SYSTEM_SERVICE_EXCEPTION mavi ekran hatası

barisbehram

Decapat
Katılım
13 Eylül 2018
Mesajlar
23
Her seferinde hata kodları değişiyor. Sondan başa doğru bir kaçını yazıyorum:

-Attempted write to readonly Memory
-Driver IRQL_NOT_LESS_OR_EQUAL
-System thread exception not handled
-System service exception

Ve bunun gibi dahası var. Ne olduğunu tam anlamadım. Size minidump dosyalarının linkini veriyorum: dmp

Yardımcı olursanız çok sevinirim.
 
Son düzenleyen: Moderatör:
Memtest86 ile bellek testi yapmayı deneyebilir misiniz?

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
 
Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff965008fceff8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffa0831b4cd3c0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4374

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5923

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: ffff965008fceff8

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: ffffa0831b4cd3c0

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffffa0831b4cd3c0 -- (.trap 0xffffa0831b4cd3c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000311c5e
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805646f5590 rsp=ffffa0831b4cd550 rbp=0000000000000000
r8=0000000fffffffff  r9=0000000000311c5e r10=0000000f002fefaa
r11=ffff965008fceff8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!MiUnlinkPageFromList+0x6d0:
fffff805`646f5590 f0490fb10b      lock cmpxchg qword ptr [r11],rcx ds:ffff9650`08fceff8=????????????????
Resetting default scope

STACK_TEXT:
ffffa083`1b4cd1c8 fffff805`6484075e     : 00000000`000000be ffff9650`08fceff8 8a000000`00200121 ffffa083`1b4cd3c0 : nt!KeBugCheckEx
ffffa083`1b4cd1d0 fffff805`646ea6cf     : 8a000000`00200121 00000000`00000003 ffffa083`1b4cd440 00000000`00000000 : nt!MiRaisedIrqlFault+0x1be812
ffffa083`1b4cd220 fffff805`6480275e     : ffffab5a`676b1108 00000267`6b176000 0000007f`fffffff8 ffffe506`448c7080 : nt!MmAccessFault+0x4ef
ffffa083`1b4cd3c0 fffff805`646f5590     : ffff9380`0da86f80 8a000004`8d7a8867 ffffa881`33b58bb0 00000000`00000000 : nt!KiPageFault+0x35e
ffffa083`1b4cd550 fffff805`646f4be0     : 00000000`00000003 fffff805`00000000 00000000`003796a9 ffffa083`1b4cd6c0 : nt!MiUnlinkPageFromList+0x6d0
ffffa083`1b4cd5e0 fffff805`646f41c4     : ffffa083`1b4cd880 ffffa083`1b4cd920 0000000f`ffffffff 00000003`796a9880 : nt!MiHandleTransitionFault+0x180
ffffa083`1b4cd660 fffff805`646f3c16     : ffffa083`1b4cd880 00000000`00000000 ffff9380`088b31e0 00000000`00000002 : nt!MiResolveTransitionFault+0x424
ffffa083`1b4cd720 fffff805`646ec425     : ffffa083`1b4cd880 00000000`00000002 ffffa083`1b4cd860 ffffe506`448c7700 : nt!MiResolveProtoPteFault+0x1236
ffffa083`1b4cd820 fffff805`646ea369     : 00000000`00000110 00000000`00000004 00000000`c0000016 ffffac07`f573f458 : nt!MiDispatchFault+0x3d5
ffffa083`1b4cd960 fffff805`6480275e     : ffffe506`3ec8f080 00000000`00000000 00000000`00000000 ffffffff`ffaa17d0 : nt!MmAccessFault+0x189
ffffa083`1b4cdb00 00007ff9`71ec74b4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000091`6abfdb98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`71ec74b4


SYMBOL_NAME:  nt!MiRaisedIrqlFault+1be812

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1be812

FAILURE_BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000005df530, page frame number
Arg3: 0000000000000003, current page state
Arg4: 00000000005df531, 0

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6156

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11087

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 99

BUGCHECK_P2: 5df530

BUGCHECK_P3: 3

BUGCHECK_P4: 5df531

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  StartMenuExperienceHost.exe

STACK_TEXT:
fffff402`04d58638 fffff807`779ec577     : 00000000`0000004e 00000000`00000099 00000000`005df530 00000000`00000003 : nt!KeBugCheckEx
fffff402`04d58640 fffff807`779494d8     : 00000000`00000000 90000005`e30ff025 ffffb584`69fca740 ffffb584`69fca740 : nt!MiBadShareCount+0x5b
fffff402`04d58680 fffff807`77949cae     : fffff402`04d58c58 fffff402`04d58a10 00000000`00000000 fffff402`04d58960 : nt!MiDeletePteRun+0x1798
fffff402`04d58890 fffff807`7794a88b     : fffff402`04d589c0 00000000`00000000 ffffec80`b14b1978 00000000`00000000 : nt!MiDeleteVaTail+0x6e
fffff402`04d588c0 fffff807`77922ae0     : 00000000`00000001 fffff402`00000000 ffffb584`69fca590 ffffb584`6a009080 : nt!MiDeletePagablePteRange+0x4ab
fffff402`04d58bd0 fffff807`77d04aa9     : ffffb584`00000000 00000000`00000000 00000162`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
fffff402`04d58ce0 fffff807`77d04882     : ffffb584`6b054c80 00000000`00000000 ffffb584`69fca0c0 00000000`00000000 : nt!MiUnmapVad+0x49
fffff402`04d58d10 fffff807`77d046f9     : ffffb584`6a009080 00000021`0f3fc280 00000162`9f1b8040 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
fffff402`04d58df0 fffff807`77a064f1     : ffffb584`6a009080 00000162`96320000 00000021`0f3fc248 ffffb584`69fca0c0 : nt!NtUnmapViewOfSectionEx+0x99
fffff402`04d58e40 00007ffb`89d4f704     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000021`0f3fc268 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`89d4f704


SYMBOL_NAME:  nt!MiBadShareCount+5b

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  5b

FAILURE_BUCKET_ID:  0x4E_99_nt!MiBadShareCount

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {60e553e9-e4c5-ed08-9be6-c353e0011003}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801066917b3, The address that the exception occurred at
Arg3: ffff8800d86dbbf8, Exception Record Address
Arg4: ffff8800d86db430, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 6734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 43992

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff801066917b3

BUGCHECK_P3: ffff8800d86dbbf8

BUGCHECK_P4: ffff8800d86db430

EXCEPTION_RECORD:  ffff8800d86dbbf8 -- (.exr 0xffff8800d86dbbf8)
ExceptionAddress: fffff801066917b3 (nt!MiDrainZeroLookasides+0x00000000000000b3)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  ffff8800d86db430 -- (.cxr 0xffff8800d86db430)
rax=0000000000000080 rbx=0000000000000202 rcx=fffff8800057a5f0
rdx=fffff880044355f0 rsi=fffffb8000006750 rdi=0000000000000080
rip=fffff801066917b3 rsp=ffff8800d86dbe30 rbp=fffff8801220e860
r8=fffff880044355f0  r9=fffffb8000007c90 r10=fffffb8000006750
r11=fffff8800057a5f0 r12=000000000001d375 r13=0000000000000076
r14=0000000000000075 r15=fffff8801220e5f0
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!MiDrainZeroLookasides+0xb3:
fffff801`066917b3 488b07          mov     rax,qword ptr [rdi] ds:002b:00000000`00000080=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  2

PROCESS_NAME:  System

READ_ADDRESS: fffff801070fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8010700f340: Unable to get Flags value from nt!KdVersionBlock
fffff8010700f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffff8800`d86dbe30 fffff801`0671b613     : fffff880`1220e5f0 fffffb80`00003a00 fffff880`00000076 ffffffff`00000001 : nt!MiDrainZeroLookasides+0xb3
ffff8800`d86dbec0 fffff801`0671b1bb     : 00000000`00000000 fffff27c`00000000 00000000`ffffffff 00000000`00000000 : nt!MiTradePage+0x363
ffff8800`d86dbf90 fffff801`0671c37d     : fffff880`1220e500 00000000`00000000 00000000`ffffffff 00000000`000009d2 : nt!MiClaimPhysicalRun+0xbb
ffff8800`d86dc030 fffff801`066ab215     : 00000000`69646d4d fffff801`066ca78f 00000000`00000002 00000000`00012000 : nt!MiFindContiguousPages+0x5cd
ffff8800`d86dc1f0 fffff801`0663b113     : ffffffff`ffffffff 00000000`00000004 ffffa901`89b86760 fffff801`0663a955 : nt!MiAllocateMostlyContiguousPagesForMdl+0x85
ffff8800`d86dc280 fffff801`0663b204     : 00000000`00800000 ffff8800`d86dc3e9 00000000`00000000 00007fff`ffffffff : nt!MiFindPagesForMdl+0x107
ffff8800`d86dc2f0 fffff801`0663a749     : 00000000`00000000 00000000`4d52564e 00000000`00000527 00000000`00000000 : nt!MiAllocatePagesForMdl+0xc4
ffff8800`d86dc430 fffff801`0663a5ed     : ffff8800`d86dc570 ffff8800`d86dc5b0 ffffa901`81c95030 01a00070`00000000 : nt!MmAllocatePartitionNodePagesForMdlEx+0xc9
ffff8800`d86dc4b0 fffff801`123a00a0     : 00000000`00000001 00000000`4d52564e 00000000`4d52564e 00000000`00000000 : nt!MmAllocatePagesForMdlEx+0x4d
ffff8800`d86dc500 fffff801`165dde83     : ffffa901`81c95030 00000000`0e6f4dbf ffffa901`81c66000 ffffa901`89b871f0 : dxgkrnl!DxgkAllocatePagesForMdlCB+0x90
ffff8800`d86dc540 ffffa901`81c95030     : 00000000`0e6f4dbf ffffa901`81c66000 ffffa901`89b871f0 00000000`00000000 : nvlddmkm+0x80de83
ffff8800`d86dc548 00000000`0e6f4dbf     : ffffa901`81c66000 ffffa901`89b871f0 00000000`00000000 fffff801`15f642fe : 0xffffa901`81c95030
ffff8800`d86dc550 ffffa901`81c66000     : ffffa901`89b871f0 00000000`00000000 fffff801`15f642fe 00000000`00800000 : 0xe6f4dbf
ffff8800`d86dc558 ffffa901`89b871f0     : 00000000`00000000 fffff801`15f642fe 00000000`00800000 00007fff`ffffffff : 0xffffa901`81c66000
ffff8800`d86dc560 00000000`00000000     : fffff801`15f642fe 00000000`00800000 00007fff`ffffffff 00000000`00000000 : 0xffffa901`89b871f0


SYMBOL_NAME:  dxgkrnl!DxgkAllocatePagesForMdlCB+90

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .cxr 0xffff8800d86db430 ; kb

BUCKET_ID_FUNC_OFFSET:  90

FAILURE_BUCKET_ID:  AV_dxgkrnl!DxgkAllocatePagesForMdlCB

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5383e1be-168d-19bd-cf93-ac69beaa556a}

Followup:     MachineOwner
---------

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff3fffd2fffe8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffff9d039b0669a0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6452

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10213

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: fffff3fffd2fffe8

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: ffff9d039b0669a0

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Adobe Premiere Pro.exe

TRAP_FRAME:  ffff9d039b0672a0 -- (.trap 0xffff9d039b0672a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a82daaa0 rbx=0000000000000000 rcx=00000000a82dc030
rdx=fffff6d69affb4a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff6ac895f8322 rsp=ffff9d039b067438 rbp=0000000000000003
r8=0000000000000010  r9=000000000000000b r10=0000fffff6ac8958
r11=fffff6d7432d77a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
win32kfull!memcpy+0x122:
fffff6ac`895f8322 0f2951d0        movaps  xmmword ptr [rcx-30h],xmm2 ds:00000000`a82dc000=????????????????????????????????
Resetting default scope

STACK_TEXT:
ffff9d03`9b0667a8 fffff803`5864075e     : 00000000`000000be fffff3ff`fd2fffe8 8a000000`00200121 ffff9d03`9b0669a0 : nt!KeBugCheckEx
ffff9d03`9b0667b0 fffff803`584ea6cf     : 8a000000`00200121 00000000`00000003 ffff9d03`9b066a20 00000000`00000000 : nt!MiRaisedIrqlFault+0x1be812
ffff9d03`9b066800 fffff803`5860275e     : fffff6d7`40621878 fffff6ac`8987030a fffff6d7`429e2ad0 fffff6ac`885143a5 : nt!MmAccessFault+0x4ef
ffff9d03`9b0669a0 fffff803`584f1167     : 00000008`000006e5 fffff803`584ef59e 00000000`00000010 00000000`00040246 : nt!KiPageFault+0x35e
ffff9d03`9b066b30 fffff803`584f02eb     : fffff803`58e50c00 fffff100`000000a5 00000000`000000a5 00000000`00000000 : nt!MiGetPage+0x547
ffff9d03`9b066c10 fffff803`584ed958     : ffff9d03`9b066fd0 00000000`00000000 00000000`00000001 fffff803`00000001 : nt!MiGetPageChain+0x48b
ffff9d03`9b066e50 fffff803`584e8440     : ffff9d03`9b066fd0 ffffffff`ffffffff fffff803`00000000 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x6e8
ffff9d03`9b066f80 fffff803`584eb0cd     : ffff9d03`9b0671c0 ffff9d03`9b067100 ffff9d03`9b067108 ffff9d03`9b067118 : nt!MiZeroFault+0x380
ffff9d03`9b067070 fffff803`584ea34a     : 00000000`00000001 00000000`00000000 00000080`00000000 00000000`00000000 : nt!MiUserFault+0x80d
ffff9d03`9b067100 fffff803`5860275e     : 00000000`00000001 00000000`00000000 ffffcc85`ac2f37c0 fffff803`5854aadf : nt!MmAccessFault+0x16a
ffff9d03`9b0672a0 fffff6ac`895f8322     : fffff6ac`89584268 00000000`00000000 ffffcc85`afce00c0 fffff6d7`40911000 : nt!KiPageFault+0x35e
ffff9d03`9b067438 fffff6ac`89584268     : 00000000`00000000 ffffcc85`afce00c0 fffff6d7`40911000 00000000`00000000 : win32kfull!memcpy+0x122
ffff9d03`9b067440 fffff6ac`894b1429     : 00000000`00000000 ffff9d03`9b0678b0 fffff6d7`446a5b18 00000000`00000000 : win32kfull!vSrcCopyS32D32Identity+0x68
ffff9d03`9b067470 fffff6ac`894e18d1     : 00000000`00000000 fffff6d7`40911000 ffff9d03`9b067828 fffff6d7`40911000 : win32kfull!EngCopyBits+0x389
ffff9d03`9b0677b0 fffff6ac`894e27b3     : ffff9d03`9b067ae0 00000000`00000000 00000000`00000000 fffff6d7`40911000 : win32kfull!BLTRECORD::bBitBlt+0x32d
ffff9d03`9b0679e0 fffff6ac`8959f568     : ffffffff`e9050e00 00000000`00000001 ffff9d03`9b060f33 00000000`00501802 : win32kfull!GreStretchBltInternal+0x557
ffff9d03`9b067cd0 fffff6ac`8851d2c8     : fffff6ac`8851d248 ffff9d03`9b067d50 00000000`00000008 ffff8fba`48386c5c : win32kfull!NtGdiStretchBlt+0x68
ffff9d03`9b067d50 fffff803`586064f1     : ffffffff`c8050bfa fffff803`587a3de0 00000000`00000000 00000000`0085000f : win32k!NtGdiStretchBlt+0x80
ffff9d03`9b067dd0 00007ffa`327a1664     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000000`0014b278 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`327a1664


SYMBOL_NAME:  win32kfull!memcpy+122

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  122

FAILURE_BUCKET_ID:  0xBE_win32kfull!memcpy

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {67acf149-7ea6-7101-7227-4f64dad41787}

Followup:     MachineOwner
---------

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff80021a7531c, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000000, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------

Unable to load image \SystemRoot\system32\drivers\aswVmm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswVmm.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4015

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10941

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1

BUGCHECK_P1: fffff80021a7531c

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffffd10d`8051faf8 fffff800`1c01db56     : 00000000`00000001 fffff800`21a7531c 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffd10d`8051fb00 fffff800`1bf035f5     : ffffbe81`3a2e1080 ffffbe81`3a2e1080 fffff800`1be1a9a0 ffffbe81`00000000 : nt!IopProcessWorkItem+0x2031b6
ffffd10d`8051fb70 fffff800`1bea2ae5     : ffffbe81`3a2e1080 00000000`00000080 ffffbe81`366ab040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffd10d`8051fc10 fffff800`1bffbbf8     : ffff8800`99680180 ffffbe81`3a2e1080 fffff800`1bea2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd10d`8051fc60 00000000`00000000     : ffffd10d`80520000 ffffd10d`8051a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  aswVmm+2531c

MODULE_NAME: aswVmm

IMAGE_NAME:  aswVmm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2531c

FAILURE_BUCKET_ID:  0x1_SysCallNum_0_aswVmm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6d7ff2fa-6f4a-c543-4f38-d3321bfdbca7}

Followup:     MachineOwner
---------
 
Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff965008fceff8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffa0831b4cd3c0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4374

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5923

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: ffff965008fceff8

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: ffffa0831b4cd3c0

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffffa0831b4cd3c0 -- (.trap 0xffffa0831b4cd3c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000311c5e
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805646f5590 rsp=ffffa0831b4cd550 rbp=0000000000000000
r8=0000000fffffffff  r9=0000000000311c5e r10=0000000f002fefaa
r11=ffff965008fceff8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!MiUnlinkPageFromList+0x6d0:
fffff805`646f5590 f0490fb10b      lock cmpxchg qword ptr [r11],rcx ds:ffff9650`08fceff8=????????????????
Resetting default scope

STACK_TEXT:
ffffa083`1b4cd1c8 fffff805`6484075e     : 00000000`000000be ffff9650`08fceff8 8a000000`00200121 ffffa083`1b4cd3c0 : nt!KeBugCheckEx
ffffa083`1b4cd1d0 fffff805`646ea6cf     : 8a000000`00200121 00000000`00000003 ffffa083`1b4cd440 00000000`00000000 : nt!MiRaisedIrqlFault+0x1be812
ffffa083`1b4cd220 fffff805`6480275e     : ffffab5a`676b1108 00000267`6b176000 0000007f`fffffff8 ffffe506`448c7080 : nt!MmAccessFault+0x4ef
ffffa083`1b4cd3c0 fffff805`646f5590     : ffff9380`0da86f80 8a000004`8d7a8867 ffffa881`33b58bb0 00000000`00000000 : nt!KiPageFault+0x35e
ffffa083`1b4cd550 fffff805`646f4be0     : 00000000`00000003 fffff805`00000000 00000000`003796a9 ffffa083`1b4cd6c0 : nt!MiUnlinkPageFromList+0x6d0
ffffa083`1b4cd5e0 fffff805`646f41c4     : ffffa083`1b4cd880 ffffa083`1b4cd920 0000000f`ffffffff 00000003`796a9880 : nt!MiHandleTransitionFault+0x180
ffffa083`1b4cd660 fffff805`646f3c16     : ffffa083`1b4cd880 00000000`00000000 ffff9380`088b31e0 00000000`00000002 : nt!MiResolveTransitionFault+0x424
ffffa083`1b4cd720 fffff805`646ec425     : ffffa083`1b4cd880 00000000`00000002 ffffa083`1b4cd860 ffffe506`448c7700 : nt!MiResolveProtoPteFault+0x1236
ffffa083`1b4cd820 fffff805`646ea369     : 00000000`00000110 00000000`00000004 00000000`c0000016 ffffac07`f573f458 : nt!MiDispatchFault+0x3d5
ffffa083`1b4cd960 fffff805`6480275e     : ffffe506`3ec8f080 00000000`00000000 00000000`00000000 ffffffff`ffaa17d0 : nt!MmAccessFault+0x189
ffffa083`1b4cdb00 00007ff9`71ec74b4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000091`6abfdb98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`71ec74b4


SYMBOL_NAME:  nt!MiRaisedIrqlFault+1be812

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1be812

FAILURE_BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000005df530, page frame number
Arg3: 0000000000000003, current page state
Arg4: 00000000005df531, 0

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6156

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11087

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 99

BUGCHECK_P2: 5df530

BUGCHECK_P3: 3

BUGCHECK_P4: 5df531

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  StartMenuExperienceHost.exe

STACK_TEXT:
fffff402`04d58638 fffff807`779ec577     : 00000000`0000004e 00000000`00000099 00000000`005df530 00000000`00000003 : nt!KeBugCheckEx
fffff402`04d58640 fffff807`779494d8     : 00000000`00000000 90000005`e30ff025 ffffb584`69fca740 ffffb584`69fca740 : nt!MiBadShareCount+0x5b
fffff402`04d58680 fffff807`77949cae     : fffff402`04d58c58 fffff402`04d58a10 00000000`00000000 fffff402`04d58960 : nt!MiDeletePteRun+0x1798
fffff402`04d58890 fffff807`7794a88b     : fffff402`04d589c0 00000000`00000000 ffffec80`b14b1978 00000000`00000000 : nt!MiDeleteVaTail+0x6e
fffff402`04d588c0 fffff807`77922ae0     : 00000000`00000001 fffff402`00000000 ffffb584`69fca590 ffffb584`6a009080 : nt!MiDeletePagablePteRange+0x4ab
fffff402`04d58bd0 fffff807`77d04aa9     : ffffb584`00000000 00000000`00000000 00000162`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
fffff402`04d58ce0 fffff807`77d04882     : ffffb584`6b054c80 00000000`00000000 ffffb584`69fca0c0 00000000`00000000 : nt!MiUnmapVad+0x49
fffff402`04d58d10 fffff807`77d046f9     : ffffb584`6a009080 00000021`0f3fc280 00000162`9f1b8040 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
fffff402`04d58df0 fffff807`77a064f1     : ffffb584`6a009080 00000162`96320000 00000021`0f3fc248 ffffb584`69fca0c0 : nt!NtUnmapViewOfSectionEx+0x99
fffff402`04d58e40 00007ffb`89d4f704     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000021`0f3fc268 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`89d4f704


SYMBOL_NAME:  nt!MiBadShareCount+5b

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  5b

FAILURE_BUCKET_ID:  0x4E_99_nt!MiBadShareCount

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {60e553e9-e4c5-ed08-9be6-c353e0011003}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801066917b3, The address that the exception occurred at
Arg3: ffff8800d86dbbf8, Exception Record Address
Arg4: ffff8800d86db430, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 6734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 43992

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff801066917b3

BUGCHECK_P3: ffff8800d86dbbf8

BUGCHECK_P4: ffff8800d86db430

EXCEPTION_RECORD:  ffff8800d86dbbf8 -- (.exr 0xffff8800d86dbbf8)
ExceptionAddress: fffff801066917b3 (nt!MiDrainZeroLookasides+0x00000000000000b3)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080

CONTEXT:  ffff8800d86db430 -- (.cxr 0xffff8800d86db430)
rax=0000000000000080 rbx=0000000000000202 rcx=fffff8800057a5f0
rdx=fffff880044355f0 rsi=fffffb8000006750 rdi=0000000000000080
rip=fffff801066917b3 rsp=ffff8800d86dbe30 rbp=fffff8801220e860
r8=fffff880044355f0  r9=fffffb8000007c90 r10=fffffb8000006750
r11=fffff8800057a5f0 r12=000000000001d375 r13=0000000000000076
r14=0000000000000075 r15=fffff8801220e5f0
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!MiDrainZeroLookasides+0xb3:
fffff801`066917b3 488b07          mov     rax,qword ptr [rdi] ds:002b:00000000`00000080=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  2

PROCESS_NAME:  System

READ_ADDRESS: fffff801070fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8010700f340: Unable to get Flags value from nt!KdVersionBlock
fffff8010700f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000080

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000080

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffff8800`d86dbe30 fffff801`0671b613     : fffff880`1220e5f0 fffffb80`00003a00 fffff880`00000076 ffffffff`00000001 : nt!MiDrainZeroLookasides+0xb3
ffff8800`d86dbec0 fffff801`0671b1bb     : 00000000`00000000 fffff27c`00000000 00000000`ffffffff 00000000`00000000 : nt!MiTradePage+0x363
ffff8800`d86dbf90 fffff801`0671c37d     : fffff880`1220e500 00000000`00000000 00000000`ffffffff 00000000`000009d2 : nt!MiClaimPhysicalRun+0xbb
ffff8800`d86dc030 fffff801`066ab215     : 00000000`69646d4d fffff801`066ca78f 00000000`00000002 00000000`00012000 : nt!MiFindContiguousPages+0x5cd
ffff8800`d86dc1f0 fffff801`0663b113     : ffffffff`ffffffff 00000000`00000004 ffffa901`89b86760 fffff801`0663a955 : nt!MiAllocateMostlyContiguousPagesForMdl+0x85
ffff8800`d86dc280 fffff801`0663b204     : 00000000`00800000 ffff8800`d86dc3e9 00000000`00000000 00007fff`ffffffff : nt!MiFindPagesForMdl+0x107
ffff8800`d86dc2f0 fffff801`0663a749     : 00000000`00000000 00000000`4d52564e 00000000`00000527 00000000`00000000 : nt!MiAllocatePagesForMdl+0xc4
ffff8800`d86dc430 fffff801`0663a5ed     : ffff8800`d86dc570 ffff8800`d86dc5b0 ffffa901`81c95030 01a00070`00000000 : nt!MmAllocatePartitionNodePagesForMdlEx+0xc9
ffff8800`d86dc4b0 fffff801`123a00a0     : 00000000`00000001 00000000`4d52564e 00000000`4d52564e 00000000`00000000 : nt!MmAllocatePagesForMdlEx+0x4d
ffff8800`d86dc500 fffff801`165dde83     : ffffa901`81c95030 00000000`0e6f4dbf ffffa901`81c66000 ffffa901`89b871f0 : dxgkrnl!DxgkAllocatePagesForMdlCB+0x90
ffff8800`d86dc540 ffffa901`81c95030     : 00000000`0e6f4dbf ffffa901`81c66000 ffffa901`89b871f0 00000000`00000000 : nvlddmkm+0x80de83
ffff8800`d86dc548 00000000`0e6f4dbf     : ffffa901`81c66000 ffffa901`89b871f0 00000000`00000000 fffff801`15f642fe : 0xffffa901`81c95030
ffff8800`d86dc550 ffffa901`81c66000     : ffffa901`89b871f0 00000000`00000000 fffff801`15f642fe 00000000`00800000 : 0xe6f4dbf
ffff8800`d86dc558 ffffa901`89b871f0     : 00000000`00000000 fffff801`15f642fe 00000000`00800000 00007fff`ffffffff : 0xffffa901`81c66000
ffff8800`d86dc560 00000000`00000000     : fffff801`15f642fe 00000000`00800000 00007fff`ffffffff 00000000`00000000 : 0xffffa901`89b871f0


SYMBOL_NAME:  dxgkrnl!DxgkAllocatePagesForMdlCB+90

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .cxr 0xffff8800d86db430 ; kb

BUCKET_ID_FUNC_OFFSET:  90

FAILURE_BUCKET_ID:  AV_dxgkrnl!DxgkAllocatePagesForMdlCB

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5383e1be-168d-19bd-cf93-ac69beaa556a}

Followup:     MachineOwner
---------

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff3fffd2fffe8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffff9d039b0669a0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6452

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10213

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: fffff3fffd2fffe8

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: ffff9d039b0669a0

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Adobe Premiere Pro.exe

TRAP_FRAME:  ffff9d039b0672a0 -- (.trap 0xffff9d039b0672a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a82daaa0 rbx=0000000000000000 rcx=00000000a82dc030
rdx=fffff6d69affb4a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff6ac895f8322 rsp=ffff9d039b067438 rbp=0000000000000003
r8=0000000000000010  r9=000000000000000b r10=0000fffff6ac8958
r11=fffff6d7432d77a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
win32kfull!memcpy+0x122:
fffff6ac`895f8322 0f2951d0        movaps  xmmword ptr [rcx-30h],xmm2 ds:00000000`a82dc000=????????????????????????????????
Resetting default scope

STACK_TEXT:
ffff9d03`9b0667a8 fffff803`5864075e     : 00000000`000000be fffff3ff`fd2fffe8 8a000000`00200121 ffff9d03`9b0669a0 : nt!KeBugCheckEx
ffff9d03`9b0667b0 fffff803`584ea6cf     : 8a000000`00200121 00000000`00000003 ffff9d03`9b066a20 00000000`00000000 : nt!MiRaisedIrqlFault+0x1be812
ffff9d03`9b066800 fffff803`5860275e     : fffff6d7`40621878 fffff6ac`8987030a fffff6d7`429e2ad0 fffff6ac`885143a5 : nt!MmAccessFault+0x4ef
ffff9d03`9b0669a0 fffff803`584f1167     : 00000008`000006e5 fffff803`584ef59e 00000000`00000010 00000000`00040246 : nt!KiPageFault+0x35e
ffff9d03`9b066b30 fffff803`584f02eb     : fffff803`58e50c00 fffff100`000000a5 00000000`000000a5 00000000`00000000 : nt!MiGetPage+0x547
ffff9d03`9b066c10 fffff803`584ed958     : ffff9d03`9b066fd0 00000000`00000000 00000000`00000001 fffff803`00000001 : nt!MiGetPageChain+0x48b
ffff9d03`9b066e50 fffff803`584e8440     : ffff9d03`9b066fd0 ffffffff`ffffffff fffff803`00000000 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x6e8
ffff9d03`9b066f80 fffff803`584eb0cd     : ffff9d03`9b0671c0 ffff9d03`9b067100 ffff9d03`9b067108 ffff9d03`9b067118 : nt!MiZeroFault+0x380
ffff9d03`9b067070 fffff803`584ea34a     : 00000000`00000001 00000000`00000000 00000080`00000000 00000000`00000000 : nt!MiUserFault+0x80d
ffff9d03`9b067100 fffff803`5860275e     : 00000000`00000001 00000000`00000000 ffffcc85`ac2f37c0 fffff803`5854aadf : nt!MmAccessFault+0x16a
ffff9d03`9b0672a0 fffff6ac`895f8322     : fffff6ac`89584268 00000000`00000000 ffffcc85`afce00c0 fffff6d7`40911000 : nt!KiPageFault+0x35e
ffff9d03`9b067438 fffff6ac`89584268     : 00000000`00000000 ffffcc85`afce00c0 fffff6d7`40911000 00000000`00000000 : win32kfull!memcpy+0x122
ffff9d03`9b067440 fffff6ac`894b1429     : 00000000`00000000 ffff9d03`9b0678b0 fffff6d7`446a5b18 00000000`00000000 : win32kfull!vSrcCopyS32D32Identity+0x68
ffff9d03`9b067470 fffff6ac`894e18d1     : 00000000`00000000 fffff6d7`40911000 ffff9d03`9b067828 fffff6d7`40911000 : win32kfull!EngCopyBits+0x389
ffff9d03`9b0677b0 fffff6ac`894e27b3     : ffff9d03`9b067ae0 00000000`00000000 00000000`00000000 fffff6d7`40911000 : win32kfull!BLTRECORD::bBitBlt+0x32d
ffff9d03`9b0679e0 fffff6ac`8959f568     : ffffffff`e9050e00 00000000`00000001 ffff9d03`9b060f33 00000000`00501802 : win32kfull!GreStretchBltInternal+0x557
ffff9d03`9b067cd0 fffff6ac`8851d2c8     : fffff6ac`8851d248 ffff9d03`9b067d50 00000000`00000008 ffff8fba`48386c5c : win32kfull!NtGdiStretchBlt+0x68
ffff9d03`9b067d50 fffff803`586064f1     : ffffffff`c8050bfa fffff803`587a3de0 00000000`00000000 00000000`0085000f : win32k!NtGdiStretchBlt+0x80
ffff9d03`9b067dd0 00007ffa`327a1664     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000000`0014b278 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`327a1664


SYMBOL_NAME:  win32kfull!memcpy+122

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  122

FAILURE_BUCKET_ID:  0xBE_win32kfull!memcpy

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {67acf149-7ea6-7101-7227-4f64dad41787}

Followup:     MachineOwner
---------

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff80021a7531c, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000000, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------

Unable to load image \SystemRoot\system32\drivers\aswVmm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswVmm.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4015

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10941

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1

BUGCHECK_P1: fffff80021a7531c

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffffd10d`8051faf8 fffff800`1c01db56     : 00000000`00000001 fffff800`21a7531c 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffd10d`8051fb00 fffff800`1bf035f5     : ffffbe81`3a2e1080 ffffbe81`3a2e1080 fffff800`1be1a9a0 ffffbe81`00000000 : nt!IopProcessWorkItem+0x2031b6
ffffd10d`8051fb70 fffff800`1bea2ae5     : ffffbe81`3a2e1080 00000000`00000080 ffffbe81`366ab040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffd10d`8051fc10 fffff800`1bffbbf8     : ffff8800`99680180 ffffbe81`3a2e1080 fffff800`1bea2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd10d`8051fc60 00000000`00000000     : ffffd10d`80520000 ffffd10d`8051a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  aswVmm+2531c

MODULE_NAME: aswVmm

IMAGE_NAME:  aswVmm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2531c

FAILURE_BUCKET_ID:  0x1_SysCallNum_0_aswVmm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6d7ff2fa-6f4a-c543-4f38-d3321bfdbca7}

Followup:     MachineOwner
---------
Bios Güncellemesi yapıldı.
Ram testleri yapıldı
Ekran kartı söylenildiği gibi kaldırılıp kuruldu.
Sonucunda nur topu gibi yeni bir mavi ekran hatamız oldu.

video scheduler internal error

Yeni minidump dosylarını yükledim bakabilir misiniz ?
Yardımcı olabilecek biri var mı ?
 
Son düzenleme:

Yeni konular

Geri
Yukarı