Memory management hatası

İşletim sistemi
Windows 10

XMRT

Femtopat
Katılım
27 Ekim 2020
Mesajlar
7
Daha fazla  
Cinsiyet
Erkek
Yaklaşık 1 ay önce bilgisayarı topladım. Orijinal Windows kullanıyorum. Son 1 hafta öncesine kadar bir sıkıntı yoktu. Ancak biraz forumda gezince dandik driver yükleme programlarının buna sebep olduğu söylendi. Ben de en baştan format atıp elimle BIOS, chipset, ekran kartı ve ses kartını güncelledim. Temiz kurulum yaptım. Yine mavi ekran hatası aldım. (Belki önemli olabilir format atıp bilgisayar başlar başlamaz bir mavi ekran almıştım, daha sonra bios güncelleyince bir süre düzelmişti). Memory managment yazınca ben de Memtest64 ile 5 kere test ettim bir şey çıkmadı. Dosyayı ekliyorum yardımcı olacaklara çok teşekkür ederim şimdiden.

Ekleme: GTA5 çalıştırıyorum hiç bir sıkıntı yok. 1 gün bilgisayar açık kalıyor yine bir hata yok. Ama bir anda bilgisayar boştayken memory managment hatası alıyorum.

Minidump
 
Son düzenleme:
Kullandığınız RAM'lerin marka ve modeli nedir? Bellek testinde sorun çıkmaması bozuk olmadıkları anlamına gelmiyor. Çift kanal bellek kullanıyorsanız birini çıkarıp test ediniz. Tek kanal ise slot değiştiriniz.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 000000000000000d, Attempt to release quota on a corrupted pool allocation.
Arg2: ffff9d0ffaf02990, Address of pool
Arg3: 00000000ffff9d0f, Pool allocation's tag
Arg4: dff970ec95816abc, Quota process pointer (bad).

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7234

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16926

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  c2

BUGCHECK_P1: d

BUGCHECK_P2: ffff9d0ffaf02990

BUGCHECK_P3: ffff9d0f

BUGCHECK_P4: dff970ec95816abc

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
fffff402`86c30a28 fffff802`6d266e60     : 00000000`000000c2 00000000`0000000d ffff9d0f`faf02990 00000000`ffff9d0f : nt!KeBugCheckEx
fffff402`86c30a30 fffff802`6d7b1019     : 00000000`00000000 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x19fe20
fffff402`86c30b10 fffff802`6d5075a1     : fffff802`6db25440 ffff9d0f`f8f8a490 00000000`00000000 00000000`00000000 : nt!ExFreePool+0x9
fffff402`86c30b40 fffff802`6d1035f5     : ffff9d0f`f08e6040 ffff9d0f`eea8cce0 ffff9d0f`f8f8a1f0 ffff9d0f`f8f8a1f0 : nt!PfSnSectionInfoCleanupWorkItem+0x61
fffff402`86c30b70 fffff802`6d0a2ae5     : ffff9d0f`f08e6040 00000000`00000080 ffff9d0f`eea9f200 00000000`00000000 : nt!ExpWorkerThread+0x105
fffff402`86c30c10 fffff802`6d1fbbf8     : ffffaf00`4ab07180 ffff9d0f`f08e6040 fffff802`6d0a2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff402`86c30c60 00000000`00000000     : fffff402`86c31000 fffff402`86c2b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!PfSnSectionInfoCleanupWorkItem+61

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  61

FAILURE_BUCKET_ID:  0xc2_d_nt!PfSnSectionInfoCleanupWorkItem

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {296cfd8d-5abd-60db-7854-0f142056bcef}

Followup:     MachineOwner
---------*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000001025, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8052daedf40, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7358

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15352

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 1025

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8052daedf40

READ_ADDRESS: fffff8052c0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8052c00f340: Unable to get Flags value from nt!KdVersionBlock
fffff8052c00f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000001025

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffe600f20992a0 -- (.trap 0xffffe600f20992a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=6800a73b52110000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8052daedf40 rsp=ffffe600f2099430 rbp=0000000000000ffe
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=ffffe600f2099400 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
tcpip!TcpRetransmitTimeout+0x100:
fffff805`2daedf40 488b4d27        mov     rcx,qword ptr [rbp+27h] ss:0018:00000000`00001025=????????????????
Resetting default scope

STACK_TEXT: 
ffffe600`f2099158 fffff805`2b806569     : 00000000`0000000a 00000000`00001025 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe600`f2099160 fffff805`2b802869     : 00000000`00000001 fffff805`2b72d5b1 00000000`00000000 00000000`00000002 : nt!KiBugCheckDispatch+0x69
ffffe600`f20992a0 fffff805`2daedf40     : 00000000`676d20f8 00000000`00000200 ffff8a09`b5fee460 fffff780`00000008 : nt!KiPageFault+0x469
ffffe600`f2099430 fffff805`2daf03a6     : fffff780`00000008 ffff8a09`b5fee460 ffff8a09`b5fee460 fffff780`00000008 : tcpip!TcpRetransmitTimeout+0x100
ffffe600`f2099530 fffff805`2daee787     : 00000000`00000000 00000000`00989680 00000000`00000009 00000000`678eab36 : tcpip!TcpProcessExpiredTcbTimers+0x4e6
ffffe600`f2099640 fffff805`2b6e549e     : ffff9b01`cf503240 00000000`00000000 ffffe600`f2099b20 ffff9b01`cf500180 : tcpip!TcpPeriodicTimeoutHandler+0x3f7
ffffe600`f2099860 fffff805`2b6e4784     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffe600`f20999d0 fffff805`2b7f810e     : ffffffff`00000000 ffff9b01`cf500180 ffff9b01`cf50b340 ffff8a09`b633f040 : nt!KiRetireDpcList+0x1f4
ffffe600`f2099c60 00000000`00000000     : ffffe600`f209a000 ffffe600`f2094000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  tcpip!TcpRetransmitTimeout+100

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

IMAGE_VERSION:  10.0.19041.1124

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  100

FAILURE_BUCKET_ID:  AV_tcpip!TcpRetransmitTimeout

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f754d840-60d7-f804-f689-3ddd9703fad4}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff800692fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6906

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13991

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff800692fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffffce04e323e0f0 -- (.trap 0xffffce04e323e0f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000006c5ab7c9 rbx=0000000000000000 rcx=ffffce04e323e318
rdx=ffffe608fe34c4c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800688bee17 rsp=ffffce04e323e280 rbp=00000001e83bf7d0
 r8=ffffce04e323e500  r9=0000000000000001 r10=ffffe608fe34cd58
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff800`688bee17 4883c420        add     rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

BAD_STACK_POINTER:  ffffce04e323e280

STACK_TEXT: 
ffffcf80`26cd2e18 fffff800`68a87a98     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`692fb320 : nt!KeBugCheckEx
ffffcf80`26cd2e20 fffff800`68926993     : 00001811`c25a906a ffffcf80`26c80180 00000000`00000000 ffffcf80`26c80180 : nt!KeAccumulateTicks+0x15dda8
ffffcf80`26cd2e80 fffff800`6892647a     : ffffe608`f30cd040 ffffce04`e323e170 ffffce04`df4b5b00 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffffcf80`26cd2f30 fffff800`6882ecd5     : ffffe608`f30cd040 00000000`00000000 00000000`00000000 ffff80f9`0d9ed039 : nt!HalpTimerClockIpiRoutine+0x1a
ffffcf80`26cd2f60 fffff800`689f604a     : ffffce04`e323e170 ffffe608`f30cd040 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffcf80`26cd2fb0 fffff800`689f65b7     : 00000000`0000126c ffffcf80`268ea000 ffffe608`fe34c4c0 fffff800`689f65c4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffce04`e323e0f0 fffff800`688bee17     : ffffffff`ffffffd2 fffff800`688c603e 00000000`00000010 00000000`00000286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffce04`e323e280 fffff800`688c603a     : ffffcf80`00000000 ffffe608`fe34c4c0 00000000`00000006 ffffce04`08000808 : nt!KeYieldProcessorEx+0x17
ffffce04`e323e2b0 fffff800`689241bc     : ffffce04`e323e660 fffff800`688c5966 ffffcf80`26a40180 fffff800`68b1958e : nt!KiDeferredReadySingleThread+0xc3a
ffffce04`e323e4a0 fffff800`6885a191     : ffffe608`fe34c598 ffffe608`f3089040 00000000`00000000 00000000`0000018c : nt!KiReadyDeferredReadyList+0x3c
ffffce04`e323e4d0 fffff800`689fb54e     : 00000000`ffffffff 00000000`00000000 ffffcf80`26c80180 00000000`00000000 : nt!KiQueueReadyThread+0x361
ffffce04`e323e550 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxDispatchInterrupt+0x12e


SYMBOL_NAME:  nt!KeAccumulateTicks+15dda8

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  15dda8

FAILURE_BUCKET_ID:  0x133_ISR_STACKPTR_ERROR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29be0eb-3419-aa75-d38d-83d2e8ddbdc2}

Followup:     MachineOwner
---------*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffb879cbe14
Arg3: 000000000000001d
Arg4: fffffa8a4d4bbb00

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5250

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8788

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 7ffb879cbe14

BUGCHECK_P3: 1d

BUGCHECK_P4: fffffa8a4d4bbb00

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

STACK_TEXT: 
fffffa8a`4d4bb958 fffff800`6a073a20     : 00000000`0000001a 00000000`00061941 00007ffb`879cbe14 00000000`0000001d : nt!KeBugCheckEx
fffffa8a`4d4bb960 fffff800`6a00275e     : 000001a7`ceb89660 00000000`00000000 fffffa8a`4d4bbb18 ffffffff`fffe7960 : nt!MmAccessFault+0x189840
fffffa8a`4d4bbb00 00007ffb`879cbe14     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000089`1918f9e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`879cbe14


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8024a87a795, The address that the exception occurred at
Arg3: ffff83080fc97278, Exception Record Address
Arg4: ffff83080fc96ab0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 7936

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13319

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8024a87a795

BUGCHECK_P3: ffff83080fc97278

BUGCHECK_P4: ffff83080fc96ab0

EXCEPTION_RECORD:  ffff83080fc97278 -- (.exr 0xffff83080fc97278)
ExceptionAddress: fffff8024a87a795 (nt!IoIsOperationSynchronous+0x0000000000000015)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000050
Attempt to read from address 0000000000000050

CONTEXT:  ffff83080fc96ab0 -- (.cxr 0xffff83080fc96ab0)
rax=0000000000000000 rbx=ffff83080fc975d0 rcx=ffff870e56cec4c8
rdx=0000000000000000 rsi=0000000000060830 rdi=0000000000000000
rip=fffff8024a87a795 rsp=ffff83080fc974b8 rbp=0000000000000000
 r8=0000000000060830  r9=0000000000000564 r10=fffff8024a87a780
r11=ffff870e536190a0 r12=ffff870e56cec4c8 r13=0000000000000000
r14=ffff870e58c1c310 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!IoIsOperationSynchronous+0x15:
fffff802`4a87a795 f6425002        test    byte ptr [rdx+50h],2 ds:002b:00000000`00000050=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  drvinst.exe

READ_ADDRESS: fffff8024b2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8024b20f340: Unable to get Flags value from nt!KdVersionBlock
fffff8024b20f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000050

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000050

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffff8308`0fc974b8 fffff802`470e5bbb     : ffff8308`0fc975b1 fffff802`4a8caa71 ffff870e`58c1c310 00000000`00000000 : nt!IoIsOperationSynchronous+0x15
ffff8308`0fc974c0 fffff802`470e4b46     : ffff8308`0fc975d0 ffff870e`00000000 ffff870e`56cec050 ffff8308`0fc975e0 : FLTMGR!FltpPassThroughInternal+0x14b
ffff8308`0fc97510 fffff802`4711caaf     : 001f0003`ffff0001 00000000`00000000 00000000`000000e0 fffff802`4acefe11 : FLTMGR!FltpPassThrough+0x1d6
ffff8308`0fc975b0 fffff802`4a8cd805     : 00000000`0000000a ffff870e`56cec050 00000000`00000002 00000000`00000000 : FLTMGR!FltpFsControl+0xbf
ffff8308`0fc97610 fffff802`4acc2528     : ffff870e`56cec050 00000000`00000000 00000000`00000000 ffff870e`58351080 : nt!IofCallDriver+0x55
ffff8308`0fc97650 fffff802`4acc1df5     : 00000000`00090120 ffff8308`0fc97990 00000000`00440005 ffff8308`0fc97990 : nt!IopSynchronousServiceTail+0x1a8
ffff8308`0fc976f0 fffff802`4ac9a0f8     : 00000000`00000000 ffffffff`80001be0 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff8308`0fc97830 fffff802`4ae41b83     : ffff988b`9dfae150 ffffffff`800018f4 ffff8308`0fc979b1 ffff988b`9e4021e8 : nt!PfSnPrefetchFileMetadata+0xe8
ffff8308`0fc978d0 fffff802`4ad078b5     : 00000000`0000006c ffff8308`0fc97b00 ffff988b`9e44db58 ffff988b`00000000 : nt!PfSnGetSectionObject+0x13a04b
ffff8308`0fc97a00 fffff802`4a9035f5     : ffff870e`53b43040 ffff870e`53b43040 ffff870e`4ce98940 00000000`00000100 : nt!PfSnPopulateReadList+0x2b5
ffff8308`0fc97b70 fffff802`4a8a2ae5     : ffff870e`53b43040 00000000`00000080 ffff870e`4cea3040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8308`0fc97c10 fffff802`4a9fbbf8     : ffffaa00`d01e0180 ffff870e`53b43040 fffff802`4a8a2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8308`0fc97c60 00000000`00000000     : ffff8308`0fc98000 ffff8308`0fc92000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!IoIsOperationSynchronous+15

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffff83080fc96ab0 ; kb

BUCKET_ID_FUNC_OFFSET:  15

FAILURE_BUCKET_ID:  AV_nt!IoIsOperationSynchronous

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a2c8398f-561e-ba4f-ad91-3cdfd861b289}

Followup:     MachineOwner
---------
 
Kullandığınız RAM'lerin marka ve modeli nedir? Bellek testinde sorun çıkmaması bozuk olmadıkları anlamına gelmiyor. Çift kanal bellek kullanıyorsanız birini çıkarıp test ediniz. Tek kanal ise slot değiştiriniz.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 000000000000000d, Attempt to release quota on a corrupted pool allocation.
Arg2: ffff9d0ffaf02990, Address of pool
Arg3: 00000000ffff9d0f, Pool allocation's tag
Arg4: dff970ec95816abc, Quota process pointer (bad).

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7234

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16926

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  c2

BUGCHECK_P1: d

BUGCHECK_P2: ffff9d0ffaf02990

BUGCHECK_P3: ffff9d0f

BUGCHECK_P4: dff970ec95816abc

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
fffff402`86c30a28 fffff802`6d266e60     : 00000000`000000c2 00000000`0000000d ffff9d0f`faf02990 00000000`ffff9d0f : nt!KeBugCheckEx
fffff402`86c30a30 fffff802`6d7b1019     : 00000000`00000000 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x19fe20
fffff402`86c30b10 fffff802`6d5075a1     : fffff802`6db25440 ffff9d0f`f8f8a490 00000000`00000000 00000000`00000000 : nt!ExFreePool+0x9
fffff402`86c30b40 fffff802`6d1035f5     : ffff9d0f`f08e6040 ffff9d0f`eea8cce0 ffff9d0f`f8f8a1f0 ffff9d0f`f8f8a1f0 : nt!PfSnSectionInfoCleanupWorkItem+0x61
fffff402`86c30b70 fffff802`6d0a2ae5     : ffff9d0f`f08e6040 00000000`00000080 ffff9d0f`eea9f200 00000000`00000000 : nt!ExpWorkerThread+0x105
fffff402`86c30c10 fffff802`6d1fbbf8     : ffffaf00`4ab07180 ffff9d0f`f08e6040 fffff802`6d0a2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff402`86c30c60 00000000`00000000     : fffff402`86c31000 fffff402`86c2b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!PfSnSectionInfoCleanupWorkItem+61

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  61

FAILURE_BUCKET_ID:  0xc2_d_nt!PfSnSectionInfoCleanupWorkItem

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {296cfd8d-5abd-60db-7854-0f142056bcef}

Followup:     MachineOwner
---------*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000001025, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8052daedf40, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7358

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15352

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 1025

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8052daedf40

READ_ADDRESS: fffff8052c0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8052c00f340: Unable to get Flags value from nt!KdVersionBlock
fffff8052c00f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000001025

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffe600f20992a0 -- (.trap 0xffffe600f20992a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=6800a73b52110000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8052daedf40 rsp=ffffe600f2099430 rbp=0000000000000ffe
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=ffffe600f2099400 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
tcpip!TcpRetransmitTimeout+0x100:
fffff805`2daedf40 488b4d27        mov     rcx,qword ptr [rbp+27h] ss:0018:00000000`00001025=????????????????
Resetting default scope

STACK_TEXT:
ffffe600`f2099158 fffff805`2b806569     : 00000000`0000000a 00000000`00001025 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe600`f2099160 fffff805`2b802869     : 00000000`00000001 fffff805`2b72d5b1 00000000`00000000 00000000`00000002 : nt!KiBugCheckDispatch+0x69
ffffe600`f20992a0 fffff805`2daedf40     : 00000000`676d20f8 00000000`00000200 ffff8a09`b5fee460 fffff780`00000008 : nt!KiPageFault+0x469
ffffe600`f2099430 fffff805`2daf03a6     : fffff780`00000008 ffff8a09`b5fee460 ffff8a09`b5fee460 fffff780`00000008 : tcpip!TcpRetransmitTimeout+0x100
ffffe600`f2099530 fffff805`2daee787     : 00000000`00000000 00000000`00989680 00000000`00000009 00000000`678eab36 : tcpip!TcpProcessExpiredTcbTimers+0x4e6
ffffe600`f2099640 fffff805`2b6e549e     : ffff9b01`cf503240 00000000`00000000 ffffe600`f2099b20 ffff9b01`cf500180 : tcpip!TcpPeriodicTimeoutHandler+0x3f7
ffffe600`f2099860 fffff805`2b6e4784     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffe600`f20999d0 fffff805`2b7f810e     : ffffffff`00000000 ffff9b01`cf500180 ffff9b01`cf50b340 ffff8a09`b633f040 : nt!KiRetireDpcList+0x1f4
ffffe600`f2099c60 00000000`00000000     : ffffe600`f209a000 ffffe600`f2094000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  tcpip!TcpRetransmitTimeout+100

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

IMAGE_VERSION:  10.0.19041.1124

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  100

FAILURE_BUCKET_ID:  AV_tcpip!TcpRetransmitTimeout

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f754d840-60d7-f804-f689-3ddd9703fad4}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff800692fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6906

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13991

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff800692fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffffce04e323e0f0 -- (.trap 0xffffce04e323e0f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000006c5ab7c9 rbx=0000000000000000 rcx=ffffce04e323e318
rdx=ffffe608fe34c4c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800688bee17 rsp=ffffce04e323e280 rbp=00000001e83bf7d0
r8=ffffce04e323e500  r9=0000000000000001 r10=ffffe608fe34cd58
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff800`688bee17 4883c420        add     rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

BAD_STACK_POINTER:  ffffce04e323e280

STACK_TEXT:
ffffcf80`26cd2e18 fffff800`68a87a98     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`692fb320 : nt!KeBugCheckEx
ffffcf80`26cd2e20 fffff800`68926993     : 00001811`c25a906a ffffcf80`26c80180 00000000`00000000 ffffcf80`26c80180 : nt!KeAccumulateTicks+0x15dda8
ffffcf80`26cd2e80 fffff800`6892647a     : ffffe608`f30cd040 ffffce04`e323e170 ffffce04`df4b5b00 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffffcf80`26cd2f30 fffff800`6882ecd5     : ffffe608`f30cd040 00000000`00000000 00000000`00000000 ffff80f9`0d9ed039 : nt!HalpTimerClockIpiRoutine+0x1a
ffffcf80`26cd2f60 fffff800`689f604a     : ffffce04`e323e170 ffffe608`f30cd040 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffcf80`26cd2fb0 fffff800`689f65b7     : 00000000`0000126c ffffcf80`268ea000 ffffe608`fe34c4c0 fffff800`689f65c4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffce04`e323e0f0 fffff800`688bee17     : ffffffff`ffffffd2 fffff800`688c603e 00000000`00000010 00000000`00000286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffce04`e323e280 fffff800`688c603a     : ffffcf80`00000000 ffffe608`fe34c4c0 00000000`00000006 ffffce04`08000808 : nt!KeYieldProcessorEx+0x17
ffffce04`e323e2b0 fffff800`689241bc     : ffffce04`e323e660 fffff800`688c5966 ffffcf80`26a40180 fffff800`68b1958e : nt!KiDeferredReadySingleThread+0xc3a
ffffce04`e323e4a0 fffff800`6885a191     : ffffe608`fe34c598 ffffe608`f3089040 00000000`00000000 00000000`0000018c : nt!KiReadyDeferredReadyList+0x3c
ffffce04`e323e4d0 fffff800`689fb54e     : 00000000`ffffffff 00000000`00000000 ffffcf80`26c80180 00000000`00000000 : nt!KiQueueReadyThread+0x361
ffffce04`e323e550 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxDispatchInterrupt+0x12e


SYMBOL_NAME:  nt!KeAccumulateTicks+15dda8

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  15dda8

FAILURE_BUCKET_ID:  0x133_ISR_STACKPTR_ERROR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29be0eb-3419-aa75-d38d-83d2e8ddbdc2}

Followup:     MachineOwner
---------*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffb879cbe14
Arg3: 000000000000001d
Arg4: fffffa8a4d4bbb00

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5250

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8788

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 7ffb879cbe14

BUGCHECK_P3: 1d

BUGCHECK_P4: fffffa8a4d4bbb00

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

STACK_TEXT:
fffffa8a`4d4bb958 fffff800`6a073a20     : 00000000`0000001a 00000000`00061941 00007ffb`879cbe14 00000000`0000001d : nt!KeBugCheckEx
fffffa8a`4d4bb960 fffff800`6a00275e     : 000001a7`ceb89660 00000000`00000000 fffffa8a`4d4bbb18 ffffffff`fffe7960 : nt!MmAccessFault+0x189840
fffffa8a`4d4bbb00 00007ffb`879cbe14     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000089`1918f9e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`879cbe14


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8024a87a795, The address that the exception occurred at
Arg3: ffff83080fc97278, Exception Record Address
Arg4: ffff83080fc96ab0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 7936

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13319

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8024a87a795

BUGCHECK_P3: ffff83080fc97278

BUGCHECK_P4: ffff83080fc96ab0

EXCEPTION_RECORD:  ffff83080fc97278 -- (.exr 0xffff83080fc97278)
ExceptionAddress: fffff8024a87a795 (nt!IoIsOperationSynchronous+0x0000000000000015)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000050
Attempt to read from address 0000000000000050

CONTEXT:  ffff83080fc96ab0 -- (.cxr 0xffff83080fc96ab0)
rax=0000000000000000 rbx=ffff83080fc975d0 rcx=ffff870e56cec4c8
rdx=0000000000000000 rsi=0000000000060830 rdi=0000000000000000
rip=fffff8024a87a795 rsp=ffff83080fc974b8 rbp=0000000000000000
r8=0000000000060830  r9=0000000000000564 r10=fffff8024a87a780
r11=ffff870e536190a0 r12=ffff870e56cec4c8 r13=0000000000000000
r14=ffff870e58c1c310 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!IoIsOperationSynchronous+0x15:
fffff802`4a87a795 f6425002        test    byte ptr [rdx+50h],2 ds:002b:00000000`00000050=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  drvinst.exe

READ_ADDRESS: fffff8024b2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8024b20f340: Unable to get Flags value from nt!KdVersionBlock
fffff8024b20f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000050

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000050

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffff8308`0fc974b8 fffff802`470e5bbb     : ffff8308`0fc975b1 fffff802`4a8caa71 ffff870e`58c1c310 00000000`00000000 : nt!IoIsOperationSynchronous+0x15
ffff8308`0fc974c0 fffff802`470e4b46     : ffff8308`0fc975d0 ffff870e`00000000 ffff870e`56cec050 ffff8308`0fc975e0 : FLTMGR!FltpPassThroughInternal+0x14b
ffff8308`0fc97510 fffff802`4711caaf     : 001f0003`ffff0001 00000000`00000000 00000000`000000e0 fffff802`4acefe11 : FLTMGR!FltpPassThrough+0x1d6
ffff8308`0fc975b0 fffff802`4a8cd805     : 00000000`0000000a ffff870e`56cec050 00000000`00000002 00000000`00000000 : FLTMGR!FltpFsControl+0xbf
ffff8308`0fc97610 fffff802`4acc2528     : ffff870e`56cec050 00000000`00000000 00000000`00000000 ffff870e`58351080 : nt!IofCallDriver+0x55
ffff8308`0fc97650 fffff802`4acc1df5     : 00000000`00090120 ffff8308`0fc97990 00000000`00440005 ffff8308`0fc97990 : nt!IopSynchronousServiceTail+0x1a8
ffff8308`0fc976f0 fffff802`4ac9a0f8     : 00000000`00000000 ffffffff`80001be0 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff8308`0fc97830 fffff802`4ae41b83     : ffff988b`9dfae150 ffffffff`800018f4 ffff8308`0fc979b1 ffff988b`9e4021e8 : nt!PfSnPrefetchFileMetadata+0xe8
ffff8308`0fc978d0 fffff802`4ad078b5     : 00000000`0000006c ffff8308`0fc97b00 ffff988b`9e44db58 ffff988b`00000000 : nt!PfSnGetSectionObject+0x13a04b
ffff8308`0fc97a00 fffff802`4a9035f5     : ffff870e`53b43040 ffff870e`53b43040 ffff870e`4ce98940 00000000`00000100 : nt!PfSnPopulateReadList+0x2b5
ffff8308`0fc97b70 fffff802`4a8a2ae5     : ffff870e`53b43040 00000000`00000080 ffff870e`4cea3040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8308`0fc97c10 fffff802`4a9fbbf8     : ffffaa00`d01e0180 ffff870e`53b43040 fffff802`4a8a2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8308`0fc97c60 00000000`00000000     : ffff8308`0fc98000 ffff8308`0fc92000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!IoIsOperationSynchronous+15

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffff83080fc96ab0 ; kb

BUCKET_ID_FUNC_OFFSET:  15

FAILURE_BUCKET_ID:  AV_nt!IoIsOperationSynchronous

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a2c8398f-561e-ba4f-ad91-3cdfd861b289}

Followup:     MachineOwner
---------
G.Skill RipjawsV 32GB (2x16GB) 3200MHz DDR4 Ram F4-3200C16D-32GVK Kullanıyorum hocam. Hemen teker teker test ediyorum. Memtest64 iyi bir test etme aracı mıdır? Yine onunla mı test edeyim?
 

Geri
Yukarı