Yeni PC mavi ekran veriyor

Akinnn22

Centipat
Katılım
19 Kasım 2019
Mesajlar
83
Bugün yeni PC aldım ama 4 kere mavi ekran hatası verdi. Bütün driverlar güncel. Nasıl düzeltebilirim?
 
Son düzenleyen: Moderatör:
 
Kaspersky, Ryzen Master kaldır.

Komut satırını(CMD) yönetici olarak başlatın "sfc /scannow" yazın işlemi başlatın, işlem bitince bilgisayarı yeniden başlatın.

Sistemde takılı tüm depolama birimlerinin HDtune(Error Scan, Health) sonuçlarını paylaş.
Kod:
UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffa5051f5ca000, Pointer to the store context or data manager
Arg2: ffffc708a73167e0, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffa5051f5ca000

BUGCHECK_P2: ffffc708a73167e0

BUGCHECK_P3: 1

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffffc708a7317788 -- (.exr 0xffffc708a7317788)
ExceptionAddress: fffff8074d05bef1 (nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0x000000000010eb95)
   ExceptionCode: c0000420 (Assertion failure)
  ExceptionFlags: 00000000
NumberParameters: 0
Assertion: (((NTSTATUS)(Status)) >= 0)

EXCEPTION_CODE: (NTSTATUS) 0xc0000420 - <Unable to get error code text>

FAULTING_IP:
nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+10eb95
fffff807`4d05bef1 cd2c            int     2Ch

FOLLOWUP_IP:
nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+10eb95
fffff807`4d05bef1 cd2c            int     2Ch

EXCEPTION_PARAMETER1:  000000004dcf9e51

EXCEPTION_PARAMETER2:  0000000000000005

BUGCHECK_STR:  0x154_c0000420

CONTEXT:  ffffc708a7316fd0 -- (.cxr 0xffffc708a7316fd0)
rax=00000000c0000225 rbx=ffffa5051f5ca0e8 rcx=ffffa50521b1e520
rdx=0000000000000018 rsi=0000000000000000 rdi=ffffa5051f5ca050
rip=fffff8074d05bef1 rsp=ffffc708a73179c0 rbp=ffffa5051f5ca0d0
 r8=000000000000004c  r9=000000004dcf9e51 r10=0000000000000005
r11=0000000000000006 r12=ffffa505239c8750 r13=0000000000000000
r14=000000000000989a r15=ffffa505239c8750
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00240282
nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0x10eb95:
fffff807`4d05bef1 cd2c            int     2Ch
Resetting default scope

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  MemCompression

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000420 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000420

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-25-2020 17:43:05.0085

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8074cf4d6f6 to fffff8074d05bef1

STACK_TEXT: 
ffffc708`a73179c0 fffff807`4cf4d6f6 : 00000000`00000000 ffffc708`a7317a69 ffffa505`1f5ca050 ffffa505`0000989a : nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0x10eb95
ffffc708`a7317a00 fffff807`4cf4e92d : 00000000`00000000 ffffa505`1775e350 00000000`00000000 fffff807`4cf3b83f : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x202
ffffc708`a7317ad0 fffff807`4cf3b06e : ffffa505`1f5ca000 ffffc708`a7317b98 00000000`00000001 ffffa505`1f64a240 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xc1
ffffc708`a7317b20 fffff807`4cf3af31 : 00000000`00000000 ffffe001`00000000 ffffa505`00000000 00000000`000000cc : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x12e
ffffc708`a7317be0 fffff807`4cf2a7a5 : ffffa505`1f5ca000 fffff807`4cf3af20 ffffc708`a726f278 00000067`b4bbbdff : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
ffffc708`a7317c10 fffff807`4cfc8b2a : ffffe001`4d313180 ffffa505`1f64a240 fffff807`4cf2a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc708`a7317c60 00000000`00000000 : ffffc708`a7318000 ffffc708`a7312000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  0e6af0b4bbb2e57dfd411b7bfdeca0366700b50c

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  808caf002aa88eaf909047e139eb8df7a4e56a9d

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FAULT_INSTR_CODE:  2ce92ccd

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+10eb95

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .cxr 0xffffc708a7316fd0 ; kb

BUCKET_ID_FUNC_OFFSET:  10eb95

FAILURE_BUCKET_ID:  0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRecordRemove

BUCKET_ID:  0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRecordRemove

PRIMARY_PROBLEM_CLASS:  0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRecordRemove

TARGET_TIME:  2020-01-25T08:35:58.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  32d3

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x154_c0000420_nt!st_store_sm_traits_::stdmpagerecordremove

FAILURE_ID_HASH:  {b82a73ea-d098-8451-8193-a5c6604483ac}

Followup:     MachineOwner
---------

KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000011, Type of corruption detected
Arg2: ffff8b8a30010100, Address of the heap that reported the corruption
Arg3: ffff8b8a3ee17480, Address at which the corruption was detected
Arg4: 0000000000000000

Debugging Details:
------------------

fffff8070c9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 11

BUGCHECK_P2: ffff8b8a30010100

BUGCHECK_P3: ffff8b8a3ee17480

BUGCHECK_P4: 0

FAULTING_IP:
nt!ObpFreeObject+197
fffff807`0c9fa2d7 4c8b642420      mov     r12,qword ptr [rsp+20h]

POOL_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffff8b8a3ee17480

FREED_POOL_TAG:  E

BUGCHECK_STR:  0x13a_11_E

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  sdiagnhost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-25-2020 17:43:08.0747

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8070c71ac78 to fffff8070c5c14e0

STACK_TEXT: 
ffffc78a`e2213328 fffff807`0c71ac78 : 00000000`0000013a 00000000`00000011 ffff8b8a`30010100 ffff8b8a`3ee17480 : nt!KeBugCheckEx
ffffc78a`e2213330 fffff807`0c71acd8 : 00000000`00000011 00000000`00000000 ffff8b8a`30010100 00000000`00000000 : nt!RtlpHeapHandleError+0x40
ffffc78a`e2213370 fffff807`0c71a901 : 00000000`00000080 ffff8b8a`3ee02000 00000000`00000000 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58
ffffc78a`e22133a0 fffff807`0c639b02 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
ffffc78a`e22133d0 fffff807`0c445ed7 : ffff8b8a`30010340 00000000`000000ff fffff807`0c77a948 ffff8b8a`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x153fb2
ffffc78a`e2213490 fffff807`0c76f0a9 : 00000000`00000070 ffff8b8a`3ee17490 00000000`00000070 01000000`00100000 : nt!ExFreeHeapPool+0x357
ffffc78a`e22135b0 fffff807`0c9fa2d7 : ffff8b8a`3b820050 ffff8b8a`3ee174b0 ffff8b8a`310bfda0 ffff8b8a`390e5d40 : nt!ExFreePool+0x9
ffffc78a`e22135e0 fffff807`0c9fa0e8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x197
ffffc78a`e2213640 fffff807`0c43a9a9 : 00000000`00000000 00000000`00000000 ffffc78a`e22137c9 ffff8b8a`3ee174e0 : nt!ObpRemoveObjectRoutine+0x88
ffffc78a`e22136a0 fffff807`0c9ec457 : 00000000`00000000 ffff8b8a`3ee174b0 ffffe087`00000000 ffff8b8a`3d3d3c80 : nt!ObfDereferenceObjectWithTag+0xc9
ffffc78a`e22136e0 fffff807`0ca385a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7
ffffc78a`e2213820 fffff807`0ca38241 : 00000000`00000000 ffff8b8a`3dc9f080 ffffffff`ffffff01 ffff8b8a`3b89b380 : nt!ExSweepHandleTable+0xd5
ffffc78a`e22138d0 fffff807`0ca38769 : ffffffff`ffffffff ffff8b8a`3b89b080 ffffc78a`e2213920 ffff8b8a`00000000 : nt!ObKillProcess+0x35
ffffc78a`e2213900 fffff807`0ca5e6d3 : ffff8b8a`3b89b080 ffffe087`2aad15f0 ffffc78a`e2213b80 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffffc78a`e2213980 fffff807`0ca39deb : 00000000`00000000 ffffc78a`e2213b01 00000095`de150000 ffff8b8a`3dc9f080 : nt!PspExitThread+0x60b
ffffc78a`e2213a90 fffff807`0c5d2d18 : ffff8b8a`00003458 ffff8b8a`3dc9f080 ffff8b8a`3b89b080 00000000`00000000 : nt!NtTerminateProcess+0xeb
ffffc78a`e2213b00 00007ff8`5c5bc644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000095`ddeaf228 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`5c5bc644


THREAD_SHA1_HASH_MOD_FUNC:  ca17f6a209e05677b7f56c6cfd0b53c785006fdd

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a00be4edb0203c0577600c985ccf226b050bff72

THREAD_SHA1_HASH_MOD:  aaa5a324bf1bd3082ad2b464ee2ed2f6d50e564c

FOLLOWUP_IP:
nt!ObpFreeObject+197
fffff807`0c9fa2d7 4c8b642420      mov     r12,qword ptr [rsp+20h]

FAULT_INSTR_CODE:  24648b4c

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  nt!ObpFreeObject+197

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  197

FAILURE_BUCKET_ID:  0x13a_11_E_nt!ObpFreeObject

BUCKET_ID:  0x13a_11_E_nt!ObpFreeObject

PRIMARY_PROBLEM_CLASS:  0x13a_11_E_nt!ObpFreeObject

TARGET_TIME:  2020-01-25T08:43:22.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3112

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x13a_11_e_nt!obpfreeobject

FAILURE_ID_HASH:  {2932d68c-86e4-f595-1ddb-3a079817beaa}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 00000000003c444b, page frame number
Arg3: 0000000000000001, current share count
Arg4: 0000000000000000, 0

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klwtp.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 7

BUGCHECK_P2: 3c444b

BUGCHECK_P3: 1

BUGCHECK_P4: 0

BUGCHECK_STR:  0x4E_7

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-25-2020 17:43:14.0543

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8027f3e7ebb to fffff8027f3c14e0

STACK_TEXT: 
ffffb882`87643d58 fffff802`7f3e7ebb : 00000000`0000004e 00000000`00000007 00000000`003c444b 00000000`00000001 : nt!KeBugCheckEx
ffffb882`87643d60 fffff802`7f24b8ba : ffffba8f`00000000 00000000`00000000 ffffe180`00000000 00000000`003c444b : nt!MiPfnReferenceCountIsZero+0x1d36ab
ffffb882`87643da0 fffff802`8b6e2473 : 00000000`0000018b 00000000`00000001 ffffba8f`00000000 ffffba8f`6c2f8af8 : nt!MmUnlockPages+0x75a
ffffb882`87643e70 00000000`0000018b : 00000000`00000001 ffffba8f`00000000 ffffba8f`6c2f8af8 ffffba8f`6ddf72f0 : klwtp+0x2473
ffffb882`87643e78 00000000`00000001 : ffffba8f`00000000 ffffba8f`6c2f8af8 ffffba8f`6ddf72f0 fffff802`8b6e7582 : 0x18b
ffffb882`87643e80 ffffba8f`00000000 : ffffba8f`6c2f8af8 ffffba8f`6ddf72f0 fffff802`8b6e7582 ffffba8f`6e7fd6d0 : 0x1
ffffb882`87643e88 ffffba8f`6c2f8af8 : ffffba8f`6ddf72f0 fffff802`8b6e7582 ffffba8f`6e7fd6d0 ffffba8f`00000000 : 0xffffba8f`00000000
ffffb882`87643e90 ffffba8f`6ddf72f0 : fffff802`8b6e7582 ffffba8f`6e7fd6d0 ffffba8f`00000000 ffffba8f`6c2f8b08 : 0xffffba8f`6c2f8af8
ffffb882`87643e98 fffff802`8b6e7582 : ffffba8f`6e7fd6d0 ffffba8f`00000000 ffffba8f`6c2f8b08 ffffba8f`6db1f0c0 : 0xffffba8f`6ddf72f0
ffffb882`87643ea0 ffffba8f`6e7fd6d0 : ffffba8f`00000000 ffffba8f`6c2f8b08 ffffba8f`6db1f0c0 00000000`00000000 : klwtp+0x7582
ffffb882`87643ea8 ffffba8f`00000000 : ffffba8f`6c2f8b08 ffffba8f`6db1f0c0 00000000`00000000 00000000`40000010 : 0xffffba8f`6e7fd6d0
ffffb882`87643eb0 ffffba8f`6c2f8b08 : ffffba8f`6db1f0c0 00000000`00000000 00000000`40000010 00000000`00000000 : 0xffffba8f`00000000
ffffb882`87643eb8 ffffba8f`6db1f0c0 : 00000000`00000000 00000000`40000010 00000000`00000000 ffffba8f`6c2f8af8 : 0xffffba8f`6c2f8b08
ffffb882`87643ec0 00000000`00000000 : 00000000`40000010 00000000`00000000 ffffba8f`6c2f8af8 00000000`00000002 : 0xffffba8f`6db1f0c0


THREAD_SHA1_HASH_MOD_FUNC:  46d14455b486eac6dd66a4874df52e4b9c6141c8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  dd288b85bdc7f397813a5580a7f622ef16b18af4

THREAD_SHA1_HASH_MOD:  a892a69bf0532ecc3acedf7959c098668d07c83d

FOLLOWUP_IP:
klwtp+2473
fffff802`8b6e2473 488bcb          mov     rcx,rbx

FAULT_INSTR_CODE:  4ccb8b48

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  klwtp+2473

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: klwtp

IMAGE_NAME:  klwtp.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  463d107f

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2473

FAILURE_BUCKET_ID:  0x4E_7_klwtp!unknown_function

BUCKET_ID:  0x4E_7_klwtp!unknown_function

PRIMARY_PROBLEM_CLASS:  0x4E_7_klwtp!unknown_function

TARGET_TIME:  2020-01-25T08:51:18.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  a1b8

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x4e_7_klwtp!unknown_function

FAILURE_ID_HASH:  {f8cdac05-b3fc-08b1-7845-2d7dd8781f8a}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80361c60eef, The address that the exception occurred at
Arg3: ffffe00e683cae48, Exception Record Address
Arg4: ffffe00e683ca690, Context Record Address

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80361c60eef

BUGCHECK_P3: ffffe00e683cae48

BUGCHECK_P4: ffffe00e683ca690

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
+0
fffff803`61c60eef ??              ???

EXCEPTION_RECORD:  ffffe00e683cae48 -- (.exr 0xffffe00e683cae48)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

CONTEXT:  ffffe00e683ca690 -- (.cxr 0xffffe00e683ca690)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=0000000000000000 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
cs=0000  ss=0000  ds=0000  es=0000  fs=0000  gs=0000             efl=00000000
00000000`00000000 ??              ???
Resetting default scope

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CORRUPT_MODULELIST_AV

BUGCHECK_STR:  AV

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-25-2020 17:43:20.0078

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff803525c14e0

STACK_TEXT: 
ffffe00e`683c9e28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff803`525c14e0


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  CORRUPT_MODULELIST_AV

PRIMARY_PROBLEM_CLASS:  CORRUPT_MODULELIST_AV

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_AV

TARGET_TIME:  2020-01-25T11:23:50.000Z

OSBUILD:  18362

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

ANALYSIS_SESSION_ELAPSED_TIME:  1d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:corrupt_modulelist_av

FAILURE_ID_HASH:  {fc259191-ef0c-6215-476f-d32e5dcaf1b7}

Followup:     MachineOwner
---------


BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 000000000000000d, Attempt to release quota on a corrupted pool allocation.
Arg2: fffff8d0441fa160, Address of pool
Arg3: 000000006e614344, Pool allocation's tag
Arg4: ffffaf82710e9080, Quota process pointer (bad).

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: d

BUGCHECK_P2: fffff8d0441fa160

BUGCHECK_P3: 6e614344

BUGCHECK_P4: ffffaf82710e9080

FAULTING_IP:
win32kfull!Win32FreePoolImpl+52
fffff89c`a36006d2 488b5c2440      mov     rbx,qword ptr [rsp+40h]

BUGCHECK_STR:  0xc2_d

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  ShellExperienceHost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-25-2020 17:43:24.0363

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80268bfad21 to fffff80268bc14e0

STACK_TEXT: 
ffffeb06`2f81b758 fffff802`68bfad21 : 00000000`000000c2 00000000`0000000d fffff8d0`441fa160 00000000`6e614344 : nt!KeBugCheckEx
ffffeb06`2f81b760 fffff802`68d6f0a9 : 00000000`00000000 fffff8d0`441c4ed0 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x1b51a1
ffffeb06`2f81b880 fffff89c`a36006d2 : fffff8d0`44106010 fffff89c`a2a41c8f 00000000`00000000 00000000`0000002d : nt!ExFreePool+0x9
ffffeb06`2f81b8b0 fffff89c`a2a387cc : 00000000`00000000 fffff8d0`441fa160 fffff8d0`441fa160 ffffeb06`2f81b9e0 : win32kfull!Win32FreePoolImpl+0x52
ffffeb06`2f81b8e0 fffff89c`a2a8c80d : 00000000`00000001 ffffeb06`2f81b9e0 fffff8d0`468c01dc fffff89c`a2a7c98e : win32kbase!Win32FreePool+0x2c
ffffeb06`2f81b910 fffff89c`a2a41fd8 : fffff8d0`441fa170 ffffeb06`2f81b9e0 fffff8d0`468c02f0 00000000`00000000 : win32kbase!DirectComposition::CAnimationMarshaler::`vector deleting destructor'+0x21
ffffeb06`2f81b940 fffff89c`a2a41acc : fffff8d0`44106010 00000000`00000000 00000000`00000000 fffff8d0`406f9600 : win32kbase!DirectComposition::CApplicationChannel::EmitDeletionCommands+0x74
ffffeb06`2f81b970 fffff89c`a2a41835 : fffff8d0`44194690 00000000`00000000 ffffaf82`71d0a010 00000000`00000000 : win32kbase!DirectComposition::CApplicationChannel::BuildBatch+0x20c
ffffeb06`2f81b9e0 fffff802`68bd2d18 : fffff8d0`00000025 000000fe`544fed94 000000fe`544fed90 00000000`00000000 : win32kbase!NtDCompositionCommitChannel+0x1f5
ffffeb06`2f81ba90 00007ffa`e1743424 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fe`544fed18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`e1743424


THREAD_SHA1_HASH_MOD_FUNC:  2e05db11af49bc0636283dae65497fb9a7effb0a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0003f49c6cee760d62fb367f5cd32fbd7a10ad30

THREAD_SHA1_HASH_MOD:  c58a55be707233752738a64858536d9204413eb7

FOLLOWUP_IP:
win32kfull!Win32FreePoolImpl+52
fffff89c`a36006d2 488b5c2440      mov     rbx,qword ptr [rsp+40h]

FAULT_INSTR_CODE:  245c8b48

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  win32kfull!Win32FreePoolImpl+52

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  52

FAILURE_BUCKET_ID:  0xc2_d_win32kfull!Win32FreePoolImpl

BUCKET_ID:  0xc2_d_win32kfull!Win32FreePoolImpl

PRIMARY_PROBLEM_CLASS:  0xc2_d_win32kfull!Win32FreePoolImpl

TARGET_TIME:  2020-01-25T11:39:30.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  17ba

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xc2_d_win32kfull!win32freepoolimpl

FAILURE_ID_HASH:  {31ebfd2f-f549-618e-b10f-c22b5c749799}

Followup:     MachineOwner
---------
 
Buyrun.
 

Dosya Ekleri

  • Adsız.png
    Adsız.png
    14,9 KB · Görüntüleme: 50
Kaspersky, Ryzen Master kaldır.

Komut satırını(CMD) yönetici olarak başlatın "sfc /scannow" yazın işlemi başlatın, işlem bitince bilgisayarı yeniden başlatın.

Sistemde takılı tüm depolama birimlerinin HDtune(Error Scan, Health) sonuçlarını paylaş.
Kod:
UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffa5051f5ca000, Pointer to the store context or data manager
Arg2: ffffc708a73167e0, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffa5051f5ca000

BUGCHECK_P2: ffffc708a73167e0

BUGCHECK_P3: 1

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffffc708a7317788 -- (.exr 0xffffc708a7317788)
ExceptionAddress: fffff8074d05bef1 (nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0x000000000010eb95)
   ExceptionCode: c0000420 (Assertion failure)
  ExceptionFlags: 00000000
NumberParameters: 0
Assertion: (((NTSTATUS)(Status)) >= 0)

EXCEPTION_CODE: (NTSTATUS) 0xc0000420 - <Unable to get error code text>

FAULTING_IP:
nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+10eb95
fffff807`4d05bef1 cd2c            int     2Ch

FOLLOWUP_IP:
nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+10eb95
fffff807`4d05bef1 cd2c            int     2Ch

EXCEPTION_PARAMETER1:  000000004dcf9e51

EXCEPTION_PARAMETER2:  0000000000000005

BUGCHECK_STR:  0x154_c0000420

CONTEXT:  ffffc708a7316fd0 -- (.cxr 0xffffc708a7316fd0)
rax=00000000c0000225 rbx=ffffa5051f5ca0e8 rcx=ffffa50521b1e520
rdx=0000000000000018 rsi=0000000000000000 rdi=ffffa5051f5ca050
rip=fffff8074d05bef1 rsp=ffffc708a73179c0 rbp=ffffa5051f5ca0d0
r8=000000000000004c  r9=000000004dcf9e51 r10=0000000000000005
r11=0000000000000006 r12=ffffa505239c8750 r13=0000000000000000
r14=000000000000989a r15=ffffa505239c8750
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00240282
nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0x10eb95:
fffff807`4d05bef1 cd2c            int     2Ch
Resetting default scope

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  MemCompression

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000420 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000420

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-25-2020 17:43:05.0085

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8074cf4d6f6 to fffff8074d05bef1

STACK_TEXT:
ffffc708`a73179c0 fffff807`4cf4d6f6 : 00000000`00000000 ffffc708`a7317a69 ffffa505`1f5ca050 ffffa505`0000989a : nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0x10eb95
ffffc708`a7317a00 fffff807`4cf4e92d : 00000000`00000000 ffffa505`1775e350 00000000`00000000 fffff807`4cf3b83f : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x202
ffffc708`a7317ad0 fffff807`4cf3b06e : ffffa505`1f5ca000 ffffc708`a7317b98 00000000`00000001 ffffa505`1f64a240 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xc1
ffffc708`a7317b20 fffff807`4cf3af31 : 00000000`00000000 ffffe001`00000000 ffffa505`00000000 00000000`000000cc : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x12e
ffffc708`a7317be0 fffff807`4cf2a7a5 : ffffa505`1f5ca000 fffff807`4cf3af20 ffffc708`a726f278 00000067`b4bbbdff : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
ffffc708`a7317c10 fffff807`4cfc8b2a : ffffe001`4d313180 ffffa505`1f64a240 fffff807`4cf2a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc708`a7317c60 00000000`00000000 : ffffc708`a7318000 ffffc708`a7312000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  0e6af0b4bbb2e57dfd411b7bfdeca0366700b50c

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  808caf002aa88eaf909047e139eb8df7a4e56a9d

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FAULT_INSTR_CODE:  2ce92ccd

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+10eb95

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .cxr 0xffffc708a7316fd0 ; kb

BUCKET_ID_FUNC_OFFSET:  10eb95

FAILURE_BUCKET_ID:  0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRecordRemove

BUCKET_ID:  0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRecordRemove

PRIMARY_PROBLEM_CLASS:  0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRecordRemove

TARGET_TIME:  2020-01-25T08:35:58.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  32d3

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x154_c0000420_nt!st_store_sm_traits_::stdmpagerecordremove

FAILURE_ID_HASH:  {b82a73ea-d098-8451-8193-a5c6604483ac}

Followup:     MachineOwner
---------

KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000011, Type of corruption detected
Arg2: ffff8b8a30010100, Address of the heap that reported the corruption
Arg3: ffff8b8a3ee17480, Address at which the corruption was detected
Arg4: 0000000000000000

Debugging Details:
------------------

fffff8070c9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 11

BUGCHECK_P2: ffff8b8a30010100

BUGCHECK_P3: ffff8b8a3ee17480

BUGCHECK_P4: 0

FAULTING_IP:
nt!ObpFreeObject+197
fffff807`0c9fa2d7 4c8b642420      mov     r12,qword ptr [rsp+20h]

POOL_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff8b8a3ee17480

FREED_POOL_TAG:  E

BUGCHECK_STR:  0x13a_11_E

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  sdiagnhost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-25-2020 17:43:08.0747

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8070c71ac78 to fffff8070c5c14e0

STACK_TEXT:
ffffc78a`e2213328 fffff807`0c71ac78 : 00000000`0000013a 00000000`00000011 ffff8b8a`30010100 ffff8b8a`3ee17480 : nt!KeBugCheckEx
ffffc78a`e2213330 fffff807`0c71acd8 : 00000000`00000011 00000000`00000000 ffff8b8a`30010100 00000000`00000000 : nt!RtlpHeapHandleError+0x40
ffffc78a`e2213370 fffff807`0c71a901 : 00000000`00000080 ffff8b8a`3ee02000 00000000`00000000 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58
ffffc78a`e22133a0 fffff807`0c639b02 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
ffffc78a`e22133d0 fffff807`0c445ed7 : ffff8b8a`30010340 00000000`000000ff fffff807`0c77a948 ffff8b8a`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x153fb2
ffffc78a`e2213490 fffff807`0c76f0a9 : 00000000`00000070 ffff8b8a`3ee17490 00000000`00000070 01000000`00100000 : nt!ExFreeHeapPool+0x357
ffffc78a`e22135b0 fffff807`0c9fa2d7 : ffff8b8a`3b820050 ffff8b8a`3ee174b0 ffff8b8a`310bfda0 ffff8b8a`390e5d40 : nt!ExFreePool+0x9
ffffc78a`e22135e0 fffff807`0c9fa0e8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x197
ffffc78a`e2213640 fffff807`0c43a9a9 : 00000000`00000000 00000000`00000000 ffffc78a`e22137c9 ffff8b8a`3ee174e0 : nt!ObpRemoveObjectRoutine+0x88
ffffc78a`e22136a0 fffff807`0c9ec457 : 00000000`00000000 ffff8b8a`3ee174b0 ffffe087`00000000 ffff8b8a`3d3d3c80 : nt!ObfDereferenceObjectWithTag+0xc9
ffffc78a`e22136e0 fffff807`0ca385a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7
ffffc78a`e2213820 fffff807`0ca38241 : 00000000`00000000 ffff8b8a`3dc9f080 ffffffff`ffffff01 ffff8b8a`3b89b380 : nt!ExSweepHandleTable+0xd5
ffffc78a`e22138d0 fffff807`0ca38769 : ffffffff`ffffffff ffff8b8a`3b89b080 ffffc78a`e2213920 ffff8b8a`00000000 : nt!ObKillProcess+0x35
ffffc78a`e2213900 fffff807`0ca5e6d3 : ffff8b8a`3b89b080 ffffe087`2aad15f0 ffffc78a`e2213b80 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffffc78a`e2213980 fffff807`0ca39deb : 00000000`00000000 ffffc78a`e2213b01 00000095`de150000 ffff8b8a`3dc9f080 : nt!PspExitThread+0x60b
ffffc78a`e2213a90 fffff807`0c5d2d18 : ffff8b8a`00003458 ffff8b8a`3dc9f080 ffff8b8a`3b89b080 00000000`00000000 : nt!NtTerminateProcess+0xeb
ffffc78a`e2213b00 00007ff8`5c5bc644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000095`ddeaf228 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`5c5bc644


THREAD_SHA1_HASH_MOD_FUNC:  ca17f6a209e05677b7f56c6cfd0b53c785006fdd

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a00be4edb0203c0577600c985ccf226b050bff72

THREAD_SHA1_HASH_MOD:  aaa5a324bf1bd3082ad2b464ee2ed2f6d50e564c

FOLLOWUP_IP:
nt!ObpFreeObject+197
fffff807`0c9fa2d7 4c8b642420      mov     r12,qword ptr [rsp+20h]

FAULT_INSTR_CODE:  24648b4c

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  nt!ObpFreeObject+197

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  197

FAILURE_BUCKET_ID:  0x13a_11_E_nt!ObpFreeObject

BUCKET_ID:  0x13a_11_E_nt!ObpFreeObject

PRIMARY_PROBLEM_CLASS:  0x13a_11_E_nt!ObpFreeObject

TARGET_TIME:  2020-01-25T08:43:22.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3112

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x13a_11_e_nt!obpfreeobject

FAILURE_ID_HASH:  {2932d68c-86e4-f595-1ddb-3a079817beaa}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 00000000003c444b, page frame number
Arg3: 0000000000000001, current share count
Arg4: 0000000000000000, 0

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klwtp.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 7

BUGCHECK_P2: 3c444b

BUGCHECK_P3: 1

BUGCHECK_P4: 0

BUGCHECK_STR:  0x4E_7

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-25-2020 17:43:14.0543

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8027f3e7ebb to fffff8027f3c14e0

STACK_TEXT:
ffffb882`87643d58 fffff802`7f3e7ebb : 00000000`0000004e 00000000`00000007 00000000`003c444b 00000000`00000001 : nt!KeBugCheckEx
ffffb882`87643d60 fffff802`7f24b8ba : ffffba8f`00000000 00000000`00000000 ffffe180`00000000 00000000`003c444b : nt!MiPfnReferenceCountIsZero+0x1d36ab
ffffb882`87643da0 fffff802`8b6e2473 : 00000000`0000018b 00000000`00000001 ffffba8f`00000000 ffffba8f`6c2f8af8 : nt!MmUnlockPages+0x75a
ffffb882`87643e70 00000000`0000018b : 00000000`00000001 ffffba8f`00000000 ffffba8f`6c2f8af8 ffffba8f`6ddf72f0 : klwtp+0x2473
ffffb882`87643e78 00000000`00000001 : ffffba8f`00000000 ffffba8f`6c2f8af8 ffffba8f`6ddf72f0 fffff802`8b6e7582 : 0x18b
ffffb882`87643e80 ffffba8f`00000000 : ffffba8f`6c2f8af8 ffffba8f`6ddf72f0 fffff802`8b6e7582 ffffba8f`6e7fd6d0 : 0x1
ffffb882`87643e88 ffffba8f`6c2f8af8 : ffffba8f`6ddf72f0 fffff802`8b6e7582 ffffba8f`6e7fd6d0 ffffba8f`00000000 : 0xffffba8f`00000000
ffffb882`87643e90 ffffba8f`6ddf72f0 : fffff802`8b6e7582 ffffba8f`6e7fd6d0 ffffba8f`00000000 ffffba8f`6c2f8b08 : 0xffffba8f`6c2f8af8
ffffb882`87643e98 fffff802`8b6e7582 : ffffba8f`6e7fd6d0 ffffba8f`00000000 ffffba8f`6c2f8b08 ffffba8f`6db1f0c0 : 0xffffba8f`6ddf72f0
ffffb882`87643ea0 ffffba8f`6e7fd6d0 : ffffba8f`00000000 ffffba8f`6c2f8b08 ffffba8f`6db1f0c0 00000000`00000000 : klwtp+0x7582
ffffb882`87643ea8 ffffba8f`00000000 : ffffba8f`6c2f8b08 ffffba8f`6db1f0c0 00000000`00000000 00000000`40000010 : 0xffffba8f`6e7fd6d0
ffffb882`87643eb0 ffffba8f`6c2f8b08 : ffffba8f`6db1f0c0 00000000`00000000 00000000`40000010 00000000`00000000 : 0xffffba8f`00000000
ffffb882`87643eb8 ffffba8f`6db1f0c0 : 00000000`00000000 00000000`40000010 00000000`00000000 ffffba8f`6c2f8af8 : 0xffffba8f`6c2f8b08
ffffb882`87643ec0 00000000`00000000 : 00000000`40000010 00000000`00000000 ffffba8f`6c2f8af8 00000000`00000002 : 0xffffba8f`6db1f0c0


THREAD_SHA1_HASH_MOD_FUNC:  46d14455b486eac6dd66a4874df52e4b9c6141c8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  dd288b85bdc7f397813a5580a7f622ef16b18af4

THREAD_SHA1_HASH_MOD:  a892a69bf0532ecc3acedf7959c098668d07c83d

FOLLOWUP_IP:
klwtp+2473
fffff802`8b6e2473 488bcb          mov     rcx,rbx

FAULT_INSTR_CODE:  4ccb8b48

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  klwtp+2473

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: klwtp

IMAGE_NAME:  klwtp.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  463d107f

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2473

FAILURE_BUCKET_ID:  0x4E_7_klwtp!unknown_function

BUCKET_ID:  0x4E_7_klwtp!unknown_function

PRIMARY_PROBLEM_CLASS:  0x4E_7_klwtp!unknown_function

TARGET_TIME:  2020-01-25T08:51:18.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  a1b8

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x4e_7_klwtp!unknown_function

FAILURE_ID_HASH:  {f8cdac05-b3fc-08b1-7845-2d7dd8781f8a}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80361c60eef, The address that the exception occurred at
Arg3: ffffe00e683cae48, Exception Record Address
Arg4: ffffe00e683ca690, Context Record Address

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80361c60eef

BUGCHECK_P3: ffffe00e683cae48

BUGCHECK_P4: ffffe00e683ca690

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
+0
fffff803`61c60eef ??              ???

EXCEPTION_RECORD:  ffffe00e683cae48 -- (.exr 0xffffe00e683cae48)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

CONTEXT:  ffffe00e683ca690 -- (.cxr 0xffffe00e683ca690)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=0000000000000000 rbp=0000000000000000
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
cs=0000  ss=0000  ds=0000  es=0000  fs=0000  gs=0000             efl=00000000
00000000`00000000 ??              ???
Resetting default scope

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CORRUPT_MODULELIST_AV

BUGCHECK_STR:  AV

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-25-2020 17:43:20.0078

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff803525c14e0

STACK_TEXT:
ffffe00e`683c9e28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff803`525c14e0


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  CORRUPT_MODULELIST_AV

PRIMARY_PROBLEM_CLASS:  CORRUPT_MODULELIST_AV

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_AV

TARGET_TIME:  2020-01-25T11:23:50.000Z

OSBUILD:  18362

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

ANALYSIS_SESSION_ELAPSED_TIME:  1d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:corrupt_modulelist_av

FAILURE_ID_HASH:  {fc259191-ef0c-6215-476f-d32e5dcaf1b7}

Followup:     MachineOwner
---------


BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 000000000000000d, Attempt to release quota on a corrupted pool allocation.
Arg2: fffff8d0441fa160, Address of pool
Arg3: 000000006e614344, Pool allocation's tag
Arg4: ffffaf82710e9080, Quota process pointer (bad).

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: d

BUGCHECK_P2: fffff8d0441fa160

BUGCHECK_P3: 6e614344

BUGCHECK_P4: ffffaf82710e9080

FAULTING_IP:
win32kfull!Win32FreePoolImpl+52
fffff89c`a36006d2 488b5c2440      mov     rbx,qword ptr [rsp+40h]

BUGCHECK_STR:  0xc2_d

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  ShellExperienceHost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-25-2020 17:43:24.0363

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80268bfad21 to fffff80268bc14e0

STACK_TEXT:
ffffeb06`2f81b758 fffff802`68bfad21 : 00000000`000000c2 00000000`0000000d fffff8d0`441fa160 00000000`6e614344 : nt!KeBugCheckEx
ffffeb06`2f81b760 fffff802`68d6f0a9 : 00000000`00000000 fffff8d0`441c4ed0 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x1b51a1
ffffeb06`2f81b880 fffff89c`a36006d2 : fffff8d0`44106010 fffff89c`a2a41c8f 00000000`00000000 00000000`0000002d : nt!ExFreePool+0x9
ffffeb06`2f81b8b0 fffff89c`a2a387cc : 00000000`00000000 fffff8d0`441fa160 fffff8d0`441fa160 ffffeb06`2f81b9e0 : win32kfull!Win32FreePoolImpl+0x52
ffffeb06`2f81b8e0 fffff89c`a2a8c80d : 00000000`00000001 ffffeb06`2f81b9e0 fffff8d0`468c01dc fffff89c`a2a7c98e : win32kbase!Win32FreePool+0x2c
ffffeb06`2f81b910 fffff89c`a2a41fd8 : fffff8d0`441fa170 ffffeb06`2f81b9e0 fffff8d0`468c02f0 00000000`00000000 : win32kbase!DirectComposition::CAnimationMarshaler::`vector deleting destructor'+0x21
ffffeb06`2f81b940 fffff89c`a2a41acc : fffff8d0`44106010 00000000`00000000 00000000`00000000 fffff8d0`406f9600 : win32kbase!DirectComposition::CApplicationChannel::EmitDeletionCommands+0x74
ffffeb06`2f81b970 fffff89c`a2a41835 : fffff8d0`44194690 00000000`00000000 ffffaf82`71d0a010 00000000`00000000 : win32kbase!DirectComposition::CApplicationChannel::BuildBatch+0x20c
ffffeb06`2f81b9e0 fffff802`68bd2d18 : fffff8d0`00000025 000000fe`544fed94 000000fe`544fed90 00000000`00000000 : win32kbase!NtDCompositionCommitChannel+0x1f5
ffffeb06`2f81ba90 00007ffa`e1743424 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fe`544fed18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`e1743424


THREAD_SHA1_HASH_MOD_FUNC:  2e05db11af49bc0636283dae65497fb9a7effb0a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0003f49c6cee760d62fb367f5cd32fbd7a10ad30

THREAD_SHA1_HASH_MOD:  c58a55be707233752738a64858536d9204413eb7

FOLLOWUP_IP:
win32kfull!Win32FreePoolImpl+52
fffff89c`a36006d2 488b5c2440      mov     rbx,qword ptr [rsp+40h]

FAULT_INSTR_CODE:  245c8b48

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  win32kfull!Win32FreePoolImpl+52

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  52

FAILURE_BUCKET_ID:  0xc2_d_win32kfull!Win32FreePoolImpl

BUCKET_ID:  0xc2_d_win32kfull!Win32FreePoolImpl

PRIMARY_PROBLEM_CLASS:  0xc2_d_win32kfull!Win32FreePoolImpl

TARGET_TIME:  2020-01-25T11:39:30.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  17ba

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xc2_d_win32kfull!win32freepoolimpl

FAILURE_ID_HASH:  {31ebfd2f-f549-618e-b10f-c22b5c749799}

Followup:     MachineOwner
---------
Hocam bu Kaspersky böyle hatalara yol açabiliyor mu?
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı