CRITICAL_PROCCESS_DIED mavi ekran hatası

Kağan Çulha

Kilopat
Katılım
13 Şubat 2016
Mesajlar
24
Daha fazla  
Cinsiyet
Erkek
Öncelikle merhabalar, yaklaşık 1.5 hafta önce yeni sistemimi kurdum ve Windows 10 kurulumunuda gerçekleştirdim. Birkaç gündür Windows açılırken ayrı ayrı mavi ekran hataları alıyorum. Bunlardan aklımda kalanlar CRITICAL_PROCCESS_DIED, MEMORY_MANAGEMENT ve UNEXPECTED_STORE_EXCEPTION. Sorunun ne olduğunu tam anlayamadım ve son çare olarak yeniden işletim sistemi kurulumu yapmadan önce size danışmak istedim. DDU ile sürücüleri kaldırık tekrardan kurmayı, CMD üzerinden sfc/scannow yolunu kullandım ve ilk deneyişimde sorun buldu ve düzelttiğini belirtti, MSConfig üzerinden forumlarda bulduğum farklı çözümleride denedim fakat halen bir çözüme ulaşabilmiş değilim. En son bu sabah bilgisayarımı açmayı denediğimde UNEXPECTED_STORE_EXCEPTION sorunu ile karşılaştığımda artık can sıkıcı olmaya başladı.

Minidump dosyalarım: Hatalar.rar

| i7 10700KF | ASUS ROG STRIX Z490-A | MSI GeForce GTX 1050 Ti Gaming X 4 GB | 1TB ve 2TB Seagate HDD | 120 GB ezcool SSD | Corsair iCUE 4000X | Corsair Vengeance RGB white 8x2 GB |
 
MemTest86 yapın. RAM'ler pek iyi durumda görünmüyor.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffbb5332538
Arg3: 000000000000000d
Arg4: fffff900adf82a00

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9103

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 7ffbb5332538

BUGCHECK_P3: d

BUGCHECK_P4: fffff900adf82a00

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
fffff900`adf82858 fffff807`09e18784     : 00000000`0000001a 00000000`00061941 00007ffb`b5332538 00000000`0000000d : nt!KeBugCheckEx
fffff900`adf82860 fffff807`09e0395e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x20c224
fffff900`adf82a00 00007ffb`f1952d8f     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000dd`d47ff468 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`f1952d8f


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80367c4ee9d, The address that the exception occurred at
Arg3: ffffca09779b6f28, Exception Record Address
Arg4: ffffca09779b6760, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 10312

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 14170

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80367c4ee9d

BUGCHECK_P3: ffffca09779b6f28

BUGCHECK_P4: ffffca09779b6760

EXCEPTION_RECORD:  ffffca09779b6f28 -- (.exr 0xffffca09779b6f28)
ExceptionAddress: fffff80367c4ee9d (nt!RtlRbRemoveNode+0x00000000000003cd)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000400000000010
Attempt to read from address 0000400000000010

CONTEXT:  ffffca09779b6760 -- (.cxr 0xffffca09779b6760)
rax=ffffe90674dc1888 rbx=ffffa9065f000290 rcx=0000000000000000
rdx=ffffa90674dc1888 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80367c4ee9d rsp=ffffca09779b7168 rbp=ffffa906705a2888
 r8=0000400000000000  r9=0000000000000000 r10=0000000000000001
r11=ffffa906705a2888 r12=ffffa90675854030 r13=ffffa90675854000
r14=0000000000000000 r15=ffffa90680c54890
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlRbRemoveNode+0x3cd:
fffff803`67c4ee9d 41f6401001      test    byte ptr [r8+10h],1 ds:002b:00004000`00000010=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff803686fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8036860f330: Unable to get Flags value from nt!KdVersionBlock
fffff8036860f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000400000000010

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000400000000010

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffffca09`779b7168 fffff803`67c4e963     : 00000000`00000024 ffffa906`7585a640 00000000`00000000 ffffa906`7585a880 : nt!RtlRbRemoveNode+0x3cd
ffffca09`779b7180 fffff803`67c4e2d8     : ffffa906`5f000280 ffffa906`75854000 ffffa906`5f000280 ffffca09`779b7288 : nt!RtlpHpVsChunkCoalesce+0x183
ffffca09`779b71e0 fffff803`67c4cc64     : 00000000`00000000 fffff803`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x188
ffffca09`779b7280 fffff803`683b1019     : 00000000`00000590 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffca09`779b7360 fffff803`6beeb8ab     : ffffca09`779b7438 00000000`00000000 00000000`000016da ffffb904`e6f45180 : nt!ExFreePool+0x9
ffffca09`779b7390 fffff803`6bdf7812     : ffffca09`00000000 ffffa906`69feca00 ffffa906`00000186 fffff803`00000000 : Ntfs!NtfsDeleteFcb+0x47b
ffffca09`779b7410 fffff803`6beebc7a     : ffffca09`779b77f0 ffffb904`e6f45180 ffffa906`68829010 ffffa906`68829468 : Ntfs!NtfsTeardownFromLcb+0x272
ffffca09`779b74b0 fffff803`6bdfbd40     : ffffca09`779b77f0 ffffca09`779b75b2 00000000`00000000 ffffa906`68829010 : Ntfs!NtfsTeardownStructures+0xea
ffffca09`779b7530 fffff803`6bf1b4d7     : ffffca09`779b7600 ffffa906`00000000 00000000`00000000 ffffa906`68829000 : Ntfs!NtfsDecrementCloseCounts+0xb0
ffffca09`779b7570 fffff803`6bf17ff1     : ffffca09`779b77f0 ffffa906`68829170 ffffa906`68829010 ffffb904`e6f45180 : Ntfs!NtfsCommonClose+0x467
ffffca09`779b7650 fffff803`6bf379b8     : 41dfffff`ffc0001c fffff803`68724440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
ffffca09`779b77b0 fffff803`67c25975     : ffffb904`f8cc8040 fffff803`6bf37930 ffffb904`e509bc40 ffffb904`00000000 : Ntfs!NtfsFspClose+0x88
ffffca09`779b7a70 fffff803`67d17e25     : ffffb904`f8cc8040 00000000`00000080 ffffb904`e50b5040 e331687e`586d61a3 : nt!ExpWorkerThread+0x105
ffffca09`779b7b10 fffff803`67dfcdd8     : ffffe700`67360180 ffffb904`f8cc8040 fffff803`67d17dd0 4010ca62`ad08243a : nt!PspSystemThreadStartup+0x55
ffffca09`779b7b60 00000000`00000000     : ffffca09`779b8000 ffffca09`779b1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.685

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xffffca09779b6760 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}

Followup:     Pool_corruption
---------

UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffff8288f8ba8000, Pointer to the store context or data manager
Arg2: ffffef8d19c06650, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 8859

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13251

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  154

BUGCHECK_P1: ffff8288f8ba8000

BUGCHECK_P2: ffffef8d19c06650

BUGCHECK_P3: 1

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffffef8d19c075d8 -- (.exr 0xffffef8d19c075d8)
ExceptionAddress: fffff80755ef489c (nt!ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR::Compare+0x000000000000006c)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000eb0
Attempt to read from address 0000000000000eb0

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000eb0

CONTEXT:  ffffef8d19c06e10 -- (.cxr 0xffffef8d19c06e10)
rax=0000000000000a20 rbx=000000000000000c rcx=0000000000000000
rdx=00000000000001d6 rsi=0000000000000144 rdi=0000000000000018
rip=fffff80755ef489c rsp=ffffef8d19c07810 rbp=ffff8288f8ba80d0
 r8=00000000000003f0  r9=000000000000000c r10=00000000000010eb
r11=0000000000000009 r12=000000000007e01b r13=0000000000000000
r14=000000000021d6d8 r15=000000000007e01b
iopl=0         nv up ei pl nz ac pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050212
nt!ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR::Compare+0x6c:
fffff807`55ef489c 480304d1        add     rax,qword ptr [rcx+rdx*8] ds:002b:00000000`00000eb0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

READ_ADDRESS: fffff807568fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8075680f330: Unable to get Flags value from nt!KdVersionBlock
fffff8075680f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000eb0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffffef8d`19c07810 fffff807`55ec67b1     : 00000000`00000002 00000000`00000211 ffff8288`f8ba80d0 00000000`0000020f : nt!ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR::Compare+0x6c
ffffef8d`19c07830 fffff807`55ec6697     : 00000000`00000000 00000000`0007e01b 00000000`00000001 00000000`0021d6d8 : nt!B_TREE<unsigned long,ST_STORE<SM_TRAITS>::_ST_HASH_ENTRY,4096,NP_CONTEXT,ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR>::BTreeNodeFindKey+0x51
ffffef8d`19c07870 fffff807`55ec47f4     : ffff8288`f8ba80e8 ffff8288`f8ba80d0 ffff8288`f8ba80d0 ffff8288`f8ba80a8 : nt!B_TREE<unsigned long,ST_STORE<SM_TRAITS>::_ST_HASH_ENTRY,4096,NP_CONTEXT,ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR>::BTreeSearchKey+0x6f
ffffef8d`19c078c0 fffff807`55ec5258     : 00000000`00000000 ffffef8d`19c07969 ffff8288`f8ba8050 ffff8288`0007e01b : nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0xc0
ffffef8d`19c07900 fffff807`55e3eda2     : 00000000`00000000 ffff8289`03213f90 00000000`00000000 fffff807`55e3ec93 : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x1fc
ffffef8d`19c079d0 fffff807`55e3e2ce     : ffff8288`f8ba8000 ffffef8d`19c07a98 00000000`00000001 ffff8288`f8b9b0c0 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xc2
ffffef8d`19c07a20 fffff807`55f22391     : 00000000`00000000 ffff8288`00000000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x12a
ffffef8d`19c07ae0 fffff807`55f17e25     : ffff8288`f8ba8000 fffff807`55f22380 ffffef8d`19b4f2a8 000fa4ef`b59bbfff : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
ffffef8d`19c07b10 fffff807`55ffcdd8     : fffff807`519f6180 ffff8288`f8b9b0c0 fffff807`55f17dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffef8d`19c07b60 00000000`00000000     : ffffef8d`19c08000 ffffef8d`19c01000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR::Compare+6c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .cxr 0xffffef8d19c06e10 ; kb

BUCKET_ID_FUNC_OFFSET:  6c

FAILURE_BUCKET_ID:  0x154_c0000005_nt!ST_STORE_SM_TRAITS_::ST_HASH_ENTRY_COMPARATOR::Compare

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {426d4c7c-c7dd-ba6b-033e-e49b31abf05a}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8031de4e4d0, The address that the exception occurred at
Arg3: ffffec051c70efa8, Exception Record Address
Arg4: ffffec051c70e7e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 7249

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16081

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8031de4e4d0

BUGCHECK_P3: ffffec051c70efa8

BUGCHECK_P4: ffffec051c70e7e0

EXCEPTION_RECORD:  ffffec051c70efa8 -- (.exr 0xffffec051c70efa8)
ExceptionAddress: fffff8031de4e4d0 (nt!RtlpHpVsContextFree+0x0000000000000380)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00003ffffffffff8
Attempt to read from address 00003ffffffffff8

CONTEXT:  ffffec051c70e7e0 -- (.cxr 0xffffec051c70e7e0)
rax=0000400000000000 rbx=ffff9c02aa349000 rcx=0000000000760000
rdx=0000400000000000 rsi=ffff9c02a2800280 rdi=3333333333333333
rip=fffff8031de4e4d0 rsp=ffffec051c70f1e0 rbp=ffffec051c70f250
 r8=0000000000760000  r9=1f991d662d06f11d r10=0000000000000000
r11=ffff9c02a2800290 r12=0000000000000000 r13=ffff9c02b2617ff0
r14=ffff9c02aa34a880 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!RtlpHpVsContextFree+0x380:
fffff803`1de4e4d0 8b4af8          mov     ecx,dword ptr [rdx-8] ds:002b:00003fff`fffffff8=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8031e8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8031e80f330: Unable to get Flags value from nt!KdVersionBlock
fffff8031e80f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 00003ffffffffff8

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00003ffffffffff8

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffffec05`1c70f1e0 fffff803`1de4cc64     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x380
ffffec05`1c70f280 fffff803`1e5b1019     : 00000000`00000580 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffec05`1c70f360 fffff803`200eb8ab     : ffffec05`1c70f438 00000000`00000000 00000000`000024f2 ffffb38d`61141180 : nt!ExFreePool+0x9
ffffec05`1c70f390 fffff803`1fff7812     : ffffec05`00000000 ffff9c02`c5764b00 ffff9c02`0000035c fffff803`00000000 : Ntfs!NtfsDeleteFcb+0x47b
ffffec05`1c70f410 fffff803`200ebc7a     : ffffec05`1c70f7f0 ffffb38d`61141180 ffff9c02`c50555a0 ffff9c02`c50559f8 : Ntfs!NtfsTeardownFromLcb+0x272
ffffec05`1c70f4b0 fffff803`1fffbd40     : ffffec05`1c70f7f0 ffffec05`1c70f5b2 ffff9c02`c50559f8 ffff9c02`c50555a0 : Ntfs!NtfsTeardownStructures+0xea
ffffec05`1c70f530 fffff803`2011b4d7     : ffffec05`1c70f600 ffff9c02`00000000 00000000`00000000 ffff9c02`c5055500 : Ntfs!NtfsDecrementCloseCounts+0xb0
ffffec05`1c70f570 fffff803`20117ff1     : ffffec05`1c70f7f0 ffff9c02`c5055700 ffff9c02`c50555a0 ffffb38d`61141180 : Ntfs!NtfsCommonClose+0x467
ffffec05`1c70f650 fffff803`201379b8     : 00000000`0000001c fffff803`1e924440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
ffffec05`1c70f7b0 fffff803`1de25975     : ffffb38d`6538c040 fffff803`20137930 ffffb38d`5b2aa340 ffffb38d`00000000 : Ntfs!NtfsFspClose+0x88
ffffec05`1c70fa70 fffff803`1df17e25     : ffffb38d`6538c040 00000000`00000080 ffffb38d`5b2b7040 1d109c5b`1c6b9988 : nt!ExpWorkerThread+0x105
ffffec05`1c70fb10 fffff803`1dffcdd8     : ffff8880`d7bcc180 ffffb38d`6538c040 fffff803`1df17dd0 1cd44188`0f6f71d1 : nt!PspSystemThreadStartup+0x55
ffffec05`1c70fb60 00000000`00000000     : ffffec05`1c710000 ffffec05`1c709000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.685

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xffffec051c70e7e0 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}

Followup:     Pool_corruption
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffbd8701dd5240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

ETW minidump data unavailable

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6265

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10003

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffbd8701dd5240

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

ERROR_CODE: (NTSTATUS) 0x5472080 - <Unable to get error code text>

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffffbb00`d31ef838 fffff805`575068e2     : 00000000`000000ef ffffbd87`01dd5240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffbb00`d31ef840 fffff805`57449b39     : 00000000`00000000 fffff805`56f5971d 00000000`144d2c01 00000000`c0000005 : nt!PspCatchCriticalBreak+0x10e
ffffbb00`d31ef8e0 fffff805`57309724     : ffffbd87`00000000 00000000`00000000 ffffbd87`01dd5240 ffffbd87`01dd5678 : nt!PspTerminateAllThreads+0x140b4d
ffffbb00`d31ef950 fffff805`57309a4c     : ffffbd87`01dd5240 00000000`00000000 00000070`839ffafc 000001ea`10d70000 : nt!PspTerminateProcess+0xe0
ffffbb00`d31ef990 fffff805`570071b5     : ffffbd87`01dd5240 ffffbd87`05472080 ffffbb00`d31efa80 ffffbd87`01dd5240 : nt!NtTerminateProcess+0x9c
ffffbb00`d31efa00 00007ff8`dbf8c534     : 00007ff8`dc002a63 00007ff8`dc031354 00000070`839ffac0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000070`839fc728 00007ff8`dc002a63     : 00007ff8`dc031354 00000070`839ffac0 00000000`00000000 00007ff8`dbef0000 : 0x00007ff8`dbf8c534
00000070`839fc730 00007ff8`dc031354     : 00000070`839ffac0 00000000`00000000 00007ff8`dbef0000 00000000`00000004 : 0x00007ff8`dc002a63
00000070`839fc738 00000070`839ffac0     : 00000000`00000000 00007ff8`dbef0000 00000000`00000004 00007ff8`dbf9351d : 0x00007ff8`dc031354
00000070`839fc740 00000000`00000000     : 00007ff8`dbef0000 00000000`00000004 00007ff8`dbf9351d 00007ff8`dc031354 : 0x00000070`839ffac0


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_5472080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {310726af-2b2d-5531-1bf8-7b7a157bc102}

Followup:     MachineOwner
---------
 
En kısa zamanda yapacağım. Yeni alınan Ram kitlerinde sorun çıkması sizce çok olası mı ? Önceki bilgisayarımdada çok fazla sorun yaşadım ve en çok korkutan şeylerden birisi masrafa girip aldığım parçaların sorunlu çıkması.
MemTest86 yapın. RAM'ler pek iyi durumda görünmüyor.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffbb5332538
Arg3: 000000000000000d
Arg4: fffff900adf82a00

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9103

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 7ffbb5332538

BUGCHECK_P3: d

BUGCHECK_P4: fffff900adf82a00

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT:
fffff900`adf82858 fffff807`09e18784     : 00000000`0000001a 00000000`00061941 00007ffb`b5332538 00000000`0000000d : nt!KeBugCheckEx
fffff900`adf82860 fffff807`09e0395e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x20c224
fffff900`adf82a00 00007ffb`f1952d8f     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000dd`d47ff468 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`f1952d8f


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80367c4ee9d, The address that the exception occurred at
Arg3: ffffca09779b6f28, Exception Record Address
Arg4: ffffca09779b6760, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 10312

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 14170

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80367c4ee9d

BUGCHECK_P3: ffffca09779b6f28

BUGCHECK_P4: ffffca09779b6760

EXCEPTION_RECORD:  ffffca09779b6f28 -- (.exr 0xffffca09779b6f28)
ExceptionAddress: fffff80367c4ee9d (nt!RtlRbRemoveNode+0x00000000000003cd)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000400000000010
Attempt to read from address 0000400000000010

CONTEXT:  ffffca09779b6760 -- (.cxr 0xffffca09779b6760)
rax=ffffe90674dc1888 rbx=ffffa9065f000290 rcx=0000000000000000
rdx=ffffa90674dc1888 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80367c4ee9d rsp=ffffca09779b7168 rbp=ffffa906705a2888
r8=0000400000000000  r9=0000000000000000 r10=0000000000000001
r11=ffffa906705a2888 r12=ffffa90675854030 r13=ffffa90675854000
r14=0000000000000000 r15=ffffa90680c54890
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlRbRemoveNode+0x3cd:
fffff803`67c4ee9d 41f6401001      test    byte ptr [r8+10h],1 ds:002b:00004000`00000010=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff803686fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8036860f330: Unable to get Flags value from nt!KdVersionBlock
fffff8036860f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000400000000010

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000400000000010

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffffca09`779b7168 fffff803`67c4e963     : 00000000`00000024 ffffa906`7585a640 00000000`00000000 ffffa906`7585a880 : nt!RtlRbRemoveNode+0x3cd
ffffca09`779b7180 fffff803`67c4e2d8     : ffffa906`5f000280 ffffa906`75854000 ffffa906`5f000280 ffffca09`779b7288 : nt!RtlpHpVsChunkCoalesce+0x183
ffffca09`779b71e0 fffff803`67c4cc64     : 00000000`00000000 fffff803`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x188
ffffca09`779b7280 fffff803`683b1019     : 00000000`00000590 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffca09`779b7360 fffff803`6beeb8ab     : ffffca09`779b7438 00000000`00000000 00000000`000016da ffffb904`e6f45180 : nt!ExFreePool+0x9
ffffca09`779b7390 fffff803`6bdf7812     : ffffca09`00000000 ffffa906`69feca00 ffffa906`00000186 fffff803`00000000 : Ntfs!NtfsDeleteFcb+0x47b
ffffca09`779b7410 fffff803`6beebc7a     : ffffca09`779b77f0 ffffb904`e6f45180 ffffa906`68829010 ffffa906`68829468 : Ntfs!NtfsTeardownFromLcb+0x272
ffffca09`779b74b0 fffff803`6bdfbd40     : ffffca09`779b77f0 ffffca09`779b75b2 00000000`00000000 ffffa906`68829010 : Ntfs!NtfsTeardownStructures+0xea
ffffca09`779b7530 fffff803`6bf1b4d7     : ffffca09`779b7600 ffffa906`00000000 00000000`00000000 ffffa906`68829000 : Ntfs!NtfsDecrementCloseCounts+0xb0
ffffca09`779b7570 fffff803`6bf17ff1     : ffffca09`779b77f0 ffffa906`68829170 ffffa906`68829010 ffffb904`e6f45180 : Ntfs!NtfsCommonClose+0x467
ffffca09`779b7650 fffff803`6bf379b8     : 41dfffff`ffc0001c fffff803`68724440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
ffffca09`779b77b0 fffff803`67c25975     : ffffb904`f8cc8040 fffff803`6bf37930 ffffb904`e509bc40 ffffb904`00000000 : Ntfs!NtfsFspClose+0x88
ffffca09`779b7a70 fffff803`67d17e25     : ffffb904`f8cc8040 00000000`00000080 ffffb904`e50b5040 e331687e`586d61a3 : nt!ExpWorkerThread+0x105
ffffca09`779b7b10 fffff803`67dfcdd8     : ffffe700`67360180 ffffb904`f8cc8040 fffff803`67d17dd0 4010ca62`ad08243a : nt!PspSystemThreadStartup+0x55
ffffca09`779b7b60 00000000`00000000     : ffffca09`779b8000 ffffca09`779b1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.685

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xffffca09779b6760 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}

Followup:     Pool_corruption
---------

UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffff8288f8ba8000, Pointer to the store context or data manager
Arg2: ffffef8d19c06650, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 8859

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13251

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  154

BUGCHECK_P1: ffff8288f8ba8000

BUGCHECK_P2: ffffef8d19c06650

BUGCHECK_P3: 1

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffffef8d19c075d8 -- (.exr 0xffffef8d19c075d8)
ExceptionAddress: fffff80755ef489c (nt!ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR::Compare+0x000000000000006c)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000eb0
Attempt to read from address 0000000000000eb0

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000eb0

CONTEXT:  ffffef8d19c06e10 -- (.cxr 0xffffef8d19c06e10)
rax=0000000000000a20 rbx=000000000000000c rcx=0000000000000000
rdx=00000000000001d6 rsi=0000000000000144 rdi=0000000000000018
rip=fffff80755ef489c rsp=ffffef8d19c07810 rbp=ffff8288f8ba80d0
r8=00000000000003f0  r9=000000000000000c r10=00000000000010eb
r11=0000000000000009 r12=000000000007e01b r13=0000000000000000
r14=000000000021d6d8 r15=000000000007e01b
iopl=0         nv up ei pl nz ac pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050212
nt!ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR::Compare+0x6c:
fffff807`55ef489c 480304d1        add     rax,qword ptr [rcx+rdx*8] ds:002b:00000000`00000eb0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

READ_ADDRESS: fffff807568fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8075680f330: Unable to get Flags value from nt!KdVersionBlock
fffff8075680f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000eb0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffffef8d`19c07810 fffff807`55ec67b1     : 00000000`00000002 00000000`00000211 ffff8288`f8ba80d0 00000000`0000020f : nt!ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR::Compare+0x6c
ffffef8d`19c07830 fffff807`55ec6697     : 00000000`00000000 00000000`0007e01b 00000000`00000001 00000000`0021d6d8 : nt!B_TREE<unsigned long,ST_STORE<SM_TRAITS>::_ST_HASH_ENTRY,4096,NP_CONTEXT,ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR>::BTreeNodeFindKey+0x51
ffffef8d`19c07870 fffff807`55ec47f4     : ffff8288`f8ba80e8 ffff8288`f8ba80d0 ffff8288`f8ba80d0 ffff8288`f8ba80a8 : nt!B_TREE<unsigned long,ST_STORE<SM_TRAITS>::_ST_HASH_ENTRY,4096,NP_CONTEXT,ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR>::BTreeSearchKey+0x6f
ffffef8d`19c078c0 fffff807`55ec5258     : 00000000`00000000 ffffef8d`19c07969 ffff8288`f8ba8050 ffff8288`0007e01b : nt!ST_STORE<SM_TRAITS>::StDmPageRecordRemove+0xc0
ffffef8d`19c07900 fffff807`55e3eda2     : 00000000`00000000 ffff8289`03213f90 00000000`00000000 fffff807`55e3ec93 : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x1fc
ffffef8d`19c079d0 fffff807`55e3e2ce     : ffff8288`f8ba8000 ffffef8d`19c07a98 00000000`00000001 ffff8288`f8b9b0c0 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xc2
ffffef8d`19c07a20 fffff807`55f22391     : 00000000`00000000 ffff8288`00000000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x12a
ffffef8d`19c07ae0 fffff807`55f17e25     : ffff8288`f8ba8000 fffff807`55f22380 ffffef8d`19b4f2a8 000fa4ef`b59bbfff : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
ffffef8d`19c07b10 fffff807`55ffcdd8     : fffff807`519f6180 ffff8288`f8b9b0c0 fffff807`55f17dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffef8d`19c07b60 00000000`00000000     : ffffef8d`19c08000 ffffef8d`19c01000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::ST_HASH_ENTRY_COMPARATOR::Compare+6c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .cxr 0xffffef8d19c06e10 ; kb

BUCKET_ID_FUNC_OFFSET:  6c

FAILURE_BUCKET_ID:  0x154_c0000005_nt!ST_STORE_SM_TRAITS_::ST_HASH_ENTRY_COMPARATOR::Compare

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {426d4c7c-c7dd-ba6b-033e-e49b31abf05a}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8031de4e4d0, The address that the exception occurred at
Arg3: ffffec051c70efa8, Exception Record Address
Arg4: ffffec051c70e7e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 7249

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16081

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8031de4e4d0

BUGCHECK_P3: ffffec051c70efa8

BUGCHECK_P4: ffffec051c70e7e0

EXCEPTION_RECORD:  ffffec051c70efa8 -- (.exr 0xffffec051c70efa8)
ExceptionAddress: fffff8031de4e4d0 (nt!RtlpHpVsContextFree+0x0000000000000380)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00003ffffffffff8
Attempt to read from address 00003ffffffffff8

CONTEXT:  ffffec051c70e7e0 -- (.cxr 0xffffec051c70e7e0)
rax=0000400000000000 rbx=ffff9c02aa349000 rcx=0000000000760000
rdx=0000400000000000 rsi=ffff9c02a2800280 rdi=3333333333333333
rip=fffff8031de4e4d0 rsp=ffffec051c70f1e0 rbp=ffffec051c70f250
r8=0000000000760000  r9=1f991d662d06f11d r10=0000000000000000
r11=ffff9c02a2800290 r12=0000000000000000 r13=ffff9c02b2617ff0
r14=ffff9c02aa34a880 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!RtlpHpVsContextFree+0x380:
fffff803`1de4e4d0 8b4af8          mov     ecx,dword ptr [rdx-8] ds:002b:00003fff`fffffff8=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8031e8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8031e80f330: Unable to get Flags value from nt!KdVersionBlock
fffff8031e80f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00003ffffffffff8

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00003ffffffffff8

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffffec05`1c70f1e0 fffff803`1de4cc64     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x380
ffffec05`1c70f280 fffff803`1e5b1019     : 00000000`00000580 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffec05`1c70f360 fffff803`200eb8ab     : ffffec05`1c70f438 00000000`00000000 00000000`000024f2 ffffb38d`61141180 : nt!ExFreePool+0x9
ffffec05`1c70f390 fffff803`1fff7812     : ffffec05`00000000 ffff9c02`c5764b00 ffff9c02`0000035c fffff803`00000000 : Ntfs!NtfsDeleteFcb+0x47b
ffffec05`1c70f410 fffff803`200ebc7a     : ffffec05`1c70f7f0 ffffb38d`61141180 ffff9c02`c50555a0 ffff9c02`c50559f8 : Ntfs!NtfsTeardownFromLcb+0x272
ffffec05`1c70f4b0 fffff803`1fffbd40     : ffffec05`1c70f7f0 ffffec05`1c70f5b2 ffff9c02`c50559f8 ffff9c02`c50555a0 : Ntfs!NtfsTeardownStructures+0xea
ffffec05`1c70f530 fffff803`2011b4d7     : ffffec05`1c70f600 ffff9c02`00000000 00000000`00000000 ffff9c02`c5055500 : Ntfs!NtfsDecrementCloseCounts+0xb0
ffffec05`1c70f570 fffff803`20117ff1     : ffffec05`1c70f7f0 ffff9c02`c5055700 ffff9c02`c50555a0 ffffb38d`61141180 : Ntfs!NtfsCommonClose+0x467
ffffec05`1c70f650 fffff803`201379b8     : 00000000`0000001c fffff803`1e924440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
ffffec05`1c70f7b0 fffff803`1de25975     : ffffb38d`6538c040 fffff803`20137930 ffffb38d`5b2aa340 ffffb38d`00000000 : Ntfs!NtfsFspClose+0x88
ffffec05`1c70fa70 fffff803`1df17e25     : ffffb38d`6538c040 00000000`00000080 ffffb38d`5b2b7040 1d109c5b`1c6b9988 : nt!ExpWorkerThread+0x105
ffffec05`1c70fb10 fffff803`1dffcdd8     : ffff8880`d7bcc180 ffffb38d`6538c040 fffff803`1df17dd0 1cd44188`0f6f71d1 : nt!PspSystemThreadStartup+0x55
ffffec05`1c70fb60 00000000`00000000     : ffffec05`1c710000 ffffec05`1c709000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.685

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xffffec051c70e7e0 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}

Followup:     Pool_corruption
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffbd8701dd5240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

ETW minidump data unavailable

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6265

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10003

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffbd8701dd5240

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

ERROR_CODE: (NTSTATUS) 0x5472080 - <Unable to get error code text>

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT:
ffffbb00`d31ef838 fffff805`575068e2     : 00000000`000000ef ffffbd87`01dd5240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffbb00`d31ef840 fffff805`57449b39     : 00000000`00000000 fffff805`56f5971d 00000000`144d2c01 00000000`c0000005 : nt!PspCatchCriticalBreak+0x10e
ffffbb00`d31ef8e0 fffff805`57309724     : ffffbd87`00000000 00000000`00000000 ffffbd87`01dd5240 ffffbd87`01dd5678 : nt!PspTerminateAllThreads+0x140b4d
ffffbb00`d31ef950 fffff805`57309a4c     : ffffbd87`01dd5240 00000000`00000000 00000070`839ffafc 000001ea`10d70000 : nt!PspTerminateProcess+0xe0
ffffbb00`d31ef990 fffff805`570071b5     : ffffbd87`01dd5240 ffffbd87`05472080 ffffbb00`d31efa80 ffffbd87`01dd5240 : nt!NtTerminateProcess+0x9c
ffffbb00`d31efa00 00007ff8`dbf8c534     : 00007ff8`dc002a63 00007ff8`dc031354 00000070`839ffac0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000070`839fc728 00007ff8`dc002a63     : 00007ff8`dc031354 00000070`839ffac0 00000000`00000000 00007ff8`dbef0000 : 0x00007ff8`dbf8c534
00000070`839fc730 00007ff8`dc031354     : 00000070`839ffac0 00000000`00000000 00007ff8`dbef0000 00000000`00000004 : 0x00007ff8`dc002a63
00000070`839fc738 00000070`839ffac0     : 00000000`00000000 00007ff8`dbef0000 00000000`00000004 00007ff8`dbf9351d : 0x00007ff8`dc031354
00000070`839fc740 00000000`00000000     : 00007ff8`dbef0000 00000000`00000004 00007ff8`dbf9351d 00007ff8`dc031354 : 0x00000070`839ffac0


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_5472080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {310726af-2b2d-5531-1bf8-7b7a157bc102}

Followup:     MachineOwner
---------
 

Dosya Ekleri

  • e8b07226-774b-4305-be10-263951be9b02.jpg
    e8b07226-774b-4305-be10-263951be9b02.jpg
    94,2 KB · Görüntüleme: 35
Test sırasında XMP açık mıydı? Açıksa kapatarak testi yineleyebilir misiniz?

Ayrıca BIOS güncellemeniz yararınıza olacaktır.
İndirme: Buradan

Dosyalara yeniden baktım ama bellek sorunu görünüyor.
XMP zaten kapalıydı fakat Ram ayarlarını en baştaki haline alıp tekrar denedim yine hiçbir hata bulamadı. Anakartın BIOS'unu anakartı taktığımda güncelledim şuan en son versiyonda. Ayrıca tekrar belirteyim yanlış anlaşılma olmasın Windows kullanırken hiçbir sorun yaşamıyorum sadece Windows açılırken 10 kere açıyorsam 6 sında açılamadan mavi ekran veriyor ve yeniden başlattıktan sonra Windows açılıyor, kötünün iyisi gibi birşey.
 

Geri
Yukarı