Sürekli mavi ekran hatası alıyorum

Bellek ile ilgili bir sorun var. Test edip sonucu paylaşın:


Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff80431bd212a, Address of the instruction which caused the bugcheck
Arg3: ffff968f355d39c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5093

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 56889

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c000001d

BUGCHECK_P2: fffff80431bd212a

BUGCHECK_P3: ffff968f355d39c0

BUGCHECK_P4: 0

CONTEXT:  ffff968f355d39c0 -- (.cxr 0xffff968f355d39c0)
rax=ffffac818ba6c400 rbx=ffffac818b230010 rcx=ffffac818ba6c4e0
rdx=ffffac81871d4000 rsi=ffffac818b230270 rdi=ffffac818b230270
rip=fffff80431bd212a rsp=ffff968f355d43c0 rbp=ffff968f355d4450
 r8=0000000000000fff  r9=0000000000000648 r10=00000000484c764e
r11=0000000000001001 r12=0000000000002500 r13=0000000000000001
r14=0000000000000000 r15=ffffac81871d4000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nvlddmkm+0xc1212a:
fffff804`31bd212a ea              ???
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  StartMenuExperienceHost.exe

STACK_TEXT: 
ffff968f`355d43c0 ffffac81`871d4000     : ffffac81`8b230270 00000000`00000000 ffffac81`871d4000 ffffac81`8b230270 : nvlddmkm+0xc1212a
ffff968f`355d43c8 ffffac81`8b230270     : 00000000`00000000 ffffac81`871d4000 ffffac81`8b230270 fffff804`31b93b83 : 0xffffac81`871d4000
ffff968f`355d43d0 00000000`00000000     : ffffac81`871d4000 ffffac81`8b230270 fffff804`31b93b83 ffffac81`00000000 : 0xffffac81`8b230270


SYMBOL_NAME:  nvlddmkm+c1212a

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffff968f355d39c0 ; kb

BUCKET_ID_FUNC_OFFSET:  c1212a

FAILURE_BUCKET_ID:  0x3B_c000001d_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4904ec20-5af6-c77a-8cce-daedc0fbe1bd}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffc78269d75080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3827

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10402

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffc78269d75080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

ERROR_CODE: (NTSTATUS) 0x68ed5040 - <Unable to get error code text>

CRITICAL_PROCESS_REPORTGUID:  {9dd4b196-400f-4dd1-93b2-b8fe2ae3c160}

IMAGE_NAME:  psmsrv.dll

MODULE_NAME: psmsrv

FAULTING_MODULE: 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
fffffd89`42099938 fffff805`4a517622     : 00000000`000000ef ffffc782`69d75080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffd89`42099940 fffff805`4a40b22f     : 00000000`00000000 fffff805`49e74901 00000000`00000002 fffff805`49e74c9b : nt!PspCatchCriticalBreak+0x10e
fffffd89`420999e0 fffff805`4a24e820     : ffffc782`00000000 00000000`00000000 ffffc782`69d75080 ffffc782`69d754b8 : nt!PspTerminateAllThreads+0x1bc5ff
fffffd89`42099a50 fffff805`4a24e61c     : ffffc782`69d75080 00000000`00000000 000000b6`973ff60c fffff805`4a1ea7fa : nt!PspTerminateProcess+0xe0
fffffd89`42099a90 fffff805`49fef378     : ffffc782`69d75080 ffffc782`68ed5040 fffffd89`42099b80 ffffc782`69d75080 : nt!NtTerminateProcess+0x9c
fffffd89`42099b00 00007ffd`7006b314     : 00007ffd`700e1643 00007ffd`7010ff74 000000b6`973ff5d0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b6`973fd568 00007ffd`700e1643     : 00007ffd`7010ff74 000000b6`973ff5d0 00000000`00000000 00007ffd`6ffd0000 : 0x00007ffd`7006b314
000000b6`973fd570 00007ffd`7010ff74     : 000000b6`973ff5d0 00000000`00000000 00007ffd`6ffd0000 00000000`00000004 : 0x00007ffd`700e1643
000000b6`973fd578 000000b6`973ff5d0     : 00000000`00000000 00007ffd`6ffd0000 00000000`00000004 00007ffd`7007231d : 0x00007ffd`7010ff74
000000b6`973fd580 00000000`00000000     : 00007ffd`6ffd0000 00000000`00000004 00007ffd`7007231d 00007ffd`7010ff74 : 0x000000b6`973ff5d0


STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_68ed5040_psmsrv.dll!PsmpGetNextApplication_IMAGE_psmsrv.dll

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ec760983-8c38-e6d8-0754-095111a3831a}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbb0135352028, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8054564092e, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3421

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3462

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffbb0135352028

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8054564092e

BUGCHECK_P4: 2

READ_ADDRESS: fffff805460fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8054600f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8054600f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffbb0135352028

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvsphelper64.exe

TRAP_FRAME:  ffffe00e3574d060 -- (.trap 0xffffe00e3574d060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffff3160 rbx=0000000000000000 rcx=ffff8f8027b74598
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8054564092e rsp=ffffe00e3574d1f0 rbp=ffffe00e3574d340
 r8=0000000000000018  r9=ffff8f8027b40000 r10=0000000000000000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ExFreeHeapPool+0x21e:
fffff805`4564092e 488b5328        mov     rdx,qword ptr [rbx+28h] ds:00000000`00000028=????????????????
Resetting default scope

STACK_TEXT: 
ffffe00e`3574cdb8 fffff805`45835c1d     : 00000000`00000050 ffffbb01`35352028 00000000`00000000 ffffe00e`3574d060 : nt!KeBugCheckEx
ffffe00e`3574cdc0 fffff805`45612ce0     : 00000000`00000000 00000000`00000000 ffffe00e`3574d0e0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
ffffe00e`3574cec0 fffff805`457ebb1e     : ffff8f80`27b03100 fffffbdc`1796e5b3 00000000`00000001 ffffbb01`3fc67180 : nt!MmAccessFault+0x400
ffffe00e`3574d060 fffff805`4564092e     : ffffbb01`000000d1 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x35e
ffffe00e`3574d1f0 fffff805`45dc2019     : 00000000`00000005 ffffbb01`3fc67080 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x21e
ffffe00e`3574d2d0 fffff805`45a0b330     : ffffe00e`3574d5b0 00000000`00000001 ffffbb01`3e4e0a50 00000000`00000000 : nt!ExFreePool+0x9
ffffe00e`3574d300 fffff805`45a0af29     : fffff805`45751a00 fffff805`456e73cf ffffe00e`3574d848 fffff805`00000000 : nt!ObWaitForMultipleObjects+0x3d0
ffffe00e`3574d800 fffff805`457ef378     : ffffe00e`3574db18 00000000`00000000 ffffbb01`3fc67080 ffffbb01`3f12a790 : nt!NtWaitForMultipleObjects+0x119
ffffe00e`3574da90 00007ffa`314eb8e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000026`38aff1d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`314eb8e4


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.329

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {abe5a486-9a07-9785-197c-226bb9273d2c}

Followup:     Pool_corruption
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffa00107d64410, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa00107d64368, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3687

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11692

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffa00107d64410

BUGCHECK_P3: ffffa00107d64368

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa00107d64410 -- (.trap 0xffffa00107d64410)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa308fc406b18 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa309063a8000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037ee18e84 rsp=ffffa00107d645a0 rbp=ffffa00107d646a0
 r8=ffffa308fc406b08  r9=ffffa308fc406b18 r10=ffffa30905650000
r11=00000000000000d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!RtlpHpLfhSlotAllocate+0x1d43c4:
fffff803`7ee18e84 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa00107d64368 -- (.exr 0xffffa00107d64368)
ExceptionAddress: fffff8037ee18e84 (nt!RtlpHpLfhSlotAllocate+0x00000000001d43c4)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WerFault.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffa001`07d640e8 fffff803`7edef929     : 00000000`00000139 00000000`00000003 ffffa001`07d64410 ffffa001`07d64368 : nt!KeBugCheckEx
ffffa001`07d640f0 fffff803`7edefd50     : ffffa309`010f78a0 ffffa309`06bd49a0 00000000`00000000 ffffa001`07d64340 : nt!KiBugCheckDispatch+0x69
ffffa001`07d64230 fffff803`7edee0e3     : 00000000`00000000 00000000`00000004 00000000`00000000 ffffa309`01105d90 : nt!KiFastFailDispatch+0xd0
ffffa001`07d64410 fffff803`7ee18e84     : ffffa309`06bd4980 ffffa001`07d646e4 ffffa309`06bd49a0 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffa001`07d645a0 fffff803`7ec44141     : ffffa308`fc402340 ffffa308`fc406940 ffffa308`fc406b00 00000040`00000040 : nt!RtlpHpLfhSlotAllocate+0x1d43c4
ffffa001`07d646f0 fffff803`7f3c2094     : ffffa309`00000000 00000000`00000000 00000000`20206f49 ffffa308`fcaaf7a0 : nt!ExAllocateHeapPool+0x2b1
ffffa001`07d64830 fffff803`7ec308b0     : 00007fff`ffff0000 00000000`00000208 00000000`00000014 ffffa001`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffa001`07d64880 fffff803`7ec30819     : 00000000`00000000 00007fff`ffff0000 ffffa001`20206f49 00000000`00000000 : nt!ExAllocatePoolWithQuotaTag+0x60
ffffa001`07d64900 fffff803`7f029ea1     : 00000000`beaa0251 00000000`00000001 00000000`00000000 ffffa309`05e88200 : nt!IopVerifierExAllocatePoolWithQuota+0x21
ffffa001`07d64930 fffff803`7f029cf1     : 00000000`000003d4 00000001`2e8f7508 00000000`00000000 00000000`00000000 : nt!BuildQueryDirectoryIrp+0x171
ffffa001`07d649e0 fffff803`7edef378     : 00000000`000003d4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryDirectoryFileEx+0x81
ffffa001`07d64a90 00007ffe`8efad5c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000001`2e8f74e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8efad5c4


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb78696752028, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8026f04092e, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for mountmgr.sys

Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4249

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17829

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffb78696752028

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8026f04092e

BUGCHECK_P4: 2

READ_ADDRESS: fffff8026fafa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026fa0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8026fa0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffb78696752028

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

TRAP_FRAME:  ffff9183c67b7650 -- (.trap 0xffff9183c67b7650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000009ec80 rbx=0000000000000000 rcx=ffffb78696825ee0
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026f04092e rsp=ffff9183c67b77e0 rbp=ffffb786968ada60
 r8=0000000000000018  r9=ffffb78696802000 r10=0000000000000000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ExFreeHeapPool+0x21e:
fffff802`6f04092e 488b5328        mov     rdx,qword ptr [rbx+28h] ds:00000000`00000028=????????????????
Resetting default scope

STACK_TEXT: 
ffff9183`c67b73a8 fffff802`6f235c1d     : 00000000`00000050 ffffb786`96752028 00000000`00000000 ffff9183`c67b7650 : nt!KeBugCheckEx
ffff9183`c67b73b0 fffff802`6f012ce0     : fffff802`6befb180 00000000`00000000 ffff9183`c67b76d0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
ffff9183`c67b74b0 fffff802`6f1ebb1e     : 00000000`00000000 fffff802`72cd1677 ffffb786`a0018460 fffff802`6f1364d5 : nt!MmAccessFault+0x400
ffff9183`c67b7650 fffff802`6f04092e     : 00000000`00000040 fffff802`73941033 00000000`00000020 fffff802`6f046f01 : nt!KiPageFault+0x35e
ffff9183`c67b77e0 fffff802`6f7c2019     : ffffb786`968ada60 fffff802`6f4122d2 ffffb786`9fb13e40 01000000`00100000 : nt!ExFreeHeapPool+0x21e
ffff9183`c67b78c0 fffff802`6f40c6e4     : 00000000`00000000 ffff9183`c67b7ae9 00000000`c0000010 00000000`00000000 : nt!ExFreePool+0x9
ffff9183`c67b78f0 fffff802`6f40c4f8     : ffffb786`9fb13e00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194
ffff9183`c67b7950 fffff802`6f024e97     : 00000000`00000000 00000000`00000000 ffff9183`c67b7ae9 ffffb786`9fb13e40 : nt!ObpRemoveObjectRoutine+0x88
ffff9183`c67b79b0 fffff802`6f00198e     : 00000000`00000000 ffffb786`98d30cf0 00000000`00000000 01000000`00100000 : nt!ObfDereferenceObjectWithTag+0xc7
ffff9183`c67b79f0 fffff802`72d6942c     : 00000000`00000000 ffff9183`c67b7aa0 ffffc988`30ef1c00 00000000`00000000 : nt!HalPutDmaAdapter+0xe
ffff9183`c67b7a20 00000000`00000000     : ffff9183`c67b7aa0 ffffc988`30ef1c00 00000000`00000000 ffffc988`30ef1c00 : mountmgr+0x942c


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    fffff46a66a2ad71-fffff46a66a2ad84  20 bytes - win32kbase!UpdateWindowTreeDpiAwareness+175
    [ c3 cc 41 8b 85 18 01 00:48 83 c4 60 5f c3 cc 48 ]
    fffff46a66a2ad86-fffff46a66a2ada5  32 bytes - win32kbase!UpdateWindowTreeDpiAwareness+18a (+0x15)
    [ 43 28 48 8b 88 00 01 00:15 15 85 25 00 e8 90 a6 ]
    fffff46a66a2adac-fffff46a66a2adad  2 bytes - win32kbase!UpdateWindowTreeDpiAwareness+1b0 (+0x26)
    [ eb 89:cc cc ]
    fffff46a66a2adb0-fffff46a66a2adbf  16 bytes - win32kbase!UpdateWindowTreeDpiAwareness+1b4 (+0x04)
    [ cc cc cc cc cc cc cc cc:40 53 48 83 ec 20 8b 05 ]
    fffff46a66a2adc1-fffff46a66a2adea  42 bytes - win32kbase!EnterSharedCrit+1 (+0x11)
    [ 89 5c 24 10 48 89 6c 24:8d 05 79 30 23 00 48 83 ]
    fffff46a66a2adf8-fffff46a66a2ae00  9 bytes - win32kbase!EnterSharedCrit+38 (+0x37)
    [ 8b d8 48 85 c0 74 12 33:89 05 e2 31 23 00 48 8b ]
    fffff46a66a2ae0d-fffff46a66a2ae27  27 bytes - win32kbase!EnterSharedCrit+4d (+0x15)
    [ 48 89 43 08 45 33 ff 0f:cc cc cc 40 53 48 81 ec ]
    fffff46a66a2ae29-fffff46a66a2ae37  15 bytes - win32kbase!EnterSharedCrit+69 (+0x1c)
    [ 4c 89 7c 24 38 49 8b f7:00 00 80 3d 36 29 23 00 ]
    fffff46a66a2ae44-fffff46a66a2ae4b  8 bytes - win32kbase!EnterSharedCrit+84 (+0x1b)
    [ 48 85 c0 74 03 48 8b 30:33 cc e8 65 a1 0a 00 48 ]
    fffff46a66a2ae58-fffff46a66a2ae69  18 bytes - win32kbase!EnterSharedCrit+98 (+0x14)
    [ 48 85 c0 74 09 48 3b 05:cc cc cc cc cc cc cc cc ]
    fffff46a66aa2160-fffff46a66aa2179  26 bytes - win32kbase!CitpCleanupGlobalImpactContext+40 (+0x77308)
    [ cc cc cc cc 48 89 5c 24:48 8b 02 49 3b 00 77 09 ]
    fffff46a66aa2186-fffff46a66aa219a  21 bytes - win32kbase!CitpContextCleanup+22 (+0x26)
    [ 84 c0 0f 84 ca 00 00 00:45 88 01 85 d2 0f 84 8d ]
    fffff46a66aa21a7-fffff46a66aa21ca  36 bytes - win32kbase!CitpContextCleanup+43 (+0x21)
    [ 4c 8b 4f 60 bb 2f cb 04:01 74 44 83 ea 02 75 2c ]
    fffff46a66aa21cc-fffff46a66aa2246  123 bytes - win32kbase!CitpContextCleanup+68 (+0x25)
    [ b6 01 48 6b cb 25 48 03:11 12 41 09 42 10 41 c6 ]
    fffff46a66aa2248-fffff46a66aa2254  13 bytes - win32kbase!CitpContextCleanup+e4 (+0x7c)
    [ 03 d8 49 ff c1 41 0f b6:81 ec 00 01 00 00 48 8b ]
    fffff46a66aa2256-fffff46a66aa225f  10 bytes - win32kbase!CitpContextCleanup+f2 (+0x0e)
    [ 03 d8 45 33 c9 45 33 c0:33 c4 48 89 45 27 44 8b ]
    fffff46a66aafd30-fffff46a66aafd53  36 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+24 (+0xdada)
    [ d8 85 c0 78 17 48 8d 4f:48 83 ec 28 48 8b ca e8 ]
    fffff46a66aafd55-fffff46a66aafd8c  56 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+49 (+0x25)
    [ 5c 24 30 48 8b 74 24 40:d1 4d 85 c9 0f 95 c2 41 ]
    fffff46a66aafd93-fffff46a66aafda0  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+27 (+0x3e)
    [ 89 47 04 48 8b 4b 38 48:01 0f 84 e3 ec 06 00 41 ]
    fffff46a66aafda7-fffff46a66aafdb4  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+3b (+0x14)
    [ 89 47 08 48 8b 4b 40 48:48 01 00 00 74 44 48 8b ]
    fffff46a66aafdbb-fffff46a66aafdc8  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+4f (+0x14)
    [ 89 47 0c 48 8b 4b 48 48:01 0f ba 69 10 09 eb 2e ]
    fffff46a66aafdcf-fffff46a66aafddc  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+63 (+0x14)
    [ 89 47 10 48 8b 4b 50 48:01 3a c2 74 1d c0 e2 03 ]
    fffff46a66aafde3-fffff46a66aafdf4  18 bytes - win32kbase!CInputSink::QueryInputQueueTypes+77 (+0x14)
    [ 48 8b 5c 24 30 89 47 14:92 4c 01 00 00 c6 00 01 ]
    fffff46a66aafdf6-fffff46a66aafe2f  58 bytes - win32kbase!CInputSink::QueryInputQueueTypes+8a (+0x13)
    [ cc cc cc cc cc cc cc cc:8a 89 4c 01 00 00 8a c1 ]
    fffff46a66ab0c10-fffff46a66ab0c22  19 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+d0 (+0xe1a)
    [ 10 0d 8b 43 10 48 89 5d:48 83 ec 28 8b ca 45 33 ]
    fffff46a66ab0c24-fffff46a66ab0c7e  91 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+e4 (+0x14)
    [ 8b d6 48 8b cb e8 de 06:83 c4 28 c3 cc cc cc cc ]
    fffff46a66ab0c80-fffff46a66ab0c8f  16 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+140 (+0x5c)
    [ 89 5d 20 0f ba e0 12 73:3b 08 77 2c 49 8b 00 48 ]
    fffff46a66ab0c91-fffff46a66ab0cd0  64 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+151 (+0x11)
    [ 8b cb e8 f8 05 00 00 84:3b ca 72 0c 48 8b 05 8c ]
    fffff46a66ab0cd3 - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+193 (+0x42)
    [ 5c:7c ]
    fffff46a66ab0cd5-fffff46a66ab0cfd  41 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+195 (+0x02)
    [ 30 40 8a c7 48 8b 7c 24:50 85 db 78 3f 48 8d 54 ]
    fffff46a66ab0cff-fffff46a66ab0d0f  17 bytes - win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand<<lambda_5a7aae95d2af49f4475e794f2d9a8b36> >+f (+0x2a)
    [ 00 48 8b c2 49 8b d8 48:8d 54 24 20 e8 34 23 00 ]
    fffff46a66c0f9b8-fffff46a66c0f9b9  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+80
    [ 40 bd:d0 c0 ]
    fffff46a66c0f9c0-fffff46a66c0f9c1  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+88 (+0x08)
    [ 40 bd:f0 c3 ]
    fffff46a66c0f9c8-fffff46a66c0f9c9  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+90 (+0x08)
    [ 40 bd:30 c4 ]
    fffff46a66c0f9d0-fffff46a66c0f9d2  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+98 (+0x08)
    [ 60 ee a9:b0 c0 ac ]
    fffff46a66c0f9d8-fffff46a66c0f9d9  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+a0 (+0x08)
    [ 40 bd:c0 c0 ]
    fffff46a66c0f9e1-fffff46a66c0f9e2  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+a9 (+0x09)
    [ bd ac:9e a0 ]
    fffff46a66c0f9e8-fffff46a66c0f9ea  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+b0 (+0x07)
    [ 70 ba ac:80 9e a0 ]
    fffff46a66c0f9f0-fffff46a66c0f9f2  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+b8 (+0x08)
    [ 40 bd ac:50 85 a0 ]
    fffff46a66c0f9f8-fffff46a66c0f9fa  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+c0 (+0x08)
    [ 70 ba ac:80 61 bf ]
    fffff46a66c0fa00-fffff46a66c0fa02  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+c8 (+0x08)
    [ 70 ba ac:10 df a9 ]
    fffff46a66c0fa08-fffff46a66c0fa09  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+d0 (+0x08)
    [ 00 b8:b0 ef ]
    fffff46a66c0fa10-fffff46a66c0fa12  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+d8 (+0x08)
    [ 00 b8 aa:80 3d a9 ]
    fffff46a66c0fa18-fffff46a66c0fa1a  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+e0 (+0x08)
    [ 10 36 bf:f0 9b a8 ]
    fffff46a66c0fa20-fffff46a66c0fa21  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable' (+0x08)
    [ 80 ba:d0 c0 ]
    fffff46a66c0fa28-fffff46a66c0fa2a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+8 (+0x08)
    [ a0 bd ac:80 0f aa ]
    fffff46a66c0fa30-fffff46a66c0fa31  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+10 (+0x08)
    [ e0 bd:90 c3 ]
    fffff46a66c0fa38-fffff46a66c0fa39  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+18 (+0x08)
    [ 70 ba:90 c3 ]
    fffff46a66c0fa40-fffff46a66c0fa41  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+20 (+0x08)
    [ 70 ba:90 c3 ]
    fffff46a66c0fa48-fffff46a66c0fa4a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+28 (+0x08)
    [ d0 9e a0:e0 f8 a9 ]
    fffff46a66c0fa50-fffff46a66c0fa52  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+30 (+0x08)
    [ 70 9e a0:b0 f7 a9 ]
    fffff46a66c0fa58-fffff46a66c0fa5a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+38 (+0x08)
    [ 30 a2 a0:00 3e a9 ]
    fffff46a66c0fa61 - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+41 (+0x09)
    [ be:c4 ]
    fffff46a66c0fa68-fffff46a66c0fa6a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+48 (+0x07)
    [ 00 b8 aa:c0 c0 ac ]
    fffff46a66c0fa70-fffff46a66c0fa72  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+50 (+0x08)
    [ 60 eb aa:90 c3 ac ]
    fffff46a66c0fa78-fffff46a66c0fa7a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+58 (+0x08)
    [ 00 b8 aa:c0 c0 ac ]
    fffff46a66c0fa80-fffff46a66c0fa82  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+60 (+0x08)
    [ 90 85 a9:c0 c0 ac ]
    fffff46a66c0fa88-fffff46a66c0fa8a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+68 (+0x08)
    [ 80 ba ac:10 df a9 ]
    fffff46a66c0fa90-fffff46a66c0fa92  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+70 (+0x08)
    [ 40 bd ac:10 df a9 ]
    fffff46a66c0fa98-fffff46a66c0fa99  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+78 (+0x08)
    [ 40 bd:d0 c0 ]
    fffff46a66c0faa0-fffff46a66c0faa1  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+80 (+0x08)
    [ 40 bd:f0 c3 ]
    fffff46a66c0faa8-fffff46a66c0faa9  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+88 (+0x08)
    [ 40 bd:30 c4 ]
    fffff46a66c0fab0-fffff46a66c0fab2  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+90 (+0x08)
    [ 40 26 ab:c0 c0 ac ]
972 errors : !win32kbase (fffff46a66a2ad71-fffff46a66c0fab2)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
 
Bellek ile ilgili bir sorun var. Test edip sonucu paylaşın:


Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff80431bd212a, Address of the instruction which caused the bugcheck
Arg3: ffff968f355d39c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5093

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 56889

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c000001d

BUGCHECK_P2: fffff80431bd212a

BUGCHECK_P3: ffff968f355d39c0

BUGCHECK_P4: 0

CONTEXT:  ffff968f355d39c0 -- (.cxr 0xffff968f355d39c0)
rax=ffffac818ba6c400 rbx=ffffac818b230010 rcx=ffffac818ba6c4e0
rdx=ffffac81871d4000 rsi=ffffac818b230270 rdi=ffffac818b230270
rip=fffff80431bd212a rsp=ffff968f355d43c0 rbp=ffff968f355d4450
r8=0000000000000fff  r9=0000000000000648 r10=00000000484c764e
r11=0000000000001001 r12=0000000000002500 r13=0000000000000001
r14=0000000000000000 r15=ffffac81871d4000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nvlddmkm+0xc1212a:
fffff804`31bd212a ea              ???
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  StartMenuExperienceHost.exe

STACK_TEXT:
ffff968f`355d43c0 ffffac81`871d4000     : ffffac81`8b230270 00000000`00000000 ffffac81`871d4000 ffffac81`8b230270 : nvlddmkm+0xc1212a
ffff968f`355d43c8 ffffac81`8b230270     : 00000000`00000000 ffffac81`871d4000 ffffac81`8b230270 fffff804`31b93b83 : 0xffffac81`871d4000
ffff968f`355d43d0 00000000`00000000     : ffffac81`871d4000 ffffac81`8b230270 fffff804`31b93b83 ffffac81`00000000 : 0xffffac81`8b230270


SYMBOL_NAME:  nvlddmkm+c1212a

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffff968f355d39c0 ; kb

BUCKET_ID_FUNC_OFFSET:  c1212a

FAILURE_BUCKET_ID:  0x3B_c000001d_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4904ec20-5af6-c77a-8cce-daedc0fbe1bd}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffc78269d75080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3827

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10402

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffc78269d75080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

ERROR_CODE: (NTSTATUS) 0x68ed5040 - <Unable to get error code text>

CRITICAL_PROCESS_REPORTGUID:  {9dd4b196-400f-4dd1-93b2-b8fe2ae3c160}

IMAGE_NAME:  psmsrv.dll

MODULE_NAME: psmsrv

FAULTING_MODULE: 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT:
fffffd89`42099938 fffff805`4a517622     : 00000000`000000ef ffffc782`69d75080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffd89`42099940 fffff805`4a40b22f     : 00000000`00000000 fffff805`49e74901 00000000`00000002 fffff805`49e74c9b : nt!PspCatchCriticalBreak+0x10e
fffffd89`420999e0 fffff805`4a24e820     : ffffc782`00000000 00000000`00000000 ffffc782`69d75080 ffffc782`69d754b8 : nt!PspTerminateAllThreads+0x1bc5ff
fffffd89`42099a50 fffff805`4a24e61c     : ffffc782`69d75080 00000000`00000000 000000b6`973ff60c fffff805`4a1ea7fa : nt!PspTerminateProcess+0xe0
fffffd89`42099a90 fffff805`49fef378     : ffffc782`69d75080 ffffc782`68ed5040 fffffd89`42099b80 ffffc782`69d75080 : nt!NtTerminateProcess+0x9c
fffffd89`42099b00 00007ffd`7006b314     : 00007ffd`700e1643 00007ffd`7010ff74 000000b6`973ff5d0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b6`973fd568 00007ffd`700e1643     : 00007ffd`7010ff74 000000b6`973ff5d0 00000000`00000000 00007ffd`6ffd0000 : 0x00007ffd`7006b314
000000b6`973fd570 00007ffd`7010ff74     : 000000b6`973ff5d0 00000000`00000000 00007ffd`6ffd0000 00000000`00000004 : 0x00007ffd`700e1643
000000b6`973fd578 000000b6`973ff5d0     : 00000000`00000000 00007ffd`6ffd0000 00000000`00000004 00007ffd`7007231d : 0x00007ffd`7010ff74
000000b6`973fd580 00000000`00000000     : 00007ffd`6ffd0000 00000000`00000004 00007ffd`7007231d 00007ffd`7010ff74 : 0x000000b6`973ff5d0


STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_68ed5040_psmsrv.dll!PsmpGetNextApplication_IMAGE_psmsrv.dll

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ec760983-8c38-e6d8-0754-095111a3831a}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbb0135352028, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8054564092e, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3421

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3462

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffbb0135352028

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8054564092e

BUGCHECK_P4: 2

READ_ADDRESS: fffff805460fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8054600f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8054600f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffbb0135352028

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvsphelper64.exe

TRAP_FRAME:  ffffe00e3574d060 -- (.trap 0xffffe00e3574d060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffff3160 rbx=0000000000000000 rcx=ffff8f8027b74598
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8054564092e rsp=ffffe00e3574d1f0 rbp=ffffe00e3574d340
r8=0000000000000018  r9=ffff8f8027b40000 r10=0000000000000000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ExFreeHeapPool+0x21e:
fffff805`4564092e 488b5328        mov     rdx,qword ptr [rbx+28h] ds:00000000`00000028=????????????????
Resetting default scope

STACK_TEXT:
ffffe00e`3574cdb8 fffff805`45835c1d     : 00000000`00000050 ffffbb01`35352028 00000000`00000000 ffffe00e`3574d060 : nt!KeBugCheckEx
ffffe00e`3574cdc0 fffff805`45612ce0     : 00000000`00000000 00000000`00000000 ffffe00e`3574d0e0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
ffffe00e`3574cec0 fffff805`457ebb1e     : ffff8f80`27b03100 fffffbdc`1796e5b3 00000000`00000001 ffffbb01`3fc67180 : nt!MmAccessFault+0x400
ffffe00e`3574d060 fffff805`4564092e     : ffffbb01`000000d1 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x35e
ffffe00e`3574d1f0 fffff805`45dc2019     : 00000000`00000005 ffffbb01`3fc67080 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x21e
ffffe00e`3574d2d0 fffff805`45a0b330     : ffffe00e`3574d5b0 00000000`00000001 ffffbb01`3e4e0a50 00000000`00000000 : nt!ExFreePool+0x9
ffffe00e`3574d300 fffff805`45a0af29     : fffff805`45751a00 fffff805`456e73cf ffffe00e`3574d848 fffff805`00000000 : nt!ObWaitForMultipleObjects+0x3d0
ffffe00e`3574d800 fffff805`457ef378     : ffffe00e`3574db18 00000000`00000000 ffffbb01`3fc67080 ffffbb01`3f12a790 : nt!NtWaitForMultipleObjects+0x119
ffffe00e`3574da90 00007ffa`314eb8e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000026`38aff1d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`314eb8e4


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.329

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {abe5a486-9a07-9785-197c-226bb9273d2c}

Followup:     Pool_corruption
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffa00107d64410, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa00107d64368, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3687

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11692

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffa00107d64410

BUGCHECK_P3: ffffa00107d64368

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa00107d64410 -- (.trap 0xffffa00107d64410)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa308fc406b18 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa309063a8000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037ee18e84 rsp=ffffa00107d645a0 rbp=ffffa00107d646a0
r8=ffffa308fc406b08  r9=ffffa308fc406b18 r10=ffffa30905650000
r11=00000000000000d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!RtlpHpLfhSlotAllocate+0x1d43c4:
fffff803`7ee18e84 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa00107d64368 -- (.exr 0xffffa00107d64368)
ExceptionAddress: fffff8037ee18e84 (nt!RtlpHpLfhSlotAllocate+0x00000000001d43c4)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WerFault.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffa001`07d640e8 fffff803`7edef929     : 00000000`00000139 00000000`00000003 ffffa001`07d64410 ffffa001`07d64368 : nt!KeBugCheckEx
ffffa001`07d640f0 fffff803`7edefd50     : ffffa309`010f78a0 ffffa309`06bd49a0 00000000`00000000 ffffa001`07d64340 : nt!KiBugCheckDispatch+0x69
ffffa001`07d64230 fffff803`7edee0e3     : 00000000`00000000 00000000`00000004 00000000`00000000 ffffa309`01105d90 : nt!KiFastFailDispatch+0xd0
ffffa001`07d64410 fffff803`7ee18e84     : ffffa309`06bd4980 ffffa001`07d646e4 ffffa309`06bd49a0 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffa001`07d645a0 fffff803`7ec44141     : ffffa308`fc402340 ffffa308`fc406940 ffffa308`fc406b00 00000040`00000040 : nt!RtlpHpLfhSlotAllocate+0x1d43c4
ffffa001`07d646f0 fffff803`7f3c2094     : ffffa309`00000000 00000000`00000000 00000000`20206f49 ffffa308`fcaaf7a0 : nt!ExAllocateHeapPool+0x2b1
ffffa001`07d64830 fffff803`7ec308b0     : 00007fff`ffff0000 00000000`00000208 00000000`00000014 ffffa001`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffa001`07d64880 fffff803`7ec30819     : 00000000`00000000 00007fff`ffff0000 ffffa001`20206f49 00000000`00000000 : nt!ExAllocatePoolWithQuotaTag+0x60
ffffa001`07d64900 fffff803`7f029ea1     : 00000000`beaa0251 00000000`00000001 00000000`00000000 ffffa309`05e88200 : nt!IopVerifierExAllocatePoolWithQuota+0x21
ffffa001`07d64930 fffff803`7f029cf1     : 00000000`000003d4 00000001`2e8f7508 00000000`00000000 00000000`00000000 : nt!BuildQueryDirectoryIrp+0x171
ffffa001`07d649e0 fffff803`7edef378     : 00000000`000003d4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryDirectoryFileEx+0x81
ffffa001`07d64a90 00007ffe`8efad5c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000001`2e8f74e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8efad5c4


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb78696752028, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8026f04092e, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for mountmgr.sys

Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4249

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17829

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffb78696752028

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8026f04092e

BUGCHECK_P4: 2

READ_ADDRESS: fffff8026fafa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026fa0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8026fa0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb78696752028

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

TRAP_FRAME:  ffff9183c67b7650 -- (.trap 0xffff9183c67b7650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000009ec80 rbx=0000000000000000 rcx=ffffb78696825ee0
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026f04092e rsp=ffff9183c67b77e0 rbp=ffffb786968ada60
r8=0000000000000018  r9=ffffb78696802000 r10=0000000000000000
r11=0000000000000fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ExFreeHeapPool+0x21e:
fffff802`6f04092e 488b5328        mov     rdx,qword ptr [rbx+28h] ds:00000000`00000028=????????????????
Resetting default scope

STACK_TEXT:
ffff9183`c67b73a8 fffff802`6f235c1d     : 00000000`00000050 ffffb786`96752028 00000000`00000000 ffff9183`c67b7650 : nt!KeBugCheckEx
ffff9183`c67b73b0 fffff802`6f012ce0     : fffff802`6befb180 00000000`00000000 ffff9183`c67b76d0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
ffff9183`c67b74b0 fffff802`6f1ebb1e     : 00000000`00000000 fffff802`72cd1677 ffffb786`a0018460 fffff802`6f1364d5 : nt!MmAccessFault+0x400
ffff9183`c67b7650 fffff802`6f04092e     : 00000000`00000040 fffff802`73941033 00000000`00000020 fffff802`6f046f01 : nt!KiPageFault+0x35e
ffff9183`c67b77e0 fffff802`6f7c2019     : ffffb786`968ada60 fffff802`6f4122d2 ffffb786`9fb13e40 01000000`00100000 : nt!ExFreeHeapPool+0x21e
ffff9183`c67b78c0 fffff802`6f40c6e4     : 00000000`00000000 ffff9183`c67b7ae9 00000000`c0000010 00000000`00000000 : nt!ExFreePool+0x9
ffff9183`c67b78f0 fffff802`6f40c4f8     : ffffb786`9fb13e00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194
ffff9183`c67b7950 fffff802`6f024e97     : 00000000`00000000 00000000`00000000 ffff9183`c67b7ae9 ffffb786`9fb13e40 : nt!ObpRemoveObjectRoutine+0x88
ffff9183`c67b79b0 fffff802`6f00198e     : 00000000`00000000 ffffb786`98d30cf0 00000000`00000000 01000000`00100000 : nt!ObfDereferenceObjectWithTag+0xc7
ffff9183`c67b79f0 fffff802`72d6942c     : 00000000`00000000 ffff9183`c67b7aa0 ffffc988`30ef1c00 00000000`00000000 : nt!HalPutDmaAdapter+0xe
ffff9183`c67b7a20 00000000`00000000     : ffff9183`c67b7aa0 ffffc988`30ef1c00 00000000`00000000 ffffc988`30ef1c00 : mountmgr+0x942c


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    fffff46a66a2ad71-fffff46a66a2ad84  20 bytes - win32kbase!UpdateWindowTreeDpiAwareness+175
    [ c3 cc 41 8b 85 18 01 00:48 83 c4 60 5f c3 cc 48 ]
    fffff46a66a2ad86-fffff46a66a2ada5  32 bytes - win32kbase!UpdateWindowTreeDpiAwareness+18a (+0x15)
    [ 43 28 48 8b 88 00 01 00:15 15 85 25 00 e8 90 a6 ]
    fffff46a66a2adac-fffff46a66a2adad  2 bytes - win32kbase!UpdateWindowTreeDpiAwareness+1b0 (+0x26)
    [ eb 89:cc cc ]
    fffff46a66a2adb0-fffff46a66a2adbf  16 bytes - win32kbase!UpdateWindowTreeDpiAwareness+1b4 (+0x04)
    [ cc cc cc cc cc cc cc cc:40 53 48 83 ec 20 8b 05 ]
    fffff46a66a2adc1-fffff46a66a2adea  42 bytes - win32kbase!EnterSharedCrit+1 (+0x11)
    [ 89 5c 24 10 48 89 6c 24:8d 05 79 30 23 00 48 83 ]
    fffff46a66a2adf8-fffff46a66a2ae00  9 bytes - win32kbase!EnterSharedCrit+38 (+0x37)
    [ 8b d8 48 85 c0 74 12 33:89 05 e2 31 23 00 48 8b ]
    fffff46a66a2ae0d-fffff46a66a2ae27  27 bytes - win32kbase!EnterSharedCrit+4d (+0x15)
    [ 48 89 43 08 45 33 ff 0f:cc cc cc 40 53 48 81 ec ]
    fffff46a66a2ae29-fffff46a66a2ae37  15 bytes - win32kbase!EnterSharedCrit+69 (+0x1c)
    [ 4c 89 7c 24 38 49 8b f7:00 00 80 3d 36 29 23 00 ]
    fffff46a66a2ae44-fffff46a66a2ae4b  8 bytes - win32kbase!EnterSharedCrit+84 (+0x1b)
    [ 48 85 c0 74 03 48 8b 30:33 cc e8 65 a1 0a 00 48 ]
    fffff46a66a2ae58-fffff46a66a2ae69  18 bytes - win32kbase!EnterSharedCrit+98 (+0x14)
    [ 48 85 c0 74 09 48 3b 05:cc cc cc cc cc cc cc cc ]
    fffff46a66aa2160-fffff46a66aa2179  26 bytes - win32kbase!CitpCleanupGlobalImpactContext+40 (+0x77308)
    [ cc cc cc cc 48 89 5c 24:48 8b 02 49 3b 00 77 09 ]
    fffff46a66aa2186-fffff46a66aa219a  21 bytes - win32kbase!CitpContextCleanup+22 (+0x26)
    [ 84 c0 0f 84 ca 00 00 00:45 88 01 85 d2 0f 84 8d ]
    fffff46a66aa21a7-fffff46a66aa21ca  36 bytes - win32kbase!CitpContextCleanup+43 (+0x21)
    [ 4c 8b 4f 60 bb 2f cb 04:01 74 44 83 ea 02 75 2c ]
    fffff46a66aa21cc-fffff46a66aa2246  123 bytes - win32kbase!CitpContextCleanup+68 (+0x25)
    [ b6 01 48 6b cb 25 48 03:11 12 41 09 42 10 41 c6 ]
    fffff46a66aa2248-fffff46a66aa2254  13 bytes - win32kbase!CitpContextCleanup+e4 (+0x7c)
    [ 03 d8 49 ff c1 41 0f b6:81 ec 00 01 00 00 48 8b ]
    fffff46a66aa2256-fffff46a66aa225f  10 bytes - win32kbase!CitpContextCleanup+f2 (+0x0e)
    [ 03 d8 45 33 c9 45 33 c0:33 c4 48 89 45 27 44 8b ]
    fffff46a66aafd30-fffff46a66aafd53  36 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+24 (+0xdada)
    [ d8 85 c0 78 17 48 8d 4f:48 83 ec 28 48 8b ca e8 ]
    fffff46a66aafd55-fffff46a66aafd8c  56 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+49 (+0x25)
    [ 5c 24 30 48 8b 74 24 40:d1 4d 85 c9 0f 95 c2 41 ]
    fffff46a66aafd93-fffff46a66aafda0  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+27 (+0x3e)
    [ 89 47 04 48 8b 4b 38 48:01 0f 84 e3 ec 06 00 41 ]
    fffff46a66aafda7-fffff46a66aafdb4  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+3b (+0x14)
    [ 89 47 08 48 8b 4b 40 48:48 01 00 00 74 44 48 8b ]
    fffff46a66aafdbb-fffff46a66aafdc8  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+4f (+0x14)
    [ 89 47 0c 48 8b 4b 48 48:01 0f ba 69 10 09 eb 2e ]
    fffff46a66aafdcf-fffff46a66aafddc  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+63 (+0x14)
    [ 89 47 10 48 8b 4b 50 48:01 3a c2 74 1d c0 e2 03 ]
    fffff46a66aafde3-fffff46a66aafdf4  18 bytes - win32kbase!CInputSink::QueryInputQueueTypes+77 (+0x14)
    [ 48 8b 5c 24 30 89 47 14:92 4c 01 00 00 c6 00 01 ]
    fffff46a66aafdf6-fffff46a66aafe2f  58 bytes - win32kbase!CInputSink::QueryInputQueueTypes+8a (+0x13)
    [ cc cc cc cc cc cc cc cc:8a 89 4c 01 00 00 8a c1 ]
    fffff46a66ab0c10-fffff46a66ab0c22  19 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+d0 (+0xe1a)
    [ 10 0d 8b 43 10 48 89 5d:48 83 ec 28 8b ca 45 33 ]
    fffff46a66ab0c24-fffff46a66ab0c7e  91 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+e4 (+0x14)
    [ 8b d6 48 8b cb e8 de 06:83 c4 28 c3 cc cc cc cc ]
    fffff46a66ab0c80-fffff46a66ab0c8f  16 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+140 (+0x5c)
    [ 89 5d 20 0f ba e0 12 73:3b 08 77 2c 49 8b 00 48 ]
    fffff46a66ab0c91-fffff46a66ab0cd0  64 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+151 (+0x11)
    [ 8b cb e8 f8 05 00 00 84:3b ca 72 0c 48 8b 05 8c ]
    fffff46a66ab0cd3 - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+193 (+0x42)
    [ 5c:7c ]
    fffff46a66ab0cd5-fffff46a66ab0cfd  41 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+195 (+0x02)
    [ 30 40 8a c7 48 8b 7c 24:50 85 db 78 3f 48 8d 54 ]
    fffff46a66ab0cff-fffff46a66ab0d0f  17 bytes - win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand<<lambda_5a7aae95d2af49f4475e794f2d9a8b36> >+f (+0x2a)
    [ 00 48 8b c2 49 8b d8 48:8d 54 24 20 e8 34 23 00 ]
    fffff46a66c0f9b8-fffff46a66c0f9b9  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+80
    [ 40 bd:d0 c0 ]
    fffff46a66c0f9c0-fffff46a66c0f9c1  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+88 (+0x08)
    [ 40 bd:f0 c3 ]
    fffff46a66c0f9c8-fffff46a66c0f9c9  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+90 (+0x08)
    [ 40 bd:30 c4 ]
    fffff46a66c0f9d0-fffff46a66c0f9d2  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+98 (+0x08)
    [ 60 ee a9:b0 c0 ac ]
    fffff46a66c0f9d8-fffff46a66c0f9d9  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+a0 (+0x08)
    [ 40 bd:c0 c0 ]
    fffff46a66c0f9e1-fffff46a66c0f9e2  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+a9 (+0x09)
    [ bd ac:9e a0 ]
    fffff46a66c0f9e8-fffff46a66c0f9ea  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+b0 (+0x07)
    [ 70 ba ac:80 9e a0 ]
    fffff46a66c0f9f0-fffff46a66c0f9f2  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+b8 (+0x08)
    [ 40 bd ac:50 85 a0 ]
    fffff46a66c0f9f8-fffff46a66c0f9fa  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+c0 (+0x08)
    [ 70 ba ac:80 61 bf ]
    fffff46a66c0fa00-fffff46a66c0fa02  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+c8 (+0x08)
    [ 70 ba ac:10 df a9 ]
    fffff46a66c0fa08-fffff46a66c0fa09  2 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+d0 (+0x08)
    [ 00 b8:b0 ef ]
    fffff46a66c0fa10-fffff46a66c0fa12  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+d8 (+0x08)
    [ 00 b8 aa:80 3d a9 ]
    fffff46a66c0fa18-fffff46a66c0fa1a  3 bytes - win32kbase!DirectComposition::CNineGridBrushMarshaler::`vftable'+e0 (+0x08)
    [ 10 36 bf:f0 9b a8 ]
    fffff46a66c0fa20-fffff46a66c0fa21  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable' (+0x08)
    [ 80 ba:d0 c0 ]
    fffff46a66c0fa28-fffff46a66c0fa2a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+8 (+0x08)
    [ a0 bd ac:80 0f aa ]
    fffff46a66c0fa30-fffff46a66c0fa31  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+10 (+0x08)
    [ e0 bd:90 c3 ]
    fffff46a66c0fa38-fffff46a66c0fa39  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+18 (+0x08)
    [ 70 ba:90 c3 ]
    fffff46a66c0fa40-fffff46a66c0fa41  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+20 (+0x08)
    [ 70 ba:90 c3 ]
    fffff46a66c0fa48-fffff46a66c0fa4a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+28 (+0x08)
    [ d0 9e a0:e0 f8 a9 ]
    fffff46a66c0fa50-fffff46a66c0fa52  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+30 (+0x08)
    [ 70 9e a0:b0 f7 a9 ]
    fffff46a66c0fa58-fffff46a66c0fa5a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+38 (+0x08)
    [ 30 a2 a0:00 3e a9 ]
    fffff46a66c0fa61 - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+41 (+0x09)
    [ be:c4 ]
    fffff46a66c0fa68-fffff46a66c0fa6a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+48 (+0x07)
    [ 00 b8 aa:c0 c0 ac ]
    fffff46a66c0fa70-fffff46a66c0fa72  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+50 (+0x08)
    [ 60 eb aa:90 c3 ac ]
    fffff46a66c0fa78-fffff46a66c0fa7a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+58 (+0x08)
    [ 00 b8 aa:c0 c0 ac ]
    fffff46a66c0fa80-fffff46a66c0fa82  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+60 (+0x08)
    [ 90 85 a9:c0 c0 ac ]
    fffff46a66c0fa88-fffff46a66c0fa8a  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+68 (+0x08)
    [ 80 ba ac:10 df a9 ]
    fffff46a66c0fa90-fffff46a66c0fa92  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+70 (+0x08)
    [ 40 bd ac:10 df a9 ]
    fffff46a66c0fa98-fffff46a66c0fa99  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+78 (+0x08)
    [ 40 bd:d0 c0 ]
    fffff46a66c0faa0-fffff46a66c0faa1  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+80 (+0x08)
    [ 40 bd:f0 c3 ]
    fffff46a66c0faa8-fffff46a66c0faa9  2 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+88 (+0x08)
    [ 40 bd:30 c4 ]
    fffff46a66c0fab0-fffff46a66c0fab2  3 bytes - win32kbase!DirectComposition::CColorBrushMarshaler::`vftable'+90 (+0x08)
    [ 40 26 ab:c0 c0 ac ]
972 errors : !win32kbase (fffff46a66a2ad71-fffff46a66c0fab2)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------

Memtest86'da bir hata çıkmadı. Sorunum hala devam ediyor çözemedim.
İlk olarak BIOS güncel değil güncelleyin.

Vanguard kaldırın, DDU rehberine göre anlatımı uygulayıp güncel GPU sürücünüzü yükleyin.
Vanguard derken neyden kasdettiğinizi anlamadım :(
 
Son düzenleme:
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı