PAGE_FAULT_IN_NONPAGED_AREA mavi ekran hatası

İşletim sistemi
Windows 10
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb48583f7f768, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800438d85ae, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 3436
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 14872
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE:  50
BUGCHECK_P1: ffffb48583f7f768
BUGCHECK_P2: 0
BUGCHECK_P3: fffff800438d85ae
BUGCHECK_P4: 2
READ_ADDRESS: fffff80043cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80043c0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80043c0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffb48583f7f768
MM_INTERNAL_CODE:  2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  steam.exe
TRAP_FRAME:  ffff800c04587610 -- (.trap 0xffff800c04587610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00ffffb48583f7f7 rbx=0000000000000000 rcx=00000000000000f7
rdx=ffffb48583f7f780 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800438d85ae rsp=ffff800c045877a8 rbp=ffff9c8898370b40
 r8=0000000000000000  r9=ffffb48583f7f750 r10=0000000000125ed0
r11=ffff800c045877f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
nt!ObpCaptureHandleInformation+0x8e:
fffff800`438d85ae 410fb64118      movzx   eax,byte ptr [r9+18h] ds:ffffb485`83f7f768=??
Resetting default scope
STACK_TEXT: 
ffff800c`04587368 fffff800`4341e8bb     : 00000000`00000050 ffffb485`83f7f768 00000000`00000000 ffff800c`04587610 : nt!KeBugCheckEx
ffff800c`04587370 fffff800`4320c960     : ffffb484`ea90e080 00000000`00000000 ffff800c`04587690 00000000`00000000 : nt!MiSystemFault+0x1f40ab
ffff800c`04587470 fffff800`4340395e     : ffff9c88`a19ff680 00001f80`00000000 b484e5cb`21e00001 ffff9c88`9fac1b40 : nt!MmAccessFault+0x400
ffff800c`04587610 fffff800`438d85ae     : fffff800`439483b1 00000000`00000690 00000000`00000000 ffffb484`00000000 : nt!KiPageFault+0x35e
ffff800c`045877a8 fffff800`439483b1     : 00000000`00000690 00000000`00000000 ffffb484`00000000 fffff800`43274c12 : nt!ObpCaptureHandleInformation+0x8e
ffff800c`045877b0 fffff800`438d84a5     : fffff800`438d8520 ffff9c88`98370b58 00000000`0017fffc ffff800c`045878f0 : nt!ExpSnapShotHandleTables+0x131
ffff800c`04587840 fffff800`43945b31     : ffff800c`045878f0 00000000`00125ed0 00000000`0017fffc 00000000`00000001 : nt!ObGetHandleInformation+0x39
ffff800c`04587880 fffff800`435e6dc9     : 00000000`111ae050 fffff800`00020000 ffffca00`0ecd3050 ffffb484`f5f5b010 : nt!ExpGetHandleInformation+0x5d
ffff800c`045878c0 fffff800`435e5b37     : 00000000`00000002 00000000`00018002 00000000`00000001 00000000`00180010 : nt!ExpQuerySystemInformation+0x1149
ffff800c`04587ac0 fffff800`434071b8     : ffffb484`f0650000 ffffb484`f268f080 ffff800c`04587b80 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37
ffff800c`04587b00 00007ffe`77e4c674     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`092be538 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`77e4c674
SYMBOL_NAME:  nt!ObpCaptureHandleInformation+8e
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.19041.685
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  8e
FAILURE_BUCKET_ID:  AV_R_INVALID_nt!ObpCaptureHandleInformation
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {ca33f0ed-ea4f-08da-9cd1-d248328d82af}
Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80710224e60, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80710224e60, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 4296
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 8155
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80
    Key  : Analysis.System
    Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x9
  Hiber Crash Dump
  Kernel Generated Triage Dump
BUGCHECK_CODE:  d1
BUGCHECK_P1: fffff80710224e60
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80710224e60
READ_ADDRESS: fffff8070b6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8070b60f340: Unable to get Flags value from nt!KdVersionBlock
fffff8070b60f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 fffff80710224e60
IP_IN_PAGED_CODE:
FACEIT+24e60
fffff807`10224e60 ??              ???
CUSTOMER_CRASH_COUNT:  1
TRAP_FRAME:  fffff60ef4aa70d0 -- (.trap 0xfffff60ef4aa70d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80710224e60 rbx=0000000000000000 rcx=fffff60ef4aa72e0
rdx=fffff60ef4aa73e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80710224e60 rsp=fffff60ef4aa7268 rbp=fffff60ef4aa7320
 r8=0000000000000000  r9=0000000000000000 r10=0000fffff8071022
r11=ffffd5fb5f200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz ac po cy
FACEIT+0x24e60:
fffff807`10224e60 ??              ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
FACEIT+24e60
fffff807`10224e60 ??              ???
STACK_TEXT: 
fffff60e`f4aa6f88 fffff807`0ae06569     : 00000000`0000000a fffff807`10224e60 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff60e`f4aa6f90 fffff807`0ae02869     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff60e`f4aa70d0 fffff807`10224e60     : fffff807`0aebdd51 fffff60e`f4aa72f0 fffff807`0aebd942 fffff60e`f4aa72f0 : nt!KiPageFault+0x469
fffff60e`f4aa7268 fffff807`0aebdd51     : fffff60e`f4aa72f0 fffff807`0aebd942 fffff60e`f4aa72f0 fffff60e`f4aa7330 : FACEIT+0x24e60
fffff60e`f4aa7270 fffff807`0aeb5fd7     : 00000000`00000000 fffff807`0adb564d 00000000`01060030 9a5670dc`8bb844fd : nt!HalEfiSetEnvironmentVariable+0x5d
fffff60e`f4aa72b0 fffff807`0b3ad2b7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalSetEnvironmentVariableEx+0x127
fffff60e`f4aa73a0 fffff807`0b3a036b     : ffffba84`4bcf1d70 ffff960c`fa131f38 00000000`001d0000 ffff960c`fa131f38 : nt!PopSetMemoryOverwriteRequestAction+0x9b
fffff60e`f4aa7410 fffff807`0adfc305     : 00000000`00000000 00000000`0000000c 00000000`00000000 00000000`00000015 : nt!PopSaveHiberContext+0x1099b
fffff60e`f4aa76f0 fffff807`0ad82609     : 00000000`00000000 fffff807`0ae40010 00000000`00000000 fffff807`0adfc2d0 : nt!PopSaveHiberContextWrapper+0x35
fffff60e`f4aa7720 fffff807`0b38f5a0     : 00000000`00000000 00000000`00000000 fffff807`08d41180 00000000`00000000 : nt!HaliAcpiSleep+0x259
fffff60e`f4aa77b0 fffff807`0b38f302     : fffff807`0b6504e0 fffff60e`f4aa7930 fffff807`0b6504e0 00000000`00000000 : nt!PopHandleNextState+0x1f0
fffff60e`f4aa7800 fffff807`0b38effd     : 00000000`00000100 fffff807`0b6504e0 00000020`2331e4ea 00000000`00989680 : nt!PopIssueNextState+0x1a
fffff60e`f4aa7830 fffff807`0b391c89     : 00000000`00000002 fffff60e`f4aa7b40 00000000`00000000 fffff807`0b391a0f : nt!PopInvokeSystemStateHandler+0x2b9
fffff60e`f4aa7a30 fffff807`0b38ca6a     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt!PopEndMirroring+0x1e9
fffff60e`f4aa7af0 fffff807`0b38c755     : 00000000`00000000 00000000`00000000 00000000`00000001 30303633`32393838 : nt!MmDuplicateMemory+0x2be
fffff60e`f4aa7b80 fffff807`0aca2ae5     : ffffba84`54d8f000 ffffba84`54d8f040 fffff807`0b38c620 30325b0a`00000001 : nt!PopTransitionToSleep+0x135
fffff60e`f4aa7c10 fffff807`0adfbbf8     : ffffe600`df600180 ffffba84`54d8f040 fffff807`0aca2a90 205d3933`3a34353a : nt!PspSystemThreadStartup+0x55
fffff60e`f4aa7c60 00000000`00000000     : fffff60e`f4aa8000 fffff60e`f4aa2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME:  FACEIT+24e60
MODULE_NAME: FACEIT
IMAGE_NAME:  FACEIT.sys
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  24e60
FAILURE_BUCKET_ID:  AV_CODE_AV_PAGED_IP_FACEIT!unknown_function
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {fbc352a0-bdf3-e9f1-c588-5baad704a9ec}
Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff806108fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 7233
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 99509
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE:  133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff806108fb320
DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME:  fffff80615bdf130 -- (.trap 0xfffff80615bdf130)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000020
rdx=fffff80615bdf278 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806223e1203 rsp=fffff80615bdf2c0 rbp=ffffa886d776b000
 r8=0000000000000001  r9=0000000000000020 r10=ffffa886e24c6a20
r11=fffff80615bdf1a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nvlddmkm+0x251203:
fffff806`223e1203 ebfe            jmp     nvlddmkm+0x251203 (fffff806`223e1203)
Resetting default scope
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
STACK_TEXT: 
fffff806`15bede18 fffff806`10087372     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff806`15bede20 fffff806`0ff26853     : 0003ad7a`9cce4dbe fffff806`0cee3180 00000000`00000000 fffff806`0cee3180 : nt!KeAccumulateTicks+0x15e2c2
fffff806`15bede80 fffff806`0ff2633a     : fffff806`108f38c0 fffff806`15bdf1b0 fffff806`241b2700 00000000`00007001 : nt!KeClockInterruptNotify+0x453
fffff806`15bedf30 fffff806`0fe2ecd5     : fffff806`108f38c0 00000000`00000000 00000000`00000000 ffffc018`2ae9a2be : nt!HalpTimerClockIpiRoutine+0x1a
fffff806`15bedf60 fffff806`0fff6cba     : fffff806`15bdf1b0 fffff806`108f38c0 00000000`00000003 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`15bedfb0 fffff806`0fff7227     : ffffa886`d759c000 00000000`00000003 00000000`00000000 fffff806`226a9987 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff806`15bdf130 fffff806`223e1203     : ffffa886`e35cb280 ffffa886`d776b000 ffffa886`d7439000 ffffa886`dcbf9688 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff806`15bdf2c0 ffffa886`e35cb280     : ffffa886`d776b000 ffffa886`d7439000 ffffa886`dcbf9688 00000000`00001010 : nvlddmkm+0x251203
fffff806`15bdf2c8 ffffa886`d776b000     : ffffa886`d7439000 ffffa886`dcbf9688 00000000`00001010 fffff806`223e1a3c : 0xffffa886`e35cb280
fffff806`15bdf2d0 ffffa886`d7439000     : ffffa886`dcbf9688 00000000`00001010 fffff806`223e1a3c 00000000`0001ffdf : 0xffffa886`d776b000
fffff806`15bdf2d8 ffffa886`dcbf9688     : 00000000`00001010 fffff806`223e1a3c 00000000`0001ffdf ffffa886`d7439000 : 0xffffa886`d7439000
fffff806`15bdf2e0 00000000`00001010     : fffff806`223e1a3c 00000000`0001ffdf ffffa886`d7439000 00000000`00000000 : 0xffffa886`dcbf9688
fffff806`15bdf2e8 fffff806`223e1a3c     : 00000000`0001ffdf ffffa886`d7439000 00000000`00000000 fffff806`15bdf3d0 : 0x1010
fffff806`15bdf2f0 00000000`0001ffdf     : ffffa886`d7439000 00000000`00000000 fffff806`15bdf3d0 00005779`28a64000 : nvlddmkm+0x251a3c
fffff806`15bdf2f8 ffffa886`d7439000     : 00000000`00000000 fffff806`15bdf3d0 00005779`28a64000 00000000`00000000 : 0x1ffdf
fffff806`15bdf300 00000000`00000000     : fffff806`15bdf3d0 00005779`28a64000 00000000`00000000 00000000`80000000 : 0xffffa886`d7439000
SYMBOL_NAME:  nvlddmkm+251203
MODULE_NAME: nvlddmkm
IMAGE_NAME:  nvlddmkm.sys
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  251203
FAILURE_BUCKET_ID:  0x133_DPC_nvlddmkm!unknown_function
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {15c3af0e-5564-7a80-2e26-65b5115ecc4d}
Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8023b6bc647, Address of the instruction which caused the bugcheck
Arg3: ffffa40814d5b900, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 4046
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 7551
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE:  3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8023b6bc647
BUGCHECK_P3: ffffa40814d5b900
BUGCHECK_P4: 0
CONTEXT:  ffffa40814d5b900 -- (.cxr 0xffffa40814d5b900)
rax=00000000ffe0fffc rbx=00003b873a330330 rcx=00000000001f0003
rdx=00000000001f0003 rsi=0000000000000003 rdi=00003b873a330360
rip=fffff8023b6bc647 rsp=ffffa40814d5c300 rbp=ffffa40814d5c340
 r8=3b873a3303308b0b  r9=0000000000000001 r10=0000000000000001
r11=fffff8023b000000 r12=0000000000000000 r13=0000000000000002
r14=00003b873a330330 r15=ffff940bfab45a00
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ObWaitForMultipleObjects+0x1e7:
fffff802`3b6bc647 0fb6431a        movzx   eax,byte ptr [rbx+1Ah] ds:002b:00003b87`3a33034a=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  War-Win64-Shipping.exe
STACK_TEXT: 
ffffa408`14d5c300 fffff802`3b6bc429     : 00000000`00000000 00000000`00000000 00000000`00000000 00001f80`003f0075 : nt!ObWaitForMultipleObjects+0x1e7
ffffa408`14d5c800 fffff802`3b406bb8     : 00000000`00000000 ffffa408`14d5cb80 ffffbb87`359020c0 ffffbb87`3db99860 : nt!NtWaitForMultipleObjects+0x119
ffffa408`14d5ca90 00007ffe`283ac8f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003c`77c1f408 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`283ac8f4
SYMBOL_NAME:  nt!ObWaitForMultipleObjects+1e7
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.19041.630
STACK_COMMAND:  .cxr 0xffffa40814d5b900 ; kb
BUCKET_ID_FUNC_OFFSET:  1e7
FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObWaitForMultipleObjects
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {b1f995c7-68df-344c-8a4a-f9e68abe4d74}
Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800082d91aa, Address of the instruction which caused the bugcheck
Arg3: ffffa006c30ecc90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 5187
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 12082
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE:  3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff800082d91aa
BUGCHECK_P3: ffffa006c30ecc90
BUGCHECK_P4: 0
CONTEXT:  ffffa006c30ecc90 -- (.cxr 0xffffa006c30ecc90)
rax=0000000000000000 rbx=cd5fc71b19800e47 rcx=0000000000000011
rdx=fffff80008925a70 rsi=fffff80008925a70 rdi=bfb36b7e54d6a46e
rip=fffff800082d91aa rsp=ffffa006c30ed690 rbp=ffffba82570be080
 r8=ffffa006c30ed6a0  r9=ffffcd81805c7470 r10=ffffcd81805c7470
r11=ffff7ef9ff800000 r12=ffffcd81805c73b0 r13=ffffba825705f7b0
r14=ffffcd819044cb80 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!ObLogSecurityDescriptor+0x9a:
fffff800`082d91aa 48395f10        cmp     qword ptr [rdi+10h],rbx ds:002b:bfb36b7e`54d6a47e=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  opera.exe
STACK_TEXT: 
ffffa006`c30ed690 fffff800`082d8f0a     : ffffba82`000000c4 ffffa006`c30ed740 00000000`00000010 00000000`000000c4 : nt!ObLogSecurityDescriptor+0x9a
ffffa006`c30ed710 fffff800`082c706f     : ffffba82`5b1d4260 ffffa006`c30ed870 ffffa006`c30ed830 00000000`00000000 : nt!SeDefaultObjectMethod+0x5a
ffffa006`c30ed770 fffff800`0820a992     : 00000000`00000000 fffff800`085482c5 ffffba82`5705f7b0 ffffba82`5705f7b0 : nt!ObInsertObjectEx+0x33f
ffffa006`c30eda00 fffff800`081f0757     : ffffba82`5705f7b0 00000000`00000000 00000000`000000a0 00000000`00000000 : nt!ObInsertObject+0x22
ffffa006`c30eda50 fffff800`08006bb8     : ffffba82`570be080 00000000`001f003f 00000056`1e9fe9f0 00000056`00200000 : nt!NtCreateJobObject+0x2b7
ffffa006`c30edb00 00007fff`db68d334     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000056`1e9fe848 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`db68d334
SYMBOL_NAME:  nt!ObLogSecurityDescriptor+9a
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.19041.630
STACK_COMMAND:  .cxr 0xffffa006c30ecc90 ; kb
BUCKET_ID_FUNC_OFFSET:  9a
FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObLogSecurityDescriptor
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {c7451bc4-8d5e-bc70-86b5-535f25d13589}
Followup:     MachineOwner
---------
 
Son düzenleme:
  • Belleklerinizi MemTest86 ile test edin.
    Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
    Daha detaylı bilgi için, çerezler sayfamıza bakınız.

  • MSI Afterburner'ı kaldırın.
  • Kasperky ürününü güncelleyin, güncelse bir süre gözlemlemek adına kaldırın.
  • BIOS versiyonunuzu v99'a yükseltin.
  • Riot Vanguard'ı kaldırın.
  • Ekran kartı sürücünüzü DDU ile kaldırıp güncel WHQL sürümü yükleyin.


    [*]
    Kod:
    Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\CsHay\Downloads\121120-58093-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response Time (ms) Location
    Deferred srv*
    Symbol search path is: srv*
    Executable search path is:
    Windows 10 Kernel Version 19041 MP (12 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
    Machine Name:
    Kernel base = 0xfffff800`43000000 PsLoadedModuleList = 0xfffff800`43c2a2b0
    Debug session time: Fri Dec 11 13:34:50.609 2020 (UTC + 3:00)
    System Uptime: 0 days 4:39:22.470
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    .
    Loading User Symbols
    Loading unloaded module list
    ..............
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff800`433f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff800c`04587370=0000000000000050
    11: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced. This cannot be protected by try-except.
    Typically the address is just plain bad or it is pointing at freed memory.
    Arguments:
    Arg1: ffffb48583f7f768, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff800438d85ae, If non-zero, the instruction address which referenced the bad memory
    address.
    Arg4: 0000000000000002, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    KEY_VALUES_STRING: 1
    
    Key : Analysis.CPU.mSec
    Value: 3906
    
    Key : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25
    
    Key : Analysis.DebugData
    Value: CreateObject
    
    Key : Analysis.DebugModel
    Value: CreateObject
    
    Key : Analysis.Elapsed.mSec
    Value: 47448
    
    Key : Analysis.Memory.CommitPeak.Mb
    Value: 76
    
    Key : Analysis.System
    Value: CreateObject
    
    Key : WER.OS.Branch
    Value: vb_release
    
    Key : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    
    Key : WER.OS.Version
    Value: 10.0.19041.1
    
    
    ADDITIONAL_XML: 1
    
    OS_BUILD_LAYERS: 1
    
    BUGCHECK_CODE: 50
    
    BUGCHECK_P1: ffffb48583f7f768
    
    BUGCHECK_P2: 0
    
    BUGCHECK_P3: fffff800438d85ae
    
    BUGCHECK_P4: 2
    
    READ_ADDRESS: fffff80043cfa390: Unable to get MiVisibleState
    Unable to get NonPagedPoolStart
    Unable to get NonPagedPoolEnd
    Unable to get PagedPoolStart
    Unable to get PagedPoolEnd
    fffff80043c0f330: Unable to get Flags value from nt!KdVersionBlock
    fffff80043c0f330: Unable to get Flags value from nt!KdVersionBlock
    unable to get nt!MmSpecialPagesInUse
    ffffb48583f7f768
    
    MM_INTERNAL_CODE: 2
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    BLACKBOXWINLOGON: 1
    
    CUSTOMER_CRASH_COUNT: 1
    
    PROCESS_NAME: steam.exe
    
    TRAP_FRAME: ffff800c04587610 -- (.trap 0xffff800c04587610)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=00ffffb48583f7f7 rbx=0000000000000000 rcx=00000000000000f7
    rdx=ffffb48583f7f780 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800438d85ae rsp=ffff800c045877a8 rbp=ffff9c8898370b40
    r8=0000000000000000 r9=ffffb48583f7f750 r10=0000000000125ed0
    r11=ffff800c045877f0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei pl nz ac pe nc
    nt!ObpCaptureHandleInformation+0x8e:
    fffff800`438d85ae 410fb64118 movzx eax,byte ptr [r9+18h] ds:ffffb485`83f7f768=??
    Resetting default scope
    
    STACK_TEXT:
    ffff800c`04587368 fffff800`4341e8bb : 00000000`00000050 ffffb485`83f7f768 00000000`00000000 ffff800c`04587610 : nt!KeBugCheckEx
    ffff800c`04587370 fffff800`4320c960 : ffffb484`ea90e080 00000000`00000000 ffff800c`04587690 00000000`00000000 : nt!MiSystemFault+0x1f40ab
    ffff800c`04587470 fffff800`4340395e : ffff9c88`a19ff680 00001f80`00000000 b484e5cb`21e00001 ffff9c88`9fac1b40 : nt!MmAccessFault+0x400
    ffff800c`04587610 fffff800`438d85ae : fffff800`439483b1 00000000`00000690 00000000`00000000 ffffb484`00000000 : nt!KiPageFault+0x35e
    ffff800c`045877a8 fffff800`439483b1 : 00000000`00000690 00000000`00000000 ffffb484`00000000 fffff800`43274c12 : nt!ObpCaptureHandleInformation+0x8e
    ffff800c`045877b0 fffff800`438d84a5 : fffff800`438d8520 ffff9c88`98370b58 00000000`0017fffc ffff800c`045878f0 : nt!ExpSnapShotHandleTables+0x131
    ffff800c`04587840 fffff800`43945b31 : ffff800c`045878f0 00000000`00125ed0 00000000`0017fffc 00000000`00000001 : nt!ObGetHandleInformation+0x39
    ffff800c`04587880 fffff800`435e6dc9 : 00000000`111ae050 fffff800`00020000 ffffca00`0ecd3050 ffffb484`f5f5b010 : nt!ExpGetHandleInformation+0x5d
    ffff800c`045878c0 fffff800`435e5b37 : 00000000`00000002 00000000`00018002 00000000`00000001 00000000`00180010 : nt!ExpQuerySystemInformation+0x1149
    ffff800c`04587ac0 fffff800`434071b8 : ffffb484`f0650000 ffffb484`f268f080 ffff800c`04587b80 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37
    ffff800c`04587b00 00007ffe`77e4c674 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
    00000000`092be538 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`77e4c674
    
    
    SYMBOL_NAME: nt!ObpCaptureHandleInformation+8e
    
    MODULE_NAME: nt
    
    IMAGE_NAME: ntkrnlmp.exe
    
    IMAGE_VERSION: 10.0.19041.685
    
    STACK_COMMAND: .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET: 8e
    
    FAILURE_BUCKET_ID: AV_R_INVALID_nt!ObpCaptureHandleInformation
    
    OS_VERSION: 10.0.19041.1
    
    BUILDLAB_STR: vb_release
    
    OSPLATFORM_TYPE: x64
    
    OSNAME: Windows 10
    
    FAILURE_ID_HASH: {ca33f0ed-ea4f-08da-9cd1-d248328d82af}
    
    Followup: MachineOwner
    ---------
    
    Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\CsHay\Downloads\120720-46546-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response Time (ms) Location
    Deferred srv*
    Symbol search path is: srv*
    Executable search path is:
    Windows 10 Kernel Version 19041 MP (12 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
    Machine Name:
    Kernel base = 0xfffff800`07c00000 PsLoadedModuleList = 0xfffff800`0882a3b0
    Debug session time: Mon Dec 7 12:52:16.826 2020 (UTC + 3:00)
    System Uptime: 2 days 13:33:05.061
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    .......................
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff800`07ff5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa006`c30ec390=000000000000003b
    1: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff800082d91aa, Address of the instruction which caused the bugcheck
    Arg3: ffffa006c30ecc90, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    Key : Analysis.CPU.mSec
    Value: 4640
    
    Key : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25
    
    Key : Analysis.DebugData
    Value: CreateObject
    
    Key : Analysis.DebugModel
    Value: CreateObject
    
    Key : Analysis.Elapsed.mSec
    Value: 10775
    
    Key : Analysis.Memory.CommitPeak.Mb
    Value: 77
    
    Key : Analysis.System
    Value: CreateObject
    
    Key : WER.OS.Branch
    Value: vb_release
    
    Key : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    
    Key : WER.OS.Version
    Value: 10.0.19041.1
    
    
    ADDITIONAL_XML: 1
    
    OS_BUILD_LAYERS: 1
    
    BUGCHECK_CODE: 3b
    
    BUGCHECK_P1: c0000005
    
    BUGCHECK_P2: fffff800082d91aa
    
    BUGCHECK_P3: ffffa006c30ecc90
    
    BUGCHECK_P4: 0
    
    CONTEXT: ffffa006c30ecc90 -- (.cxr 0xffffa006c30ecc90)
    rax=0000000000000000 rbx=cd5fc71b19800e47 rcx=0000000000000011
    rdx=fffff80008925a70 rsi=fffff80008925a70 rdi=bfb36b7e54d6a46e
    rip=fffff800082d91aa rsp=ffffa006c30ed690 rbp=ffffba82570be080
    r8=ffffa006c30ed6a0 r9=ffffcd81805c7470 r10=ffffcd81805c7470
    r11=ffff7ef9ff800000 r12=ffffcd81805c73b0 r13=ffffba825705f7b0
    r14=ffffcd819044cb80 r15=0000000000000000
    iopl=0 nv up ei ng nz na pe nc
    cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
    nt!ObLogSecurityDescriptor+0x9a:
    fffff800`082d91aa 48395f10 cmp qword ptr [rdi+10h],rbx ds:002b:bfb36b7e`54d6a47e=????????????????
    Resetting default scope
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    BLACKBOXWINLOGON: 1
    
    CUSTOMER_CRASH_COUNT: 1
    
    PROCESS_NAME: opera.exe
    
    STACK_TEXT:
    ffffa006`c30ed690 fffff800`082d8f0a : ffffba82`000000c4 ffffa006`c30ed740 00000000`00000010 00000000`000000c4 : nt!ObLogSecurityDescriptor+0x9a
    ffffa006`c30ed710 fffff800`082c706f : ffffba82`5b1d4260 ffffa006`c30ed870 ffffa006`c30ed830 00000000`00000000 : nt!SeDefaultObjectMethod+0x5a
    ffffa006`c30ed770 fffff800`0820a992 : 00000000`00000000 fffff800`085482c5 ffffba82`5705f7b0 ffffba82`5705f7b0 : nt!ObInsertObjectEx+0x33f
    ffffa006`c30eda00 fffff800`081f0757 : ffffba82`5705f7b0 00000000`00000000 00000000`000000a0 00000000`00000000 : nt!ObInsertObject+0x22
    ffffa006`c30eda50 fffff800`08006bb8 : ffffba82`570be080 00000000`001f003f 00000056`1e9fe9f0 00000056`00200000 : nt!NtCreateJobObject+0x2b7
    ffffa006`c30edb00 00007fff`db68d334 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
    00000056`1e9fe848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`db68d334
    
    
    SYMBOL_NAME: nt!ObLogSecurityDescriptor+9a
    
    MODULE_NAME: nt
    
    IMAGE_NAME: ntkrnlmp.exe
    
    IMAGE_VERSION: 10.0.19041.630
    
    STACK_COMMAND: .cxr 0xffffa006c30ecc90 ; kb
    
    BUCKET_ID_FUNC_OFFSET: 9a
    
    FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObLogSecurityDescriptor
    
    OS_VERSION: 10.0.19041.1
    
    BUILDLAB_STR: vb_release
    
    OSPLATFORM_TYPE: x64
    
    OSNAME: Windows 10
    
    FAILURE_ID_HASH: {c7451bc4-8d5e-bc70-86b5-535f25d13589}
    
    Followup: MachineOwner
    ---------
    [*]
@Ma'at, sana zahmet incelediğin konularda bundan sonra analiz dosyalarını da ekler misin? :)
 

Geri
Yukarı