00000000 00000000`00000008 ffff9d06`1f1f4010 00000000`00000000 : Ntfs!NtfsCommonDirectoryControl+0xa4 ffff8382`6143e440 fffff804`0ea31f79 : 00000000`00000000 ffff9d06`1f1f4010 ffff9d06`1ab96ac8 ffff8382`6143e468 : Ntfs!NtfsFsdDirectoryControl+0xbe ffff8382`6143e4b0 fffff804`102e55d9 : 00000000`00000000 00000000`00000000 ffff9d06`1c7b10f8 ffff890a`96e75bb0 : nt!IofCallDriver+0x59 ffff8382`6143e4f0 fffff804`102e2bee : ffff8382`6143e590 ffff9d06`190759a8 00000000`00000001 ffff9d06`1c7b10f8 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x159 ffff8382`6143e570 fffff804`10c7ef68 : ffff9d06`1c7b1010 00000000`0000027c ffff8382`6143e789 00000000`00000000 : FLTMGR!FltPerformSynchronousIo+0x2ee ffff8382`6143e610 fffff804`102e4a5d : ffff9d06`1d484548 ffff8382`6143e768 ffff9d06`00000001 00000000`0000003c : Wof!WofPreDirectoryControlCallback+0x288 ffff8382`6143e6e0 fffff804`102e45a0 : ffff8382`6143e8c0 00000000`00000000 ffff9d06`1d2e600c 00000000`00060800 : FLTMGR!FltpPerformPreCallbacks+0x2fd ffff8382`6143e7f0 fffff804`102e4112 : 00000000`00000000 ffff8382`6143e8c0 ffff9d06`1d2e6010 ffff8382`6143e8d0 : FLTMGR!FltpPassThroughInternal+0x90 ffff8382`6143e820 fffff804`102e3efe : ffff9d06`1dbce080 00000000`00000001 00000000`00000020 00000000`00000001 : FLTMGR!FltpPassThrough+0x162 ffff8382`6143e8a0 fffff804`0ea31f79 : ffff9d06`1d2e6010 00000000`00000004 ffff8382`6143ea60 00000000`00000000 : FLTMGR!FltpDispatch+0x9e ffff8382`6143e900 fffff804`0efe95e5 : ffff8382`6143eb80 ffff9d06`1d2e6010 00000000`00000001 ffff9d06`1ff44950 : nt!IofCallDriver+0x59 ffff8382`6143e940 fffff804`0f004acf : 00000000`00000ba8 00000000`00000000 00000000`00000000 ffff8382`6143eb80 : nt!IopSynchronousServiceTail+0x1a5 ffff8382`6143e9e0 fffff804`0ebd2d15 : 00000000`000009c8 ffff8382`6143eb80 ffff9d06`1dda4de0 fffff804`0f0b077d : nt!NtQueryDirectoryFileEx+0xbf ffff8382`6143ea90 00007ff9`7c07e834 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 0000009f`b1efe5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`7c07e834 THREAD_SHA1_HASH_MOD_FUNC: a84a5d15e2cbcf3fbd2be6ff09739b0da6138956 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 58aeeffb373f31d2a861e2ceca3346c587e2c955 THREAD_SHA1_HASH_MOD: 613dbbc6a918d2074553db4e5eb05ec378e079e0 FOLLOWUP_IP: Wof!WofPreDirectoryControlCallback+288 fffff804`10c7ef68 0f1f440000 nop dword ptr [rax+rax] FAULT_INSTR_CODE: 441f0f SYMBOL_STACK_INDEX: 9 SYMBOL_NAME: Wof!WofPreDirectoryControlCallback+288 FOLLOWUP_NAME: MachineOwner MODULE_NAME: Wof IMAGE_NAME: Wof.sys DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.418 STACK_COMMAND: .cxr 0xffff83826143d3b0 ; kb BUCKET_ID_FUNC_OFFSET: 288 FAILURE_BUCKET_ID: 0x3B_c0000005_Wof!WofPreDirectoryControlCallback BUCKET_ID: 0x3B_c0000005_Wof!WofPreDirectoryControlCallback PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_Wof!WofPreDirectoryControlCallback TARGET_TIME: 2020-01-02T10:07:13.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 26b3 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_c0000005_wof!wofpredirectorycontrolcallback FAILURE_ID_HASH: {c4606a74-b269-5e61-6320-9f10cc3e0751} Followup: MachineOwner --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8056c7fa0bb, The address that the exception occurred at Arg3: ffff8b0c38445768, Exception Record Address Arg4: ffff8b0c38444fb0, Context Record Address Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : AV.Dereference Value: NullClassPtr Key : AV.Fault Value: Read PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8056c7fa0bb BUGCHECK_P3: ffff8b0c38445768 BUGCHECK_P4: ffff8b0c38444fb0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!ObpRemoveObjectRoutine+5b fffff805`6c7fa0bb 488b8788000000 mov rax,qword ptr [rdi+88h] EXCEPTION_RECORD: ffff8b0c38445768 -- (.exr 0xffff8b0c38445768) ExceptionAddress: fffff8056c7fa0bb (nt!ObpRemoveObjectRoutine+0x000000000000005b) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000088 Attempt to read from address 0000000000000088 CONTEXT: ffff8b0c38444fb0 -- (.cxr 0xffff8b0c38444fb0) rax=0000000000000000 rbx=ffff990eb2fec330 rcx=00000000000000aa rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8056c7fa0bb rsp=ffff8b0c384459a0 rbp=ffffae89ab1799e0 r8=000000000000000f r9=ffffae89b0b8e340 r10=ffffae89b0ec84b0 r11=ffff8b0c38445a10 r12=ffffae89ab179a60 r13=0000000000000001 r14=ffffae89ab1799e0 r15=0000000000000001 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210246 nt!ObpRemoveObjectRoutine+0x5b: fffff805`6c7fa0bb 488b8788000000 mov rax,qword ptr [rdi+88h] ds:002b:00000000`00000088=???????????????? Resetting default scope CPU_COUNT: 4 CPU_MHZ: c14 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 15 CPU_MODEL: 30 CPU_STEPPING: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System CURRENT_IRQL: 0 FOLLOWUP_IP: nt!ObpRemoveObjectRoutine+5b fffff805`6c7fa0bb 488b8788000000 mov rax,qword ptr [rdi+88h] BUGCHECK_STR: AV READ_ADDRESS: fffff8056c7733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd 0000000000000088 DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000088 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-06-2020 18:31:11.0189 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8056c2390c4 to fffff8056c7fa0bb STACK_TEXT: ffff8b0c`384459a0 fffff805`6c2390c4 : 00000000`00000000 00000000`00000000 ffffae89`ab1799e0 ffff990e`b2fec360 : nt!ObpRemoveObjectRoutine+0x5b ffff8b0c`38445a00 fffff805`6c28aa73 : ffff8b0c`38445a00 ffff8b0c`38445ae8 ffffae89`ab1799e0 ffff8b0c`38445ae8 : nt!ObfDereferenceObject+0xa4 ffff8b0c`38445a40 fffff805`6c28b940 : 00000000`0000529a ffff8b0c`38445b09 ffffae89`b8d187e0 00000000`00000000 : nt!CcDeleteSharedCacheMap+0x157 ffff8b0c`38445a90 fffff805`6c2bd095 : ffffae89`ab088900 ffffae89`00000000 00000000`0000529a ffff8b0c`3ade7a90 : nt!CcWriteBehindInternal+0x3a0 ffff8b0c`38445b70 fffff805`6c32a7a5 : ffffae89`abde8600 00000000`00000080 ffffae89`ab077040 00000224`bcbbbdfe : nt!ExpWorkerThread+0x105 ffff8b0c`38445c10 fffff805`6c3c8b2a : ffffd681`d3d51180 ffffae89`abde8600 fffff805`6c32a750 73657547`63496d56 : nt!PspSystemThreadStartup+0x55 ffff8b0c`38445c60 00000000`00000000 : ffff8b0c`38446000 ffff8b0c`38440000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a THREAD_SHA1_HASH_MOD_FUNC: da0edd7bd400f10487369d4d6c75049c64954ec5 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 555b579c211d36a1d9bd3fe968f8bdb876ce0152 THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6 FAULT_INSTR_CODE: 88878b48 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!ObpRemoveObjectRoutine+5b FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470 IMAGE_VERSION: 10.0.18362.535 STACK_COMMAND: .cxr 0xffff8b0c38444fb0 ; kb BUCKET_ID_FUNC_OFFSET: 5b FAILURE_BUCKET_ID: AV_nt!ObpRemoveObjectRoutine BUCKET_ID: AV_nt!ObpRemoveObjectRoutine PRIMARY_PROBLEM_CLASS: AV_nt!ObpRemoveObjectRoutine TARGET_TIME: 2020-01-04T09:13:48.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 1c05 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_nt!obpremoveobjectroutine FAILURE_ID_HASH: {e17dac7a-8c25-c4a4-6b6a-1087fb87207e} Followup: MachineOwner --------- RESOURCE_NOT_OWNED (e3) A thread tried to release a resource it did not own. Arguments: Arg1: ffff9a0cdaf687a0, Address of resource Arg2: ffff9a0cd8dec043, Address of thread Arg3: ffff9a0cdaee9f50, Address of owner table if there is one Arg4: 0000000000000002 Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffff9a0cdaf687a0 BUGCHECK_P2: ffff9a0cd8dec043 BUGCHECK_P3: ffff9a0cdaee9f50 BUGCHECK_P4: 2 CPU_COUNT: 4 CPU_MHZ: c14 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 15 CPU_MODEL: 30 CPU_STEPPING: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0xE3 PROCESS_NAME: System CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-06-2020 18:31:09.0126 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff800335f5d2f to fffff800335c14e0 STACK_TEXT: fffffa02`6f844ee8 fffff800`335f5d2f : 00000000`000000e3 ffff9a0c`daf687a0 ffff9a0c`d8dec043 ffff9a0c`daee9f50 : nt!KeBugCheckEx fffffa02`6f844ef0 fffff800`33501497 : ffff9a0c`0000000e 00000000`00000000 ffff9a0c`d4936af8 ffff9a0c`da2301f0 : nt!ExpReleaseResourceSharedForThreadLite+0x1bf1df fffffa02`6f844fa0 fffff800`3511e2c9 : ffff9a0c`d4936af8 ffff9a0c`cfa17e40 ffff9a0c`cfe68180 fffff800`3346b53d : nt!ExReleaseResourceForThreadLite+0xe7 fffffa02`6f845000 fffff800`334477d9 : ffff9a0c`d5f0f9a0 ffff9a0c`cfdd0040 ffff9a0c`d5f0f9a0 ffff9a0c`d5f0f9a0 : Ntfs!NtfsMasterIrpAsyncCompletionRoutine+0x219 fffffa02`6f845160 fffff800`334476a7 : ffff9a0c`cfd62060 ffff9a0c`cfd62101 ffff9a0c`d5f0f9a0 ffff9a0c`d5f0fb48 : nt!IopfCompleteRequest+0x119 fffffa02`6f845270 fffff800`35be6e40 : 0000015b`acc2151b ffff9a0c`d62b0ac0 fffffa02`6f8453a0 ffff9a0c`d62b0ac0 : nt!IofCompleteRequest+0x17 fffffa02`6f8452a0 fffff800`334477d9 : ffff9a0c`d963714b 00000000`00000000 732555e1`68744d05 00000000`00000000 : CLASSPNP!TransferPktComplete+0x640 fffffa02`6f8454a0 fffff800`334476a7 : 00000000`01008000 ffff9a0c`cfa21101 ffff9a0c`cfa211b0 ffff8680`63e32fa0 : nt!IopfCompleteRequest+0x119 fffffa02`6f8455b0 fffff800`34f7999d : fffff800`34909980 ffff9a0c`cfa1d260 fffffa02`6f8457b0 00000000`00000000 : nt!IofCompleteRequest+0x17 fffffa02`6f8455e0 fffff800`34f7928a : 00000000`00000000 00000000`00989680 fffffa02`6f8457b0 ffff8680`63e32ef0 : storport!RaidCompleteRequestEx+0x8d fffffa02`6f8456b0 fffff800`34f8d60c : ffff9a0c`d3d98108 00000000`00000000 00000000`00000000 00000000`00000000 : storport!RaidUnitCompleteRequest+0x5da fffffa02`6f845850 fffff800`3346ae95 : ffff9a0c`cfac0180 00000000`00000001 fffffa02`6f8458a8 00000000`00000000 : storport!RaidpAdapterRedirectDpcRoutine+0x8c fffffa02`6f8458f0 fffff800`3346a4ef : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305 fffffa02`6f845a30 fffff800`335c5024 : ffffffff`00000000 ffff8680`63942180 ffff8680`63953140 ffff9a0c`d81d9080 : nt!KiRetireDpcList+0x1ef fffffa02`6f845c60 00000000`00000000 : fffffa02`6f846000 fffffa02`6f840000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84 THREAD_SHA1_HASH_MOD_FUNC: 19f1d0adaf60b1c4cd2620e8b26a8cd66e17ffa1 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8bed40e28526d9d2230eedeef96ee9da399e619e THREAD_SHA1_HASH_MOD: eb76f151b80048f989eee82c67cf5bd99ef89187 FOLLOWUP_IP: CLASSPNP!TransferPktComplete+640 fffff800`35be6e40 0f1f440000 nop dword ptr [rax+rax] FAULT_INSTR_CODE: 441f0f SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: CLASSPNP!TransferPktComplete+640 FOLLOWUP_NAME: MachineOwner MODULE_NAME: CLASSPNP IMAGE_NAME: CLASSPNP.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 9ed6e49 IMAGE_VERSION: 10.0.18362.1216 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 640 FAILURE_BUCKET_ID: 0xE3_CLASSPNP!TransferPktComplete BUCKET_ID: 0xE3_CLASSPNP!TransferPktComplete PRIMARY_PROBLEM_CLASS: 0xE3_CLASSPNP!TransferPktComplete TARGET_TIME: 2020-01-06T14:51:38.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 1d1c ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0xe3_classpnp!transferpktcomplete FAILURE_ID_HASH: {6048cf18-0ef5-4393-3d1d-855a2eb9f6c8} Followup: MachineOwner ---------
Aldığınız hatanın fotoğrafını paylaşın.HD Tune'daki testleri yaptım ikisi de sağlıklı çıktı fakat Memtest86 yapmak için USB sürücümü seçiyorum ve program hata verip USB sürücüme yazmıyor.