DMP dosyaları ekte.
İnşallah kör olmamışımdır dosyayı göremiyorum.
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff80431bd212a, Address of the instruction which caused the bugcheck
Arg3: ffff968f355d39c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5093
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 56889
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c000001d
BUGCHECK_P2: fffff80431bd212a
BUGCHECK_P3: ffff968f355d39c0
BUGCHECK_P4: 0
CONTEXT: ffff968f355d39c0 -- (.cxr 0xffff968f355d39c0)
rax=ffffac818ba6c400 rbx=ffffac818b230010 rcx=ffffac818ba6c4e0
rdx=ffffac81871d4000 rsi=ffffac818b230270 rdi=ffffac818b230270
rip=fffff80431bd212a rsp=ffff968f355d43c0 rbp=ffff968f355d4450
r8=0000000000000fff r9=0000000000000648 r10=00000000484c764e
r11=0000000000001001 r12=0000000000002500 r13=0000000000000001
r14=0000000000000000 r15=ffffac81871d4000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nvlddmkm+0xc1212a:
fffff804`31bd212a ea ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: StartMenuExperienceHost.exe
STACK_TEXT:
ffff968f`355d43c0 ffffac81`871d4000 : ffffac81`8b230270 00000000`00000000 ffffac81`871d4000 ffffac81`8b230270 : nvlddmkm+0xc1212a
ffff968f`355d43c8 ffffac81`8b230270 : 00000000`00000000 ffffac81`871d4000 ffffac81`8b230270 fffff804`31b93b83 : 0xffffac81`871d4000
ffff968f`355d43d0 00000000`00000000 : ffffac81`871d4000 ffffac81`8b230270 fffff804`31b93b83 ffffac81`00000000 : 0xffffac81`8b230270
SYMBOL_NAME: nvlddmkm+c1212a
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffff968f355d39c0 ; kb
BUCKET_ID_FUNC_OFFSET: c1212a
FAILURE_BUCKET_ID: 0x3B_c000001d_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4904ec20-5af6-c77a-8cce-daedc0fbe1bd}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffc78269d75080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3827
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10402
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffc78269d75080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x68ed5040 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {9dd4b196-400f-4dd1-93b2-b8fe2ae3c160}
IMAGE_NAME: psmsrv.dll
MODULE_NAME: psmsrv
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
fffffd89`42099938 fffff805`4a517622 : 00000000`000000ef ffffc782`69d75080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffd89`42099940 fffff805`4a40b22f : 00000000`00000000 fffff805`49e74901 00000000`00000002 fffff805`49e74c9b : nt!PspCatchCriticalBreak+0x10e
fffffd89`420999e0 fffff805`4a24e820 : ffffc782`00000000 00000000`00000000 ffffc782`69d75080 ffffc782`69d754b8 : nt!PspTerminateAllThreads+0x1bc5ff
fffffd89`42099a50 fffff805`4a24e61c : ffffc782`69d75080 00000000`00000000 000000b6`973ff60c fffff805`4a1ea7fa : nt!PspTerminateProcess+0xe0
fffffd89`42099a90 fffff805`49fef378 : ffffc782`69d75080 ffffc782`68ed5040 fffffd89`42099b80 ffffc782`69d75080 : nt!NtTerminateProcess+0x9c
fffffd89`42099b00 00007ffd`7006b314 : 00007ffd`700e1643 00007ffd`7010ff74 000000b6`973ff5d0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b6`973fd568 00007ffd`700e1643 : 00007ffd`7010ff74 000000b6`973ff5d0 00000000`00000000 00007ffd`6ffd0000 : 0x00007ffd`7006b314
000000b6`973fd570 00007ffd`7010ff74 : 000000b6`973ff5d0 00000000`00000000 00007ffd`6ffd0000 00000000`00000004 : 0x00007ffd`700e1643
000000b6`973fd578 000000b6`973ff5d0 : 00000000`00000000 00007ffd`6ffd0000 00000000`00000004 00007ffd`7007231d : 0x00007ffd`7010ff74
000000b6`973fd580 00000000`00000000 : 00007ffd`6ffd0000 00000000`00000004 00007ffd`7007231d 00007ffd`7010ff74 : 0x000000b6`973ff5d0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_68ed5040_psmsrv.dll!PsmpGetNextApplication_IMAGE_psmsrv.dll
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ec760983-8c38-e6d8-0754-095111a3831a}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbb0135352028, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8054564092e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3421
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3462
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffbb0135352028
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8054564092e
BUGCHECK_P4: 2
READ_ADDRESS: fffff805460fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8054600f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8054600f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffbb0135352028
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvsphelper64.exe
TRAP_FRAME: ffffe00e3574d060 -- (.trap 0xffffe00e3574d060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffff3160 rbx=0000000000000000 rcx=ffff8f8027b74598
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8054564092e rsp=ffffe00e3574d1f0 rbp=ffffe00e3574d340
r8=0000000000000018 r9=ffff8f8027b40000 r10=0000000000000000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExFreeHeapPool+0x21e:
fffff805`4564092e 488b5328 mov rdx,qword ptr [rbx+28h] ds:00000000`00000028=????????????????
Resetting default scope
STACK_TEXT:
ffffe00e`3574cdb8 fffff805`45835c1d : 00000000`00000050 ffffbb01`35352028 00000000`00000000 ffffe00e`3574d060 : nt!KeBugCheckEx
ffffe00e`3574cdc0 fffff805`45612ce0 : 00000000`00000000 00000000`00000000 ffffe00e`3574d0e0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
ffffe00e`3574cec0 fffff805`457ebb1e : ffff8f80`27b03100 fffffbdc`1796e5b3 00000000`00000001 ffffbb01`3fc67180 : nt!MmAccessFault+0x400
ffffe00e`3574d060 fffff805`4564092e : ffffbb01`000000d1 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x35e
ffffe00e`3574d1f0 fffff805`45dc2019 : 00000000`00000005 ffffbb01`3fc67080 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x21e
ffffe00e`3574d2d0 fffff805`45a0b330 : ffffe00e`3574d5b0 00000000`00000001 ffffbb01`3e4e0a50 00000000`00000000 : nt!ExFreePool+0x9
ffffe00e`3574d300 fffff805`45a0af29 : fffff805`45751a00 fffff805`456e73cf ffffe00e`3574d848 fffff805`00000000 : nt!ObWaitForMultipleObjects+0x3d0
ffffe00e`3574d800 fffff805`457ef378 : ffffe00e`3574db18 00000000`00000000 ffffbb01`3fc67080 ffffbb01`3f12a790 : nt!NtWaitForMultipleObjects+0x119
ffffe00e`3574da90 00007ffa`314eb8e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000026`38aff1d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`314eb8e4
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.329
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_R_INVALID_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {abe5a486-9a07-9785-197c-226bb9273d2c}
Followup: Pool_corruption
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffa00107d64410, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa00107d64368, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3687
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11692
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffa00107d64410
BUGCHECK_P3: ffffa00107d64368
BUGCHECK_P4: 0
TRAP_FRAME: ffffa00107d64410 -- (.trap 0xffffa00107d64410)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa308fc406b18 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa309063a8000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037ee18e84 rsp=ffffa00107d645a0 rbp=ffffa00107d646a0
r8=ffffa308fc406b08 r9=ffffa308fc406b18 r10=ffffa30905650000
r11=00000000000000d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!RtlpHpLfhSlotAllocate+0x1d43c4:
fffff803`7ee18e84 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffa00107d64368 -- (.exr 0xffffa00107d64368)
ExceptionAddress: fffff8037ee18e84 (nt!RtlpHpLfhSlotAllocate+0x00000000001d43c4)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WerFault.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffa001`07d640e8 fffff803`7edef929 : 00000000`00000139 00000000`00000003 ffffa001`07d64410 ffffa001`07d64368 : nt!KeBugCheckEx
ffffa001`07d640f0 fffff803`7edefd50 : ffffa309`010f78a0 ffffa309`06bd49a0 00000000`00000000 ffffa001`07d64340 : nt!KiBugCheckDispatch+0x69
ffffa001`07d64230 fffff803`7edee0e3 : 00000000`00000000 00000000`00000004 00000000`00000000 ffffa309`01105d90 : nt!KiFastFailDispatch+0xd0
ffffa001`07d64410 fffff803`7ee18e84 : ffffa309`06bd4980 ffffa001`07d646e4 ffffa309`06bd49a0 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffa001`07d645a0 fffff803`7ec44141 : ffffa308`fc402340 ffffa308`fc406940 ffffa308`fc406b00 00000040`00000040 : nt!RtlpHpLfhSlotAllocate+0x1d43c4
ffffa001`07d646f0 fffff803`7f3c2094 : ffffa309`00000000 00000000`00000000 00000000`20206f49 ffffa308`fcaaf7a0 : nt!ExAllocateHeapPool+0x2b1
ffffa001`07d64830 fffff803`7ec308b0 : 00007fff`ffff0000 00000000`00000208 00000000`00000014 ffffa001`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffa001`07d64880 fffff803`7ec30819 : 00000000`00000000 00007fff`ffff0000 ffffa001`20206f49 00000000`00000000 : nt!ExAllocatePoolWithQuotaTag+0x60
ffffa001`07d64900 fffff803`7f029ea1 : 00000000`beaa0251 00000000`00000001 00000000`00000000 ffffa309`05e88200 : nt!IopVerifierExAllocatePoolWithQuota+0x21
ffffa001`07d64930 fffff803`7f029cf1 : 00000000`000003d4 00000001`2e8f7508 00000000`00000000 00000000`00000000 : nt!BuildQueryDirectoryIrp+0x171
ffffa001`07d649e0 fffff803`7edef378 : 00000000`000003d4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryDirectoryFileEx+0x81
ffffa001`07d64a90 00007ffe`8efad5c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000001`2e8f74e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8efad5c4
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb78696752028, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8026f04092e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for mountmgr.sys
Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32kbase.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4249
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17829
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffb78696752028
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8026f04092e
BUGCHECK_P4: 2
READ_ADDRESS: fffff8026fafa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026fa0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8026fa0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb78696752028
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvcontainer.exe
TRAP_FRAME: ffff9183c67b7650 -- (.trap 0xffff9183c67b7650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000009ec80 rbx=0000000000000000 rcx=ffffb78696825ee0
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026f04092e rsp=ffff9183c67b77e0 rbp=ffffb786968ada60
r8=0000000000000018 r9=ffffb78696802000 r10=0000000000000000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExFreeHeapPool+0x21e:
fffff802`6f04092e 488b5328 mov rdx,qword ptr [rbx+28h] ds:00000000`00000028=????????????????
Resetting default scope
STACK_TEXT:
ffff9183`c67b73a8 fffff802`6f235c1d : 00000000`00000050 ffffb786`96752028 00000000`00000000 ffff9183`c67b7650 : nt!KeBugCheckEx
ffff9183`c67b73b0 fffff802`6f012ce0 : fffff802`6befb180 00000000`00000000 ffff9183`c67b76d0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
ffff9183`c67b74b0 fffff802`6f1ebb1e : 00000000`00000000 fffff802`72cd1677 ffffb786`a0018460 fffff802`6f1364d5 : nt!MmAccessFault+0x400
ffff9183`c67b7650 fffff802`6f04092e : 00000000`00000040 fffff802`73941033 00000000`00000020 fffff802`6f046f01 : nt!KiPageFault+0x35e
ffff9183`c67b77e0 fffff802`6f7c2019 : ffffb786`968ada60 fffff802`6f4122d2 ffffb786`9fb13e40 01000000`00100000 : nt!ExFreeHeapPool+0x21e
ffff9183`c67b78c0 fffff802`6f40c6e4 : 00000000`00000000 ffff9183`c67b7ae9 00000000`c0000010 00000000`00000000 : nt!ExFreePool+0x9
ffff9183`c67b78f0 fffff802`6f40c4f8 : ffffb786`9fb13e00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194
ffff9183`c67b7950 fffff802`6f024e97 : 00000000`00000000 00000000`00000000 ffff9183`c67b7ae9 ffffb786`9fb13e40 : nt!ObpRemoveObjectRoutine+0x88
ffff9183`c67b79b0 fffff802`6f00198e : 00000000`00000000 ffffb786`98d30cf0 00000000`00000000 01000000`00100000 : nt!ObfDereferenceObjectWithTag+0xc7
ffff9183`c67b79f0 fffff802`72d6942c : 00000000`00000000 ffff9183`c67b7aa0 ffffc988`30ef1c00 00000000`00000000 : nt!HalPutDmaAdapter+0xe
ffff9183`c67b7a20 00000000`00000000 : ffff9183`c67b7aa0 ffffc988`30ef1c00 00000000`00000000 ffffc988`30ef1c00 : mountmgr+0x942c
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
fffff46a66a2ad71-fffff46a66a2ad84 20 bytes - win32kbase!UpdateWindowTreeDpiAwareness+175
[ c3 cc 41 8b 85 18 01 00:48 83 c4 60 5f c3 cc 48 ]
fffff46a66a2ad86-fffff46a66a2ada5 32 bytes - win32kbase!UpdateWindowTreeDpiAwareness+18a (+0x15)
[ 43 28 48 8b 88 00 01 00:15 15 85 25 00 e8 90 a6 ]
fffff46a66a2adac-fffff46a66a2adad 2 bytes - win32kbase!UpdateWindowTreeDpiAwareness+1b0 (+0x26)
[ eb 89:cc cc ]
fffff46a66a2adb0-fffff46a66a2adbf 16 bytes - win32kbase!UpdateWindowTreeDpiAwareness+1b4 (+0x04)
[ cc cc cc cc cc cc cc cc:40 53 48 83 ec 20 8b 05 ]
fffff46a66a2adc1-fffff46a66a2adea 42 bytes - win32kbase!EnterSharedCrit+1 (+0x11)
[ 89 5c 24 10 48 89 6c 24:8d 05 79 30 23 00 48 83 ]
fffff46a66a2adf8-fffff46a66a2ae00 9 bytes - win32kbase!EnterSharedCrit+38 (+0x37)
[ 8b d8 48 85 c0 74 12 33:89 05 e2 31 23 00 48 8b ]
fffff46a66a2ae0d-fffff46a66a2ae27 27 bytes - win32kbase!EnterSharedCrit+4d (+0x15)
[ 48 89 43 08 45 33 ff 0f:cc cc cc 40 53 48 81 ec ]
fffff46a66a2ae29-fffff46a66a2ae37 15 bytes - win32kbase!EnterSharedCrit+69 (+0x1c)
[ 4c 89 7c 24 38 49 8b f7:00 00 80 3d 36 29 23 00 ]
fffff46a66a2ae44-fffff46a66a2ae4b 8 bytes - win32kbase!EnterSharedCrit+84 (+0x1b)
[ 48 85 c0 74 03 48 8b 30:33 cc e8 65 a1 0a 00 48 ]
fffff46a66a2ae58-fffff46a66a2ae69 18 bytes - win32kbase!EnterSharedCrit+98 (+0x14)
[ 48 85 c0 74 09 48 3b 05:cc cc cc cc cc cc cc cc ]
fffff46a66aa2160-fffff46a66aa2179 26 bytes - win32kbase!CitpCleanupGlobalImpactContext+40 (+0x77308)
[ cc cc cc cc 48 89 5c 24:48 8b 02 49 3b 00 77 09 ]
fffff46a66aa2186-fffff46a66aa219a 21 bytes - win32kbase!CitpContextCleanup+22 (+0x26)
[ 84 c0 0f 84 ca 00 00 00:45 88 01 85 d2 0f 84 8d ]
fffff46a66aa21a7-fffff46a66aa21ca 36 bytes - win32kbase!CitpContextCleanup+43 (+0x21)
[ 4c 8b 4f 60 bb 2f cb 04:01 74 44 83 ea 02 75 2c ]
fffff46a66aa21cc-fffff46a66aa2246 123 bytes - win32kbase!CitpContextCleanup+68 (+0x25)
[ b6 01 48 6b cb 25 48 03:11 12 41 09 42 10 41 c6 ]
fffff46a66aa2248-fffff46a66aa2254 13 bytes - win32kbase!CitpContextCleanup+e4 (+0x7c)
[ 03 d8 49 ff c1 41 0f b6:81 ec 00 01 00 00 48 8b ]
fffff46a66aa2256-fffff46a66aa225f 10 bytes - win32kbase!CitpContextCleanup+f2 (+0x0e)
[ 03 d8 45 33 c9 45 33 c0:33 c4 48 89 45 27 44 8b ]
fffff46a66aafd30-fffff46a66aafd53 36 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+24 (+0xdada)
[ d8 85 c0 78 17 48 8d 4f:48 83 ec 28 48 8b ca e8 ]
fffff46a66aafd55-fffff46a66aafd8c 56 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+49 (+0x25)
[ 5c 24 30 48 8b 74 24 40:d1 4d 85 c9 0f 95 c2 41 ]
fffff46a66aafd93-fffff46a66aafda0 14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+27 (+0x3e)
[ 89 47 04 48 8b 4b 38 48:01 0f 84 e3 ec 06 00 41 ]
fffff46a66aafda7-fffff46a66aafdb4 14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+3b (+0x14)
[ 89 47 08 48 8b 4b 40 48:48 01 00 00 74 44 48 8b ]
fffff46a66aafdbb-fffff46a66aafdc8 14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+4f (+0x14)
[ 89 47 0c 48 8b 4b 48 48:01 0f ba 69 10 09 eb 2e ]
fffff46a66aafdcf-fffff46a66aafddc 14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+63 (+0x14)
[ 89 47 10 48 8b 4b 50 48:01 3a c2 74 1d c0 e2 03 ]
fffff46a66aafde3-fffff46a66aafdf4 18 bytes - win32kbase!CInputSink::QueryInputQueueTypes+77 (+0x14)
[ 48 8b 5c 24 30 89 47 14:92 4c 01 00 00 c6 00 01 ]
fffff46a66aafdf6-fffff46a66aafe2f 58 bytes - win32kbase!CInputSink::QueryInputQueueTypes+8a (+0x13)
[ cc cc cc cc cc cc cc cc:8a 89 4c 01 00 00 8a c1 ]
fffff46a66ab0c10-fffff46a66ab0c22 19 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+d0 (+0xe1a)
[ 10 0d 8b 43 10 48 89 5d:48 83 ec 28 8b ca 45 33 ]
fffff46a66ab0c24-fffff46a66ab0c7e 91 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+e4 (+0x14)
[ 8b d6 48 8b cb e8 de 06:83 c4 28 c3 cc cc cc cc ]
fffff46a66ab0c80-fffff46a66ab0c8f 16 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+140 (+0x5c)
[ 89 5d 20 0f ba e0 12 73:3b 08 77 2c 49 8b 00 48 ]
fffff46a66ab0c91-fffff46a66ab0cd0 64 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+151 (+0x11)
[ 8b cb e8 f8 05 00 00 84:3b ca 72 0c 48 8b 05 8c ]
fffff46a66ab0cd3 - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+193 (+0x42)
[ 5c:7c ]
fffff46a66ab0cd5-fffff46a66ab0cfd 41 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+195 (+0x02)
[ 30 40 8a c7 48 8b 7c 24:50 85 db 78 3f 48 8d 54 ]
fffff46a66ab0cff-fffff46a66ab0d0f 17 bytes - win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand<<lambda_5a7aae95d2af49f4475e794f2d9a8b36> >+f (+0x2a)
[ 00 48 8b c2 49 8b d8 48:8d 54 24 20 e8 34 23 00 ]
fffff46a66c0f9b8-fffff46a66c0f9b9 2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+80
[ 40 bd:d0 c0 ]
fffff46a66c0f9c0-fffff46a66c0f9c1 2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+88 (+0x08)
[ 40 bd:f0 c3 ]
fffff46a66c0f9c8-fffff46a66c0f9c9 2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+90 (+0x08)
[ 40 bd:30 c4 ]
fffff46a66c0f9d0-fffff46a66c0f9d2 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+98 (+0x08)
[ 60 ee a9:b0 c0 ac ]
fffff46a66c0f9d8-fffff46a66c0f9d9 2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+a0 (+0x08)
[ 40 bd:c0 c0 ]
fffff46a66c0f9e1-fffff46a66c0f9e2 2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+a9 (+0x09)
[ bd ac:9e a0 ]
fffff46a66c0f9e8-fffff46a66c0f9ea 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+b0 (+0x07)
[ 70 ba ac:80 9e a0 ]
fffff46a66c0f9f0-fffff46a66c0f9f2 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+b8 (+0x08)
[ 40 bd ac:50 85 a0 ]
fffff46a66c0f9f8-fffff46a66c0f9fa 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+c0 (+0x08)
[ 70 ba ac:80 61 bf ]
fffff46a66c0fa00-fffff46a66c0fa02 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+c8 (+0x08)
[ 70 ba ac:10 df a9 ]
fffff46a66c0fa08-fffff46a66c0fa09 2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+d0 (+0x08)
[ 00 b8:b0 ef ]
fffff46a66c0fa10-fffff46a66c0fa12 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+d8 (+0x08)
[ 00 b8 aa:80 3d a9 ]
fffff46a66c0fa18-fffff46a66c0fa1a 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+e0 (+0x08)
[ 10 36 bf:f0 9b a8 ]
fffff46a66c0fa20-fffff46a66c0fa21 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable' (+0x08)
[ 80 ba:d0 c0 ]
fffff46a66c0fa28-fffff46a66c0fa2a 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+8 (+0x08)
[ a0 bd ac:80 0f aa ]
fffff46a66c0fa30-fffff46a66c0fa31 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+10 (+0x08)
[ e0 bd:90 c3 ]
fffff46a66c0fa38-fffff46a66c0fa39 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+18 (+0x08)
[ 70 ba:90 c3 ]
fffff46a66c0fa40-fffff46a66c0fa41 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+20 (+0x08)
[ 70 ba:90 c3 ]
fffff46a66c0fa48-fffff46a66c0fa4a 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+28 (+0x08)
[ d0 9e a0:e0 f8 a9 ]
fffff46a66c0fa50-fffff46a66c0fa52 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+30 (+0x08)
[ 70 9e a0:b0 f7 a9 ]
fffff46a66c0fa58-fffff46a66c0fa5a 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+38 (+0x08)
[ 30 a2 a0:00 3e a9 ]
fffff46a66c0fa61 - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+41 (+0x09)
[ be:c4 ]
fffff46a66c0fa68-fffff46a66c0fa6a 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+48 (+0x07)
[ 00 b8 aa:c0 c0 ac ]
fffff46a66c0fa70-fffff46a66c0fa72 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+50 (+0x08)
[ 60 eb aa:90 c3 ac ]
fffff46a66c0fa78-fffff46a66c0fa7a 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+58 (+0x08)
[ 00 b8 aa:c0 c0 ac ]
fffff46a66c0fa80-fffff46a66c0fa82 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+60 (+0x08)
[ 90 85 a9:c0 c0 ac ]
fffff46a66c0fa88-fffff46a66c0fa8a 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+68 (+0x08)
[ 80 ba ac:10 df a9 ]
fffff46a66c0fa90-fffff46a66c0fa92 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+70 (+0x08)
[ 40 bd ac:10 df a9 ]
fffff46a66c0fa98-fffff46a66c0fa99 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+78 (+0x08)
[ 40 bd:d0 c0 ]
fffff46a66c0faa0-fffff46a66c0faa1 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+80 (+0x08)
[ 40 bd:f0 c3 ]
fffff46a66c0faa8-fffff46a66c0faa9 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+88 (+0x08)
[ 40 bd:30 c4 ]
fffff46a66c0fab0-fffff46a66c0fab2 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+90 (+0x08)
[ 40 26 ab:c0 c0 ac ]
972 errors : !win32kbase (fffff46a66a2ad71-fffff46a66c0fab2)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
Bellek ile ilgili bir sorun var. Test edip sonucu paylaşın:
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c000001d, Exception code that caused the bugcheck Arg2: fffff80431bd212a, Address of the instruction which caused the bugcheck Arg3: ffff968f355d39c0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5093 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 56889 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c000001d BUGCHECK_P2: fffff80431bd212a BUGCHECK_P3: ffff968f355d39c0 BUGCHECK_P4: 0 CONTEXT: ffff968f355d39c0 -- (.cxr 0xffff968f355d39c0) rax=ffffac818ba6c400 rbx=ffffac818b230010 rcx=ffffac818ba6c4e0 rdx=ffffac81871d4000 rsi=ffffac818b230270 rdi=ffffac818b230270 rip=fffff80431bd212a rsp=ffff968f355d43c0 rbp=ffff968f355d4450 r8=0000000000000fff r9=0000000000000648 r10=00000000484c764e r11=0000000000001001 r12=0000000000002500 r13=0000000000000001 r14=0000000000000000 r15=ffffac81871d4000 iopl=0 nv up ei ng nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286 nvlddmkm+0xc1212a: fffff804`31bd212a ea ??? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: StartMenuExperienceHost.exe STACK_TEXT: ffff968f`355d43c0 ffffac81`871d4000 : ffffac81`8b230270 00000000`00000000 ffffac81`871d4000 ffffac81`8b230270 : nvlddmkm+0xc1212a ffff968f`355d43c8 ffffac81`8b230270 : 00000000`00000000 ffffac81`871d4000 ffffac81`8b230270 fffff804`31b93b83 : 0xffffac81`871d4000 ffff968f`355d43d0 00000000`00000000 : ffffac81`871d4000 ffffac81`8b230270 fffff804`31b93b83 ffffac81`00000000 : 0xffffac81`8b230270 SYMBOL_NAME: nvlddmkm+c1212a MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .cxr 0xffff968f355d39c0 ; kb BUCKET_ID_FUNC_OFFSET: c1212a FAILURE_BUCKET_ID: 0x3B_c000001d_nvlddmkm!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {4904ec20-5af6-c77a-8cce-daedc0fbe1bd} Followup: MachineOwner --------- CRITICAL_PROCESS_DIED (ef) A critical system process died Arguments: Arg1: ffffc78269d75080, Process object or thread object Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died. Arg3: 0000000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3827 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 10402 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: ef BUGCHECK_P1: ffffc78269d75080 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 PROCESS_NAME: svchost.exe CRITICAL_PROCESS: svchost.exe ERROR_CODE: (NTSTATUS) 0x68ed5040 - <Unable to get error code text> CRITICAL_PROCESS_REPORTGUID: {9dd4b196-400f-4dd1-93b2-b8fe2ae3c160} IMAGE_NAME: psmsrv.dll MODULE_NAME: psmsrv FAULTING_MODULE: 0000000000000000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 STACK_TEXT: fffffd89`42099938 fffff805`4a517622 : 00000000`000000ef ffffc782`69d75080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx fffffd89`42099940 fffff805`4a40b22f : 00000000`00000000 fffff805`49e74901 00000000`00000002 fffff805`49e74c9b : nt!PspCatchCriticalBreak+0x10e fffffd89`420999e0 fffff805`4a24e820 : ffffc782`00000000 00000000`00000000 ffffc782`69d75080 ffffc782`69d754b8 : nt!PspTerminateAllThreads+0x1bc5ff fffffd89`42099a50 fffff805`4a24e61c : ffffc782`69d75080 00000000`00000000 000000b6`973ff60c fffff805`4a1ea7fa : nt!PspTerminateProcess+0xe0 fffffd89`42099a90 fffff805`49fef378 : ffffc782`69d75080 ffffc782`68ed5040 fffffd89`42099b80 ffffc782`69d75080 : nt!NtTerminateProcess+0x9c fffffd89`42099b00 00007ffd`7006b314 : 00007ffd`700e1643 00007ffd`7010ff74 000000b6`973ff5d0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000b6`973fd568 00007ffd`700e1643 : 00007ffd`7010ff74 000000b6`973ff5d0 00000000`00000000 00007ffd`6ffd0000 : 0x00007ffd`7006b314 000000b6`973fd570 00007ffd`7010ff74 : 000000b6`973ff5d0 00000000`00000000 00007ffd`6ffd0000 00000000`00000004 : 0x00007ffd`700e1643 000000b6`973fd578 000000b6`973ff5d0 : 00000000`00000000 00007ffd`6ffd0000 00000000`00000004 00007ffd`7007231d : 0x00007ffd`7010ff74 000000b6`973fd580 00000000`00000000 : 00007ffd`6ffd0000 00000000`00000004 00007ffd`7007231d 00007ffd`7010ff74 : 0x000000b6`973ff5d0 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_68ed5040_psmsrv.dll!PsmpGetNextApplication_IMAGE_psmsrv.dll OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {ec760983-8c38-e6d8-0754-095111a3831a} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffbb0135352028, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff8054564092e, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3421 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 3462 Key : Analysis.Memory.CommitPeak.Mb Value: 73 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: ffffbb0135352028 BUGCHECK_P2: 0 BUGCHECK_P3: fffff8054564092e BUGCHECK_P4: 2 READ_ADDRESS: fffff805460fa388: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8054600f2a8: Unable to get Flags value from nt!KdVersionBlock fffff8054600f2a8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffbb0135352028 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: nvsphelper64.exe TRAP_FRAME: ffffe00e3574d060 -- (.trap 0xffffe00e3574d060) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffffffffff3160 rbx=0000000000000000 rcx=ffff8f8027b74598 rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8054564092e rsp=ffffe00e3574d1f0 rbp=ffffe00e3574d340 r8=0000000000000018 r9=ffff8f8027b40000 r10=0000000000000000 r11=0000000000000fff r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!ExFreeHeapPool+0x21e: fffff805`4564092e 488b5328 mov rdx,qword ptr [rbx+28h] ds:00000000`00000028=???????????????? Resetting default scope STACK_TEXT: ffffe00e`3574cdb8 fffff805`45835c1d : 00000000`00000050 ffffbb01`35352028 00000000`00000000 ffffe00e`3574d060 : nt!KeBugCheckEx ffffe00e`3574cdc0 fffff805`45612ce0 : 00000000`00000000 00000000`00000000 ffffe00e`3574d0e0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed ffffe00e`3574cec0 fffff805`457ebb1e : ffff8f80`27b03100 fffffbdc`1796e5b3 00000000`00000001 ffffbb01`3fc67180 : nt!MmAccessFault+0x400 ffffe00e`3574d060 fffff805`4564092e : ffffbb01`000000d1 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x35e ffffe00e`3574d1f0 fffff805`45dc2019 : 00000000`00000005 ffffbb01`3fc67080 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x21e ffffe00e`3574d2d0 fffff805`45a0b330 : ffffe00e`3574d5b0 00000000`00000001 ffffbb01`3e4e0a50 00000000`00000000 : nt!ExFreePool+0x9 ffffe00e`3574d300 fffff805`45a0af29 : fffff805`45751a00 fffff805`456e73cf ffffe00e`3574d848 fffff805`00000000 : nt!ObWaitForMultipleObjects+0x3d0 ffffe00e`3574d800 fffff805`457ef378 : ffffe00e`3574db18 00000000`00000000 ffffbb01`3fc67080 ffffbb01`3f12a790 : nt!NtWaitForMultipleObjects+0x119 ffffe00e`3574da90 00007ffa`314eb8e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000026`38aff1d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`314eb8e4 SYMBOL_NAME: nt!ExFreePool+9 IMAGE_NAME: Pool_Corruption IMAGE_VERSION: 10.0.19041.329 MODULE_NAME: Pool_Corruption STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: AV_R_INVALID_nt!ExFreePool OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {abe5a486-9a07-9785-197c-226bb9273d2c} Followup: Pool_corruption --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: ffffa00107d64410, Address of the trap frame for the exception that caused the bugcheck Arg3: ffffa00107d64368, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3687 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 11692 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 139 BUGCHECK_P1: 3 BUGCHECK_P2: ffffa00107d64410 BUGCHECK_P3: ffffa00107d64368 BUGCHECK_P4: 0 TRAP_FRAME: ffffa00107d64410 -- (.trap 0xffffa00107d64410) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffa308fc406b18 rbx=0000000000000000 rcx=0000000000000003 rdx=ffffa309063a8000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8037ee18e84 rsp=ffffa00107d645a0 rbp=ffffa00107d646a0 r8=ffffa308fc406b08 r9=ffffa308fc406b18 r10=ffffa30905650000 r11=00000000000000d0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po cy nt!RtlpHpLfhSlotAllocate+0x1d43c4: fffff803`7ee18e84 cd29 int 29h Resetting default scope EXCEPTION_RECORD: ffffa00107d64368 -- (.exr 0xffffa00107d64368) ExceptionAddress: fffff8037ee18e84 (nt!RtlpHpLfhSlotAllocate+0x00000000001d43c4) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000003 Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: WerFault.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000003 EXCEPTION_STR: 0xc0000409 STACK_TEXT: ffffa001`07d640e8 fffff803`7edef929 : 00000000`00000139 00000000`00000003 ffffa001`07d64410 ffffa001`07d64368 : nt!KeBugCheckEx ffffa001`07d640f0 fffff803`7edefd50 : ffffa309`010f78a0 ffffa309`06bd49a0 00000000`00000000 ffffa001`07d64340 : nt!KiBugCheckDispatch+0x69 ffffa001`07d64230 fffff803`7edee0e3 : 00000000`00000000 00000000`00000004 00000000`00000000 ffffa309`01105d90 : nt!KiFastFailDispatch+0xd0 ffffa001`07d64410 fffff803`7ee18e84 : ffffa309`06bd4980 ffffa001`07d646e4 ffffa309`06bd49a0 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323 ffffa001`07d645a0 fffff803`7ec44141 : ffffa308`fc402340 ffffa308`fc406940 ffffa308`fc406b00 00000040`00000040 : nt!RtlpHpLfhSlotAllocate+0x1d43c4 ffffa001`07d646f0 fffff803`7f3c2094 : ffffa309`00000000 00000000`00000000 00000000`20206f49 ffffa308`fcaaf7a0 : nt!ExAllocateHeapPool+0x2b1 ffffa001`07d64830 fffff803`7ec308b0 : 00007fff`ffff0000 00000000`00000208 00000000`00000014 ffffa001`00000000 : nt!ExAllocatePoolWithTag+0x64 ffffa001`07d64880 fffff803`7ec30819 : 00000000`00000000 00007fff`ffff0000 ffffa001`20206f49 00000000`00000000 : nt!ExAllocatePoolWithQuotaTag+0x60 ffffa001`07d64900 fffff803`7f029ea1 : 00000000`beaa0251 00000000`00000001 00000000`00000000 ffffa309`05e88200 : nt!IopVerifierExAllocatePoolWithQuota+0x21 ffffa001`07d64930 fffff803`7f029cf1 : 00000000`000003d4 00000001`2e8f7508 00000000`00000000 00000000`00000000 : nt!BuildQueryDirectoryIrp+0x171 ffffa001`07d649e0 fffff803`7edef378 : 00000000`000003d4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryDirectoryFileEx+0x81 ffffa001`07d64a90 00007ffe`8efad5c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000001`2e8f74e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8efad5c4 SYMBOL_NAME: nt!KiFastFailDispatch+d0 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.329 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: d0 FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffb78696752028, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff8026f04092e, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for mountmgr.sys Could not read faulting driver name *** WARNING: Unable to verify checksum for win32kbase.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4249 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-1IBQR0U Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 17829 Key : Analysis.Memory.CommitPeak.Mb Value: 79 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: ffffb78696752028 BUGCHECK_P2: 0 BUGCHECK_P3: fffff8026f04092e BUGCHECK_P4: 2 READ_ADDRESS: fffff8026fafa388: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8026fa0f2a8: Unable to get Flags value from nt!KdVersionBlock fffff8026fa0f2a8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffb78696752028 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: nvcontainer.exe TRAP_FRAME: ffff9183c67b7650 -- (.trap 0xffff9183c67b7650) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000000000009ec80 rbx=0000000000000000 rcx=ffffb78696825ee0 rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8026f04092e rsp=ffff9183c67b77e0 rbp=ffffb786968ada60 r8=0000000000000018 r9=ffffb78696802000 r10=0000000000000000 r11=0000000000000fff r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!ExFreeHeapPool+0x21e: fffff802`6f04092e 488b5328 mov rdx,qword ptr [rbx+28h] ds:00000000`00000028=???????????????? Resetting default scope STACK_TEXT: ffff9183`c67b73a8 fffff802`6f235c1d : 00000000`00000050 ffffb786`96752028 00000000`00000000 ffff9183`c67b7650 : nt!KeBugCheckEx ffff9183`c67b73b0 fffff802`6f012ce0 : fffff802`6befb180 00000000`00000000 ffff9183`c67b76d0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed ffff9183`c67b74b0 fffff802`6f1ebb1e : 00000000`00000000 fffff802`72cd1677 ffffb786`a0018460 fffff802`6f1364d5 : nt!MmAccessFault+0x400 ffff9183`c67b7650 fffff802`6f04092e : 00000000`00000040 fffff802`73941033 00000000`00000020 fffff802`6f046f01 : nt!KiPageFault+0x35e ffff9183`c67b77e0 fffff802`6f7c2019 : ffffb786`968ada60 fffff802`6f4122d2 ffffb786`9fb13e40 01000000`00100000 : nt!ExFreeHeapPool+0x21e ffff9183`c67b78c0 fffff802`6f40c6e4 : 00000000`00000000 ffff9183`c67b7ae9 00000000`c0000010 00000000`00000000 : nt!ExFreePool+0x9 ffff9183`c67b78f0 fffff802`6f40c4f8 : ffffb786`9fb13e00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194 ffff9183`c67b7950 fffff802`6f024e97 : 00000000`00000000 00000000`00000000 ffff9183`c67b7ae9 ffffb786`9fb13e40 : nt!ObpRemoveObjectRoutine+0x88 ffff9183`c67b79b0 fffff802`6f00198e : 00000000`00000000 ffffb786`98d30cf0 00000000`00000000 01000000`00100000 : nt!ObfDereferenceObjectWithTag+0xc7 ffff9183`c67b79f0 fffff802`72d6942c : 00000000`00000000 ffff9183`c67b7aa0 ffffc988`30ef1c00 00000000`00000000 : nt!HalPutDmaAdapter+0xe ffff9183`c67b7a20 00000000`00000000 : ffff9183`c67b7aa0 ffffc988`30ef1c00 00000000`00000000 ffffc988`30ef1c00 : mountmgr+0x942c CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase fffff46a66a2ad71-fffff46a66a2ad84 20 bytes - win32kbase!UpdateWindowTreeDpiAwareness+175 [ c3 cc 41 8b 85 18 01 00:48 83 c4 60 5f c3 cc 48 ] fffff46a66a2ad86-fffff46a66a2ada5 32 bytes - win32kbase!UpdateWindowTreeDpiAwareness+18a (+0x15) [ 43 28 48 8b 88 00 01 00:15 15 85 25 00 e8 90 a6 ] fffff46a66a2adac-fffff46a66a2adad 2 bytes - win32kbase!UpdateWindowTreeDpiAwareness+1b0 (+0x26) [ eb 89:cc cc ] fffff46a66a2adb0-fffff46a66a2adbf 16 bytes - win32kbase!UpdateWindowTreeDpiAwareness+1b4 (+0x04) [ cc cc cc cc cc cc cc cc:40 53 48 83 ec 20 8b 05 ] fffff46a66a2adc1-fffff46a66a2adea 42 bytes - win32kbase!EnterSharedCrit+1 (+0x11) [ 89 5c 24 10 48 89 6c 24:8d 05 79 30 23 00 48 83 ] fffff46a66a2adf8-fffff46a66a2ae00 9 bytes - win32kbase!EnterSharedCrit+38 (+0x37) [ 8b d8 48 85 c0 74 12 33:89 05 e2 31 23 00 48 8b ] fffff46a66a2ae0d-fffff46a66a2ae27 27 bytes - win32kbase!EnterSharedCrit+4d (+0x15) [ 48 89 43 08 45 33 ff 0f:cc cc cc 40 53 48 81 ec ] fffff46a66a2ae29-fffff46a66a2ae37 15 bytes - win32kbase!EnterSharedCrit+69 (+0x1c) [ 4c 89 7c 24 38 49 8b f7:00 00 80 3d 36 29 23 00 ] fffff46a66a2ae44-fffff46a66a2ae4b 8 bytes - win32kbase!EnterSharedCrit+84 (+0x1b) [ 48 85 c0 74 03 48 8b 30:33 cc e8 65 a1 0a 00 48 ] fffff46a66a2ae58-fffff46a66a2ae69 18 bytes - win32kbase!EnterSharedCrit+98 (+0x14) [ 48 85 c0 74 09 48 3b 05:cc cc cc cc cc cc cc cc ] fffff46a66aa2160-fffff46a66aa2179 26 bytes - win32kbase!CitpCleanupGlobalImpactContext+40 (+0x77308) [ cc cc cc cc 48 89 5c 24:48 8b 02 49 3b 00 77 09 ] fffff46a66aa2186-fffff46a66aa219a 21 bytes - win32kbase!CitpContextCleanup+22 (+0x26) [ 84 c0 0f 84 ca 00 00 00:45 88 01 85 d2 0f 84 8d ] fffff46a66aa21a7-fffff46a66aa21ca 36 bytes - win32kbase!CitpContextCleanup+43 (+0x21) [ 4c 8b 4f 60 bb 2f cb 04:01 74 44 83 ea 02 75 2c ] fffff46a66aa21cc-fffff46a66aa2246 123 bytes - win32kbase!CitpContextCleanup+68 (+0x25) [ b6 01 48 6b cb 25 48 03:11 12 41 09 42 10 41 c6 ] fffff46a66aa2248-fffff46a66aa2254 13 bytes - win32kbase!CitpContextCleanup+e4 (+0x7c) [ 03 d8 49 ff c1 41 0f b6:81 ec 00 01 00 00 48 8b ] fffff46a66aa2256-fffff46a66aa225f 10 bytes - win32kbase!CitpContextCleanup+f2 (+0x0e) [ 03 d8 45 33 c9 45 33 c0:33 c4 48 89 45 27 44 8b ] fffff46a66aafd30-fffff46a66aafd53 36 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+24 (+0xdada) [ d8 85 c0 78 17 48 8d 4f:48 83 ec 28 48 8b ca e8 ] fffff46a66aafd55-fffff46a66aafd8c 56 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+49 (+0x25) [ 5c 24 30 48 8b 74 24 40:d1 4d 85 c9 0f 95 c2 41 ] fffff46a66aafd93-fffff46a66aafda0 14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+27 (+0x3e) [ 89 47 04 48 8b 4b 38 48:01 0f 84 e3 ec 06 00 41 ] fffff46a66aafda7-fffff46a66aafdb4 14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+3b (+0x14) [ 89 47 08 48 8b 4b 40 48:48 01 00 00 74 44 48 8b ] fffff46a66aafdbb-fffff46a66aafdc8 14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+4f (+0x14) [ 89 47 0c 48 8b 4b 48 48:01 0f ba 69 10 09 eb 2e ] fffff46a66aafdcf-fffff46a66aafddc 14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+63 (+0x14) [ 89 47 10 48 8b 4b 50 48:01 3a c2 74 1d c0 e2 03 ] fffff46a66aafde3-fffff46a66aafdf4 18 bytes - win32kbase!CInputSink::QueryInputQueueTypes+77 (+0x14) [ 48 8b 5c 24 30 89 47 14:92 4c 01 00 00 c6 00 01 ] fffff46a66aafdf6-fffff46a66aafe2f 58 bytes - win32kbase!CInputSink::QueryInputQueueTypes+8a (+0x13) [ cc cc cc cc cc cc cc cc:8a 89 4c 01 00 00 8a c1 ] fffff46a66ab0c10-fffff46a66ab0c22 19 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+d0 (+0xe1a) [ 10 0d 8b 43 10 48 89 5d:48 83 ec 28 8b ca 45 33 ] fffff46a66ab0c24-fffff46a66ab0c7e 91 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+e4 (+0x14) [ 8b d6 48 8b cb e8 de 06:83 c4 28 c3 cc cc cc cc ] fffff46a66ab0c80-fffff46a66ab0c8f 16 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+140 (+0x5c) [ 89 5d 20 0f ba e0 12 73:3b 08 77 2c 49 8b 00 48 ] fffff46a66ab0c91-fffff46a66ab0cd0 64 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+151 (+0x11) [ 8b cb e8 f8 05 00 00 84:3b ca 72 0c 48 8b 05 8c ] fffff46a66ab0cd3 - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+193 (+0x42) [ 5c:7c ] fffff46a66ab0cd5-fffff46a66ab0cfd 41 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+195 (+0x02) [ 30 40 8a c7 48 8b 7c 24:50 85 db 78 3f 48 8d 54 ] fffff46a66ab0cff-fffff46a66ab0d0f 17 bytes - win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand<<lambda_5a7aae95d2af49f4475e794f2d9a8b36> >+f (+0x2a) [ 00 48 8b c2 49 8b d8 48:8d 54 24 20 e8 34 23 00 ] fffff46a66c0f9b8-fffff46a66c0f9b9 2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+80 [ 40 bd:d0 c0 ] fffff46a66c0f9c0-fffff46a66c0f9c1 2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+88 (+0x08) [ 40 bd:f0 c3 ] fffff46a66c0f9c8-fffff46a66c0f9c9 2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+90 (+0x08) [ 40 bd:30 c4 ] fffff46a66c0f9d0-fffff46a66c0f9d2 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+98 (+0x08) [ 60 ee a9:b0 c0 ac ] fffff46a66c0f9d8-fffff46a66c0f9d9 2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+a0 (+0x08) [ 40 bd:c0 c0 ] fffff46a66c0f9e1-fffff46a66c0f9e2 2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+a9 (+0x09) [ bd ac:9e a0 ] fffff46a66c0f9e8-fffff46a66c0f9ea 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+b0 (+0x07) [ 70 ba ac:80 9e a0 ] fffff46a66c0f9f0-fffff46a66c0f9f2 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+b8 (+0x08) [ 40 bd ac:50 85 a0 ] fffff46a66c0f9f8-fffff46a66c0f9fa 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+c0 (+0x08) [ 70 ba ac:80 61 bf ] fffff46a66c0fa00-fffff46a66c0fa02 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+c8 (+0x08) [ 70 ba ac:10 df a9 ] fffff46a66c0fa08-fffff46a66c0fa09 2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+d0 (+0x08) [ 00 b8:b0 ef ] fffff46a66c0fa10-fffff46a66c0fa12 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+d8 (+0x08) [ 00 b8 aa:80 3d a9 ] fffff46a66c0fa18-fffff46a66c0fa1a 3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+e0 (+0x08) [ 10 36 bf:f0 9b a8 ] fffff46a66c0fa20-fffff46a66c0fa21 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable' (+0x08) [ 80 ba:d0 c0 ] fffff46a66c0fa28-fffff46a66c0fa2a 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+8 (+0x08) [ a0 bd ac:80 0f aa ] fffff46a66c0fa30-fffff46a66c0fa31 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+10 (+0x08) [ e0 bd:90 c3 ] fffff46a66c0fa38-fffff46a66c0fa39 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+18 (+0x08) [ 70 ba:90 c3 ] fffff46a66c0fa40-fffff46a66c0fa41 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+20 (+0x08) [ 70 ba:90 c3 ] fffff46a66c0fa48-fffff46a66c0fa4a 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+28 (+0x08) [ d0 9e a0:e0 f8 a9 ] fffff46a66c0fa50-fffff46a66c0fa52 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+30 (+0x08) [ 70 9e a0:b0 f7 a9 ] fffff46a66c0fa58-fffff46a66c0fa5a 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+38 (+0x08) [ 30 a2 a0:00 3e a9 ] fffff46a66c0fa61 - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+41 (+0x09) [ be:c4 ] fffff46a66c0fa68-fffff46a66c0fa6a 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+48 (+0x07) [ 00 b8 aa:c0 c0 ac ] fffff46a66c0fa70-fffff46a66c0fa72 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+50 (+0x08) [ 60 eb aa:90 c3 ac ] fffff46a66c0fa78-fffff46a66c0fa7a 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+58 (+0x08) [ 00 b8 aa:c0 c0 ac ] fffff46a66c0fa80-fffff46a66c0fa82 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+60 (+0x08) [ 90 85 a9:c0 c0 ac ] fffff46a66c0fa88-fffff46a66c0fa8a 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+68 (+0x08) [ 80 ba ac:10 df a9 ] fffff46a66c0fa90-fffff46a66c0fa92 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+70 (+0x08) [ 40 bd ac:10 df a9 ] fffff46a66c0fa98-fffff46a66c0fa99 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+78 (+0x08) [ 40 bd:d0 c0 ] fffff46a66c0faa0-fffff46a66c0faa1 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+80 (+0x08) [ 40 bd:f0 c3 ] fffff46a66c0faa8-fffff46a66c0faa9 2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+88 (+0x08) [ 40 bd:30 c4 ] fffff46a66c0fab0-fffff46a66c0fab2 3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+90 (+0x08) [ 40 26 ab:c0 c0 ac ] 972 errors : !win32kbase (fffff46a66a2ad71-fffff46a66c0fab2) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption MEMORY_CORRUPTOR: LARGE STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption ---------
Vanguard derken neyden kasdettiğinizi anlamadımİlk olarak BIOS güncel değil güncelleyin.
Vanguard kaldırın, DDU rehberine göre anlatımı uygulayıp güncel GPU sürücünüzü yükleyin.
Diğerlerini yaptınız mı? Valorant'ın yanında gelen yazılımdan bahsediyorum.Vanguard derken neyden kasdettiğinizi anlamadım
Hata çıkmayabilir.Memtest86'da bir hata çıkmadı. Sorunum hala devam ediyor çözemedim.