MEMORY_MANAGEMENT Mavi Ekran Hatası

Kazimdlmenk

Picopat
Katılım
2 Kasım 2020
Mesajlar
82
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Merhaba, sürücülerimi DDU ile sildim. Sonra yükledim, gene mavi ekran veriyor. Minidump dosyalarımı atıyorum. İncelerseniz sevinirim.

 
Son düzenleyen: Moderatör:
Son düzenleyen: Moderatör:
Konu 8 sayfaya ulşamış, ayrıntılı sistem özellikleri yok, RAM testi yok...

  • Bütün dökümlere baktım. Sorun bellek kaynaklı gibi. Senin yapacağın ilk iş bellek testi yapmak. Sana linki atılmış, açılmadı diye yazmışsın. Açılamayan nedir güzel kardeşim? Yazacaksın. Bu testi yap ve sonucunu paylaş: Memtest86 USB'den Çalışan RAM Test Programı
  • Nerede ayrıntılı PC özelliklerin? Her şeyi taksit taksit yazıyorsun. Tamamını yaz
  • CPU-Z çalıştır ve SPD kısmından ekran görüntüleri koy. Buraya koy, MediaFire'a değil.
Genel hatalar, daha çok bellek şüphesi oluşturan:

Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80430248799, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4405

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 16782

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80430248799

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff80430cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80430c0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80430c0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

EXCEPTION_PARAMETER2: ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

BAD_STACK_POINTER: ffffbb81b2121158

STACK_TEXT:
ffffbb81`b2121158 fffff804`304f4b0e : 00000000`0000001e ffffffff`c0000005 fffff804`30248799 00000000`00000000 : nt!KeBugCheckEx
ffffbb81`b2121160 fffff804`303fe642 : fffff804`304f4aec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffbb81`b21211a0 fffff804`3032bf97 : ffffbb81`b2121710 00000000`00000000 fffffa87`a308bc60 fffff804`303f92ee : nt!RtlpExecuteHandlerForException+0x12
ffffbb81`b21211d0 fffff804`3032ab86 : fffffa87`a308b508 ffffbb81`b2121e20 fffffa87`a308b508 fff7e385`de373968 : nt!RtlDispatchException+0x297
ffffbb81`b21218f0 fffff804`303f6612 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffbb81`b2121fb0 fffff804`303f65e0 : fffff804`304078a5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffa87`a308b3c8 fffff804`304078a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffa87`a308b3d0 fffff804`304035e0 : 00000000`00000000 fffff804`303089f3 ffffe385`d606b7c0 fffffa87`a308b6ac : nt!KiExceptionDispatch+0x125
fffffa87`a308b5b0 fffff804`30248799 : 00000004`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
fffffa87`a308b740 fffff804`30248727 : 00000000`00000001 ffffbb81`b2101102 fffff804`30c248a0 ffffe385`d9e37080 : nt!IopfCompleteRequest+0x59
fffffa87`a308b830 fffff804`3c6577a9 : 00000000`00000000 ffffe385`de3737c0 00000000`00000000 ffffe385`00000002 : nt!IofCompleteRequest+0x17
fffffa87`a308b860 fffff804`3c65884e : 00000000`00000004 ffffe385`d1982800 ffffbb81`b2101180 fffffa87`a308bb10 : afd!AfdCompletePollIrp+0x9d
fffffa87`a308b8b0 fffff804`30244f12 : ffffe385`d1982840 ffffbb81`b2101180 ffffbb81`b2101180 00000000`00000002 : afd!AfdTimeoutPoll+0x2e
fffffa87`a308b8e0 fffff804`30206eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00083141 : nt!KiProcessExpiredTimerList+0x172
fffffa87`a308b9d0 fffff804`303f92ee : ffffffff`00000000 ffffbb81`b2101180 ffffbb81`b210c340 ffffe385`d6ba6080 : nt!KiRetireDpcList+0x5dd
fffffa87`a308bc60 00000000`00000000 : fffffa87`a308c000 fffffa87`a3086000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: afd!AfdCompletePollIrp+9d

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9d

FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee}

Followup: MachineOwner
---------

8: kd> lmvm afd
Browse full module list
start end module name
fffff804`3c600000 fffff804`3c6a3000 afd # (pdb symbols) C:\ProgramData\Dbg\sym\afd.pdb\92BCCD248D3505B26C05ADECC513503E1\afd.pdb
Loaded symbol image file: afd.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\afd.sys\CC0C9B73a3000\afd.sys
Image path: \SystemRoot\system32\drivers\afd.sys
Image name: afd.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: CC0C9B73 (This is a reproducible build file hash, not a timestamp)
CheckSum: 000A334A
ImageSize: 000A3000
File version: 10.0.19041.508
Product version: 10.0.19041.508
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: afd.sys
OriginalFilename: afd.sys
ProductVersion: 10.0.19041.508
FileVersion: 10.0.19041.508 (WinBuild.160101.0800)
FileDescription: Ancillary Function Driver for WinSock
LegalCopyright: © Microsoft Corporation. All rights reserved.

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801114c2f09, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3999

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 6072

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff801114c2f09

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff80111efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80111e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80111e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

EXCEPTION_PARAMETER2: ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

BAD_STACK_POINTER: ffffb900a4521158

STACK_TEXT:
ffffb900`a4521158 fffff801`116f451e : 00000000`0000001e ffffffff`c0000005 fffff801`114c2f09 00000000`00000000 : nt!KeBugCheckEx
ffffb900`a4521160 fffff801`115fe0d2 : fffff801`116f44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffb900`a45211a0 fffff801`11452db7 : ffffb900`a4521710 00000000`00000000 fffff48f`0628bc60 fffff801`115f8d7e : nt!RtlpExecuteHandlerForException+0x12
ffffb900`a45211d0 fffff801`114519a6 : fffff48f`0628b508 ffffb900`a4521e20 fffff48f`0628b508 fff7ca08`70243fa8 : nt!RtlDispatchException+0x297
ffffb900`a45218f0 fffff801`115f60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffb900`a4521fb0 fffff801`115f6070 : fffff801`116072a5 00000000`00008206 ffffb900`a45091c8 00000000`00008de3 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff48f`0628b3c8 fffff801`116072a5 : 00000000`00008206 ffffb900`a45091c8 00000000`00008de3 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff48f`0628b3d0 fffff801`11602fe0 : 00000000`00000000 ffffb900`a4501180 00000000`00000fff fffff48f`0628b6ac : nt!KiExceptionDispatch+0x125
fffff48f`0628b5b0 fffff801`114c2f09 : 00000004`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
fffff48f`0628b740 fffff801`114c2e97 : 00000000`00000001 ffffb900`a4501102 00000000`00000003 ffffca08`6b1cf080 : nt!IopfCompleteRequest+0x59
fffff48f`0628b830 fffff801`1ec577a9 : 00000000`00000000 ffffca08`70243e00 00000000`00000000 ffffca08`6d680080 : nt!IofCompleteRequest+0x17
fffff48f`0628b860 fffff801`1ec5884e : 00000000`00000002 ffffca08`6c285de0 ffffb900`a4501180 fffff48f`0628bb10 : afd!AfdCompletePollIrp+0x9d
fffff48f`0628b8b0 fffff801`114bf682 : ffffca08`6c285e20 ffffb900`a4501180 ffffb900`a4501180 00000000`00000002 : afd!AfdTimeoutPoll+0x2e
fffff48f`0628b8e0 fffff801`114e4a2d : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0003d9e3 : nt!KiProcessExpiredTimerList+0x172
fffff48f`0628b9d0 fffff801`115f8d7e : ffffffff`00000000 ffffb900`a4501180 ffffb900`a450c340 ffffca08`647a2080 : nt!KiRetireDpcList+0x5dd
fffff48f`0628bc60 00000000`00000000 : fffff48f`0628c000 fffff48f`06286000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: afd!AfdCompletePollIrp+9d

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9d

FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee}

Followup: MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff8796b50ba351, Address of the instruction which caused the bugcheck
Arg3: fffffd8a2b8d7d20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5608

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 6659

Key : Analysis.Memory.CommitPeak.Mb
Value: 92

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff8796b50ba351

BUGCHECK_P3: fffffd8a2b8d7d20

BUGCHECK_P4: 0

CONTEXT: fffffd8a2b8d7d20 -- (.cxr 0xfffffd8a2b8d7d20)
rax=000000007fff386a rbx=ffff87b6c47dd1e0 rcx=fff787b6c47c9660
rdx=0000000000000000 rsi=ffff87b6c47dc8c8 rdi=0000000000000200
rip=ffff8796b50ba351 rsp=fffffd8a2b8d8720 rbp=ffff87b6c47dd228
r8=0000000000000000 r9=0000000000000000 r10=ffff8796b5af0070
r11=ffffe78207c97750 r12=0000000000000064 r13=0000000000000064
r14=ffff87b6c47dd214 r15=ffff87b6c47dd210
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
win32kfull!TimersProc+0x1e1:
ffff8796`b50ba351 488b91a0010000 mov rdx,qword ptr [rcx+1A0h] ds:002b:fff787b6`c47c9800=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: csrss.exe

STACK_TEXT:
fffffd8a`2b8d8720 ffff8796`b50b9e56 : 00000000`0000000f 00000000`053e856c 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x1e1
fffffd8a`2b8d87b0 ffff8796`b5b1ae33 : ffffe782`14867080 ffffe782`14867080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
fffffd8a`2b8d8970 ffff8796`b5058d20 : ffffe782`14867080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
fffffd8a`2b8d8aa0 ffff8796`b4eb474d : ffffe782`14867080 ffffe782`14867080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
fffffd8a`2b8d8ad0 fffff805`6e206bb8 : ffffe782`00000005 00000000`00000005 000001bc`71c04060 00000000`00001620 : win32k!NtUserCallNoParam+0x15
fffffd8a`2b8d8b00 00007fff`2e5b10e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b4`a89ff918 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2e5b10e4

SYMBOL_NAME: win32kfull!TimersProc+1e1

MODULE_NAME: win32kfull

IMAGE_NAME: win32kfull.sys

IMAGE_VERSION: 10.0.19041.631

STACK_COMMAND: .cxr 0xfffffd8a2b8d7d20 ; kb

BUCKET_ID_FUNC_OFFSET: 1e1

FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63}

Followup: MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8042c7fd147, The address that the exception occurred at
Arg3: ffffc101570bb8d8, Exception Record Address
Arg4: ffffc101570bb110, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 6968

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 10314

Key : Analysis.Memory.CommitPeak.Mb
Value: 89

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8042c7fd147

BUGCHECK_P3: ffffc101570bb8d8

BUGCHECK_P4: ffffc101570bb110

EXCEPTION_RECORD: ffffc101570bb8d8 -- (.exr 0xffffc101570bb8d8)
ExceptionAddress: fffff8042c7fd147 (nt!ExpInterlockedPopEntrySListFault)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: ffffc101570bb110 -- (.cxr 0xffffc101570bb110)
rax=0000000006790001 rbx=fffffd0000016030 rcx=fffffd0000016030
rdx=fff7c10156dc6ff0 rsi=0000000000000000 rdi=fffff8042d050c00
rip=fffff8042c7fd147 rsp=ffffc101570bbb10 rbp=0000000000000001
r8=fff7c10156dc6ff0 r9=0000000000000010 r10=fffffd0000016030
r11=fffff80432211a70 r12=0000000000000000 r13=ffffffffffffffe0
r14=0000000000000001 r15=0000000000000001
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!ExpInterlockedPopEntrySListFault:
fffff804`2c7fd147 498b08 mov rcx,qword ptr [r8] ds:002b:fff7c101`56dc6ff0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff8042d0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8042d00f340: Unable to get Flags value from nt!KdVersionBlock
fffff8042d00f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffffc101`570bbb10 fffff804`2c60da64 : ffff8c23`00000001 00000000`00000000 ffffc101`570bbc10 ffffc101`570bbbb0 : nt!ExpInterlockedPopEntrySListFault
ffffc101`570bbb20 fffff804`2c60d6fa : 00000000`00000012 00000000`00000004 00000000`0003d000 fffff804`2c6bc2e3 : nt!MmCreateKernelStack+0x104
ffffc101`570bbbc0 fffff804`2c60d5c2 : fffff804`3221f9b0 ffffc101`570bbdb8 ffffc101`570bbf04 ffffb089`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0xca
ffffc101`570bbc60 fffff804`2c60d423 : ffffc101`570bbf00 00000000`00000002 00000000`00000000 ffffb089`24025030 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2
ffffc101`570bbcd0 fffff804`2c60d3dd : fffff804`3221f9b0 ffffc101`570bbdb8 ffffb089`298ce538 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x33
ffffc101`570bbd40 fffff804`32208380 : ffffb089`298ce538 fffff804`32207ed5 ffffb089`298ce504 ffffb089`2d9f1460 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffc101`570bbd80 fffff804`32206d71 : ffffc101`570bbe40 ffffc50a`f50f1170 ffffb089`298ce538 00000000`00100000 : Ntfs!NtfsMultipleAsync+0x140
ffffc101`570bbe00 fffff804`32213b67 : 00000000`00000000 ffffc50a`f50f1200 00000000`00000000 00000000`00000000 : Ntfs!NtfsNonCachedIo+0x431
ffffc101`570bc0c0 fffff804`32212de3 : ffffb089`298ce538 ffffb089`2d9f1460 ffffc101`570bc360 00000000`00000000 : Ntfs!NtfsCommonWrite+0xb07
ffffc101`570bc2f0 fffff804`2c6cd6c5 : ffffb089`27e2ea20 ffffb089`2d9f1460 ffffb089`2d9f1460 ffffb089`21f1fd60 : Ntfs!NtfsFsdWrite+0x1d3
ffffc101`570bc3c0 fffff804`2bf26ccf : 00000000`00000768 33333333`00000000 ffffb089`27e3d510 fffff804`2c6c8cfc : nt!IofCallDriver+0x55
ffffc101`570bc400 fffff804`2bf248d3 : ffffc101`570bc490 ffffb089`2ec1d010 00000000`00000140 00000000`00000768 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffc101`570bc470 fffff804`2c6cd6c5 : ffffb089`2d9f1460 fffff804`2c6cd707 00000000`0000000c 00000000`00000004 : FLTMGR!FltpDispatch+0xa3
ffffc101`570bc4d0 fffff804`2c71a1df : ffffb089`2ec1d010 ffffb089`2d9f1460 ffffb089`2f261c80 ffffc101`570bc590 : nt!IofCallDriver+0x55
ffffc101`570bc510 fffff804`2c68b590 : 00000000`00000000 ffffc101`570bc5b0 ffffb089`2f261c80 fffff804`2c71dc5d : nt!IoSynchronousPageWriteEx+0x13b
ffffc101`570bc550 fffff804`2c6f7ae2 : 00000000`00000011 ffffc50a`eceb8000 00000000`00100000 fffffa00`00592410 : nt!MiIssueSynchronousFlush+0x70
ffffc101`570bc5d0 fffff804`2c70d391 : ffffc101`546c3a88 ffffc101`546c3a88 00000000`00000000 00000000`00000000 : nt!MiFlushSectionInternal+0x862
ffffc101`570bc8a0 fffff804`2c70a08a : 00000000`0045c70c ffffb089`28d8c040 00000000`00100000 00000000`00100000 : nt!MmFlushSection+0xbd
ffffc101`570bc950 fffff804`2c70ab74 : ffffb089`2f6335f8 00000000`00000000 00000000`00000001 00000000`00000000 : nt!CcFlushCachePriv+0x42a
ffffc101`570bca90 fffff804`2c7034b5 : ffffb089`2966b5f0 fffff804`2ca12300 ffffb089`1e66ca01 ffffb089`00000000 : nt!CcWriteBehindInternal+0x1f4
ffffc101`570bcb70 fffff804`2c6a29a5 : ffffb089`28d8c040 00000000`00000080 ffffb089`1e686040 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffc101`570bcc10 fffff804`2c7fc868 : ffff9b80`0ff40180 ffffb089`28d8c040 fffff804`2c6a2950 00000000`0394bae0 : nt!PspSystemThreadStartup+0x55
ffffc101`570bcc60 00000000`00000000 : ffffc101`570bd000 ffffc101`570b7000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: nt!MmCreateKernelStack+104

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .cxr 0xffffc101570bb110 ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 104

FAILURE_BUCKET_ID: AV_nt!MmCreateKernelStack

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c83a01d5-aa3b-3796-2ad9-7e419fd13a54}

Followup: MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80767ccd612, Address of the instruction which caused the bugcheck
Arg3: ffff850e1f0eced0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5015

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 6529

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80767ccd612

BUGCHECK_P3: ffff850e1f0eced0

BUGCHECK_P4: 0

CONTEXT: ffff850e1f0eced0 -- (.cxr 0xffff850e1f0eced0)
rax=fff7c08fc9fb7a70 rbx=0000000000222017 rcx=ffffc08fd64c3e30
rdx=ffff850e1f0eda30 rsi=0000000000040000 rdi=ffffc08fd64c3e30
rip=fffff80767ccd612 rsp=ffff850e1f0ed8d8 rbp=ffff850e1f0edb80
r8=0000000000000000 r9=ffff850e1f0eda40 r10=0000000000000000
r11=ffffe70528354b80 r12=0000000000000000 r13=0000000000000003
r14=ffffc08fd64c3e80 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!IoGetRelatedDeviceObject+0x42:
fffff807`67ccd612 488b4038 mov rax,qword ptr [rax+38h] ds:002b:fff7c08f`c9fb7aa8=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: audiodg.exe

STACK_TEXT:
ffff850e`1f0ed8d8 fffff807`680c1acb : 00000000`00222017 00000000`00000000 00000000`00000000 ffffc08f`d64c3e30 : nt!IoGetRelatedDeviceObject+0x42
ffff850e`1f0ed8e0 fffff807`680c17f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x2bb
ffff850e`1f0eda20 fffff807`67e06bb8 : 00000000`00000000 ffff850e`1f0edb80 ffff850e`1f0edaa8 ffffc08f`d32f71f0 : nt!NtDeviceIoControlFile+0x56
ffff850e`1f0eda90 00007ffe`c32cbe84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000027`b7c7fa88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c32cbe84

SYMBOL_NAME: nt!IopXxxControlFile+2bb

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .cxr 0xffff850e1f0eced0 ; kb

BUCKET_ID_FUNC_OFFSET: 2bb

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopXxxControlFile

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {657bb511-7f5c-7ddc-acd3-e126b6d359c8}

Followup: MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800278cd0d6, The address that the exception occurred at
Arg3: ffffd5032a33ef38, Exception Record Address
Arg4: ffff9901c08d2920, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 3655

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 5793

Key : Analysis.Memory.CommitPeak.Mb
Value: 80

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff800278cd0d6

BUGCHECK_P3: ffffd5032a33ef38

BUGCHECK_P4: ffff9901c08d2920

EXCEPTION_RECORD: ffffd5032a33ef38 -- (.exr 0xffffd5032a33ef38)
ExceptionAddress: fffff800278cd0d6 (nt!ExpAddTagForBigPages+0x0000000000000106)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: ffff9901c08d2920 -- (.cxr 0xffff9901c08d2920)
rax=0000000000030000 rbx=00002d22d6751c77 rcx=fff7c48f5743ab28
rdx=fff7c48f57410000 rsi=0000000000000000 rdi=ffffc48f5e4cb000
rip=fffff800278cd0d6 rsp=ffffd5032a33f170 rbp=ffffd5032a33f2c1
r8=fff7c48f5743ab28 r9=fffff80028323100 r10=0000000000010000
r11=fff7c48f57590000 r12=00002d22d6753155 r13=0000000000000600
r14=0000000000000000 r15=0000000000000002
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00250206
nt!ExpAddTagForBigPages+0x106:
fffff800`278cd0d6 488b01 mov rax,qword ptr [rcx] ds:002b:fff7c48f`5743ab28=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: League of Legends.exe

READ_ADDRESS: fffff800282fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8002820f340: Unable to get Flags value from nt!KdVersionBlock
fffff8002820f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

EXCEPTION_STR: 0xc0000005

BAD_STACK_POINTER: ffff9901c08d20e8

STACK_TEXT:
ffffd503`2a33f170 fffff800`278cadd0 : ffffc48f`5e4cb000 00000000`73576d4d 00000000`00001000 00000000`00000600 : nt!ExpAddTagForBigPages+0x106
ffffd503`2a33f1e0 fffff800`278ca64f : 000001ce`32423fff 00000000`00000003 ffffbbdd`73576d4d ffffbbdd`eef77bb8 : nt!ExAllocateHeapPool+0x750
ffffd503`2a33f320 fffff800`27950be6 : 00000000`80000000 00000000`00001000 00000000`73576d4d ffffc48f`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffd503`2a33f370 fffff800`278d8187 : 00000000`00000000 00000000`00000001 00000000`00000419 00000000`00000000 : nt!MiAllocatePool+0x86
ffffd503`2a33f3c0 fffff800`278d7739 : 0000002d`00000029 00000021`00000033 0000001b`00000014 0000001b`0000002a : nt!MiAgeWorkingSet+0x527
ffffd503`2a33f8d0 fffff800`278d6f47 : 00000000`00000000 ffffd503`2a33fa80 ffffd503`2a33fa40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffd503`2a33f9c0 fffff800`27808e60 : fffff800`28250c00 ffffd503`2a33fa80 00000000`00000d9e ffff9901`00020200 : nt!MiProcessWorkingSets+0x227
ffffd503`2a33fa60 fffff800`279b4847 : 00000000`00000006 00000000`00000006 00000000`ffffffff ffff9901`c0701180 : nt!MiWorkingSetManager+0x110
ffffd503`2a33fb20 fffff800`278a29a5 : ffffc48f`4fcab040 00000000`00000080 fffff800`279b46f0 00000000`00001b82 : nt!KeBalanceSetManager+0x157
ffffd503`2a33fc10 fffff800`279fc868 : ffff9901`c0701180 ffffc48f`4fcab040 fffff800`278a2950 00000000`00001b87 : nt!PspSystemThreadStartup+0x55
ffffd503`2a33fc60 00000000`00000000 : ffffd503`2a340000 ffffd503`2a33a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: nt!ExpAddTagForBigPages+106

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .cxr 0xffff9901c08d2920 ; kb

BUCKET_ID_FUNC_OFFSET: 106

FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!ExpAddTagForBigPages

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f78a0a54-5c29-0f5d-f796-c10730dbc37e}

Followup: MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80082ec2f09, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4421

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 6774

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80082ec2f09

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff800838fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8008380f340: Unable to get Flags value from nt!KdVersionBlock
fffff8008380f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

EXCEPTION_PARAMETER2: ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: mscorsvw.exe

BAD_STACK_POINTER: ffff9c0127121158

STACK_TEXT:
ffff9c01`27121158 fffff800`830f451e : 00000000`0000001e ffffffff`c0000005 fffff800`82ec2f09 00000000`00000000 : nt!KeBugCheckEx
ffff9c01`27121160 fffff800`82ffe0d2 : fffff800`830f44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffff9c01`271211a0 fffff800`82e52db7 : ffff9c01`27121710 00000000`00000000 ffffbe09`5ce92fb0 fffff800`82ffc255 : nt!RtlpExecuteHandlerForException+0x12
ffff9c01`271211d0 fffff800`82e519a6 : ffffbe09`5ce92858 ffff9c01`27121e20 ffffbe09`5ce92858 fff7828b`359d2c28 : nt!RtlDispatchException+0x297
ffff9c01`271218f0 fffff800`82ff60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffff9c01`27121fb0 fffff800`82ff6070 : fffff800`830072a5 00000000`0005d712 ffff9c01`271091c8 00000000`00067a81 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffbe09`5ce92718 fffff800`830072a5 : 00000000`0005d712 ffff9c01`271091c8 00000000`00067a81 00000000`00000001 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffbe09`5ce92720 fffff800`83002fe0 : 00000000`00000000 fffff800`82e7eb14 ffff9c01`27ad8020 ffffbe09`5ce929fc : nt!KiExceptionDispatch+0x125
ffffbe09`5ce92900 fffff800`82ec2f09 : 00000008`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffffbe09`5ce92a90 fffff800`82ec2e97 : 00000000`00000001 ffff9c01`27101102 00000000`00000003 ffff828b`2e7a22c0 : nt!IopfCompleteRequest+0x59
ffffbe09`5ce92b80 fffff800`8f9777a9 : 00000000`00000000 ffff828b`359d2a80 00000000`00000000 ffff828b`00000002 : nt!IofCompleteRequest+0x17
ffffbe09`5ce92bb0 fffff800`8f97884e : 00000000`00000002 ffff828b`20f7b440 ffff9c01`27101180 ffffbe09`5ce92e60 : afd!AfdCompletePollIrp+0x9d
ffffbe09`5ce92c00 fffff800`82ebf682 : ffff828b`20f7b480 ffff9c01`27101180 ffff9c01`27101180 ffff9c01`00000002 : afd!AfdTimeoutPoll+0x2e
ffffbe09`5ce92c30 fffff800`82ee4a2d : ffff9c01`27101180 000b5418`00000000 00000000`00000008 00000000`00303b4e : nt!KiProcessExpiredTimerList+0x172
ffffbe09`5ce92d20 fffff800`82ffc255 : 00087415`06040603 ffff9c01`27101180 ffff828b`206cdc40 00000000`00000210 : nt!KiRetireDpcList+0x5dd
ffffbe09`5ce92fb0 fffff800`82ffc040 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffbe09`5eb09190 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue

SYMBOL_NAME: afd!AfdCompletePollIrp+9d

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9d

FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee}

Followup: MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80612052f48, Address of the instruction which caused the bugcheck
Arg3: ffffd9806ad9b920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5015

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 15312

Key : Analysis.Memory.CommitPeak.Mb
Value: 82

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80612052f48

BUGCHECK_P3: ffffd9806ad9b920

BUGCHECK_P4: 0

CONTEXT: ffffd9806ad9b920 -- (.cxr 0xffffd9806ad9b920)
rax=ffff800d53a57f20 rbx=ffff800d537ccb90 rcx=fff7800d4ec4ce30
rdx=ffff800d53a57a60 rsi=ffff800d56a47d80 rdi=fffff80624794500
rip=fffff80612052f48 rsp=ffffd9806ad9c320 rbp=ffffd9806ad9c3d9
r8=000000000000000f r9=ffff800d4ee1e7f0 r10=fffff80612052f00
r11=fffff806247947a0 r12=ffff800d4eb6b9f8 r13=ffff800d537ccbd0
r14=ffff800d56278b50 r15=ffff800d537ccb20
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
nt!IofCallDriver+0x48:
fffff806`12052f48 4a8b44c170 mov rax,qword ptr [rcx+r8*8+70h] ds:002b:fff7800d`4ec4cf18=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: audiodg.exe

STACK_TEXT:
ffffd980`6ad9c320 fffff806`24794eea : ffff800d`56a47d80 ffff800d`537ccb90 ffff800d`56a47d80 ffffd980`6ad9c3d9 : nt!IofCallDriver+0x48
ffffd980`6ad9c360 fffff806`24795369 : ffff800d`56278b50 fffff806`24794500 00000000`00000000 00000000`00000000 : usbaudio!USBType1BuildIsochUrbRequest+0x616
ffffd980`6ad9c440 fffff806`24795466 : ffff800d`56278b50 00000000`00000000 00000000`00000000 00000000`00000001 : usbaudio!USBType1ProcessStreamPointer+0x161
ffffd980`6ad9c4a0 fffff806`247b237d : ffff800d`53bdb380 ffff800d`53bdb288 00000000`00000000 00000000`00000000 : usbaudio!USBType1ProcessPin+0xd6
ffffd980`6ad9c4d0 fffff806`242a417b : ffff800d`53bdb200 00000000`00000000 ffff800d`5566c800 fffff806`242cce00 : usbaudio!PinProcess+0x6d
ffffd980`6ad9c510 fffff806`242a4fa6 : 00000000`00000000 00000000`40000010 00000000`00000000 ffff800d`53bdb288 : ks!CKsPin::processingObjectWork+0x8b
ffffd980`6ad9c550 fffff806`242a1ba3 : ffff800d`59459ee0 ffff800d`59459ee0 00000000`00000001 ffff800d`52903110 : ks!CKsPin::process+0x66
ffffd980`6ad9c580 fffff806`242a12da : ffff800d`52903000 ffff800d`57ddd9d8 00000000`00000000 ffff800d`52903010 : ks!CKsQueue::AddFrame+0x1d3
ffffd980`6ad9c5d0 fffff806`242c9bd3 : 00000000`00000000 ffff800d`53bdb280 ffffd980`6ad9c6d0 ffffa001`081dd080 : ks!CKsQueue::TransferKsIrp+0x2ca
ffffd980`6ad9c670 fffff806`242cd513 : ffff800d`53690a20 00000000`00000000 00000000`00000000 ffff800d`4ee25b30 : ks!CKsPin::DispatchDeviceIoControl+0x1e3
ffffd980`6ad9c6c0 fffff806`247b13a3 : ffff800d`53690a20 ffff800d`4ee25b30 ffff800d`53690f28 ffff800d`4ecfbdf0 : ks!KsDispatchIrp+0x43
ffffd980`6ad9c6f0 fffff806`12052f55 : ffff800d`53690a20 ffffd980`6ad9c7c0 ffff800d`53690f70 00000000`00000000 : usbaudio!UsbAudioIrpDispatcher+0x143
ffffd980`6ad9c730 fffff806`245316bf : ffff800d`53690a20 ffffd980`6ad9c7c0 ffff800d`53690f70 ffff800d`4ecfbdf0 : nt!IofCallDriver+0x55
ffffd980`6ad9c770 fffff806`24531023 : ffff800d`53690a20 00000000`00000000 00000000`00000000 ffff800d`559e49b0 : ksthunk!CKernelFilterDevice::DispatchIrp+0x23b
ffffd980`6ad9c7d0 fffff806`12052f55 : 00000000`00000000 00000000`00000548 ffffd980`6ad9cb80 00000000`00000001 : ksthunk!CKernelFilterDevice::DispatchIrpBridge+0x13
ffffd980`6ad9c800 fffff806`123fd518 : ffff800d`53690a20 00000000`00000000 00000000`00000000 00000000`00000001 : nt!IofCallDriver+0x55
ffffd980`6ad9c840 fffff806`123fcde5 : 00000000`00000000 ffffd980`6ad9cb80 00000000`00040000 ffffd980`6ad9cb80 : nt!IopSynchronousServiceTail+0x1a8
ffffd980`6ad9c8e0 fffff806`123fc7e6 : 00000000`00000001 00000000`00000548 00000000`00000000 000002b6`3d220710 : nt!IopXxxControlFile+0x5e5
ffffd980`6ad9ca20 fffff806`122071b8 : 00000000`00000000 00000000`00000000 00000000`00000548 fffff806`124b9c00 : nt!NtDeviceIoControlFile+0x56
ffffd980`6ad9ca90 00007fff`b64ac094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f3`2f47f808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b64ac094

SYMBOL_NAME: usbaudio!USBType1BuildIsochUrbRequest+616

MODULE_NAME: usbaudio

IMAGE_NAME: usbaudio.sys

IMAGE_VERSION: 10.0.19041.388

STACK_COMMAND: .cxr 0xffffd9806ad9b920 ; kb

BUCKET_ID_FUNC_OFFSET: 616

FAILURE_BUCKET_ID: 0x3B_c0000005_usbaudio!USBType1BuildIsochUrbRequest

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {141bdf61-c952-61bf-008d-264ec009578d}

Followup: MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff85255fb9a351, Address of the instruction which caused the bugcheck
Arg3: ffff888fd1b4ed20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5359

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 5365

Key : Analysis.Memory.CommitPeak.Mb
Value: 92

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff85255fb9a351

BUGCHECK_P3: ffff888fd1b4ed20

BUGCHECK_P4: 0

CONTEXT: ffff888fd1b4ed20 -- (.cxr 0xffff888fd1b4ed20)
rax=000000007ffbe789 rbx=ffff8550055c47e0 rcx=fff78550054e5010
rdx=0000000000000000 rsi=ffff85500541ca08 rdi=0000000000000200
rip=ffff85255fb9a351 rsp=ffff888fd1b4f720 rbp=ffff8550055c4828
r8=0000000000000000 r9=0000000000000000 r10=ffff85255f860070
r11=ffff888fd1b4f790 r12=0000000000000148 r13=0000000000000148
r14=ffff8550055c4814 r15=ffff8550055c4810
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kfull!TimersProc+0x1e1:
ffff8525`5fb9a351 488b91a0010000 mov rdx,qword ptr [rcx+1A0h] ds:002b:fff78550`054e51b0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: csrss.exe

STACK_TEXT:
ffff888f`d1b4f720 ffff8525`5fb99e56 : 00000000`0000000f 00000000`000b2082 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x1e1
ffff888f`d1b4f7b0 ffff8525`5f88ae33 : ffffa50b`6e530080 ffffa50b`6e530080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
ffff888f`d1b4f970 ffff8525`5fb38d20 : ffffa50b`6e530080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff888f`d1b4faa0 ffff8525`6069474d : ffffa50b`6e530080 ffffa50b`6e530080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff888f`d1b4fad0 fffff801`46a06bb8 : ffffa50b`00000005 00000000`00000005 000001e9`7ec04060 00000000`000004ac : win32k!NtUserCallNoParam+0x15
ffff888f`d1b4fb00 00007ffd`bfb610e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000004c`2347fca8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`bfb610e4

SYMBOL_NAME: win32kfull!TimersProc+1e1

MODULE_NAME: win32kfull

IMAGE_NAME: win32kfull.sys

IMAGE_VERSION: 10.0.19041.631

STACK_COMMAND: .cxr 0xffff888fd1b4ed20 ; kb

BUCKET_ID_FUNC_OFFSET: 1e1

FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63}

Followup: MachineOwner
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000404, The subtype of the bugcheck.
Arg2: ffff9a7a03083338
Arg3: 8a00000082a8b963
Arg4: ffff9a7a03083330

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4093

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 8211

Key : Analysis.Memory.CommitPeak.Mb
Value: 82

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 404

BUGCHECK_P2: ffff9a7a03083338

BUGCHECK_P3: 8a00000082a8b963

BUGCHECK_P4: ffff9a7a03083330

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffff406`0cd3f888 fffff804`7e3016dd : 00000000`0000001a 00000000`00000404 ffff9a7a`03083338 8a000000`82a8b963 : nt!KeBugCheckEx
fffff406`0cd3f890 fffff804`7e303fe7 : fffff804`7ec4f3c0 00000000`00000000 00000000`00000000 fffff406`0cd3f958 : nt!MiDeleteValidSystemPage+0x5fd
fffff406`0cd3f930 fffff804`7e208a1e : 00000000`00000007 fffff804`7ec50c00 8a000000`82a8b963 00000000`00000006 : nt!MiDeleteKernelStack+0x107
fffff406`0cd3f9e0 fffff804`7e208946 : fffff406`0cd3fa38 fffff804`7ec50c00 fffff804`7ec4ee00 fffff804`7ec4ea18 : nt!MiDeleteCachedKernelStack+0x4a
fffff406`0cd3fa20 fffff804`7e208ecc : fffff804`7ec50c00 00000000`00000000 00000000`00000000 ffff9e8a`0524b010 : nt!MiAdjustCachedStacks+0x116
fffff406`0cd3fa60 fffff804`7e3b4847 : 00000000`00000007 00000000`00000007 00000000`ffffffff ffffc901`3df01180 : nt!MiWorkingSetManager+0x17c
fffff406`0cd3fb20 fffff804`7e2a29a5 : ffff9e8a`052ab040 00000000`00000080 fffff804`7e3b46f0 00000000`00001b82 : nt!KeBalanceSetManager+0x157
fffff406`0cd3fc10 fffff804`7e3fc868 : ffffc901`3df01180 ffff9e8a`052ab040 fffff804`7e2a2950 00000000`00001b87 : nt!PspSystemThreadStartup+0x55
fffff406`0cd3fc60 00000000`00000000 : fffff406`0cd40000 fffff406`0cd3a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: nt!MiDeleteValidSystemPage+5fd

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 5fd

FAILURE_BUCKET_ID: 0x1a_404_nt!MiDeleteValidSystemPage

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {57d19cf7-fb4a-adfd-0709-78f77073d319}

Followup: MachineOwner
---------

Ekran kartı şüphesi oluşturan hatalar:

Kod:
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000001bb62, page frame number
Arg3: 0000000000000000, current page state
Arg4: 060000000008cb62, 0

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3936

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 5124

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 4e

BUGCHECK_P1: 99

BUGCHECK_P2: 1bb62

BUGCHECK_P3: 0

BUGCHECK_P4: 60000000008cb62

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: LeagueClientUxRender.exe

STACK_TEXT:
ffffc78b`870faec8 fffff800`70bed1e7 : 00000000`0000004e 00000000`00000099 00000000`0001bb62 00000000`00000000 : nt!KeBugCheckEx
ffffc78b`870faed0 fffff800`70b4a172 : 00000000`0018c0e1 fffff800`71450c00 00000000`00000001 00000000`000000e1 : nt!MiBadShareCount+0x5b
ffffc78b`870faf10 fffff800`70b4a91e : 00000000`00000000 ffffc78b`870fb620 ffffde00`0009e448 ffffc78b`870fb570 : nt!MiDeletePteRun+0x17c2
ffffc78b`870fb120 fffff800`70ae9a1d : 00000000`00000000 ffff9c8f`a872f700 ffffc78b`870fb570 ffffde00`0009e440 : nt!MiDeleteVaTail+0x6e
ffffc78b`870fb150 fffff800`70ae963b : ffffde6f`00000000 ffff9c8f`a872f700 ffffc78b`00000000 ffffc78b`870fb5c0 : nt!MiWalkPageTablesRecursively+0xc6d
ffffc78b`870fb1f0 fffff800`70ae963b : ffffde6f`37800000 ffff9c8f`a872f700 ffffc78b`00000001 ffffc78b`870fb5d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc78b`870fb290 fffff800`70ae963b : ffffde6f`37800000 ffff9c8f`a872f700 ffffc78b`00000002 ffffc78b`870fb5e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc78b`870fb330 fffff800`70ad859b : 00000000`00000000 ffff9c8f`a872f700 00000000`00000003 ffffc78b`870fb5f0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc78b`870fb3d0 fffff800`70b4b541 : ffffc78b`870fb570 ffff9c8f`00000000 ffffde00`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffc78b`870fb4d0 fffff800`70b229a0 : 00000000`00000001 ffffc78b`00000000 ffff9c8f`a872f550 ffff9c8f`ab554080 : nt!MiDeletePagablePteRange+0x4f1
ffffc78b`870fb7e0 fffff800`70b1ae6f : 00000000`00013c88 00000000`00000000 ffff9c8f`00000000 fffff800`00000000 : nt!MiDeleteVad+0x360
ffffc78b`870fb8f0 fffff800`70efadfc : ffffc78b`00000000 00000000`00000000 ffffc78b`870fba50 00000000`13bc0000 : nt!MiFreeVadRange+0xa3
ffffc78b`870fb950 fffff800`70efa8d5 : 00000000`00000000 00000000`068fe5c8 00000000`00001000 00000000`00000004 : nt!MmFreeVirtualMemory+0x4ec
ffffc78b`870fbaa0 fffff800`70c06bb8 : ffff9c8f`ab554080 00000000`115ad460 ffffc78b`870fbb80 00000000`00000000 : nt!NtFreeVirtualMemory+0x95
ffffc78b`870fbb00 00007ffd`6418c164 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`068fe5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6418c164

SYMBOL_NAME: nt!MiBadShareCount+5b

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 5b

FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003}

Followup: MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80583c1c349, The address that the exception occurred at
Arg3: ffffef0e814b5708, Exception Record Address
Arg4: ffffef0e814b4f40, Context Record Address

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 4890

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 29506

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80583c1c349

BUGCHECK_P3: ffffef0e814b5708

BUGCHECK_P4: ffffef0e814b4f40

EXCEPTION_RECORD: ffffef0e814b5708 -- (.exr 0xffffef0e814b5708)
ExceptionAddress: fffff80583c1c349 (dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x0000000000000089)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: ffffef0e814b4f40 -- (.cxr 0xffffef0e814b4f40)
rax=ffffb0064b9f0c00 rbx=fff7800aeba070e0 rcx=fffff80583c1c345
rdx=0000000004449060 rsi=ffff800ae6eab820 rdi=ffffef0e814b5a20
rip=fffff80583c1c349 rsp=ffffef0e814b5940 rbp=ffffef0e814b5a40
r8=ffffb0064b9f0c00 r9=0000000000000000 r10=fffff80583ec1010
r11=ffffef0e814b5ae8 r12=0000000000000000 r13=0000000000000000
r14=ffff800aef3828f0 r15=fffff80579525440
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x89:
fffff805`83c1c349 488b4b08 mov rcx,qword ptr [rbx+8] ds:002b:fff7800a`eba070e8=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: League of Legends.exe

READ_ADDRESS: fffff805794fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057940f340: Unable to get Flags value from nt!KdVersionBlock
fffff8057940f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffffef0e`814b5940 fffff805`83c1c09c : fffff805`83c1c010 ffffb006`4b9cd010 ffff800a`ef3828f0 fffff805`79525440 : dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x89
ffffef0e`814b5af0 fffff805`78b034b5 : ffffb006`58181040 ffffb006`58181040 ffffb006`47ea4a20 ffffb006`00000000 : dxgkrnl!DxgkpDeferredDestructionWork+0x8c
ffffef0e`814b5b70 fffff805`78aa29a5 : ffffb006`58181040 00000000`00000080 ffffb006`47ea3040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffef0e`814b5c10 fffff805`78bfc868 : ffffc280`68dd9180 ffffb006`58181040 fffff805`78aa2950 00000000`0051ba40 : nt!PspSystemThreadStartup+0x55
ffffef0e`814b5c60 00000000`00000000 : ffffef0e`814b6000 ffffef0e`814b0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+89

MODULE_NAME: dxgkrnl

IMAGE_NAME: dxgkrnl.sys

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .cxr 0xffffef0e814b4f40 ; kb

BUCKET_ID_FUNC_OFFSET: 89

FAILURE_BUCKET_ID: AV_dxgkrnl!DXGDEVICE::DestroyDeferredAllocations

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {45df0bc6-82f3-598c-4946-f8766b610aa4}

Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804625ddb7a, The address that the exception occurred at
Arg3: ffff8d055030db88, Exception Record Address
Arg4: ffff8d055030d3c0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : AV.Dereference
Value: NullClassPtr

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 7030

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 28192

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff804625ddb7a

BUGCHECK_P3: ffff8d055030db88

BUGCHECK_P4: ffff8d055030d3c0

EXCEPTION_RECORD: ffff8d055030db88 -- (.exr 0xffff8d055030db88)
ExceptionAddress: fffff804625ddb7a (dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x0000000000000036)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000008
Attempt to read from address 0000000000000008

CONTEXT: ffff8d055030d3c0 -- (.cxr 0xffff8d055030d3c0)
rax=ffff526e779f29eb rbx=ffffbd0b398ef748 rcx=0000000000000000
rdx=ffffbd0b398ef708 rsi=ffffbd0b32bb4ef0 rdi=ffffad098d903000
rip=fffff804625ddb7a rsp=ffff8d055030ddc0 rbp=ffffad098d903000
r8=ffff8d055030dda0 r9=00000000ffffffff r10=fffff8044f4dbb10
r11=ffffbd0b32bb4ef0 r12=0000000000000000 r13=ffffbd0b3ceb6610
r14=ffffbd0b398ef708 r15=ffffbd0b398ef738
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x36:
fffff804`625ddb7a 4c8b6108 mov r12,qword ptr [rcx+8] ds:002b:00000000`00000008=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff8044fefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8044fe0f340: Unable to get Flags value from nt!KdVersionBlock
fffff8044fe0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000008

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 0000000000000008

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffff8d05`5030ddc0 fffff804`625d4448 : 00000000`00000000 fffff804`6257241b ffffbd0b`398ef748 fffff804`00000003 : dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x36
ffff8d05`5030e250 fffff804`625d270b : ffffbd0b`32bb4dd0 ffffad09`8d903001 ffffbd0b`32bb4ef0 ffffad09`8abe3d80 : dxgmms2!VIDMM_GLOBAL::MakeVirtualAddressRangeNotResident+0xc0
ffff8d05`5030e2b0 fffff804`625f25a6 : ffffad09`927eab10 ffffad09`8d903000 ffffbd0b`3ceb6600 ffffbd0b`32bb4dd0 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0x23b
ffff8d05`5030e300 fffff804`625f2489 : ffffbd0b`40757dc0 00000000`00001805 ffffbd0b`3ceb6610 ffffbd0b`3ceb6610 : dxgmms2!VIDMM_GLOBAL::EvictOneAllocation+0xc6
ffff8d05`5030e350 fffff804`625f2344 : ffffbd0b`40757dc0 00000003`00000000 ffff8d4b`00000000 ffffbd0b`3ceb6610 : dxgmms2!VIDMM_PAGE_TABLE::EvictPageTable+0x81
ffff8d05`5030e390 fffff804`625f22d9 : 00000000`0000000c fffff804`4f4c0000 ffffbd0b`3eb5cc50 00000000`00001805 : dxgmms2!VIDMM_PAGE_TABLE::DestroyPageTable+0x30
ffff8d05`5030e410 fffff804`625f2255 : 00000000`0000300a 00000000`00000200 00000000`00000000 00000000`00000002 : dxgmms2!VIDMM_PAGE_DIRECTORY::DestroyPdePageTableData+0x49
ffff8d05`5030e440 fffff804`625dfb20 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00300a00 : dxgmms2!VIDMM_PAGE_DIRECTORY::HandleFullPageTableCoverage+0xb1
ffff8d05`5030e4a0 fffff804`625deedc : ffffad09`8af7a968 ffffbd0b`3ceb6610 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0xbd0
ffff8d05`5030e610 fffff804`625e3693 : ffff9801`45f40180 fffff804`4f4c4a8a ffffad09`927e8458 ffffbd0b`39e607c0 : dxgmms2!CVirtualAddressAllocator::UncommitVirtualAddressRange+0xf4
ffff8d05`5030e720 fffff804`625e3631 : 00000000`00000000 ffffbd0b`39e607c0 ffffbd0b`3ceb6601 fffff804`4f4de1f7 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRangeSystemCommand+0x3f
ffff8d05`5030e750 fffff804`625cec77 : ffffbd0b`3cf93b90 00000000`00000000 ffffbd0b`3ceb6610 ffff8d05`5030e8e0 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRange+0x71
ffff8d05`5030e7e0 fffff804`625e2f6f : 00000000`00000078 ffffbd0b`34b61970 00000000`403b0088 00000003`00630000 : dxgmms2!VIDMM_GLOBAL::FreeGpuVirtualAddressSystemCommand+0xff
ffff8d05`5030e880 fffff804`625fa5d2 : ffffbd0b`300e0e40 ffffad09`00000001 00000000`00000001 ffffbd0b`304e6b50 : dxgmms2!VIDMM_GLOBAL::processSystemCommand+0x27b
ffff8d05`5030ea00 fffff804`62603e99 : ffffbd0b`304e6ae0 ffffad09`8d602001 00000000`00000000 00000000`05784a00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x1462
ffff8d05`5030ebe0 fffff804`4f4a29a5 : ffffad09`8d6020c0 fffff804`62603e90 ffffbd0b`304e6ae0 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff8d05`5030ec10 fffff804`4f5fc868 : ffff9801`45f40180 ffffad09`8d6020c0 fffff804`4f4a2950 00104ce0`00000001 : nt!PspSystemThreadStartup+0x55
ffff8d05`5030ec60 00000000`00000000 : ffff8d05`5030f000 ffff8d05`50309000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+36

MODULE_NAME: dxgmms2

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.19041.1124

STACK_COMMAND: .cxr 0xffff8d055030d3c0 ; kb

BUCKET_ID_FUNC_OFFSET: 36

FAILURE_BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {8a5a6ede-7f3e-54bf-1b01-58a4c8fbd710}

Followup: MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80666ac2f09, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3124

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 4179

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80666ac2f09

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff806674fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8066740f340: Unable to get Flags value from nt!KdVersionBlock
fffff8066740f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

EXCEPTION_PARAMETER2: ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: League of Legends.exe

BAD_STACK_POINTER: ffffc3817e721158

STACK_TEXT:
ffffc381`7e721158 fffff806`66cf451e : 00000000`0000001e ffffffff`c0000005 fffff806`66ac2f09 00000000`00000000 : nt!KeBugCheckEx
ffffc381`7e721160 fffff806`66bfe0d2 : fffff806`66cf44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffc381`7e7211a0 fffff806`66a52db7 : ffffc381`7e721710 00000000`00000000 ffffa889`be692fb0 fffff806`66bfc255 : nt!RtlpExecuteHandlerForException+0x12
ffffc381`7e7211d0 fffff806`66a519a6 : ffffa889`be692858 ffffc381`7e721e20 ffffa889`be692858 fff7d50c`2d675968 : nt!RtlDispatchException+0x297
ffffc381`7e7218f0 fffff806`66bf60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffc381`7e721fb0 fffff806`66bf6070 : fffff806`66c072a5 00000000`00000000 ffffc381`7e701180 00000000`00000fff : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffa889`be692718 fffff806`66c072a5 : 00000000`00000000 ffffc381`7e701180 00000000`00000fff 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffa889`be692720 fffff806`66c02fe0 : 00000002`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
ffffa889`be692900 fffff806`66ac2f09 : 00000000`00000000 00000000`00000000 00000002`00001000 00000000`00000008 : nt!KiGeneralProtectionFault+0x320
ffffa889`be692a90 fffff806`66ac2e97 : 00000000`0002202c ffffa889`be692e02 ffffa889`be692cb8 00000000`00400a02 : nt!IopfCompleteRequest+0x59
ffffa889`be692b80 fffff806`739277a9 : 00000000`00000000 ffffd50c`2d6757c0 00000000`00000000 ffffd50c`00000002 : nt!IofCompleteRequest+0x17
ffffa889`be692bb0 fffff806`7392884e : 00000000`00000004 ffffa889`be692e60 ffffc381`7e701180 ffffc381`7e701180 : afd!AfdCompletePollIrp+0x9d
ffffa889`be692c00 fffff806`66abf682 : ffffd50c`301d70d0 ffffc381`7e701180 ffffa889`be692e68 ffffc381`00000002 : afd!AfdTimeoutPoll+0x2e
ffffa889`be692c30 fffff806`66ae4a2d : ffffc381`7e701180 00070000`00000000 00000000`00000008 00000000`0002202c : nt!KiProcessExpiredTimerList+0x172
ffffa889`be692d20 fffff806`66bfc255 : 00000000`00000000 ffffc381`7e701180 ffffd50c`210cdc40 00000000`19c4fce4 : nt!KiRetireDpcList+0x5dd
ffffa889`be692fb0 fffff806`66bfc040 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffa889`c1102ac0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue

SYMBOL_NAME: afd!AfdCompletePollIrp+9d

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9d

FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee}

Followup: MachineOwner
---------

Kod:
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2209]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = 4.30
BiosReleaseDate = 03/06/2019
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7B84
SystemFamily = To be filled by O.E.M.
SystemVersion = 2.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = B450M PRO-M2 V2 (MS-7B84)
BaseBoardVersion = 2.0
 
Son düzenleme:
Konu 8 sayfaya ulşamış, ayrıntılı sistem özellikleri yok, RAM testi yok...

  • Bütün dökümlere baktım. Sorun bellek kaynaklı gibi. Senin yapacağın ilk iş bellek testi yapmak. Sana linki atılmış, açılmadı diye yazmışsın. Açılamayan nedir güzel kardeşim? Yazacaksın. Bu testi yap ve sonucunu paylaş: Memtest86 USB'den Çalışan RAM Test Programı
  • Nerede ayrıntılı PC özelliklerin? Her şeyi taksit taksit yazıyorsun. Tamamını yaz
  • CPU-Z çalıştır ve SPD kısmından ekran görnütüleri koy. Buraya koy, MediaFire'a değil.

Genel hatalar, daha çok bellek şüphesi oluşturan:

Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80430248799, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4405

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 16782

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80430248799

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff80430cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80430c0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80430c0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

EXCEPTION_PARAMETER2: ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

BAD_STACK_POINTER: ffffbb81b2121158

STACK_TEXT:
ffffbb81`b2121158 fffff804`304f4b0e : 00000000`0000001e ffffffff`c0000005 fffff804`30248799 00000000`00000000 : nt!KeBugCheckEx
ffffbb81`b2121160 fffff804`303fe642 : fffff804`304f4aec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffbb81`b21211a0 fffff804`3032bf97 : ffffbb81`b2121710 00000000`00000000 fffffa87`a308bc60 fffff804`303f92ee : nt!RtlpExecuteHandlerForException+0x12
ffffbb81`b21211d0 fffff804`3032ab86 : fffffa87`a308b508 ffffbb81`b2121e20 fffffa87`a308b508 fff7e385`de373968 : nt!RtlDispatchException+0x297
ffffbb81`b21218f0 fffff804`303f6612 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffbb81`b2121fb0 fffff804`303f65e0 : fffff804`304078a5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffa87`a308b3c8 fffff804`304078a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffa87`a308b3d0 fffff804`304035e0 : 00000000`00000000 fffff804`303089f3 ffffe385`d606b7c0 fffffa87`a308b6ac : nt!KiExceptionDispatch+0x125
fffffa87`a308b5b0 fffff804`30248799 : 00000004`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
fffffa87`a308b740 fffff804`30248727 : 00000000`00000001 ffffbb81`b2101102 fffff804`30c248a0 ffffe385`d9e37080 : nt!IopfCompleteRequest+0x59
fffffa87`a308b830 fffff804`3c6577a9 : 00000000`00000000 ffffe385`de3737c0 00000000`00000000 ffffe385`00000002 : nt!IofCompleteRequest+0x17
fffffa87`a308b860 fffff804`3c65884e : 00000000`00000004 ffffe385`d1982800 ffffbb81`b2101180 fffffa87`a308bb10 : afd!AfdCompletePollIrp+0x9d
fffffa87`a308b8b0 fffff804`30244f12 : ffffe385`d1982840 ffffbb81`b2101180 ffffbb81`b2101180 00000000`00000002 : afd!AfdTimeoutPoll+0x2e
fffffa87`a308b8e0 fffff804`30206eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00083141 : nt!KiProcessExpiredTimerList+0x172
fffffa87`a308b9d0 fffff804`303f92ee : ffffffff`00000000 ffffbb81`b2101180 ffffbb81`b210c340 ffffe385`d6ba6080 : nt!KiRetireDpcList+0x5dd
fffffa87`a308bc60 00000000`00000000 : fffffa87`a308c000 fffffa87`a3086000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: afd!AfdCompletePollIrp+9d

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9d

FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee}

Followup: MachineOwner
---------

8: kd> lmvm afd
Browse full module list
start end module name
fffff804`3c600000 fffff804`3c6a3000 afd # (pdb symbols) C:\ProgramData\Dbg\sym\afd.pdb\92BCCD248D3505B26C05ADECC513503E1\afd.pdb
Loaded symbol image file: afd.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\afd.sys\CC0C9B73a3000\afd.sys
Image path: \SystemRoot\system32\drivers\afd.sys
Image name: afd.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: CC0C9B73 (This is a reproducible build file hash, not a timestamp)
CheckSum: 000A334A
ImageSize: 000A3000
File version: 10.0.19041.508
Product version: 10.0.19041.508
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: afd.sys
OriginalFilename: afd.sys
ProductVersion: 10.0.19041.508
FileVersion: 10.0.19041.508 (WinBuild.160101.0800)
FileDescription: Ancillary Function Driver for WinSock
LegalCopyright: © Microsoft Corporation. All rights reserved.

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801114c2f09, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3999

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 6072

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff801114c2f09

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff80111efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80111e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80111e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

EXCEPTION_PARAMETER2: ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

BAD_STACK_POINTER: ffffb900a4521158

STACK_TEXT:
ffffb900`a4521158 fffff801`116f451e : 00000000`0000001e ffffffff`c0000005 fffff801`114c2f09 00000000`00000000 : nt!KeBugCheckEx
ffffb900`a4521160 fffff801`115fe0d2 : fffff801`116f44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffb900`a45211a0 fffff801`11452db7 : ffffb900`a4521710 00000000`00000000 fffff48f`0628bc60 fffff801`115f8d7e : nt!RtlpExecuteHandlerForException+0x12
ffffb900`a45211d0 fffff801`114519a6 : fffff48f`0628b508 ffffb900`a4521e20 fffff48f`0628b508 fff7ca08`70243fa8 : nt!RtlDispatchException+0x297
ffffb900`a45218f0 fffff801`115f60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffb900`a4521fb0 fffff801`115f6070 : fffff801`116072a5 00000000`00008206 ffffb900`a45091c8 00000000`00008de3 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff48f`0628b3c8 fffff801`116072a5 : 00000000`00008206 ffffb900`a45091c8 00000000`00008de3 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff48f`0628b3d0 fffff801`11602fe0 : 00000000`00000000 ffffb900`a4501180 00000000`00000fff fffff48f`0628b6ac : nt!KiExceptionDispatch+0x125
fffff48f`0628b5b0 fffff801`114c2f09 : 00000004`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
fffff48f`0628b740 fffff801`114c2e97 : 00000000`00000001 ffffb900`a4501102 00000000`00000003 ffffca08`6b1cf080 : nt!IopfCompleteRequest+0x59
fffff48f`0628b830 fffff801`1ec577a9 : 00000000`00000000 ffffca08`70243e00 00000000`00000000 ffffca08`6d680080 : nt!IofCompleteRequest+0x17
fffff48f`0628b860 fffff801`1ec5884e : 00000000`00000002 ffffca08`6c285de0 ffffb900`a4501180 fffff48f`0628bb10 : afd!AfdCompletePollIrp+0x9d
fffff48f`0628b8b0 fffff801`114bf682 : ffffca08`6c285e20 ffffb900`a4501180 ffffb900`a4501180 00000000`00000002 : afd!AfdTimeoutPoll+0x2e
fffff48f`0628b8e0 fffff801`114e4a2d : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0003d9e3 : nt!KiProcessExpiredTimerList+0x172
fffff48f`0628b9d0 fffff801`115f8d7e : ffffffff`00000000 ffffb900`a4501180 ffffb900`a450c340 ffffca08`647a2080 : nt!KiRetireDpcList+0x5dd
fffff48f`0628bc60 00000000`00000000 : fffff48f`0628c000 fffff48f`06286000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: afd!AfdCompletePollIrp+9d

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9d

FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee}

Followup: MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff8796b50ba351, Address of the instruction which caused the bugcheck
Arg3: fffffd8a2b8d7d20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5608

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 6659

Key : Analysis.Memory.CommitPeak.Mb
Value: 92

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff8796b50ba351

BUGCHECK_P3: fffffd8a2b8d7d20

BUGCHECK_P4: 0

CONTEXT: fffffd8a2b8d7d20 -- (.cxr 0xfffffd8a2b8d7d20)
rax=000000007fff386a rbx=ffff87b6c47dd1e0 rcx=fff787b6c47c9660
rdx=0000000000000000 rsi=ffff87b6c47dc8c8 rdi=0000000000000200
rip=ffff8796b50ba351 rsp=fffffd8a2b8d8720 rbp=ffff87b6c47dd228
r8=0000000000000000 r9=0000000000000000 r10=ffff8796b5af0070
r11=ffffe78207c97750 r12=0000000000000064 r13=0000000000000064
r14=ffff87b6c47dd214 r15=ffff87b6c47dd210
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
win32kfull!TimersProc+0x1e1:
ffff8796`b50ba351 488b91a0010000 mov rdx,qword ptr [rcx+1A0h] ds:002b:fff787b6`c47c9800=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: csrss.exe

STACK_TEXT:
fffffd8a`2b8d8720 ffff8796`b50b9e56 : 00000000`0000000f 00000000`053e856c 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x1e1
fffffd8a`2b8d87b0 ffff8796`b5b1ae33 : ffffe782`14867080 ffffe782`14867080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
fffffd8a`2b8d8970 ffff8796`b5058d20 : ffffe782`14867080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
fffffd8a`2b8d8aa0 ffff8796`b4eb474d : ffffe782`14867080 ffffe782`14867080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
fffffd8a`2b8d8ad0 fffff805`6e206bb8 : ffffe782`00000005 00000000`00000005 000001bc`71c04060 00000000`00001620 : win32k!NtUserCallNoParam+0x15
fffffd8a`2b8d8b00 00007fff`2e5b10e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b4`a89ff918 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2e5b10e4

SYMBOL_NAME: win32kfull!TimersProc+1e1

MODULE_NAME: win32kfull

IMAGE_NAME: win32kfull.sys

IMAGE_VERSION: 10.0.19041.631

STACK_COMMAND: .cxr 0xfffffd8a2b8d7d20 ; kb

BUCKET_ID_FUNC_OFFSET: 1e1

FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63}

Followup: MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8042c7fd147, The address that the exception occurred at
Arg3: ffffc101570bb8d8, Exception Record Address
Arg4: ffffc101570bb110, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 6968

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 10314

Key : Analysis.Memory.CommitPeak.Mb
Value: 89

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8042c7fd147

BUGCHECK_P3: ffffc101570bb8d8

BUGCHECK_P4: ffffc101570bb110

EXCEPTION_RECORD: ffffc101570bb8d8 -- (.exr 0xffffc101570bb8d8)
ExceptionAddress: fffff8042c7fd147 (nt!ExpInterlockedPopEntrySListFault)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: ffffc101570bb110 -- (.cxr 0xffffc101570bb110)
rax=0000000006790001 rbx=fffffd0000016030 rcx=fffffd0000016030
rdx=fff7c10156dc6ff0 rsi=0000000000000000 rdi=fffff8042d050c00
rip=fffff8042c7fd147 rsp=ffffc101570bbb10 rbp=0000000000000001
r8=fff7c10156dc6ff0 r9=0000000000000010 r10=fffffd0000016030
r11=fffff80432211a70 r12=0000000000000000 r13=ffffffffffffffe0
r14=0000000000000001 r15=0000000000000001
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!ExpInterlockedPopEntrySListFault:
fffff804`2c7fd147 498b08 mov rcx,qword ptr [r8] ds:002b:fff7c101`56dc6ff0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff8042d0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8042d00f340: Unable to get Flags value from nt!KdVersionBlock
fffff8042d00f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffffc101`570bbb10 fffff804`2c60da64 : ffff8c23`00000001 00000000`00000000 ffffc101`570bbc10 ffffc101`570bbbb0 : nt!ExpInterlockedPopEntrySListFault
ffffc101`570bbb20 fffff804`2c60d6fa : 00000000`00000012 00000000`00000004 00000000`0003d000 fffff804`2c6bc2e3 : nt!MmCreateKernelStack+0x104
ffffc101`570bbbc0 fffff804`2c60d5c2 : fffff804`3221f9b0 ffffc101`570bbdb8 ffffc101`570bbf04 ffffb089`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0xca
ffffc101`570bbc60 fffff804`2c60d423 : ffffc101`570bbf00 00000000`00000002 00000000`00000000 ffffb089`24025030 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2
ffffc101`570bbcd0 fffff804`2c60d3dd : fffff804`3221f9b0 ffffc101`570bbdb8 ffffb089`298ce538 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x33
ffffc101`570bbd40 fffff804`32208380 : ffffb089`298ce538 fffff804`32207ed5 ffffb089`298ce504 ffffb089`2d9f1460 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffc101`570bbd80 fffff804`32206d71 : ffffc101`570bbe40 ffffc50a`f50f1170 ffffb089`298ce538 00000000`00100000 : Ntfs!NtfsMultipleAsync+0x140
ffffc101`570bbe00 fffff804`32213b67 : 00000000`00000000 ffffc50a`f50f1200 00000000`00000000 00000000`00000000 : Ntfs!NtfsNonCachedIo+0x431
ffffc101`570bc0c0 fffff804`32212de3 : ffffb089`298ce538 ffffb089`2d9f1460 ffffc101`570bc360 00000000`00000000 : Ntfs!NtfsCommonWrite+0xb07
ffffc101`570bc2f0 fffff804`2c6cd6c5 : ffffb089`27e2ea20 ffffb089`2d9f1460 ffffb089`2d9f1460 ffffb089`21f1fd60 : Ntfs!NtfsFsdWrite+0x1d3
ffffc101`570bc3c0 fffff804`2bf26ccf : 00000000`00000768 33333333`00000000 ffffb089`27e3d510 fffff804`2c6c8cfc : nt!IofCallDriver+0x55
ffffc101`570bc400 fffff804`2bf248d3 : ffffc101`570bc490 ffffb089`2ec1d010 00000000`00000140 00000000`00000768 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffc101`570bc470 fffff804`2c6cd6c5 : ffffb089`2d9f1460 fffff804`2c6cd707 00000000`0000000c 00000000`00000004 : FLTMGR!FltpDispatch+0xa3
ffffc101`570bc4d0 fffff804`2c71a1df : ffffb089`2ec1d010 ffffb089`2d9f1460 ffffb089`2f261c80 ffffc101`570bc590 : nt!IofCallDriver+0x55
ffffc101`570bc510 fffff804`2c68b590 : 00000000`00000000 ffffc101`570bc5b0 ffffb089`2f261c80 fffff804`2c71dc5d : nt!IoSynchronousPageWriteEx+0x13b
ffffc101`570bc550 fffff804`2c6f7ae2 : 00000000`00000011 ffffc50a`eceb8000 00000000`00100000 fffffa00`00592410 : nt!MiIssueSynchronousFlush+0x70
ffffc101`570bc5d0 fffff804`2c70d391 : ffffc101`546c3a88 ffffc101`546c3a88 00000000`00000000 00000000`00000000 : nt!MiFlushSectionInternal+0x862
ffffc101`570bc8a0 fffff804`2c70a08a : 00000000`0045c70c ffffb089`28d8c040 00000000`00100000 00000000`00100000 : nt!MmFlushSection+0xbd
ffffc101`570bc950 fffff804`2c70ab74 : ffffb089`2f6335f8 00000000`00000000 00000000`00000001 00000000`00000000 : nt!CcFlushCachePriv+0x42a
ffffc101`570bca90 fffff804`2c7034b5 : ffffb089`2966b5f0 fffff804`2ca12300 ffffb089`1e66ca01 ffffb089`00000000 : nt!CcWriteBehindInternal+0x1f4
ffffc101`570bcb70 fffff804`2c6a29a5 : ffffb089`28d8c040 00000000`00000080 ffffb089`1e686040 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffc101`570bcc10 fffff804`2c7fc868 : ffff9b80`0ff40180 ffffb089`28d8c040 fffff804`2c6a2950 00000000`0394bae0 : nt!PspSystemThreadStartup+0x55
ffffc101`570bcc60 00000000`00000000 : ffffc101`570bd000 ffffc101`570b7000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: nt!MmCreateKernelStack+104

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .cxr 0xffffc101570bb110 ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 104

FAILURE_BUCKET_ID: AV_nt!MmCreateKernelStack

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c83a01d5-aa3b-3796-2ad9-7e419fd13a54}

Followup: MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80767ccd612, Address of the instruction which caused the bugcheck
Arg3: ffff850e1f0eced0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5015

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 6529

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80767ccd612

BUGCHECK_P3: ffff850e1f0eced0

BUGCHECK_P4: 0

CONTEXT: ffff850e1f0eced0 -- (.cxr 0xffff850e1f0eced0)
rax=fff7c08fc9fb7a70 rbx=0000000000222017 rcx=ffffc08fd64c3e30
rdx=ffff850e1f0eda30 rsi=0000000000040000 rdi=ffffc08fd64c3e30
rip=fffff80767ccd612 rsp=ffff850e1f0ed8d8 rbp=ffff850e1f0edb80
r8=0000000000000000 r9=ffff850e1f0eda40 r10=0000000000000000
r11=ffffe70528354b80 r12=0000000000000000 r13=0000000000000003
r14=ffffc08fd64c3e80 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!IoGetRelatedDeviceObject+0x42:
fffff807`67ccd612 488b4038 mov rax,qword ptr [rax+38h] ds:002b:fff7c08f`c9fb7aa8=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: audiodg.exe

STACK_TEXT:
ffff850e`1f0ed8d8 fffff807`680c1acb : 00000000`00222017 00000000`00000000 00000000`00000000 ffffc08f`d64c3e30 : nt!IoGetRelatedDeviceObject+0x42
ffff850e`1f0ed8e0 fffff807`680c17f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x2bb
ffff850e`1f0eda20 fffff807`67e06bb8 : 00000000`00000000 ffff850e`1f0edb80 ffff850e`1f0edaa8 ffffc08f`d32f71f0 : nt!NtDeviceIoControlFile+0x56
ffff850e`1f0eda90 00007ffe`c32cbe84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000027`b7c7fa88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c32cbe84

SYMBOL_NAME: nt!IopXxxControlFile+2bb

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .cxr 0xffff850e1f0eced0 ; kb

BUCKET_ID_FUNC_OFFSET: 2bb

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopXxxControlFile

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {657bb511-7f5c-7ddc-acd3-e126b6d359c8}

Followup: MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800278cd0d6, The address that the exception occurred at
Arg3: ffffd5032a33ef38, Exception Record Address
Arg4: ffff9901c08d2920, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 3655

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 5793

Key : Analysis.Memory.CommitPeak.Mb
Value: 80

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff800278cd0d6

BUGCHECK_P3: ffffd5032a33ef38

BUGCHECK_P4: ffff9901c08d2920

EXCEPTION_RECORD: ffffd5032a33ef38 -- (.exr 0xffffd5032a33ef38)
ExceptionAddress: fffff800278cd0d6 (nt!ExpAddTagForBigPages+0x0000000000000106)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: ffff9901c08d2920 -- (.cxr 0xffff9901c08d2920)
rax=0000000000030000 rbx=00002d22d6751c77 rcx=fff7c48f5743ab28
rdx=fff7c48f57410000 rsi=0000000000000000 rdi=ffffc48f5e4cb000
rip=fffff800278cd0d6 rsp=ffffd5032a33f170 rbp=ffffd5032a33f2c1
r8=fff7c48f5743ab28 r9=fffff80028323100 r10=0000000000010000
r11=fff7c48f57590000 r12=00002d22d6753155 r13=0000000000000600
r14=0000000000000000 r15=0000000000000002
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00250206
nt!ExpAddTagForBigPages+0x106:
fffff800`278cd0d6 488b01 mov rax,qword ptr [rcx] ds:002b:fff7c48f`5743ab28=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: League of Legends.exe

READ_ADDRESS: fffff800282fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8002820f340: Unable to get Flags value from nt!KdVersionBlock
fffff8002820f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

EXCEPTION_STR: 0xc0000005

BAD_STACK_POINTER: ffff9901c08d20e8

STACK_TEXT:
ffffd503`2a33f170 fffff800`278cadd0 : ffffc48f`5e4cb000 00000000`73576d4d 00000000`00001000 00000000`00000600 : nt!ExpAddTagForBigPages+0x106
ffffd503`2a33f1e0 fffff800`278ca64f : 000001ce`32423fff 00000000`00000003 ffffbbdd`73576d4d ffffbbdd`eef77bb8 : nt!ExAllocateHeapPool+0x750
ffffd503`2a33f320 fffff800`27950be6 : 00000000`80000000 00000000`00001000 00000000`73576d4d ffffc48f`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffd503`2a33f370 fffff800`278d8187 : 00000000`00000000 00000000`00000001 00000000`00000419 00000000`00000000 : nt!MiAllocatePool+0x86
ffffd503`2a33f3c0 fffff800`278d7739 : 0000002d`00000029 00000021`00000033 0000001b`00000014 0000001b`0000002a : nt!MiAgeWorkingSet+0x527
ffffd503`2a33f8d0 fffff800`278d6f47 : 00000000`00000000 ffffd503`2a33fa80 ffffd503`2a33fa40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffd503`2a33f9c0 fffff800`27808e60 : fffff800`28250c00 ffffd503`2a33fa80 00000000`00000d9e ffff9901`00020200 : nt!MiProcessWorkingSets+0x227
ffffd503`2a33fa60 fffff800`279b4847 : 00000000`00000006 00000000`00000006 00000000`ffffffff ffff9901`c0701180 : nt!MiWorkingSetManager+0x110
ffffd503`2a33fb20 fffff800`278a29a5 : ffffc48f`4fcab040 00000000`00000080 fffff800`279b46f0 00000000`00001b82 : nt!KeBalanceSetManager+0x157
ffffd503`2a33fc10 fffff800`279fc868 : ffff9901`c0701180 ffffc48f`4fcab040 fffff800`278a2950 00000000`00001b87 : nt!PspSystemThreadStartup+0x55
ffffd503`2a33fc60 00000000`00000000 : ffffd503`2a340000 ffffd503`2a33a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: nt!ExpAddTagForBigPages+106

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .cxr 0xffff9901c08d2920 ; kb

BUCKET_ID_FUNC_OFFSET: 106

FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!ExpAddTagForBigPages

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f78a0a54-5c29-0f5d-f796-c10730dbc37e}

Followup: MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80082ec2f09, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4421

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 6774

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80082ec2f09

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff800838fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8008380f340: Unable to get Flags value from nt!KdVersionBlock
fffff8008380f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

EXCEPTION_PARAMETER2: ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: mscorsvw.exe

BAD_STACK_POINTER: ffff9c0127121158

STACK_TEXT:
ffff9c01`27121158 fffff800`830f451e : 00000000`0000001e ffffffff`c0000005 fffff800`82ec2f09 00000000`00000000 : nt!KeBugCheckEx
ffff9c01`27121160 fffff800`82ffe0d2 : fffff800`830f44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffff9c01`271211a0 fffff800`82e52db7 : ffff9c01`27121710 00000000`00000000 ffffbe09`5ce92fb0 fffff800`82ffc255 : nt!RtlpExecuteHandlerForException+0x12
ffff9c01`271211d0 fffff800`82e519a6 : ffffbe09`5ce92858 ffff9c01`27121e20 ffffbe09`5ce92858 fff7828b`359d2c28 : nt!RtlDispatchException+0x297
ffff9c01`271218f0 fffff800`82ff60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffff9c01`27121fb0 fffff800`82ff6070 : fffff800`830072a5 00000000`0005d712 ffff9c01`271091c8 00000000`00067a81 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffbe09`5ce92718 fffff800`830072a5 : 00000000`0005d712 ffff9c01`271091c8 00000000`00067a81 00000000`00000001 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffbe09`5ce92720 fffff800`83002fe0 : 00000000`00000000 fffff800`82e7eb14 ffff9c01`27ad8020 ffffbe09`5ce929fc : nt!KiExceptionDispatch+0x125
ffffbe09`5ce92900 fffff800`82ec2f09 : 00000008`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffffbe09`5ce92a90 fffff800`82ec2e97 : 00000000`00000001 ffff9c01`27101102 00000000`00000003 ffff828b`2e7a22c0 : nt!IopfCompleteRequest+0x59
ffffbe09`5ce92b80 fffff800`8f9777a9 : 00000000`00000000 ffff828b`359d2a80 00000000`00000000 ffff828b`00000002 : nt!IofCompleteRequest+0x17
ffffbe09`5ce92bb0 fffff800`8f97884e : 00000000`00000002 ffff828b`20f7b440 ffff9c01`27101180 ffffbe09`5ce92e60 : afd!AfdCompletePollIrp+0x9d
ffffbe09`5ce92c00 fffff800`82ebf682 : ffff828b`20f7b480 ffff9c01`27101180 ffff9c01`27101180 ffff9c01`00000002 : afd!AfdTimeoutPoll+0x2e
ffffbe09`5ce92c30 fffff800`82ee4a2d : ffff9c01`27101180 000b5418`00000000 00000000`00000008 00000000`00303b4e : nt!KiProcessExpiredTimerList+0x172
ffffbe09`5ce92d20 fffff800`82ffc255 : 00087415`06040603 ffff9c01`27101180 ffff828b`206cdc40 00000000`00000210 : nt!KiRetireDpcList+0x5dd
ffffbe09`5ce92fb0 fffff800`82ffc040 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffbe09`5eb09190 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue

SYMBOL_NAME: afd!AfdCompletePollIrp+9d

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9d

FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee}

Followup: MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80612052f48, Address of the instruction which caused the bugcheck
Arg3: ffffd9806ad9b920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5015

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 15312

Key : Analysis.Memory.CommitPeak.Mb
Value: 82

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80612052f48

BUGCHECK_P3: ffffd9806ad9b920

BUGCHECK_P4: 0

CONTEXT: ffffd9806ad9b920 -- (.cxr 0xffffd9806ad9b920)
rax=ffff800d53a57f20 rbx=ffff800d537ccb90 rcx=fff7800d4ec4ce30
rdx=ffff800d53a57a60 rsi=ffff800d56a47d80 rdi=fffff80624794500
rip=fffff80612052f48 rsp=ffffd9806ad9c320 rbp=ffffd9806ad9c3d9
r8=000000000000000f r9=ffff800d4ee1e7f0 r10=fffff80612052f00
r11=fffff806247947a0 r12=ffff800d4eb6b9f8 r13=ffff800d537ccbd0
r14=ffff800d56278b50 r15=ffff800d537ccb20
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
nt!IofCallDriver+0x48:
fffff806`12052f48 4a8b44c170 mov rax,qword ptr [rcx+r8*8+70h] ds:002b:fff7800d`4ec4cf18=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: audiodg.exe

STACK_TEXT:
ffffd980`6ad9c320 fffff806`24794eea : ffff800d`56a47d80 ffff800d`537ccb90 ffff800d`56a47d80 ffffd980`6ad9c3d9 : nt!IofCallDriver+0x48
ffffd980`6ad9c360 fffff806`24795369 : ffff800d`56278b50 fffff806`24794500 00000000`00000000 00000000`00000000 : usbaudio!USBType1BuildIsochUrbRequest+0x616
ffffd980`6ad9c440 fffff806`24795466 : ffff800d`56278b50 00000000`00000000 00000000`00000000 00000000`00000001 : usbaudio!USBType1ProcessStreamPointer+0x161
ffffd980`6ad9c4a0 fffff806`247b237d : ffff800d`53bdb380 ffff800d`53bdb288 00000000`00000000 00000000`00000000 : usbaudio!USBType1ProcessPin+0xd6
ffffd980`6ad9c4d0 fffff806`242a417b : ffff800d`53bdb200 00000000`00000000 ffff800d`5566c800 fffff806`242cce00 : usbaudio!PinProcess+0x6d
ffffd980`6ad9c510 fffff806`242a4fa6 : 00000000`00000000 00000000`40000010 00000000`00000000 ffff800d`53bdb288 : ks!CKsPin::processingObjectWork+0x8b
ffffd980`6ad9c550 fffff806`242a1ba3 : ffff800d`59459ee0 ffff800d`59459ee0 00000000`00000001 ffff800d`52903110 : ks!CKsPin::process+0x66
ffffd980`6ad9c580 fffff806`242a12da : ffff800d`52903000 ffff800d`57ddd9d8 00000000`00000000 ffff800d`52903010 : ks!CKsQueue::AddFrame+0x1d3
ffffd980`6ad9c5d0 fffff806`242c9bd3 : 00000000`00000000 ffff800d`53bdb280 ffffd980`6ad9c6d0 ffffa001`081dd080 : ks!CKsQueue::TransferKsIrp+0x2ca
ffffd980`6ad9c670 fffff806`242cd513 : ffff800d`53690a20 00000000`00000000 00000000`00000000 ffff800d`4ee25b30 : ks!CKsPin::DispatchDeviceIoControl+0x1e3
ffffd980`6ad9c6c0 fffff806`247b13a3 : ffff800d`53690a20 ffff800d`4ee25b30 ffff800d`53690f28 ffff800d`4ecfbdf0 : ks!KsDispatchIrp+0x43
ffffd980`6ad9c6f0 fffff806`12052f55 : ffff800d`53690a20 ffffd980`6ad9c7c0 ffff800d`53690f70 00000000`00000000 : usbaudio!UsbAudioIrpDispatcher+0x143
ffffd980`6ad9c730 fffff806`245316bf : ffff800d`53690a20 ffffd980`6ad9c7c0 ffff800d`53690f70 ffff800d`4ecfbdf0 : nt!IofCallDriver+0x55
ffffd980`6ad9c770 fffff806`24531023 : ffff800d`53690a20 00000000`00000000 00000000`00000000 ffff800d`559e49b0 : ksthunk!CKernelFilterDevice::DispatchIrp+0x23b
ffffd980`6ad9c7d0 fffff806`12052f55 : 00000000`00000000 00000000`00000548 ffffd980`6ad9cb80 00000000`00000001 : ksthunk!CKernelFilterDevice::DispatchIrpBridge+0x13
ffffd980`6ad9c800 fffff806`123fd518 : ffff800d`53690a20 00000000`00000000 00000000`00000000 00000000`00000001 : nt!IofCallDriver+0x55
ffffd980`6ad9c840 fffff806`123fcde5 : 00000000`00000000 ffffd980`6ad9cb80 00000000`00040000 ffffd980`6ad9cb80 : nt!IopSynchronousServiceTail+0x1a8
ffffd980`6ad9c8e0 fffff806`123fc7e6 : 00000000`00000001 00000000`00000548 00000000`00000000 000002b6`3d220710 : nt!IopXxxControlFile+0x5e5
ffffd980`6ad9ca20 fffff806`122071b8 : 00000000`00000000 00000000`00000000 00000000`00000548 fffff806`124b9c00 : nt!NtDeviceIoControlFile+0x56
ffffd980`6ad9ca90 00007fff`b64ac094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f3`2f47f808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b64ac094

SYMBOL_NAME: usbaudio!USBType1BuildIsochUrbRequest+616

MODULE_NAME: usbaudio

IMAGE_NAME: usbaudio.sys

IMAGE_VERSION: 10.0.19041.388

STACK_COMMAND: .cxr 0xffffd9806ad9b920 ; kb

BUCKET_ID_FUNC_OFFSET: 616

FAILURE_BUCKET_ID: 0x3B_c0000005_usbaudio!USBType1BuildIsochUrbRequest

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {141bdf61-c952-61bf-008d-264ec009578d}

Followup: MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff85255fb9a351, Address of the instruction which caused the bugcheck
Arg3: ffff888fd1b4ed20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5359

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 5365

Key : Analysis.Memory.CommitPeak.Mb
Value: 92

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff85255fb9a351

BUGCHECK_P3: ffff888fd1b4ed20

BUGCHECK_P4: 0

CONTEXT: ffff888fd1b4ed20 -- (.cxr 0xffff888fd1b4ed20)
rax=000000007ffbe789 rbx=ffff8550055c47e0 rcx=fff78550054e5010
rdx=0000000000000000 rsi=ffff85500541ca08 rdi=0000000000000200
rip=ffff85255fb9a351 rsp=ffff888fd1b4f720 rbp=ffff8550055c4828
r8=0000000000000000 r9=0000000000000000 r10=ffff85255f860070
r11=ffff888fd1b4f790 r12=0000000000000148 r13=0000000000000148
r14=ffff8550055c4814 r15=ffff8550055c4810
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kfull!TimersProc+0x1e1:
ffff8525`5fb9a351 488b91a0010000 mov rdx,qword ptr [rcx+1A0h] ds:002b:fff78550`054e51b0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: csrss.exe

STACK_TEXT:
ffff888f`d1b4f720 ffff8525`5fb99e56 : 00000000`0000000f 00000000`000b2082 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x1e1
ffff888f`d1b4f7b0 ffff8525`5f88ae33 : ffffa50b`6e530080 ffffa50b`6e530080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
ffff888f`d1b4f970 ffff8525`5fb38d20 : ffffa50b`6e530080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff888f`d1b4faa0 ffff8525`6069474d : ffffa50b`6e530080 ffffa50b`6e530080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff888f`d1b4fad0 fffff801`46a06bb8 : ffffa50b`00000005 00000000`00000005 000001e9`7ec04060 00000000`000004ac : win32k!NtUserCallNoParam+0x15
ffff888f`d1b4fb00 00007ffd`bfb610e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000004c`2347fca8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`bfb610e4

SYMBOL_NAME: win32kfull!TimersProc+1e1

MODULE_NAME: win32kfull

IMAGE_NAME: win32kfull.sys

IMAGE_VERSION: 10.0.19041.631

STACK_COMMAND: .cxr 0xffff888fd1b4ed20 ; kb

BUCKET_ID_FUNC_OFFSET: 1e1

FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63}

Followup: MachineOwner
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000404, The subtype of the bugcheck.
Arg2: ffff9a7a03083338
Arg3: 8a00000082a8b963
Arg4: ffff9a7a03083330

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4093

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 8211

Key : Analysis.Memory.CommitPeak.Mb
Value: 82

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 404

BUGCHECK_P2: ffff9a7a03083338

BUGCHECK_P3: 8a00000082a8b963

BUGCHECK_P4: ffff9a7a03083330

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffff406`0cd3f888 fffff804`7e3016dd : 00000000`0000001a 00000000`00000404 ffff9a7a`03083338 8a000000`82a8b963 : nt!KeBugCheckEx
fffff406`0cd3f890 fffff804`7e303fe7 : fffff804`7ec4f3c0 00000000`00000000 00000000`00000000 fffff406`0cd3f958 : nt!MiDeleteValidSystemPage+0x5fd
fffff406`0cd3f930 fffff804`7e208a1e : 00000000`00000007 fffff804`7ec50c00 8a000000`82a8b963 00000000`00000006 : nt!MiDeleteKernelStack+0x107
fffff406`0cd3f9e0 fffff804`7e208946 : fffff406`0cd3fa38 fffff804`7ec50c00 fffff804`7ec4ee00 fffff804`7ec4ea18 : nt!MiDeleteCachedKernelStack+0x4a
fffff406`0cd3fa20 fffff804`7e208ecc : fffff804`7ec50c00 00000000`00000000 00000000`00000000 ffff9e8a`0524b010 : nt!MiAdjustCachedStacks+0x116
fffff406`0cd3fa60 fffff804`7e3b4847 : 00000000`00000007 00000000`00000007 00000000`ffffffff ffffc901`3df01180 : nt!MiWorkingSetManager+0x17c
fffff406`0cd3fb20 fffff804`7e2a29a5 : ffff9e8a`052ab040 00000000`00000080 fffff804`7e3b46f0 00000000`00001b82 : nt!KeBalanceSetManager+0x157
fffff406`0cd3fc10 fffff804`7e3fc868 : ffffc901`3df01180 ffff9e8a`052ab040 fffff804`7e2a2950 00000000`00001b87 : nt!PspSystemThreadStartup+0x55
fffff406`0cd3fc60 00000000`00000000 : fffff406`0cd40000 fffff406`0cd3a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: nt!MiDeleteValidSystemPage+5fd

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 5fd

FAILURE_BUCKET_ID: 0x1a_404_nt!MiDeleteValidSystemPage

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {57d19cf7-fb4a-adfd-0709-78f77073d319}

Followup: MachineOwner
---------

Ekran kartı şüphesi oluşturan hatalar:

Kod:
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000001bb62, page frame number
Arg3: 0000000000000000, current page state
Arg4: 060000000008cb62, 0

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3936

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 5124

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 4e

BUGCHECK_P1: 99

BUGCHECK_P2: 1bb62

BUGCHECK_P3: 0

BUGCHECK_P4: 60000000008cb62

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: LeagueClientUxRender.exe

STACK_TEXT:
ffffc78b`870faec8 fffff800`70bed1e7 : 00000000`0000004e 00000000`00000099 00000000`0001bb62 00000000`00000000 : nt!KeBugCheckEx
ffffc78b`870faed0 fffff800`70b4a172 : 00000000`0018c0e1 fffff800`71450c00 00000000`00000001 00000000`000000e1 : nt!MiBadShareCount+0x5b
ffffc78b`870faf10 fffff800`70b4a91e : 00000000`00000000 ffffc78b`870fb620 ffffde00`0009e448 ffffc78b`870fb570 : nt!MiDeletePteRun+0x17c2
ffffc78b`870fb120 fffff800`70ae9a1d : 00000000`00000000 ffff9c8f`a872f700 ffffc78b`870fb570 ffffde00`0009e440 : nt!MiDeleteVaTail+0x6e
ffffc78b`870fb150 fffff800`70ae963b : ffffde6f`00000000 ffff9c8f`a872f700 ffffc78b`00000000 ffffc78b`870fb5c0 : nt!MiWalkPageTablesRecursively+0xc6d
ffffc78b`870fb1f0 fffff800`70ae963b : ffffde6f`37800000 ffff9c8f`a872f700 ffffc78b`00000001 ffffc78b`870fb5d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc78b`870fb290 fffff800`70ae963b : ffffde6f`37800000 ffff9c8f`a872f700 ffffc78b`00000002 ffffc78b`870fb5e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc78b`870fb330 fffff800`70ad859b : 00000000`00000000 ffff9c8f`a872f700 00000000`00000003 ffffc78b`870fb5f0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc78b`870fb3d0 fffff800`70b4b541 : ffffc78b`870fb570 ffff9c8f`00000000 ffffde00`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffc78b`870fb4d0 fffff800`70b229a0 : 00000000`00000001 ffffc78b`00000000 ffff9c8f`a872f550 ffff9c8f`ab554080 : nt!MiDeletePagablePteRange+0x4f1
ffffc78b`870fb7e0 fffff800`70b1ae6f : 00000000`00013c88 00000000`00000000 ffff9c8f`00000000 fffff800`00000000 : nt!MiDeleteVad+0x360
ffffc78b`870fb8f0 fffff800`70efadfc : ffffc78b`00000000 00000000`00000000 ffffc78b`870fba50 00000000`13bc0000 : nt!MiFreeVadRange+0xa3
ffffc78b`870fb950 fffff800`70efa8d5 : 00000000`00000000 00000000`068fe5c8 00000000`00001000 00000000`00000004 : nt!MmFreeVirtualMemory+0x4ec
ffffc78b`870fbaa0 fffff800`70c06bb8 : ffff9c8f`ab554080 00000000`115ad460 ffffc78b`870fbb80 00000000`00000000 : nt!NtFreeVirtualMemory+0x95
ffffc78b`870fbb00 00007ffd`6418c164 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`068fe5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6418c164

SYMBOL_NAME: nt!MiBadShareCount+5b

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 5b

FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003}

Followup: MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80583c1c349, The address that the exception occurred at
Arg3: ffffef0e814b5708, Exception Record Address
Arg4: ffffef0e814b4f40, Context Record Address

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 4890

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 29506

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80583c1c349

BUGCHECK_P3: ffffef0e814b5708

BUGCHECK_P4: ffffef0e814b4f40

EXCEPTION_RECORD: ffffef0e814b5708 -- (.exr 0xffffef0e814b5708)
ExceptionAddress: fffff80583c1c349 (dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x0000000000000089)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: ffffef0e814b4f40 -- (.cxr 0xffffef0e814b4f40)
rax=ffffb0064b9f0c00 rbx=fff7800aeba070e0 rcx=fffff80583c1c345
rdx=0000000004449060 rsi=ffff800ae6eab820 rdi=ffffef0e814b5a20
rip=fffff80583c1c349 rsp=ffffef0e814b5940 rbp=ffffef0e814b5a40
r8=ffffb0064b9f0c00 r9=0000000000000000 r10=fffff80583ec1010
r11=ffffef0e814b5ae8 r12=0000000000000000 r13=0000000000000000
r14=ffff800aef3828f0 r15=fffff80579525440
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x89:
fffff805`83c1c349 488b4b08 mov rcx,qword ptr [rbx+8] ds:002b:fff7800a`eba070e8=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: League of Legends.exe

READ_ADDRESS: fffff805794fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057940f340: Unable to get Flags value from nt!KdVersionBlock
fffff8057940f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffffef0e`814b5940 fffff805`83c1c09c : fffff805`83c1c010 ffffb006`4b9cd010 ffff800a`ef3828f0 fffff805`79525440 : dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x89
ffffef0e`814b5af0 fffff805`78b034b5 : ffffb006`58181040 ffffb006`58181040 ffffb006`47ea4a20 ffffb006`00000000 : dxgkrnl!DxgkpDeferredDestructionWork+0x8c
ffffef0e`814b5b70 fffff805`78aa29a5 : ffffb006`58181040 00000000`00000080 ffffb006`47ea3040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffef0e`814b5c10 fffff805`78bfc868 : ffffc280`68dd9180 ffffb006`58181040 fffff805`78aa2950 00000000`0051ba40 : nt!PspSystemThreadStartup+0x55
ffffef0e`814b5c60 00000000`00000000 : ffffef0e`814b6000 ffffef0e`814b0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+89

MODULE_NAME: dxgkrnl

IMAGE_NAME: dxgkrnl.sys

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .cxr 0xffffef0e814b4f40 ; kb

BUCKET_ID_FUNC_OFFSET: 89

FAILURE_BUCKET_ID: AV_dxgkrnl!DXGDEVICE::DestroyDeferredAllocations

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {45df0bc6-82f3-598c-4946-f8766b610aa4}

Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804625ddb7a, The address that the exception occurred at
Arg3: ffff8d055030db88, Exception Record Address
Arg4: ffff8d055030d3c0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : AV.Dereference
Value: NullClassPtr

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 7030

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 28192

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff804625ddb7a

BUGCHECK_P3: ffff8d055030db88

BUGCHECK_P4: ffff8d055030d3c0

EXCEPTION_RECORD: ffff8d055030db88 -- (.exr 0xffff8d055030db88)
ExceptionAddress: fffff804625ddb7a (dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x0000000000000036)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000008
Attempt to read from address 0000000000000008

CONTEXT: ffff8d055030d3c0 -- (.cxr 0xffff8d055030d3c0)
rax=ffff526e779f29eb rbx=ffffbd0b398ef748 rcx=0000000000000000
rdx=ffffbd0b398ef708 rsi=ffffbd0b32bb4ef0 rdi=ffffad098d903000
rip=fffff804625ddb7a rsp=ffff8d055030ddc0 rbp=ffffad098d903000
r8=ffff8d055030dda0 r9=00000000ffffffff r10=fffff8044f4dbb10
r11=ffffbd0b32bb4ef0 r12=0000000000000000 r13=ffffbd0b3ceb6610
r14=ffffbd0b398ef708 r15=ffffbd0b398ef738
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x36:
fffff804`625ddb7a 4c8b6108 mov r12,qword ptr [rcx+8] ds:002b:00000000`00000008=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff8044fefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8044fe0f340: Unable to get Flags value from nt!KdVersionBlock
fffff8044fe0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000008

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 0000000000000008

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffff8d05`5030ddc0 fffff804`625d4448 : 00000000`00000000 fffff804`6257241b ffffbd0b`398ef748 fffff804`00000003 : dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x36
ffff8d05`5030e250 fffff804`625d270b : ffffbd0b`32bb4dd0 ffffad09`8d903001 ffffbd0b`32bb4ef0 ffffad09`8abe3d80 : dxgmms2!VIDMM_GLOBAL::MakeVirtualAddressRangeNotResident+0xc0
ffff8d05`5030e2b0 fffff804`625f25a6 : ffffad09`927eab10 ffffad09`8d903000 ffffbd0b`3ceb6600 ffffbd0b`32bb4dd0 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0x23b
ffff8d05`5030e300 fffff804`625f2489 : ffffbd0b`40757dc0 00000000`00001805 ffffbd0b`3ceb6610 ffffbd0b`3ceb6610 : dxgmms2!VIDMM_GLOBAL::EvictOneAllocation+0xc6
ffff8d05`5030e350 fffff804`625f2344 : ffffbd0b`40757dc0 00000003`00000000 ffff8d4b`00000000 ffffbd0b`3ceb6610 : dxgmms2!VIDMM_PAGE_TABLE::EvictPageTable+0x81
ffff8d05`5030e390 fffff804`625f22d9 : 00000000`0000000c fffff804`4f4c0000 ffffbd0b`3eb5cc50 00000000`00001805 : dxgmms2!VIDMM_PAGE_TABLE::DestroyPageTable+0x30
ffff8d05`5030e410 fffff804`625f2255 : 00000000`0000300a 00000000`00000200 00000000`00000000 00000000`00000002 : dxgmms2!VIDMM_PAGE_DIRECTORY::DestroyPdePageTableData+0x49
ffff8d05`5030e440 fffff804`625dfb20 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00300a00 : dxgmms2!VIDMM_PAGE_DIRECTORY::HandleFullPageTableCoverage+0xb1
ffff8d05`5030e4a0 fffff804`625deedc : ffffad09`8af7a968 ffffbd0b`3ceb6610 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0xbd0
ffff8d05`5030e610 fffff804`625e3693 : ffff9801`45f40180 fffff804`4f4c4a8a ffffad09`927e8458 ffffbd0b`39e607c0 : dxgmms2!CVirtualAddressAllocator::UncommitVirtualAddressRange+0xf4
ffff8d05`5030e720 fffff804`625e3631 : 00000000`00000000 ffffbd0b`39e607c0 ffffbd0b`3ceb6601 fffff804`4f4de1f7 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRangeSystemCommand+0x3f
ffff8d05`5030e750 fffff804`625cec77 : ffffbd0b`3cf93b90 00000000`00000000 ffffbd0b`3ceb6610 ffff8d05`5030e8e0 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRange+0x71
ffff8d05`5030e7e0 fffff804`625e2f6f : 00000000`00000078 ffffbd0b`34b61970 00000000`403b0088 00000003`00630000 : dxgmms2!VIDMM_GLOBAL::FreeGpuVirtualAddressSystemCommand+0xff
ffff8d05`5030e880 fffff804`625fa5d2 : ffffbd0b`300e0e40 ffffad09`00000001 00000000`00000001 ffffbd0b`304e6b50 : dxgmms2!VIDMM_GLOBAL::processSystemCommand+0x27b
ffff8d05`5030ea00 fffff804`62603e99 : ffffbd0b`304e6ae0 ffffad09`8d602001 00000000`00000000 00000000`05784a00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x1462
ffff8d05`5030ebe0 fffff804`4f4a29a5 : ffffad09`8d6020c0 fffff804`62603e90 ffffbd0b`304e6ae0 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff8d05`5030ec10 fffff804`4f5fc868 : ffff9801`45f40180 ffffad09`8d6020c0 fffff804`4f4a2950 00104ce0`00000001 : nt!PspSystemThreadStartup+0x55
ffff8d05`5030ec60 00000000`00000000 : ffff8d05`5030f000 ffff8d05`50309000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+36

MODULE_NAME: dxgmms2

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.19041.1124

STACK_COMMAND: .cxr 0xffff8d055030d3c0 ; kb

BUCKET_ID_FUNC_OFFSET: 36

FAILURE_BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {8a5a6ede-7f3e-54bf-1b01-58a4c8fbd710}

Followup: MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80666ac2f09, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3124

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 4179

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80666ac2f09

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff806674fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8066740f340: Unable to get Flags value from nt!KdVersionBlock
fffff8066740f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

EXCEPTION_PARAMETER2: ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: League of Legends.exe

BAD_STACK_POINTER: ffffc3817e721158

STACK_TEXT:
ffffc381`7e721158 fffff806`66cf451e : 00000000`0000001e ffffffff`c0000005 fffff806`66ac2f09 00000000`00000000 : nt!KeBugCheckEx
ffffc381`7e721160 fffff806`66bfe0d2 : fffff806`66cf44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffc381`7e7211a0 fffff806`66a52db7 : ffffc381`7e721710 00000000`00000000 ffffa889`be692fb0 fffff806`66bfc255 : nt!RtlpExecuteHandlerForException+0x12
ffffc381`7e7211d0 fffff806`66a519a6 : ffffa889`be692858 ffffc381`7e721e20 ffffa889`be692858 fff7d50c`2d675968 : nt!RtlDispatchException+0x297
ffffc381`7e7218f0 fffff806`66bf60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffc381`7e721fb0 fffff806`66bf6070 : fffff806`66c072a5 00000000`00000000 ffffc381`7e701180 00000000`00000fff : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffa889`be692718 fffff806`66c072a5 : 00000000`00000000 ffffc381`7e701180 00000000`00000fff 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffa889`be692720 fffff806`66c02fe0 : 00000002`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
ffffa889`be692900 fffff806`66ac2f09 : 00000000`00000000 00000000`00000000 00000002`00001000 00000000`00000008 : nt!KiGeneralProtectionFault+0x320
ffffa889`be692a90 fffff806`66ac2e97 : 00000000`0002202c ffffa889`be692e02 ffffa889`be692cb8 00000000`00400a02 : nt!IopfCompleteRequest+0x59
ffffa889`be692b80 fffff806`739277a9 : 00000000`00000000 ffffd50c`2d6757c0 00000000`00000000 ffffd50c`00000002 : nt!IofCompleteRequest+0x17
ffffa889`be692bb0 fffff806`7392884e : 00000000`00000004 ffffa889`be692e60 ffffc381`7e701180 ffffc381`7e701180 : afd!AfdCompletePollIrp+0x9d
ffffa889`be692c00 fffff806`66abf682 : ffffd50c`301d70d0 ffffc381`7e701180 ffffa889`be692e68 ffffc381`00000002 : afd!AfdTimeoutPoll+0x2e
ffffa889`be692c30 fffff806`66ae4a2d : ffffc381`7e701180 00070000`00000000 00000000`00000008 00000000`0002202c : nt!KiProcessExpiredTimerList+0x172
ffffa889`be692d20 fffff806`66bfc255 : 00000000`00000000 ffffc381`7e701180 ffffd50c`210cdc40 00000000`19c4fce4 : nt!KiRetireDpcList+0x5dd
ffffa889`be692fb0 fffff806`66bfc040 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffa889`c1102ac0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue

SYMBOL_NAME: afd!AfdCompletePollIrp+9d

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9d

FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_afd!AfdCompletePollIrp

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {07799efa-0696-dbee-ef6e-c72df6b5f0ee}

Followup: MachineOwner
---------

Kod:
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2209]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = 4.30
BiosReleaseDate = 03/06/2019
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7B84
SystemFamily = To be filled by O.E.M.
SystemVersion = 2.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = B450M PRO-M2 V2 (MS-7B84)
BaseBoardVersion = 2.0

İlk başta yaptığım hatalardan dolayı özür dilerim.

Sistemim:
  • AMD Ryzen 5 2600 six Core
  • B450M PRO M.2-v2 anakart
  • 8 GB RAM 3000MHz G.Skill
  • RX570

Bir de benim bilgisayarımın performansı bayya düştü. Mesela LoL'de 120-150 FPS alıyorum pingim 20-30 ama oyuna donmalar giriyor.

IMG_20201204_145120.jpg
IMG_20201204_150033.jpg
IMG_20201204_145148.jpg
IMG_20201204_145201.jpg
 
Son düzenleyen: Moderatör:
Peki başka mavi ekran aldınız mı? Eğer aldıysanız minidump dosyanı paylaş. Testi yaparken XMP kapalı mıydı?

XMP açıktı test yaparken ama en güçlü profili kullanıyordum. Testen sonra gene aldım mavi ekran. Şu an telefondayım.
 
Son düzenleyen: Moderatör:
O zaman XMP kapalı bir şekilde tekrar test yapalım ve aynı şekil sonuçları paylaşın.

Bilgisayara geçince minidump paylaşmayı unutma sakın.
 

Yeni konular

Geri
Yukarı