Windows 10 Mavi Ekran Problemi

LuLzTR

Decapat
Katılım
15 Ekim 2018
Mesajlar
3
Merhabalar. Uzun zamandan beri bu problemi yaşıyorum. Daha önceden konu açtım ama o zamanlar mini dump oluşmuyordu. Mini dump dosyaları için linki aşağı bıraktım, yardımcı olursanız sevinirim.
@@claus

Minidump
 
Son düzenleyen: Moderatör:
Sistem de Overclock veya XMP var mı?
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff9d03113f06f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9d03113f0648, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffff9d03113f06f0

BUGCHECK_P3: ffff9d03113f0648

BUGCHECK_P4: 0

TRAP_FRAME:  ffff9d03113f06f0 -- (.trap 0xffff9d03113f06f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd95944771aa8 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd95944ce6d58 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd90a1021b659 rsp=ffff9d03113f0880 rbp=ffff9d03113f0b80
 r8=0000000000000108  r9=0000000000000060 r10=0000000000000001
r11=ffff9d03113f0850 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
win32kfull!xxxRealInternalGetMessage+0x1ac9:
ffffd90a`1021b659 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff9d03113f0648 -- (.exr 0xffff9d03113f0648)
ExceptionAddress: ffffd90a1021b659 (win32kfull!xxxRealInternalGetMessage+0x0000000000001ac9)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  uTorrent.exe

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-12-2019 21:25:52.0122

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff804305d30e9 to fffff804305c1220

STACK_TEXT: 
ffff9d03`113f03c8 fffff804`305d30e9 : 00000000`00000139 00000000`00000003 ffff9d03`113f06f0 ffff9d03`113f0648 : nt!KeBugCheckEx
ffff9d03`113f03d0 fffff804`305d3510 : 00000000`00000001 00000000`00000000 00000000`00000001 fffff804`30aae3c3 : nt!KiBugCheckDispatch+0x69
ffff9d03`113f0510 fffff804`305d18a5 : 00000000`00000000 ffffd90a`0f815d9a 00000000`00000438 ffffd959`44ce6801 : nt!KiFastFailDispatch+0xd0
ffff9d03`113f06f0 ffffd90a`1021b659 : ffff9d03`113f0b80 00000000`00000000 ffffd959`44ce68a0 ffff9d03`113f0b80 : nt!KiRaiseSecurityCheckFailure+0x325
ffff9d03`113f0880 ffffd90a`102197e2 : ffff9d03`113f0aa8 ffffb70e`fceca500 00000000`00000000 00000000`00000000 : win32kfull!xxxRealInternalGetMessage+0x1ac9
ffff9d03`113f0a60 fffff804`305d2b15 : ffffb70e`fceca5c0 00007ff9`4b0d5930 00000000`00000020 00007ff9`4b0d4a40 : win32kfull!NtUserGetMessage+0x92
ffff9d03`113f0b00 00007ff9`4b0dfd74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0009e5a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`4b0dfd74


THREAD_SHA1_HASH_MOD_FUNC:  45f0cb0334a1005030785d7bdf84582ff4b3a920

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  40bb7eb19d0524d7ac1ee4e19af0da4612de6881

THREAD_SHA1_HASH_MOD:  633760a2ca02edd8955c8ca7f5ac9a03794f2cfc

FOLLOWUP_IP:
win32kfull!xxxRealInternalGetMessage+1ac9
ffffd90a`1021b659 cd29            int     29h

FAULT_INSTR_CODE:  3b929cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  win32kfull!xxxRealInternalGetMessage+1ac9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  6d47ba62

IMAGE_VERSION:  10.0.18362.387

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1ac9

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_win32kfull!xxxRealInternalGetMessage

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_win32kfull!xxxRealInternalGetMessage

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_win32kfull!xxxRealInternalGetMessage

TARGET_TIME:  2019-11-08T19:20:44.000Z

OSBUILD:  18362

OSSERVICEPACK:  418

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  b0c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_win32kfull!xxxrealinternalgetmessage

FAILURE_ID_HASH:  {c6529162-fcac-9474-52e5-0ad7ac14122b}

Followup:     MachineOwner
---------

0: kd> lmvm win32kfull
Browse full module list
start             end                 module name
ffffd90a`101c0000 ffffd90a`10560000   win32kfull   (pdb symbols)          C:\ProgramData\dbg\sym\win32kfull.pdb\B94601074AC52D85ECC73426FE19A3A81\win32kfull.pdb
    Loaded symbol image file: win32kfull.sys
    Mapped memory image file: C:\ProgramData\dbg\sym\win32kfull.sys\6D47BA623a0000\win32kfull.sys
    Image path: \SystemRoot\System32\win32kfull.sys
    Image name: win32kfull.sys
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        6D47BA62 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00398534
    ImageSize:        003A0000
    File version:     10.0.18362.387
    Product version:  10.0.18362.387
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     win32kfull.sys
        OriginalFilename: win32kfull.sys
        ProductVersion:   10.0.18362.387
        FileVersion:      10.0.18362.387 (WinBuild.160101.0800)
        FileDescription:  Full/Desktop Win32k Kernel Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8043c889b1f, Address of the instruction which caused the bugcheck
Arg3: ffff9a0b555c2eb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8043c889b1f

BUGCHECK_P3: ffff9a0b555c2eb0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
dxgmms2!VidSchiAllocateQueuePacket+1f
fffff804`3c889b1f 488b7018        mov     rsi,qword ptr [rax+18h]

CONTEXT:  ffff9a0b555c2eb0 -- (.cxr 0xffff9a0b555c2eb0)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe005b7ec0bf0
rdx=0000000000000001 rsi=0000000000000000 rdi=ffffe005b7ec0bf0
rip=fffff8043c889b1f rsp=ffff9a0b555c38a0 rbp=ffff9a0b555c3a90
 r8=0000000000000000  r9=0000000000000000 r10=7ffffffffffffffc
r11=ffff9a0b555c3b50 r12=0000000000000001 r13=0000000000000001
r14=ffff9a0b555c3a78 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
dxgmms2!VidSchiAllocateQueuePacket+0x1f:
fffff804`3c889b1f 488b7018        mov     rsi,qword ptr [rax+18h] ds:002b:00000000`00000018=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-12-2019 21:25:56.0491

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8043c814f01 to fffff8043c889b1f

STACK_TEXT: 
ffff9a0b`555c38a0 fffff804`3c814f01 : ffff9a0b`555c3a78 00000000`00000001 00000000`00000001 ffff9a0b`555c3a90 : dxgmms2!VidSchiAllocateQueuePacket+0x1f
ffff9a0b`555c3990 fffff80e`6543dcb1 : ffffe005`00000000 00000000`00000000 00000000`00000000 ffff9a0b`555c3a18 : dxgmms2!VidSchSignalSyncObjectsFromGpu+0x2a1
ffff9a0b`555c3bc0 fffff80e`6543dbba : ffff9a0b`555c3db8 00000000`00000000 ffff9a0b`555c3dc0 00000000`00000004 : dxgkrnl!DXGADAPTERSYNCOBJECT::AdapterObjectSignalFence+0xd5
ffff9a0b`555c3cf0 fffff80e`6543db48 : 00000000`00000000 ffffa088`ee6cdcf0 00000000`c00000bb ffffa088`e3d075f0 : dxgkrnl!DXGSYNCOBJECT::SignalFence+0x52
ffff9a0b`555c3d40 fffff80e`653182c7 : 00000000`00000000 00000000`00000008 ffffd1cd`d83ad2b6 ffffdd1a`6a8148ae : dxgkrnl!DxgkImmediateSignalSynchronizationObjectByReference+0x1c
ffff9a0b`555c3d70 fffff80e`6532c5de : 00000000`00000000 00000000`00000006 00000000`00000005 fffff804`00000001 : dxgkrnl!CFlipExBuffer::SignalGpuFence+0x137
ffff9a0b`555c3dd0 fffff80e`6532069a : ffffa088`ee6cdcf0 00000000`00000000 00000000`00000001 ffffa088`e619c330 : dxgkrnl!CompositionSurfaceObject::SignalGpuFence+0x62
ffff9a0b`555c3e10 fffff80e`6531a978 : ffffa088`e619c330 ffff9a0b`555c3f39 00000000`00000fd0 00000000`00000005 : dxgkrnl!CFlipToken::Discard+0x11a
ffff9a0b`555c3e90 fffff80e`6532c042 : ffffdd1a`6a8c35b0 00000000`00000fd0 ffff9a0b`555c3f39 00000000`00000fd0 : dxgkrnl!CFlipToken::`vector deleting destructor'+0x88
ffff9a0b`555c3ec0 fffff80e`6531b9d4 : ffffa088`e0cd3ae0 00000000`00000000 ffffa088`e1882770 ffffa088`e1882770 : dxgkrnl!CTokenManager::CompleteIndendentFlipToken+0x15a
ffff9a0b`555c3fa0 fffff80e`6531afea : ffffa088`e0cd3ae0 ffffa088`00000000 ffffa088`e0cd3ae0 00000000`00000000 : dxgkrnl!CTokenManager::ProcessDxgkAdapterTokens+0x944
ffff9a0b`555c48d0 fffff80e`6532a429 : 00000000`00000000 ffffe005`b6837ee0 ffffa088`e1882770 fffff80e`6531ffe4 : dxgkrnl!CTokenManager::ProcessTokens+0x18a
ffff9a0b`555c4990 fffff80e`6531ff1d : 00000000`00000000 ffff9a0b`555c4b80 ffffa088`e1882770 fffff804`3f6177d6 : dxgkrnl!CTokenManager::TokenThread+0x79
ffff9a0b`555c49e0 fffff804`3f1d2b15 : ffffe005`bac86080 00000000`00000000 00000000`00000020 00000000`00000000 : dxgkrnl!NtTokenManagerThread+0x1cd
ffff9a0b`555c4b00 00007ff8`1b5a7de4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ae`3d52f888 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`1b5a7de4


THREAD_SHA1_HASH_MOD_FUNC:  dfd4c38585a8f564df36b8e7214ae36e43e855b0

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e357100a3f9afb39006518628382c457b3e3f0f7

THREAD_SHA1_HASH_MOD:  ca69077250e62f5a3d362498cf16ca73b35c47e8

FOLLOWUP_IP:
dxgmms2!VidSchiAllocateQueuePacket+1f
fffff804`3c889b1f 488b7018        mov     rsi,qword ptr [rax+18h]

FAULT_INSTR_CODE:  18708b48

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms2!VidSchiAllocateQueuePacket+1f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .cxr 0xffff9a0b555c2eb0 ; kb

BUCKET_ID_FUNC_OFFSET:  1f

FAILURE_BUCKET_ID:  0x3B_c0000005_dxgmms2!VidSchiAllocateQueuePacket

BUCKET_ID:  0x3B_c0000005_dxgmms2!VidSchiAllocateQueuePacket

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_dxgmms2!VidSchiAllocateQueuePacket

TARGET_TIME:  2019-11-10T13:25:50.000Z

OSBUILD:  18362

OSSERVICEPACK:  418

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  b0e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_dxgmms2!vidschiallocatequeuepacket

FAILURE_ID_HASH:  {5b487c61-1fe6-92fd-d303-66fce6aeef2b}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CACHE_MANAGER (34)
    See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000051359
Arg2: ffff948df5ec33d8
Arg3: ffff948df5ec2c20
Arg4: fffff803790e5b6a

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 51359

BUGCHECK_P2: ffff948df5ec33d8

BUGCHECK_P3: ffff948df5ec2c20

BUGCHECK_P4: fffff803790e5b6a

EXCEPTION_RECORD:  ffff948df5ec33d8 -- (.exr 0xffff948df5ec33d8)
ExceptionAddress: fffff803790e5b6a (nt!RtlpHpLfhSubsegmentFreeBlock+0x000000000000008a)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000049
Attempt to read from address 0000000000000049

CONTEXT:  ffff948df5ec2c20 -- (.cxr 0xffff948df5ec2c20)
rax=0000000000000061 rbx=0000000000001050 rcx=0000000000000001
rdx=00000000000064f0 rsi=ffffa80d2f5db000 rdi=ffffffffffffffff
rip=fffff803790e5b6a rsp=ffff948df5ec3610 rbp=0000000000000000
 r8=0000000000000210  r9=0000000000000000 r10=ffffa80d2f5e1700
r11=0000000000000fff r12=0000000000000001 r13=00000000ffffffff
r14=ffffa80d19a00340 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010217
nt!RtlpHpLfhSubsegmentFreeBlock+0x8a:
fffff803`790e5b6a 8b4148          mov     eax,dword ptr [rcx+48h] ds:002b:00000000`00000049=????????
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

CURRENT_IRQL:  0

FOLLOWUP_IP:
nt!ExFreePool+9
fffff803`7936f0a9 4883c428        add     rsp,28h

FAULTING_IP:
nt!RtlpHpLfhSubsegmentFreeBlock+8a
fffff803`790e5b6a 8b4148          mov     eax,dword ptr [rcx+48h]

BUGCHECK_STR:  0x34

READ_ADDRESS: fffff803795733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000049

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000049

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-12-2019 21:26:00.0981

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80379045e97 to fffff803790e5b6a

STACK_TEXT: 
ffff948d`f5ec3610 fffff803`79045e97 : ffffa80d`19a00340 fffff803`790541ff 00000000`00000000 ffff9806`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x8a
ffff948d`f5ec36d0 fffff803`7936f0a9 : 00000000`00000040 00000000`00000004 ffff9806`9cbc7748 01000000`00100000 : nt!ExFreeHeapPool+0x357
ffff948d`f5ec37f0 fffff803`795f9de7 : ffffa80d`2f5e1710 00000000`00000001 00000000`00000000 ffff9806`a9e29cc8 : nt!ExFreePool+0x9
ffff948d`f5ec3820 fffff803`79053f8c : 00000000`00000000 00000000`00000000 00000000`00018000 00000000`00018000 : nt!MiReleaseReadListResources+0x7f
ffff948d`f5ec3850 fffff803`790a50b5 : ffff9806`a4b0f040 fffff803`7908c220 00000000`00000000 00000000`00000005 : nt!MmWaitForCacheManagerPrefetch+0x3c
ffff948d`f5ec3880 fffff803`7908c4a5 : 01d598ae`3076e6f9 ffff9806`00000000 00000000`00000000 ffff9806`9caf09b0 : nt!CcPerformReadAhead+0x351
ffff948d`f5ec3a50 fffff803`790bd465 : ffff9806`9cae29e0 ffff9806`a4b0f040 ffff9806`9cae29e0 ffff9806`00000200 : nt!CcWorkerThread+0x285
ffff948d`f5ec3b70 fffff803`7912a725 : ffff9806`a4b0f040 00000000`00000080 ffff9806`9ca69200 ffffdb90`cbfeac71 : nt!ExpWorkerThread+0x105
ffff948d`f5ec3c10 fffff803`791c886a : ffff8180`55220180 ffff9806`a4b0f040 fffff803`7912a6d0 00000000`00000064 : nt!PspSystemThreadStartup+0x55
ffff948d`f5ec3c60 00000000`00000000 : ffff948d`f5ec4000 ffff948d`f5ebe000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  a566fb3f35aaedce9307f4c690ff8d7216eb2330

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ed925172ba441450d3978c28aa9a29020de8166f

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FAULT_INSTR_CODE:  28c48348

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!ExFreePool+9

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.418

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xffff948df5ec2c20 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x34_nt!ExFreePool

BUCKET_ID:  0x34_nt!ExFreePool

PRIMARY_PROBLEM_CLASS:  0x34_nt!ExFreePool

TARGET_TIME:  2019-11-11T16:36:38.000Z

OSBUILD:  18362

OSSERVICEPACK:  418

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2349

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x34_nt!exfreepool

FAILURE_ID_HASH:  {bef2d914-8af1-1fb2-0b41-3dfb43df10c9}

Followup:     Pool_corruption
---------

0: kd> lmvm Pool_Corruption
Browse full module list
start             end                 module name

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8027269f8fe, Address of the instruction which caused the bugcheck
Arg3: ffff868a8b604dd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8027269f8fe

BUGCHECK_P3: ffff868a8b604dd0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObpCaptureHandleInformation+ae
fffff802`7269f8fe 8a4028          mov     al,byte ptr [rax+28h]

CONTEXT:  ffff868a8b604dd0 -- (.cxr 0xffff868a8b604dd0)
rax=0000000000000000 rbx=ffffa482f6497db0 rcx=ffffcf015e137ea8
rdx=ffffa482fe359270 rsi=ffffa482f6497db0 rdi=0000000000000b6c
rip=fffff8027269f8fe rsp=ffff868a8b6057c8 rbp=ffffa482fa0c5e80
 r8=0000000000000000  r9=ffffa482fe359240 r10=0000000000137e70
r11=ffff868a8b605810 r12=ffffcf015e000050 r13=ffff868a8b6058c0
r14=fffff8027269f850 r15=000000000017fffc
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!ObpCaptureHandleInformation+0xae:
fffff802`7269f8fe 8a4028          mov     al,byte ptr [rax+28h] ds:002b:00000000`00000028=??
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  Steam.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-12-2019 21:26:06.0204

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8027270cf39 to fffff8027269f8fe

STACK_TEXT: 
ffff868a`8b6057c8 fffff802`7270cf39 : 00000000`00000b6c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0xae
ffff868a`8b6057d0 fffff802`7270a7c5 : fffff802`7269f850 ffffa482`fa0c5e98 ffff868a`0017fffc 00000000`0017fffc : nt!ExpSnapShotHandleTables+0x131
ffff868a`8b605860 fffff802`725a8998 : 00000000`0185c050 00000000`00020000 00000000`00137e70 ffffcf01`5e000050 : nt!ExpGetHandleInformation+0x71
ffff868a`8b6058b0 fffff802`723e131b : 00000000`00000004 ffff868a`8b605b80 00000000`00000002 fffff802`71fcf459 : nt!ExpQuerySystemInformation+0x1c7558
ffff868a`8b605ac0 fffff802`71fd2b15 : 00000000`01430000 ffff868a`8b605b80 00000000`00000004 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x2b
ffff868a`8b605b00 00007ff8`6185c784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`09fde278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6185c784


THREAD_SHA1_HASH_MOD_FUNC:  20654208cc7e34b6bf534b6083db1b7ca9d50f43

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e724b771f0a56c0b525565a9431cd3e0a138a121

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!ObpCaptureHandleInformation+ae
fffff802`7269f8fe 8a4028          mov     al,byte ptr [rax+28h]

FAULT_INSTR_CODE:  8828408a

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpCaptureHandleInformation+ae

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.418

STACK_COMMAND:  .cxr 0xffff868a8b604dd0 ; kb

BUCKET_ID_FUNC_OFFSET:  ae

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObpCaptureHandleInformation

BUCKET_ID:  0x3B_c0000005_nt!ObpCaptureHandleInformation

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ObpCaptureHandleInformation

TARGET_TIME:  2019-11-12T17:55:47.000Z

OSBUILD:  18362

OSSERVICEPACK:  418

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1777

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!obpcapturehandleinformation

FAILURE_ID_HASH:  {744cd2bf-a795-9cd1-d425-97880ad655c5}

Followup:     MachineOwner
---------
 
Nvidia DDU ile kaldır ve güncel sürücüyü yükle. Kaspersky kaldır. 1909 geçiş yap.
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8027269f8fe, Address of the instruction which caused the bugcheck
Arg3: ffff868a8b604dd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 6

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-R1MKTM3

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 7

Key : Analysis.Memory.CommitPeak.Mb
Value: 68

Key : Analysis.System
Value: CreateObject


BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8027269f8fe

BUGCHECK_P3: ffff868a8b604dd0

BUGCHECK_P4: 0

CONTEXT:  ffff868a8b604dd0 -- (.cxr 0xffff868a8b604dd0)
rax=0000000000000000 rbx=ffffa482f6497db0 rcx=ffffcf015e137ea8
rdx=ffffa482fe359270 rsi=ffffa482f6497db0 rdi=0000000000000b6c
rip=fffff8027269f8fe rsp=ffff868a8b6057c8 rbp=ffffa482fa0c5e80
r8=0000000000000000 r9=ffffa482fe359240 r10=0000000000137e70
r11=ffff868a8b605810 r12=ffffcf015e000050 r13=ffff868a8b6058c0
r14=fffff8027269f850 r15=000000000017fffc
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!ObpCaptureHandleInformation+0xae:
fffff802`7269f8fe 8a4028 mov al,byte ptr [rax+28h] ds:002b:00000000`00000028=??
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Steam.exe

STACK_TEXT:
ffff868a`8b6057c8 fffff802`7270cf39 : 00000000`00000b6c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0xae
ffff868a`8b6057d0 fffff802`7270a7c5 : fffff802`7269f850 ffffa482`fa0c5e98 ffff868a`0017fffc 00000000`0017fffc : nt!ExpSnapShotHandleTables+0x131
ffff868a`8b605860 fffff802`725a8998 : 00000000`0185c050 00000000`00020000 00000000`00137e70 ffffcf01`5e000050 : nt!ExpGetHandleInformation+0x71
ffff868a`8b6058b0 fffff802`723e131b : 00000000`00000004 ffff868a`8b605b80 00000000`00000002 fffff802`71fcf459 : nt!ExpQuerySystemInformation+0x1c7558
ffff868a`8b605ac0 fffff802`71fd2b15 : 00000000`01430000 ffff868a`8b605b80 00000000`00000004 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x2b
ffff868a`8b605b00 00007ff8`6185c784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`09fde278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6185c784


SYMBOL_NAME: nt!ObpCaptureHandleInformation+ae

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.418

STACK_COMMAND: .cxr 0xffff868a8b604dd0 ; kb

BUCKET_ID_FUNC_OFFSET: ae

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObpCaptureHandleInformation

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {744cd2bf-a795-9cd1-d425-97880ad655c5}

Followup:     MachineOwner
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Yeni konular

Geri
Yukarı