Sürekli mavi ekran hatası alıyorum

Bellek ile ilgili bir sorun var. Test edip sonucu paylaşın:


Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff80431bd212a, Address of the instruction which caused the bugcheck
Arg3: ffff968f355d39c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5093

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 56889

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c000001d

BUGCHECK_P2: fffff80431bd212a

BUGCHECK_P3: ffff968f355d39c0

BUGCHECK_P4: 0

CONTEXT:  ffff968f355d39c0 -- (.cxr 0xffff968f355d39c0)
rax=ffffac818ba6c400 rbx=ffffac818b230010 rcx=ffffac818ba6c4e0
rdx=ffffac81871d4000 rsi=ffffac818b230270 rdi=ffffac818b230270
rip=fffff80431bd212a rsp=ffff968f355d43c0 rbp=ffff968f355d4450
 r8=0000000000000fff  r9=0000000000000648 r10=00000000484c764e
r11=0000000000001001 r12=0000000000002500 r13=0000000000000001
r14=0000000000000000 r15=ffffac81871d4000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nvlddmkm+0xc1212a:
fffff804`31bd212a ea              ???
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  StartMenuExperienceHost.exe

STACK_TEXT: 
ffff968f`355d43c0 ffffac81`871d4000     : ffffac81`8b230270 00000000`00000000 ffffac81`871d4000 ffffac81`8b230270 : nvlddmkm+0xc1212a
ffff968f`355d43c8 ffffac81`8b230270     : 00000000`00000000 ffffac81`871d4000 ffffac81`8b230270 fffff804`31b93b83 : 0xffffac81`871d4000
ffff968f`355d43d0 00000000`00000000     : ffffac81`871d4000 ffffac81`8b230270 fffff804`31b93b83 ffffac81`00000000 : 0xffffac81`8b230270


SYMBOL_NAME:  nvlddmkm+c1212a

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffff968f355d39c0 ; kb

BUCKET_ID_FUNC_OFFSET:  c1212a

FAILURE_BUCKET_ID:  0x3B_c000001d_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4904ec20-5af6-c77a-8cce-daedc0fbe1bd}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffc78269d75080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3827

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10402

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffc78269d75080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

ERROR_CODE: (NTSTATUS) 0x68ed5040 - <Unable to get error code text>

CRITICAL_PROCESS_REPORTGUID:  {9dd4b196-400f-4dd1-93b2-b8fe2ae3c160}

IMAGE_NAME:  psmsrv.dll

MODULE_NAME: psmsrv

FAULTING_MODULE: 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
fffffd89`42099938 fffff805`4a517622     : 00000000`000000ef ffffc782`69d75080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffd89`42099940 fffff805`4a40b22f     : 00000000`00000000 fffff805`49e74901 00000000`00000002 fffff805`49e74c9b : nt!PspCatchCriticalBreak+0x10e
fffffd89`420999e0 fffff805`4a24e820     : ffffc782`00000000 00000000`00000000 ffffc782`69d75080 ffffc782`69d754b8 : nt!PspTerminateAllThreads+0x1bc5ff
fffffd89`42099a50 fffff805`4a24e61c     : ffffc782`69d75080 00000000`00000000 000000b6`973ff60c fffff805`4a1ea7fa : nt!PspTerminateProcess+0xe0
fffffd89`42099a90 fffff805`49fef378     : ffffc782`69d75080 ffffc782`68ed5040 fffffd89`42099b80 ffffc782`69d75080 : nt!NtTerminateProcess+0x9c
fffffd89`42099b00 00007ffd`7006b314     : 00007ffd`700e1643 00007ffd`7010ff74 000000b6`973ff5d0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b6`973fd568 00007ffd`700e1643     : 00007ffd`7010ff74 000000b6`973ff5d0 00000000`00000000 00007ffd`6ffd0000 : 0x00007ffd`7006b314
000000b6`973fd570 00007ffd`7010ff74     : 000000b6`973ff5d0 00000000`00000000 00007ffd`6ffd0000 00000000`00000004 : 0x00007ffd`700e1643
000000b6`973fd578 000000b6`973ff5d0     : 00000000`00000000 00007ffd`6ffd0000 00000000`00000004 00007ffd`7007231d : 0x00007ffd`7010ff74
000000b6`973fd580 00000000`00000000     : 00007ffd`6ffd0000 00000000`00000004 00007ffd`7007231d 00007ffd`7010ff74 : 0x000000b6`973ff5d0


STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_68ed5040_psmsrv.dll!PsmpGetNextApplication_IMAGE_psmsrv.dll

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ec760983-8c38-e6d8-0754-095111a3831a}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbb0135352028, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8054564092e, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3421

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3462

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffbb0135352028

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8054564092e

BUGCHECK_P4: 2

READ_ADDRESS: fffff805460fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8054600f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8054600f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffbb0135352028

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvsphelper64.exe

TRAP_FRAME:  ffffe00e3574d060 -- (.trap 0xffffe00e3574d060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffff3160 rbx=0000000000000000 rcx=ffff8f8027b74598
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8054564092e rsp=ffffe00e3574d1f0 rbp=ffffe00e3574d340
 r8=0000000000000018  r9=ffff8f8027b40000 r10=0000000000000000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ExFreeHeapPool+0x21e:
fffff805`4564092e 488b5328        mov     rdx,qword ptr [rbx+28h] ds:00000000`00000028=????????????????
Resetting default scope

STACK_TEXT: 
ffffe00e`3574cdb8 fffff805`45835c1d     : 00000000`00000050 ffffbb01`35352028 00000000`00000000 ffffe00e`3574d060 : nt!KeBugCheckEx
ffffe00e`3574cdc0 fffff805`45612ce0     : 00000000`00000000 00000000`00000000 ffffe00e`3574d0e0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
ffffe00e`3574cec0 fffff805`457ebb1e     : ffff8f80`27b03100 fffffbdc`1796e5b3 00000000`00000001 ffffbb01`3fc67180 : nt!MmAccessFault+0x400
ffffe00e`3574d060 fffff805`4564092e     : ffffbb01`000000d1 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x35e
ffffe00e`3574d1f0 fffff805`45dc2019     : 00000000`00000005 ffffbb01`3fc67080 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x21e
ffffe00e`3574d2d0 fffff805`45a0b330     : ffffe00e`3574d5b0 00000000`00000001 ffffbb01`3e4e0a50 00000000`00000000 : nt!ExFreePool+0x9
ffffe00e`3574d300 fffff805`45a0af29     : fffff805`45751a00 fffff805`456e73cf ffffe00e`3574d848 fffff805`00000000 : nt!ObWaitForMultipleObjects+0x3d0
ffffe00e`3574d800 fffff805`457ef378     : ffffe00e`3574db18 00000000`00000000 ffffbb01`3fc67080 ffffbb01`3f12a790 : nt!NtWaitForMultipleObjects+0x119
ffffe00e`3574da90 00007ffa`314eb8e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000026`38aff1d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`314eb8e4


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.329

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {abe5a486-9a07-9785-197c-226bb9273d2c}

Followup:     Pool_corruption
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffa00107d64410, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa00107d64368, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3687

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11692

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffa00107d64410

BUGCHECK_P3: ffffa00107d64368

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa00107d64410 -- (.trap 0xffffa00107d64410)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa308fc406b18 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa309063a8000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037ee18e84 rsp=ffffa00107d645a0 rbp=ffffa00107d646a0
 r8=ffffa308fc406b08  r9=ffffa308fc406b18 r10=ffffa30905650000
r11=00000000000000d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!RtlpHpLfhSlotAllocate+0x1d43c4:
fffff803`7ee18e84 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa00107d64368 -- (.exr 0xffffa00107d64368)
ExceptionAddress: fffff8037ee18e84 (nt!RtlpHpLfhSlotAllocate+0x00000000001d43c4)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WerFault.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffa001`07d640e8 fffff803`7edef929     : 00000000`00000139 00000000`00000003 ffffa001`07d64410 ffffa001`07d64368 : nt!KeBugCheckEx
ffffa001`07d640f0 fffff803`7edefd50     : ffffa309`010f78a0 ffffa309`06bd49a0 00000000`00000000 ffffa001`07d64340 : nt!KiBugCheckDispatch+0x69
ffffa001`07d64230 fffff803`7edee0e3     : 00000000`00000000 00000000`00000004 00000000`00000000 ffffa309`01105d90 : nt!KiFastFailDispatch+0xd0
ffffa001`07d64410 fffff803`7ee18e84     : ffffa309`06bd4980 ffffa001`07d646e4 ffffa309`06bd49a0 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffa001`07d645a0 fffff803`7ec44141     : ffffa308`fc402340 ffffa308`fc406940 ffffa308`fc406b00 00000040`00000040 : nt!RtlpHpLfhSlotAllocate+0x1d43c4
ffffa001`07d646f0 fffff803`7f3c2094     : ffffa309`00000000 00000000`00000000 00000000`20206f49 ffffa308`fcaaf7a0 : nt!ExAllocateHeapPool+0x2b1
ffffa001`07d64830 fffff803`7ec308b0     : 00007fff`ffff0000 00000000`00000208 00000000`00000014 ffffa001`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffa001`07d64880 fffff803`7ec30819     : 00000000`00000000 00007fff`ffff0000 ffffa001`20206f49 00000000`00000000 : nt!ExAllocatePoolWithQuotaTag+0x60
ffffa001`07d64900 fffff803`7f029ea1     : 00000000`beaa0251 00000000`00000001 00000000`00000000 ffffa309`05e88200 : nt!IopVerifierExAllocatePoolWithQuota+0x21
ffffa001`07d64930 fffff803`7f029cf1     : 00000000`000003d4 00000001`2e8f7508 00000000`00000000 00000000`00000000 : nt!BuildQueryDirectoryIrp+0x171
ffffa001`07d649e0 fffff803`7edef378     : 00000000`000003d4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryDirectoryFileEx+0x81
ffffa001`07d64a90 00007ffe`8efad5c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000001`2e8f74e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8efad5c4


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb78696752028, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8026f04092e, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for mountmgr.sys

Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4249

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17829

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffb78696752028

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8026f04092e

BUGCHECK_P4: 2

READ_ADDRESS: fffff8026fafa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026fa0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8026fa0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffb78696752028

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

TRAP_FRAME:  ffff9183c67b7650 -- (.trap 0xffff9183c67b7650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000009ec80 rbx=0000000000000000 rcx=ffffb78696825ee0
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026f04092e rsp=ffff9183c67b77e0 rbp=ffffb786968ada60
 r8=0000000000000018  r9=ffffb78696802000 r10=0000000000000000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ExFreeHeapPool+0x21e:
fffff802`6f04092e 488b5328        mov     rdx,qword ptr [rbx+28h] ds:00000000`00000028=????????????????
Resetting default scope

STACK_TEXT: 
ffff9183`c67b73a8 fffff802`6f235c1d     : 00000000`00000050 ffffb786`96752028 00000000`00000000 ffff9183`c67b7650 : nt!KeBugCheckEx
ffff9183`c67b73b0 fffff802`6f012ce0     : fffff802`6befb180 00000000`00000000 ffff9183`c67b76d0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
ffff9183`c67b74b0 fffff802`6f1ebb1e     : 00000000`00000000 fffff802`72cd1677 ffffb786`a0018460 fffff802`6f1364d5 : nt!MmAccessFault+0x400
ffff9183`c67b7650 fffff802`6f04092e     : 00000000`00000040 fffff802`73941033 00000000`00000020 fffff802`6f046f01 : nt!KiPageFault+0x35e
ffff9183`c67b77e0 fffff802`6f7c2019     : ffffb786`968ada60 fffff802`6f4122d2 ffffb786`9fb13e40 01000000`00100000 : nt!ExFreeHeapPool+0x21e
ffff9183`c67b78c0 fffff802`6f40c6e4     : 00000000`00000000 ffff9183`c67b7ae9 00000000`c0000010 00000000`00000000 : nt!ExFreePool+0x9
ffff9183`c67b78f0 fffff802`6f40c4f8     : ffffb786`9fb13e00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194
ffff9183`c67b7950 fffff802`6f024e97     : 00000000`00000000 00000000`00000000 ffff9183`c67b7ae9 ffffb786`9fb13e40 : nt!ObpRemoveObjectRoutine+0x88
ffff9183`c67b79b0 fffff802`6f00198e     : 00000000`00000000 ffffb786`98d30cf0 00000000`00000000 01000000`00100000 : nt!ObfDereferenceObjectWithTag+0xc7
ffff9183`c67b79f0 fffff802`72d6942c     : 00000000`00000000 ffff9183`c67b7aa0 ffffc988`30ef1c00 00000000`00000000 : nt!HalPutDmaAdapter+0xe
ffff9183`c67b7a20 00000000`00000000     : ffff9183`c67b7aa0 ffffc988`30ef1c00 00000000`00000000 ffffc988`30ef1c00 : mountmgr+0x942c


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    fffff46a66a2ad71-fffff46a66a2ad84  20 bytes - win32kbase!UpdateWindowTreeDpiAwareness+175
    [ c3 cc 41 8b 85 18 01 00:48 83 c4 60 5f c3 cc 48 ]
    fffff46a66a2ad86-fffff46a66a2ada5  32 bytes - win32kbase!UpdateWindowTreeDpiAwareness+18a (+0x15)
    [ 43 28 48 8b 88 00 01 00:15 15 85 25 00 e8 90 a6 ]
    fffff46a66a2adac-fffff46a66a2adad  2 bytes - win32kbase!UpdateWindowTreeDpiAwareness+1b0 (+0x26)
    [ eb 89:cc cc ]
    fffff46a66a2adb0-fffff46a66a2adbf  16 bytes - win32kbase!UpdateWindowTreeDpiAwareness+1b4 (+0x04)
    [ cc cc cc cc cc cc cc cc:40 53 48 83 ec 20 8b 05 ]
    fffff46a66a2adc1-fffff46a66a2adea  42 bytes - win32kbase!EnterSharedCrit+1 (+0x11)
    [ 89 5c 24 10 48 89 6c 24:8d 05 79 30 23 00 48 83 ]
    fffff46a66a2adf8-fffff46a66a2ae00  9 bytes - win32kbase!EnterSharedCrit+38 (+0x37)
    [ 8b d8 48 85 c0 74 12 33:89 05 e2 31 23 00 48 8b ]
    fffff46a66a2ae0d-fffff46a66a2ae27  27 bytes - win32kbase!EnterSharedCrit+4d (+0x15)
    [ 48 89 43 08 45 33 ff 0f:cc cc cc 40 53 48 81 ec ]
    fffff46a66a2ae29-fffff46a66a2ae37  15 bytes - win32kbase!EnterSharedCrit+69 (+0x1c)
    [ 4c 89 7c 24 38 49 8b f7:00 00 80 3d 36 29 23 00 ]
    fffff46a66a2ae44-fffff46a66a2ae4b  8 bytes - win32kbase!EnterSharedCrit+84 (+0x1b)
    [ 48 85 c0 74 03 48 8b 30:33 cc e8 65 a1 0a 00 48 ]
    fffff46a66a2ae58-fffff46a66a2ae69  18 bytes - win32kbase!EnterSharedCrit+98 (+0x14)
    [ 48 85 c0 74 09 48 3b 05:cc cc cc cc cc cc cc cc ]
    fffff46a66aa2160-fffff46a66aa2179  26 bytes - win32kbase!CitpCleanupGlobalImpactContext+40 (+0x77308)
    [ cc cc cc cc 48 89 5c 24:48 8b 02 49 3b 00 77 09 ]
    fffff46a66aa2186-fffff46a66aa219a  21 bytes - win32kbase!CitpContextCleanup+22 (+0x26)
    [ 84 c0 0f 84 ca 00 00 00:45 88 01 85 d2 0f 84 8d ]
    fffff46a66aa21a7-fffff46a66aa21ca  36 bytes - win32kbase!CitpContextCleanup+43 (+0x21)
    [ 4c 8b 4f 60 bb 2f cb 04:01 74 44 83 ea 02 75 2c ]
    fffff46a66aa21cc-fffff46a66aa2246  123 bytes - win32kbase!CitpContextCleanup+68 (+0x25)
    [ b6 01 48 6b cb 25 48 03:11 12 41 09 42 10 41 c6 ]
    fffff46a66aa2248-fffff46a66aa2254  13 bytes - win32kbase!CitpContextCleanup+e4 (+0x7c)
    [ 03 d8 49 ff c1 41 0f b6:81 ec 00 01 00 00 48 8b ]
    fffff46a66aa2256-fffff46a66aa225f  10 bytes - win32kbase!CitpContextCleanup+f2 (+0x0e)
    [ 03 d8 45 33 c9 45 33 c0:33 c4 48 89 45 27 44 8b ]
    fffff46a66aafd30-fffff46a66aafd53  36 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+24 (+0xdada)
    [ d8 85 c0 78 17 48 8d 4f:48 83 ec 28 48 8b ca e8 ]
    fffff46a66aafd55-fffff46a66aafd8c  56 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+49 (+0x25)
    [ 5c 24 30 48 8b 74 24 40:d1 4d 85 c9 0f 95 c2 41 ]
    fffff46a66aafd93-fffff46a66aafda0  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+27 (+0x3e)
    [ 89 47 04 48 8b 4b 38 48:01 0f 84 e3 ec 06 00 41 ]
    fffff46a66aafda7-fffff46a66aafdb4  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+3b (+0x14)
    [ 89 47 08 48 8b 4b 40 48:48 01 00 00 74 44 48 8b ]
    fffff46a66aafdbb-fffff46a66aafdc8  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+4f (+0x14)
    [ 89 47 0c 48 8b 4b 48 48:01 0f ba 69 10 09 eb 2e ]
    fffff46a66aafdcf-fffff46a66aafddc  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+63 (+0x14)
    [ 89 47 10 48 8b 4b 50 48:01 3a c2 74 1d c0 e2 03 ]
    fffff46a66aafde3-fffff46a66aafdf4  18 bytes - win32kbase!CInputSink::QueryInputQueueTypes+77 (+0x14)
    [ 48 8b 5c 24 30 89 47 14:92 4c 01 00 00 c6 00 01 ]
    fffff46a66aafdf6-fffff46a66aafe2f  58 bytes - win32kbase!CInputSink::QueryInputQueueTypes+8a (+0x13)
    [ cc cc cc cc cc cc cc cc:8a 89 4c 01 00 00 8a c1 ]
    fffff46a66ab0c10-fffff46a66ab0c22  19 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+d0 (+0xe1a)
    [ 10 0d 8b 43 10 48 89 5d:48 83 ec 28 8b ca 45 33 ]
    fffff46a66ab0c24-fffff46a66ab0c7e  91 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+e4 (+0x14)
    [ 8b d6 48 8b cb e8 de 06:83 c4 28 c3 cc cc cc cc ]
    fffff46a66ab0c80-fffff46a66ab0c8f  16 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+140 (+0x5c)
    [ 89 5d 20 0f ba e0 12 73:3b 08 77 2c 49 8b 00 48 ]
    fffff46a66ab0c91-fffff46a66ab0cd0  64 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+151 (+0x11)
    [ 8b cb e8 f8 05 00 00 84:3b ca 72 0c 48 8b 05 8c ]
    fffff46a66ab0cd3 - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+193 (+0x42)
    [ 5c:7c ]
    fffff46a66ab0cd5-fffff46a66ab0cfd  41 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+195 (+0x02)
    [ 30 40 8a c7 48 8b 7c 24:50 85 db 78 3f 48 8d 54 ]
    fffff46a66ab0cff-fffff46a66ab0d0f  17 bytes - win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand<<lambda_5a7aae95d2af49f4475e794f2d9a8b36> >+f (+0x2a)
    [ 00 48 8b c2 49 8b d8 48:8d 54 24 20 e8 34 23 00 ]
    fffff46a66c0f9b8-fffff46a66c0f9b9  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+80
    [ 40 bd:d0 c0 ]
    fffff46a66c0f9c0-fffff46a66c0f9c1  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+88 (+0x08)
    [ 40 bd:f0 c3 ]
    fffff46a66c0f9c8-fffff46a66c0f9c9  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+90 (+0x08)
    [ 40 bd:30 c4 ]
    fffff46a66c0f9d0-fffff46a66c0f9d2  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+98 (+0x08)
    [ 60 ee a9:b0 c0 ac ]
    fffff46a66c0f9d8-fffff46a66c0f9d9  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+a0 (+0x08)
    [ 40 bd:c0 c0 ]
    fffff46a66c0f9e1-fffff46a66c0f9e2  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+a9 (+0x09)
    [ bd ac:9e a0 ]
    fffff46a66c0f9e8-fffff46a66c0f9ea  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+b0 (+0x07)
    [ 70 ba ac:80 9e a0 ]
    fffff46a66c0f9f0-fffff46a66c0f9f2  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+b8 (+0x08)
    [ 40 bd ac:50 85 a0 ]
    fffff46a66c0f9f8-fffff46a66c0f9fa  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+c0 (+0x08)
    [ 70 ba ac:80 61 bf ]
    fffff46a66c0fa00-fffff46a66c0fa02  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+c8 (+0x08)
    [ 70 ba ac:10 df a9 ]
    fffff46a66c0fa08-fffff46a66c0fa09  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+d0 (+0x08)
    [ 00 b8:b0 ef ]
    fffff46a66c0fa10-fffff46a66c0fa12  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+d8 (+0x08)
    [ 00 b8 aa:80 3d a9 ]
    fffff46a66c0fa18-fffff46a66c0fa1a  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+e0 (+0x08)
    [ 10 36 bf:f0 9b a8 ]
    fffff46a66c0fa20-fffff46a66c0fa21  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable' (+0x08)
    [ 80 ba:d0 c0 ]
    fffff46a66c0fa28-fffff46a66c0fa2a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+8 (+0x08)
    [ a0 bd ac:80 0f aa ]
    fffff46a66c0fa30-fffff46a66c0fa31  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+10 (+0x08)
    [ e0 bd:90 c3 ]
    fffff46a66c0fa38-fffff46a66c0fa39  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+18 (+0x08)
    [ 70 ba:90 c3 ]
    fffff46a66c0fa40-fffff46a66c0fa41  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+20 (+0x08)
    [ 70 ba:90 c3 ]
    fffff46a66c0fa48-fffff46a66c0fa4a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+28 (+0x08)
    [ d0 9e a0:e0 f8 a9 ]
    fffff46a66c0fa50-fffff46a66c0fa52  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+30 (+0x08)
    [ 70 9e a0:b0 f7 a9 ]
    fffff46a66c0fa58-fffff46a66c0fa5a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+38 (+0x08)
    [ 30 a2 a0:00 3e a9 ]
    fffff46a66c0fa61 - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+41 (+0x09)
    [ be:c4 ]
    fffff46a66c0fa68-fffff46a66c0fa6a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+48 (+0x07)
    [ 00 b8 aa:c0 c0 ac ]
    fffff46a66c0fa70-fffff46a66c0fa72  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+50 (+0x08)
    [ 60 eb aa:90 c3 ac ]
    fffff46a66c0fa78-fffff46a66c0fa7a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+58 (+0x08)
    [ 00 b8 aa:c0 c0 ac ]
    fffff46a66c0fa80-fffff46a66c0fa82  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+60 (+0x08)
    [ 90 85 a9:c0 c0 ac ]
    fffff46a66c0fa88-fffff46a66c0fa8a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+68 (+0x08)
    [ 80 ba ac:10 df a9 ]
    fffff46a66c0fa90-fffff46a66c0fa92  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+70 (+0x08)
    [ 40 bd ac:10 df a9 ]
    fffff46a66c0fa98-fffff46a66c0fa99  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+78 (+0x08)
    [ 40 bd:d0 c0 ]
    fffff46a66c0faa0-fffff46a66c0faa1  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+80 (+0x08)
    [ 40 bd:f0 c3 ]
    fffff46a66c0faa8-fffff46a66c0faa9  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+88 (+0x08)
    [ 40 bd:30 c4 ]
    fffff46a66c0fab0-fffff46a66c0fab2  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+90 (+0x08)
    [ 40 26 ab:c0 c0 ac ]
972 errors : !win32kbase (fffff46a66a2ad71-fffff46a66c0fab2)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
 

Memtest86'da bir hata çıkmadı. Sorunum hala devam ediyor çözemedim.
Vanguard derken neyden kasdettiğinizi anlamadım
 
Son düzenleme:
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…