Kazimdlmenk
Picopat
- Katılım
- 2 Kasım 2020
- Mesajlar
- 82
- Çözümler
- 1
Daha fazla
- Cinsiyet
- Erkek
Windows 10 Auto Installation olanı indir. RAR şeklinde inecektir, inen RAR'ın içindeki klasörü masaüstüne at. Klasörü açıp setup.exe'yi çalıştır.
Kurdum attığın şeyi.
İnternet şeyi bu kurduğun şey zaten. Mavi ekran sorunun devam ederse yeni oluşan dosyaları atarsın.
Ağ kartı sürücünü güncelledin diye performansın düşeceğini sanmıyorum. Performansın düşmesiyle ilgili başka bir konu açabilirsin. Mavi ekran almaya devam ediyor musun?bilgisayarımın performansı bayya düştü neden olabilir .
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80430248799, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4405
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16782
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80430248799
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff80430cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80430c0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80430c0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
BAD_STACK_POINTER: ffffbb81b2121158
STACK_TEXT:
ffffbb81`b2121158 fffff804`304f4b0e : 00000000`0000001e ffffffff`c0000005 fffff804`30248799 00000000`00000000 : nt!KeBugCheckEx
ffffbb81`b2121160 fffff804`303fe642 : fffff804`304f4aec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffbb81`b21211a0 fffff804`3032bf97 : ffffbb81`b2121710 00000000`00000000 fffffa87`a308bc60 fffff804`303f92ee : nt!RtlpExecuteHandlerForException+0x12
ffffbb81`b21211d0 fffff804`3032ab86 : fffffa87`a308b508 ffffbb81`b2121e20 fffffa87`a308b508 fff7e385`de373968 : nt!RtlDispatchException+0x297
ffffbb81`b21218f0 fffff804`303f6612 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffbb81`b2121fb0 fffff804`303f65e0 : fffff804`304078a5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffa87`a308b3c8 fffff804`304078a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffa87`a308b3d0 fffff804`304035e0 : 00000000`00000000 fffff804`303089f3 ffffe385`d606b7c0 fffffa87`a308b6ac : nt!KiExceptionDispatch+0x125
fffffa87`a308b5b0 fffff804`30248799 : 00000004`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
fffffa87`a308b740 fffff804`30248727 : 00000000`00000001 ffffbb81`b2101102 fffff804`30c248a0 ffffe385`d9e37080 : nt!IopfCompleteRequest+0x59
fffffa87`a308b830 fffff804`3c6577a9 : 00000000`00000000 ffffe385`de3737c0 00000000`00000000 ffffe385`00000002 : nt!IofCompleteRequest+0x17
fffffa87`a308b860 fffff804`3c65884e : 00000000`00000004 ffffe385`d1982800 ffffbb81`b2101180 fffffa87`a308bb10 : afd!AfdCompletePollIrp+0x9d
fffffa87`a308b8b0 fffff804`30244f12 : ffffe385`d1982840 ffffbb81`b2101180 ffffbb81`b2101180 00000000`00000002 : afd!AfdTimeoutPoll+0x2e
fffffa87`a308b8e0 fffff804`30206eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00083141 : nt!KiProcessExpiredTimerList+0x172
fffffa87`a308b9d0 fffff804`303f92ee : ffffffff`00000000 ffffbb81`b2101180 ffffbb81`b210c340 ffffe385`d6ba6080 : nt!KiRetireDpcList+0x5dd
fffffa87`a308bc60 00000000`00000000 : fffffa87`a308c000 fffffa87`a3086000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: afd!AfdCompletePollIrp+9d
MODULE_NAME: afd
IMAGE_NAME: afd.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9d
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee}
Followup: MachineOwner
---------
8: kd> lmvm afd
Browse full module list
start end module name
fffff804`3c600000 fffff804`3c6a3000 afd # (pdb symbols) C:\ProgramData\Dbg\sym\afd.pdb\92BCCD248D3505B26C05ADECC513503E1\afd.pdb
Loaded symbol image file: afd.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\afd.sys\CC0C9B73a3000\afd.sys
Image path: \SystemRoot\system32\drivers\afd.sys
Image name: afd.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: CC0C9B73 (This is a reproducible build file hash, not a timestamp)
CheckSum: 000A334A
ImageSize: 000A3000
File version: 10.0.19041.508
Product version: 10.0.19041.508
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: afd.sys
OriginalFilename: afd.sys
ProductVersion: 10.0.19041.508
FileVersion: 10.0.19041.508 (WinBuild.160101.0800)
FileDescription: Ancillary Function Driver for WinSock
LegalCopyright: © Microsoft Corporation. All rights reserved.
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801114c2f09, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3999
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6072
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff801114c2f09
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff80111efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80111e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80111e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
BAD_STACK_POINTER: ffffb900a4521158
STACK_TEXT:
ffffb900`a4521158 fffff801`116f451e : 00000000`0000001e ffffffff`c0000005 fffff801`114c2f09 00000000`00000000 : nt!KeBugCheckEx
ffffb900`a4521160 fffff801`115fe0d2 : fffff801`116f44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffb900`a45211a0 fffff801`11452db7 : ffffb900`a4521710 00000000`00000000 fffff48f`0628bc60 fffff801`115f8d7e : nt!RtlpExecuteHandlerForException+0x12
ffffb900`a45211d0 fffff801`114519a6 : fffff48f`0628b508 ffffb900`a4521e20 fffff48f`0628b508 fff7ca08`70243fa8 : nt!RtlDispatchException+0x297
ffffb900`a45218f0 fffff801`115f60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffb900`a4521fb0 fffff801`115f6070 : fffff801`116072a5 00000000`00008206 ffffb900`a45091c8 00000000`00008de3 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff48f`0628b3c8 fffff801`116072a5 : 00000000`00008206 ffffb900`a45091c8 00000000`00008de3 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff48f`0628b3d0 fffff801`11602fe0 : 00000000`00000000 ffffb900`a4501180 00000000`00000fff fffff48f`0628b6ac : nt!KiExceptionDispatch+0x125
fffff48f`0628b5b0 fffff801`114c2f09 : 00000004`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
fffff48f`0628b740 fffff801`114c2e97 : 00000000`00000001 ffffb900`a4501102 00000000`00000003 ffffca08`6b1cf080 : nt!IopfCompleteRequest+0x59
fffff48f`0628b830 fffff801`1ec577a9 : 00000000`00000000 ffffca08`70243e00 00000000`00000000 ffffca08`6d680080 : nt!IofCompleteRequest+0x17
fffff48f`0628b860 fffff801`1ec5884e : 00000000`00000002 ffffca08`6c285de0 ffffb900`a4501180 fffff48f`0628bb10 : afd!AfdCompletePollIrp+0x9d
fffff48f`0628b8b0 fffff801`114bf682 : ffffca08`6c285e20 ffffb900`a4501180 ffffb900`a4501180 00000000`00000002 : afd!AfdTimeoutPoll+0x2e
fffff48f`0628b8e0 fffff801`114e4a2d : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0003d9e3 : nt!KiProcessExpiredTimerList+0x172
fffff48f`0628b9d0 fffff801`115f8d7e : ffffffff`00000000 ffffb900`a4501180 ffffb900`a450c340 ffffca08`647a2080 : nt!KiRetireDpcList+0x5dd
fffff48f`0628bc60 00000000`00000000 : fffff48f`0628c000 fffff48f`06286000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: afd!AfdCompletePollIrp+9d
MODULE_NAME: afd
IMAGE_NAME: afd.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9d
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff8796b50ba351, Address of the instruction which caused the bugcheck
Arg3: fffffd8a2b8d7d20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5608
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6659
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff8796b50ba351
BUGCHECK_P3: fffffd8a2b8d7d20
BUGCHECK_P4: 0
CONTEXT: fffffd8a2b8d7d20 -- (.cxr 0xfffffd8a2b8d7d20)
rax=000000007fff386a rbx=ffff87b6c47dd1e0 rcx=fff787b6c47c9660
rdx=0000000000000000 rsi=ffff87b6c47dc8c8 rdi=0000000000000200
rip=ffff8796b50ba351 rsp=fffffd8a2b8d8720 rbp=ffff87b6c47dd228
r8=0000000000000000 r9=0000000000000000 r10=ffff8796b5af0070
r11=ffffe78207c97750 r12=0000000000000064 r13=0000000000000064
r14=ffff87b6c47dd214 r15=ffff87b6c47dd210
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
win32kfull!TimersProc+0x1e1:
ffff8796`b50ba351 488b91a0010000 mov rdx,qword ptr [rcx+1A0h] ds:002b:fff787b6`c47c9800=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
fffffd8a`2b8d8720 ffff8796`b50b9e56 : 00000000`0000000f 00000000`053e856c 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x1e1
fffffd8a`2b8d87b0 ffff8796`b5b1ae33 : ffffe782`14867080 ffffe782`14867080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
fffffd8a`2b8d8970 ffff8796`b5058d20 : ffffe782`14867080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
fffffd8a`2b8d8aa0 ffff8796`b4eb474d : ffffe782`14867080 ffffe782`14867080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
fffffd8a`2b8d8ad0 fffff805`6e206bb8 : ffffe782`00000005 00000000`00000005 000001bc`71c04060 00000000`00001620 : win32k!NtUserCallNoParam+0x15
fffffd8a`2b8d8b00 00007fff`2e5b10e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b4`a89ff918 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2e5b10e4
SYMBOL_NAME: win32kfull!TimersProc+1e1
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.631
STACK_COMMAND: .cxr 0xfffffd8a2b8d7d20 ; kb
BUCKET_ID_FUNC_OFFSET: 1e1
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8042c7fd147, The address that the exception occurred at
Arg3: ffffc101570bb8d8, Exception Record Address
Arg4: ffffc101570bb110, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 6968
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10314
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8042c7fd147
BUGCHECK_P3: ffffc101570bb8d8
BUGCHECK_P4: ffffc101570bb110
EXCEPTION_RECORD: ffffc101570bb8d8 -- (.exr 0xffffc101570bb8d8)
ExceptionAddress: fffff8042c7fd147 (nt!ExpInterlockedPopEntrySListFault)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffc101570bb110 -- (.cxr 0xffffc101570bb110)
rax=0000000006790001 rbx=fffffd0000016030 rcx=fffffd0000016030
rdx=fff7c10156dc6ff0 rsi=0000000000000000 rdi=fffff8042d050c00
rip=fffff8042c7fd147 rsp=ffffc101570bbb10 rbp=0000000000000001
r8=fff7c10156dc6ff0 r9=0000000000000010 r10=fffffd0000016030
r11=fffff80432211a70 r12=0000000000000000 r13=ffffffffffffffe0
r14=0000000000000001 r15=0000000000000001
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!ExpInterlockedPopEntrySListFault:
fffff804`2c7fd147 498b08 mov rcx,qword ptr [r8] ds:002b:fff7c101`56dc6ff0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8042d0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8042d00f340: Unable to get Flags value from nt!KdVersionBlock
fffff8042d00f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffc101`570bbb10 fffff804`2c60da64 : ffff8c23`00000001 00000000`00000000 ffffc101`570bbc10 ffffc101`570bbbb0 : nt!ExpInterlockedPopEntrySListFault
ffffc101`570bbb20 fffff804`2c60d6fa : 00000000`00000012 00000000`00000004 00000000`0003d000 fffff804`2c6bc2e3 : nt!MmCreateKernelStack+0x104
ffffc101`570bbbc0 fffff804`2c60d5c2 : fffff804`3221f9b0 ffffc101`570bbdb8 ffffc101`570bbf04 ffffb089`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0xca
ffffc101`570bbc60 fffff804`2c60d423 : ffffc101`570bbf00 00000000`00000002 00000000`00000000 ffffb089`24025030 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2
ffffc101`570bbcd0 fffff804`2c60d3dd : fffff804`3221f9b0 ffffc101`570bbdb8 ffffb089`298ce538 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x33
ffffc101`570bbd40 fffff804`32208380 : ffffb089`298ce538 fffff804`32207ed5 ffffb089`298ce504 ffffb089`2d9f1460 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffc101`570bbd80 fffff804`32206d71 : ffffc101`570bbe40 ffffc50a`f50f1170 ffffb089`298ce538 00000000`00100000 : Ntfs!NtfsMultipleAsync+0x140
ffffc101`570bbe00 fffff804`32213b67 : 00000000`00000000 ffffc50a`f50f1200 00000000`00000000 00000000`00000000 : Ntfs!NtfsNonCachedIo+0x431
ffffc101`570bc0c0 fffff804`32212de3 : ffffb089`298ce538 ffffb089`2d9f1460 ffffc101`570bc360 00000000`00000000 : Ntfs!NtfsCommonWrite+0xb07
ffffc101`570bc2f0 fffff804`2c6cd6c5 : ffffb089`27e2ea20 ffffb089`2d9f1460 ffffb089`2d9f1460 ffffb089`21f1fd60 : Ntfs!NtfsFsdWrite+0x1d3
ffffc101`570bc3c0 fffff804`2bf26ccf : 00000000`00000768 33333333`00000000 ffffb089`27e3d510 fffff804`2c6c8cfc : nt!IofCallDriver+0x55
ffffc101`570bc400 fffff804`2bf248d3 : ffffc101`570bc490 ffffb089`2ec1d010 00000000`00000140 00000000`00000768 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffc101`570bc470 fffff804`2c6cd6c5 : ffffb089`2d9f1460 fffff804`2c6cd707 00000000`0000000c 00000000`00000004 : FLTMGR!FltpDispatch+0xa3
ffffc101`570bc4d0 fffff804`2c71a1df : ffffb089`2ec1d010 ffffb089`2d9f1460 ffffb089`2f261c80 ffffc101`570bc590 : nt!IofCallDriver+0x55
ffffc101`570bc510 fffff804`2c68b590 : 00000000`00000000 ffffc101`570bc5b0 ffffb089`2f261c80 fffff804`2c71dc5d : nt!IoSynchronousPageWriteEx+0x13b
ffffc101`570bc550 fffff804`2c6f7ae2 : 00000000`00000011 ffffc50a`eceb8000 00000000`00100000 fffffa00`00592410 : nt!MiIssueSynchronousFlush+0x70
ffffc101`570bc5d0 fffff804`2c70d391 : ffffc101`546c3a88 ffffc101`546c3a88 00000000`00000000 00000000`00000000 : nt!MiFlushSectionInternal+0x862
ffffc101`570bc8a0 fffff804`2c70a08a : 00000000`0045c70c ffffb089`28d8c040 00000000`00100000 00000000`00100000 : nt!MmFlushSection+0xbd
ffffc101`570bc950 fffff804`2c70ab74 : ffffb089`2f6335f8 00000000`00000000 00000000`00000001 00000000`00000000 : nt!CcFlushCachePriv+0x42a
ffffc101`570bca90 fffff804`2c7034b5 : ffffb089`2966b5f0 fffff804`2ca12300 ffffb089`1e66ca01 ffffb089`00000000 : nt!CcWriteBehindInternal+0x1f4
ffffc101`570bcb70 fffff804`2c6a29a5 : ffffb089`28d8c040 00000000`00000080 ffffb089`1e686040 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffc101`570bcc10 fffff804`2c7fc868 : ffff9b80`0ff40180 ffffb089`28d8c040 fffff804`2c6a2950 00000000`0394bae0 : nt!PspSystemThreadStartup+0x55
ffffc101`570bcc60 00000000`00000000 : ffffc101`570bd000 ffffc101`570b7000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MmCreateKernelStack+104
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .cxr 0xffffc101570bb110 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 104
FAILURE_BUCKET_ID: AV_nt!MmCreateKernelStack
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c83a01d5-aa3b-3796-2ad9-7e419fd13a54}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80767ccd612, Address of the instruction which caused the bugcheck
Arg3: ffff850e1f0eced0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5015
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6529
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80767ccd612
BUGCHECK_P3: ffff850e1f0eced0
BUGCHECK_P4: 0
CONTEXT: ffff850e1f0eced0 -- (.cxr 0xffff850e1f0eced0)
rax=fff7c08fc9fb7a70 rbx=0000000000222017 rcx=ffffc08fd64c3e30
rdx=ffff850e1f0eda30 rsi=0000000000040000 rdi=ffffc08fd64c3e30
rip=fffff80767ccd612 rsp=ffff850e1f0ed8d8 rbp=ffff850e1f0edb80
r8=0000000000000000 r9=ffff850e1f0eda40 r10=0000000000000000
r11=ffffe70528354b80 r12=0000000000000000 r13=0000000000000003
r14=ffffc08fd64c3e80 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!IoGetRelatedDeviceObject+0x42:
fffff807`67ccd612 488b4038 mov rax,qword ptr [rax+38h] ds:002b:fff7c08f`c9fb7aa8=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: audiodg.exe
STACK_TEXT:
ffff850e`1f0ed8d8 fffff807`680c1acb : 00000000`00222017 00000000`00000000 00000000`00000000 ffffc08f`d64c3e30 : nt!IoGetRelatedDeviceObject+0x42
ffff850e`1f0ed8e0 fffff807`680c17f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x2bb
ffff850e`1f0eda20 fffff807`67e06bb8 : 00000000`00000000 ffff850e`1f0edb80 ffff850e`1f0edaa8 ffffc08f`d32f71f0 : nt!NtDeviceIoControlFile+0x56
ffff850e`1f0eda90 00007ffe`c32cbe84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000027`b7c7fa88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c32cbe84
SYMBOL_NAME: nt!IopXxxControlFile+2bb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .cxr 0xffff850e1f0eced0 ; kb
BUCKET_ID_FUNC_OFFSET: 2bb
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopXxxControlFile
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {657bb511-7f5c-7ddc-acd3-e126b6d359c8}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800278cd0d6, The address that the exception occurred at
Arg3: ffffd5032a33ef38, Exception Record Address
Arg4: ffff9901c08d2920, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 3655
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5793
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff800278cd0d6
BUGCHECK_P3: ffffd5032a33ef38
BUGCHECK_P4: ffff9901c08d2920
EXCEPTION_RECORD: ffffd5032a33ef38 -- (.exr 0xffffd5032a33ef38)
ExceptionAddress: fffff800278cd0d6 (nt!ExpAddTagForBigPages+0x0000000000000106)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffff9901c08d2920 -- (.cxr 0xffff9901c08d2920)
rax=0000000000030000 rbx=00002d22d6751c77 rcx=fff7c48f5743ab28
rdx=fff7c48f57410000 rsi=0000000000000000 rdi=ffffc48f5e4cb000
rip=fffff800278cd0d6 rsp=ffffd5032a33f170 rbp=ffffd5032a33f2c1
r8=fff7c48f5743ab28 r9=fffff80028323100 r10=0000000000010000
r11=fff7c48f57590000 r12=00002d22d6753155 r13=0000000000000600
r14=0000000000000000 r15=0000000000000002
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00250206
nt!ExpAddTagForBigPages+0x106:
fffff800`278cd0d6 488b01 mov rax,qword ptr [rcx] ds:002b:fff7c48f`5743ab28=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: League of Legends.exe
READ_ADDRESS: fffff800282fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8002820f340: Unable to get Flags value from nt!KdVersionBlock
fffff8002820f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
BAD_STACK_POINTER: ffff9901c08d20e8
STACK_TEXT:
ffffd503`2a33f170 fffff800`278cadd0 : ffffc48f`5e4cb000 00000000`73576d4d 00000000`00001000 00000000`00000600 : nt!ExpAddTagForBigPages+0x106
ffffd503`2a33f1e0 fffff800`278ca64f : 000001ce`32423fff 00000000`00000003 ffffbbdd`73576d4d ffffbbdd`eef77bb8 : nt!ExAllocateHeapPool+0x750
ffffd503`2a33f320 fffff800`27950be6 : 00000000`80000000 00000000`00001000 00000000`73576d4d ffffc48f`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffd503`2a33f370 fffff800`278d8187 : 00000000`00000000 00000000`00000001 00000000`00000419 00000000`00000000 : nt!MiAllocatePool+0x86
ffffd503`2a33f3c0 fffff800`278d7739 : 0000002d`00000029 00000021`00000033 0000001b`00000014 0000001b`0000002a : nt!MiAgeWorkingSet+0x527
ffffd503`2a33f8d0 fffff800`278d6f47 : 00000000`00000000 ffffd503`2a33fa80 ffffd503`2a33fa40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffd503`2a33f9c0 fffff800`27808e60 : fffff800`28250c00 ffffd503`2a33fa80 00000000`00000d9e ffff9901`00020200 : nt!MiProcessWorkingSets+0x227
ffffd503`2a33fa60 fffff800`279b4847 : 00000000`00000006 00000000`00000006 00000000`ffffffff ffff9901`c0701180 : nt!MiWorkingSetManager+0x110
ffffd503`2a33fb20 fffff800`278a29a5 : ffffc48f`4fcab040 00000000`00000080 fffff800`279b46f0 00000000`00001b82 : nt!KeBalanceSetManager+0x157
ffffd503`2a33fc10 fffff800`279fc868 : ffff9901`c0701180 ffffc48f`4fcab040 fffff800`278a2950 00000000`00001b87 : nt!PspSystemThreadStartup+0x55
ffffd503`2a33fc60 00000000`00000000 : ffffd503`2a340000 ffffd503`2a33a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ExpAddTagForBigPages+106
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .cxr 0xffff9901c08d2920 ; kb
BUCKET_ID_FUNC_OFFSET: 106
FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!ExpAddTagForBigPages
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f78a0a54-5c29-0f5d-f796-c10730dbc37e}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80082ec2f09, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4421
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6774
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80082ec2f09
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff800838fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8008380f340: Unable to get Flags value from nt!KdVersionBlock
fffff8008380f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: mscorsvw.exe
BAD_STACK_POINTER: ffff9c0127121158
STACK_TEXT:
ffff9c01`27121158 fffff800`830f451e : 00000000`0000001e ffffffff`c0000005 fffff800`82ec2f09 00000000`00000000 : nt!KeBugCheckEx
ffff9c01`27121160 fffff800`82ffe0d2 : fffff800`830f44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffff9c01`271211a0 fffff800`82e52db7 : ffff9c01`27121710 00000000`00000000 ffffbe09`5ce92fb0 fffff800`82ffc255 : nt!RtlpExecuteHandlerForException+0x12
ffff9c01`271211d0 fffff800`82e519a6 : ffffbe09`5ce92858 ffff9c01`27121e20 ffffbe09`5ce92858 fff7828b`359d2c28 : nt!RtlDispatchException+0x297
ffff9c01`271218f0 fffff800`82ff60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffff9c01`27121fb0 fffff800`82ff6070 : fffff800`830072a5 00000000`0005d712 ffff9c01`271091c8 00000000`00067a81 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffbe09`5ce92718 fffff800`830072a5 : 00000000`0005d712 ffff9c01`271091c8 00000000`00067a81 00000000`00000001 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffbe09`5ce92720 fffff800`83002fe0 : 00000000`00000000 fffff800`82e7eb14 ffff9c01`27ad8020 ffffbe09`5ce929fc : nt!KiExceptionDispatch+0x125
ffffbe09`5ce92900 fffff800`82ec2f09 : 00000008`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffffbe09`5ce92a90 fffff800`82ec2e97 : 00000000`00000001 ffff9c01`27101102 00000000`00000003 ffff828b`2e7a22c0 : nt!IopfCompleteRequest+0x59
ffffbe09`5ce92b80 fffff800`8f9777a9 : 00000000`00000000 ffff828b`359d2a80 00000000`00000000 ffff828b`00000002 : nt!IofCompleteRequest+0x17
ffffbe09`5ce92bb0 fffff800`8f97884e : 00000000`00000002 ffff828b`20f7b440 ffff9c01`27101180 ffffbe09`5ce92e60 : afd!AfdCompletePollIrp+0x9d
ffffbe09`5ce92c00 fffff800`82ebf682 : ffff828b`20f7b480 ffff9c01`27101180 ffff9c01`27101180 ffff9c01`00000002 : afd!AfdTimeoutPoll+0x2e
ffffbe09`5ce92c30 fffff800`82ee4a2d : ffff9c01`27101180 000b5418`00000000 00000000`00000008 00000000`00303b4e : nt!KiProcessExpiredTimerList+0x172
ffffbe09`5ce92d20 fffff800`82ffc255 : 00087415`06040603 ffff9c01`27101180 ffff828b`206cdc40 00000000`00000210 : nt!KiRetireDpcList+0x5dd
ffffbe09`5ce92fb0 fffff800`82ffc040 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffbe09`5eb09190 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
SYMBOL_NAME: afd!AfdCompletePollIrp+9d
MODULE_NAME: afd
IMAGE_NAME: afd.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9d
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80612052f48, Address of the instruction which caused the bugcheck
Arg3: ffffd9806ad9b920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5015
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15312
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80612052f48
BUGCHECK_P3: ffffd9806ad9b920
BUGCHECK_P4: 0
CONTEXT: ffffd9806ad9b920 -- (.cxr 0xffffd9806ad9b920)
rax=ffff800d53a57f20 rbx=ffff800d537ccb90 rcx=fff7800d4ec4ce30
rdx=ffff800d53a57a60 rsi=ffff800d56a47d80 rdi=fffff80624794500
rip=fffff80612052f48 rsp=ffffd9806ad9c320 rbp=ffffd9806ad9c3d9
r8=000000000000000f r9=ffff800d4ee1e7f0 r10=fffff80612052f00
r11=fffff806247947a0 r12=ffff800d4eb6b9f8 r13=ffff800d537ccbd0
r14=ffff800d56278b50 r15=ffff800d537ccb20
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
nt!IofCallDriver+0x48:
fffff806`12052f48 4a8b44c170 mov rax,qword ptr [rcx+r8*8+70h] ds:002b:fff7800d`4ec4cf18=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: audiodg.exe
STACK_TEXT:
ffffd980`6ad9c320 fffff806`24794eea : ffff800d`56a47d80 ffff800d`537ccb90 ffff800d`56a47d80 ffffd980`6ad9c3d9 : nt!IofCallDriver+0x48
ffffd980`6ad9c360 fffff806`24795369 : ffff800d`56278b50 fffff806`24794500 00000000`00000000 00000000`00000000 : usbaudio!USBType1BuildIsochUrbRequest+0x616
ffffd980`6ad9c440 fffff806`24795466 : ffff800d`56278b50 00000000`00000000 00000000`00000000 00000000`00000001 : usbaudio!USBType1ProcessStreamPointer+0x161
ffffd980`6ad9c4a0 fffff806`247b237d : ffff800d`53bdb380 ffff800d`53bdb288 00000000`00000000 00000000`00000000 : usbaudio!USBType1ProcessPin+0xd6
ffffd980`6ad9c4d0 fffff806`242a417b : ffff800d`53bdb200 00000000`00000000 ffff800d`5566c800 fffff806`242cce00 : usbaudio!PinProcess+0x6d
ffffd980`6ad9c510 fffff806`242a4fa6 : 00000000`00000000 00000000`40000010 00000000`00000000 ffff800d`53bdb288 : ks!CKsPin::processingObjectWork+0x8b
ffffd980`6ad9c550 fffff806`242a1ba3 : ffff800d`59459ee0 ffff800d`59459ee0 00000000`00000001 ffff800d`52903110 : ks!CKsPin::process+0x66
ffffd980`6ad9c580 fffff806`242a12da : ffff800d`52903000 ffff800d`57ddd9d8 00000000`00000000 ffff800d`52903010 : ks!CKsQueue::AddFrame+0x1d3
ffffd980`6ad9c5d0 fffff806`242c9bd3 : 00000000`00000000 ffff800d`53bdb280 ffffd980`6ad9c6d0 ffffa001`081dd080 : ks!CKsQueue::TransferKsIrp+0x2ca
ffffd980`6ad9c670 fffff806`242cd513 : ffff800d`53690a20 00000000`00000000 00000000`00000000 ffff800d`4ee25b30 : ks!CKsPin::DispatchDeviceIoControl+0x1e3
ffffd980`6ad9c6c0 fffff806`247b13a3 : ffff800d`53690a20 ffff800d`4ee25b30 ffff800d`53690f28 ffff800d`4ecfbdf0 : ks!KsDispatchIrp+0x43
ffffd980`6ad9c6f0 fffff806`12052f55 : ffff800d`53690a20 ffffd980`6ad9c7c0 ffff800d`53690f70 00000000`00000000 : usbaudio!UsbAudioIrpDispatcher+0x143
ffffd980`6ad9c730 fffff806`245316bf : ffff800d`53690a20 ffffd980`6ad9c7c0 ffff800d`53690f70 ffff800d`4ecfbdf0 : nt!IofCallDriver+0x55
ffffd980`6ad9c770 fffff806`24531023 : ffff800d`53690a20 00000000`00000000 00000000`00000000 ffff800d`559e49b0 : ksthunk!CKernelFilterDevice::DispatchIrp+0x23b
ffffd980`6ad9c7d0 fffff806`12052f55 : 00000000`00000000 00000000`00000548 ffffd980`6ad9cb80 00000000`00000001 : ksthunk!CKernelFilterDevice::DispatchIrpBridge+0x13
ffffd980`6ad9c800 fffff806`123fd518 : ffff800d`53690a20 00000000`00000000 00000000`00000000 00000000`00000001 : nt!IofCallDriver+0x55
ffffd980`6ad9c840 fffff806`123fcde5 : 00000000`00000000 ffffd980`6ad9cb80 00000000`00040000 ffffd980`6ad9cb80 : nt!IopSynchronousServiceTail+0x1a8
ffffd980`6ad9c8e0 fffff806`123fc7e6 : 00000000`00000001 00000000`00000548 00000000`00000000 000002b6`3d220710 : nt!IopXxxControlFile+0x5e5
ffffd980`6ad9ca20 fffff806`122071b8 : 00000000`00000000 00000000`00000000 00000000`00000548 fffff806`124b9c00 : nt!NtDeviceIoControlFile+0x56
ffffd980`6ad9ca90 00007fff`b64ac094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f3`2f47f808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b64ac094
SYMBOL_NAME: usbaudio!USBType1BuildIsochUrbRequest+616
MODULE_NAME: usbaudio
IMAGE_NAME: usbaudio.sys
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .cxr 0xffffd9806ad9b920 ; kb
BUCKET_ID_FUNC_OFFSET: 616
FAILURE_BUCKET_ID: 0x3B_c0000005_usbaudio!USBType1BuildIsochUrbRequest
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {141bdf61-c952-61bf-008d-264ec009578d}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff85255fb9a351, Address of the instruction which caused the bugcheck
Arg3: ffff888fd1b4ed20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5359
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5365
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff85255fb9a351
BUGCHECK_P3: ffff888fd1b4ed20
BUGCHECK_P4: 0
CONTEXT: ffff888fd1b4ed20 -- (.cxr 0xffff888fd1b4ed20)
rax=000000007ffbe789 rbx=ffff8550055c47e0 rcx=fff78550054e5010
rdx=0000000000000000 rsi=ffff85500541ca08 rdi=0000000000000200
rip=ffff85255fb9a351 rsp=ffff888fd1b4f720 rbp=ffff8550055c4828
r8=0000000000000000 r9=0000000000000000 r10=ffff85255f860070
r11=ffff888fd1b4f790 r12=0000000000000148 r13=0000000000000148
r14=ffff8550055c4814 r15=ffff8550055c4810
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kfull!TimersProc+0x1e1:
ffff8525`5fb9a351 488b91a0010000 mov rdx,qword ptr [rcx+1A0h] ds:002b:fff78550`054e51b0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffff888f`d1b4f720 ffff8525`5fb99e56 : 00000000`0000000f 00000000`000b2082 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x1e1
ffff888f`d1b4f7b0 ffff8525`5f88ae33 : ffffa50b`6e530080 ffffa50b`6e530080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
ffff888f`d1b4f970 ffff8525`5fb38d20 : ffffa50b`6e530080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff888f`d1b4faa0 ffff8525`6069474d : ffffa50b`6e530080 ffffa50b`6e530080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff888f`d1b4fad0 fffff801`46a06bb8 : ffffa50b`00000005 00000000`00000005 000001e9`7ec04060 00000000`000004ac : win32k!NtUserCallNoParam+0x15
ffff888f`d1b4fb00 00007ffd`bfb610e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000004c`2347fca8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`bfb610e4
SYMBOL_NAME: win32kfull!TimersProc+1e1
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.631
STACK_COMMAND: .cxr 0xffff888fd1b4ed20 ; kb
BUCKET_ID_FUNC_OFFSET: 1e1
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000404, The subtype of the bugcheck.
Arg2: ffff9a7a03083338
Arg3: 8a00000082a8b963
Arg4: ffff9a7a03083330
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4093
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8211
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 404
BUGCHECK_P2: ffff9a7a03083338
BUGCHECK_P3: 8a00000082a8b963
BUGCHECK_P4: ffff9a7a03083330
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff406`0cd3f888 fffff804`7e3016dd : 00000000`0000001a 00000000`00000404 ffff9a7a`03083338 8a000000`82a8b963 : nt!KeBugCheckEx
fffff406`0cd3f890 fffff804`7e303fe7 : fffff804`7ec4f3c0 00000000`00000000 00000000`00000000 fffff406`0cd3f958 : nt!MiDeleteValidSystemPage+0x5fd
fffff406`0cd3f930 fffff804`7e208a1e : 00000000`00000007 fffff804`7ec50c00 8a000000`82a8b963 00000000`00000006 : nt!MiDeleteKernelStack+0x107
fffff406`0cd3f9e0 fffff804`7e208946 : fffff406`0cd3fa38 fffff804`7ec50c00 fffff804`7ec4ee00 fffff804`7ec4ea18 : nt!MiDeleteCachedKernelStack+0x4a
fffff406`0cd3fa20 fffff804`7e208ecc : fffff804`7ec50c00 00000000`00000000 00000000`00000000 ffff9e8a`0524b010 : nt!MiAdjustCachedStacks+0x116
fffff406`0cd3fa60 fffff804`7e3b4847 : 00000000`00000007 00000000`00000007 00000000`ffffffff ffffc901`3df01180 : nt!MiWorkingSetManager+0x17c
fffff406`0cd3fb20 fffff804`7e2a29a5 : ffff9e8a`052ab040 00000000`00000080 fffff804`7e3b46f0 00000000`00001b82 : nt!KeBalanceSetManager+0x157
fffff406`0cd3fc10 fffff804`7e3fc868 : ffffc901`3df01180 ffff9e8a`052ab040 fffff804`7e2a2950 00000000`00001b87 : nt!PspSystemThreadStartup+0x55
fffff406`0cd3fc60 00000000`00000000 : fffff406`0cd40000 fffff406`0cd3a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiDeleteValidSystemPage+5fd
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 5fd
FAILURE_BUCKET_ID: 0x1a_404_nt!MiDeleteValidSystemPage
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {57d19cf7-fb4a-adfd-0709-78f77073d319}
Followup: MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000001bb62, page frame number
Arg3: 0000000000000000, current page state
Arg4: 060000000008cb62, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3936
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5124
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 99
BUGCHECK_P2: 1bb62
BUGCHECK_P3: 0
BUGCHECK_P4: 60000000008cb62
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LeagueClientUxRender.exe
STACK_TEXT:
ffffc78b`870faec8 fffff800`70bed1e7 : 00000000`0000004e 00000000`00000099 00000000`0001bb62 00000000`00000000 : nt!KeBugCheckEx
ffffc78b`870faed0 fffff800`70b4a172 : 00000000`0018c0e1 fffff800`71450c00 00000000`00000001 00000000`000000e1 : nt!MiBadShareCount+0x5b
ffffc78b`870faf10 fffff800`70b4a91e : 00000000`00000000 ffffc78b`870fb620 ffffde00`0009e448 ffffc78b`870fb570 : nt!MiDeletePteRun+0x17c2
ffffc78b`870fb120 fffff800`70ae9a1d : 00000000`00000000 ffff9c8f`a872f700 ffffc78b`870fb570 ffffde00`0009e440 : nt!MiDeleteVaTail+0x6e
ffffc78b`870fb150 fffff800`70ae963b : ffffde6f`00000000 ffff9c8f`a872f700 ffffc78b`00000000 ffffc78b`870fb5c0 : nt!MiWalkPageTablesRecursively+0xc6d
ffffc78b`870fb1f0 fffff800`70ae963b : ffffde6f`37800000 ffff9c8f`a872f700 ffffc78b`00000001 ffffc78b`870fb5d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc78b`870fb290 fffff800`70ae963b : ffffde6f`37800000 ffff9c8f`a872f700 ffffc78b`00000002 ffffc78b`870fb5e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc78b`870fb330 fffff800`70ad859b : 00000000`00000000 ffff9c8f`a872f700 00000000`00000003 ffffc78b`870fb5f0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc78b`870fb3d0 fffff800`70b4b541 : ffffc78b`870fb570 ffff9c8f`00000000 ffffde00`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffc78b`870fb4d0 fffff800`70b229a0 : 00000000`00000001 ffffc78b`00000000 ffff9c8f`a872f550 ffff9c8f`ab554080 : nt!MiDeletePagablePteRange+0x4f1
ffffc78b`870fb7e0 fffff800`70b1ae6f : 00000000`00013c88 00000000`00000000 ffff9c8f`00000000 fffff800`00000000 : nt!MiDeleteVad+0x360
ffffc78b`870fb8f0 fffff800`70efadfc : ffffc78b`00000000 00000000`00000000 ffffc78b`870fba50 00000000`13bc0000 : nt!MiFreeVadRange+0xa3
ffffc78b`870fb950 fffff800`70efa8d5 : 00000000`00000000 00000000`068fe5c8 00000000`00001000 00000000`00000004 : nt!MmFreeVirtualMemory+0x4ec
ffffc78b`870fbaa0 fffff800`70c06bb8 : ffff9c8f`ab554080 00000000`115ad460 ffffc78b`870fbb80 00000000`00000000 : nt!NtFreeVirtualMemory+0x95
ffffc78b`870fbb00 00007ffd`6418c164 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`068fe5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6418c164
SYMBOL_NAME: nt!MiBadShareCount+5b
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 5b
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80583c1c349, The address that the exception occurred at
Arg3: ffffef0e814b5708, Exception Record Address
Arg4: ffffef0e814b4f40, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 4890
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 29506
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80583c1c349
BUGCHECK_P3: ffffef0e814b5708
BUGCHECK_P4: ffffef0e814b4f40
EXCEPTION_RECORD: ffffef0e814b5708 -- (.exr 0xffffef0e814b5708)
ExceptionAddress: fffff80583c1c349 (dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x0000000000000089)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffef0e814b4f40 -- (.cxr 0xffffef0e814b4f40)
rax=ffffb0064b9f0c00 rbx=fff7800aeba070e0 rcx=fffff80583c1c345
rdx=0000000004449060 rsi=ffff800ae6eab820 rdi=ffffef0e814b5a20
rip=fffff80583c1c349 rsp=ffffef0e814b5940 rbp=ffffef0e814b5a40
r8=ffffb0064b9f0c00 r9=0000000000000000 r10=fffff80583ec1010
r11=ffffef0e814b5ae8 r12=0000000000000000 r13=0000000000000000
r14=ffff800aef3828f0 r15=fffff80579525440
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x89:
fffff805`83c1c349 488b4b08 mov rcx,qword ptr [rbx+8] ds:002b:fff7800a`eba070e8=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: League of Legends.exe
READ_ADDRESS: fffff805794fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057940f340: Unable to get Flags value from nt!KdVersionBlock
fffff8057940f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffef0e`814b5940 fffff805`83c1c09c : fffff805`83c1c010 ffffb006`4b9cd010 ffff800a`ef3828f0 fffff805`79525440 : dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x89
ffffef0e`814b5af0 fffff805`78b034b5 : ffffb006`58181040 ffffb006`58181040 ffffb006`47ea4a20 ffffb006`00000000 : dxgkrnl!DxgkpDeferredDestructionWork+0x8c
ffffef0e`814b5b70 fffff805`78aa29a5 : ffffb006`58181040 00000000`00000080 ffffb006`47ea3040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffef0e`814b5c10 fffff805`78bfc868 : ffffc280`68dd9180 ffffb006`58181040 fffff805`78aa2950 00000000`0051ba40 : nt!PspSystemThreadStartup+0x55
ffffef0e`814b5c60 00000000`00000000 : ffffef0e`814b6000 ffffef0e`814b0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+89
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .cxr 0xffffef0e814b4f40 ; kb
BUCKET_ID_FUNC_OFFSET: 89
FAILURE_BUCKET_ID: AV_dxgkrnl!DXGDEVICE::DestroyDeferredAllocations
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {45df0bc6-82f3-598c-4946-f8766b610aa4}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804625ddb7a, The address that the exception occurred at
Arg3: ffff8d055030db88, Exception Record Address
Arg4: ffff8d055030d3c0, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 7030
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 28192
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff804625ddb7a
BUGCHECK_P3: ffff8d055030db88
BUGCHECK_P4: ffff8d055030d3c0
EXCEPTION_RECORD: ffff8d055030db88 -- (.exr 0xffff8d055030db88)
ExceptionAddress: fffff804625ddb7a (dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x0000000000000036)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000008
Attempt to read from address 0000000000000008
CONTEXT: ffff8d055030d3c0 -- (.cxr 0xffff8d055030d3c0)
rax=ffff526e779f29eb rbx=ffffbd0b398ef748 rcx=0000000000000000
rdx=ffffbd0b398ef708 rsi=ffffbd0b32bb4ef0 rdi=ffffad098d903000
rip=fffff804625ddb7a rsp=ffff8d055030ddc0 rbp=ffffad098d903000
r8=ffff8d055030dda0 r9=00000000ffffffff r10=fffff8044f4dbb10
r11=ffffbd0b32bb4ef0 r12=0000000000000000 r13=ffffbd0b3ceb6610
r14=ffffbd0b398ef708 r15=ffffbd0b398ef738
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x36:
fffff804`625ddb7a 4c8b6108 mov r12,qword ptr [rcx+8] ds:002b:00000000`00000008=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8044fefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8044fe0f340: Unable to get Flags value from nt!KdVersionBlock
fffff8044fe0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000008
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000008
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffff8d05`5030ddc0 fffff804`625d4448 : 00000000`00000000 fffff804`6257241b ffffbd0b`398ef748 fffff804`00000003 : dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x36
ffff8d05`5030e250 fffff804`625d270b : ffffbd0b`32bb4dd0 ffffad09`8d903001 ffffbd0b`32bb4ef0 ffffad09`8abe3d80 : dxgmms2!VIDMM_GLOBAL::MakeVirtualAddressRangeNotResident+0xc0
ffff8d05`5030e2b0 fffff804`625f25a6 : ffffad09`927eab10 ffffad09`8d903000 ffffbd0b`3ceb6600 ffffbd0b`32bb4dd0 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0x23b
ffff8d05`5030e300 fffff804`625f2489 : ffffbd0b`40757dc0 00000000`00001805 ffffbd0b`3ceb6610 ffffbd0b`3ceb6610 : dxgmms2!VIDMM_GLOBAL::EvictOneAllocation+0xc6
ffff8d05`5030e350 fffff804`625f2344 : ffffbd0b`40757dc0 00000003`00000000 ffff8d4b`00000000 ffffbd0b`3ceb6610 : dxgmms2!VIDMM_PAGE_TABLE::EvictPageTable+0x81
ffff8d05`5030e390 fffff804`625f22d9 : 00000000`0000000c fffff804`4f4c0000 ffffbd0b`3eb5cc50 00000000`00001805 : dxgmms2!VIDMM_PAGE_TABLE::DestroyPageTable+0x30
ffff8d05`5030e410 fffff804`625f2255 : 00000000`0000300a 00000000`00000200 00000000`00000000 00000000`00000002 : dxgmms2!VIDMM_PAGE_DIRECTORY::DestroyPdePageTableData+0x49
ffff8d05`5030e440 fffff804`625dfb20 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00300a00 : dxgmms2!VIDMM_PAGE_DIRECTORY::HandleFullPageTableCoverage+0xb1
ffff8d05`5030e4a0 fffff804`625deedc : ffffad09`8af7a968 ffffbd0b`3ceb6610 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0xbd0
ffff8d05`5030e610 fffff804`625e3693 : ffff9801`45f40180 fffff804`4f4c4a8a ffffad09`927e8458 ffffbd0b`39e607c0 : dxgmms2!CVirtualAddressAllocator::UncommitVirtualAddressRange+0xf4
ffff8d05`5030e720 fffff804`625e3631 : 00000000`00000000 ffffbd0b`39e607c0 ffffbd0b`3ceb6601 fffff804`4f4de1f7 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRangeSystemCommand+0x3f
ffff8d05`5030e750 fffff804`625cec77 : ffffbd0b`3cf93b90 00000000`00000000 ffffbd0b`3ceb6610 ffff8d05`5030e8e0 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRange+0x71
ffff8d05`5030e7e0 fffff804`625e2f6f : 00000000`00000078 ffffbd0b`34b61970 00000000`403b0088 00000003`00630000 : dxgmms2!VIDMM_GLOBAL::FreeGpuVirtualAddressSystemCommand+0xff
ffff8d05`5030e880 fffff804`625fa5d2 : ffffbd0b`300e0e40 ffffad09`00000001 00000000`00000001 ffffbd0b`304e6b50 : dxgmms2!VIDMM_GLOBAL::processSystemCommand+0x27b
ffff8d05`5030ea00 fffff804`62603e99 : ffffbd0b`304e6ae0 ffffad09`8d602001 00000000`00000000 00000000`05784a00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x1462
ffff8d05`5030ebe0 fffff804`4f4a29a5 : ffffad09`8d6020c0 fffff804`62603e90 ffffbd0b`304e6ae0 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff8d05`5030ec10 fffff804`4f5fc868 : ffff9801`45f40180 ffffad09`8d6020c0 fffff804`4f4a2950 00104ce0`00000001 : nt!PspSystemThreadStartup+0x55
ffff8d05`5030ec60 00000000`00000000 : ffff8d05`5030f000 ffff8d05`50309000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+36
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.1124
STACK_COMMAND: .cxr 0xffff8d055030d3c0 ; kb
BUCKET_ID_FUNC_OFFSET: 36
FAILURE_BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a5a6ede-7f3e-54bf-1b01-58a4c8fbd710}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80666ac2f09, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3124
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4179
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80666ac2f09
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff806674fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8066740f340: Unable to get Flags value from nt!KdVersionBlock
fffff8066740f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: League of Legends.exe
BAD_STACK_POINTER: ffffc3817e721158
STACK_TEXT:
ffffc381`7e721158 fffff806`66cf451e : 00000000`0000001e ffffffff`c0000005 fffff806`66ac2f09 00000000`00000000 : nt!KeBugCheckEx
ffffc381`7e721160 fffff806`66bfe0d2 : fffff806`66cf44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffc381`7e7211a0 fffff806`66a52db7 : ffffc381`7e721710 00000000`00000000 ffffa889`be692fb0 fffff806`66bfc255 : nt!RtlpExecuteHandlerForException+0x12
ffffc381`7e7211d0 fffff806`66a519a6 : ffffa889`be692858 ffffc381`7e721e20 ffffa889`be692858 fff7d50c`2d675968 : nt!RtlDispatchException+0x297
ffffc381`7e7218f0 fffff806`66bf60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffc381`7e721fb0 fffff806`66bf6070 : fffff806`66c072a5 00000000`00000000 ffffc381`7e701180 00000000`00000fff : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffa889`be692718 fffff806`66c072a5 : 00000000`00000000 ffffc381`7e701180 00000000`00000fff 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffa889`be692720 fffff806`66c02fe0 : 00000002`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
ffffa889`be692900 fffff806`66ac2f09 : 00000000`00000000 00000000`00000000 00000002`00001000 00000000`00000008 : nt!KiGeneralProtectionFault+0x320
ffffa889`be692a90 fffff806`66ac2e97 : 00000000`0002202c ffffa889`be692e02 ffffa889`be692cb8 00000000`00400a02 : nt!IopfCompleteRequest+0x59
ffffa889`be692b80 fffff806`739277a9 : 00000000`00000000 ffffd50c`2d6757c0 00000000`00000000 ffffd50c`00000002 : nt!IofCompleteRequest+0x17
ffffa889`be692bb0 fffff806`7392884e : 00000000`00000004 ffffa889`be692e60 ffffc381`7e701180 ffffc381`7e701180 : afd!AfdCompletePollIrp+0x9d
ffffa889`be692c00 fffff806`66abf682 : ffffd50c`301d70d0 ffffc381`7e701180 ffffa889`be692e68 ffffc381`00000002 : afd!AfdTimeoutPoll+0x2e
ffffa889`be692c30 fffff806`66ae4a2d : ffffc381`7e701180 00070000`00000000 00000000`00000008 00000000`0002202c : nt!KiProcessExpiredTimerList+0x172
ffffa889`be692d20 fffff806`66bfc255 : 00000000`00000000 ffffc381`7e701180 ffffd50c`210cdc40 00000000`19c4fce4 : nt!KiRetireDpcList+0x5dd
ffffa889`be692fb0 fffff806`66bfc040 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffa889`c1102ac0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
SYMBOL_NAME: afd!AfdCompletePollIrp+9d
MODULE_NAME: afd
IMAGE_NAME: afd.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9d
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee}
Followup: MachineOwner
---------
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2209]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = 4.30
BiosReleaseDate = 03/06/2019
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7B84
SystemFamily = To be filled by O.E.M.
SystemVersion = 2.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = B450M PRO-M2 V2 (MS-7B84)
BaseBoardVersion = 2.0
Konu 8 sayfaya ulşamış, ayrıntılı sistem özellikleri yok, RAM testi yok...
- Bütün dökümlere baktım. Sorun bellek kaynaklı gibi. Senin yapacağın ilk iş bellek testi yapmak. Sana linki atılmış, açılmadı diye yazmışsın. Açılamayan nedir güzel kardeşim? Yazacaksın. Bu testi yap ve sonucunu paylaş: Memtest86 USB'den Çalışan RAM Test Programı
- Nerede ayrıntılı PC özelliklerin? Her şeyi taksit taksit yazıyorsun. Tamamını yaz
- CPU-Z çalıştır ve SPD kısmından ekran görnütüleri koy. Buraya koy, MediaFire'a değil.
Genel hatalar, daha çok bellek şüphesi oluşturan:
Kod:KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80430248799, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4405 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 16782 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff80430248799 BUGCHECK_P3: 0 BUGCHECK_P4: ffffffffffffffff READ_ADDRESS: fffff80430cfa390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff80430c0f330: Unable to get Flags value from nt!KdVersionBlock fffff80430c0f330: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffffffffffffff EXCEPTION_PARAMETER2: ffffffffffffffff BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System BAD_STACK_POINTER: ffffbb81b2121158 STACK_TEXT: ffffbb81`b2121158 fffff804`304f4b0e : 00000000`0000001e ffffffff`c0000005 fffff804`30248799 00000000`00000000 : nt!KeBugCheckEx ffffbb81`b2121160 fffff804`303fe642 : fffff804`304f4aec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22 ffffbb81`b21211a0 fffff804`3032bf97 : ffffbb81`b2121710 00000000`00000000 fffffa87`a308bc60 fffff804`303f92ee : nt!RtlpExecuteHandlerForException+0x12 ffffbb81`b21211d0 fffff804`3032ab86 : fffffa87`a308b508 ffffbb81`b2121e20 fffffa87`a308b508 fff7e385`de373968 : nt!RtlDispatchException+0x297 ffffbb81`b21218f0 fffff804`303f6612 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186 ffffbb81`b2121fb0 fffff804`303f65e0 : fffff804`304078a5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12 fffffa87`a308b3c8 fffff804`304078a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue fffffa87`a308b3d0 fffff804`304035e0 : 00000000`00000000 fffff804`303089f3 ffffe385`d606b7c0 fffffa87`a308b6ac : nt!KiExceptionDispatch+0x125 fffffa87`a308b5b0 fffff804`30248799 : 00000004`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320 fffffa87`a308b740 fffff804`30248727 : 00000000`00000001 ffffbb81`b2101102 fffff804`30c248a0 ffffe385`d9e37080 : nt!IopfCompleteRequest+0x59 fffffa87`a308b830 fffff804`3c6577a9 : 00000000`00000000 ffffe385`de3737c0 00000000`00000000 ffffe385`00000002 : nt!IofCompleteRequest+0x17 fffffa87`a308b860 fffff804`3c65884e : 00000000`00000004 ffffe385`d1982800 ffffbb81`b2101180 fffffa87`a308bb10 : afd!AfdCompletePollIrp+0x9d fffffa87`a308b8b0 fffff804`30244f12 : ffffe385`d1982840 ffffbb81`b2101180 ffffbb81`b2101180 00000000`00000002 : afd!AfdTimeoutPoll+0x2e fffffa87`a308b8e0 fffff804`30206eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00083141 : nt!KiProcessExpiredTimerList+0x172 fffffa87`a308b9d0 fffff804`303f92ee : ffffffff`00000000 ffffbb81`b2101180 ffffbb81`b210c340 ffffe385`d6ba6080 : nt!KiRetireDpcList+0x5dd fffffa87`a308bc60 00000000`00000000 : fffffa87`a308c000 fffffa87`a3086000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e SYMBOL_NAME: afd!AfdCompletePollIrp+9d MODULE_NAME: afd IMAGE_NAME: afd.sys IMAGE_VERSION: 10.0.19041.508 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9d FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee} Followup: MachineOwner --------- 8: kd> lmvm afd Browse full module list start end module name fffff804`3c600000 fffff804`3c6a3000 afd # (pdb symbols) C:\ProgramData\Dbg\sym\afd.pdb\92BCCD248D3505B26C05ADECC513503E1\afd.pdb Loaded symbol image file: afd.sys Mapped memory image file: C:\ProgramData\Dbg\sym\afd.sys\CC0C9B73a3000\afd.sys Image path: \SystemRoot\system32\drivers\afd.sys Image name: afd.sys Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: CC0C9B73 (This is a reproducible build file hash, not a timestamp) CheckSum: 000A334A ImageSize: 000A3000 File version: 10.0.19041.508 Product version: 10.0.19041.508 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 3.7 Driver File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: afd.sys OriginalFilename: afd.sys ProductVersion: 10.0.19041.508 FileVersion: 10.0.19041.508 (WinBuild.160101.0800) FileDescription: Ancillary Function Driver for WinSock LegalCopyright: © Microsoft Corporation. All rights reserved. KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff801114c2f09, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3999 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 6072 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff801114c2f09 BUGCHECK_P3: 0 BUGCHECK_P4: ffffffffffffffff READ_ADDRESS: fffff80111efb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff80111e0f340: Unable to get Flags value from nt!KdVersionBlock fffff80111e0f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffffffffffffff EXCEPTION_PARAMETER2: ffffffffffffffff BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System BAD_STACK_POINTER: ffffb900a4521158 STACK_TEXT: ffffb900`a4521158 fffff801`116f451e : 00000000`0000001e ffffffff`c0000005 fffff801`114c2f09 00000000`00000000 : nt!KeBugCheckEx ffffb900`a4521160 fffff801`115fe0d2 : fffff801`116f44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22 ffffb900`a45211a0 fffff801`11452db7 : ffffb900`a4521710 00000000`00000000 fffff48f`0628bc60 fffff801`115f8d7e : nt!RtlpExecuteHandlerForException+0x12 ffffb900`a45211d0 fffff801`114519a6 : fffff48f`0628b508 ffffb900`a4521e20 fffff48f`0628b508 fff7ca08`70243fa8 : nt!RtlDispatchException+0x297 ffffb900`a45218f0 fffff801`115f60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186 ffffb900`a4521fb0 fffff801`115f6070 : fffff801`116072a5 00000000`00008206 ffffb900`a45091c8 00000000`00008de3 : nt!KxExceptionDispatchOnExceptionStack+0x12 fffff48f`0628b3c8 fffff801`116072a5 : 00000000`00008206 ffffb900`a45091c8 00000000`00008de3 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue fffff48f`0628b3d0 fffff801`11602fe0 : 00000000`00000000 ffffb900`a4501180 00000000`00000fff fffff48f`0628b6ac : nt!KiExceptionDispatch+0x125 fffff48f`0628b5b0 fffff801`114c2f09 : 00000004`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320 fffff48f`0628b740 fffff801`114c2e97 : 00000000`00000001 ffffb900`a4501102 00000000`00000003 ffffca08`6b1cf080 : nt!IopfCompleteRequest+0x59 fffff48f`0628b830 fffff801`1ec577a9 : 00000000`00000000 ffffca08`70243e00 00000000`00000000 ffffca08`6d680080 : nt!IofCompleteRequest+0x17 fffff48f`0628b860 fffff801`1ec5884e : 00000000`00000002 ffffca08`6c285de0 ffffb900`a4501180 fffff48f`0628bb10 : afd!AfdCompletePollIrp+0x9d fffff48f`0628b8b0 fffff801`114bf682 : ffffca08`6c285e20 ffffb900`a4501180 ffffb900`a4501180 00000000`00000002 : afd!AfdTimeoutPoll+0x2e fffff48f`0628b8e0 fffff801`114e4a2d : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0003d9e3 : nt!KiProcessExpiredTimerList+0x172 fffff48f`0628b9d0 fffff801`115f8d7e : ffffffff`00000000 ffffb900`a4501180 ffffb900`a450c340 ffffca08`647a2080 : nt!KiRetireDpcList+0x5dd fffff48f`0628bc60 00000000`00000000 : fffff48f`0628c000 fffff48f`06286000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e SYMBOL_NAME: afd!AfdCompletePollIrp+9d MODULE_NAME: afd IMAGE_NAME: afd.sys IMAGE_VERSION: 10.0.19041.508 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9d FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: ffff8796b50ba351, Address of the instruction which caused the bugcheck Arg3: fffffd8a2b8d7d20, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5608 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 6659 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: ffff8796b50ba351 BUGCHECK_P3: fffffd8a2b8d7d20 BUGCHECK_P4: 0 CONTEXT: fffffd8a2b8d7d20 -- (.cxr 0xfffffd8a2b8d7d20) rax=000000007fff386a rbx=ffff87b6c47dd1e0 rcx=fff787b6c47c9660 rdx=0000000000000000 rsi=ffff87b6c47dc8c8 rdi=0000000000000200 rip=ffff8796b50ba351 rsp=fffffd8a2b8d8720 rbp=ffff87b6c47dd228 r8=0000000000000000 r9=0000000000000000 r10=ffff8796b5af0070 r11=ffffe78207c97750 r12=0000000000000064 r13=0000000000000064 r14=ffff87b6c47dd214 r15=ffff87b6c47dd210 iopl=0 nv up ei pl nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206 win32kfull!TimersProc+0x1e1: ffff8796`b50ba351 488b91a0010000 mov rdx,qword ptr [rcx+1A0h] ds:002b:fff787b6`c47c9800=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: csrss.exe STACK_TEXT: fffffd8a`2b8d8720 ffff8796`b50b9e56 : 00000000`0000000f 00000000`053e856c 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x1e1 fffffd8a`2b8d87b0 ffff8796`b5b1ae33 : ffffe782`14867080 ffffe782`14867080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6 fffffd8a`2b8d8970 ffff8796`b5058d20 : ffffe782`14867080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3 fffffd8a`2b8d8aa0 ffff8796`b4eb474d : ffffe782`14867080 ffffe782`14867080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70 fffffd8a`2b8d8ad0 fffff805`6e206bb8 : ffffe782`00000005 00000000`00000005 000001bc`71c04060 00000000`00001620 : win32k!NtUserCallNoParam+0x15 fffffd8a`2b8d8b00 00007fff`2e5b10e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000b4`a89ff918 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2e5b10e4 SYMBOL_NAME: win32kfull!TimersProc+1e1 MODULE_NAME: win32kfull IMAGE_NAME: win32kfull.sys IMAGE_VERSION: 10.0.19041.631 STACK_COMMAND: .cxr 0xfffffd8a2b8d7d20 ; kb BUCKET_ID_FUNC_OFFSET: 1e1 FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63} Followup: MachineOwner --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8042c7fd147, The address that the exception occurred at Arg3: ffffc101570bb8d8, Exception Record Address Arg4: ffffc101570bb110, Context Record Address Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : AV.Fault Value: Read Key : Analysis.CPU.mSec Value: 6968 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 10314 Key : Analysis.Memory.CommitPeak.Mb Value: 89 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8042c7fd147 BUGCHECK_P3: ffffc101570bb8d8 BUGCHECK_P4: ffffc101570bb110 EXCEPTION_RECORD: ffffc101570bb8d8 -- (.exr 0xffffc101570bb8d8) ExceptionAddress: fffff8042c7fd147 (nt!ExpInterlockedPopEntrySListFault) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff CONTEXT: ffffc101570bb110 -- (.cxr 0xffffc101570bb110) rax=0000000006790001 rbx=fffffd0000016030 rcx=fffffd0000016030 rdx=fff7c10156dc6ff0 rsi=0000000000000000 rdi=fffff8042d050c00 rip=fffff8042c7fd147 rsp=ffffc101570bbb10 rbp=0000000000000001 r8=fff7c10156dc6ff0 r9=0000000000000010 r10=fffffd0000016030 r11=fffff80432211a70 r12=0000000000000000 r13=ffffffffffffffe0 r14=0000000000000001 r15=0000000000000001 iopl=0 nv up ei ng nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286 nt!ExpInterlockedPopEntrySListFault: fffff804`2c7fd147 498b08 mov rcx,qword ptr [r8] ds:002b:fff7c101`56dc6ff0=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System READ_ADDRESS: fffff8042d0fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8042d00f340: Unable to get Flags value from nt!KdVersionBlock fffff8042d00f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffffffffffffff ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff EXCEPTION_STR: 0xc0000005 STACK_TEXT: ffffc101`570bbb10 fffff804`2c60da64 : ffff8c23`00000001 00000000`00000000 ffffc101`570bbc10 ffffc101`570bbbb0 : nt!ExpInterlockedPopEntrySListFault ffffc101`570bbb20 fffff804`2c60d6fa : 00000000`00000012 00000000`00000004 00000000`0003d000 fffff804`2c6bc2e3 : nt!MmCreateKernelStack+0x104 ffffc101`570bbbc0 fffff804`2c60d5c2 : fffff804`3221f9b0 ffffc101`570bbdb8 ffffc101`570bbf04 ffffb089`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0xca ffffc101`570bbc60 fffff804`2c60d423 : ffffc101`570bbf00 00000000`00000002 00000000`00000000 ffffb089`24025030 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2 ffffc101`570bbcd0 fffff804`2c60d3dd : fffff804`3221f9b0 ffffc101`570bbdb8 ffffb089`298ce538 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x33 ffffc101`570bbd40 fffff804`32208380 : ffffb089`298ce538 fffff804`32207ed5 ffffb089`298ce504 ffffb089`2d9f1460 : nt!KeExpandKernelStackAndCalloutEx+0x1d ffffc101`570bbd80 fffff804`32206d71 : ffffc101`570bbe40 ffffc50a`f50f1170 ffffb089`298ce538 00000000`00100000 : Ntfs!NtfsMultipleAsync+0x140 ffffc101`570bbe00 fffff804`32213b67 : 00000000`00000000 ffffc50a`f50f1200 00000000`00000000 00000000`00000000 : Ntfs!NtfsNonCachedIo+0x431 ffffc101`570bc0c0 fffff804`32212de3 : ffffb089`298ce538 ffffb089`2d9f1460 ffffc101`570bc360 00000000`00000000 : Ntfs!NtfsCommonWrite+0xb07 ffffc101`570bc2f0 fffff804`2c6cd6c5 : ffffb089`27e2ea20 ffffb089`2d9f1460 ffffb089`2d9f1460 ffffb089`21f1fd60 : Ntfs!NtfsFsdWrite+0x1d3 ffffc101`570bc3c0 fffff804`2bf26ccf : 00000000`00000768 33333333`00000000 ffffb089`27e3d510 fffff804`2c6c8cfc : nt!IofCallDriver+0x55 ffffc101`570bc400 fffff804`2bf248d3 : ffffc101`570bc490 ffffb089`2ec1d010 00000000`00000140 00000000`00000768 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f ffffc101`570bc470 fffff804`2c6cd6c5 : ffffb089`2d9f1460 fffff804`2c6cd707 00000000`0000000c 00000000`00000004 : FLTMGR!FltpDispatch+0xa3 ffffc101`570bc4d0 fffff804`2c71a1df : ffffb089`2ec1d010 ffffb089`2d9f1460 ffffb089`2f261c80 ffffc101`570bc590 : nt!IofCallDriver+0x55 ffffc101`570bc510 fffff804`2c68b590 : 00000000`00000000 ffffc101`570bc5b0 ffffb089`2f261c80 fffff804`2c71dc5d : nt!IoSynchronousPageWriteEx+0x13b ffffc101`570bc550 fffff804`2c6f7ae2 : 00000000`00000011 ffffc50a`eceb8000 00000000`00100000 fffffa00`00592410 : nt!MiIssueSynchronousFlush+0x70 ffffc101`570bc5d0 fffff804`2c70d391 : ffffc101`546c3a88 ffffc101`546c3a88 00000000`00000000 00000000`00000000 : nt!MiFlushSectionInternal+0x862 ffffc101`570bc8a0 fffff804`2c70a08a : 00000000`0045c70c ffffb089`28d8c040 00000000`00100000 00000000`00100000 : nt!MmFlushSection+0xbd ffffc101`570bc950 fffff804`2c70ab74 : ffffb089`2f6335f8 00000000`00000000 00000000`00000001 00000000`00000000 : nt!CcFlushCachePriv+0x42a ffffc101`570bca90 fffff804`2c7034b5 : ffffb089`2966b5f0 fffff804`2ca12300 ffffb089`1e66ca01 ffffb089`00000000 : nt!CcWriteBehindInternal+0x1f4 ffffc101`570bcb70 fffff804`2c6a29a5 : ffffb089`28d8c040 00000000`00000080 ffffb089`1e686040 00000000`00000001 : nt!ExpWorkerThread+0x105 ffffc101`570bcc10 fffff804`2c7fc868 : ffff9b80`0ff40180 ffffb089`28d8c040 fffff804`2c6a2950 00000000`0394bae0 : nt!PspSystemThreadStartup+0x55 ffffc101`570bcc60 00000000`00000000 : ffffc101`570bd000 ffffc101`570b7000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: nt!MmCreateKernelStack+104 MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.630 STACK_COMMAND: .cxr 0xffffc101570bb110 ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 104 FAILURE_BUCKET_ID: AV_nt!MmCreateKernelStack OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c83a01d5-aa3b-3796-2ad9-7e419fd13a54} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80767ccd612, Address of the instruction which caused the bugcheck Arg3: ffff850e1f0eced0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5015 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 6529 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80767ccd612 BUGCHECK_P3: ffff850e1f0eced0 BUGCHECK_P4: 0 CONTEXT: ffff850e1f0eced0 -- (.cxr 0xffff850e1f0eced0) rax=fff7c08fc9fb7a70 rbx=0000000000222017 rcx=ffffc08fd64c3e30 rdx=ffff850e1f0eda30 rsi=0000000000040000 rdi=ffffc08fd64c3e30 rip=fffff80767ccd612 rsp=ffff850e1f0ed8d8 rbp=ffff850e1f0edb80 r8=0000000000000000 r9=ffff850e1f0eda40 r10=0000000000000000 r11=ffffe70528354b80 r12=0000000000000000 r13=0000000000000003 r14=ffffc08fd64c3e80 r15=0000000000000001 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!IoGetRelatedDeviceObject+0x42: fffff807`67ccd612 488b4038 mov rax,qword ptr [rax+38h] ds:002b:fff7c08f`c9fb7aa8=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: audiodg.exe STACK_TEXT: ffff850e`1f0ed8d8 fffff807`680c1acb : 00000000`00222017 00000000`00000000 00000000`00000000 ffffc08f`d64c3e30 : nt!IoGetRelatedDeviceObject+0x42 ffff850e`1f0ed8e0 fffff807`680c17f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x2bb ffff850e`1f0eda20 fffff807`67e06bb8 : 00000000`00000000 ffff850e`1f0edb80 ffff850e`1f0edaa8 ffffc08f`d32f71f0 : nt!NtDeviceIoControlFile+0x56 ffff850e`1f0eda90 00007ffe`c32cbe84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000027`b7c7fa88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c32cbe84 SYMBOL_NAME: nt!IopXxxControlFile+2bb MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.630 STACK_COMMAND: .cxr 0xffff850e1f0eced0 ; kb BUCKET_ID_FUNC_OFFSET: 2bb FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopXxxControlFile OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {657bb511-7f5c-7ddc-acd3-e126b6d359c8} Followup: MachineOwner --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff800278cd0d6, The address that the exception occurred at Arg3: ffffd5032a33ef38, Exception Record Address Arg4: ffff9901c08d2920, Context Record Address Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : AV.Fault Value: Read Key : Analysis.CPU.mSec Value: 3655 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 5793 Key : Analysis.Memory.CommitPeak.Mb Value: 80 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff800278cd0d6 BUGCHECK_P3: ffffd5032a33ef38 BUGCHECK_P4: ffff9901c08d2920 EXCEPTION_RECORD: ffffd5032a33ef38 -- (.exr 0xffffd5032a33ef38) ExceptionAddress: fffff800278cd0d6 (nt!ExpAddTagForBigPages+0x0000000000000106) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff CONTEXT: ffff9901c08d2920 -- (.cxr 0xffff9901c08d2920) rax=0000000000030000 rbx=00002d22d6751c77 rcx=fff7c48f5743ab28 rdx=fff7c48f57410000 rsi=0000000000000000 rdi=ffffc48f5e4cb000 rip=fffff800278cd0d6 rsp=ffffd5032a33f170 rbp=ffffd5032a33f2c1 r8=fff7c48f5743ab28 r9=fffff80028323100 r10=0000000000010000 r11=fff7c48f57590000 r12=00002d22d6753155 r13=0000000000000600 r14=0000000000000000 r15=0000000000000002 iopl=0 nv up ei pl nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00250206 nt!ExpAddTagForBigPages+0x106: fffff800`278cd0d6 488b01 mov rax,qword ptr [rcx] ds:002b:fff7c48f`5743ab28=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: League of Legends.exe READ_ADDRESS: fffff800282fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8002820f340: Unable to get Flags value from nt!KdVersionBlock fffff8002820f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffffffffffffff ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff EXCEPTION_STR: 0xc0000005 BAD_STACK_POINTER: ffff9901c08d20e8 STACK_TEXT: ffffd503`2a33f170 fffff800`278cadd0 : ffffc48f`5e4cb000 00000000`73576d4d 00000000`00001000 00000000`00000600 : nt!ExpAddTagForBigPages+0x106 ffffd503`2a33f1e0 fffff800`278ca64f : 000001ce`32423fff 00000000`00000003 ffffbbdd`73576d4d ffffbbdd`eef77bb8 : nt!ExAllocateHeapPool+0x750 ffffd503`2a33f320 fffff800`27950be6 : 00000000`80000000 00000000`00001000 00000000`73576d4d ffffc48f`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f ffffd503`2a33f370 fffff800`278d8187 : 00000000`00000000 00000000`00000001 00000000`00000419 00000000`00000000 : nt!MiAllocatePool+0x86 ffffd503`2a33f3c0 fffff800`278d7739 : 0000002d`00000029 00000021`00000033 0000001b`00000014 0000001b`0000002a : nt!MiAgeWorkingSet+0x527 ffffd503`2a33f8d0 fffff800`278d6f47 : 00000000`00000000 ffffd503`2a33fa80 ffffd503`2a33fa40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9 ffffd503`2a33f9c0 fffff800`27808e60 : fffff800`28250c00 ffffd503`2a33fa80 00000000`00000d9e ffff9901`00020200 : nt!MiProcessWorkingSets+0x227 ffffd503`2a33fa60 fffff800`279b4847 : 00000000`00000006 00000000`00000006 00000000`ffffffff ffff9901`c0701180 : nt!MiWorkingSetManager+0x110 ffffd503`2a33fb20 fffff800`278a29a5 : ffffc48f`4fcab040 00000000`00000080 fffff800`279b46f0 00000000`00001b82 : nt!KeBalanceSetManager+0x157 ffffd503`2a33fc10 fffff800`279fc868 : ffff9901`c0701180 ffffc48f`4fcab040 fffff800`278a2950 00000000`00001b87 : nt!PspSystemThreadStartup+0x55 ffffd503`2a33fc60 00000000`00000000 : ffffd503`2a340000 ffffd503`2a33a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: nt!ExpAddTagForBigPages+106 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.630 STACK_COMMAND: .cxr 0xffff9901c08d2920 ; kb BUCKET_ID_FUNC_OFFSET: 106 FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!ExpAddTagForBigPages OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f78a0a54-5c29-0f5d-f796-c10730dbc37e} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80082ec2f09, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4421 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 6774 Key : Analysis.Memory.CommitPeak.Mb Value: 83 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff80082ec2f09 BUGCHECK_P3: 0 BUGCHECK_P4: ffffffffffffffff READ_ADDRESS: fffff800838fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8008380f340: Unable to get Flags value from nt!KdVersionBlock fffff8008380f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffffffffffffff EXCEPTION_PARAMETER2: ffffffffffffffff BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: mscorsvw.exe BAD_STACK_POINTER: ffff9c0127121158 STACK_TEXT: ffff9c01`27121158 fffff800`830f451e : 00000000`0000001e ffffffff`c0000005 fffff800`82ec2f09 00000000`00000000 : nt!KeBugCheckEx ffff9c01`27121160 fffff800`82ffe0d2 : fffff800`830f44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22 ffff9c01`271211a0 fffff800`82e52db7 : ffff9c01`27121710 00000000`00000000 ffffbe09`5ce92fb0 fffff800`82ffc255 : nt!RtlpExecuteHandlerForException+0x12 ffff9c01`271211d0 fffff800`82e519a6 : ffffbe09`5ce92858 ffff9c01`27121e20 ffffbe09`5ce92858 fff7828b`359d2c28 : nt!RtlDispatchException+0x297 ffff9c01`271218f0 fffff800`82ff60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186 ffff9c01`27121fb0 fffff800`82ff6070 : fffff800`830072a5 00000000`0005d712 ffff9c01`271091c8 00000000`00067a81 : nt!KxExceptionDispatchOnExceptionStack+0x12 ffffbe09`5ce92718 fffff800`830072a5 : 00000000`0005d712 ffff9c01`271091c8 00000000`00067a81 00000000`00000001 : nt!KiExceptionDispatchOnExceptionStackContinue ffffbe09`5ce92720 fffff800`83002fe0 : 00000000`00000000 fffff800`82e7eb14 ffff9c01`27ad8020 ffffbe09`5ce929fc : nt!KiExceptionDispatch+0x125 ffffbe09`5ce92900 fffff800`82ec2f09 : 00000008`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320 ffffbe09`5ce92a90 fffff800`82ec2e97 : 00000000`00000001 ffff9c01`27101102 00000000`00000003 ffff828b`2e7a22c0 : nt!IopfCompleteRequest+0x59 ffffbe09`5ce92b80 fffff800`8f9777a9 : 00000000`00000000 ffff828b`359d2a80 00000000`00000000 ffff828b`00000002 : nt!IofCompleteRequest+0x17 ffffbe09`5ce92bb0 fffff800`8f97884e : 00000000`00000002 ffff828b`20f7b440 ffff9c01`27101180 ffffbe09`5ce92e60 : afd!AfdCompletePollIrp+0x9d ffffbe09`5ce92c00 fffff800`82ebf682 : ffff828b`20f7b480 ffff9c01`27101180 ffff9c01`27101180 ffff9c01`00000002 : afd!AfdTimeoutPoll+0x2e ffffbe09`5ce92c30 fffff800`82ee4a2d : ffff9c01`27101180 000b5418`00000000 00000000`00000008 00000000`00303b4e : nt!KiProcessExpiredTimerList+0x172 ffffbe09`5ce92d20 fffff800`82ffc255 : 00087415`06040603 ffff9c01`27101180 ffff828b`206cdc40 00000000`00000210 : nt!KiRetireDpcList+0x5dd ffffbe09`5ce92fb0 fffff800`82ffc040 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5 ffffbe09`5eb09190 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue SYMBOL_NAME: afd!AfdCompletePollIrp+9d MODULE_NAME: afd IMAGE_NAME: afd.sys IMAGE_VERSION: 10.0.19041.508 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9d FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80612052f48, Address of the instruction which caused the bugcheck Arg3: ffffd9806ad9b920, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5015 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 15312 Key : Analysis.Memory.CommitPeak.Mb Value: 82 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80612052f48 BUGCHECK_P3: ffffd9806ad9b920 BUGCHECK_P4: 0 CONTEXT: ffffd9806ad9b920 -- (.cxr 0xffffd9806ad9b920) rax=ffff800d53a57f20 rbx=ffff800d537ccb90 rcx=fff7800d4ec4ce30 rdx=ffff800d53a57a60 rsi=ffff800d56a47d80 rdi=fffff80624794500 rip=fffff80612052f48 rsp=ffffd9806ad9c320 rbp=ffffd9806ad9c3d9 r8=000000000000000f r9=ffff800d4ee1e7f0 r10=fffff80612052f00 r11=fffff806247947a0 r12=ffff800d4eb6b9f8 r13=ffff800d537ccbd0 r14=ffff800d56278b50 r15=ffff800d537ccb20 iopl=0 nv up ei ng nz na po cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287 nt!IofCallDriver+0x48: fffff806`12052f48 4a8b44c170 mov rax,qword ptr [rcx+r8*8+70h] ds:002b:fff7800d`4ec4cf18=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: audiodg.exe STACK_TEXT: ffffd980`6ad9c320 fffff806`24794eea : ffff800d`56a47d80 ffff800d`537ccb90 ffff800d`56a47d80 ffffd980`6ad9c3d9 : nt!IofCallDriver+0x48 ffffd980`6ad9c360 fffff806`24795369 : ffff800d`56278b50 fffff806`24794500 00000000`00000000 00000000`00000000 : usbaudio!USBType1BuildIsochUrbRequest+0x616 ffffd980`6ad9c440 fffff806`24795466 : ffff800d`56278b50 00000000`00000000 00000000`00000000 00000000`00000001 : usbaudio!USBType1ProcessStreamPointer+0x161 ffffd980`6ad9c4a0 fffff806`247b237d : ffff800d`53bdb380 ffff800d`53bdb288 00000000`00000000 00000000`00000000 : usbaudio!USBType1ProcessPin+0xd6 ffffd980`6ad9c4d0 fffff806`242a417b : ffff800d`53bdb200 00000000`00000000 ffff800d`5566c800 fffff806`242cce00 : usbaudio!PinProcess+0x6d ffffd980`6ad9c510 fffff806`242a4fa6 : 00000000`00000000 00000000`40000010 00000000`00000000 ffff800d`53bdb288 : ks!CKsPin::processingObjectWork+0x8b ffffd980`6ad9c550 fffff806`242a1ba3 : ffff800d`59459ee0 ffff800d`59459ee0 00000000`00000001 ffff800d`52903110 : ks!CKsPin::process+0x66 ffffd980`6ad9c580 fffff806`242a12da : ffff800d`52903000 ffff800d`57ddd9d8 00000000`00000000 ffff800d`52903010 : ks!CKsQueue::AddFrame+0x1d3 ffffd980`6ad9c5d0 fffff806`242c9bd3 : 00000000`00000000 ffff800d`53bdb280 ffffd980`6ad9c6d0 ffffa001`081dd080 : ks!CKsQueue::TransferKsIrp+0x2ca ffffd980`6ad9c670 fffff806`242cd513 : ffff800d`53690a20 00000000`00000000 00000000`00000000 ffff800d`4ee25b30 : ks!CKsPin::DispatchDeviceIoControl+0x1e3 ffffd980`6ad9c6c0 fffff806`247b13a3 : ffff800d`53690a20 ffff800d`4ee25b30 ffff800d`53690f28 ffff800d`4ecfbdf0 : ks!KsDispatchIrp+0x43 ffffd980`6ad9c6f0 fffff806`12052f55 : ffff800d`53690a20 ffffd980`6ad9c7c0 ffff800d`53690f70 00000000`00000000 : usbaudio!UsbAudioIrpDispatcher+0x143 ffffd980`6ad9c730 fffff806`245316bf : ffff800d`53690a20 ffffd980`6ad9c7c0 ffff800d`53690f70 ffff800d`4ecfbdf0 : nt!IofCallDriver+0x55 ffffd980`6ad9c770 fffff806`24531023 : ffff800d`53690a20 00000000`00000000 00000000`00000000 ffff800d`559e49b0 : ksthunk!CKernelFilterDevice::DispatchIrp+0x23b ffffd980`6ad9c7d0 fffff806`12052f55 : 00000000`00000000 00000000`00000548 ffffd980`6ad9cb80 00000000`00000001 : ksthunk!CKernelFilterDevice::DispatchIrpBridge+0x13 ffffd980`6ad9c800 fffff806`123fd518 : ffff800d`53690a20 00000000`00000000 00000000`00000000 00000000`00000001 : nt!IofCallDriver+0x55 ffffd980`6ad9c840 fffff806`123fcde5 : 00000000`00000000 ffffd980`6ad9cb80 00000000`00040000 ffffd980`6ad9cb80 : nt!IopSynchronousServiceTail+0x1a8 ffffd980`6ad9c8e0 fffff806`123fc7e6 : 00000000`00000001 00000000`00000548 00000000`00000000 000002b6`3d220710 : nt!IopXxxControlFile+0x5e5 ffffd980`6ad9ca20 fffff806`122071b8 : 00000000`00000000 00000000`00000000 00000000`00000548 fffff806`124b9c00 : nt!NtDeviceIoControlFile+0x56 ffffd980`6ad9ca90 00007fff`b64ac094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000f3`2f47f808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b64ac094 SYMBOL_NAME: usbaudio!USBType1BuildIsochUrbRequest+616 MODULE_NAME: usbaudio IMAGE_NAME: usbaudio.sys IMAGE_VERSION: 10.0.19041.388 STACK_COMMAND: .cxr 0xffffd9806ad9b920 ; kb BUCKET_ID_FUNC_OFFSET: 616 FAILURE_BUCKET_ID: 0x3B_c0000005_usbaudio!USBType1BuildIsochUrbRequest OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {141bdf61-c952-61bf-008d-264ec009578d} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: ffff85255fb9a351, Address of the instruction which caused the bugcheck Arg3: ffff888fd1b4ed20, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5359 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 5365 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: ffff85255fb9a351 BUGCHECK_P3: ffff888fd1b4ed20 BUGCHECK_P4: 0 CONTEXT: ffff888fd1b4ed20 -- (.cxr 0xffff888fd1b4ed20) rax=000000007ffbe789 rbx=ffff8550055c47e0 rcx=fff78550054e5010 rdx=0000000000000000 rsi=ffff85500541ca08 rdi=0000000000000200 rip=ffff85255fb9a351 rsp=ffff888fd1b4f720 rbp=ffff8550055c4828 r8=0000000000000000 r9=0000000000000000 r10=ffff85255f860070 r11=ffff888fd1b4f790 r12=0000000000000148 r13=0000000000000148 r14=ffff8550055c4814 r15=ffff8550055c4810 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202 win32kfull!TimersProc+0x1e1: ffff8525`5fb9a351 488b91a0010000 mov rdx,qword ptr [rcx+1A0h] ds:002b:fff78550`054e51b0=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: csrss.exe STACK_TEXT: ffff888f`d1b4f720 ffff8525`5fb99e56 : 00000000`0000000f 00000000`000b2082 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x1e1 ffff888f`d1b4f7b0 ffff8525`5f88ae33 : ffffa50b`6e530080 ffffa50b`6e530080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6 ffff888f`d1b4f970 ffff8525`5fb38d20 : ffffa50b`6e530080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3 ffff888f`d1b4faa0 ffff8525`6069474d : ffffa50b`6e530080 ffffa50b`6e530080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70 ffff888f`d1b4fad0 fffff801`46a06bb8 : ffffa50b`00000005 00000000`00000005 000001e9`7ec04060 00000000`000004ac : win32k!NtUserCallNoParam+0x15 ffff888f`d1b4fb00 00007ffd`bfb610e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 0000004c`2347fca8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`bfb610e4 SYMBOL_NAME: win32kfull!TimersProc+1e1 MODULE_NAME: win32kfull IMAGE_NAME: win32kfull.sys IMAGE_VERSION: 10.0.19041.631 STACK_COMMAND: .cxr 0xffff888fd1b4ed20 ; kb BUCKET_ID_FUNC_OFFSET: 1e1 FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63} Followup: MachineOwner --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000000404, The subtype of the bugcheck. Arg2: ffff9a7a03083338 Arg3: 8a00000082a8b963 Arg4: ffff9a7a03083330 Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4093 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 8211 Key : Analysis.Memory.CommitPeak.Mb Value: 82 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 404 BUGCHECK_P2: ffff9a7a03083338 BUGCHECK_P3: 8a00000082a8b963 BUGCHECK_P4: ffff9a7a03083330 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: fffff406`0cd3f888 fffff804`7e3016dd : 00000000`0000001a 00000000`00000404 ffff9a7a`03083338 8a000000`82a8b963 : nt!KeBugCheckEx fffff406`0cd3f890 fffff804`7e303fe7 : fffff804`7ec4f3c0 00000000`00000000 00000000`00000000 fffff406`0cd3f958 : nt!MiDeleteValidSystemPage+0x5fd fffff406`0cd3f930 fffff804`7e208a1e : 00000000`00000007 fffff804`7ec50c00 8a000000`82a8b963 00000000`00000006 : nt!MiDeleteKernelStack+0x107 fffff406`0cd3f9e0 fffff804`7e208946 : fffff406`0cd3fa38 fffff804`7ec50c00 fffff804`7ec4ee00 fffff804`7ec4ea18 : nt!MiDeleteCachedKernelStack+0x4a fffff406`0cd3fa20 fffff804`7e208ecc : fffff804`7ec50c00 00000000`00000000 00000000`00000000 ffff9e8a`0524b010 : nt!MiAdjustCachedStacks+0x116 fffff406`0cd3fa60 fffff804`7e3b4847 : 00000000`00000007 00000000`00000007 00000000`ffffffff ffffc901`3df01180 : nt!MiWorkingSetManager+0x17c fffff406`0cd3fb20 fffff804`7e2a29a5 : ffff9e8a`052ab040 00000000`00000080 fffff804`7e3b46f0 00000000`00001b82 : nt!KeBalanceSetManager+0x157 fffff406`0cd3fc10 fffff804`7e3fc868 : ffffc901`3df01180 ffff9e8a`052ab040 fffff804`7e2a2950 00000000`00001b87 : nt!PspSystemThreadStartup+0x55 fffff406`0cd3fc60 00000000`00000000 : fffff406`0cd40000 fffff406`0cd3a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: nt!MiDeleteValidSystemPage+5fd MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.630 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 5fd FAILURE_BUCKET_ID: 0x1a_404_nt!MiDeleteValidSystemPage OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {57d19cf7-fb4a-adfd-0709-78f77073d319} Followup: MachineOwner ---------
Ekran kartı şüphesi oluşturan hatalar:
Kod:PFN_LIST_CORRUPT (4e) Typically caused by drivers passing bad memory descriptor lists (ie: calling MmUnlockPages twice with the same list, etc). If a kernel debugger is available get the stack trace. Arguments: Arg1: 0000000000000099, A PTE or PFN is corrupt Arg2: 000000000001bb62, page frame number Arg3: 0000000000000000, current page state Arg4: 060000000008cb62, 0 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3936 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 5124 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 4e BUGCHECK_P1: 99 BUGCHECK_P2: 1bb62 BUGCHECK_P3: 0 BUGCHECK_P4: 60000000008cb62 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: LeagueClientUxRender.exe STACK_TEXT: ffffc78b`870faec8 fffff800`70bed1e7 : 00000000`0000004e 00000000`00000099 00000000`0001bb62 00000000`00000000 : nt!KeBugCheckEx ffffc78b`870faed0 fffff800`70b4a172 : 00000000`0018c0e1 fffff800`71450c00 00000000`00000001 00000000`000000e1 : nt!MiBadShareCount+0x5b ffffc78b`870faf10 fffff800`70b4a91e : 00000000`00000000 ffffc78b`870fb620 ffffde00`0009e448 ffffc78b`870fb570 : nt!MiDeletePteRun+0x17c2 ffffc78b`870fb120 fffff800`70ae9a1d : 00000000`00000000 ffff9c8f`a872f700 ffffc78b`870fb570 ffffde00`0009e440 : nt!MiDeleteVaTail+0x6e ffffc78b`870fb150 fffff800`70ae963b : ffffde6f`00000000 ffff9c8f`a872f700 ffffc78b`00000000 ffffc78b`870fb5c0 : nt!MiWalkPageTablesRecursively+0xc6d ffffc78b`870fb1f0 fffff800`70ae963b : ffffde6f`37800000 ffff9c8f`a872f700 ffffc78b`00000001 ffffc78b`870fb5d0 : nt!MiWalkPageTablesRecursively+0x88b ffffc78b`870fb290 fffff800`70ae963b : ffffde6f`37800000 ffff9c8f`a872f700 ffffc78b`00000002 ffffc78b`870fb5e0 : nt!MiWalkPageTablesRecursively+0x88b ffffc78b`870fb330 fffff800`70ad859b : 00000000`00000000 ffff9c8f`a872f700 00000000`00000003 ffffc78b`870fb5f0 : nt!MiWalkPageTablesRecursively+0x88b ffffc78b`870fb3d0 fffff800`70b4b541 : ffffc78b`870fb570 ffff9c8f`00000000 ffffde00`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b ffffc78b`870fb4d0 fffff800`70b229a0 : 00000000`00000001 ffffc78b`00000000 ffff9c8f`a872f550 ffff9c8f`ab554080 : nt!MiDeletePagablePteRange+0x4f1 ffffc78b`870fb7e0 fffff800`70b1ae6f : 00000000`00013c88 00000000`00000000 ffff9c8f`00000000 fffff800`00000000 : nt!MiDeleteVad+0x360 ffffc78b`870fb8f0 fffff800`70efadfc : ffffc78b`00000000 00000000`00000000 ffffc78b`870fba50 00000000`13bc0000 : nt!MiFreeVadRange+0xa3 ffffc78b`870fb950 fffff800`70efa8d5 : 00000000`00000000 00000000`068fe5c8 00000000`00001000 00000000`00000004 : nt!MmFreeVirtualMemory+0x4ec ffffc78b`870fbaa0 fffff800`70c06bb8 : ffff9c8f`ab554080 00000000`115ad460 ffffc78b`870fbb80 00000000`00000000 : nt!NtFreeVirtualMemory+0x95 ffffc78b`870fbb00 00007ffd`6418c164 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`068fe5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6418c164 SYMBOL_NAME: nt!MiBadShareCount+5b MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.630 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 5b FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003} Followup: MachineOwner --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80583c1c349, The address that the exception occurred at Arg3: ffffef0e814b5708, Exception Record Address Arg4: ffffef0e814b4f40, Context Record Address Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : AV.Fault Value: Read Key : Analysis.CPU.mSec Value: 4890 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 29506 Key : Analysis.Memory.CommitPeak.Mb Value: 83 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff80583c1c349 BUGCHECK_P3: ffffef0e814b5708 BUGCHECK_P4: ffffef0e814b4f40 EXCEPTION_RECORD: ffffef0e814b5708 -- (.exr 0xffffef0e814b5708) ExceptionAddress: fffff80583c1c349 (dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x0000000000000089) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff CONTEXT: ffffef0e814b4f40 -- (.cxr 0xffffef0e814b4f40) rax=ffffb0064b9f0c00 rbx=fff7800aeba070e0 rcx=fffff80583c1c345 rdx=0000000004449060 rsi=ffff800ae6eab820 rdi=ffffef0e814b5a20 rip=fffff80583c1c349 rsp=ffffef0e814b5940 rbp=ffffef0e814b5a40 r8=ffffb0064b9f0c00 r9=0000000000000000 r10=fffff80583ec1010 r11=ffffef0e814b5ae8 r12=0000000000000000 r13=0000000000000000 r14=ffff800aef3828f0 r15=fffff80579525440 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x89: fffff805`83c1c349 488b4b08 mov rcx,qword ptr [rbx+8] ds:002b:fff7800a`eba070e8=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: League of Legends.exe READ_ADDRESS: fffff805794fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8057940f340: Unable to get Flags value from nt!KdVersionBlock fffff8057940f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffffffffffffff ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff EXCEPTION_STR: 0xc0000005 STACK_TEXT: ffffef0e`814b5940 fffff805`83c1c09c : fffff805`83c1c010 ffffb006`4b9cd010 ffff800a`ef3828f0 fffff805`79525440 : dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x89 ffffef0e`814b5af0 fffff805`78b034b5 : ffffb006`58181040 ffffb006`58181040 ffffb006`47ea4a20 ffffb006`00000000 : dxgkrnl!DxgkpDeferredDestructionWork+0x8c ffffef0e`814b5b70 fffff805`78aa29a5 : ffffb006`58181040 00000000`00000080 ffffb006`47ea3040 00000000`00000000 : nt!ExpWorkerThread+0x105 ffffef0e`814b5c10 fffff805`78bfc868 : ffffc280`68dd9180 ffffb006`58181040 fffff805`78aa2950 00000000`0051ba40 : nt!PspSystemThreadStartup+0x55 ffffef0e`814b5c60 00000000`00000000 : ffffef0e`814b6000 ffffef0e`814b0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+89 MODULE_NAME: dxgkrnl IMAGE_NAME: dxgkrnl.sys IMAGE_VERSION: 10.0.19041.630 STACK_COMMAND: .cxr 0xffffef0e814b4f40 ; kb BUCKET_ID_FUNC_OFFSET: 89 FAILURE_BUCKET_ID: AV_dxgkrnl!DXGDEVICE::DestroyDeferredAllocations OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {45df0bc6-82f3-598c-4946-f8766b610aa4} Followup: MachineOwner --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff804625ddb7a, The address that the exception occurred at Arg3: ffff8d055030db88, Exception Record Address Arg4: ffff8d055030d3c0, Context Record Address Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : AV.Dereference Value: NullClassPtr Key : AV.Fault Value: Read Key : Analysis.CPU.mSec Value: 7030 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 28192 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff804625ddb7a BUGCHECK_P3: ffff8d055030db88 BUGCHECK_P4: ffff8d055030d3c0 EXCEPTION_RECORD: ffff8d055030db88 -- (.exr 0xffff8d055030db88) ExceptionAddress: fffff804625ddb7a (dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x0000000000000036) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000008 Attempt to read from address 0000000000000008 CONTEXT: ffff8d055030d3c0 -- (.cxr 0xffff8d055030d3c0) rax=ffff526e779f29eb rbx=ffffbd0b398ef748 rcx=0000000000000000 rdx=ffffbd0b398ef708 rsi=ffffbd0b32bb4ef0 rdi=ffffad098d903000 rip=fffff804625ddb7a rsp=ffff8d055030ddc0 rbp=ffffad098d903000 r8=ffff8d055030dda0 r9=00000000ffffffff r10=fffff8044f4dbb10 r11=ffffbd0b32bb4ef0 r12=0000000000000000 r13=ffffbd0b3ceb6610 r14=ffffbd0b398ef708 r15=ffffbd0b398ef738 iopl=0 nv up ei ng nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286 dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x36: fffff804`625ddb7a 4c8b6108 mov r12,qword ptr [rcx+8] ds:002b:00000000`00000008=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System READ_ADDRESS: fffff8044fefb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8044fe0f340: Unable to get Flags value from nt!KdVersionBlock fffff8044fe0f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000008 ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000008 EXCEPTION_STR: 0xc0000005 STACK_TEXT: ffff8d05`5030ddc0 fffff804`625d4448 : 00000000`00000000 fffff804`6257241b ffffbd0b`398ef748 fffff804`00000003 : dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x36 ffff8d05`5030e250 fffff804`625d270b : ffffbd0b`32bb4dd0 ffffad09`8d903001 ffffbd0b`32bb4ef0 ffffad09`8abe3d80 : dxgmms2!VIDMM_GLOBAL::MakeVirtualAddressRangeNotResident+0xc0 ffff8d05`5030e2b0 fffff804`625f25a6 : ffffad09`927eab10 ffffad09`8d903000 ffffbd0b`3ceb6600 ffffbd0b`32bb4dd0 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0x23b ffff8d05`5030e300 fffff804`625f2489 : ffffbd0b`40757dc0 00000000`00001805 ffffbd0b`3ceb6610 ffffbd0b`3ceb6610 : dxgmms2!VIDMM_GLOBAL::EvictOneAllocation+0xc6 ffff8d05`5030e350 fffff804`625f2344 : ffffbd0b`40757dc0 00000003`00000000 ffff8d4b`00000000 ffffbd0b`3ceb6610 : dxgmms2!VIDMM_PAGE_TABLE::EvictPageTable+0x81 ffff8d05`5030e390 fffff804`625f22d9 : 00000000`0000000c fffff804`4f4c0000 ffffbd0b`3eb5cc50 00000000`00001805 : dxgmms2!VIDMM_PAGE_TABLE::DestroyPageTable+0x30 ffff8d05`5030e410 fffff804`625f2255 : 00000000`0000300a 00000000`00000200 00000000`00000000 00000000`00000002 : dxgmms2!VIDMM_PAGE_DIRECTORY::DestroyPdePageTableData+0x49 ffff8d05`5030e440 fffff804`625dfb20 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00300a00 : dxgmms2!VIDMM_PAGE_DIRECTORY::HandleFullPageTableCoverage+0xb1 ffff8d05`5030e4a0 fffff804`625deedc : ffffad09`8af7a968 ffffbd0b`3ceb6610 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0xbd0 ffff8d05`5030e610 fffff804`625e3693 : ffff9801`45f40180 fffff804`4f4c4a8a ffffad09`927e8458 ffffbd0b`39e607c0 : dxgmms2!CVirtualAddressAllocator::UncommitVirtualAddressRange+0xf4 ffff8d05`5030e720 fffff804`625e3631 : 00000000`00000000 ffffbd0b`39e607c0 ffffbd0b`3ceb6601 fffff804`4f4de1f7 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRangeSystemCommand+0x3f ffff8d05`5030e750 fffff804`625cec77 : ffffbd0b`3cf93b90 00000000`00000000 ffffbd0b`3ceb6610 ffff8d05`5030e8e0 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRange+0x71 ffff8d05`5030e7e0 fffff804`625e2f6f : 00000000`00000078 ffffbd0b`34b61970 00000000`403b0088 00000003`00630000 : dxgmms2!VIDMM_GLOBAL::FreeGpuVirtualAddressSystemCommand+0xff ffff8d05`5030e880 fffff804`625fa5d2 : ffffbd0b`300e0e40 ffffad09`00000001 00000000`00000001 ffffbd0b`304e6b50 : dxgmms2!VIDMM_GLOBAL::processSystemCommand+0x27b ffff8d05`5030ea00 fffff804`62603e99 : ffffbd0b`304e6ae0 ffffad09`8d602001 00000000`00000000 00000000`05784a00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x1462 ffff8d05`5030ebe0 fffff804`4f4a29a5 : ffffad09`8d6020c0 fffff804`62603e90 ffffbd0b`304e6ae0 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9 ffff8d05`5030ec10 fffff804`4f5fc868 : ffff9801`45f40180 ffffad09`8d6020c0 fffff804`4f4a2950 00104ce0`00000001 : nt!PspSystemThreadStartup+0x55 ffff8d05`5030ec60 00000000`00000000 : ffff8d05`5030f000 ffff8d05`50309000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+36 MODULE_NAME: dxgmms2 IMAGE_NAME: dxgmms2.sys IMAGE_VERSION: 10.0.19041.1124 STACK_COMMAND: .cxr 0xffff8d055030d3c0 ; kb BUCKET_ID_FUNC_OFFSET: 36 FAILURE_BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {8a5a6ede-7f3e-54bf-1b01-58a4c8fbd710} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80666ac2f09, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3124 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-G25IS1E Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 4179 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff80666ac2f09 BUGCHECK_P3: 0 BUGCHECK_P4: ffffffffffffffff READ_ADDRESS: fffff806674fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8066740f340: Unable to get Flags value from nt!KdVersionBlock fffff8066740f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffffffffffffff EXCEPTION_PARAMETER2: ffffffffffffffff BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: League of Legends.exe BAD_STACK_POINTER: ffffc3817e721158 STACK_TEXT: ffffc381`7e721158 fffff806`66cf451e : 00000000`0000001e ffffffff`c0000005 fffff806`66ac2f09 00000000`00000000 : nt!KeBugCheckEx ffffc381`7e721160 fffff806`66bfe0d2 : fffff806`66cf44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22 ffffc381`7e7211a0 fffff806`66a52db7 : ffffc381`7e721710 00000000`00000000 ffffa889`be692fb0 fffff806`66bfc255 : nt!RtlpExecuteHandlerForException+0x12 ffffc381`7e7211d0 fffff806`66a519a6 : ffffa889`be692858 ffffc381`7e721e20 ffffa889`be692858 fff7d50c`2d675968 : nt!RtlDispatchException+0x297 ffffc381`7e7218f0 fffff806`66bf60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186 ffffc381`7e721fb0 fffff806`66bf6070 : fffff806`66c072a5 00000000`00000000 ffffc381`7e701180 00000000`00000fff : nt!KxExceptionDispatchOnExceptionStack+0x12 ffffa889`be692718 fffff806`66c072a5 : 00000000`00000000 ffffc381`7e701180 00000000`00000fff 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue ffffa889`be692720 fffff806`66c02fe0 : 00000002`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125 ffffa889`be692900 fffff806`66ac2f09 : 00000000`00000000 00000000`00000000 00000002`00001000 00000000`00000008 : nt!KiGeneralProtectionFault+0x320 ffffa889`be692a90 fffff806`66ac2e97 : 00000000`0002202c ffffa889`be692e02 ffffa889`be692cb8 00000000`00400a02 : nt!IopfCompleteRequest+0x59 ffffa889`be692b80 fffff806`739277a9 : 00000000`00000000 ffffd50c`2d6757c0 00000000`00000000 ffffd50c`00000002 : nt!IofCompleteRequest+0x17 ffffa889`be692bb0 fffff806`7392884e : 00000000`00000004 ffffa889`be692e60 ffffc381`7e701180 ffffc381`7e701180 : afd!AfdCompletePollIrp+0x9d ffffa889`be692c00 fffff806`66abf682 : ffffd50c`301d70d0 ffffc381`7e701180 ffffa889`be692e68 ffffc381`00000002 : afd!AfdTimeoutPoll+0x2e ffffa889`be692c30 fffff806`66ae4a2d : ffffc381`7e701180 00070000`00000000 00000000`00000008 00000000`0002202c : nt!KiProcessExpiredTimerList+0x172 ffffa889`be692d20 fffff806`66bfc255 : 00000000`00000000 ffffc381`7e701180 ffffd50c`210cdc40 00000000`19c4fce4 : nt!KiRetireDpcList+0x5dd ffffa889`be692fb0 fffff806`66bfc040 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5 ffffa889`c1102ac0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue SYMBOL_NAME: afd!AfdCompletePollIrp+9d MODULE_NAME: afd IMAGE_NAME: afd.sys IMAGE_VERSION: 10.0.19041.508 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9d FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee} Followup: MachineOwner ---------
Kod:Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2209] BiosMajorRelease = 5 BiosMinorRelease = 14 BiosVendor = American Megatrends Inc. BiosVersion = 4.30 BiosReleaseDate = 03/06/2019 SystemManufacturer = Micro-Star International Co., Ltd. SystemProductName = MS-7B84 SystemFamily = To be filled by O.E.M. SystemVersion = 2.0 SystemSKU = To be filled by O.E.M. BaseBoardManufacturer = Micro-Star International Co., Ltd. BaseBoardProduct = B450M PRO-M2 V2 (MS-7B84) BaseBoardVersion = 2.0
Peki başka mavi ekran aldınız mı? Eğer aldıysanız minidump dosyanı paylaş. Testi yaparken XMP kapalı mıydı?
O zaman XMP kapalı bir şekilde tekrar test yapalım ve aynı şekil sonuçları paylaşın.
Bilgisayara geçince minidump paylaşmayı unutma sakın.