Mavi ekran hatası

İşletim sistemi
Windows 10
Dosyayı herkese açık olacak şekilde paylaşın. Yapamazsanız MediaFire'ye yükleyin.

Ek Açıklama 2020-07-29 131407.png

Ek Açıklama 2020-07-29 131454.png
 
  • BIOS'unuz güncel değil, güncelleyin.
  • MemTest86 yaparsanız iyi olur.
  • Komut ekranını yönetici olarak çalıştırın ve sfc /scannow komutunu uygulayın. Ekranda görünen sonucu burayla paylaşın.
Kod:
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ff840a4c034, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffff58489efbb80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6358

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9005

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1

BUGCHECK_P1: 7ff840a4c034

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: fffff58489efbb80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

STACK_TEXT: 
fffff584`89efb9b8 fffff805`47407769     : 00000000`00000001 00007ff8`40a4c034 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
fffff584`89efb9c0 fffff805`47407633     : 000001a4`fcafe3c0 00000000`00000000 fffff584`89efbb18 ffffffff`fffe7960 : nt!KiBugCheckDispatch+0x69
fffff584`89efbb00 00007ff8`40a4c034     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000090`6c6bfcb8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`40a4c034


SYMBOL_NAME:  nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1fe

FAILURE_BUCKET_ID:  0x1_SysCallNum_4_nt!KiSystemServiceExitPico

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {52cd694c-15ec-48c3-924a-3539560711db}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80567662e3c, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9249

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10552

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80567662e3c

READ_ADDRESS: fffff805680fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8056800f330: Unable to get Flags value from nt!KdVersionBlock
fffff8056800f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000008

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

TRAP_FRAME:  ffffa68b3a8a05c0 -- (.trap 0xffffa68b3a8a05c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd28f22814c00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80567662e3c rsp=ffffa68b3a8a0750 rbp=ffffa68b3a8a07b9
 r8=0000000000000000  r9=0000000000000001 r10=ffffd28f22814b90
r11=ffffd28f20380310 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!ExpAcquireResourceExclusiveLite+0x41c:
fffff805`67662e3c 8b4708          mov     eax,dword ptr [rdi+8] ds:00000000`00000008=????????
Resetting default scope

STACK_TEXT: 
ffffa68b`3a8a0478 fffff805`67807769     : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa68b`3a8a0480 fffff805`67803a69     : 00000000`00000000 ffffa68b`3a8a0671 ffffd28f`23b9a080 fffff805`67664623 : nt!KiBugCheckDispatch+0x69
ffffa68b`3a8a05c0 fffff805`67662e3c     : ffffd28f`20380370 ffffd28f`20380310 ffffa68b`3a8a07b9 fffff805`67722590 : nt!KiPageFault+0x469
ffffa68b`3a8a0750 fffff805`67661f4c     : fffff805`67762800 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ExpAcquireResourceExclusiveLite+0x41c
ffffa68b`3a8a0820 ffff839b`4702754a     : 00000000`00000000 00000000`00989680 00000000`00000001 ffffd28f`239d3eb0 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3c
ffffa68b`3a8a0860 ffff839b`47fba253     : 00000000`000186a0 00000000`00000000 00000000`00000000 ffffa68b`3a8a0aa8 : win32kbase!EnterCrit+0x8a
ffffa68b`3a8a0980 ffff839b`473c71ad     : ffffd28f`23b9a080 00000000`0047e048 ffffa68b`3a8a0aa8 00000000`0035c000 : win32kfull!NtUserPeekMessage+0x113
ffffa68b`3a8a0a40 fffff805`678071b8     : 00000000`00000000 0000035d`005d45fd 00000000`000001cd 00000000`0001026a : win32k!NtUserPeekMessage+0x29
ffffa68b`3a8a0a90 00007ffa`ce5bff74     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0047e028 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ce5bff74


SYMBOL_NAME:  win32kbase!EnterCrit+8a

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  8a

FAILURE_BUCKET_ID:  AV_win32kbase!EnterCrit

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d56d29ce-2532-972b-bc6d-31106c6c0955}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000001, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8202

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 20437

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

TRAP_FRAME:  0000000000000000 -- (.trap 0x0)

EXCEPTION_RECORD:  0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffff8183`ee261608 fffff803`68dfe28b     : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8183`ee261610 fffff803`68c71fcc     : 00000000`00000000 ffffba81`e95961c8 000000bf`ab61f678 ffff726c`cab36d72 : nt!guard_icall_bugcheck+0x1b
ffff8183`ee261640 fffff803`68c70e63     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpmUpdatePerformanceFeedback+0x16c
ffff8183`ee2616f0 fffff803`68c70154     : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xb93
ffff8183`ee261af0 fffff803`68df92a4     : ffffffff`00000000 ffffba81`e95991c0 ffffe781`07df5080 00000000`000001f8 : nt!PoIdle+0x374
ffff8183`ee261c60 00000000`00000000     : ffff8183`ee262000 ffff8183`ee25c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!guard_icall_bugcheck+1b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1b

FAILURE_BUCKET_ID:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa787fade1250, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: ffffa787fade1250, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8842

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13084

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffa787fade1250

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: ffffa787fade1250

READ_ADDRESS: fffff805288fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8052880f330: Unable to get Flags value from nt!KdVersionBlock
fffff8052880f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffa787fade1250

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffffc0054e61240 -- (.trap 0xfffffc0054e61240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa787fade1250 rbx=0000000000000000 rcx=0000000001000000
rdx=000000000000082f rsi=0000000000000000 rdi=0000000000000000
rip=ffffa787fade1250 rsp=fffffc0054e613d8 rbp=fffffc0054e614d0
 r8=fffffc0054e614e0  r9=000000000000002f r10=0000ffffa787fade
r11=ffffd4febd800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
ffffa787`fade1250 8811            mov     byte ptr [rcx],dl ds:00000000`01000000=??
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
ffffa787`fade1250 8811            mov     byte ptr [rcx],dl

STACK_TEXT: 
fffffc00`54e610f8 fffff805`28007769     : 00000000`0000000a ffffa787`fade1250 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffffc00`54e61100 fffff805`28003a69     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffc00`54e61240 ffffa787`fade1250     : fffff805`27ee8fe0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffffc00`54e613d8 fffff805`27ee8fe0     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`36466efa : 0xffffa787`fade1250
fffffc00`54e613e0 fffff805`27e6e21d     : 00000000`00000000 fffffc00`54e61510 fffffc00`54e61758 00000000`00000000 : nt!HalpApicRequestInterrupt+0x90
fffffc00`54e61450 fffff805`27e4b404     : ffffe501`00000000 ffffa787`00000000 ffffa787`fade1080 fffffc00`54e616fc : nt!HalpInterruptSendIpi+0xfd
fffffc00`54e616c0 fffff805`27e44c4d     : 00000000`000081e6 fffffc00`54e61b10 00000000`00000080 ffffe501`8d18e180 : nt!KiDeferredReadySingleThread+0x8b4
fffffc00`54e618b0 fffff805`27e45030     : ffffe501`8d18e180 00000000`00000000 ffffa787`ff803100 00000000`00000000 : nt!KiReadyThread+0x4d
fffffc00`54e618e0 fffff805`27e06eed     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000081e6 : nt!KiProcessExpiredTimerList+0x290
fffffc00`54e619d0 fffff805`27ff92ee     : ffffffff`00000000 ffffe501`8d18e180 ffffe501`8d1991c0 ffffa787`fc062080 : nt!KiRetireDpcList+0x5dd
fffffc00`54e61c60 00000000`00000000     : fffffc00`54e62000 fffffc00`54e5c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8025ea5d3a3, The address that the exception occurred at
Arg3: ffff8c0c92ac1698, Exception Record Address
Arg4: ffffb0800dde7920, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 6515

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6775

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8025ea5d3a3

BUGCHECK_P3: ffff8c0c92ac1698

BUGCHECK_P4: ffffb0800dde7920

EXCEPTION_RECORD:  ffff8c0c92ac1698 -- (.exr 0xffff8c0c92ac1698)
ExceptionAddress: fffff8025ea5d3a3 (nt!MiTrimOrAgeWorkingSet+0x0000000000000763)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffb0800dde7920 -- (.cxr 0xffffb0800dde7920)
rax=f4840fc085d86348 rbx=ffffd50940a1f700 rcx=fffff8025eaa7557
rdx=f4840fc085d86348 rsi=fffff8025f44f580 rdi=0000000000000000
rip=fffff8025ea5d3a3 rsp=ffff8c0c92ac18d0 rbp=ffffd50940a1f7c0
 r8=0000000000000000  r9=0000000000000400 r10=fffff8025f4045e8
r11=ffff92c964b25fff r12=0000000000014c4e r13=0000000000000000
r14=0000000000000002 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nt!MiTrimOrAgeWorkingSet+0x763:
fffff802`5ea5d3a3 488b00          mov     rax,qword ptr [rax] ds:002b:f4840fc0`85d86348=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

READ_ADDRESS: fffff8025f4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8025f40f330: Unable to get Flags value from nt!KdVersionBlock
fffff8025f40f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

EXCEPTION_STR:  0xc0000005

BAD_STACK_POINTER:  ffffb0800dde70e8

STACK_TEXT: 
ffff8c0c`92ac18d0 fffff802`5ea5c817     : 00000000`00000000 ffff8c0c`92ac1a80 ffff8c0c`92ac1a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x763
ffff8c0c`92ac19c0 fffff802`5ea40560     : fffff802`5f450b40 ffff8c0c`92ac1a80 00000000`00000425 fffff802`00000200 : nt!MiProcessWorkingSets+0x227
ffff8c0c`92ac1a60 fffff802`5ebb4e37     : 00000000`00000005 00000000`00000005 00000000`ffffffff fffff802`5cd1d180 : nt!MiWorkingSetManager+0x110
ffff8c0c`92ac1b20 fffff802`5eb17e25     : ffffd509`34f68080 00000000`00000080 fffff802`5ebb4ce0 77ce0539`48000ef7 : nt!KeBalanceSetManager+0x157
ffff8c0c`92ac1c10 fffff802`5ebfcdd8     : ffffb080`0dc92180 ffffd509`34f68080 fffff802`5eb17dd0 cccccccc`cccccccc : nt!PspSystemThreadStartup+0x55
ffff8c0c`92ac1c60 00000000`00000000     : ffff8c0c`92ac2000 ffff8c0c`92abc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiTrimOrAgeWorkingSet+763

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .cxr 0xffffb0800dde7920 ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  763

FAILURE_BUCKET_ID:  AV_STACKPTR_ERROR_nt!MiTrimOrAgeWorkingSet

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f2c5705f-f817-8197-d5fb-fbc2da0a4643}

Followup:     MachineOwner
---------

Harici bir yazıcı kullanıyor musunuz? Ayrıca HDD/SSD'niz nedir?
 

Geri
Yukarı