Sık sık mavi ekran hatası alıyorum

Tayurak

Kilopat
Katılım
9 Aralık 2017
Mesajlar
23
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Arkadaşlar yaklaşık 3-4 ay önce bilgisayarıma format atıp Windows 10 yükledim. Bu zamana kadar bir sıkıntı yoktu, fakat 3-4 gündür bilgisayarı her açtığımda mavi ekran hataları ile karşılaşıyorum ve çoğu zaman %100'ü gördükten sonra bile yeniden başlatma işlemi yapmıyor, üstelik her çıkan hata bir öncekinden farklı ve başka form yazıları okumama rağmen sorunların tam olarak çözülmediğini gördüm o yüzden burada bir metin açmaya karar verdim. Sorunu çözmeme yardımcı olur musunuz? Teşekkürler.

 
Minidump dosyası oluşturun ve bu konuya atınız. @MayCrasH @Murat5038

 
Mavi ekran hatası bilgisayarındaki her şeyden olabilme ihtimali var. Öncellikle RAM veya HDD test et. Single kullan RAM'leri baktın sıkıntı yok, HDD geç orada sıkıntı yoksa diğer bileşenlere bak. Benim de pek bilgim olduğu sayılmaz sadece yardım ediyorum.
 
minidump klasörünü nasıl oluşturabilirim
 
Windows dosyaların hasarlı temiz kurulum dene.

Fakat emin olmak için şu testleri de yap;
HDtune(Error scan, Health), Memtest86 testi yap, sonuçları fotoğraf şeklinde paylaş.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: ffffd900f3ec4158
Arg3: 91000001d6e80005
Arg4: ffffd901050ee2c0

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 403

BUGCHECK_P2: ffffd900f3ec4158

BUGCHECK_P3: 91000001d6e80005

BUGCHECK_P4: ffffd901050ee2c0

BUGCHECK_STR:  0x1a_403

CPU_COUNT: 4

CPU_MHZ: c14

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  Microsoft.Photo

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-06-2020 18:31:19.0222

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff803657e9730 to fffff803657c14e0

STACK_TEXT: 
fffffb0b`e1f9ea28 fffff803`657e9730 : 00000000`0000001a 00000000`00000403 ffffd900`f3ec4158 91000001`d6e80005 : nt!KeBugCheckEx
fffffb0b`e1f9ea30 fffff803`656b11f7 : 00000000`00000003 fffffb0b`e1f9f180 fffffb0b`e1f9f180 fffffb0b`e1f9f0d0 : nt!MiDeletePteRun+0x1d3490
fffffb0b`e1f9ec50 fffff803`656acd12 : ffffc907`7e04e580 ffffd900`f3ec5000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
fffffb0b`e1f9ec80 fffff803`656acea1 : fffffb0b`e1f9f0d0 ffffd96c`8079f620 00000000`00000000 0a000001`65887867 : nt!MiWalkPageTablesRecursively+0x512
fffffb0b`e1f9ed40 fffff803`656acea1 : fffffb0b`e1f9f0d0 ffffd96c`b6403cf8 00000000`00000000 0a000001`92e85867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffb0b`e1f9ee00 fffff803`656acea1 : fffffb0b`e1f9f0d0 ffffd96c`b65b2018 ffffd96c`00000000 0a000002`034f8867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffb0b`e1f9eec0 fffff803`656ac62c : fffffb0b`e1f9f0d0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffffb0b`e1f9ef80 fffff803`656aaa98 : fffffb0b`e1f9f0d0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffffb0b`e1f9f080 fffff803`656b8bf0 : ffffffff`ffffffff ffffc907`7e04e3f8 fffffb0b`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffffb0b`e1f9f420 fffff803`65bc7a5d : ffffc907`7d621080 ffffc907`7d621080 ffffc907`7561e590 ffffc907`7e04e3f0 : nt!MiDeleteVad+0x860
fffffb0b`e1f9f5e0 fffff803`65bd9e14 : ffffc907`7561e590 ffffc907`7fdc7a40 ffffc907`7d621080 00000000`00000000 : nt!MiUnmapVad+0x49
fffffb0b`e1f9f610 fffff803`65bd98cf : ffffc907`7561e8b0 ffffc907`7561e8b0 ffffc907`7e04e080 fffff803`65a6a3c0 : nt!MiCleanVad+0x30
fffffb0b`e1f9f640 fffff803`65c38771 : ffffffff`00000000 ffffffff`ffffffff fffffb0b`e1f9f801 ffffc907`7e04e080 : nt!MmCleanProcessAddressSpace+0x137
fffffb0b`e1f9f6c0 fffff803`65c5e6d3 : ffffc907`7e04e080 ffffda81`0da4e060 fffffb0b`e1f9f8e9 00000000`00000000 : nt!PspRundownSingleProcess+0x139
fffffb0b`e1f9f740 fffff803`65ccd143 : 00000000`00000001 00000000`00000001 000000a3`2a306000 00000000`00000000 : nt!PspExitThread+0x60b
fffffb0b`e1f9f850 fffff803`6563e551 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
fffffb0b`e1f9f890 fffff803`657c5a60 : 00000000`00000001 fffffb0b`e1f9f950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
fffffb0b`e1f9f950 fffff803`657d2dbf : ffffc907`7d621080 000000a3`2bbff3c8 00000000`00007530 00000000`00001cff : nt!KiInitiateUserApc+0x70
fffffb0b`e1f9fa90 00007ffa`2e939a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000a3`2bbff3a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`2e939a84


THREAD_SHA1_HASH_MOD_FUNC:  cf5c972d8494816023066845de37f86a3bfa7253

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  81ac82b94939ed2fe2da690766838295e8f0d74e

THREAD_SHA1_HASH_MOD:  a9ca63faa9e43cc61ef524ad38163e6a9ae5c358

FOLLOWUP_IP:
nt!MiDeletePteRun+1d3490
fffff803`657e9730 cc              int     3

FAULT_INSTR_CODE:  c78b4ccc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiDeletePteRun+1d3490

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  1d3490

FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

PRIMARY_PROBLEM_CLASS:  0x1a_403_nt!MiDeletePteRun

TARGET_TIME:  2019-12-29T08:51:29.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  4340

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_403_nt!mideletepterun

FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup:     MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80027fc89e5, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80027fc89e5

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff800283733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!SwapContext+4a5
fffff800`27fc89e5 c3              ret

EXCEPTION_PARAMETER2:  ffffffffffffffff

BUGCHECK_STR:  0x1E_c0000005_R

CPU_COUNT: 4

CPU_MHZ: c14

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-06-2020 18:31:16.0670

ANALYSIS_VERSION: 10.0.18362.1 x86fre

BAD_STACK_POINTER:  fffff8002e67c8f8

LAST_CONTROL_TRANSFER:  from fffff8002802fda7 to fffff80027fc14e0

STACK_TEXT: 
fffff800`2e67c8f8 fffff800`2802fda7 : 00000000`0000001e ffffffff`c0000005 fffff800`27fc89e5 00000000`00000000 : nt!KeBugCheckEx
fffff800`2e67c900 fffff800`27fc2362 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1689d7
fffff800`2e67cfb0 fffff800`27fc2330 : fffff800`27fd3416 00000000`00000001 ffffa886`0223e7c0 00000000`00000001 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffa886`0223dbe8 fffff800`27fd3416 : 00000000`00000001 ffffa886`0223e7c0 00000000`00000001 00000000`00000001 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffa886`0223dbf0 fffff800`27fcf1a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116
ffffa886`0223ddd0 fffff800`27fc89e5 : ffeff800`27fc8266 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x322
ffffa886`0223df68 ffeff800`27fc8266 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SwapContext+0x4a5
ffffa886`0223df70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffeff800`27fc8266


THREAD_SHA1_HASH_MOD_FUNC:  bbdc858bba54202f2407b02fd047b4a2666b54ef

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  2c0aa6993d12be31889f79c5881d2a355c4a027b

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!SwapContext+4a5
fffff800`27fc89e5 c3              ret

FAULT_INSTR_CODE:  cb8b48c3

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  nt!SwapContext+4a5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4a5

FAILURE_BUCKET_ID:  0x1E_c0000005_R_STACKPTR_ERROR_nt!SwapContext

BUCKET_ID:  0x1E_c0000005_R_STACKPTR_ERROR_nt!SwapContext

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_R_STACKPTR_ERROR_nt!SwapContext

TARGET_TIME:  2020-01-02T10:01:26.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  b11

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_r_stackptr_error_nt!swapcontext

FAILURE_ID_HASH:  {bd591bce-fa9d-a983-0398-0157fd169b8e}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80410e03612, Address of the instruction which caused the bugcheck
Arg3: ffff83826143d3b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80410e03612

BUGCHECK_P3: ffff83826143d3b0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
Ntfs!ReadIndexBuffer+f2
fffff804`10e03612 49397d10        cmp     qword ptr [r13+10h],rdi

CONTEXT:  ffff83826143d3b0 -- (.cxr 0xffff83826143d3b0)
rax=ffff890a98d31d01 rbx=ffff890a98d31da8 rcx=ffff9d06154e23b9
rdx=0000000000000000 rsi=fff7ae8e562c0018 rdi=0000000000000000
rip=fffff80410e03612 rsp=ffff83826143dda0 rbp=ffff83826143de10
 r8=000000000000000f  r9=0000000000000000 r10=0000000000000004
r11=0000000000000002 r12=ffff890a98d31da0 r13=fff7ae8e562c0000
r14=0000000000001000 r15=ffff890a990fb170
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
Ntfs!ReadIndexBuffer+0xf2:
fffff804`10e03612 49397d10        cmp     qword ptr [r13+10h],rdi ds:002b:fff7ae8e`562c0010=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: c14

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  nvcontainer.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-06-2020 18:31:13.0876

ANALYSIS_VERSION: 10.0.18362.1 x86fre

DEVICE_OBJECT: 0000000000000ba8

LAST_CONTROL_TRANSFER:  from fffff80410e03022 to fffff80410e03612

STACK_TEXT: 
ffff8382`6143dda0 fffff804`10e03022 : ffff9d06`1ab96ac8 00000000`00000000 ffff890a`98d31cf0 fffff804`00000004 : Ntfs!ReadIndexBuffer+0xf2
ffff8382`6143de50 fffff804`10dfe80e : ffff890a`990fb170 ffffae8e`31fcad00 00000000`00000000 fffff804`00000000 : Ntfs!FindFirstIndexEntry+0x182
ffff8382`6143df10 fffff804`10e0142b : 00000000`00000000 ffff890a`990fb170 ffff9d06`1ab96ac8 ffff9d06`1ab96ac8 : Ntfs!NtfsRestartIndexEnumeration+0x176
ffff8382`6143e1a0 fffff804`10dffb0c : ffff9d06`1ab96ac8 ffff9d06`1f1f4010 ffff9d06`15fd8180 ffff890a`990fb170 : Ntfs!NtfsQueryDirectory+0xecb
ffff8382`6143e400 fffff804`10dffa1e : 00000000`00000000 00000000`00000008 ffff9d06`1f1f4010 00000000`00000000 : Ntfs!NtfsCommonDirectoryControl+0xa4
ffff8382`6143e440 fffff804`0ea31f79 : 00000000`00000000 ffff9d06`1f1f4010 ffff9d06`1ab96ac8 ffff8382`6143e468 : Ntfs!NtfsFsdDirectoryControl+0xbe
ffff8382`6143e4b0 fffff804`102e55d9 : 00000000`00000000 00000000`00000000 ffff9d06`1c7b10f8 ffff890a`96e75bb0 : nt!IofCallDriver+0x59
ffff8382`6143e4f0 fffff804`102e2bee : ffff8382`6143e590 ffff9d06`190759a8 00000000`00000001 ffff9d06`1c7b10f8 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x159
ffff8382`6143e570 fffff804`10c7ef68 : ffff9d06`1c7b1010 00000000`0000027c ffff8382`6143e789 00000000`00000000 : FLTMGR!FltPerformSynchronousIo+0x2ee
ffff8382`6143e610 fffff804`102e4a5d : ffff9d06`1d484548 ffff8382`6143e768 ffff9d06`00000001 00000000`0000003c : Wof!WofPreDirectoryControlCallback+0x288
ffff8382`6143e6e0 fffff804`102e45a0 : ffff8382`6143e8c0 00000000`00000000 ffff9d06`1d2e600c 00000000`00060800 : FLTMGR!FltpPerformPreCallbacks+0x2fd
ffff8382`6143e7f0 fffff804`102e4112 : 00000000`00000000 ffff8382`6143e8c0 ffff9d06`1d2e6010 ffff8382`6143e8d0 : FLTMGR!FltpPassThroughInternal+0x90
ffff8382`6143e820 fffff804`102e3efe : ffff9d06`1dbce080 00000000`00000001 00000000`00000020 00000000`00000001 : FLTMGR!FltpPassThrough+0x162
ffff8382`6143e8a0 fffff804`0ea31f79 : ffff9d06`1d2e6010 00000000`00000004 ffff8382`6143ea60 00000000`00000000 : FLTMGR!FltpDispatch+0x9e
ffff8382`6143e900 fffff804`0efe95e5 : ffff8382`6143eb80 ffff9d06`1d2e6010 00000000`00000001 ffff9d06`1ff44950 : nt!IofCallDriver+0x59
ffff8382`6143e940 fffff804`0f004acf : 00000000`00000ba8 00000000`00000000 00000000`00000000 ffff8382`6143eb80 : nt!IopSynchronousServiceTail+0x1a5
ffff8382`6143e9e0 fffff804`0ebd2d15 : 00000000`000009c8 ffff8382`6143eb80 ffff9d06`1dda4de0 fffff804`0f0b077d : nt!NtQueryDirectoryFileEx+0xbf
ffff8382`6143ea90 00007ff9`7c07e834 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000009f`b1efe5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`7c07e834


THREAD_SHA1_HASH_MOD_FUNC:  a84a5d15e2cbcf3fbd2be6ff09739b0da6138956

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  58aeeffb373f31d2a861e2ceca3346c587e2c955

THREAD_SHA1_HASH_MOD:  613dbbc6a918d2074553db4e5eb05ec378e079e0

FOLLOWUP_IP:
Wof!WofPreDirectoryControlCallback+288
fffff804`10c7ef68 0f1f440000      nop     dword ptr [rax+rax]

FAULT_INSTR_CODE:  441f0f

SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  Wof!WofPreDirectoryControlCallback+288

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Wof

IMAGE_NAME:  Wof.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.418

STACK_COMMAND:  .cxr 0xffff83826143d3b0 ; kb

BUCKET_ID_FUNC_OFFSET:  288

FAILURE_BUCKET_ID:  0x3B_c0000005_Wof!WofPreDirectoryControlCallback

BUCKET_ID:  0x3B_c0000005_Wof!WofPreDirectoryControlCallback

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_Wof!WofPreDirectoryControlCallback

TARGET_TIME:  2020-01-02T10:07:13.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  26b3

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_wof!wofpredirectorycontrolcallback

FAILURE_ID_HASH:  {c4606a74-b269-5e61-6320-9f10cc3e0751}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8056c7fa0bb, The address that the exception occurred at
Arg3: ffff8b0c38445768, Exception Record Address
Arg4: ffff8b0c38444fb0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8056c7fa0bb

BUGCHECK_P3: ffff8b0c38445768

BUGCHECK_P4: ffff8b0c38444fb0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObpRemoveObjectRoutine+5b
fffff805`6c7fa0bb 488b8788000000  mov     rax,qword ptr [rdi+88h]

EXCEPTION_RECORD:  ffff8b0c38445768 -- (.exr 0xffff8b0c38445768)
ExceptionAddress: fffff8056c7fa0bb (nt!ObpRemoveObjectRoutine+0x000000000000005b)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000088
Attempt to read from address 0000000000000088

CONTEXT:  ffff8b0c38444fb0 -- (.cxr 0xffff8b0c38444fb0)
rax=0000000000000000 rbx=ffff990eb2fec330 rcx=00000000000000aa
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8056c7fa0bb rsp=ffff8b0c384459a0 rbp=ffffae89ab1799e0
 r8=000000000000000f  r9=ffffae89b0b8e340 r10=ffffae89b0ec84b0
r11=ffff8b0c38445a10 r12=ffffae89ab179a60 r13=0000000000000001
r14=ffffae89ab1799e0 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00210246
nt!ObpRemoveObjectRoutine+0x5b:
fffff805`6c7fa0bb 488b8788000000  mov     rax,qword ptr [rdi+88h] ds:002b:00000000`00000088=????????????????
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: c14

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

CURRENT_IRQL:  0

FOLLOWUP_IP:
nt!ObpRemoveObjectRoutine+5b
fffff805`6c7fa0bb 488b8788000000  mov     rax,qword ptr [rdi+88h]

BUGCHECK_STR:  AV

READ_ADDRESS: fffff8056c7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000088

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000088

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-06-2020 18:31:11.0189

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8056c2390c4 to fffff8056c7fa0bb

STACK_TEXT: 
ffff8b0c`384459a0 fffff805`6c2390c4 : 00000000`00000000 00000000`00000000 ffffae89`ab1799e0 ffff990e`b2fec360 : nt!ObpRemoveObjectRoutine+0x5b
ffff8b0c`38445a00 fffff805`6c28aa73 : ffff8b0c`38445a00 ffff8b0c`38445ae8 ffffae89`ab1799e0 ffff8b0c`38445ae8 : nt!ObfDereferenceObject+0xa4
ffff8b0c`38445a40 fffff805`6c28b940 : 00000000`0000529a ffff8b0c`38445b09 ffffae89`b8d187e0 00000000`00000000 : nt!CcDeleteSharedCacheMap+0x157
ffff8b0c`38445a90 fffff805`6c2bd095 : ffffae89`ab088900 ffffae89`00000000 00000000`0000529a ffff8b0c`3ade7a90 : nt!CcWriteBehindInternal+0x3a0
ffff8b0c`38445b70 fffff805`6c32a7a5 : ffffae89`abde8600 00000000`00000080 ffffae89`ab077040 00000224`bcbbbdfe : nt!ExpWorkerThread+0x105
ffff8b0c`38445c10 fffff805`6c3c8b2a : ffffd681`d3d51180 ffffae89`abde8600 fffff805`6c32a750 73657547`63496d56 : nt!PspSystemThreadStartup+0x55
ffff8b0c`38445c60 00000000`00000000 : ffff8b0c`38446000 ffff8b0c`38440000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  da0edd7bd400f10487369d4d6c75049c64954ec5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  555b579c211d36a1d9bd3fe968f8bdb876ce0152

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FAULT_INSTR_CODE:  88878b48

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpRemoveObjectRoutine+5b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .cxr 0xffff8b0c38444fb0 ; kb

BUCKET_ID_FUNC_OFFSET:  5b

FAILURE_BUCKET_ID:  AV_nt!ObpRemoveObjectRoutine

BUCKET_ID:  AV_nt!ObpRemoveObjectRoutine

PRIMARY_PROBLEM_CLASS:  AV_nt!ObpRemoveObjectRoutine

TARGET_TIME:  2020-01-04T09:13:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1c05

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!obpremoveobjectroutine

FAILURE_ID_HASH:  {e17dac7a-8c25-c4a4-6b6a-1087fb87207e}

Followup:     MachineOwner
---------
RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffff9a0cdaf687a0, Address of resource
Arg2: ffff9a0cd8dec043, Address of thread
Arg3: ffff9a0cdaee9f50, Address of owner table if there is one
Arg4: 0000000000000002

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffff9a0cdaf687a0

BUGCHECK_P2: ffff9a0cd8dec043

BUGCHECK_P3: ffff9a0cdaee9f50

BUGCHECK_P4: 2

CPU_COUNT: 4

CPU_MHZ: c14

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xE3

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-06-2020 18:31:09.0126

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff800335f5d2f to fffff800335c14e0

STACK_TEXT: 
fffffa02`6f844ee8 fffff800`335f5d2f : 00000000`000000e3 ffff9a0c`daf687a0 ffff9a0c`d8dec043 ffff9a0c`daee9f50 : nt!KeBugCheckEx
fffffa02`6f844ef0 fffff800`33501497 : ffff9a0c`0000000e 00000000`00000000 ffff9a0c`d4936af8 ffff9a0c`da2301f0 : nt!ExpReleaseResourceSharedForThreadLite+0x1bf1df
fffffa02`6f844fa0 fffff800`3511e2c9 : ffff9a0c`d4936af8 ffff9a0c`cfa17e40 ffff9a0c`cfe68180 fffff800`3346b53d : nt!ExReleaseResourceForThreadLite+0xe7
fffffa02`6f845000 fffff800`334477d9 : ffff9a0c`d5f0f9a0 ffff9a0c`cfdd0040 ffff9a0c`d5f0f9a0 ffff9a0c`d5f0f9a0 : Ntfs!NtfsMasterIrpAsyncCompletionRoutine+0x219
fffffa02`6f845160 fffff800`334476a7 : ffff9a0c`cfd62060 ffff9a0c`cfd62101 ffff9a0c`d5f0f9a0 ffff9a0c`d5f0fb48 : nt!IopfCompleteRequest+0x119
fffffa02`6f845270 fffff800`35be6e40 : 0000015b`acc2151b ffff9a0c`d62b0ac0 fffffa02`6f8453a0 ffff9a0c`d62b0ac0 : nt!IofCompleteRequest+0x17
fffffa02`6f8452a0 fffff800`334477d9 : ffff9a0c`d963714b 00000000`00000000 732555e1`68744d05 00000000`00000000 : CLASSPNP!TransferPktComplete+0x640
fffffa02`6f8454a0 fffff800`334476a7 : 00000000`01008000 ffff9a0c`cfa21101 ffff9a0c`cfa211b0 ffff8680`63e32fa0 : nt!IopfCompleteRequest+0x119
fffffa02`6f8455b0 fffff800`34f7999d : fffff800`34909980 ffff9a0c`cfa1d260 fffffa02`6f8457b0 00000000`00000000 : nt!IofCompleteRequest+0x17
fffffa02`6f8455e0 fffff800`34f7928a : 00000000`00000000 00000000`00989680 fffffa02`6f8457b0 ffff8680`63e32ef0 : storport!RaidCompleteRequestEx+0x8d
fffffa02`6f8456b0 fffff800`34f8d60c : ffff9a0c`d3d98108 00000000`00000000 00000000`00000000 00000000`00000000 : storport!RaidUnitCompleteRequest+0x5da
fffffa02`6f845850 fffff800`3346ae95 : ffff9a0c`cfac0180 00000000`00000001 fffffa02`6f8458a8 00000000`00000000 : storport!RaidpAdapterRedirectDpcRoutine+0x8c
fffffa02`6f8458f0 fffff800`3346a4ef : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
fffffa02`6f845a30 fffff800`335c5024 : ffffffff`00000000 ffff8680`63942180 ffff8680`63953140 ffff9a0c`d81d9080 : nt!KiRetireDpcList+0x1ef
fffffa02`6f845c60 00000000`00000000 : fffffa02`6f846000 fffffa02`6f840000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84


THREAD_SHA1_HASH_MOD_FUNC:  19f1d0adaf60b1c4cd2620e8b26a8cd66e17ffa1

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  8bed40e28526d9d2230eedeef96ee9da399e619e

THREAD_SHA1_HASH_MOD:  eb76f151b80048f989eee82c67cf5bd99ef89187

FOLLOWUP_IP:
CLASSPNP!TransferPktComplete+640
fffff800`35be6e40 0f1f440000      nop     dword ptr [rax+rax]

FAULT_INSTR_CODE:  441f0f

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  CLASSPNP!TransferPktComplete+640

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: CLASSPNP

IMAGE_NAME:  CLASSPNP.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  9ed6e49

IMAGE_VERSION:  10.0.18362.1216

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  640

FAILURE_BUCKET_ID:  0xE3_CLASSPNP!TransferPktComplete

BUCKET_ID:  0xE3_CLASSPNP!TransferPktComplete

PRIMARY_PROBLEM_CLASS:  0xE3_CLASSPNP!TransferPktComplete

TARGET_TIME:  2020-01-06T14:51:38.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1d1c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xe3_classpnp!transferpktcomplete

FAILURE_ID_HASH:  {6048cf18-0ef5-4393-3d1d-855a2eb9f6c8}

Followup:     MachineOwner
---------
 
Bios u güncelleyin
BIOS güncelledim
HD Tune'daki testleri yaptım ikisi de sağlıklı çıktı fakat Memtest86 yapmak için USB sürücümü seçiyorum ve program hata verip USB sürücüme yazmıyor.
 
Son düzenleyen: Moderatör:
HD Tune'daki testleri yaptım ikisi de sağlıklı çıktı fakat Memtest86 yapmak için USB sürücümü seçiyorum ve program hata verip USB sürücüme yazmıyor.
Aldığınız hatanın fotoğrafını paylaşın.

HDTune'den çıkan sonuçları siz değerlendirin demedim, fotoğraf şeklinde sonuçları istiyorum.
"Quick Scan yapma"
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…