UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffa5051f5ca000, Pointer to the store context or data manager
Arg2: ffffc708a73167e0, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffa5051f5ca000
BUGCHECK_P2: ffffc708a73167e0
BUGCHECK_P3: 1
BUGCHECK_P4: 0
EXCEPTION_RECORD: ffffc708a7317788 -- (.exr 0xffffc708a7317788)
ExceptionAddress: fffff8074d05bef1 (nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0x000000000010eb95)
ExceptionCode: c0000420 (Assertion failure)
ExceptionFlags: 00000000
NumberParameters: 0
Assertion: (((NTSTATUS)(Status)) >= 0)
EXCEPTION_CODE: (NTSTATUS) 0xc0000420 - <Unable to get error code text>
FAULTING_IP:
nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+10eb95
fffff807`4d05bef1 cd2c int 2Ch
FOLLOWUP_IP:
nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+10eb95
fffff807`4d05bef1 cd2c int 2Ch
EXCEPTION_PARAMETER1: 000000004dcf9e51
EXCEPTION_PARAMETER2: 0000000000000005
BUGCHECK_STR: 0x154_c0000420
CONTEXT: ffffc708a7316fd0 -- (.cxr 0xffffc708a7316fd0)
rax=00000000c0000225 rbx=ffffa5051f5ca0e8 rcx=ffffa50521b1e520
rdx=0000000000000018 rsi=0000000000000000 rdi=ffffa5051f5ca050
rip=fffff8074d05bef1 rsp=ffffc708a73179c0 rbp=ffffa5051f5ca0d0
r8=000000000000004c r9=000000004dcf9e51 r10=0000000000000005
r11=0000000000000006 r12=ffffa505239c8750 r13=0000000000000000
r14=000000000000989a r15=ffffa505239c8750
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00240282
nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0x10eb95:
fffff807`4d05bef1 cd2c int 2Ch
Resetting default scope
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: MemCompression
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000420 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000420
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-25-2020 17:43:05.0085
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8074cf4d6f6 to fffff8074d05bef1
STACK_TEXT:
ffffc708`a73179c0 fffff807`4cf4d6f6 : 00000000`00000000 ffffc708`a7317a69 ffffa505`1f5ca050 ffffa505`0000989a : nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0x10eb95
ffffc708`a7317a00 fffff807`4cf4e92d : 00000000`00000000 ffffa505`1775e350 00000000`00000000 fffff807`4cf3b83f : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x202
ffffc708`a7317ad0 fffff807`4cf3b06e : ffffa505`1f5ca000 ffffc708`a7317b98 00000000`00000001 ffffa505`1f64a240 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xc1
ffffc708`a7317b20 fffff807`4cf3af31 : 00000000`00000000 ffffe001`00000000 ffffa505`00000000 00000000`000000cc : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x12e
ffffc708`a7317be0 fffff807`4cf2a7a5 : ffffa505`1f5ca000 fffff807`4cf3af20 ffffc708`a726f278 00000067`b4bbbdff : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
ffffc708`a7317c10 fffff807`4cfc8b2a : ffffe001`4d313180 ffffa505`1f64a240 fffff807`4cf2a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc708`a7317c60 00000000`00000000 : ffffc708`a7318000 ffffc708`a7312000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: 0e6af0b4bbb2e57dfd411b7bfdeca0366700b50c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 808caf002aa88eaf909047e139eb8df7a4e56a9d
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FAULT_INSTR_CODE: 2ce92ccd
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+10eb95
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .cxr 0xffffc708a7316fd0 ; kb
BUCKET_ID_FUNC_OFFSET: 10eb95
FAILURE_BUCKET_ID: 0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRecordRemove
BUCKET_ID: 0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRecordRemove
PRIMARY_PROBLEM_CLASS: 0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRecordRemove
TARGET_TIME: 2020-01-25T08:35:58.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 32d3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x154_c0000420_nt!st_store_sm_traits_::stdmpagerecordremove
FAILURE_ID_HASH: {b82a73ea-d098-8451-8193-a5c6604483ac}
Followup: MachineOwner
---------
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000011, Type of corruption detected
Arg2: ffff8b8a30010100, Address of the heap that reported the corruption
Arg3: ffff8b8a3ee17480, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
fffff8070c9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 11
BUGCHECK_P2: ffff8b8a30010100
BUGCHECK_P3: ffff8b8a3ee17480
BUGCHECK_P4: 0
FAULTING_IP:
nt!ObpFreeObject+197
fffff807`0c9fa2d7 4c8b642420 mov r12,qword ptr [rsp+20h]
POOL_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff8b8a3ee17480
FREED_POOL_TAG: E
BUGCHECK_STR: 0x13a_11_E
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: sdiagnhost.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-25-2020 17:43:08.0747
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8070c71ac78 to fffff8070c5c14e0
STACK_TEXT:
ffffc78a`e2213328 fffff807`0c71ac78 : 00000000`0000013a 00000000`00000011 ffff8b8a`30010100 ffff8b8a`3ee17480 : nt!KeBugCheckEx
ffffc78a`e2213330 fffff807`0c71acd8 : 00000000`00000011 00000000`00000000 ffff8b8a`30010100 00000000`00000000 : nt!RtlpHeapHandleError+0x40
ffffc78a`e2213370 fffff807`0c71a901 : 00000000`00000080 ffff8b8a`3ee02000 00000000`00000000 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58
ffffc78a`e22133a0 fffff807`0c639b02 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
ffffc78a`e22133d0 fffff807`0c445ed7 : ffff8b8a`30010340 00000000`000000ff fffff807`0c77a948 ffff8b8a`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x153fb2
ffffc78a`e2213490 fffff807`0c76f0a9 : 00000000`00000070 ffff8b8a`3ee17490 00000000`00000070 01000000`00100000 : nt!ExFreeHeapPool+0x357
ffffc78a`e22135b0 fffff807`0c9fa2d7 : ffff8b8a`3b820050 ffff8b8a`3ee174b0 ffff8b8a`310bfda0 ffff8b8a`390e5d40 : nt!ExFreePool+0x9
ffffc78a`e22135e0 fffff807`0c9fa0e8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x197
ffffc78a`e2213640 fffff807`0c43a9a9 : 00000000`00000000 00000000`00000000 ffffc78a`e22137c9 ffff8b8a`3ee174e0 : nt!ObpRemoveObjectRoutine+0x88
ffffc78a`e22136a0 fffff807`0c9ec457 : 00000000`00000000 ffff8b8a`3ee174b0 ffffe087`00000000 ffff8b8a`3d3d3c80 : nt!ObfDereferenceObjectWithTag+0xc9
ffffc78a`e22136e0 fffff807`0ca385a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7
ffffc78a`e2213820 fffff807`0ca38241 : 00000000`00000000 ffff8b8a`3dc9f080 ffffffff`ffffff01 ffff8b8a`3b89b380 : nt!ExSweepHandleTable+0xd5
ffffc78a`e22138d0 fffff807`0ca38769 : ffffffff`ffffffff ffff8b8a`3b89b080 ffffc78a`e2213920 ffff8b8a`00000000 : nt!ObKillProcess+0x35
ffffc78a`e2213900 fffff807`0ca5e6d3 : ffff8b8a`3b89b080 ffffe087`2aad15f0 ffffc78a`e2213b80 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffffc78a`e2213980 fffff807`0ca39deb : 00000000`00000000 ffffc78a`e2213b01 00000095`de150000 ffff8b8a`3dc9f080 : nt!PspExitThread+0x60b
ffffc78a`e2213a90 fffff807`0c5d2d18 : ffff8b8a`00003458 ffff8b8a`3dc9f080 ffff8b8a`3b89b080 00000000`00000000 : nt!NtTerminateProcess+0xeb
ffffc78a`e2213b00 00007ff8`5c5bc644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000095`ddeaf228 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`5c5bc644
THREAD_SHA1_HASH_MOD_FUNC: ca17f6a209e05677b7f56c6cfd0b53c785006fdd
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a00be4edb0203c0577600c985ccf226b050bff72
THREAD_SHA1_HASH_MOD: aaa5a324bf1bd3082ad2b464ee2ed2f6d50e564c
FOLLOWUP_IP:
nt!ObpFreeObject+197
fffff807`0c9fa2d7 4c8b642420 mov r12,qword ptr [rsp+20h]
FAULT_INSTR_CODE: 24648b4c
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nt!ObpFreeObject+197
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 197
FAILURE_BUCKET_ID: 0x13a_11_E_nt!ObpFreeObject
BUCKET_ID: 0x13a_11_E_nt!ObpFreeObject
PRIMARY_PROBLEM_CLASS: 0x13a_11_E_nt!ObpFreeObject
TARGET_TIME: 2020-01-25T08:43:22.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3112
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x13a_11_e_nt!obpfreeobject
FAILURE_ID_HASH: {2932d68c-86e4-f595-1ddb-3a079817beaa}
Followup: MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 00000000003c444b, page frame number
Arg3: 0000000000000001, current share count
Arg4: 0000000000000000, 0
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for klwtp.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 7
BUGCHECK_P2: 3c444b
BUGCHECK_P3: 1
BUGCHECK_P4: 0
BUGCHECK_STR: 0x4E_7
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-25-2020 17:43:14.0543
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8027f3e7ebb to fffff8027f3c14e0
STACK_TEXT:
ffffb882`87643d58 fffff802`7f3e7ebb : 00000000`0000004e 00000000`00000007 00000000`003c444b 00000000`00000001 : nt!KeBugCheckEx
ffffb882`87643d60 fffff802`7f24b8ba : ffffba8f`00000000 00000000`00000000 ffffe180`00000000 00000000`003c444b : nt!MiPfnReferenceCountIsZero+0x1d36ab
ffffb882`87643da0 fffff802`8b6e2473 : 00000000`0000018b 00000000`00000001 ffffba8f`00000000 ffffba8f`6c2f8af8 : nt!MmUnlockPages+0x75a
ffffb882`87643e70 00000000`0000018b : 00000000`00000001 ffffba8f`00000000 ffffba8f`6c2f8af8 ffffba8f`6ddf72f0 : klwtp+0x2473
ffffb882`87643e78 00000000`00000001 : ffffba8f`00000000 ffffba8f`6c2f8af8 ffffba8f`6ddf72f0 fffff802`8b6e7582 : 0x18b
ffffb882`87643e80 ffffba8f`00000000 : ffffba8f`6c2f8af8 ffffba8f`6ddf72f0 fffff802`8b6e7582 ffffba8f`6e7fd6d0 : 0x1
ffffb882`87643e88 ffffba8f`6c2f8af8 : ffffba8f`6ddf72f0 fffff802`8b6e7582 ffffba8f`6e7fd6d0 ffffba8f`00000000 : 0xffffba8f`00000000
ffffb882`87643e90 ffffba8f`6ddf72f0 : fffff802`8b6e7582 ffffba8f`6e7fd6d0 ffffba8f`00000000 ffffba8f`6c2f8b08 : 0xffffba8f`6c2f8af8
ffffb882`87643e98 fffff802`8b6e7582 : ffffba8f`6e7fd6d0 ffffba8f`00000000 ffffba8f`6c2f8b08 ffffba8f`6db1f0c0 : 0xffffba8f`6ddf72f0
ffffb882`87643ea0 ffffba8f`6e7fd6d0 : ffffba8f`00000000 ffffba8f`6c2f8b08 ffffba8f`6db1f0c0 00000000`00000000 : klwtp+0x7582
ffffb882`87643ea8 ffffba8f`00000000 : ffffba8f`6c2f8b08 ffffba8f`6db1f0c0 00000000`00000000 00000000`40000010 : 0xffffba8f`6e7fd6d0
ffffb882`87643eb0 ffffba8f`6c2f8b08 : ffffba8f`6db1f0c0 00000000`00000000 00000000`40000010 00000000`00000000 : 0xffffba8f`00000000
ffffb882`87643eb8 ffffba8f`6db1f0c0 : 00000000`00000000 00000000`40000010 00000000`00000000 ffffba8f`6c2f8af8 : 0xffffba8f`6c2f8b08
ffffb882`87643ec0 00000000`00000000 : 00000000`40000010 00000000`00000000 ffffba8f`6c2f8af8 00000000`00000002 : 0xffffba8f`6db1f0c0
THREAD_SHA1_HASH_MOD_FUNC: 46d14455b486eac6dd66a4874df52e4b9c6141c8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: dd288b85bdc7f397813a5580a7f622ef16b18af4
THREAD_SHA1_HASH_MOD: a892a69bf0532ecc3acedf7959c098668d07c83d
FOLLOWUP_IP:
klwtp+2473
fffff802`8b6e2473 488bcb mov rcx,rbx
FAULT_INSTR_CODE: 4ccb8b48
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: klwtp+2473
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: klwtp
IMAGE_NAME: klwtp.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 463d107f
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2473
FAILURE_BUCKET_ID: 0x4E_7_klwtp!unknown_function
BUCKET_ID: 0x4E_7_klwtp!unknown_function
PRIMARY_PROBLEM_CLASS: 0x4E_7_klwtp!unknown_function
TARGET_TIME: 2020-01-25T08:51:18.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: a1b8
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x4e_7_klwtp!unknown_function
FAILURE_ID_HASH: {f8cdac05-b3fc-08b1-7845-2d7dd8781f8a}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80361c60eef, The address that the exception occurred at
Arg3: ffffe00e683cae48, Exception Record Address
Arg4: ffffe00e683ca690, Context Record Address
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80361c60eef
BUGCHECK_P3: ffffe00e683cae48
BUGCHECK_P4: ffffe00e683ca690
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+0
fffff803`61c60eef ?? ???
EXCEPTION_RECORD: ffffe00e683cae48 -- (.exr 0xffffe00e683cae48)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: ffffe00e683ca690 -- (.cxr 0xffffe00e683ca690)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=0000000000000000 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
cs=0000 ss=0000 ds=0000 es=0000 fs=0000 gs=0000 efl=00000000
00000000`00000000 ?? ???
Resetting default scope
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_AV
BUGCHECK_STR: AV
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-25-2020 17:43:20.0078
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff803525c14e0
STACK_TEXT:
ffffe00e`683c9e28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff803`525c14e0
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID: CORRUPT_MODULELIST_AV
PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_AV
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV
TARGET_TIME: 2020-01-25T11:23:50.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
ANALYSIS_SESSION_ELAPSED_TIME: 1d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:corrupt_modulelist_av
FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7}
Followup: MachineOwner
---------
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 000000000000000d, Attempt to release quota on a corrupted pool allocation.
Arg2: fffff8d0441fa160, Address of pool
Arg3: 000000006e614344, Pool allocation's tag
Arg4: ffffaf82710e9080, Quota process pointer (bad).
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: d
BUGCHECK_P2: fffff8d0441fa160
BUGCHECK_P3: 6e614344
BUGCHECK_P4: ffffaf82710e9080
FAULTING_IP:
win32kfull!Win32FreePoolImpl+52
fffff89c`a36006d2 488b5c2440 mov rbx,qword ptr [rsp+40h]
BUGCHECK_STR: 0xc2_d
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: ShellExperienceHost.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-25-2020 17:43:24.0363
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80268bfad21 to fffff80268bc14e0
STACK_TEXT:
ffffeb06`2f81b758 fffff802`68bfad21 : 00000000`000000c2 00000000`0000000d fffff8d0`441fa160 00000000`6e614344 : nt!KeBugCheckEx
ffffeb06`2f81b760 fffff802`68d6f0a9 : 00000000`00000000 fffff8d0`441c4ed0 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x1b51a1
ffffeb06`2f81b880 fffff89c`a36006d2 : fffff8d0`44106010 fffff89c`a2a41c8f 00000000`00000000 00000000`0000002d : nt!ExFreePool+0x9
ffffeb06`2f81b8b0 fffff89c`a2a387cc : 00000000`00000000 fffff8d0`441fa160 fffff8d0`441fa160 ffffeb06`2f81b9e0 : win32kfull!Win32FreePoolImpl+0x52
ffffeb06`2f81b8e0 fffff89c`a2a8c80d : 00000000`00000001 ffffeb06`2f81b9e0 fffff8d0`468c01dc fffff89c`a2a7c98e : win32kbase!Win32FreePool+0x2c
ffffeb06`2f81b910 fffff89c`a2a41fd8 : fffff8d0`441fa170 ffffeb06`2f81b9e0 fffff8d0`468c02f0 00000000`00000000 : win32kbase!DirectComposition::CAnimationMarshaler::`vector deleting destructor'+0x21
ffffeb06`2f81b940 fffff89c`a2a41acc : fffff8d0`44106010 00000000`00000000 00000000`00000000 fffff8d0`406f9600 : win32kbase!DirectComposition::CApplicationChannel::EmitDeletionCommands+0x74
ffffeb06`2f81b970 fffff89c`a2a41835 : fffff8d0`44194690 00000000`00000000 ffffaf82`71d0a010 00000000`00000000 : win32kbase!DirectComposition::CApplicationChannel::BuildBatch+0x20c
ffffeb06`2f81b9e0 fffff802`68bd2d18 : fffff8d0`00000025 000000fe`544fed94 000000fe`544fed90 00000000`00000000 : win32kbase!NtDCompositionCommitChannel+0x1f5
ffffeb06`2f81ba90 00007ffa`e1743424 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fe`544fed18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`e1743424
THREAD_SHA1_HASH_MOD_FUNC: 2e05db11af49bc0636283dae65497fb9a7effb0a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0003f49c6cee760d62fb367f5cd32fbd7a10ad30
THREAD_SHA1_HASH_MOD: c58a55be707233752738a64858536d9204413eb7
FOLLOWUP_IP:
win32kfull!Win32FreePoolImpl+52
fffff89c`a36006d2 488b5c2440 mov rbx,qword ptr [rsp+40h]
FAULT_INSTR_CODE: 245c8b48
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32kfull!Win32FreePoolImpl+52
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 52
FAILURE_BUCKET_ID: 0xc2_d_win32kfull!Win32FreePoolImpl
BUCKET_ID: 0xc2_d_win32kfull!Win32FreePoolImpl
PRIMARY_PROBLEM_CLASS: 0xc2_d_win32kfull!Win32FreePoolImpl
TARGET_TIME: 2020-01-25T11:39:30.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 17ba
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc2_d_win32kfull!win32freepoolimpl
FAILURE_ID_HASH: {31ebfd2f-f549-618e-b10f-c22b5c749799}
Followup: MachineOwner
---------
Pardon kusura bakmayın. Atıyorum.Benchmark istemedim, lütfen yazdıklarımı iyice okur musun?
Hocam bu Kaspersky böyle hatalara yol açabiliyor mu?Kaspersky, Ryzen Master kaldır.
Komut satırını(CMD) yönetici olarak başlatın "sfc /scannow" yazın işlemi başlatın, işlem bitince bilgisayarı yeniden başlatın.
Sistemde takılı tüm depolama birimlerinin HDtune(Error Scan, Health) sonuçlarını paylaş.
Kod:UNEXPECTED_STORE_EXCEPTION (154) The store component caught an unexpected exception. Arguments: Arg1: ffffa5051f5ca000, Pointer to the store context or data manager Arg2: ffffc708a73167e0, Exception information Arg3: 0000000000000001, Reserved Arg4: 0000000000000000, Reserved Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffffa5051f5ca000 BUGCHECK_P2: ffffc708a73167e0 BUGCHECK_P3: 1 BUGCHECK_P4: 0 EXCEPTION_RECORD: ffffc708a7317788 -- (.exr 0xffffc708a7317788) ExceptionAddress: fffff8074d05bef1 (nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0x000000000010eb95) ExceptionCode: c0000420 (Assertion failure) ExceptionFlags: 00000000 NumberParameters: 0 Assertion: (((NTSTATUS)(Status)) >= 0) EXCEPTION_CODE: (NTSTATUS) 0xc0000420 - <Unable to get error code text> FAULTING_IP: nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+10eb95 fffff807`4d05bef1 cd2c int 2Ch FOLLOWUP_IP: nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+10eb95 fffff807`4d05bef1 cd2c int 2Ch EXCEPTION_PARAMETER1: 000000004dcf9e51 EXCEPTION_PARAMETER2: 0000000000000005 BUGCHECK_STR: 0x154_c0000420 CONTEXT: ffffc708a7316fd0 -- (.cxr 0xffffc708a7316fd0) rax=00000000c0000225 rbx=ffffa5051f5ca0e8 rcx=ffffa50521b1e520 rdx=0000000000000018 rsi=0000000000000000 rdi=ffffa5051f5ca050 rip=fffff8074d05bef1 rsp=ffffc708a73179c0 rbp=ffffa5051f5ca0d0 r8=000000000000004c r9=000000004dcf9e51 r10=0000000000000005 r11=0000000000000006 r12=ffffa505239c8750 r13=0000000000000000 r14=000000000000989a r15=ffffa505239c8750 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00240282 nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0x10eb95: fffff807`4d05bef1 cd2c int 2Ch Resetting default scope CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: MemCompression CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000420 - <Unable to get error code text> EXCEPTION_CODE_STR: c0000420 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-25-2020 17:43:05.0085 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8074cf4d6f6 to fffff8074d05bef1 STACK_TEXT: ffffc708`a73179c0 fffff807`4cf4d6f6 : 00000000`00000000 ffffc708`a7317a69 ffffa505`1f5ca050 ffffa505`0000989a : nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0x10eb95 ffffc708`a7317a00 fffff807`4cf4e92d : 00000000`00000000 ffffa505`1775e350 00000000`00000000 fffff807`4cf3b83f : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x202 ffffc708`a7317ad0 fffff807`4cf3b06e : ffffa505`1f5ca000 ffffc708`a7317b98 00000000`00000001 ffffa505`1f64a240 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xc1 ffffc708`a7317b20 fffff807`4cf3af31 : 00000000`00000000 ffffe001`00000000 ffffa505`00000000 00000000`000000cc : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x12e ffffc708`a7317be0 fffff807`4cf2a7a5 : ffffa505`1f5ca000 fffff807`4cf3af20 ffffc708`a726f278 00000067`b4bbbdff : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11 ffffc708`a7317c10 fffff807`4cfc8b2a : ffffe001`4d313180 ffffa505`1f64a240 fffff807`4cf2a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffffc708`a7317c60 00000000`00000000 : ffffc708`a7318000 ffffc708`a7312000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a THREAD_SHA1_HASH_MOD_FUNC: 0e6af0b4bbb2e57dfd411b7bfdeca0366700b50c THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 808caf002aa88eaf909047e139eb8df7a4e56a9d THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6 FAULT_INSTR_CODE: 2ce92ccd SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+10eb95 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0 IMAGE_VERSION: 10.0.18362.592 STACK_COMMAND: .cxr 0xffffc708a7316fd0 ; kb BUCKET_ID_FUNC_OFFSET: 10eb95 FAILURE_BUCKET_ID: 0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRecordRemove BUCKET_ID: 0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRecordRemove PRIMARY_PROBLEM_CLASS: 0x154_c0000420_nt!ST_STORE_SM_TRAITS_::StDmPageRecordRemove TARGET_TIME: 2020-01-25T08:35:58.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 32d3 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x154_c0000420_nt!st_store_sm_traits_::stdmpagerecordremove FAILURE_ID_HASH: {b82a73ea-d098-8451-8193-a5c6604483ac} Followup: MachineOwner --------- KERNEL_MODE_HEAP_CORRUPTION (13a) The kernel mode heap manager has detected corruption in a heap. Arguments: Arg1: 0000000000000011, Type of corruption detected Arg2: ffff8b8a30010100, Address of the heap that reported the corruption Arg3: ffff8b8a3ee17480, Address at which the corruption was detected Arg4: 0000000000000000 Debugging Details: ------------------ fffff8070c9733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 11 BUGCHECK_P2: ffff8b8a30010100 BUGCHECK_P3: ffff8b8a3ee17480 BUGCHECK_P4: 0 FAULTING_IP: nt!ObpFreeObject+197 fffff807`0c9fa2d7 4c8b642420 mov r12,qword ptr [rsp+20h] POOL_ADDRESS: Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffff8b8a3ee17480 FREED_POOL_TAG: E BUGCHECK_STR: 0x13a_11_E CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: sdiagnhost.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-25-2020 17:43:08.0747 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8070c71ac78 to fffff8070c5c14e0 STACK_TEXT: ffffc78a`e2213328 fffff807`0c71ac78 : 00000000`0000013a 00000000`00000011 ffff8b8a`30010100 ffff8b8a`3ee17480 : nt!KeBugCheckEx ffffc78a`e2213330 fffff807`0c71acd8 : 00000000`00000011 00000000`00000000 ffff8b8a`30010100 00000000`00000000 : nt!RtlpHeapHandleError+0x40 ffffc78a`e2213370 fffff807`0c71a901 : 00000000`00000080 ffff8b8a`3ee02000 00000000`00000000 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58 ffffc78a`e22133a0 fffff807`0c639b02 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45 ffffc78a`e22133d0 fffff807`0c445ed7 : ffff8b8a`30010340 00000000`000000ff fffff807`0c77a948 ffff8b8a`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x153fb2 ffffc78a`e2213490 fffff807`0c76f0a9 : 00000000`00000070 ffff8b8a`3ee17490 00000000`00000070 01000000`00100000 : nt!ExFreeHeapPool+0x357 ffffc78a`e22135b0 fffff807`0c9fa2d7 : ffff8b8a`3b820050 ffff8b8a`3ee174b0 ffff8b8a`310bfda0 ffff8b8a`390e5d40 : nt!ExFreePool+0x9 ffffc78a`e22135e0 fffff807`0c9fa0e8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x197 ffffc78a`e2213640 fffff807`0c43a9a9 : 00000000`00000000 00000000`00000000 ffffc78a`e22137c9 ffff8b8a`3ee174e0 : nt!ObpRemoveObjectRoutine+0x88 ffffc78a`e22136a0 fffff807`0c9ec457 : 00000000`00000000 ffff8b8a`3ee174b0 ffffe087`00000000 ffff8b8a`3d3d3c80 : nt!ObfDereferenceObjectWithTag+0xc9 ffffc78a`e22136e0 fffff807`0ca385a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7 ffffc78a`e2213820 fffff807`0ca38241 : 00000000`00000000 ffff8b8a`3dc9f080 ffffffff`ffffff01 ffff8b8a`3b89b380 : nt!ExSweepHandleTable+0xd5 ffffc78a`e22138d0 fffff807`0ca38769 : ffffffff`ffffffff ffff8b8a`3b89b080 ffffc78a`e2213920 ffff8b8a`00000000 : nt!ObKillProcess+0x35 ffffc78a`e2213900 fffff807`0ca5e6d3 : ffff8b8a`3b89b080 ffffe087`2aad15f0 ffffc78a`e2213b80 00000000`00000000 : nt!PspRundownSingleProcess+0x131 ffffc78a`e2213980 fffff807`0ca39deb : 00000000`00000000 ffffc78a`e2213b01 00000095`de150000 ffff8b8a`3dc9f080 : nt!PspExitThread+0x60b ffffc78a`e2213a90 fffff807`0c5d2d18 : ffff8b8a`00003458 ffff8b8a`3dc9f080 ffff8b8a`3b89b080 00000000`00000000 : nt!NtTerminateProcess+0xeb ffffc78a`e2213b00 00007ff8`5c5bc644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000095`ddeaf228 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`5c5bc644 THREAD_SHA1_HASH_MOD_FUNC: ca17f6a209e05677b7f56c6cfd0b53c785006fdd THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a00be4edb0203c0577600c985ccf226b050bff72 THREAD_SHA1_HASH_MOD: aaa5a324bf1bd3082ad2b464ee2ed2f6d50e564c FOLLOWUP_IP: nt!ObpFreeObject+197 fffff807`0c9fa2d7 4c8b642420 mov r12,qword ptr [rsp+20h] FAULT_INSTR_CODE: 24648b4c SYMBOL_STACK_INDEX: 7 SYMBOL_NAME: nt!ObpFreeObject+197 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0 IMAGE_VERSION: 10.0.18362.592 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 197 FAILURE_BUCKET_ID: 0x13a_11_E_nt!ObpFreeObject BUCKET_ID: 0x13a_11_E_nt!ObpFreeObject PRIMARY_PROBLEM_CLASS: 0x13a_11_E_nt!ObpFreeObject TARGET_TIME: 2020-01-25T08:43:22.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 3112 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x13a_11_e_nt!obpfreeobject FAILURE_ID_HASH: {2932d68c-86e4-f595-1ddb-3a079817beaa} Followup: MachineOwner --------- PFN_LIST_CORRUPT (4e) Typically caused by drivers passing bad memory descriptor lists (ie: calling MmUnlockPages twice with the same list, etc). If a kernel debugger is available get the stack trace. Arguments: Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it Arg2: 00000000003c444b, page frame number Arg3: 0000000000000001, current share count Arg4: 0000000000000000, 0 Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for klwtp.sys *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 7 BUGCHECK_P2: 3c444b BUGCHECK_P3: 1 BUGCHECK_P4: 0 BUGCHECK_STR: 0x4E_7 CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-25-2020 17:43:14.0543 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8027f3e7ebb to fffff8027f3c14e0 STACK_TEXT: ffffb882`87643d58 fffff802`7f3e7ebb : 00000000`0000004e 00000000`00000007 00000000`003c444b 00000000`00000001 : nt!KeBugCheckEx ffffb882`87643d60 fffff802`7f24b8ba : ffffba8f`00000000 00000000`00000000 ffffe180`00000000 00000000`003c444b : nt!MiPfnReferenceCountIsZero+0x1d36ab ffffb882`87643da0 fffff802`8b6e2473 : 00000000`0000018b 00000000`00000001 ffffba8f`00000000 ffffba8f`6c2f8af8 : nt!MmUnlockPages+0x75a ffffb882`87643e70 00000000`0000018b : 00000000`00000001 ffffba8f`00000000 ffffba8f`6c2f8af8 ffffba8f`6ddf72f0 : klwtp+0x2473 ffffb882`87643e78 00000000`00000001 : ffffba8f`00000000 ffffba8f`6c2f8af8 ffffba8f`6ddf72f0 fffff802`8b6e7582 : 0x18b ffffb882`87643e80 ffffba8f`00000000 : ffffba8f`6c2f8af8 ffffba8f`6ddf72f0 fffff802`8b6e7582 ffffba8f`6e7fd6d0 : 0x1 ffffb882`87643e88 ffffba8f`6c2f8af8 : ffffba8f`6ddf72f0 fffff802`8b6e7582 ffffba8f`6e7fd6d0 ffffba8f`00000000 : 0xffffba8f`00000000 ffffb882`87643e90 ffffba8f`6ddf72f0 : fffff802`8b6e7582 ffffba8f`6e7fd6d0 ffffba8f`00000000 ffffba8f`6c2f8b08 : 0xffffba8f`6c2f8af8 ffffb882`87643e98 fffff802`8b6e7582 : ffffba8f`6e7fd6d0 ffffba8f`00000000 ffffba8f`6c2f8b08 ffffba8f`6db1f0c0 : 0xffffba8f`6ddf72f0 ffffb882`87643ea0 ffffba8f`6e7fd6d0 : ffffba8f`00000000 ffffba8f`6c2f8b08 ffffba8f`6db1f0c0 00000000`00000000 : klwtp+0x7582 ffffb882`87643ea8 ffffba8f`00000000 : ffffba8f`6c2f8b08 ffffba8f`6db1f0c0 00000000`00000000 00000000`40000010 : 0xffffba8f`6e7fd6d0 ffffb882`87643eb0 ffffba8f`6c2f8b08 : ffffba8f`6db1f0c0 00000000`00000000 00000000`40000010 00000000`00000000 : 0xffffba8f`00000000 ffffb882`87643eb8 ffffba8f`6db1f0c0 : 00000000`00000000 00000000`40000010 00000000`00000000 ffffba8f`6c2f8af8 : 0xffffba8f`6c2f8b08 ffffb882`87643ec0 00000000`00000000 : 00000000`40000010 00000000`00000000 ffffba8f`6c2f8af8 00000000`00000002 : 0xffffba8f`6db1f0c0 THREAD_SHA1_HASH_MOD_FUNC: 46d14455b486eac6dd66a4874df52e4b9c6141c8 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: dd288b85bdc7f397813a5580a7f622ef16b18af4 THREAD_SHA1_HASH_MOD: a892a69bf0532ecc3acedf7959c098668d07c83d FOLLOWUP_IP: klwtp+2473 fffff802`8b6e2473 488bcb mov rcx,rbx FAULT_INSTR_CODE: 4ccb8b48 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: klwtp+2473 FOLLOWUP_NAME: MachineOwner MODULE_NAME: klwtp IMAGE_NAME: klwtp.sys DEBUG_FLR_IMAGE_TIMESTAMP: 463d107f STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 2473 FAILURE_BUCKET_ID: 0x4E_7_klwtp!unknown_function BUCKET_ID: 0x4E_7_klwtp!unknown_function PRIMARY_PROBLEM_CLASS: 0x4E_7_klwtp!unknown_function TARGET_TIME: 2020-01-25T08:51:18.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: a1b8 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x4e_7_klwtp!unknown_function FAILURE_ID_HASH: {f8cdac05-b3fc-08b1-7845-2d7dd8781f8a} Followup: MachineOwner --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80361c60eef, The address that the exception occurred at Arg3: ffffe00e683cae48, Exception Record Address Arg4: ffffe00e683ca690, Context Record Address Debugging Details: ------------------ ***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057. KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 DUMP_TYPE: 2 BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff80361c60eef BUGCHECK_P3: ffffe00e683cae48 BUGCHECK_P4: ffffe00e683ca690 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: +0 fffff803`61c60eef ?? ??? EXCEPTION_RECORD: ffffe00e683cae48 -- (.exr 0xffffe00e683cae48) ExceptionAddress: 0000000000000000 ExceptionCode: 00000000 ExceptionFlags: 00000000 NumberParameters: 0 CONTEXT: ffffe00e683ca690 -- (.cxr 0xffffe00e683ca690) rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=0000000000000000 rsp=0000000000000000 rbp=0000000000000000 r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl nz na pe nc cs=0000 ss=0000 ds=0000 es=0000 fs=0000 gs=0000 efl=00000000 00000000`00000000 ?? ??? Resetting default scope CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_AV BUGCHECK_STR: AV CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-25-2020 17:43:20.0078 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff803525c14e0 STACK_TEXT: ffffe00e`683c9e28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff803`525c14e0 SYMBOL_NAME: ANALYSIS_INCONCLUSIVE FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID: CORRUPT_MODULELIST_AV PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_AV FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV TARGET_TIME: 2020-01-25T11:23:50.000Z OSBUILD: 18362 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date ANALYSIS_SESSION_ELAPSED_TIME: 1d ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:corrupt_modulelist_av FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7} Followup: MachineOwner --------- BAD_POOL_CALLER (c2) The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc. Arguments: Arg1: 000000000000000d, Attempt to release quota on a corrupted pool allocation. Arg2: fffff8d0441fa160, Address of pool Arg3: 000000006e614344, Pool allocation's tag Arg4: ffffaf82710e9080, Quota process pointer (bad). Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: d BUGCHECK_P2: fffff8d0441fa160 BUGCHECK_P3: 6e614344 BUGCHECK_P4: ffffaf82710e9080 FAULTING_IP: win32kfull!Win32FreePoolImpl+52 fffff89c`a36006d2 488b5c2440 mov rbx,qword ptr [rsp+40h] BUGCHECK_STR: 0xc2_d CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: ShellExperienceHost.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-25-2020 17:43:24.0363 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff80268bfad21 to fffff80268bc14e0 STACK_TEXT: ffffeb06`2f81b758 fffff802`68bfad21 : 00000000`000000c2 00000000`0000000d fffff8d0`441fa160 00000000`6e614344 : nt!KeBugCheckEx ffffeb06`2f81b760 fffff802`68d6f0a9 : 00000000`00000000 fffff8d0`441c4ed0 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x1b51a1 ffffeb06`2f81b880 fffff89c`a36006d2 : fffff8d0`44106010 fffff89c`a2a41c8f 00000000`00000000 00000000`0000002d : nt!ExFreePool+0x9 ffffeb06`2f81b8b0 fffff89c`a2a387cc : 00000000`00000000 fffff8d0`441fa160 fffff8d0`441fa160 ffffeb06`2f81b9e0 : win32kfull!Win32FreePoolImpl+0x52 ffffeb06`2f81b8e0 fffff89c`a2a8c80d : 00000000`00000001 ffffeb06`2f81b9e0 fffff8d0`468c01dc fffff89c`a2a7c98e : win32kbase!Win32FreePool+0x2c ffffeb06`2f81b910 fffff89c`a2a41fd8 : fffff8d0`441fa170 ffffeb06`2f81b9e0 fffff8d0`468c02f0 00000000`00000000 : win32kbase!DirectComposition::CAnimationMarshaler::`vector deleting destructor'+0x21 ffffeb06`2f81b940 fffff89c`a2a41acc : fffff8d0`44106010 00000000`00000000 00000000`00000000 fffff8d0`406f9600 : win32kbase!DirectComposition::CApplicationChannel::EmitDeletionCommands+0x74 ffffeb06`2f81b970 fffff89c`a2a41835 : fffff8d0`44194690 00000000`00000000 ffffaf82`71d0a010 00000000`00000000 : win32kbase!DirectComposition::CApplicationChannel::BuildBatch+0x20c ffffeb06`2f81b9e0 fffff802`68bd2d18 : fffff8d0`00000025 000000fe`544fed94 000000fe`544fed90 00000000`00000000 : win32kbase!NtDCompositionCommitChannel+0x1f5 ffffeb06`2f81ba90 00007ffa`e1743424 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000fe`544fed18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`e1743424 THREAD_SHA1_HASH_MOD_FUNC: 2e05db11af49bc0636283dae65497fb9a7effb0a THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0003f49c6cee760d62fb367f5cd32fbd7a10ad30 THREAD_SHA1_HASH_MOD: c58a55be707233752738a64858536d9204413eb7 FOLLOWUP_IP: win32kfull!Win32FreePoolImpl+52 fffff89c`a36006d2 488b5c2440 mov rbx,qword ptr [rsp+40h] FAULT_INSTR_CODE: 245c8b48 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: win32kfull!Win32FreePoolImpl+52 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32kfull IMAGE_NAME: win32kfull.sys DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.592 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 52 FAILURE_BUCKET_ID: 0xc2_d_win32kfull!Win32FreePoolImpl BUCKET_ID: 0xc2_d_win32kfull!Win32FreePoolImpl PRIMARY_PROBLEM_CLASS: 0xc2_d_win32kfull!Win32FreePoolImpl TARGET_TIME: 2020-01-25T11:39:30.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 17ba ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0xc2_d_win32kfull!win32freepoolimpl FAILURE_ID_HASH: {31ebfd2f-f549-618e-b10f-c22b5c749799} Followup: MachineOwner ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.