Çözüldü Mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

bademlimaklube

Picopat
Katılım
15 Ekim 2020
Mesajlar
13
Daha fazla  
Cinsiyet
Erkek
Merhaba herkese iyi günler dilerim. Sistemimi yeni topladım daha 1 hafta oldu ve son 3 4 gündür mavi ekran hatası alıyorum. Bu konuda da analiz ve yorum yapamadığım için yardım istiyorum sizlerden teşekkür ederim şimdiden. BlueScreenView uygulamasıyla baktığımda görünen bu.
minidump
 

Dosya Ekleri

  • Screenshot_1.png
    Screenshot_1.png
    34,5 KB · Görüntüleme: 69
  • Screenshot_2.png
    Screenshot_2.png
    35,5 KB · Görüntüleme: 38
  • Screenshot_3.png
    Screenshot_3.png
    35,7 KB · Görüntüleme: 31
  • Screenshot_4.png
    Screenshot_4.png
    35 KB · Görüntüleme: 34
  • Screenshot_5.png
    Screenshot_5.png
    34,7 KB · Görüntüleme: 35
Çözüm
Disklerinize HD Tune ile (quick scan ayarı kapalı halde) hata, HD Sentinel ile de sağlık testi yapın ve sonuçlarını paylaşın. Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8037b3f5f80, Address of the instruction which caused the bugcheck
Arg3: ffffd308bc19ad30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9389

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 31632

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8037b3f5f80

BUGCHECK_P3: ffffd308bc19ad30

BUGCHECK_P4: 0

CONTEXT:  ffffd308bc19ad30 -- (.cxr 0xffffd308bc19ad30)
rax=0000000000000030 rbx=ffffa58bf1ae22c0 rcx=ffffa58bf337ca30
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffa58be8f066a0
rip=fffff8037b3f5f80 rsp=ffffd308bc19b730 rbp=ffffd308bc19b7e9
r8=ffffd308bc19b738  r9=000000000000003e r10=0000000000000000
r11=ffffa58bf04a5080 r12=ffffa58bf1ae2340 r13=ffffd308bc19b960
r14=ffffa58bf27b22f0 r15=00000000000002a0
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
FLTMGR!FltpPerformPreCallbacksWorker+0x260:
fffff803`7b3f5f80 498b4240        mov     rax,qword ptr [r10+40h] ds:002b:00000000`00000040=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  OverwolfBrowser.exe

STACK_TEXT:
ffffd308`bc19b730 fffff803`7b3f5b37     : ffffd308`bc19b900 00000000`00000002 ffffa58b`e8c8cd00 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x260
ffffd308`bc19b850 fffff803`7b3f4b46     : ffffd308`bc19d000 ffffd308`bc197000 ffffa58b`eebb3730 ffffd308`bc19b970 : FLTMGR!FltpPassThroughInternal+0xc7
ffffd308`bc19b8a0 fffff803`7b3f48bb     : ffffffff`fffe7960 00000000`00000000 ffffa58b`f1092d58 00000000`00000000 : FLTMGR!FltpPassThrough+0x1d6
ffffd308`bc19b940 fffff803`7eed1f35     : ffffa58b`f337ca30 fffff803`7eed46e8 ffffa58b`e8ebb840 ffffa58b`e646ab00 : FLTMGR!FltpDispatch+0x8b
ffffd308`bc19b9a0 fffff803`7f2aa6ca     : ffffa58b`f337ca30 ffffd406`0f435900 ffffa58b`e8c8cd40 ffffa58b`e8c8cd40 : nt!IofCallDriver+0x55
ffffd308`bc19b9e0 fffff803`7f2a4990     : ffffd406`0f435900 00000000`00000000 ffffa58b`e64f70c0 ffffd308`bc19baf0 : nt!IopDeleteFile+0x13a
ffffd308`bc19ba60 fffff803`7eedffc7     : 00000000`00000000 00000000`00000000 ffffd406`0f435900 ffffa58b`f337ca30 : nt!ObpRemoveObjectRoutine+0x80
ffffd308`bc19bac0 fffff803`7ee617be     : 00000000`00000000 ffffa58b`f337ca30 ffffd406`0f435aa0 ffffa58b`f337ca30 : nt!ObfDereferenceObjectWithTag+0xc7
ffffd308`bc19bb00 fffff803`8203b2ee     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalPutDmaAdapter+0xe
ffffd308`bc19bb30 fffff803`8202bfd0     : ffffd406`0f435900 ffffd406`0f435940 00000000`00000000 ffffd406`0f435aa0 : Ntfs!NtfsDeleteInternalAttributeStream+0x12a
ffffd308`bc19bb70 fffff803`81f37b95     : ffffd406`0f435940 ffffd406`0f435aa0 00000000`00000000 ffffd406`0f435aa0 : Ntfs!NtfsRemoveScb+0x130
ffffd308`bc19bbd0 fffff803`8202bc9c     : ffffa58b`f1092d58 00000000`00000008 ffffd406`0f435940 ffffd308`bc19c000 : Ntfs!NtfsPrepareFcbForRemoval+0x75
ffffd308`bc19bc10 fffff803`82062c17     : ffffa58b`f1092d58 00000000`c000003a ffffd406`0f435e58 ffffd406`0acb1270 : Ntfs!NtfsTeardownStructures+0x9c
ffffd308`bc19bc90 fffff803`8205c17b     : ffffa58b`e8d61ab0 ffffd308`bc19c080 ffffa58b`e8d61ab0 00000000`00000000 : Ntfs!NtfsCommonCreate+0x3557
ffffd308`bc19bf70 fffff803`7eed1f35     : ffffa58b`e8f1c030 ffffa58b`e8d61ab0 ffffd308`bc19c200 ffffa58b`f337d6b0 : Ntfs!NtfsFsdCreate+0x1db
ffffd308`bc19c1f0 fffff803`7b3f6ccf     : ffffa58b`f337d600 ffffd308`bc19c2e0 ffffd308`bc19c2e9 fffff803`7b3f5b37 : nt!IofCallDriver+0x55
ffffd308`bc19c230 fffff803`7b42bbd4     : ffffd308`bc19c2e0 ffffa58b`f337d708 ffffa58b`e8c8cd40 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffd308`bc19c2a0 fffff803`7eed1f35     : ffffa58b`f337d600 ffffa58b`f337d748 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffffd308`bc19c350 fffff803`7eed3524     : 00000000`00000000 ffffa58b`e8c8cd40 00000000`00000000 ffffa58b`e8d61ab0 : nt!IofCallDriver+0x55
ffffd308`bc19c390 fffff803`7f2a7bfc     : ffffd308`bc19c650 ffffa58b`f337d748 ffffa58b`f337d6b0 ffffd308`00000001 : nt!IoCallDriverWithTracing+0x34
ffffd308`bc19c3e0 fffff803`7f2d10de     : ffffa58b`e8c6cb00 00000000`00000000 ffffa58b`f1582630 ffffa58b`f1582601 : nt!IopParseDevice+0x6ac
ffffd308`bc19c550 fffff803`7f2da39a     : ffffa58b`f1582600 ffffd308`bc19c7b8 ffffd308`00000040 ffffa58b`e64f70c0 : nt!ObpLookupObjectName+0x3fe
ffffd308`bc19c720 fffff803`7f21e04e     : 0000007f`00000000 0000006c`d4bf8e00 00000000`00000000 0000006c`d4bf8dd0 : nt!ObOpenObjectByNameEx+0x1fa
ffffd308`bc19c850 fffff803`7f0058b8     : ffffa58b`f04a5080 ffffa58b`f0e2fa60 ffffa58b`f04a5080 00000268`934a2520 : nt!NtQueryFullAttributesFile+0x1ce
ffffd308`bc19cb00 00007ffd`a5c4e674     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000006c`d4bf8d78 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`a5c4e674


SYMBOL_NAME:  FLTMGR!FltpPerformPreCallbacksWorker+260

MODULE_NAME: FLTMGR

IMAGE_NAME:  FLTMGR.SYS

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .cxr 0xffffd308bc19ad30 ; kb

BUCKET_ID_FUNC_OFFSET:  260

FAILURE_BUCKET_ID:  0x3B_c0000005_FLTMGR!FltpPerformPreCallbacksWorker

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8c1dd5a6-b42f-d6ff-4bb6-2f415b42874f}

Followup:     MachineOwner
---------



IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000120, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8032ce07136, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5062

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 18927

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 120

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8032ce07136

READ_ADDRESS: fffff8032d8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8032d80f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8032d80f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000120

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  explorer.exe

TRAP_FRAME:  ffff8e801dfb1800 -- (.trap 0xffff8e801dfb1800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8e801dfb1988 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8032ce07136 rsp=ffff8e801dfb1990 rbp=ffff8e801dfb1b80
r8=ffffffffffffffff  r9=0000000000000000 r10=0000000000000000
r11=ffffc98ec0a56d00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!NtSetInformationWorkerFactory+0x346:
fffff803`2ce07136 8b8620010000    mov     eax,dword ptr [rsi+120h] ds:00000000`00000120=????????
Resetting default scope

STACK_TEXT:
ffff8e80`1dfb16b8 fffff803`2d005e69     : 00000000`0000000a 00000000`00000120 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8e80`1dfb16c0 fffff803`2d002169     : ffffc98e`c480d5a0 ffffc98e`ca4ae590 ffff8e80`1dfb18d0 fffff803`2ce617be : nt!KiBugCheckDispatch+0x69
ffff8e80`1dfb1800 fffff803`2ce07136     : 00000000`00000000 ffff8e80`1dfb1b80 00000000`00000009 00000000`06eef47c : nt!KiPageFault+0x469
ffff8e80`1dfb1990 fffff803`2d0058b8     : ffffdd84`d94b5000 ffffdd84`d7aad040 ffff8e80`1dfb1b80 ffffdd84`00000000 : nt!NtSetInformationWorkerFactory+0x346
ffff8e80`1dfb1b00 00007ff9`ef5af194     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`06eef448 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`ef5af194


SYMBOL_NAME:  nt!NtSetInformationWorkerFactory+346

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  346

FAILURE_BUCKET_ID:  AV_nt!NtSetInformationWorkerFactory

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8c6e4844-42d2-1e47-f981-814a5ebf743a}

Followup:     MachineOwner
---------



SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80133fd433f, Address of the instruction which caused the bugcheck
Arg3: ffff8d87ffa602c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6265

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 91993

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80133fd433f

BUGCHECK_P3: ffff8d87ffa602c0

BUGCHECK_P4: 0

CONTEXT:  ffff8d87ffa602c0 -- (.cxr 0xffff8d87ffa602c0)
rax=0000000000001000 rbx=ffffa485c8ef93a0 rcx=ffffa485c8ef93a0
rdx=ffff8d87ffa60ff0 rsi=ffff8d87ffa60ff0 rdi=ffffa485c726e000
rip=fffff80133fd433f rsp=ffff8d87ffa60cc0 rbp=ffff8d87ffa60dc0
r8=0000000000000a00  r9=0000000000000000 r10=0000000000000000
r11=ffff8d87ffa60c80 r12=0000000000000080 r13=ffff8d87ffa60f90
r14=0000000009dc014b r15=ffff8d87ffa60f94
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nvlddmkm+0xad433f:
fffff801`33fd433f 49894618        mov     qword ptr [r14+18h],rax ds:002b:00000000`09dc0163=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  StartMenuExperienceHost.exe

STACK_TEXT:
ffff8d87`ffa60cc0 ffffa485`c8ef93a0     : ffff8d87`ffa60dc0 ffff8d87`ffa60ff0 00000000`00000008 ffff8d87`ffa60c00 : nvlddmkm+0xad433f
ffff8d87`ffa60cc8 ffff8d87`ffa60dc0     : ffff8d87`ffa60ff0 00000000`00000008 ffff8d87`ffa60c00 00000000`00000008 : 0xffffa485`c8ef93a0
ffff8d87`ffa60cd0 ffff8d87`ffa60ff0     : 00000000`00000008 ffff8d87`ffa60c00 00000000`00000008 ffffd172`11ba7505 : 0xffff8d87`ffa60dc0
ffff8d87`ffa60cd8 00000000`00000008     : ffff8d87`ffa60c00 00000000`00000008 ffffd172`11ba7505 ffffa485`d0adf008 : 0xffff8d87`ffa60ff0
ffff8d87`ffa60ce0 ffff8d87`ffa60c00     : 00000000`00000008 ffffd172`11ba7505 ffffa485`d0adf008 ffffa485`d0adf000 : 0x8
ffff8d87`ffa60ce8 00000000`00000008     : ffffd172`11ba7505 ffffa485`d0adf008 ffffa485`d0adf000 fffff801`335cd48c : 0xffff8d87`ffa60c00
ffff8d87`ffa60cf0 ffffd172`11ba7505     : ffffa485`d0adf008 ffffa485`d0adf000 fffff801`335cd48c ffffa485`d0adf000 : 0x8
ffff8d87`ffa60cf8 ffffa485`d0adf008     : ffffa485`d0adf000 fffff801`335cd48c ffffa485`d0adf000 fffff801`202e91ff : 0xffffd172`11ba7505
ffff8d87`ffa60d00 ffffa485`d0adf000     : fffff801`335cd48c ffffa485`d0adf000 fffff801`202e91ff ffffa485`00000007 : 0xffffa485`d0adf008
ffff8d87`ffa60d08 fffff801`335cd48c     : ffffa485`d0adf000 fffff801`202e91ff ffffa485`00000007 00000000`00000004 : 0xffffa485`d0adf000
ffff8d87`ffa60d10 ffffa485`d0adf000     : fffff801`202e91ff ffffa485`00000007 00000000`00000004 00000000`00000536 : nvlddmkm+0xcd48c
ffff8d87`ffa60d18 fffff801`202e91ff     : ffffa485`00000007 00000000`00000004 00000000`00000536 00000000`00000004 : 0xffffa485`d0adf000
ffff8d87`ffa60d20 ffffa485`00000007     : 00000000`00000004 00000000`00000536 00000000`00000004 00000000`00000003 : 0xfffff801`202e91ff
ffff8d87`ffa60d28 00000000`00000004     : 00000000`00000536 00000000`00000004 00000000`00000003 00000000`00000140 : 0xffffa485`00000007
ffff8d87`ffa60d30 00000000`00000536     : 00000000`00000004 00000000`00000003 00000000`00000140 ffffa485`cb9f7000 : 0x4
ffff8d87`ffa60d38 00000000`00000004     : 00000000`00000003 00000000`00000140 ffffa485`cb9f7000 fffff801`22acfc99 : 0x536
ffff8d87`ffa60d40 00000000`00000003     : 00000000`00000140 ffffa485`cb9f7000 fffff801`22acfc99 ffffffff`ffffffff : 0x4
ffff8d87`ffa60d48 00000000`00000140     : ffffa485`cb9f7000 fffff801`22acfc99 ffffffff`ffffffff fffff801`22ad5d19 : 0x3
ffff8d87`ffa60d50 ffffa485`cb9f7000     : fffff801`22acfc99 ffffffff`ffffffff fffff801`22ad5d19 ffff8d87`ffa60e60 : 0x140
ffff8d87`ffa60d58 fffff801`22acfc99     : ffffffff`ffffffff fffff801`22ad5d19 ffff8d87`ffa60e60 00000000`00000140 : 0xffffa485`cb9f7000
ffff8d87`ffa60d60 ffff8d87`ffa61000     : 00000000`00000001 ffff8d87`ffa61400 ffffa485`c726e000 ffff8d87`ffa61120 : nt!RtlpHpLfhSlotAllocate+0x179
ffff8d87`ffa60eb0 00000000`00000001     : ffff8d87`ffa61400 ffffa485`c726e000 ffff8d87`ffa61120 00000000`00000000 : 0xffff8d87`ffa61000
ffff8d87`ffa60eb8 ffff8d87`ffa61400     : ffffa485`c726e000 ffff8d87`ffa61120 00000000`00000000 ffffa485`c8ef93a0 : 0x1
ffff8d87`ffa60ec0 ffffa485`c726e000     : ffff8d87`ffa61120 00000000`00000000 ffffa485`c8ef93a0 00000000`00000000 : 0xffff8d87`ffa61400
ffff8d87`ffa60ec8 ffff8d87`ffa61120     : 00000000`00000000 ffffa485`c8ef93a0 00000000`00000000 00000000`00000000 : 0xffffa485`c726e000
ffff8d87`ffa60ed0 00000000`00000000     : ffffa485`c8ef93a0 00000000`00000000 00000000`00000000 ffff8d87`ffa61000 : 0xffff8d87`ffa61120


SYMBOL_NAME:  nvlddmkm+ad433f

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffff8d87ffa602c0 ; kb

BUCKET_ID_FUNC_OFFSET:  ad433f

FAILURE_BUCKET_ID:  0x3B_c0000005_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {63c41bff-3ea4-15a0-a72c-26a548d17abe}

Followup:     MachineOwner
---------



KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffff800f8d811080, The address of the thread.
Arg2: ffffaa8711dcabc0, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5577

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 46025

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  192

BUGCHECK_P1: ffff800f8d811080

BUGCHECK_P2: ffffaa8711dcabc0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

STACK_TEXT:
fffffb0f`34c52f58 fffff801`37cdfa52     : 00000000`00000192 ffff800f`8d811080 ffffaa87`11dcabc0 00000000`00000000 : nt!KeBugCheckEx
fffffb0f`34c52f60 fffff801`380cfd52     : ffffaa87`14aef7f5 fffff801`00000000 ffff800f`00000000 ffffaa87`14aa8ec0 : nt!ExAcquirePushLockSharedEx+0x142
fffffb0f`34c52fb0 fffff801`380cdd77     : ffffaa87`117c5520 ffffaa87`14aa7d80 fffffb0f`34c531d0 fffff801`00000008 : nt!CmpPerformSingleKcbCacheLookup+0xe2
fffffb0f`34c53040 fffff801`380ce1ba     : 00000000`00000002 fffffb0f`34c53100 fffffb0f`00000008 00000000`00000000 : nt!CmpPerformCompleteKcbCacheLookup+0x77
fffffb0f`34c530d0 fffff801`380cd013     : ffffaa87`0000001c fffffb0f`34c53420 fffffb0f`34c533d8 ffff800f`89e11730 : nt!CmpDoParseKey+0x2da
fffffb0f`34c53370 fffff801`380d10de     : fffff801`380ccd01 00000000`00000000 ffff800f`89e11730 fffffb0f`34c53601 : nt!CmpParseKey+0x2c3
fffffb0f`34c53510 fffff801`380da39a     : ffff800f`89e11700 fffffb0f`34c53778 00000000`00000040 ffff800f`810fef00 : nt!ObpLookupObjectName+0x3fe
fffffb0f`34c536e0 fffff801`380da17c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff800f`810fef00 : nt!ObOpenObjectByNameEx+0x1fa
fffffb0f`34c53810 fffff801`380d9ca1     : 00000000`0c47e608 fffffb0f`34c53b80 00000000`00000001 fffff801`37c617be : nt!ObOpenObjectByName+0x5c
fffffb0f`34c53860 fffff801`380d99cf     : 00000000`01260000 00000000`75a56290 00000000`775e4630 00000000`0c57f08c : nt!CmOpenKey+0x2c1
fffffb0f`34c53ac0 fffff801`37e058b8     : ffff800f`8d811000 00000000`00000000 fffffb0f`34c53b80 ffff800f`918098d0 : nt!NtOpenKeyEx+0xf
fffffb0f`34c53b00 00007ff8`6b5ae1b4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0c47e5a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6b5ae1b4


SYMBOL_NAME:  nt!ExAcquirePushLockSharedEx+142

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  142

FAILURE_BUCKET_ID:  0x192_nt!ExAcquirePushLockSharedEx

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {292e4563-5d10-0ceb-86fc-152da5e999ce}

Followup:     MachineOwner
---------



SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8060f13d33f, Address of the instruction which caused the bugcheck
Arg3: fffff48fcbade470, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5890

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13536

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8060f13d33f

BUGCHECK_P3: fffff48fcbade470

BUGCHECK_P4: 0

CONTEXT:  fffff48fcbade470 -- (.cxr 0xfffff48fcbade470)
rax=fffff48fcbadf720 rbx=ffffc20e04b422b0 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000002 rdi=fffff48fcbadf4e8
rip=fffff8060f13d33f rsp=fffff48fcbadee70 rbp=0000000000000000
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=ffffc20e04f67bb0 r12=0000000000000702 r13=0000000000000000
r14=fffff48fcbadf4c0 r15=fffff48fcbadf4e8
iopl=0         nv up ei pl nz ac po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050216
Ntfs!NtfsCleanupIrpContext+0x2df:
fffff806`0f13d33f 488b4970        mov     rcx,qword ptr [rcx+70h] ds:002b:00000000`00000070=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MsMpEng.exe

STACK_TEXT:
fffff48f`cbadee70 fffff806`0f13cf24     : 00000000`00000000 00000000`00000001 fffff48f`cbadf4c0 fffff806`0f13c090 : Ntfs!NtfsCleanupIrpContext+0x2df
fffff48f`cbadeed0 fffff806`0f26b723     : 00000000`00000000 ffffc20e`04b422b0 00000000`00000200 00000000`00000000 : Ntfs!NtfsExtendedCompleteRequestInternal+0x134
fffff48f`cbadef30 fffff806`0f26a4ba     : 00000000`00000000 ffff9b88`1ca2c468 ffff9b88`1ca2c101 00000000`00000000 : Ntfs!NtfsCompleteCleanupRequest+0x53
fffff48f`cbadef70 fffff806`0f25af4d     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff48f`cbadf490 : Ntfs!NtfsCommonCleanup+0x61aa
fffff48f`cbadf420 fffff806`0c4d1f35     : ffffc20e`00da0010 fffff806`085e4b46 ffffc20e`04b422b0 ffffc20d`f9884ae0 : Ntfs!NtfsFsdCleanup+0x1bd
fffff48f`cbadf770 fffff806`085e6ccf     : 00000000`00000000 fffff806`0c8d4b41 ffffc20d`00000000 ffffc20d`fe4d9080 : nt!IofCallDriver+0x55
fffff48f`cbadf7b0 fffff806`085e48d3     : fffff48f`cbadf840 00000000`00000000 00000000`00000000 ffffc20d`fee8a080 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff48f`cbadf820 fffff806`0c4d1f35     : ffffc20e`04f67bb0 fffff806`0c4d244d ffffc20e`04f67bb0 ffff088e`301e5aff : FLTMGR!FltpDispatch+0xa3
fffff48f`cbadf880 fffff806`0c8a740a     : 00000000`00000000 ffffc20e`04f67bb0 00000000`00000000 00000000`00040040 : nt!IofCallDriver+0x55
fffff48f`cbadf8c0 fffff806`0c8d23ec     : 00000000`00000000 00000000`00007ffe ffffffff`00000000 ffffc20d`f60fdd20 : nt!IopCloseFile+0x17a
fffff48f`cbadf950 fffff806`0c8d60bc     : 00000000`00001188 fffff806`0c841227 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x24c
fffff48f`cbadfa90 fffff806`0c6058b8     : ffffc20d`fe4d9000 00007ffd`4550c610 fffff48f`cbadfb80 ffffffff`ffb3b401 : nt!NtClose+0xec
fffff48f`cbadfb00 00007ffd`6242bfa4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000089`0ecff448 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6242bfa4


SYMBOL_NAME:  Ntfs!NtfsCleanupIrpContext+2df

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .cxr 0xfffff48fcbade470 ; kb

BUCKET_ID_FUNC_OFFSET:  2df

FAILURE_BUCKET_ID:  0x3B_c0000005_Ntfs!NtfsCleanupIrpContext

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {60eaa459-510e-8de8-0423-d729386743f0}

Followup:     MachineOwner
---------
Eski sürümleri bulamadım sitede bakalım ya hani bugün olmadı şimdiye kadar bir şey :D. Kafayı yedirecek en sonunda. Teşekkür ederim tekrardan hocam o kadar uğraştın.
 
Son düzenleyen: Moderatör:
Çok teşekkür ederim hocam. Bilgisayarı kaç gündür açamıyordum ancak açabildim birkaç gündür mavi ekran almıyorum adminler konuyu kilitleyebilir sanırım çok teşekkür ederim herkese özellikle @Bora Dere hocama.
 
Son düzenleyen: Moderatör:
Durum
Mesaj gönderimine kapalı.

Yeni konular

Yeni mesajlar

Geri
Yukarı