Mavi ekran mini dump dosyası

Webcam'i sorun çıkarmış Webcam sürücüsünü güncellesin ya da Zoom'da kamerasını açmasın. Memtest86 ile bellek testi yapsın.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

INVALID_KERNEL_HANDLE (93)
This message occurs if kernel code attempts to close or reference a handle
that is not a valid handle.  Only invalid or protected handles passed to NtClose
will cause this bugcheck, unless bad handle detection is enabled.
Arguments:
Arg1: 0000000000000103, The handle that NtClose was called with
Arg2: 0000000000000000, A protected handle was closed.
Arg3: 0000000000000000
Arg4: 0000000000000000, The error occurred closing an invalid kernel handle.

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x93

PROCESS_NAME:  Zoom.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80559db68a2 to fffff805597c2990

STACK_TEXT:
fffff406`240f6578 fffff805`59db68a2 : 00000000`00000093 00000000`00000103 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff406`240f6580 fffff805`59c0e32e : 00000000`00000103 00000000`00000001 00000000`00000000 ffff978a`1d4708c0 : nt!ObCloseHandleTableEntry+0x1adb32
fffff406`240f66c0 fffff805`597d4255 : ffffdb00`300d9000 ffff978a`1ecda642 fffff406`240f67b0 00000000`00000000 : nt!NtClose+0xde
fffff406`240f6730 fffff805`597c67b0 : fffff805`6a00452c ffffb204`59027670 fffff805`6a0252b4 fffff406`240f695c : nt!KiSystemServiceCopyEnd+0x25
fffff406`240f68c8 fffff805`6a00452c : ffffb204`59027670 fffff805`6a0252b4 fffff406`240f695c 00000000`00000000 : nt!KiServiceLinkage
fffff406`240f68d0 ffffb204`59027670 : fffff805`6a0252b4 fffff406`240f695c 00000000`00000000 fffff406`00000000 : usbVM303+0x452c
fffff406`240f68d8 fffff805`6a0252b4 : fffff406`240f695c 00000000`00000000 fffff406`00000000 00000000`00820001 : 0xffffb204`59027670
fffff406`240f68e0 fffff406`240f695c : 00000000`00000000 fffff406`00000000 00000000`00820001 ffffb204`55303e90 : usbVM303+0x252b4
fffff406`240f68e8 00000000`00000000 : fffff406`00000000 00000000`00820001 ffffb204`55303e90 fffff805`6a004811 : 0xfffff406`240f695c


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff805596ece74-fffff805596ece75  2 bytes - nt!MmBuildMdlForNonPagedPool+344
    [ 80 fa:00 ac ]
2 errors : !nt (fffff805596ece74-fffff805596ece75)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffffd101fccfeff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd101fccfef48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


TRAP_FRAME:  fb3941b17bf7bfc8 -- (.trap 0xfb3941b17bf7bfc8)
Unable to read trap frame at fb3941b1`7bf7bfc8

EXCEPTION_RECORD:  000000000d93e07d -- (.exr 0xd93e07d)
Cannot read Exception record @ 000000000d93e07d

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLaunc

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y

EXCEPTION_PARAMETER1:  0000000000000004

BUGCHECK_STR:  0x139

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

EXCEPTION_STR:  0x0

LAST_CONTROL_TRANSFER:  from fffff805733d4829 to fffff805733c2990

FAULTING_THREAD:  0000000000000000

STACK_TEXT:
ffffd101`fccfecc8 fffff805`733d4829 : 00000000`00000139 00000000`00000004 ffffd101`fccfeff0 ffffd101`fccfef48 : nt!KeBugCheckEx
ffffd101`fccfecd0 fffff805`733d4c50 : 00000000`00000000 00000000`00000000 ffff8400`d9efeef0 ffff8400`d9efef20 : nt!KiBugCheckDispatch+0x69
ffffd101`fccfee10 fffff805`733d2fe3 : fffff805`7331b508 fffff805`7360d50c ffffd101`fccff7d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd101`fccfeff0 fffff805`734496f9 : 00000000`00000000 00000000`0000035e 0005e20c`00ab5000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x323
ffffd101`fccff180 fffff805`73418bb2 : 00000000`00000000 00000000`00000000 ffffd101`fccff6f0 00007fff`00000003 : nt!RtlpGetStackLimitsEx+0x13551d
ffffd101`fccff1b0 fffff805`7328d66e : ffffcf8d`9631f088 ffffd101`fccffe30 ffffcf8d`9631f088 00000000`00000000 : nt!RtlDispatchException+0x18fb02
ffffd101`fccff900 fffff805`733c3802 : 00000000`0d93e07d 00000000`0d93f07d fb3941b1`7bf7bfc8 00000000`00000000 : nt!KiDispatchException+0x16e
ffffd101`fccfffb0 fffff805`733c37d0 : fffff805`733d4956 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffcf8d`9631ef48 fffff805`733d4956 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffcf8d`9631ef50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80573257864-fffff80573257865  2 bytes - nt!MiZeroFault+e4
    [ 80 f6:00 fb ]
    fffff80573257874-fffff80573257875  2 bytes - nt!MiZeroFault+f4 (+0x10)
    [ ff f6:7f fb ]
    fffff80573258711-fffff80573258716  6 bytes - nt!MmAccessFault+1c1 (+0xe9d)
    [ 68 df be 7d fb f6:b0 6f df be 7d fb ]
    fffff80573259875-fffff80573259876  2 bytes - nt!MiFastLockLeafPageTable+365 (+0x1164)
    [ 80 f6:00 fb ]
    fffff8057325993e-fffff80573259943  6 bytes - nt!MiLockPageTableInternal+1e (+0xc9)
    [ 68 df be 7d fb f6:b0 6f df be 7d fb ]
    fffff80573259952-fffff80573259956  5 bytes - nt!MiLockPageTableInternal+32 (+0x14)
    [ d0 be 7d fb f6:60 df be 7d fb ]
    fffff8057325995c-fffff8057325995e  3 bytes - nt!MiLockPageTableInternal+3c (+0x0a)
    [ df be 7d:6f df be ]
    fffff8057331b575 - nt!MiDeleteNonPagedPoolTail+45 (+0xc1c19)
    [ fa:e5 ]
    fffff80573449767-fffff80573449769  3 bytes - nt!MiZeroLargePage+135563 (+0x12e1f2)
    [ 40 fb f6:80 7d fb ]
    fffff80573449780-fffff80573449781  2 bytes - nt!MiZeroLargePage+13557c (+0x19)
    [ 80 f6:00 fb ]
32 errors : !nt (fffff80573257864-fffff80573449781)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  ~0s ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
Güncellemeyi bilmiyorsa donanım kimliklerini paylaşsın.
 
Son düzenleme:
Teşekkürler arkadaşıma ilettim dediğiniz adımları uygulayacak. Kamerayı çıkarıp 7-8 saatlik bir sürede bilgisayar açıkken bekletecek. Mavi ekran gelmezse kameradan olduğu anlaşılacak ve aynı zamanda Windows bellek tanılama aracı kullanarak bellek hatalarının olup olmadığını test ediyor.
Memtest86 yerine onu kullandık bir farkı olur mu?
 
Memtest yapın sonucu paylaşın.

Bunu da uygulayın. Kapatmayı yapmayın.
 
Memtest yapın sonucu paylaşın.

Bunu da uygulayın. Kapatmayı yapmayın.

Teşekkürler arkadaşıma ilettim. Dediğiniz adımları uygulayacak. Windows bellek tanılama aracında bir hata çıkmadı. Bir de Memtest86 uygulayacak ve driver verifier adımlarını uygulayacak.
Driver verifier uyguladı ancak tekrar mavi ekran verdi şimdi Memtest86 yapmasını söyleyeceğim.
Mini dump link 101520-5843-01.rar
Driver verifier uyguladı ancak tekrar mavi ekran verdi
Mini dump link 101520-5843-01.rar
Driver verifier uyguladı ancak tekrar mavi ekran verdi.
Mini dump link 101520-5843-01.rar
Driver verifier uyguladı ancak tekrar mavi ekran verdi.
Mini dump link 101520-5843-01.rar
 
Son düzenleme:

Yeni konular

Geri
Yukarı