W10 Bilgisayar açılırken mavi ekran hatası

Virüs taraması yap.

Memtest86 testi ve HDtune(Error scan, Health) testi yap, sonuçları fotoğraf şeklinde paylaş.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061948, The subtype of the bugcheck.
Arg2: 0000000000000000
Arg3: 0000000000000001
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 61948

BUGCHECK_P2: 0

BUGCHECK_P3: 1

BUGCHECK_P4: 0

BUGCHECK_STR:  0x1a_61948

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-07-2020 01:31:05.0622

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80081a404c2 to fffff800819c14e0

STACK_TEXT: 
ffff8f82`839ef998 fffff800`81a404c2 : 00000000`0000001a 00000000`00061948 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
ffff8f82`839ef9a0 fffff800`81817229 : 00000000`00000002 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiDereferenceIoPages+0x14af16
ffff8f82`839efa30 fffff800`818b11f7 : 00000000`00000003 ffff8f82`839f0180 ffff8f82`839f0180 ffff8f82`839f00d0 : nt!MiDeletePteRun+0xf89
ffff8f82`839efc50 fffff800`818acd12 : ffffaf04`fb49b900 ffff90bf`feb45788 00000000`00000000 00000000`00000000 : nt!MiDeleteVaTail+0x77
ffff8f82`839efc80 fffff800`818acea1 : ffff8f82`839f00d0 ffff90c8`5fff5a28 00000000`00000000 0a000002`38ab0867 : nt!MiWalkPageTablesRecursively+0x512
ffff8f82`839efd40 fffff800`818acea1 : ffff8f82`839f00d0 ffff90c8`642fffa8 00000000`00000000 0a000002`38797867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff8f82`839efe00 fffff800`818acea1 : ffff8f82`839f00d0 ffff90c8`643217f8 ffff90c8`00000000 0a000002`3c274867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff8f82`839efec0 fffff800`818ac62c : ffff8f82`839f00d0 ffff90c8`64321908 ffff8f82`00000000 ffff8f82`839f0049 : nt!MiWalkPageTablesRecursively+0x6a1
ffff8f82`839eff80 fffff800`818aaa98 : ffff8f82`839f00d0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffff8f82`839f0080 fffff800`818b8bf0 : ffffffff`ffffffff ffffaf04`fb49b778 ffff8f82`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff8f82`839f0420 fffff800`81dc7a5d : ffffaf04`fb7f5080 ffffaf04`fb7f5080 ffffaf04`fb4a9740 ffffaf04`fb49b770 : nt!MiDeleteVad+0x860
ffff8f82`839f05e0 fffff800`81dd9e14 : ffffaf04`fb4a9740 ffffaf04`fb48ed40 ffffaf04`fb7f5080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8f82`839f0610 fffff800`81dd98cf : ffffaf04`fb4b2660 ffffaf04`fb4b2660 ffffaf04`fb49b400 fffff800`81c6a3c0 : nt!MiCleanVad+0x30
ffff8f82`839f0640 fffff800`81e38771 : ffffffff`00000000 ffffffff`ffffffff ffff8f82`839f0801 ffffaf04`fb49b400 : nt!MmCleanProcessAddressSpace+0x137
ffff8f82`839f06c0 fffff800`81e5e6d3 : ffffaf04`fb49b400 ffffe703`87c57770 ffff8f82`839f08e9 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffff8f82`839f0740 fffff800`81ecd143 : ffffaf04`000005bb ffff8f82`839f0801 00000000`003e2000 fffff800`8183e527 : nt!PspExitThread+0x60b
ffff8f82`839f0850 fffff800`8183e551 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffff8f82`839f0890 fffff800`819c5a60 : ffff8f82`839f0b01 ffff8f82`839f0950 00000000`00000001 00000000`00000000 : nt!KiDeliverApc+0x481
ffff8f82`839f0950 fffff800`819d2dbf : 00000000`00000000 ffff8f82`839f0b80 ffffaf04`fb7f5080 00000000`08def558 : nt!KiInitiateUserApc+0x70
ffff8f82`839f0a90 00007ffd`887fcc14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`08def538 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`887fcc14


THREAD_SHA1_HASH_MOD_FUNC:  e0b3ea397b28567c1892727cd05f12769e19b6db

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  dd633bfca007cc046c1d6caef1a720b24537971b

THREAD_SHA1_HASH_MOD:  65e960981daf68eaa3f111ef44aadfdc4bfefe1e

FOLLOWUP_IP:
nt!MiDereferenceIoPages+14af16
fffff800`81a404c2 cc              int     3

FAULT_INSTR_CODE:  1bacc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiDereferenceIoPages+14af16

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  14af16

FAILURE_BUCKET_ID:  0x1a_61948_nt!MiDereferenceIoPages

BUCKET_ID:  0x1a_61948_nt!MiDereferenceIoPages

PRIMARY_PROBLEM_CLASS:  0x1a_61948_nt!MiDereferenceIoPages

TARGET_TIME:  2020-01-06T16:48:02.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  4826

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_61948_nt!midereferenceiopages

FAILURE_ID_HASH:  {16899f95-043e-78ea-0aba-e664d76c4fc5}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffe0c984616d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffe0c98461628, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: fffffe0c984616d0

BUGCHECK_P3: fffffe0c98461628

BUGCHECK_P4: 0

TRAP_FRAME:  fffffe0c984616d0 -- (.trap 0xfffffe0c984616d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff868b407457e8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80307648b10 rsp=fffffe0c98461860 rbp=ffff868b40fe0080
 r8=0000000000000001  r9=0000000000000000 r10=7fffffffffffff00
r11=ffffc5002cf40180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiExitDispatcher+0x160:
fffff803`07648b10 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffffe0c98461628 -- (.exr 0xfffffe0c98461628)
ExceptionAddress: fffff80307648b10 (nt!KiExitDispatcher+0x0000000000000160)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  opera.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-07-2020 01:31:02.0170

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff803077d32e9 to fffff803077c14e0

STACK_TEXT: 
fffffe0c`984613a8 fffff803`077d32e9 : 00000000`00000139 00000000`00000003 fffffe0c`984616d0 fffffe0c`98461628 : nt!KeBugCheckEx
fffffe0c`984613b0 fffff803`077d3710 : 00000000`00000001 00000000`00000000 fffff803`05289180 fffff803`0755eb95 : nt!KiBugCheckDispatch+0x69
fffffe0c`984614f0 fffff803`077d1aa5 : 00000000`05060608 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffe0c`984616d0 fffff803`07648b10 : 00000000`00000000 00000000`00000000 ffff868b`40081001 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
fffffe0c`98461860 fffff803`076a50e9 : ffff868b`407457e0 00000000`00000000 ffff868b`40fe0080 ffffc500`2cf40180 : nt!KiExitDispatcher+0x160
fffffe0c`984618c0 fffff803`07c52140 : ffff868b`3f6b83a0 ffff868b`40fe0080 ffff868b`40fe0000 ffff868b`40081080 : nt!KeRequestTerminationThread+0xed
fffffe0c`984619a0 fffff803`07c5184f : 00000000`00000008 ffff868b`40fe0080 00000000`00000000 00000000`00000000 : nt!PspTerminateThreadByPointer+0x80
fffffe0c`984619e0 fffff803`07c39fc0 : ffff868b`403b5080 00000000`00000000 ffff868b`3f6b80c0 ffff868b`3f6b80c0 : nt!PspTerminateAllThreads+0xcb
fffffe0c`98461a50 fffff803`07c39da9 : ffffffff`ffffffff fffffe0c`98461b80 ffff868b`3f6b80c0 fffff803`07cb0701 : nt!PspTerminateProcess+0xe0
fffffe0c`98461a90 fffff803`077d2d18 : ffff868b`00001968 ffff868b`40081080 ffff868b`3f6b80c0 00000000`00000000 : nt!NtTerminateProcess+0xa9
fffffe0c`98461b00 00007ffc`cd23c644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000031`121feef8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`cd23c644


THREAD_SHA1_HASH_MOD_FUNC:  8b6fd936d5d89d4457bb69a2b0b933d76732fd69

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  049103aace12c6aa588cf829f7956e0fa9f35cca

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff803`077d3710 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

TARGET_TIME:  2020-01-01T09:32:03.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  4a1e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80678842bb4, Address of the instruction which caused the bugcheck
Arg3: fffff68de976aac0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80678842bb4

BUGCHECK_P3: fffff68de976aac0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!RtlpHpVsContextAllocateInternal+204
fffff806`78842bb4 3309            xor     ecx,dword ptr [rcx]

CONTEXT:  fffff68de976aac0 -- (.cxr 0xfffff68de976aac0)
rax=ffff0005f395db18 rbx=ffffd205ede00280 rcx=ffff0005f395db10
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffd205ede00000
rip=fffff80678842bb4 rsp=fffff68de976b4b0 rbp=00000000006e0000
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=fffff68de976b58c
r14=ffffd205ede00290 r15=fffff68de976b5c0
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nt!RtlpHpVsContextAllocateInternal+0x204:
fffff806`78842bb4 3309            xor     ecx,dword ptr [rcx] ds:002b:ffff0005`f395db10=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-07-2020 01:30:58.0067

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8067883330e to fffff80678842bb4

STACK_TEXT: 
fffff68d`e976b4b0 fffff806`7883330e : 00000000`0000006e 00000000`000006c0 00000000`000006c0 ffffd205`ede00000 : nt!RtlpHpVsContextAllocateInternal+0x204
fffff68d`e976b520 fffff806`78b6f06d : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`0000067c : nt!ExAllocateHeapPool+0xc0e
fffff68d`e976b660 fffff806`78de9a50 : ffffbf0e`a389d7a0 00000000`00000000 00000000`00000000 ffffd205`00000000 : nt!ExAllocatePoolWithTag+0x5d
fffff68d`e976b6b0 fffff806`78ddc36d : ffffbf0e`00000008 ffffbf0e`a3899600 00000000`00000000 fffff68d`e976b770 : nt!ObpAllocateObject+0x1a0
fffff68d`e976b730 fffff806`78ddbb72 : ffffd205`f358c730 fffff68d`e976b8c8 ffffd205`f381db50 ffffbf0e`ab02fe90 : nt!ObCreateObjectEx+0xfd
fffff68d`e976b7a0 fffff806`78dc9c49 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd205`f39879a0 : nt!SepDuplicateToken+0x102
fffff68d`e976b880 fffff806`78dcf062 : ffffd205`f39879a0 00000000`00000000 00000000`00000000 00000000`000000c0 : nt!SeCopyClientToken+0x65
fffff68d`e976b910 fffff806`78dcec32 : ffffd205`f358c730 00000000`00000000 ffffbf0e`aac83600 00000000`00000001 : nt!SepCreateClientSecurityEx+0x132
fffff68d`e976b980 fffff806`78dcc638 : 00000224`2572ac00 ffffd205`f3987980 00000000`00000000 ffffbf0e`aac81a00 : nt!SeCreateClientSecurity+0x112
fffff68d`e976ba20 fffff806`78dc3f84 : 00000224`2572ac10 fffff68d`e976bb80 00000224`2572abf0 00000000`00000001 : nt!AlpcpCreateSecurityContext+0x90
fffff68d`e976ba80 fffff806`789d2d18 : ffffbf0e`aaccb340 00000224`2572abe0 fffff68d`e976bb80 ffffbf0e`aac81a00 : nt!NtAlpcCreateSecurityContext+0x134
fffff68d`e976bb00 00007ffb`2611d054 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ea`fd4fe128 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`2611d054


THREAD_SHA1_HASH_MOD_FUNC:  5811bd1ea32517330ebd519ed8a952ae023a04b6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  2b2f279f038c2709c899ff6e6510032755feddbe

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!RtlpHpVsContextAllocateInternal+204
fffff806`78842bb4 3309            xor     ecx,dword ptr [rcx]

FAULT_INSTR_CODE:  d330933

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!RtlpHpVsContextAllocateInternal+204

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .cxr 0xfffff68de976aac0 ; kb

BUCKET_ID_FUNC_OFFSET:  204

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!RtlpHpVsContextAllocateInternal

BUCKET_ID:  0x3B_c0000005_nt!RtlpHpVsContextAllocateInternal

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!RtlpHpVsContextAllocateInternal

TARGET_TIME:  2019-12-31T13:00:59.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2458

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!rtlphpvscontextallocateinternal

FAILURE_ID_HASH:  {c0957ae0-3dcd-d699-97a3-84fa3a6586ca}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff9609dfd41160, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9609dfd410b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffff9609dfd41160

BUGCHECK_P3: ffff9609dfd410b8

BUGCHECK_P4: 0

TRAP_FRAME:  ffff9609dfd41160 -- (.trap 0xffff9609dfd41160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9a8000009788 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80632dea43a rsp=ffff9609dfd412f0 rbp=ffff9609dfd41391
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000002
r11=0000000000000090 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiUnlinkNodeLargePage+0x1d1a1a:
fffff806`32dea43a cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff9609dfd410b8 -- (.exr 0xffff9609dfd410b8)
ExceptionAddress: fffff80632dea43a (nt!MiUnlinkNodeLargePage+0x00000000001d1a1a)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-07-2020 01:30:53.0346

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80632dd32e9 to fffff80632dc14e0

STACK_TEXT: 
ffff9609`dfd40e38 fffff806`32dd32e9 : 00000000`00000139 00000000`00000003 ffff9609`dfd41160 ffff9609`dfd410b8 : nt!KeBugCheckEx
ffff9609`dfd40e40 fffff806`32dd3710 : ffff818d`c0607080 fffff806`38412177 ffff818d`c0607080 00000100`00000000 : nt!KiBugCheckDispatch+0x69
ffff9609`dfd40f80 fffff806`32dd1aa5 : 00000000`00090600 00000000`00091800 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9609`dfd41160 fffff806`32dea43a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`32c7754a : nt!KiRaiseSecurityCheckFailure+0x325
ffff9609`dfd412f0 fffff806`32c842cb : 00007ff8`00000010 ffff9780`00000002 00000000`00000000 00000000`00000000 : nt!MiUnlinkNodeLargePage+0x1d1a1a
ffff9609`dfd413e0 fffff806`32c840ee : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteLocalLargePage+0x16b
ffff9609`dfd414c0 fffff806`32c78576 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9b3f`00000000 : nt!MiGetFreeOrZeroPageAnyColor+0x62
ffff9609`dfd41500 fffff806`32c513c9 : fffff806`3306a3c0 ffff9609`00000033 ffff818d`bcd04ed8 818dbcd0`00000000 : nt!MiGetPage+0x346
ffff9609`dfd415e0 fffff806`32c7a4a8 : ffff9609`dfd41880 ffffc88f`5148cd88 ffff9780`0b52df20 ffff9609`dfd41858 : nt!MiResolveMappedFileFault+0x339
ffff9609`dfd41710 fffff806`32c74bcc : ffff9609`dfd41880 00000000`00000000 ffff9609`dfd41858 ffffc88f`5148cd88 : nt!MiResolveProtoPteFault+0xaf8
ffff9609`dfd41810 fffff806`32c72d09 : 00000000`00000100 00000000`00000100 00000000`c0000016 00000000`00000000 : nt!MiDispatchFault+0x80c
ffff9609`dfd41960 fffff806`32dcf520 : ffff818d`c0607080 000001ca`c464f308 00000000`00008000 0000003f`00000000 : nt!MmAccessFault+0x169
ffff9609`dfd41b00 00007ff8`82f11d8d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
0000003f`982fe568 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`82f11d8d


THREAD_SHA1_HASH_MOD_FUNC:  65e852231aba98309f13d8fb1531e4627eb3b355

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  43fa75a0776a9e913f8671b47ede47ac5025a331

THREAD_SHA1_HASH_MOD:  fe34192f63d13620a8987d294372ee74d699cfee

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff806`32dd3710 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

TARGET_TIME:  2019-12-28T07:47:05.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5dd0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------
 
Memtest86 için usb bellek alacağım, 3 gün içerisinde paylaşacağım diğer testler ektedir.
 

Dosya Ekleri

  • hdd error scan.png
    hdd error scan.png
    12,6 KB · Görüntüleme: 56
  • hdd health.png
    hdd health.png
    17,9 KB · Görüntüleme: 46
  • ssd error scan.png
    ssd error scan.png
    921,3 KB · Görüntüleme: 49
  • ssd health 1.png
    ssd health 1.png
    25,3 KB · Görüntüleme: 51
  • ssd health 2.png
    ssd health 2.png
    15,4 KB · Görüntüleme: 35
  • virüs ss.png
    virüs ss.png
    766,2 KB · Görüntüleme: 40
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı