Çözüldü NTFS_FILE_SYSTEM mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 8.1

B06DO

Decapat
Katılım
19 Nisan 2021
Mesajlar
92
Yer
Ankara
Daha fazla  
Sistem Özellikleri
GİGABYTE B550m ds3h
AMD RYZEN 5 5600
GSKİLL 16 gb ram 2x8
CRUSİAL P3 M.2 500gb SSD
XİGMATEK X-POWER 650W PSU
POWER BOOST VK-G3701W
ASUS DUAL RX6700XT 12GB
Cinsiyet
Erkek
Meslek
Stajyer
Eskiden Windows 10 kullanıyordum onda da mavi ekran veriyordu, şimdi 8.1 kullanıyorum hala mavi ekran veriyor. Minidump
 
Çözüm

RAM'lerde çok fazla hata var. Mavi ekranların sebebi de bu. Ben mesajımın altına mavi ekranlarınızın dökümünü ekleyeceğim. Bunu satıcıya gösterebilirsiniz.

[CODE title="Mavi ekran dökümler"]************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff801`54a00000 PsLoadedModuleList = 0xfffff801`54cc55d0
Debug session time: Mon May 24 14:29:19.839 2021 (UTC + 3:00)
System Uptime: 0 days 0:08:16.503
Loading Kernel Symbols.
...............................................................
................................................................
.........
Loading User Symbols.
Loading unloaded module list.
.....
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`54b404c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd000`205c5e70=000000000000003b
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff80162275823, Address of the instruction which caused the BugCheck.
Arg3: ffffd000205c6720, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80154d4f308.

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2343.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 6496.

Key : Analysis.Init.CPU.mSec
Value: 733.

Key : Analysis.Init.Elapsed.mSec
Value: 28032.

Key : Analysis.Memory.CommitPeak.Mb
Value: 83.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80162275823.

BUGCHECK_P3: ffffd000205c6720.

BUGCHECK_P4: 0

CONTEXT: ffffd000205c6720 -- (.cxr 0xffffd000205c6720)
rax=ffffc00173103138 rbx=ffffc00173103100 rcx=fffdc00171343608
rdx=ffffc00171343608 rsi=ffffe000d1f8d000 rdi=ffffe000d09957f0
rip=fffff80162275823 rsp=ffffd000205c7140 rbp=ffffd000205c71c9
r8=0000000000000004 r9=0000000000000007 r10=ffffd001e1066000
r11=0000000000000174 r12=0000000000000001 r13=ffffc001713434f0
r14=0000000000000001 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x263:
fffff801`62275823 483901 cmp qword ptr [rcx],rax ds:002b:fffdc001`71343608=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: League of Lege.

STACK_TEXT:
ffffd000`205c7140 fffff801`62275064 : ffffe000`d1f8d000 fffff801`54a9a8a5 00000000`00000001 ffffe000`d1f8d000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x263
ffffd000`205c7230 fffff801`62274e82 : ffffc001`713fa0e0 fffff801`00000000 ffffc001`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x194
ffffd000`205c73b0 fffff801`62119dc2 : ffffc001`6906ab00 00000000`00000000 ffffc001`70e8c5e0 ffffc001`00000007 : dxgmms1!VIDMM_GLOBAL::CloseAllocation+0x52
ffffd000`205c73f0 fffff801`6212a1e2 : ffffc001`713fa0e0 00000000`00000000 00000000`00000000 ffffc001`6906ab00 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x752
ffffd000`205c74f0 fffff801`62126f07 : ffffc001`6ad00000 ffffd000`205c75d9 00000000`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x172
ffffd000`205c7550 fffff801`621252c1 : ffffc001`6ad00000 ffffc001`70e8c5e0 ffffc001`70e8c5e0 fffff960`005171a0 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xa7
ffffd000`205c7580 fffff801`621256a5 : 00000000`00000100 ffffc001`70e8c5e0 fffff901`422a4d88 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x2dd
ffffd000`205c7640 fffff960`001d08f7 : 00000000`000008e8 ffffd000`205c7860 fffff901`422a4c90 ffffe000`d37302c0 : dxgkrnl!DxgkProcessCallout+0x135
ffffd000`205c76a0 fffff960`001d173b : fffff901`422a4c90 ffffe000`d37302c0 00000000`00000000 00000000`ffcf0000 : win32k!GdiProcessCallout+0x1f7
ffffd000`205c7720 fffff801`54dcdafe : ffffd000`205c7860 ffffd000`205c7800 00000000`00000000 00060030`00010002 : win32k!W32pProcessCallout+0x53
ffffd000`205c7750 fffff801`54dccd2c : ffffe000`d1fe0e40 00000000`00000000 00000000`00000000 ffffe000`d3730588 : nt!PsInvokeWin32Callout+0x42
ffffd000`205c7790 fffff801`54e73270 : ffffd000`00000001 ffffe000`d1331080 ffffd000`205c7b00 ffffe000`d1331128 : nt!PspExitThread+0x518
ffffd000`205c78a0 fffff801`54a560aa : 00000000`00000000 ffffe000`d1eb8900 00000000`00000001 00000000`773453ea : nt!KiSchedulerApcTerminate+0x18
ffffd000`205c78d0 fffff801`54b45950 : 00000000`0ebcea90 ffffd000`205c7950 fffff801`54bbbc44 00000000`00000000 : nt!KiDeliverApc+0x2fa
ffffd000`205c7950 fffff801`54b5048a : 00000000`000001f8 00000000`0ebcea90 00000000`00000010 00000000`1215f9f0 : nt!KiInitiateUserApc+0x70
ffffd000`205c7a90 00007ff8`a02620da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0ebce378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`a02620da

SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+263

MODULE_NAME: dxgmms1.

IMAGE_NAME: dxgmms1.sys

IMAGE_VERSION: 6.3.9600.19176

STACK_COMMAND: .cxr 0xffffd000205c6720 ; kb.

BUCKET_ID_FUNC_OFFSET: 263.

FAILURE_BUCKET_ID: 0x3B_c0000005_dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation

OS_VERSION: 8.1.9600.20012

BUILDLAB_STR: winblue_ltsb.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff803`85214000 PsLoadedModuleList = 0xfffff803`854d95d0
Debug session time: Mon May 24 10:31:47.472 2021 (UTC + 3:00)
System Uptime: 0 days 1:34:20.135
Loading Kernel Symbols.
...............................................................
................................................................
..........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`853544c0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffd000`21a552b0=0000000000000024
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd.
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack.
trace.
Arguments:
Arg1: 000000b500190645.
Arg2: ffffd00021a56498.
Arg3: ffffd00021a55cb0.
Arg4: fffff8038523bfd5.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80385563308.

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read.

Key : Analysis.CPU.mSec
Value: 2296.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 7316.

Key : Analysis.Init.CPU.mSec
Value: 703.

Key : Analysis.Init.Elapsed.mSec
Value: 25895.

Key : Analysis.Memory.CommitPeak.Mb
Value: 71.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 24.

BUGCHECK_P1: b500190645.

BUGCHECK_P2: ffffd00021a56498.

BUGCHECK_P3: ffffd00021a55cb0.

BUGCHECK_P4: fffff8038523bfd5.

EXCEPTION_RECORD: ffffd00021a56498 -- (.exr 0xffffd00021a56498)
ExceptionAddress: fffff8038523bfd5 (nt!DeleteNodeFromTree+0x0000000000000165)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.

CONTEXT: ffffd00021a55cb0 -- (.cxr 0xffffd00021a55cb0)
rax=ffffc00159ca6a50 rbx=ffffc001599541b0 rcx=0002000000000000
rdx=ffffc00159954101 rsi=ffffe001496a1488 rdi=ffffc001599541b0
rip=fffff8038523bfd5 rsp=ffffd00021a566d0 rbp=ffffe0014a640708
r8=00000000000021fe r9=0000ffffffffffff r10=ffffe00149000000
r11=0000000000000689 r12=ffffd00021a567ff r13=0000000000000000
r14=0000000000000001 r15=ffffe0014a640100
iopl=0 nv up ei pl nz na po nc.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff802`7f805000 PsLoadedModuleList = 0xfffff802`7faca5d0
Debug session time: Tue May 25 14:00:31.309 2021 (UTC + 3:00)
System Uptime: 0 days 1:20:52.973
Loading Kernel Symbols.
...............................................................
................................................................
........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!IoGetRelatedDeviceObject+0x87:
fffff802`7f871dc7 488b4810 mov rcx,qword ptr [rax+10h] ds:002b:fffde000`f9b780e0=????????????????
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard.
coded breakpoint or assertion was hit, but this system was booted.
/NODEBUG. This is not supposed to happen as developers should never have.
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the.
system is booted /DEBUG. This will let us see why this breakpoint is.
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff8027f871dc7, The address that the exception occurred at.
Arg3: ffffd000e2267708, Exception Record Address.
Arg4: ffffd000e2266f20, Context Record Address.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff8027fb54308.

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read.

Key : Analysis.CPU.mSec
Value: 2155.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 7857.

Key : Analysis.Init.CPU.mSec
Value: 749.

Key : Analysis.Init.Elapsed.mSec
Value: 24454.

Key : Analysis.Memory.CommitPeak.Mb
Value: 70.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 7e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff8027f871dc7.

BUGCHECK_P3: ffffd000e2267708.

BUGCHECK_P4: ffffd000e2266f20.

EXCEPTION_RECORD: ffffd000e2267708 -- (.exr 0xffffd000e2267708)
ExceptionAddress: fffff8027f871dc7 (nt!IoGetRelatedDeviceObject+0x0000000000000087)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.

CONTEXT: ffffd000e2266f20 -- (.cxr 0xffffd000e2266f20)
rax=fffde000f9b780d0 rbx=ffffe000f9f31030 rcx=ffffe000f9a2d070
rdx=0000000000000000 rsi=ffffe000f92fbdc0 rdi=ffffe000f9a2d040
rip=fffff8027f871dc7 rsp=ffffd000e2267940 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000002 r10=0000000000000002
r11=ffffd000e2267a48 r12=0000000000000000 r13=0000000000000000
r14=ffffc0011d0cc200 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!IoGetRelatedDeviceObject+0x87:
fffff802`7f871dc7 488b4810 mov rcx,qword ptr [rax+10h] ds:002b:fffde000`f9b780e0=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8027fb542a8.
GetUlongPtrFromAddress: unable to read from fffff8027fb54530.
ffffffffffffffff.

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff801`39613000 PsLoadedModuleList = 0xfffff801`398d85d0
Debug session time: Wed May 26 11:39:11.598 2021 (UTC + 3:00)
System Uptime: 0 days 3:01:15.270
Loading Kernel Symbols.
...............................................................
................................................................
.........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`397534c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd001`ae8a8670=000000000000003b
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff8013963fb2c, Address of the instruction which caused the BugCheck.
Arg3: ffffd001ae8a8f20, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80139962308.

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2640.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 5643.

Key : Analysis.Init.CPU.mSec
Value: 717.

Key : Analysis.Init.Elapsed.mSec
Value: 23180.

Key : Analysis.Memory.CommitPeak.Mb
Value: 64.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff8013963fb2c.

BUGCHECK_P3: ffffd001ae8a8f20.

BUGCHECK_P4: 0

CONTEXT: ffffd001ae8a8f20 -- (.cxr 0xffffd001ae8a8f20)
rax=0000000000000002 rbx=0000000000000000 rcx=ffffe0006b1fb070
rdx=0000000000000002 rsi=0000000000000000 rdi=ffffe0006b1fb070
rip=fffff8013963fb2c rsp=ffffd001ae8a9948 rbp=ffffe0006aff28c0
r8=0000000000000000 r9=0002000000000000 r10=0000000000000001
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210207
nt!IopGetFileObjectExtension+0x18:
fffff801`3963fb2c 498b44c108 mov rax,qword ptr [r9+rax*8+8] ds:002b:00020000`00000018=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steamwebhelper.

STACK_TEXT:
ffffd001`ae8a9948 fffff801`399f6f4a : ffffe000`00000000 ffffe000`0000000e 00000000`00000000 ffffd001`ae8a99a0 : nt!IopGetFileObjectExtension+0x18
ffffd001`ae8a9950 fffff801`399f99a3 : ffffe000`66afb840 ffffd001`ae8a9a99 00000000`00000000 00000000`00000000 : nt!IopCloseFile+0x242
ffffd001`ae8a99e0 fffff801`397633e3 : ffffe000`6adce080 00000000`000000e8 00000000`0063fdb0 00000000`0073f9dc : nt!NtClose+0x1c3
ffffd001`ae8a9b00 00000000`77b92352 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0063e618 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b92352.

SYMBOL_NAME: nt!IopGetFileObjectExtension+18

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 6.3.9600.20012

STACK_COMMAND: .cxr 0xffffd001ae8a8f20 ; kb.

BUCKET_ID_FUNC_OFFSET: 18.

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopGetFileObjectExtension

OS_VERSION: 8.1.9600.20012

BUILDLAB_STR: winblue_ltsb.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 8.1

FAILURE_ID_HASH: {03045510-38a3-0637-f832-f8ea54b50f00}

Followup: MachineOwner.
---------

************ Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff800`18e88000 PsLoadedModuleList = 0xfffff800`1914d5d0
Debug session time: Wed May 26 14:18:53.255 2021 (UTC + 3:00)
System Uptime: 0 days 0:41:06.926
Loading Kernel Symbols.
...............................................................
................................................................
..........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`18fc84c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd000`21310550=000000000000003b
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff80019116b12, Address of the instruction which caused the BugCheck.
Arg3: ffffd00021310e00, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800191d7308.

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2624.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 7653.

Key : Analysis.Init.CPU.mSec
Value: 671.

Key : Analysis.Init.Elapsed.mSec
Value: 21873.

Key : Analysis.Memory.CommitPeak.Mb
Value: 65.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80019116b12.

BUGCHECK_P3: ffffd00021310e00.

BUGCHECK_P4: 0

CONTEXT: ffffd00021310e00 -- (.cxr 0xffffd00021310e00)
rax=fffdc000701d5b20 rbx=0000000000000002 rcx=ffffe000b7c17420
rdx=fffdc000701d5b20 rsi=0000000000000000 rdi=ffffe000b7c17280
rip=fffff80019116b12 rsp=ffffd00021311820 rbp=000000000000000b
r8=ffffc0006eaca1b0 r9=0000000000000000 r10=0000000000000001
r11=0000000000000001 r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=ffffe000b7c17288
iopl=0 nv up ei ng nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!ExDeferredFreePool+0x102:
fffff800`19116b12 488b10 mov rdx,qword ptr [rax] ds:002b:fffdc000`701d5b20=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
ffffd000`21311820 fffff800`19115874 : ffffc000`7108ba90 ffffc000`7003ea80 00000000`656b6f54 ffffe000`b7c17280 : nt!ExDeferredFreePool+0x102
ffffd000`213118a0 fffff800`1925fc44

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff802`21684000 PsLoadedModuleList = 0xfffff802`219495d0
Debug session time: Thu May 27 14:57:24.441 2021 (UTC + 3:00)
System Uptime: 0 days 0:07:45.102
Loading Kernel Symbols.
...............................................................
................................................................
........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`217c44c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd001`26a13360=0000000000000024
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd.
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack.
trace.
Arguments:
Arg1: 000000b500190645.
Arg2: ffffd00126a14548.
Arg3: ffffd00126a13d60.
Arg4: fffff80221718664.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff802219d3308.

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read.

Key : Analysis.CPU.mSec
Value: 2359.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 7774.

Key : Analysis.Init.CPU.mSec
Value: 765.

Key : Analysis.Init.Elapsed.mSec
Value: 19584.

Key : Analysis.Memory.CommitPeak.Mb
Value: 72.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 24.

BUGCHECK_P1: b500190645.

BUGCHECK_P2: ffffd00126a14548.

BUGCHECK_P3: ffffd00126a13d60.

BUGCHECK_P4: fffff80221718664.

EXCEPTION_RECORD: ffffd00126a14548 -- (.exr 0xffffd00126a14548)
ExceptionAddress: fffff80221718664 (nt!FsRtlAcquireHeaderMutex+0x0000000000000024)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.

CONTEXT: ffffd00126a13d60 -- (.cxr 0xffffd00126a13d60)
rax=000000000000fffe rbx=fffdc000d643b140 rcx=ffffc000d643b1a8
rdx=ffffc000d643b140 rsi=ffffc000d643b140 rdi=ffffc000d643b140
rip=fffff80221718664 rsp=ffffd00126a14780 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=ffffc000d643b140
r11=ffffe001f216c180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=ffffe001f20e0de8
iopl=0 nv up ei pl nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!FsRtlAcquireHeaderMutex+0x24:
fffff802`21718664 488b5b30 mov rbx,qword ptr [rbx+30h] ds:002b:fffdc000`d643b170=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802219d32a8.
GetUlongPtrFromAddress: unable to read from fffff802219d3530.
ffffffffffffffff [/CODE]
Tamam.

Ekran Alıntısı.PNG
Ekran Alıntısıafesg.PNG
 
Son düzenleyen: Moderatör:

Dosya Ekleri

  • 20210528_141651.jpg
    20210528_141651.jpg
    266,4 KB · Görüntüleme: 15
  • 20210528_141659.jpg
    20210528_141659.jpg
    220,5 KB · Görüntüleme: 9
  • 20210528_141705.jpg
    20210528_141705.jpg
    170 KB · Görüntüleme: 18

RAM'lerde çok fazla hata var. Mavi ekranların sebebi de bu. Ben mesajımın altına mavi ekranlarınızın dökümünü ekleyeceğim. Bunu satıcıya gösterebilirsiniz.

[CODE title="Mavi ekran dökümler"]************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff801`54a00000 PsLoadedModuleList = 0xfffff801`54cc55d0
Debug session time: Mon May 24 14:29:19.839 2021 (UTC + 3:00)
System Uptime: 0 days 0:08:16.503
Loading Kernel Symbols.
...............................................................
................................................................
.........
Loading User Symbols.
Loading unloaded module list.
.....
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`54b404c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd000`205c5e70=000000000000003b
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff80162275823, Address of the instruction which caused the BugCheck.
Arg3: ffffd000205c6720, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80154d4f308.

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2343.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 6496.

Key : Analysis.Init.CPU.mSec
Value: 733.

Key : Analysis.Init.Elapsed.mSec
Value: 28032.

Key : Analysis.Memory.CommitPeak.Mb
Value: 83.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80162275823.

BUGCHECK_P3: ffffd000205c6720.

BUGCHECK_P4: 0

CONTEXT: ffffd000205c6720 -- (.cxr 0xffffd000205c6720)
rax=ffffc00173103138 rbx=ffffc00173103100 rcx=fffdc00171343608
rdx=ffffc00171343608 rsi=ffffe000d1f8d000 rdi=ffffe000d09957f0
rip=fffff80162275823 rsp=ffffd000205c7140 rbp=ffffd000205c71c9
r8=0000000000000004 r9=0000000000000007 r10=ffffd001e1066000
r11=0000000000000174 r12=0000000000000001 r13=ffffc001713434f0
r14=0000000000000001 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x263:
fffff801`62275823 483901 cmp qword ptr [rcx],rax ds:002b:fffdc001`71343608=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: League of Lege.

STACK_TEXT:
ffffd000`205c7140 fffff801`62275064 : ffffe000`d1f8d000 fffff801`54a9a8a5 00000000`00000001 ffffe000`d1f8d000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x263
ffffd000`205c7230 fffff801`62274e82 : ffffc001`713fa0e0 fffff801`00000000 ffffc001`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x194
ffffd000`205c73b0 fffff801`62119dc2 : ffffc001`6906ab00 00000000`00000000 ffffc001`70e8c5e0 ffffc001`00000007 : dxgmms1!VIDMM_GLOBAL::CloseAllocation+0x52
ffffd000`205c73f0 fffff801`6212a1e2 : ffffc001`713fa0e0 00000000`00000000 00000000`00000000 ffffc001`6906ab00 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x752
ffffd000`205c74f0 fffff801`62126f07 : ffffc001`6ad00000 ffffd000`205c75d9 00000000`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x172
ffffd000`205c7550 fffff801`621252c1 : ffffc001`6ad00000 ffffc001`70e8c5e0 ffffc001`70e8c5e0 fffff960`005171a0 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xa7
ffffd000`205c7580 fffff801`621256a5 : 00000000`00000100 ffffc001`70e8c5e0 fffff901`422a4d88 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x2dd
ffffd000`205c7640 fffff960`001d08f7 : 00000000`000008e8 ffffd000`205c7860 fffff901`422a4c90 ffffe000`d37302c0 : dxgkrnl!DxgkProcessCallout+0x135
ffffd000`205c76a0 fffff960`001d173b : fffff901`422a4c90 ffffe000`d37302c0 00000000`00000000 00000000`ffcf0000 : win32k!GdiProcessCallout+0x1f7
ffffd000`205c7720 fffff801`54dcdafe : ffffd000`205c7860 ffffd000`205c7800 00000000`00000000 00060030`00010002 : win32k!W32pProcessCallout+0x53
ffffd000`205c7750 fffff801`54dccd2c : ffffe000`d1fe0e40 00000000`00000000 00000000`00000000 ffffe000`d3730588 : nt!PsInvokeWin32Callout+0x42
ffffd000`205c7790 fffff801`54e73270 : ffffd000`00000001 ffffe000`d1331080 ffffd000`205c7b00 ffffe000`d1331128 : nt!PspExitThread+0x518
ffffd000`205c78a0 fffff801`54a560aa : 00000000`00000000 ffffe000`d1eb8900 00000000`00000001 00000000`773453ea : nt!KiSchedulerApcTerminate+0x18
ffffd000`205c78d0 fffff801`54b45950 : 00000000`0ebcea90 ffffd000`205c7950 fffff801`54bbbc44 00000000`00000000 : nt!KiDeliverApc+0x2fa
ffffd000`205c7950 fffff801`54b5048a : 00000000`000001f8 00000000`0ebcea90 00000000`00000010 00000000`1215f9f0 : nt!KiInitiateUserApc+0x70
ffffd000`205c7a90 00007ff8`a02620da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0ebce378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`a02620da

SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+263

MODULE_NAME: dxgmms1.

IMAGE_NAME: dxgmms1.sys

IMAGE_VERSION: 6.3.9600.19176

STACK_COMMAND: .cxr 0xffffd000205c6720 ; kb.

BUCKET_ID_FUNC_OFFSET: 263.

FAILURE_BUCKET_ID: 0x3B_c0000005_dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation

OS_VERSION: 8.1.9600.20012

BUILDLAB_STR: winblue_ltsb.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff803`85214000 PsLoadedModuleList = 0xfffff803`854d95d0
Debug session time: Mon May 24 10:31:47.472 2021 (UTC + 3:00)
System Uptime: 0 days 1:34:20.135
Loading Kernel Symbols.
...............................................................
................................................................
..........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`853544c0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffd000`21a552b0=0000000000000024
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd.
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack.
trace.
Arguments:
Arg1: 000000b500190645.
Arg2: ffffd00021a56498.
Arg3: ffffd00021a55cb0.
Arg4: fffff8038523bfd5.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80385563308.

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read.

Key : Analysis.CPU.mSec
Value: 2296.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 7316.

Key : Analysis.Init.CPU.mSec
Value: 703.

Key : Analysis.Init.Elapsed.mSec
Value: 25895.

Key : Analysis.Memory.CommitPeak.Mb
Value: 71.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 24.

BUGCHECK_P1: b500190645.

BUGCHECK_P2: ffffd00021a56498.

BUGCHECK_P3: ffffd00021a55cb0.

BUGCHECK_P4: fffff8038523bfd5.

EXCEPTION_RECORD: ffffd00021a56498 -- (.exr 0xffffd00021a56498)
ExceptionAddress: fffff8038523bfd5 (nt!DeleteNodeFromTree+0x0000000000000165)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.

CONTEXT: ffffd00021a55cb0 -- (.cxr 0xffffd00021a55cb0)
rax=ffffc00159ca6a50 rbx=ffffc001599541b0 rcx=0002000000000000
rdx=ffffc00159954101 rsi=ffffe001496a1488 rdi=ffffc001599541b0
rip=fffff8038523bfd5 rsp=ffffd00021a566d0 rbp=ffffe0014a640708
r8=00000000000021fe r9=0000ffffffffffff r10=ffffe00149000000
r11=0000000000000689 r12=ffffd00021a567ff r13=0000000000000000
r14=0000000000000001 r15=ffffe0014a640100
iopl=0 nv up ei pl nz na po nc.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff802`7f805000 PsLoadedModuleList = 0xfffff802`7faca5d0
Debug session time: Tue May 25 14:00:31.309 2021 (UTC + 3:00)
System Uptime: 0 days 1:20:52.973
Loading Kernel Symbols.
...............................................................
................................................................
........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!IoGetRelatedDeviceObject+0x87:
fffff802`7f871dc7 488b4810 mov rcx,qword ptr [rax+10h] ds:002b:fffde000`f9b780e0=????????????????
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard.
coded breakpoint or assertion was hit, but this system was booted.
/NODEBUG. This is not supposed to happen as developers should never have.
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the.
system is booted /DEBUG. This will let us see why this breakpoint is.
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff8027f871dc7, The address that the exception occurred at.
Arg3: ffffd000e2267708, Exception Record Address.
Arg4: ffffd000e2266f20, Context Record Address.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff8027fb54308.

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read.

Key : Analysis.CPU.mSec
Value: 2155.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 7857.

Key : Analysis.Init.CPU.mSec
Value: 749.

Key : Analysis.Init.Elapsed.mSec
Value: 24454.

Key : Analysis.Memory.CommitPeak.Mb
Value: 70.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 7e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff8027f871dc7.

BUGCHECK_P3: ffffd000e2267708.

BUGCHECK_P4: ffffd000e2266f20.

EXCEPTION_RECORD: ffffd000e2267708 -- (.exr 0xffffd000e2267708)
ExceptionAddress: fffff8027f871dc7 (nt!IoGetRelatedDeviceObject+0x0000000000000087)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.

CONTEXT: ffffd000e2266f20 -- (.cxr 0xffffd000e2266f20)
rax=fffde000f9b780d0 rbx=ffffe000f9f31030 rcx=ffffe000f9a2d070
rdx=0000000000000000 rsi=ffffe000f92fbdc0 rdi=ffffe000f9a2d040
rip=fffff8027f871dc7 rsp=ffffd000e2267940 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000002 r10=0000000000000002
r11=ffffd000e2267a48 r12=0000000000000000 r13=0000000000000000
r14=ffffc0011d0cc200 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!IoGetRelatedDeviceObject+0x87:
fffff802`7f871dc7 488b4810 mov rcx,qword ptr [rax+10h] ds:002b:fffde000`f9b780e0=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8027fb542a8.
GetUlongPtrFromAddress: unable to read from fffff8027fb54530.
ffffffffffffffff.

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff801`39613000 PsLoadedModuleList = 0xfffff801`398d85d0
Debug session time: Wed May 26 11:39:11.598 2021 (UTC + 3:00)
System Uptime: 0 days 3:01:15.270
Loading Kernel Symbols.
...............................................................
................................................................
.........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`397534c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd001`ae8a8670=000000000000003b
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff8013963fb2c, Address of the instruction which caused the BugCheck.
Arg3: ffffd001ae8a8f20, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80139962308.

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2640.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 5643.

Key : Analysis.Init.CPU.mSec
Value: 717.

Key : Analysis.Init.Elapsed.mSec
Value: 23180.

Key : Analysis.Memory.CommitPeak.Mb
Value: 64.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff8013963fb2c.

BUGCHECK_P3: ffffd001ae8a8f20.

BUGCHECK_P4: 0

CONTEXT: ffffd001ae8a8f20 -- (.cxr 0xffffd001ae8a8f20)
rax=0000000000000002 rbx=0000000000000000 rcx=ffffe0006b1fb070
rdx=0000000000000002 rsi=0000000000000000 rdi=ffffe0006b1fb070
rip=fffff8013963fb2c rsp=ffffd001ae8a9948 rbp=ffffe0006aff28c0
r8=0000000000000000 r9=0002000000000000 r10=0000000000000001
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210207
nt!IopGetFileObjectExtension+0x18:
fffff801`3963fb2c 498b44c108 mov rax,qword ptr [r9+rax*8+8] ds:002b:00020000`00000018=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steamwebhelper.

STACK_TEXT:
ffffd001`ae8a9948 fffff801`399f6f4a : ffffe000`00000000 ffffe000`0000000e 00000000`00000000 ffffd001`ae8a99a0 : nt!IopGetFileObjectExtension+0x18
ffffd001`ae8a9950 fffff801`399f99a3 : ffffe000`66afb840 ffffd001`ae8a9a99 00000000`00000000 00000000`00000000 : nt!IopCloseFile+0x242
ffffd001`ae8a99e0 fffff801`397633e3 : ffffe000`6adce080 00000000`000000e8 00000000`0063fdb0 00000000`0073f9dc : nt!NtClose+0x1c3
ffffd001`ae8a9b00 00000000`77b92352 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0063e618 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b92352.

SYMBOL_NAME: nt!IopGetFileObjectExtension+18

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 6.3.9600.20012

STACK_COMMAND: .cxr 0xffffd001ae8a8f20 ; kb.

BUCKET_ID_FUNC_OFFSET: 18.

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopGetFileObjectExtension

OS_VERSION: 8.1.9600.20012

BUILDLAB_STR: winblue_ltsb.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 8.1

FAILURE_ID_HASH: {03045510-38a3-0637-f832-f8ea54b50f00}

Followup: MachineOwner.
---------

************ Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff800`18e88000 PsLoadedModuleList = 0xfffff800`1914d5d0
Debug session time: Wed May 26 14:18:53.255 2021 (UTC + 3:00)
System Uptime: 0 days 0:41:06.926
Loading Kernel Symbols.
...............................................................
................................................................
..........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`18fc84c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd000`21310550=000000000000003b
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff80019116b12, Address of the instruction which caused the BugCheck.
Arg3: ffffd00021310e00, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800191d7308.

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2624.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 7653.

Key : Analysis.Init.CPU.mSec
Value: 671.

Key : Analysis.Init.Elapsed.mSec
Value: 21873.

Key : Analysis.Memory.CommitPeak.Mb
Value: 65.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80019116b12.

BUGCHECK_P3: ffffd00021310e00.

BUGCHECK_P4: 0

CONTEXT: ffffd00021310e00 -- (.cxr 0xffffd00021310e00)
rax=fffdc000701d5b20 rbx=0000000000000002 rcx=ffffe000b7c17420
rdx=fffdc000701d5b20 rsi=0000000000000000 rdi=ffffe000b7c17280
rip=fffff80019116b12 rsp=ffffd00021311820 rbp=000000000000000b
r8=ffffc0006eaca1b0 r9=0000000000000000 r10=0000000000000001
r11=0000000000000001 r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=ffffe000b7c17288
iopl=0 nv up ei ng nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!ExDeferredFreePool+0x102:
fffff800`19116b12 488b10 mov rdx,qword ptr [rax] ds:002b:fffdc000`701d5b20=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
ffffd000`21311820 fffff800`19115874 : ffffc000`7108ba90 ffffc000`7003ea80 00000000`656b6f54 ffffe000`b7c17280 : nt!ExDeferredFreePool+0x102
ffffd000`213118a0 fffff800`1925fc44

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff802`21684000 PsLoadedModuleList = 0xfffff802`219495d0
Debug session time: Thu May 27 14:57:24.441 2021 (UTC + 3:00)
System Uptime: 0 days 0:07:45.102
Loading Kernel Symbols.
...............................................................
................................................................
........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`217c44c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd001`26a13360=0000000000000024
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd.
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack.
trace.
Arguments:
Arg1: 000000b500190645.
Arg2: ffffd00126a14548.
Arg3: ffffd00126a13d60.
Arg4: fffff80221718664.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff802219d3308.

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read.

Key : Analysis.CPU.mSec
Value: 2359.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 7774.

Key : Analysis.Init.CPU.mSec
Value: 765.

Key : Analysis.Init.Elapsed.mSec
Value: 19584.

Key : Analysis.Memory.CommitPeak.Mb
Value: 72.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 24.

BUGCHECK_P1: b500190645.

BUGCHECK_P2: ffffd00126a14548.

BUGCHECK_P3: ffffd00126a13d60.

BUGCHECK_P4: fffff80221718664.

EXCEPTION_RECORD: ffffd00126a14548 -- (.exr 0xffffd00126a14548)
ExceptionAddress: fffff80221718664 (nt!FsRtlAcquireHeaderMutex+0x0000000000000024)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.

CONTEXT: ffffd00126a13d60 -- (.cxr 0xffffd00126a13d60)
rax=000000000000fffe rbx=fffdc000d643b140 rcx=ffffc000d643b1a8
rdx=ffffc000d643b140 rsi=ffffc000d643b140 rdi=ffffc000d643b140
rip=fffff80221718664 rsp=ffffd00126a14780 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=ffffc000d643b140
r11=ffffe001f216c180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=ffffe001f20e0de8
iopl=0 nv up ei pl nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!FsRtlAcquireHeaderMutex+0x24:
fffff802`21718664 488b5b30 mov rbx,qword ptr [rbx+30h] ds:002b:fffdc000`d643b170=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802219d32a8.
GetUlongPtrFromAddress: unable to read from fffff802219d3530.
ffffffffffffffff [/CODE]
 
Çözüm
RAM'lerde çok fazla hata var. Mavi ekranların sebebi de bu. Ben mesajımın altına mavi ekranlarınızın dökümünü ekleyeceğim. Bunu satıcıya gösterebilirsiniz.

[CODE title="Mavi ekran dökümler"]************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff801`54a00000 PsLoadedModuleList = 0xfffff801`54cc55d0
Debug session time: Mon May 24 14:29:19.839 2021 (UTC + 3:00)
System Uptime: 0 days 0:08:16.503
Loading Kernel Symbols.
...............................................................
................................................................
.........
Loading User Symbols.
Loading unloaded module list.
.....
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`54b404c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd000`205c5e70=000000000000003b
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff80162275823, Address of the instruction which caused the BugCheck.
Arg3: ffffd000205c6720, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80154d4f308.

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2343.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 6496.

Key : Analysis.Init.CPU.mSec
Value: 733.

Key : Analysis.Init.Elapsed.mSec
Value: 28032.

Key : Analysis.Memory.CommitPeak.Mb
Value: 83.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80162275823.

BUGCHECK_P3: ffffd000205c6720.

BUGCHECK_P4: 0

CONTEXT: ffffd000205c6720 -- (.cxr 0xffffd000205c6720)
rax=ffffc00173103138 rbx=ffffc00173103100 rcx=fffdc00171343608
rdx=ffffc00171343608 rsi=ffffe000d1f8d000 rdi=ffffe000d09957f0
rip=fffff80162275823 rsp=ffffd000205c7140 rbp=ffffd000205c71c9
r8=0000000000000004 r9=0000000000000007 r10=ffffd001e1066000
r11=0000000000000174 r12=0000000000000001 r13=ffffc001713434f0
r14=0000000000000001 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x263:
fffff801`62275823 483901 cmp qword ptr [rcx],rax ds:002b:fffdc001`71343608=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: League of Lege.

STACK_TEXT:
ffffd000`205c7140 fffff801`62275064 : ffffe000`d1f8d000 fffff801`54a9a8a5 00000000`00000001 ffffe000`d1f8d000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x263
ffffd000`205c7230 fffff801`62274e82 : ffffc001`713fa0e0 fffff801`00000000 ffffc001`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x194
ffffd000`205c73b0 fffff801`62119dc2 : ffffc001`6906ab00 00000000`00000000 ffffc001`70e8c5e0 ffffc001`00000007 : dxgmms1!VIDMM_GLOBAL::CloseAllocation+0x52
ffffd000`205c73f0 fffff801`6212a1e2 : ffffc001`713fa0e0 00000000`00000000 00000000`00000000 ffffc001`6906ab00 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x752
ffffd000`205c74f0 fffff801`62126f07 : ffffc001`6ad00000 ffffd000`205c75d9 00000000`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x172
ffffd000`205c7550 fffff801`621252c1 : ffffc001`6ad00000 ffffc001`70e8c5e0 ffffc001`70e8c5e0 fffff960`005171a0 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xa7
ffffd000`205c7580 fffff801`621256a5 : 00000000`00000100 ffffc001`70e8c5e0 fffff901`422a4d88 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x2dd
ffffd000`205c7640 fffff960`001d08f7 : 00000000`000008e8 ffffd000`205c7860 fffff901`422a4c90 ffffe000`d37302c0 : dxgkrnl!DxgkProcessCallout+0x135
ffffd000`205c76a0 fffff960`001d173b : fffff901`422a4c90 ffffe000`d37302c0 00000000`00000000 00000000`ffcf0000 : win32k!GdiProcessCallout+0x1f7
ffffd000`205c7720 fffff801`54dcdafe : ffffd000`205c7860 ffffd000`205c7800 00000000`00000000 00060030`00010002 : win32k!W32pProcessCallout+0x53
ffffd000`205c7750 fffff801`54dccd2c : ffffe000`d1fe0e40 00000000`00000000 00000000`00000000 ffffe000`d3730588 : nt!PsInvokeWin32Callout+0x42
ffffd000`205c7790 fffff801`54e73270 : ffffd000`00000001 ffffe000`d1331080 ffffd000`205c7b00 ffffe000`d1331128 : nt!PspExitThread+0x518
ffffd000`205c78a0 fffff801`54a560aa : 00000000`00000000 ffffe000`d1eb8900 00000000`00000001 00000000`773453ea : nt!KiSchedulerApcTerminate+0x18
ffffd000`205c78d0 fffff801`54b45950 : 00000000`0ebcea90 ffffd000`205c7950 fffff801`54bbbc44 00000000`00000000 : nt!KiDeliverApc+0x2fa
ffffd000`205c7950 fffff801`54b5048a : 00000000`000001f8 00000000`0ebcea90 00000000`00000010 00000000`1215f9f0 : nt!KiInitiateUserApc+0x70
ffffd000`205c7a90 00007ff8`a02620da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0ebce378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`a02620da

SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+263

MODULE_NAME: dxgmms1.

IMAGE_NAME: dxgmms1.sys

IMAGE_VERSION: 6.3.9600.19176

STACK_COMMAND: .cxr 0xffffd000205c6720 ; kb.

BUCKET_ID_FUNC_OFFSET: 263.

FAILURE_BUCKET_ID: 0x3B_c0000005_dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation

OS_VERSION: 8.1.9600.20012

BUILDLAB_STR: winblue_ltsb.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff803`85214000 PsLoadedModuleList = 0xfffff803`854d95d0
Debug session time: Mon May 24 10:31:47.472 2021 (UTC + 3:00)
System Uptime: 0 days 1:34:20.135
Loading Kernel Symbols.
...............................................................
................................................................
..........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`853544c0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffd000`21a552b0=0000000000000024
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd.
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack.
trace.
Arguments:
Arg1: 000000b500190645.
Arg2: ffffd00021a56498.
Arg3: ffffd00021a55cb0.
Arg4: fffff8038523bfd5.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80385563308.

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read.

Key : Analysis.CPU.mSec
Value: 2296.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 7316.

Key : Analysis.Init.CPU.mSec
Value: 703.

Key : Analysis.Init.Elapsed.mSec
Value: 25895.

Key : Analysis.Memory.CommitPeak.Mb
Value: 71.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 24.

BUGCHECK_P1: b500190645.

BUGCHECK_P2: ffffd00021a56498.

BUGCHECK_P3: ffffd00021a55cb0.

BUGCHECK_P4: fffff8038523bfd5.

EXCEPTION_RECORD: ffffd00021a56498 -- (.exr 0xffffd00021a56498)
ExceptionAddress: fffff8038523bfd5 (nt!DeleteNodeFromTree+0x0000000000000165)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.

CONTEXT: ffffd00021a55cb0 -- (.cxr 0xffffd00021a55cb0)
rax=ffffc00159ca6a50 rbx=ffffc001599541b0 rcx=0002000000000000
rdx=ffffc00159954101 rsi=ffffe001496a1488 rdi=ffffc001599541b0
rip=fffff8038523bfd5 rsp=ffffd00021a566d0 rbp=ffffe0014a640708
r8=00000000000021fe r9=0000ffffffffffff r10=ffffe00149000000
r11=0000000000000689 r12=ffffd00021a567ff r13=0000000000000000
r14=0000000000000001 r15=ffffe0014a640100
iopl=0 nv up ei pl nz na po nc.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff802`7f805000 PsLoadedModuleList = 0xfffff802`7faca5d0
Debug session time: Tue May 25 14:00:31.309 2021 (UTC + 3:00)
System Uptime: 0 days 1:20:52.973
Loading Kernel Symbols.
...............................................................
................................................................
........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!IoGetRelatedDeviceObject+0x87:
fffff802`7f871dc7 488b4810 mov rcx,qword ptr [rax+10h] ds:002b:fffde000`f9b780e0=????????????????
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard.
coded breakpoint or assertion was hit, but this system was booted.
/NODEBUG. This is not supposed to happen as developers should never have.
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the.
system is booted /DEBUG. This will let us see why this breakpoint is.
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff8027f871dc7, The address that the exception occurred at.
Arg3: ffffd000e2267708, Exception Record Address.
Arg4: ffffd000e2266f20, Context Record Address.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff8027fb54308.

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read.

Key : Analysis.CPU.mSec
Value: 2155.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 7857.

Key : Analysis.Init.CPU.mSec
Value: 749.

Key : Analysis.Init.Elapsed.mSec
Value: 24454.

Key : Analysis.Memory.CommitPeak.Mb
Value: 70.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 7e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff8027f871dc7.

BUGCHECK_P3: ffffd000e2267708.

BUGCHECK_P4: ffffd000e2266f20.

EXCEPTION_RECORD: ffffd000e2267708 -- (.exr 0xffffd000e2267708)
ExceptionAddress: fffff8027f871dc7 (nt!IoGetRelatedDeviceObject+0x0000000000000087)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.

CONTEXT: ffffd000e2266f20 -- (.cxr 0xffffd000e2266f20)
rax=fffde000f9b780d0 rbx=ffffe000f9f31030 rcx=ffffe000f9a2d070
rdx=0000000000000000 rsi=ffffe000f92fbdc0 rdi=ffffe000f9a2d040
rip=fffff8027f871dc7 rsp=ffffd000e2267940 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000002 r10=0000000000000002
r11=ffffd000e2267a48 r12=0000000000000000 r13=0000000000000000
r14=ffffc0011d0cc200 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!IoGetRelatedDeviceObject+0x87:
fffff802`7f871dc7 488b4810 mov rcx,qword ptr [rax+10h] ds:002b:fffde000`f9b780e0=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8027fb542a8.
GetUlongPtrFromAddress: unable to read from fffff8027fb54530.
ffffffffffffffff.

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff801`39613000 PsLoadedModuleList = 0xfffff801`398d85d0
Debug session time: Wed May 26 11:39:11.598 2021 (UTC + 3:00)
System Uptime: 0 days 3:01:15.270
Loading Kernel Symbols.
...............................................................
................................................................
.........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`397534c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd001`ae8a8670=000000000000003b
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff8013963fb2c, Address of the instruction which caused the BugCheck.
Arg3: ffffd001ae8a8f20, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80139962308.

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2640.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 5643.

Key : Analysis.Init.CPU.mSec
Value: 717.

Key : Analysis.Init.Elapsed.mSec
Value: 23180.

Key : Analysis.Memory.CommitPeak.Mb
Value: 64.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff8013963fb2c.

BUGCHECK_P3: ffffd001ae8a8f20.

BUGCHECK_P4: 0

CONTEXT: ffffd001ae8a8f20 -- (.cxr 0xffffd001ae8a8f20)
rax=0000000000000002 rbx=0000000000000000 rcx=ffffe0006b1fb070
rdx=0000000000000002 rsi=0000000000000000 rdi=ffffe0006b1fb070
rip=fffff8013963fb2c rsp=ffffd001ae8a9948 rbp=ffffe0006aff28c0
r8=0000000000000000 r9=0002000000000000 r10=0000000000000001
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210207
nt!IopGetFileObjectExtension+0x18:
fffff801`3963fb2c 498b44c108 mov rax,qword ptr [r9+rax*8+8] ds:002b:00020000`00000018=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steamwebhelper.

STACK_TEXT:
ffffd001`ae8a9948 fffff801`399f6f4a : ffffe000`00000000 ffffe000`0000000e 00000000`00000000 ffffd001`ae8a99a0 : nt!IopGetFileObjectExtension+0x18
ffffd001`ae8a9950 fffff801`399f99a3 : ffffe000`66afb840 ffffd001`ae8a9a99 00000000`00000000 00000000`00000000 : nt!IopCloseFile+0x242
ffffd001`ae8a99e0 fffff801`397633e3 : ffffe000`6adce080 00000000`000000e8 00000000`0063fdb0 00000000`0073f9dc : nt!NtClose+0x1c3
ffffd001`ae8a9b00 00000000`77b92352 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0063e618 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b92352.

SYMBOL_NAME: nt!IopGetFileObjectExtension+18

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 6.3.9600.20012

STACK_COMMAND: .cxr 0xffffd001ae8a8f20 ; kb.

BUCKET_ID_FUNC_OFFSET: 18.

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopGetFileObjectExtension

OS_VERSION: 8.1.9600.20012

BUILDLAB_STR: winblue_ltsb.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 8.1

FAILURE_ID_HASH: {03045510-38a3-0637-f832-f8ea54b50f00}

Followup: MachineOwner.
---------

************ Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff800`18e88000 PsLoadedModuleList = 0xfffff800`1914d5d0
Debug session time: Wed May 26 14:18:53.255 2021 (UTC + 3:00)
System Uptime: 0 days 0:41:06.926
Loading Kernel Symbols.
...............................................................
................................................................
..........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`18fc84c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd000`21310550=000000000000003b
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff80019116b12, Address of the instruction which caused the BugCheck.
Arg3: ffffd00021310e00, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800191d7308.

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2624.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 7653.

Key : Analysis.Init.CPU.mSec
Value: 671.

Key : Analysis.Init.Elapsed.mSec
Value: 21873.

Key : Analysis.Memory.CommitPeak.Mb
Value: 65.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80019116b12.

BUGCHECK_P3: ffffd00021310e00.

BUGCHECK_P4: 0

CONTEXT: ffffd00021310e00 -- (.cxr 0xffffd00021310e00)
rax=fffdc000701d5b20 rbx=0000000000000002 rcx=ffffe000b7c17420
rdx=fffdc000701d5b20 rsi=0000000000000000 rdi=ffffe000b7c17280
rip=fffff80019116b12 rsp=ffffd00021311820 rbp=000000000000000b
r8=ffffc0006eaca1b0 r9=0000000000000000 r10=0000000000000001
r11=0000000000000001 r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=ffffe000b7c17288
iopl=0 nv up ei ng nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!ExDeferredFreePool+0x102:
fffff800`19116b12 488b10 mov rdx,qword ptr [rax] ds:002b:fffdc000`701d5b20=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
ffffd000`21311820 fffff800`19115874 : ffffc000`7108ba90 ffffc000`7003ea80 00000000`656b6f54 ffffe000`b7c17280 : nt!ExDeferredFreePool+0x102
ffffd000`213118a0 fffff800`1925fc44

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff802`21684000 PsLoadedModuleList = 0xfffff802`219495d0
Debug session time: Thu May 27 14:57:24.441 2021 (UTC + 3:00)
System Uptime: 0 days 0:07:45.102
Loading Kernel Symbols.
...............................................................
................................................................
........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`217c44c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd001`26a13360=0000000000000024
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd.
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack.
trace.
Arguments:
Arg1: 000000b500190645.
Arg2: ffffd00126a14548.
Arg3: ffffd00126a13d60.
Arg4: fffff80221718664.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff802219d3308.

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read.

Key : Analysis.CPU.mSec
Value: 2359.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 7774.

Key : Analysis.Init.CPU.mSec
Value: 765.

Key : Analysis.Init.Elapsed.mSec
Value: 19584.

Key : Analysis.Memory.CommitPeak.Mb
Value: 72.

Key : WER.OS.Branch
Value: winblue_ltsb.

Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z

Key : WER.OS.Version
Value: 8.1.9600.20012

BUGCHECK_CODE: 24.

BUGCHECK_P1: b500190645.

BUGCHECK_P2: ffffd00126a14548.

BUGCHECK_P3: ffffd00126a13d60.

BUGCHECK_P4: fffff80221718664.

EXCEPTION_RECORD: ffffd00126a14548 -- (.exr 0xffffd00126a14548)
ExceptionAddress: fffff80221718664 (nt!FsRtlAcquireHeaderMutex+0x0000000000000024)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.

CONTEXT: ffffd00126a13d60 -- (.cxr 0xffffd00126a13d60)
rax=000000000000fffe rbx=fffdc000d643b140 rcx=ffffc000d643b1a8
rdx=ffffc000d643b140 rsi=ffffc000d643b140 rdi=ffffc000d643b140
rip=fffff80221718664 rsp=ffffd00126a14780 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=ffffc000d643b140
r11=ffffe001f216c180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=ffffe001f20e0de8
iopl=0 nv up ei pl nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!FsRtlAcquireHeaderMutex+0x24:
fffff802`21718664 488b5b30 mov rbx,qword ptr [rbx+30h] ds:002b:fffdc000`d643b170=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802219d32a8.
GetUlongPtrFromAddress: unable to read from fffff802219d3530.
ffffffffffffffff [/CODE]
Tamam
 

Geri
Yukarı