batuhan güner 61
Femtopat
- Katılım
- 9 Ocak 2021
- Mesajlar
- 14
Daha fazla
- Cinsiyet
- Erkek
minidump.rar
drive.google.com
amd ryzen 5 3500x
msı 1070 ti ekran kartı
apacer panter 16 gb ram 8*2
windows 10 pro
Düzelttim.Dosyayı herkese açık olacak şekilde paylaşın. Yapamazsanız MediaFire'ye yükleyin.
Eki Görüntüle 826053
Eki Görüntüle 826054
sfc /scannow
komutunu uygulayın. Ekranda görünen sonucu burayla paylaşın.APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ff840a4c034, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffff58489efbb80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6358
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9005
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1
BUGCHECK_P1: 7ff840a4c034
BUGCHECK_P2: 0
BUGCHECK_P3: ffff
BUGCHECK_P4: fffff58489efbb80
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
STACK_TEXT:
fffff584`89efb9b8 fffff805`47407769 : 00000000`00000001 00007ff8`40a4c034 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
fffff584`89efb9c0 fffff805`47407633 : 000001a4`fcafe3c0 00000000`00000000 fffff584`89efbb18 ffffffff`fffe7960 : nt!KiBugCheckDispatch+0x69
fffff584`89efbb00 00007ff8`40a4c034 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000090`6c6bfcb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`40a4c034
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: 0x1_SysCallNum_4_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {52cd694c-15ec-48c3-924a-3539560711db}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80567662e3c, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9249
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10552
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80567662e3c
READ_ADDRESS: fffff805680fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8056800f330: Unable to get Flags value from nt!KdVersionBlock
fffff8056800f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000008
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
TRAP_FRAME: ffffa68b3a8a05c0 -- (.trap 0xffffa68b3a8a05c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd28f22814c00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80567662e3c rsp=ffffa68b3a8a0750 rbp=ffffa68b3a8a07b9
r8=0000000000000000 r9=0000000000000001 r10=ffffd28f22814b90
r11=ffffd28f20380310 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExpAcquireResourceExclusiveLite+0x41c:
fffff805`67662e3c 8b4708 mov eax,dword ptr [rdi+8] ds:00000000`00000008=????????
Resetting default scope
STACK_TEXT:
ffffa68b`3a8a0478 fffff805`67807769 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa68b`3a8a0480 fffff805`67803a69 : 00000000`00000000 ffffa68b`3a8a0671 ffffd28f`23b9a080 fffff805`67664623 : nt!KiBugCheckDispatch+0x69
ffffa68b`3a8a05c0 fffff805`67662e3c : ffffd28f`20380370 ffffd28f`20380310 ffffa68b`3a8a07b9 fffff805`67722590 : nt!KiPageFault+0x469
ffffa68b`3a8a0750 fffff805`67661f4c : fffff805`67762800 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ExpAcquireResourceExclusiveLite+0x41c
ffffa68b`3a8a0820 ffff839b`4702754a : 00000000`00000000 00000000`00989680 00000000`00000001 ffffd28f`239d3eb0 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3c
ffffa68b`3a8a0860 ffff839b`47fba253 : 00000000`000186a0 00000000`00000000 00000000`00000000 ffffa68b`3a8a0aa8 : win32kbase!EnterCrit+0x8a
ffffa68b`3a8a0980 ffff839b`473c71ad : ffffd28f`23b9a080 00000000`0047e048 ffffa68b`3a8a0aa8 00000000`0035c000 : win32kfull!NtUserPeekMessage+0x113
ffffa68b`3a8a0a40 fffff805`678071b8 : 00000000`00000000 0000035d`005d45fd 00000000`000001cd 00000000`0001026a : win32k!NtUserPeekMessage+0x29
ffffa68b`3a8a0a90 00007ffa`ce5bff74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0047e028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ce5bff74
SYMBOL_NAME: win32kbase!EnterCrit+8a
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.662
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 8a
FAILURE_BUCKET_ID: AV_win32kbase!EnterCrit
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d56d29ce-2532-972b-bc6d-31106c6c0955}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000001, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8202
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 20437
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 1
TRAP_FRAME: 0000000000000000 -- (.trap 0x0)
EXCEPTION_RECORD: 0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff8183`ee261608 fffff803`68dfe28b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8183`ee261610 fffff803`68c71fcc : 00000000`00000000 ffffba81`e95961c8 000000bf`ab61f678 ffff726c`cab36d72 : nt!guard_icall_bugcheck+0x1b
ffff8183`ee261640 fffff803`68c70e63 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpmUpdatePerformanceFeedback+0x16c
ffff8183`ee2616f0 fffff803`68c70154 : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xb93
ffff8183`ee261af0 fffff803`68df92a4 : ffffffff`00000000 ffffba81`e95991c0 ffffe781`07df5080 00000000`000001f8 : nt!PoIdle+0x374
ffff8183`ee261c60 00000000`00000000 : ffff8183`ee262000 ffff8183`ee25c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!guard_icall_bugcheck+1b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1b
FAILURE_BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa787fade1250, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: ffffa787fade1250, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8842
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13084
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffa787fade1250
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: ffffa787fade1250
READ_ADDRESS: fffff805288fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8052880f330: Unable to get Flags value from nt!KdVersionBlock
fffff8052880f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa787fade1250
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffc0054e61240 -- (.trap 0xfffffc0054e61240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa787fade1250 rbx=0000000000000000 rcx=0000000001000000
rdx=000000000000082f rsi=0000000000000000 rdi=0000000000000000
rip=ffffa787fade1250 rsp=fffffc0054e613d8 rbp=fffffc0054e614d0
r8=fffffc0054e614e0 r9=000000000000002f r10=0000ffffa787fade
r11=ffffd4febd800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
ffffa787`fade1250 8811 mov byte ptr [rcx],dl ds:00000000`01000000=??
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
ffffa787`fade1250 8811 mov byte ptr [rcx],dl
STACK_TEXT:
fffffc00`54e610f8 fffff805`28007769 : 00000000`0000000a ffffa787`fade1250 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffffc00`54e61100 fffff805`28003a69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffc00`54e61240 ffffa787`fade1250 : fffff805`27ee8fe0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffffc00`54e613d8 fffff805`27ee8fe0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`36466efa : 0xffffa787`fade1250
fffffc00`54e613e0 fffff805`27e6e21d : 00000000`00000000 fffffc00`54e61510 fffffc00`54e61758 00000000`00000000 : nt!HalpApicRequestInterrupt+0x90
fffffc00`54e61450 fffff805`27e4b404 : ffffe501`00000000 ffffa787`00000000 ffffa787`fade1080 fffffc00`54e616fc : nt!HalpInterruptSendIpi+0xfd
fffffc00`54e616c0 fffff805`27e44c4d : 00000000`000081e6 fffffc00`54e61b10 00000000`00000080 ffffe501`8d18e180 : nt!KiDeferredReadySingleThread+0x8b4
fffffc00`54e618b0 fffff805`27e45030 : ffffe501`8d18e180 00000000`00000000 ffffa787`ff803100 00000000`00000000 : nt!KiReadyThread+0x4d
fffffc00`54e618e0 fffff805`27e06eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000081e6 : nt!KiProcessExpiredTimerList+0x290
fffffc00`54e619d0 fffff805`27ff92ee : ffffffff`00000000 ffffe501`8d18e180 ffffe501`8d1991c0 ffffa787`fc062080 : nt!KiRetireDpcList+0x5dd
fffffc00`54e61c60 00000000`00000000 : fffffc00`54e62000 fffffc00`54e5c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8025ea5d3a3, The address that the exception occurred at
Arg3: ffff8c0c92ac1698, Exception Record Address
Arg4: ffffb0800dde7920, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 6515
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6775
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8025ea5d3a3
BUGCHECK_P3: ffff8c0c92ac1698
BUGCHECK_P4: ffffb0800dde7920
EXCEPTION_RECORD: ffff8c0c92ac1698 -- (.exr 0xffff8c0c92ac1698)
ExceptionAddress: fffff8025ea5d3a3 (nt!MiTrimOrAgeWorkingSet+0x0000000000000763)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffb0800dde7920 -- (.cxr 0xffffb0800dde7920)
rax=f4840fc085d86348 rbx=ffffd50940a1f700 rcx=fffff8025eaa7557
rdx=f4840fc085d86348 rsi=fffff8025f44f580 rdi=0000000000000000
rip=fffff8025ea5d3a3 rsp=ffff8c0c92ac18d0 rbp=ffffd50940a1f7c0
r8=0000000000000000 r9=0000000000000400 r10=fffff8025f4045e8
r11=ffff92c964b25fff r12=0000000000014c4e r13=0000000000000000
r14=0000000000000002 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!MiTrimOrAgeWorkingSet+0x763:
fffff802`5ea5d3a3 488b00 mov rax,qword ptr [rax] ds:002b:f4840fc0`85d86348=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
READ_ADDRESS: fffff8025f4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8025f40f330: Unable to get Flags value from nt!KdVersionBlock
fffff8025f40f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
BAD_STACK_POINTER: ffffb0800dde70e8
STACK_TEXT:
ffff8c0c`92ac18d0 fffff802`5ea5c817 : 00000000`00000000 ffff8c0c`92ac1a80 ffff8c0c`92ac1a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x763
ffff8c0c`92ac19c0 fffff802`5ea40560 : fffff802`5f450b40 ffff8c0c`92ac1a80 00000000`00000425 fffff802`00000200 : nt!MiProcessWorkingSets+0x227
ffff8c0c`92ac1a60 fffff802`5ebb4e37 : 00000000`00000005 00000000`00000005 00000000`ffffffff fffff802`5cd1d180 : nt!MiWorkingSetManager+0x110
ffff8c0c`92ac1b20 fffff802`5eb17e25 : ffffd509`34f68080 00000000`00000080 fffff802`5ebb4ce0 77ce0539`48000ef7 : nt!KeBalanceSetManager+0x157
ffff8c0c`92ac1c10 fffff802`5ebfcdd8 : ffffb080`0dc92180 ffffd509`34f68080 fffff802`5eb17dd0 cccccccc`cccccccc : nt!PspSystemThreadStartup+0x55
ffff8c0c`92ac1c60 00000000`00000000 : ffff8c0c`92ac2000 ffff8c0c`92abc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiTrimOrAgeWorkingSet+763
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .cxr 0xffffb0800dde7920 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 763
FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!MiTrimOrAgeWorkingSet
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f2c5705f-f817-8197-d5fb-fbc2da0a4643}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.