Çeşitli mavi ekran hataları

muratglr

Femtopat
Katılım
4 Ekim 2020
Mesajlar
43
Daha fazla  
Cinsiyet
Erkek
Bilgisayarımda herhangi bir problem yokken birden kendi kendine oyun oynarken veya Google'de 6 7 sekme açıkken mavi ekran hataları vermeye başladı. Hata kodları da hepsinde farklı format atmadan çözüm yöntemi var mı? RAM test falan yaptım hiçbir sıkıntı yok.
 

Dosya Ekleri

  • 8f1f6e6b-c024-49a3-81ac-9246efd623ed.jpg
    8f1f6e6b-c024-49a3-81ac-9246efd623ed.jpg
    134,3 KB · Görüntüleme: 60
  • 091e693e-bd20-4d88-8705-f49dadf8dd63.jpg
    091e693e-bd20-4d88-8705-f49dadf8dd63.jpg
    59,8 KB · Görüntüleme: 56
  • e023b023-fabf-4d0b-b568-5acba544b27e.jpg
    e023b023-fabf-4d0b-b568-5acba544b27e.jpg
    87,8 KB · Görüntüleme: 66
@yika38 vayy be fişi tak çıkar yapınca düzeliyormuş. Bu zamana kadar boşuna minidump inceleyip kafa yormuşsun hocam :)
Yok denedim onu da olmuyor.

Yok yine aynı hatayı veriyor.

Şey yapın minidump kalsörüne gidin oradan her dosyaya sağ tık yapıp özellikler deyin daha sonra güvenlik sekmesine gelin oradan gelişmis deyin orada denetim izinleri vs. olacak oradan izin vermeniz gerekiyor.
 
@yika38 vayy be fişi tak çıkar yapınca düzeliyormuş. Bu zamana kadar boşuna minidump inceleyip kafa yormuşsun hocam :)

Şey yapın minidump kalsörüne gidin oradan her dosyaya sağ tık yapıp özellikler deyin daha sonra güvenlik sekmesine gelin oradan gelişmis deyin orada denetim izinleri vs. olacak oradan izin vermeniz gerekiyor.

Ek Açıklama 2020-10-10 202539.png


Bende de aynı şeyi diyor du kurcaladım buldum bakın hepsi tam denetim de ayrıca orada kendinizi göremiyorsanız ekle butonuna basıp kendinizi ekleyin ondan sonra izinleri verin.
 
  • HDD Sentinel yazılımından tüm disklerin ekran görüntüsünü atın.
  • HD Tune yazılımından tüm disklerinize "Error Scan" yapın, sonucunu buraya atın. "Quick Scan" kapalı olsun.
  • Vanguard ve Battleye'yi kaldırın.
  • DDU ile GPU sürücünüzü kaldırıp WHQL onaylı güncel sürücüyü kurun.
  • XMP profili açıksa kapatın ve BIOS'u sıfırlayın. Ardından MemTest86 ile belleklerde tarama yapın.
Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 000000004a07d357, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 000000004a07d357, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4593

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16184

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: 4a07d357

BUGCHECK_P3: 8

BUGCHECK_P4: 4a07d357

WRITE_ADDRESS: fffff8035e4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8035e40f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8035e40f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 000000004a07d357

EXCEPTION_PARAMETER1:  0000000000000008

EXCEPTION_PARAMETER2:  000000004a07d357

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT: 
fffff48e`2ba21d08 fffff803`5dc4e5b9     : 00000000`0000001e ffffffff`c0000005 00000000`4a07d357 00000000`00000008 : nt!KeBugCheckEx
fffff48e`2ba21d10 fffff803`5dc05fac     : 00000000`00001000 fffff48e`2ba225b0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1caa59
fffff48e`2ba223d0 fffff803`5dc02143     : 00000000`000081a1 fffff48e`2ba22850 ffffffff`ffffffff ffffffff`0015b0bc : nt!KiExceptionDispatch+0x12c
fffff48e`2ba225b0 00000000`4a07d357     : ffff847c`cb600000 00000000`00000000 fffff48e`2ba229b0 00000000`00000000 : nt!KiPageFault+0x443
fffff48e`2ba22740 ffff847c`cb600000     : 00000000`00000000 fffff48e`2ba229b0 00000000`00000000 00000000`000000ff : 0x4a07d357
fffff48e`2ba22748 00000000`00000000     : fffff48e`2ba229b0 00000000`00000000 00000000`000000ff 00000000`00040282 : 0xffff847c`cb600000


SYMBOL_NAME:  nt!KiDispatchException+1caa59

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1caa59

FAILURE_BUCKET_ID:  0x1E_c0000005_X_nt!KiDispatchException

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {72b01280-60ea-6404-b5e3-077cb4799617}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff803e2510008, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff805227b2234, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4874

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 21670

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff803e2510008

BUGCHECK_P2: 0

BUGCHECK_P3: fffff805227b2234

BUGCHECK_P4: 2

READ_ADDRESS: fffff8051dafa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8051da0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8051da0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 fffff803e2510008

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffffb005ac4c600 -- (.trap 0xfffffb005ac4c600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000a78b rbx=0000000000000000 rcx=000000000003a78b
rdx=fffff803e2510000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805227b2234 rsp=fffffb005ac4c790 rbp=fffff805227b21fc
 r8=0000000000000f2e  r9=00000001400025ba r10=fffffb005ac4c9a0
r11=00000000fff2513a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po nc
BEDaisy+0x2a2234:
fffff805`227b2234 f6ff            idiv    bh
Resetting default scope

MISALIGNED_IP:
BEDaisy+2a2234
fffff805`227b2234 f6ff            idiv    bh

STACK_TEXT: 
fffffb00`5ac4c358 fffff805`1d286729     : 00000000`00000050 fffff803`e2510008 00000000`00000000 fffffb00`5ac4c600 : nt!KeBugCheckEx
fffffb00`5ac4c360 fffff805`1d0eeb80     : c0011020`063000a6 00000000`00000000 fffffb00`5ac4c680 00000000`00000000 : nt!MiSystemFault+0x13faf9
fffffb00`5ac4c460 fffff805`1d20205e     : 00000000`00000000 00000000`00000000 fffff803`e2510000 fffff805`1d1fa8f5 : nt!MmAccessFault+0x400
fffffb00`5ac4c600 fffff805`227b2234     : 00000000`00000009 ffffa888`44fcb080 00000000`00000804 fffffb00`5ac4cae0 : nt!KiPageFault+0x35e
fffffb00`5ac4c790 00000000`00000009     : ffffa888`44fcb080 00000000`00000804 fffffb00`5ac4cae0 00000000`00000001 : BEDaisy+0x2a2234
fffffb00`5ac4c798 ffffa888`44fcb080     : 00000000`00000804 fffffb00`5ac4cae0 00000000`00000001 ffff867a`e6800000 : 0x9
fffffb00`5ac4c7a0 00000000`00000804     : fffffb00`5ac4cae0 00000000`00000001 ffff867a`e6800000 00000000`00000002 : 0xffffa888`44fcb080
fffffb00`5ac4c7a8 fffffb00`5ac4cae0     : 00000000`00000001 ffff867a`e6800000 00000000`00000002 00000000`00000005 : 0x804
fffffb00`5ac4c7b0 00000000`00000001     : ffff867a`e6800000 00000000`00000002 00000000`00000005 00000000`00040246 : 0xfffffb00`5ac4cae0
fffffb00`5ac4c7b8 ffff867a`e6800000     : 00000000`00000002 00000000`00000005 00000000`00040246 00000000`00000000 : 0x1
fffffb00`5ac4c7c0 00000000`00000002     : 00000000`00000005 00000000`00040246 00000000`00000000 ffffa888`44fcb4d8 : 0xffff867a`e6800000
fffffb00`5ac4c7c8 00000000`00000005     : 00000000`00040246 00000000`00000000 ffffa888`44fcb4d8 fffff803`e2510000 : 0x2
fffffb00`5ac4c7d0 00000000`00040246     : 00000000`00000000 ffffa888`44fcb4d8 fffff803`e2510000 00000000`00000009 : 0x5
fffffb00`5ac4c7d8 00000000`00000000     : ffffa888`44fcb4d8 fffff803`e2510000 00000000`00000009 00000000`00000000 : 0x40246


SYMBOL_NAME:  BEDaisy+2a2234

IMAGE_NAME:  hardware

STACK_COMMAND:  .thread ; .cxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED_BEDaisy.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0d6989f4-a5e2-2225-1046-259fcb6d205e}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
    buffer overrun.
Arg2: ffff81873b7c49d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff81873b7c4928, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6436

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 36332

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 2

BUGCHECK_P2: ffff81873b7c49d0

BUGCHECK_P3: ffff81873b7c4928

BUGCHECK_P4: 0

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

EXCEPTION_RECORD:  ffff81873b7c4928 -- (.exr 0xffff81873b7c4928)
ExceptionAddress: fffff8052dea34c5 (dxgkrnl!_report_gsfailure+0x0000000000000005)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  TslGame.exe

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000002

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff8187`3b7c46a8 fffff805`29405e69     : 00000000`00000139 00000000`00000002 ffff8187`3b7c49d0 ffff8187`3b7c4928 : nt!KeBugCheckEx
ffff8187`3b7c46b0 fffff805`29406290     : fffff805`293611e0 fffff805`321120cf ffd88b48`00000eec 068b4808`7f8d4dc7 : nt!KiBugCheckDispatch+0x69
ffff8187`3b7c47f0 fffff805`29404623     : 00000000`0000000d 00000000`00000000 7fff9a00`dba46e50 00000000`ffffffff : nt!KiFastFailDispatch+0xd0
ffff8187`3b7c49d0 fffff805`2dea34c5     : fffff805`2dea4736 ffff8187`3b7c5140 fffff805`2928523f fffff805`2df3db38 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8187`3b7c4b68 fffff805`2dea4736     : ffff8187`3b7c5140 fffff805`2928523f fffff805`2df3db38 ffff8187`00000000 : dxgkrnl!_report_gsfailure+0x5
ffff8187`3b7c4b70 fffff805`2dea46cb     : ffff8187`3b7c4c40 00000000`00000000 ffff8187`3b7c5178 ffff8187`3b7c5150 : dxgkrnl!_GSHandlerCheckCommon+0x5a
ffff8187`3b7c4ba0 fffff805`293fcd62     : fffff805`2dea46b8 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!_GSHandlerCheck+0x13
ffff8187`3b7c4bd0 fffff805`29285027     : ffff8187`3b7c5140 00000000`00000000 ffff8187`3b7c5350 fffff805`2dfc4a16 : nt!RtlpExecuteHandlerForException+0x12
ffff8187`3b7c4c00 fffff805`29283ce6     : ffff8187`3b7c5b18 ffff8187`3b7c5850 ffff8187`3b7c5b18 ffffd809`cefe4010 : nt!RtlDispatchException+0x297
ffff8187`3b7c5320 fffff805`29405fac     : 00000000`00001000 ffff8187`3b7c5bc0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffff8187`3b7c59e0 fffff805`29402143     : fffff805`2def8918 ffffd809`cb565310 00000000`00000002 fffff805`292d5d19 : nt!KiExceptionDispatch+0x12c
ffff8187`3b7c5bc0 fffff805`2dfc4a16     : 00000000`00000000 00000000`00000004 ffff8187`3b7c5eb0 00000000`00000004 : nt!KiPageFault+0x443
ffff8187`3b7c5d50 fffff805`2df6b027     : 00000000`00000000 fffff805`2df7bdc7 ffffd809`d1993a20 ffff9a00`db3a2b30 : dxgkrnl!ADAPTER_RENDER::DdiValidateSubmitCommand+0x3e
ffff8187`3b7c5e00 fffff805`2df6b621     : ffff9a00`db3a2b30 00000000`00000001 00000000`00000001 ffff9a00`db3a2b30 : dxgkrnl!DXGCONTEXT::SubmitCommand+0x5b7
ffff8187`3b7c65c0 fffff805`2df6aa2d     : ffffd809`d2b1d080 00000000`00000000 ffff9a00`dba46de0 00000004`6e2beb20 : dxgkrnl!DxgkSubmitCommandInternal+0x551
ffff8187`3b7c6ac0 fffff805`294058b8     : ffffd809`d2b1d080 00000000`1631c000 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSubmitCommand+0x5d
ffff8187`3b7c6b00 00007ffe`43ef5ae4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000004`6e2bea58 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`43ef5ae4


SYMBOL_NAME:  dxgkrnl!_report_gsfailure+5

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_dxgkrnl!_report_gsfailure

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1685fa82-f4b9-d129-b6b1-78c3bba339a9}

Followup:     MachineOwner
---------

CACHE_MANAGER (34)
    See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000051384
Arg2: ffffb40dbcde6e88
Arg3: ffffb40dbcde66c0
Arg4: fffff806705c7798

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 6202

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8900

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  34

BUGCHECK_P1: 51384

BUGCHECK_P2: ffffb40dbcde6e88

BUGCHECK_P3: ffffb40dbcde66c0

BUGCHECK_P4: fffff806705c7798

EXCEPTION_RECORD:  ffffb40dbcde6e88 -- (.exr 0xffffb40dbcde6e88)
ExceptionAddress: fffff806705c7798 (Ntfs+0x0000000000007798)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000

CONTEXT:  ffffb40dbcde66c0 -- (.cxr 0xffffb40dbcde66c0)
rax=0000000000000001 rbx=ffffdd8e3ccbba08 rcx=0000000000000000
rdx=0000000000000000 rsi=ffff8980c3e56170 rdi=ffffdd8e3cdd3d08
rip=fffff806705c7798 rsp=ffffb40dbcde70c0 rbp=ffffb40dbcde7100
 r8=0000000000010000  r9=0000000000000000 r10=fffff8066c456180
r11=ffffb40dbcde70a0 r12=0000000000010000 r13=ffffdd8e3cf48a20
r14=0000000000000000 r15=0000000000070000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
Ntfs+0x7798:
fffff806`705c7798 33d2            xor     edx,edx
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8066cefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8066ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8066ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000000

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffffb40d`bcde70c0 fffff806`705c502c     : ffffdd8e`3cdd3dd0 ffffb40d`bcde74f0 ffffdd8e`36349184 00000000`00000000 : Ntfs+0x7798
ffffb40d`bcde72c0 fffff806`705c40cc     : ffffdd8e`3cdd3d08 ffffdd8e`3cf48a20 ffffdd8e`00000000 ffffdd8e`00010000 : Ntfs+0x502c
ffffb40d`bcde74c0 fffff806`6c4d1f35     : ffffdd8e`3cdd0460 ffffdd8e`3cf48a20 ffffdd8e`3cf48a20 ffffdd8e`36342d20 : Ntfs+0x40cc
ffffb40d`bcde7590 fffff806`6a466ccf     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffb40d`bcde75d0 fffff806`6a4648d3     : ffffb40d`bcde7660 ffffdd8e`36342d20 00000000`00000006 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffb40d`bcde7640 fffff806`6c4d1f35     : ffffdd8e`3cf48a20 fffff806`6c539895 ffffdd8e`3cf715f0 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffffb40d`bcde76a0 fffff806`6c539b57     : 00000000`00000000 ffffdd8e`3cf48a20 ffffdd8e`3c1270b0 ffffdd8e`3cf715f0 : nt!IofCallDriver+0x55
ffffb40d`bcde76e0 fffff806`6c4add88     : ffffdd8e`3c127060 fffff806`6c50fefa ffffdd8e`3c1270c0 ffffdd8e`3c127080 : nt!IoPageReadEx+0x1d7
ffffb40d`bcde7750 fffff806`6c8982ad     : ffffdd8e`3c127060 ffffdd8e`36efa040 ffffdd8e`3c127170 ffffdd8e`30e66840 : nt!MiPageRead+0x28
ffffb40d`bcde77a0 fffff806`6c897b21     : ffffb40d`bcde7910 00000000`00000001 ffffdd8e`36efa040 00000000`00000000 : nt!MiPfExecuteReadList+0xf9
ffffb40d`bcde7810 fffff806`6c4aa430     : 00000000`00051000 fffff806`6c550c70 ffffdd8e`3cf73330 00000000`00000000 : nt!MmPrefetchForCacheManager+0xe5
ffffb40d`bcde7870 fffff806`6c550f3b     : 00000000`00020000 fffff806`6c550c70 00000000`00020000 00000000`00000000 : nt!CcPerformReadAhead+0x328
ffffb40d`bcde7a40 fffff806`6c4c1f15     : ffffdd8e`36efa040 ffffdd8e`36efa040 ffffdd8e`30f02850 ffffdd8e`00000000 : nt!CcWorkerThread+0x2cb
ffffb40d`bcde7b70 fffff806`6c466dd5     : ffffdd8e`36efa040 00000000`00000080 ffffdd8e`30e661c0 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffb40d`bcde7c10 fffff806`6c5fb4f8     : fffff806`6924b180 ffffdd8e`36efa040 fffff806`6c466d80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb40d`bcde7c60 00000000`00000000     : ffffb40d`bcde8000 ffffb40d`bcde2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  Ntfs+7798

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .cxr 0xffffb40dbcde66c0 ; kb

BUCKET_ID_FUNC_OFFSET:  7798

FAILURE_BUCKET_ID:  0x34_Ntfs!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d51835d9-4001-510a-3094-b40ec540e0b1}

Followup:     MachineOwner
---------
 
  • HDD Sentinel yazılımından tüm disklerin ekran görüntüsünü atın.
  • HD Tune yazılımından tüm disklerinize "Error Scan" yapın, sonucunu buraya atın. "Quick Scan" kapalı olsun.
  • Vanguard ve Battleye'yi kaldırın.
  • DDU ile GPU sürücünüzü kaldırıp WHQL onaylı güncel sürücüyü kurun.
  • XMP profili açıksa kapatın ve BIOS'u sıfırlayın. Ardından MemTest86 ile belleklerde tarama yapın.
Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 000000004a07d357, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 000000004a07d357, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4593

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16184

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: 4a07d357

BUGCHECK_P3: 8

BUGCHECK_P4: 4a07d357

WRITE_ADDRESS: fffff8035e4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8035e40f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8035e40f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000004a07d357

EXCEPTION_PARAMETER1:  0000000000000008

EXCEPTION_PARAMETER2:  000000004a07d357

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
fffff48e`2ba21d08 fffff803`5dc4e5b9     : 00000000`0000001e ffffffff`c0000005 00000000`4a07d357 00000000`00000008 : nt!KeBugCheckEx
fffff48e`2ba21d10 fffff803`5dc05fac     : 00000000`00001000 fffff48e`2ba225b0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1caa59
fffff48e`2ba223d0 fffff803`5dc02143     : 00000000`000081a1 fffff48e`2ba22850 ffffffff`ffffffff ffffffff`0015b0bc : nt!KiExceptionDispatch+0x12c
fffff48e`2ba225b0 00000000`4a07d357     : ffff847c`cb600000 00000000`00000000 fffff48e`2ba229b0 00000000`00000000 : nt!KiPageFault+0x443
fffff48e`2ba22740 ffff847c`cb600000     : 00000000`00000000 fffff48e`2ba229b0 00000000`00000000 00000000`000000ff : 0x4a07d357
fffff48e`2ba22748 00000000`00000000     : fffff48e`2ba229b0 00000000`00000000 00000000`000000ff 00000000`00040282 : 0xffff847c`cb600000


SYMBOL_NAME:  nt!KiDispatchException+1caa59

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1caa59

FAILURE_BUCKET_ID:  0x1E_c0000005_X_nt!KiDispatchException

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {72b01280-60ea-6404-b5e3-077cb4799617}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff803e2510008, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff805227b2234, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4874

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 21670

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff803e2510008

BUGCHECK_P2: 0

BUGCHECK_P3: fffff805227b2234

BUGCHECK_P4: 2

READ_ADDRESS: fffff8051dafa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8051da0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8051da0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff803e2510008

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffffb005ac4c600 -- (.trap 0xfffffb005ac4c600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000a78b rbx=0000000000000000 rcx=000000000003a78b
rdx=fffff803e2510000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805227b2234 rsp=fffffb005ac4c790 rbp=fffff805227b21fc
r8=0000000000000f2e  r9=00000001400025ba r10=fffffb005ac4c9a0
r11=00000000fff2513a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po nc
BEDaisy+0x2a2234:
fffff805`227b2234 f6ff            idiv    bh
Resetting default scope

MISALIGNED_IP:
BEDaisy+2a2234
fffff805`227b2234 f6ff            idiv    bh

STACK_TEXT:
fffffb00`5ac4c358 fffff805`1d286729     : 00000000`00000050 fffff803`e2510008 00000000`00000000 fffffb00`5ac4c600 : nt!KeBugCheckEx
fffffb00`5ac4c360 fffff805`1d0eeb80     : c0011020`063000a6 00000000`00000000 fffffb00`5ac4c680 00000000`00000000 : nt!MiSystemFault+0x13faf9
fffffb00`5ac4c460 fffff805`1d20205e     : 00000000`00000000 00000000`00000000 fffff803`e2510000 fffff805`1d1fa8f5 : nt!MmAccessFault+0x400
fffffb00`5ac4c600 fffff805`227b2234     : 00000000`00000009 ffffa888`44fcb080 00000000`00000804 fffffb00`5ac4cae0 : nt!KiPageFault+0x35e
fffffb00`5ac4c790 00000000`00000009     : ffffa888`44fcb080 00000000`00000804 fffffb00`5ac4cae0 00000000`00000001 : BEDaisy+0x2a2234
fffffb00`5ac4c798 ffffa888`44fcb080     : 00000000`00000804 fffffb00`5ac4cae0 00000000`00000001 ffff867a`e6800000 : 0x9
fffffb00`5ac4c7a0 00000000`00000804     : fffffb00`5ac4cae0 00000000`00000001 ffff867a`e6800000 00000000`00000002 : 0xffffa888`44fcb080
fffffb00`5ac4c7a8 fffffb00`5ac4cae0     : 00000000`00000001 ffff867a`e6800000 00000000`00000002 00000000`00000005 : 0x804
fffffb00`5ac4c7b0 00000000`00000001     : ffff867a`e6800000 00000000`00000002 00000000`00000005 00000000`00040246 : 0xfffffb00`5ac4cae0
fffffb00`5ac4c7b8 ffff867a`e6800000     : 00000000`00000002 00000000`00000005 00000000`00040246 00000000`00000000 : 0x1
fffffb00`5ac4c7c0 00000000`00000002     : 00000000`00000005 00000000`00040246 00000000`00000000 ffffa888`44fcb4d8 : 0xffff867a`e6800000
fffffb00`5ac4c7c8 00000000`00000005     : 00000000`00040246 00000000`00000000 ffffa888`44fcb4d8 fffff803`e2510000 : 0x2
fffffb00`5ac4c7d0 00000000`00040246     : 00000000`00000000 ffffa888`44fcb4d8 fffff803`e2510000 00000000`00000009 : 0x5
fffffb00`5ac4c7d8 00000000`00000000     : ffffa888`44fcb4d8 fffff803`e2510000 00000000`00000009 00000000`00000000 : 0x40246


SYMBOL_NAME:  BEDaisy+2a2234

IMAGE_NAME:  hardware

STACK_COMMAND:  .thread ; .cxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED_BEDaisy.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0d6989f4-a5e2-2225-1046-259fcb6d205e}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
    buffer overrun.
Arg2: ffff81873b7c49d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff81873b7c4928, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6436

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 36332

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 2

BUGCHECK_P2: ffff81873b7c49d0

BUGCHECK_P3: ffff81873b7c4928

BUGCHECK_P4: 0

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

EXCEPTION_RECORD:  ffff81873b7c4928 -- (.exr 0xffff81873b7c4928)
ExceptionAddress: fffff8052dea34c5 (dxgkrnl!_report_gsfailure+0x0000000000000005)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  TslGame.exe

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000002

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffff8187`3b7c46a8 fffff805`29405e69     : 00000000`00000139 00000000`00000002 ffff8187`3b7c49d0 ffff8187`3b7c4928 : nt!KeBugCheckEx
ffff8187`3b7c46b0 fffff805`29406290     : fffff805`293611e0 fffff805`321120cf ffd88b48`00000eec 068b4808`7f8d4dc7 : nt!KiBugCheckDispatch+0x69
ffff8187`3b7c47f0 fffff805`29404623     : 00000000`0000000d 00000000`00000000 7fff9a00`dba46e50 00000000`ffffffff : nt!KiFastFailDispatch+0xd0
ffff8187`3b7c49d0 fffff805`2dea34c5     : fffff805`2dea4736 ffff8187`3b7c5140 fffff805`2928523f fffff805`2df3db38 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8187`3b7c4b68 fffff805`2dea4736     : ffff8187`3b7c5140 fffff805`2928523f fffff805`2df3db38 ffff8187`00000000 : dxgkrnl!_report_gsfailure+0x5
ffff8187`3b7c4b70 fffff805`2dea46cb     : ffff8187`3b7c4c40 00000000`00000000 ffff8187`3b7c5178 ffff8187`3b7c5150 : dxgkrnl!_GSHandlerCheckCommon+0x5a
ffff8187`3b7c4ba0 fffff805`293fcd62     : fffff805`2dea46b8 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!_GSHandlerCheck+0x13
ffff8187`3b7c4bd0 fffff805`29285027     : ffff8187`3b7c5140 00000000`00000000 ffff8187`3b7c5350 fffff805`2dfc4a16 : nt!RtlpExecuteHandlerForException+0x12
ffff8187`3b7c4c00 fffff805`29283ce6     : ffff8187`3b7c5b18 ffff8187`3b7c5850 ffff8187`3b7c5b18 ffffd809`cefe4010 : nt!RtlDispatchException+0x297
ffff8187`3b7c5320 fffff805`29405fac     : 00000000`00001000 ffff8187`3b7c5bc0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffff8187`3b7c59e0 fffff805`29402143     : fffff805`2def8918 ffffd809`cb565310 00000000`00000002 fffff805`292d5d19 : nt!KiExceptionDispatch+0x12c
ffff8187`3b7c5bc0 fffff805`2dfc4a16     : 00000000`00000000 00000000`00000004 ffff8187`3b7c5eb0 00000000`00000004 : nt!KiPageFault+0x443
ffff8187`3b7c5d50 fffff805`2df6b027     : 00000000`00000000 fffff805`2df7bdc7 ffffd809`d1993a20 ffff9a00`db3a2b30 : dxgkrnl!ADAPTER_RENDER::DdiValidateSubmitCommand+0x3e
ffff8187`3b7c5e00 fffff805`2df6b621     : ffff9a00`db3a2b30 00000000`00000001 00000000`00000001 ffff9a00`db3a2b30 : dxgkrnl!DXGCONTEXT::SubmitCommand+0x5b7
ffff8187`3b7c65c0 fffff805`2df6aa2d     : ffffd809`d2b1d080 00000000`00000000 ffff9a00`dba46de0 00000004`6e2beb20 : dxgkrnl!DxgkSubmitCommandInternal+0x551
ffff8187`3b7c6ac0 fffff805`294058b8     : ffffd809`d2b1d080 00000000`1631c000 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSubmitCommand+0x5d
ffff8187`3b7c6b00 00007ffe`43ef5ae4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000004`6e2bea58 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`43ef5ae4


SYMBOL_NAME:  dxgkrnl!_report_gsfailure+5

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_dxgkrnl!_report_gsfailure

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1685fa82-f4b9-d129-b6b1-78c3bba339a9}

Followup:     MachineOwner
---------

CACHE_MANAGER (34)
    See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000051384
Arg2: ffffb40dbcde6e88
Arg3: ffffb40dbcde66c0
Arg4: fffff806705c7798

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 6202

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8900

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  34

BUGCHECK_P1: 51384

BUGCHECK_P2: ffffb40dbcde6e88

BUGCHECK_P3: ffffb40dbcde66c0

BUGCHECK_P4: fffff806705c7798

EXCEPTION_RECORD:  ffffb40dbcde6e88 -- (.exr 0xffffb40dbcde6e88)
ExceptionAddress: fffff806705c7798 (Ntfs+0x0000000000007798)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000

CONTEXT:  ffffb40dbcde66c0 -- (.cxr 0xffffb40dbcde66c0)
rax=0000000000000001 rbx=ffffdd8e3ccbba08 rcx=0000000000000000
rdx=0000000000000000 rsi=ffff8980c3e56170 rdi=ffffdd8e3cdd3d08
rip=fffff806705c7798 rsp=ffffb40dbcde70c0 rbp=ffffb40dbcde7100
r8=0000000000010000  r9=0000000000000000 r10=fffff8066c456180
r11=ffffb40dbcde70a0 r12=0000000000010000 r13=ffffdd8e3cf48a20
r14=0000000000000000 r15=0000000000070000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
Ntfs+0x7798:
fffff806`705c7798 33d2            xor     edx,edx
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8066cefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8066ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8066ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffffb40d`bcde70c0 fffff806`705c502c     : ffffdd8e`3cdd3dd0 ffffb40d`bcde74f0 ffffdd8e`36349184 00000000`00000000 : Ntfs+0x7798
ffffb40d`bcde72c0 fffff806`705c40cc     : ffffdd8e`3cdd3d08 ffffdd8e`3cf48a20 ffffdd8e`00000000 ffffdd8e`00010000 : Ntfs+0x502c
ffffb40d`bcde74c0 fffff806`6c4d1f35     : ffffdd8e`3cdd0460 ffffdd8e`3cf48a20 ffffdd8e`3cf48a20 ffffdd8e`36342d20 : Ntfs+0x40cc
ffffb40d`bcde7590 fffff806`6a466ccf     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffb40d`bcde75d0 fffff806`6a4648d3     : ffffb40d`bcde7660 ffffdd8e`36342d20 00000000`00000006 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffb40d`bcde7640 fffff806`6c4d1f35     : ffffdd8e`3cf48a20 fffff806`6c539895 ffffdd8e`3cf715f0 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffffb40d`bcde76a0 fffff806`6c539b57     : 00000000`00000000 ffffdd8e`3cf48a20 ffffdd8e`3c1270b0 ffffdd8e`3cf715f0 : nt!IofCallDriver+0x55
ffffb40d`bcde76e0 fffff806`6c4add88     : ffffdd8e`3c127060 fffff806`6c50fefa ffffdd8e`3c1270c0 ffffdd8e`3c127080 : nt!IoPageReadEx+0x1d7
ffffb40d`bcde7750 fffff806`6c8982ad     : ffffdd8e`3c127060 ffffdd8e`36efa040 ffffdd8e`3c127170 ffffdd8e`30e66840 : nt!MiPageRead+0x28
ffffb40d`bcde77a0 fffff806`6c897b21     : ffffb40d`bcde7910 00000000`00000001 ffffdd8e`36efa040 00000000`00000000 : nt!MiPfExecuteReadList+0xf9
ffffb40d`bcde7810 fffff806`6c4aa430     : 00000000`00051000 fffff806`6c550c70 ffffdd8e`3cf73330 00000000`00000000 : nt!MmPrefetchForCacheManager+0xe5
ffffb40d`bcde7870 fffff806`6c550f3b     : 00000000`00020000 fffff806`6c550c70 00000000`00020000 00000000`00000000 : nt!CcPerformReadAhead+0x328
ffffb40d`bcde7a40 fffff806`6c4c1f15     : ffffdd8e`36efa040 ffffdd8e`36efa040 ffffdd8e`30f02850 ffffdd8e`00000000 : nt!CcWorkerThread+0x2cb
ffffb40d`bcde7b70 fffff806`6c466dd5     : ffffdd8e`36efa040 00000000`00000080 ffffdd8e`30e661c0 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffb40d`bcde7c10 fffff806`6c5fb4f8     : fffff806`6924b180 ffffdd8e`36efa040 fffff806`6c466d80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb40d`bcde7c60 00000000`00000000     : ffffb40d`bcde8000 ffffb40d`bcde2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  Ntfs+7798

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .cxr 0xffffb40dbcde66c0 ; kb

BUCKET_ID_FUNC_OFFSET:  7798

FAILURE_BUCKET_ID:  0x34_Ntfs!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d51835d9-4001-510a-3094-b40ec540e0b1}

Followup:     MachineOwner
---------
DDU ve GPU driverlarını nereden kaldırabilirim?
 
Son düzenleyen: Moderatör:
DDU ve GPU sürücülerini nereden kaldırabilirim?
DDU'yu kaldırmayacaksınız, DDU'yu kullanıp ekran kartı sürücünüzü kaldıracaksınız. Rehberi gönderdim, mesaja bakın.


Ekran kartınız nedir?
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı