Çözüldü SYSTEM_SERVICE_EXCEPTION mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

Woxean

Decapat
Katılım
16 Nisan 2020
Mesajlar
18
Daha fazla  
Cinsiyet
Erkek
Meslek
Öğrenci
2 haftadır mavi ekran yiyorum DMP dosyalarım bunlar yardımcı olur musunuz.
  • AMD Ryzen 5 1400 Quad-Core Processor (8 cpus)~ 3.2 GHz.
  • 16 GB RAM.
  • 128 GB SSD.
  • 1TB harddisk.
  • MSI NVIDIA GeForce GTX 1060 Gaming X 6G 6 GB 192 Bit.
Özelliklerim bunlar.
 
Son düzenleyen: Moderatör:
Belleklerin aynı kanal içinde çalışıyor, yanlış takmışsın bu şekilde tak; DDR4_2 ve DDR4_1.
1587060449846.png


Bu yazılımı geçici bir süreliğine kaldır.
Kod:
Unable to load image \??\C:\Program Files\AMD\RyzenMaster\bin\AMDRyzenMasterDriver.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for AMDRyzenMasterDriver.sys

Kod:
[Memory Device (Type 17) - Length 84 - Handle 0014h]
  Physical Memory Array Handle  0009h
  Memory Error Info Handle      0013h
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          8192MB
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM 0
  Bank Locator                  P0 CHANNEL B
  Memory Type                   1ah - Specification Reserved
  Type Detail                   4080h - Synchronous
  Speed                         2133MHz
  Manufacturer                  Unknown
  Serial Number                        
  Asset Tag Number              [String Not Specified]
  Part Number                   CMK16GX4M2D3000C16
[32Bit Memory Error Information (Type 18) - Length 23 - Handle 0016h]
[Memory Device (Type 17) - Length 84 - Handle 0017h]
  Physical Memory Array Handle  0009h
  Memory Error Info Handle      0016h
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          8192MB
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM 1
  Bank Locator                  P0 CHANNEL B
  Memory Type                   1ah - Specification Reserved
  Type Detail                   4080h - Synchronous
  Speed                         2133MHz
  Manufacturer                  Unknown
  Serial Number                        
  Asset Tag Number              [String Not Specified]
  Part Number                   CMK16GX4M2D3000C16
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8057aaa001e, Address of the instruction which caused the bugcheck
Arg3: ffffd00729244dd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  AB350-Gaming 3

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50a

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  AB350-Gaming 3-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8057aaa001e

BUGCHECK_P3: ffffd00729244dd0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObpCaptureHandleInformation+8e
fffff805`7aaa001e 410fb64118      movzx   eax,byte ptr [r9+18h]

CONTEXT:  ffffd00729244dd0 -- (.cxr 0xffffd00729244dd0)
rax=00ffffd389db1140 rbx=ffffb88026013400 rcx=0000000000000040
rdx=ffffd389db114070 rsi=ffffb88026013400 rdi=0000000000000100
rip=fffff8057aaa001e rsp=ffffd007292457c8 rbp=ffffb88025c5fcc0
r8=0000000000000000  r9=ffffd389db114040 r10=0000000000100bc8
r11=ffffd00729245810 r12=ffffa28023200050 r13=ffffd007292458c0
r14=fffff8057aa9ff90 r15=000000000017fffc
iopl=0         nv up ei pl nz ac pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050212
nt!ObpCaptureHandleInformation+0x8e:
fffff805`7aaa001e 410fb64118      movzx   eax,byte ptr [r9+18h] ds:002b:ffffd389`db114058=??
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  steam.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-16-2020 21:04:56.0457

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8057ab0d799 to fffff8057aaa001e

STACK_TEXT:
ffffd007`292457c8 fffff805`7ab0d799 : 00000000`00000100 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0x8e
ffffd007`292457d0 fffff805`7ab0b025 : fffff805`7aa9ff90 ffffb880`25c5fcd8 ffffd007`0017fffc 00000000`0017fffc : nt!ExpSnapShotHandleTables+0x131
ffffd007`29245860 fffff805`7a9fcb8a : 00000000`0c9ab050 ffffd389`00020000 00000800`00100bc8 ffffa280`23200050 : nt!ExpGetHandleInformation+0x71
ffffd007`292458b0 fffff805`7a8aab8b : 00000000`00180010 00000000`00000000 00000000`00000002 00000000`0000b000 : nt!ExpQuerySystemInformation+0x151eda
ffffd007`29245ac0 fffff805`7a3d3c18 : ffffd389`f3d1b080 00000000`0ae9fc88 00000000`00000001 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x2b
ffffd007`29245b00 00007ffc`f44dc734 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0a8ee0d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`f44dc734


THREAD_SHA1_HASH_MOD_FUNC:  20654208cc7e34b6bf534b6083db1b7ca9d50f43

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  53a87c31b08e54d5b53990afec786aa309ef4f70

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!ObpCaptureHandleInformation+8e
fffff805`7aaa001e 410fb64118      movzx   eax,byte ptr [r9+18h]

FAULT_INSTR_CODE:  41b60f41

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpCaptureHandleInformation+8e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5629d63a

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .cxr 0xffffd00729244dd0 ; kb

BUCKET_ID_FUNC_OFFSET:  8e

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObpCaptureHandleInformation

BUCKET_ID:  0x3B_c0000005_nt!ObpCaptureHandleInformation

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ObpCaptureHandleInformation

TARGET_TIME:  2020-04-16T17:51:52.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1407

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!obpcapturehandleinformation

FAILURE_ID_HASH:  {744cd2bf-a795-9cd1-d425-97880ad655c5}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffd80eb16df2e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd80eb16df238, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  AB350-Gaming 3

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50a

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  AB350-Gaming 3-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: 1d

BUGCHECK_P2: ffffd80eb16df2e0

BUGCHECK_P3: ffffd80eb16df238

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd80eb16df2e0 -- (.trap 0xffffd80eb16df2e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9788d41079c8 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff8788d41079c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017ae65c3b rsp=ffffd80eb16df478 rbp=0000000000000044
r8=0000000000000000  r9=0000000000000000 r10=ffff8788d3fb3438
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!RtlRbRemoveNode+0x148d3b:
fffff801`7ae65c3b cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd80eb16df238 -- (.exr 0xffffd80eb16df238)
ExceptionAddress: fffff8017ae65c3b (nt!RtlRbRemoveNode+0x0000000000148d3b)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

CPU_COUNT: 8

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  TslGame.exe

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_INVALID_BALANCED_TREE

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-16-2020 21:04:53.0380

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LOCK_ADDRESS:  fffff8017b0629a0 -- (!locks fffff8017b0629a0)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff8017b0629a0)    Available
1 total locks

PNP_TRIAGE_DATA:
    Lock address  : 0xfffff8017b0629a0
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff8017add41e9 to fffff8017adc2390

STACK_TEXT:
ffffd80e`b16defb8 fffff801`7add41e9 : 00000000`00000139 00000000`0000001d ffffd80e`b16df2e0 ffffd80e`b16df238 : nt!KeBugCheckEx
ffffd80e`b16defc0 fffff801`7add4610 : ffff8788`cbc13d70 ffffd80e`b16df300 00000000`00000000 01000000`00100000 : nt!KiBugCheckDispatch+0x69
ffffd80e`b16df100 fffff801`7add29a3 : ffffdc8b`337cd810 00000000`000005e8 00000000`00501802 ffffd80e`b16df3b8 : nt!KiFastFailDispatch+0xd0
ffffd80e`b16df2e0 fffff801`7ae65c3b : 00000022`000d0000 00010022`00220000 fffff801`7ad1cd53 00000000`00000044 : nt!KiRaiseSecurityCheckFailure+0x323
ffffd80e`b16df478 fffff801`7ad1cd53 : 00000000`00000044 ffff8788`d4107580 00000000`00000000 ffff8788`d41079c0 : nt!RtlRbRemoveNode+0x148d3b
ffffd80e`b16df490 fffff801`7ad1c73a : ffff8788`c4400280 ffff8788`c4400280 ffff8788`d3943580 ffffd80e`b16df5a0 : nt!RtlpHpVsChunkCoalesce+0x183
ffffd80e`b16df500 fffff801`7ad1e9ad : ffffd80e`00000022 ffff8788`00000000 ffff8788`d42d7450 ffffd80e`00000000 : nt!RtlpHpVsContextFree+0x18a
ffffd80e`b16df5a0 fffff801`7af6f019 : ffffd80e`b16df754 00000000`00000440 00000000`00000414 01000000`00100000 : nt!ExFreeHeapPool+0x56d
ffffd80e`b16df6c0 fffff801`7b2e69ba : 00000000`00000000 ffff8788`d42d7450 00000000`00000001 ffffd80e`00000000 : nt!ExFreePool+0x9
ffffd80e`b16df6f0 fffff801`7b2e6c5b : dc8b3eb0`e2e01fc9 00000000`00120089 00000000`00000001 00000000`00000000 : nt!PiCMGetObjectProperty+0x1a6
ffffd80e`b16df810 fffff801`7b2e6bc3 : ffffd80e`b16df958 ffffd80e`b16dfb80 00000000`0000016c fffff801`7b2ba63e : nt!PiCMHandleIoctl+0x7b
ffffd80e`b16df850 fffff801`7b2101ba : 00000000`00000000 fffff801`7b210150 00000000`00000000 fffff801`7ad132d4 : nt!PiCMFastIoDeviceDispatch+0x53
ffffd80e`b16df8a0 fffff801`7b2b255b : 00000000`0000016c 00000000`00501802 00501802`00000008 ffffdc8b`3eb0e310 : nt!PiDaFastIoDispatch+0x6a
ffffd80e`b16df900 fffff801`7b2b1e26 : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x71b
ffffd80e`b16dfa20 fffff801`7add4151 : ffffdc8b`400f1080 fffff801`7af31740 ffffdc8b`400f1080 000000ed`1a03c158 : nt!NtDeviceIoControlFile+0x56
ffffd80e`b16dfa90 00007ffc`dbabc154 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000ed`1a03c078 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`dbabc154


THREAD_SHA1_HASH_MOD_FUNC:  5fd9624d23306766b1dbef7d1426581acacb5b8a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  cb527d1af7ee5ca21cd66ffa568585b0e63cdafc

THREAD_SHA1_HASH_MOD:  9eef8c7ca0ce66f8b8b34848179f303828cff762

FOLLOWUP_IP:
nt!ExFreePool+9
fffff801`7af6f019 4883c428        add     rsp,28h

FAULT_INSTR_CODE:  28c48348

SYMBOL_STACK_INDEX:  8

SYMBOL_NAME:  nt!ExFreePool+9

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.778

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool

BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool

PRIMARY_PROBLEM_CLASS:  0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool

TARGET_TIME:  2020-04-16T17:47:02.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1ebe

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_1d_invalid_balanced_tree_nt!exfreepool

FAILURE_ID_HASH:  {ab43366d-59cb-5971-8e17-b53398bf3f90}

Followup:     Pool_corruption
---------
 
Belleklerin aynı kanal içinde çalışıyor, yanlış takmışsın bu şekilde tak; DDR4_2 ve DDR4_1.
Eki Görüntüle 537735

Bu yazılımı geçici bir süreliğine kaldır.
Kod:
Unable to load image \??\C:\Program Files\AMD\RyzenMaster\bin\AMDRyzenMasterDriver.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for AMDRyzenMasterDriver.sys

Kod:
[Memory Device (Type 17) - Length 84 - Handle 0014h]
  Physical Memory Array Handle  0009h
  Memory Error Info Handle      0013h
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          8192MB
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM 0
  Bank Locator                  P0 CHANNEL B
  Memory Type                   1ah - Specification Reserved
  Type Detail                   4080h - Synchronous
  Speed                         2133MHz
  Manufacturer                  Unknown
  Serial Number                      
  Asset Tag Number              [String Not Specified]
  Part Number                   CMK16GX4M2D3000C16
[32Bit Memory Error Information (Type 18) - Length 23 - Handle 0016h]
[Memory Device (Type 17) - Length 84 - Handle 0017h]
  Physical Memory Array Handle  0009h
  Memory Error Info Handle      0016h
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          8192MB
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM 1
  Bank Locator                  P0 CHANNEL B
  Memory Type                   1ah - Specification Reserved
  Type Detail                   4080h - Synchronous
  Speed                         2133MHz
  Manufacturer                  Unknown
  Serial Number                      
  Asset Tag Number              [String Not Specified]
  Part Number                   CMK16GX4M2D3000C16
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8057aaa001e, Address of the instruction which caused the bugcheck
Arg3: ffffd00729244dd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  AB350-Gaming 3

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50a

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  AB350-Gaming 3-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8057aaa001e

BUGCHECK_P3: ffffd00729244dd0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObpCaptureHandleInformation+8e
fffff805`7aaa001e 410fb64118      movzx   eax,byte ptr [r9+18h]

CONTEXT:  ffffd00729244dd0 -- (.cxr 0xffffd00729244dd0)
rax=00ffffd389db1140 rbx=ffffb88026013400 rcx=0000000000000040
rdx=ffffd389db114070 rsi=ffffb88026013400 rdi=0000000000000100
rip=fffff8057aaa001e rsp=ffffd007292457c8 rbp=ffffb88025c5fcc0
r8=0000000000000000  r9=ffffd389db114040 r10=0000000000100bc8
r11=ffffd00729245810 r12=ffffa28023200050 r13=ffffd007292458c0
r14=fffff8057aa9ff90 r15=000000000017fffc
iopl=0         nv up ei pl nz ac pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050212
nt!ObpCaptureHandleInformation+0x8e:
fffff805`7aaa001e 410fb64118      movzx   eax,byte ptr [r9+18h] ds:002b:ffffd389`db114058=??
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  steam.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-16-2020 21:04:56.0457

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8057ab0d799 to fffff8057aaa001e

STACK_TEXT:
ffffd007`292457c8 fffff805`7ab0d799 : 00000000`00000100 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0x8e
ffffd007`292457d0 fffff805`7ab0b025 : fffff805`7aa9ff90 ffffb880`25c5fcd8 ffffd007`0017fffc 00000000`0017fffc : nt!ExpSnapShotHandleTables+0x131
ffffd007`29245860 fffff805`7a9fcb8a : 00000000`0c9ab050 ffffd389`00020000 00000800`00100bc8 ffffa280`23200050 : nt!ExpGetHandleInformation+0x71
ffffd007`292458b0 fffff805`7a8aab8b : 00000000`00180010 00000000`00000000 00000000`00000002 00000000`0000b000 : nt!ExpQuerySystemInformation+0x151eda
ffffd007`29245ac0 fffff805`7a3d3c18 : ffffd389`f3d1b080 00000000`0ae9fc88 00000000`00000001 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x2b
ffffd007`29245b00 00007ffc`f44dc734 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0a8ee0d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`f44dc734


THREAD_SHA1_HASH_MOD_FUNC:  20654208cc7e34b6bf534b6083db1b7ca9d50f43

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  53a87c31b08e54d5b53990afec786aa309ef4f70

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!ObpCaptureHandleInformation+8e
fffff805`7aaa001e 410fb64118      movzx   eax,byte ptr [r9+18h]

FAULT_INSTR_CODE:  41b60f41

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpCaptureHandleInformation+8e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5629d63a

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .cxr 0xffffd00729244dd0 ; kb

BUCKET_ID_FUNC_OFFSET:  8e

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObpCaptureHandleInformation

BUCKET_ID:  0x3B_c0000005_nt!ObpCaptureHandleInformation

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ObpCaptureHandleInformation

TARGET_TIME:  2020-04-16T17:51:52.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1407

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!obpcapturehandleinformation

FAILURE_ID_HASH:  {744cd2bf-a795-9cd1-d425-97880ad655c5}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffd80eb16df2e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd80eb16df238, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  AB350-Gaming 3

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50a

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  AB350-Gaming 3-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: 1d

BUGCHECK_P2: ffffd80eb16df2e0

BUGCHECK_P3: ffffd80eb16df238

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd80eb16df2e0 -- (.trap 0xffffd80eb16df2e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9788d41079c8 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff8788d41079c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017ae65c3b rsp=ffffd80eb16df478 rbp=0000000000000044
r8=0000000000000000  r9=0000000000000000 r10=ffff8788d3fb3438
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!RtlRbRemoveNode+0x148d3b:
fffff801`7ae65c3b cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd80eb16df238 -- (.exr 0xffffd80eb16df238)
ExceptionAddress: fffff8017ae65c3b (nt!RtlRbRemoveNode+0x0000000000148d3b)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

CPU_COUNT: 8

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  TslGame.exe

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_INVALID_BALANCED_TREE

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-16-2020 21:04:53.0380

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LOCK_ADDRESS:  fffff8017b0629a0 -- (!locks fffff8017b0629a0)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff8017b0629a0)    Available
1 total locks

PNP_TRIAGE_DATA:
    Lock address  : 0xfffff8017b0629a0
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff8017add41e9 to fffff8017adc2390

STACK_TEXT:
ffffd80e`b16defb8 fffff801`7add41e9 : 00000000`00000139 00000000`0000001d ffffd80e`b16df2e0 ffffd80e`b16df238 : nt!KeBugCheckEx
ffffd80e`b16defc0 fffff801`7add4610 : ffff8788`cbc13d70 ffffd80e`b16df300 00000000`00000000 01000000`00100000 : nt!KiBugCheckDispatch+0x69
ffffd80e`b16df100 fffff801`7add29a3 : ffffdc8b`337cd810 00000000`000005e8 00000000`00501802 ffffd80e`b16df3b8 : nt!KiFastFailDispatch+0xd0
ffffd80e`b16df2e0 fffff801`7ae65c3b : 00000022`000d0000 00010022`00220000 fffff801`7ad1cd53 00000000`00000044 : nt!KiRaiseSecurityCheckFailure+0x323
ffffd80e`b16df478 fffff801`7ad1cd53 : 00000000`00000044 ffff8788`d4107580 00000000`00000000 ffff8788`d41079c0 : nt!RtlRbRemoveNode+0x148d3b
ffffd80e`b16df490 fffff801`7ad1c73a : ffff8788`c4400280 ffff8788`c4400280 ffff8788`d3943580 ffffd80e`b16df5a0 : nt!RtlpHpVsChunkCoalesce+0x183
ffffd80e`b16df500 fffff801`7ad1e9ad : ffffd80e`00000022 ffff8788`00000000 ffff8788`d42d7450 ffffd80e`00000000 : nt!RtlpHpVsContextFree+0x18a
ffffd80e`b16df5a0 fffff801`7af6f019 : ffffd80e`b16df754 00000000`00000440 00000000`00000414 01000000`00100000 : nt!ExFreeHeapPool+0x56d
ffffd80e`b16df6c0 fffff801`7b2e69ba : 00000000`00000000 ffff8788`d42d7450 00000000`00000001 ffffd80e`00000000 : nt!ExFreePool+0x9
ffffd80e`b16df6f0 fffff801`7b2e6c5b : dc8b3eb0`e2e01fc9 00000000`00120089 00000000`00000001 00000000`00000000 : nt!PiCMGetObjectProperty+0x1a6
ffffd80e`b16df810 fffff801`7b2e6bc3 : ffffd80e`b16df958 ffffd80e`b16dfb80 00000000`0000016c fffff801`7b2ba63e : nt!PiCMHandleIoctl+0x7b
ffffd80e`b16df850 fffff801`7b2101ba : 00000000`00000000 fffff801`7b210150 00000000`00000000 fffff801`7ad132d4 : nt!PiCMFastIoDeviceDispatch+0x53
ffffd80e`b16df8a0 fffff801`7b2b255b : 00000000`0000016c 00000000`00501802 00501802`00000008 ffffdc8b`3eb0e310 : nt!PiDaFastIoDispatch+0x6a
ffffd80e`b16df900 fffff801`7b2b1e26 : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x71b
ffffd80e`b16dfa20 fffff801`7add4151 : ffffdc8b`400f1080 fffff801`7af31740 ffffdc8b`400f1080 000000ed`1a03c158 : nt!NtDeviceIoControlFile+0x56
ffffd80e`b16dfa90 00007ffc`dbabc154 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000ed`1a03c078 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`dbabc154


THREAD_SHA1_HASH_MOD_FUNC:  5fd9624d23306766b1dbef7d1426581acacb5b8a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  cb527d1af7ee5ca21cd66ffa568585b0e63cdafc

THREAD_SHA1_HASH_MOD:  9eef8c7ca0ce66f8b8b34848179f303828cff762

FOLLOWUP_IP:
nt!ExFreePool+9
fffff801`7af6f019 4883c428        add     rsp,28h

FAULT_INSTR_CODE:  28c48348

SYMBOL_STACK_INDEX:  8

SYMBOL_NAME:  nt!ExFreePool+9

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.778

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool

BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool

PRIMARY_PROBLEM_CLASS:  0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool

TARGET_TIME:  2020-04-16T17:47:02.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1ebe

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_1d_invalid_balanced_tree_nt!exfreepool

FAILURE_ID_HASH:  {ab43366d-59cb-5971-8e17-b53398bf3f90}

Followup:     Pool_corruption
---------
Yani şimdi RAM soketlerinin yerini değiştireceğim ve AMD Ryzen uygulamasını kaldıracağım doğru mu anladım abi?
 
Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffb10d5c2724a0, Address of the instruction which caused the bugcheck
Arg3: ffff8a008a4e14e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  AB350-Gaming 3

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50a

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  AB350-Gaming 3-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffb10d5c2724a0

BUGCHECK_P3: ffff8a008a4e14e0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
win32kbase!memcpy+a0
ffffb10d`5c2724a0 f30f6f0411      movdqu  xmm0,xmmword ptr [rcx+rdx]

CONTEXT:  ffff8a008a4e14e0 -- (.cxr 0xffff8a008a4e14e0)
rax=ffffb132c0606930 rbx=ffff8b0fa6736480 rcx=ffffb132c0606950
rdx=0000000000d1be40 rsi=ffff8b0fa74520c8 rdi=ffff8b0fa6736400
rip=ffffb10d5c2724a0 rsp=ffff8a008a4e1ed8 rbp=ffff8b0fa74520c8
 r8=0000000000000000  r9=0000000000000000 r10=fffff8012b902c90
r11=ffffb132c0606950 r12=0000000000002000 r13=0000000000000000
r14=000000000000000c r15=ffff8b0fa74522c0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
win32kbase!memcpy+0xa0:
ffffb10d`5c2724a0 f30f6f0411      movdqu  xmm0,xmmword ptr [rcx+rdx] ds:002b:ffffb132`c1322790=????????????????????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-16-2020 22:36:17.0332

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from ffffb10d5c305048 to ffffb10d5c2724a0

STACK_TEXT: 
ffff8a00`8a4e1ed8 ffffb10d`5c305048 : 00000000`00000000 00000000`00000001 ffff8a00`8a4e1f20 ffff8a00`00000000 : win32kbase!memcpy+0xa0
ffff8a00`8a4e1ee0 ffffb10d`5c305781 : ffff8b0f`a6736480 ffff8b0f`a74520c8 ffff8b0f`a74522c0 fffff801`00000002 : win32kbase!rimProcessInput+0x100
ffff8a00`8a4e1f70 ffffb10d`5c305315 : ffff4310`79a6512f fffff801`2c2b88f8 00000000`00000000 00000000`00002000 : win32kbase!rimStackAttachAndProcessInput+0x9d
ffff8a00`8a4e2040 ffffb10d`5c304b3b : ffff8b0f`a74520c8 ffff8b0f`a74520c8 ffff8a00`8a4e2149 ffff8b0f`a7452958 : win32kbase!rimProcessKeyboardInput+0x7d
ffff8a00`8a4e2080 ffffb10d`5c294292 : ffff8b0f`a74520c8 00000000`00989680 ffff8b0f`a74520c8 ffff8b0f`a67366b8 : win32kbase!rimProcessDeviceBufferAndStartRead+0x3d7
ffff8a00`8a4e21b0 fffff801`2b916c78 : ffffa101`acd44180 00000000`00000000 ffff8b0f`a6731080 00000000`00000000 : win32kbase!rimInputApc+0x7b9b2
ffff8a00`8a4e2300 fffff801`2b915118 : ffffa101`acb00100 00000000`00000000 ffff8b0f`00000000 00000000`0000003f : nt!KiDeliverApc+0x2e8
ffff8a00`8a4e23c0 fffff801`2b913f04 : ffff8b0f`a6731080 00000000`00000000 ffff8a00`00000000 ffff8b0f`00000000 : nt!KiSwapThread+0xc98
ffff8a00`8a4e2460 fffff801`2b8de7a7 : ffff8b0f`a8d6c080 fffff801`00000000 ffffa101`acb00100 00000000`00000000 : nt!KiCommitThreadWait+0x144
ffff8a00`8a4e2500 ffffb10d`5c2119db : ffff8a00`8d099530 00000000`00000000 00000000`00000003 00000000`00000002 : nt!KeWaitForMultipleObjects+0x287
ffff8a00`8a4e2610 ffffb10d`5be2ccbe : 00000000`00000003 00000000`00000003 ffffb10d`5c121308 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x8b
ffff8a00`8a4e2740 00000000`00000003 : 00000000`00000003 ffffb10d`5c121308 00000000`00000004 ffff8a00`00000005 : win32kfull+0x2ccbe
ffff8a00`8a4e2748 00000000`00000003 : ffffb10d`5c121308 00000000`00000004 ffff8a00`00000005 ffff8a00`8a4e2850 : 0x3
ffff8a00`8a4e2750 ffffb10d`5c121308 : 00000000`00000004 ffff8a00`00000005 ffff8a00`8a4e2850 00000000`00000000 : 0x3
ffff8a00`8a4e2758 00000000`00000004 : ffff8a00`00000005 ffff8a00`8a4e2850 00000000`00000000 00000000`00000000 : win32kfull+0x321308
ffff8a00`8a4e2760 ffff8a00`00000005 : ffff8a00`8a4e2850 00000000`00000000 00000000`00000000 ffffb132`c067c0b0 : 0x4
ffff8a00`8a4e2768 ffff8a00`8a4e2850 : 00000000`00000000 00000000`00000000 ffffb132`c067c0b0 00000040`00000000 : 0xffff8a00`00000005
ffff8a00`8a4e2770 00000000`00000000 : 00000000`00000000 ffffb132`c067c0b0 00000040`00000000 ffffffff`80001900 : 0xffff8a00`8a4e2850


CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32kbase
7 errors : !win32kbase (ffffb10d5c272405-ffffb10d5c272435)
ffffb10d5c272400  4c  8b  d9  48  2b *d3  0f  82  a2  01  00  00  49 *21  f8  4f L..H+.......I!.O
ffffb10d5c272410  73  58  4d  8b  c8 *e3  c1  e9  03  74  16  0f  1f *64  00  00 sXM......t...d..
ffffb10d5c272420  48  8b  04  11  48 *97  c1  08  49  ff  c9  48  89 *05  f8  75 H...H...I..H...u
ffffb10d5c272430  ef  49  83  e0  07 *30  17  66  0f  1f  84  00  00  00  00  00 .I...0.f........

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .cxr 0xffff8a008a4e14e0 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_STRIDE

TARGET_TIME:  2020-04-16T18:47:57.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5c60

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_stride

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffe64ed890066d, Address of the instruction which caused the bugcheck
Arg3: fffff883965cdfe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  AB350-Gaming 3

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50a

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  AB350-Gaming 3-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffe64ed890066d

BUGCHECK_P3: fffff883965cdfe0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
win32kfull+10066d
ffffe64e`d890066d 8b90ec000000    mov     edx,dword ptr [rax+0ECh]

CONTEXT:  fffff883965cdfe0 -- (.cxr 0xfffff883965cdfe0)
rax=ffff6c1f4102a8f0 rbx=ffffe61f45d713f0 rcx=ffffe61f407f3010
rdx=0000000000000001 rsi=ffffe61f4650e4e0 rdi=ffffe61f4650e460
rip=ffffe64ed890066d rsp=fffff883965ce9d0 rbp=fffff883965ceb80
 r8=ffffbf04765fd001  r9=0000000000000001 r10=fffff8007ad11950
r11=fffff883965ce9b0 r12=0000000000000000 r13=0000000000000000
r14=000000000000002a r15=0000000000000020
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
win32kfull+0x10066d:
ffffe64e`d890066d 8b90ec000000    mov     edx,dword ptr [rax+0ECh] ds:002b:ffff6c1f`4102a9dc=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  opera.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-16-2020 22:36:13.0620

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to ffffe64ed890066d

STACK_TEXT: 
fffff883`965ce9d0 00000000`00000000 : ffff8d83`af3ea080 ffffe61f`406d5010 00000000`00000000 ffff8d83`ae7c5b90 : win32kfull+0x10066d


THREAD_SHA1_HASH_MOD_FUNC:  14611e83184b4796f67b5b507273df7a53d42cfd

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  106c8af20a7c28aab670036f054a9cdc95c8807b

THREAD_SHA1_HASH_MOD:  14611e83184b4796f67b5b507273df7a53d42cfd

FOLLOWUP_IP:
win32kfull+10066d
ffffe64e`d890066d 8b90ec000000    mov     edx,dword ptr [rax+0ECh]

FAULT_INSTR_CODE:  ec908b

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32kfull+10066d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .cxr 0xfffff883965cdfe0 ; kb

BUCKET_ID_FUNC_OFFSET:  10066d

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!unknown_function

BUCKET_ID:  0x3B_c0000005_win32kfull!unknown_function

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_win32kfull!unknown_function

TARGET_TIME:  2020-04-16T17:58:40.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5d50

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_win32kfull!unknown_function

FAILURE_ID_HASH:  {c8562915-20db-1d44-10f6-80418b3fecc4}

Followup:     MachineOwner
---------
 
Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffb10d5c2724a0, Address of the instruction which caused the bugcheck
Arg3: ffff8a008a4e14e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  AB350-Gaming 3

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50a

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  AB350-Gaming 3-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffb10d5c2724a0

BUGCHECK_P3: ffff8a008a4e14e0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
win32kbase!memcpy+a0
ffffb10d`5c2724a0 f30f6f0411      movdqu  xmm0,xmmword ptr [rcx+rdx]

CONTEXT:  ffff8a008a4e14e0 -- (.cxr 0xffff8a008a4e14e0)
rax=ffffb132c0606930 rbx=ffff8b0fa6736480 rcx=ffffb132c0606950
rdx=0000000000d1be40 rsi=ffff8b0fa74520c8 rdi=ffff8b0fa6736400
rip=ffffb10d5c2724a0 rsp=ffff8a008a4e1ed8 rbp=ffff8b0fa74520c8
r8=0000000000000000  r9=0000000000000000 r10=fffff8012b902c90
r11=ffffb132c0606950 r12=0000000000002000 r13=0000000000000000
r14=000000000000000c r15=ffff8b0fa74522c0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
win32kbase!memcpy+0xa0:
ffffb10d`5c2724a0 f30f6f0411      movdqu  xmm0,xmmword ptr [rcx+rdx] ds:002b:ffffb132`c1322790=????????????????????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-16-2020 22:36:17.0332

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from ffffb10d5c305048 to ffffb10d5c2724a0

STACK_TEXT:
ffff8a00`8a4e1ed8 ffffb10d`5c305048 : 00000000`00000000 00000000`00000001 ffff8a00`8a4e1f20 ffff8a00`00000000 : win32kbase!memcpy+0xa0
ffff8a00`8a4e1ee0 ffffb10d`5c305781 : ffff8b0f`a6736480 ffff8b0f`a74520c8 ffff8b0f`a74522c0 fffff801`00000002 : win32kbase!rimProcessInput+0x100
ffff8a00`8a4e1f70 ffffb10d`5c305315 : ffff4310`79a6512f fffff801`2c2b88f8 00000000`00000000 00000000`00002000 : win32kbase!rimStackAttachAndProcessInput+0x9d
ffff8a00`8a4e2040 ffffb10d`5c304b3b : ffff8b0f`a74520c8 ffff8b0f`a74520c8 ffff8a00`8a4e2149 ffff8b0f`a7452958 : win32kbase!rimProcessKeyboardInput+0x7d
ffff8a00`8a4e2080 ffffb10d`5c294292 : ffff8b0f`a74520c8 00000000`00989680 ffff8b0f`a74520c8 ffff8b0f`a67366b8 : win32kbase!rimProcessDeviceBufferAndStartRead+0x3d7
ffff8a00`8a4e21b0 fffff801`2b916c78 : ffffa101`acd44180 00000000`00000000 ffff8b0f`a6731080 00000000`00000000 : win32kbase!rimInputApc+0x7b9b2
ffff8a00`8a4e2300 fffff801`2b915118 : ffffa101`acb00100 00000000`00000000 ffff8b0f`00000000 00000000`0000003f : nt!KiDeliverApc+0x2e8
ffff8a00`8a4e23c0 fffff801`2b913f04 : ffff8b0f`a6731080 00000000`00000000 ffff8a00`00000000 ffff8b0f`00000000 : nt!KiSwapThread+0xc98
ffff8a00`8a4e2460 fffff801`2b8de7a7 : ffff8b0f`a8d6c080 fffff801`00000000 ffffa101`acb00100 00000000`00000000 : nt!KiCommitThreadWait+0x144
ffff8a00`8a4e2500 ffffb10d`5c2119db : ffff8a00`8d099530 00000000`00000000 00000000`00000003 00000000`00000002 : nt!KeWaitForMultipleObjects+0x287
ffff8a00`8a4e2610 ffffb10d`5be2ccbe : 00000000`00000003 00000000`00000003 ffffb10d`5c121308 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x8b
ffff8a00`8a4e2740 00000000`00000003 : 00000000`00000003 ffffb10d`5c121308 00000000`00000004 ffff8a00`00000005 : win32kfull+0x2ccbe
ffff8a00`8a4e2748 00000000`00000003 : ffffb10d`5c121308 00000000`00000004 ffff8a00`00000005 ffff8a00`8a4e2850 : 0x3
ffff8a00`8a4e2750 ffffb10d`5c121308 : 00000000`00000004 ffff8a00`00000005 ffff8a00`8a4e2850 00000000`00000000 : 0x3
ffff8a00`8a4e2758 00000000`00000004 : ffff8a00`00000005 ffff8a00`8a4e2850 00000000`00000000 00000000`00000000 : win32kfull+0x321308
ffff8a00`8a4e2760 ffff8a00`00000005 : ffff8a00`8a4e2850 00000000`00000000 00000000`00000000 ffffb132`c067c0b0 : 0x4
ffff8a00`8a4e2768 ffff8a00`8a4e2850 : 00000000`00000000 00000000`00000000 ffffb132`c067c0b0 00000040`00000000 : 0xffff8a00`00000005
ffff8a00`8a4e2770 00000000`00000000 : 00000000`00000000 ffffb132`c067c0b0 00000040`00000000 ffffffff`80001900 : 0xffff8a00`8a4e2850


CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32kbase
7 errors : !win32kbase (ffffb10d5c272405-ffffb10d5c272435)
ffffb10d5c272400  4c  8b  d9  48  2b *d3  0f  82  a2  01  00  00  49 *21  f8  4f L..H+.......I!.O
ffffb10d5c272410  73  58  4d  8b  c8 *e3  c1  e9  03  74  16  0f  1f *64  00  00 sXM......t...d..
ffffb10d5c272420  48  8b  04  11  48 *97  c1  08  49  ff  c9  48  89 *05  f8  75 H...H...I..H...u
ffffb10d5c272430  ef  49  83  e0  07 *30  17  66  0f  1f  84  00  00  00  00  00 .I...0.f........

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .cxr 0xffff8a008a4e14e0 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_STRIDE

TARGET_TIME:  2020-04-16T18:47:57.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5c60

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_stride

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffe64ed890066d, Address of the instruction which caused the bugcheck
Arg3: fffff883965cdfe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  AB350-Gaming 3

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50a

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  AB350-Gaming 3-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffe64ed890066d

BUGCHECK_P3: fffff883965cdfe0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
win32kfull+10066d
ffffe64e`d890066d 8b90ec000000    mov     edx,dword ptr [rax+0ECh]

CONTEXT:  fffff883965cdfe0 -- (.cxr 0xfffff883965cdfe0)
rax=ffff6c1f4102a8f0 rbx=ffffe61f45d713f0 rcx=ffffe61f407f3010
rdx=0000000000000001 rsi=ffffe61f4650e4e0 rdi=ffffe61f4650e460
rip=ffffe64ed890066d rsp=fffff883965ce9d0 rbp=fffff883965ceb80
r8=ffffbf04765fd001  r9=0000000000000001 r10=fffff8007ad11950
r11=fffff883965ce9b0 r12=0000000000000000 r13=0000000000000000
r14=000000000000002a r15=0000000000000020
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
win32kfull+0x10066d:
ffffe64e`d890066d 8b90ec000000    mov     edx,dword ptr [rax+0ECh] ds:002b:ffff6c1f`4102a9dc=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  opera.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-16-2020 22:36:13.0620

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to ffffe64ed890066d

STACK_TEXT:
fffff883`965ce9d0 00000000`00000000 : ffff8d83`af3ea080 ffffe61f`406d5010 00000000`00000000 ffff8d83`ae7c5b90 : win32kfull+0x10066d


THREAD_SHA1_HASH_MOD_FUNC:  14611e83184b4796f67b5b507273df7a53d42cfd

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  106c8af20a7c28aab670036f054a9cdc95c8807b

THREAD_SHA1_HASH_MOD:  14611e83184b4796f67b5b507273df7a53d42cfd

FOLLOWUP_IP:
win32kfull+10066d
ffffe64e`d890066d 8b90ec000000    mov     edx,dword ptr [rax+0ECh]

FAULT_INSTR_CODE:  ec908b

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32kfull+10066d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .cxr 0xfffff883965cdfe0 ; kb

BUCKET_ID_FUNC_OFFSET:  10066d

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!unknown_function

BUCKET_ID:  0x3B_c0000005_win32kfull!unknown_function

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_win32kfull!unknown_function

TARGET_TIME:  2020-04-16T17:58:40.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5d50

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_win32kfull!unknown_function

FAILURE_ID_HASH:  {c8562915-20db-1d44-10f6-80418b3fecc4}

Followup:     MachineOwner
---------
Memtest86 da hiç bir sorun gözükmüyor.
Buyurun.
 

Dosya Ekleri

  • 5DEA7B50-E123-4000-B046-B4689226FDC4.jpeg
    5DEA7B50-E123-4000-B046-B4689226FDC4.jpeg
    795,8 KB · Görüntüleme: 27
  • EC9E75F2-21BA-4311-8C1B-2CB84BF6DCE4.jpeg
    EC9E75F2-21BA-4311-8C1B-2CB84BF6DCE4.jpeg
    1.011,9 KB · Görüntüleme: 37
Son düzenleyen: Moderatör:
Durum
Mesaj gönderimine kapalı.

Yeni konular

Geri
Yukarı