Çözüldü Windows 10 APC_INDEX_MISMATCH mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.
İşletim sistemi
Windows 10

ru.zgar7117

Megapat
Katılım
1 Ağustos 2015
Mesajlar
124
Çözümler
2
Yer
İstanbul
Daha fazla  
Cinsiyet
Erkek
Meslek
UI / UX Tasarım, Full Stack Geliştirici
Öncelikle herkese merhaba,

3 gün önce yeni bir sistem topladım, fakat sürekli mavi ekran hatası alıyorum. Konu başlığında yazdığım hata sadece bir kod. Farklı hata kodları da aldım, fakat hepsini aklımda tutamadım. Siz istemeden minidump dosyalarını paylaşıyorum. Sürücüler ve BIOS güncel.

Google drive minidump

Sistem özelliklerim.
  • AMD Ryzen 5 3600.
  • ASUS TUF Gaming B450 PLUS.
  • Corsair Vengeance 16 GB 3200MHz.
  • MSI GTX 1660 Super Gaming X 6 GB.
  • SanDisk Ultra 3D 500GB M.2 SSD.

 
Son düzenleyen: Moderatör:
Çözüm
Öncelikle tekrar merhaba, sorun çözüme kavuştu. Sorun işlemcideymiş. En son aklıma gelen parça oldu. İşlemcilerin de arızalı olabileceğini görmüş olduk. İlgilenen arkadaşlara ve forum yöneticilerine teşekkür ederim.

Buradan şunu da belirtmek isterim, çoğu arkadaş paylaştığım minidump dosyalarında yer alan programların mavi ekran verdirdiğini söyledi ve bu programları kaldırarak çözüme kavuşabileceğini söylediler. Arkadaşlar siz oyun oynamak veya iş yapmak amaçlı topladığınız sistemden oyunun ile alakalı programları veya oyunu kaldırarak bu durumu çözemezsiniz. Araştırmaların sonucunda çok fazla R5 3600 sistemde bu hatalar mevcut. Onun için sorunu hiç çözemiyorsanız işlemcinizi garantiye yollamakta fayda var derim.

Gelelim sorunu nasıl bulduğuma. Yakın zamanda arkadaşımda R5 3600'lü bir sistem topladı. Arkadaşımın ricası ile işlemcileri 2 haftalığına takas ettik. Kullanımlarımız sonucunda bende 2 hafta boyunca en ufak bir kasma mavi ekran sorunu vermedi. Arkadaşımda ise bilgisayar hiç stabil çalışmıyordu ancak mavi ekranda vermiyordu. Ancak işlemcide bir sıkıntı olduğu belliydi. Sistemi geç açılıyordu, oyunlarda FPS düşmesi alıyordu. Sonrasında işlemcileri tekrar takas ettik ve taktıktan 5 dk sonra gene mavi ekran verdi. Ürünü Endeks Bilişim'e yolladım ve onlar da ürünü kusurlu buldular. İşlemcilerin tamiri mümkün olmadığından iade veya değişim hakkı tanıdılar. Herkese teşekkür ediyor, sağlıklı günler diliyorum.

Screenshot_2.png
Son düzenleme:
Memtest yapmış mıydın? Yapmadıysan yap.

Bir de XMP açık mı kapalı mı?

Yarın devam...

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe5857765a004, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80717666e84, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4749

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6806

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffe5857765a004

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80717666e84

BUGCHECK_P4: 2

READ_ADDRESS: fffff807180fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8071800f340: Unable to get Flags value from nt!KdVersionBlock
fffff8071800f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe5857765a004

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

TRAP_FRAME:  ffff8086458df800 -- (.trap 0xffff8086458df800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000006f4 rbx=0000000000000000 rcx=0000000000000004
rdx=ffffe5855be87048 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80717666e84 rsp=ffff8086458df990 rbp=ffffe5855a0f7e0e
r8=ffffe5857765a004  r9=ffffe5855be96f29 r10=ffffe5855a0f7e0e
r11=ffffe5855a0f8000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
nt!RtlCompressBufferXpressLzStandard+0x144:
fffff807`17666e84 413808          cmp     byte ptr [r8],cl ds:ffffe585`7765a004=??
Resetting default scope

STACK_TEXT:
ffff8086`458df558 fffff807`1787a665     : 00000000`00000050 ffffe585`7765a004 00000000`00000000 ffff8086`458df800 : nt!KeBugCheckEx
ffff8086`458df560 fffff807`176ea4a0     : 00000000`00000000 00000000`00000000 ffff8086`458df880 00000000`00000000 : nt!MiSystemFault+0x172315
ffff8086`458df660 fffff807`1780335e     : ffffe585`584267b0 00000000`000017d4 00000000`000000c0 00000000`00000001 : nt!MmAccessFault+0x400
ffff8086`458df800 fffff807`17666e84     : ffff8086`458df9b8 00000000`00000000 00000000`00000000 00000008`00000000 : nt!KiPageFault+0x35e
ffff8086`458df990 fffff807`17666d31     : ffffe585`5be96f29 00000000`00000003 ffffe585`5a0f7070 ffffe585`5be95f4f : nt!RtlCompressBufferXpressLzStandard+0x144
ffff8086`458dfa40 fffff807`1764b6bf     : 00000000`c0000055 fffff97c`be5f2e58 ffffe585`59efa000 ffffe585`581b0b10 : nt!RtlCompressBufferXpressLz+0x61
ffff8086`458dfaa0 fffff807`1764b76e     : fffff807`18123eb0 00000000`00000070 ffffe585`59efa028 fffff972`c2acf7d8 : nt!RtlCompressBuffer+0x6f
ffff8086`458dfb00 fffff807`1764b4f6     : fffff807`18123eb0 fffff807`181239c0 fffff807`18123eb0 ffffe585`564cf100 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxProcessEntry+0x92
ffff8086`458dfb90 fffff807`176a29a5     : ffffffff`fd050f80 ffffe585`568450c0 fffff807`1764b380 ffffe585`5be87000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxWorkerThread+0x176
ffff8086`458dfc10 fffff807`177fc868     : ffffbb00`4095c180 ffffe585`568450c0 fffff807`176a2950 ffffe43e`33d05b6b : nt!PspSystemThreadStartup+0x55
ffff8086`458dfc60 00000000`00000000     : ffff8086`458e0000 ffff8086`458da000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!RtlCompressBufferXpressLzStandard+144

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  144

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!RtlCompressBufferXpressLzStandard

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5dc26c18-791e-2b65-66c1-84251459e2c3}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000005d, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8046a086e6b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4890

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7493

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: ff

BUGCHECK_P3: 5d

BUGCHECK_P4: fffff8046a086e6b

WRITE_ADDRESS: fffff8046a8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8046a80f340: Unable to get Flags value from nt!KdVersionBlock
fffff8046a80f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8d002da45960 -- (.trap 0xffff8d002da45960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000058 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046a086e6b rsp=ffff8d002da45af0 rbp=ffff8d002da45bf0
r8=00000000ffffffff  r9=0000000000000000 r10=ffff9583fb69ea00
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz ac pe cy
nt!PoIdle+0x1601db:
fffff804`6a086e6b 8908            mov     dword ptr [rax],ecx ds:00000000`00000000=????????
Resetting default scope

STACK_TEXT:
ffff8d00`2da45818 fffff804`6a007169     : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`0000005d : nt!KeBugCheckEx
ffff8d00`2da45820 fffff804`6a003469     : ffff9583`fbc23010 ffffffff`ffffffff ffffffff`00100000 ffff9583`fbc231f8 : nt!KiBugCheckDispatch+0x69
ffff8d00`2da45960 fffff804`6a086e6b     : 00000000`00000000 00001f80`00e5005b 00000000`00178c06 00000000`00000002 : nt!KiPageFault+0x469
ffff8d00`2da45af0 fffff804`69ff8d34     : ffffffff`00000000 ffffe781`a55e0340 ffff9584`00e8e080 00000000`00000b88 : nt!PoIdle+0x1601db
ffff8d00`2da45c60 00000000`00000000     : ffff8d00`2da46000 ffff8d00`2da40000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!PoIdle+1601db

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1601db

FAILURE_BUCKET_ID:  AV_nt!PoIdle

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0f00f4f4-fc66-441c-10bf-8ccc2952f11b}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000102, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801184deb8e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3730

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 102

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff801184deb8e

WRITE_ADDRESS: fffff80118efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80118e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80118e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000102

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

TRAP_FRAME:  ffffe1058bc457e0 -- (.trap 0xffffe1058bc457e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000184c rbx=0000000000000000 rcx=ffffce01aebd5180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801184deb8e rsp=ffffe1058bc45970 rbp=ffffe1058bc45a01
r8=0000000000000001  r9=0000000039f06995 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeWaitForSingleObject+0x18e:
fffff801`184deb8e f00fba2f07      lock bts dword ptr [rdi],7 ds:00000000`00000000=????????
Resetting default scope

STACK_TEXT:
ffffe105`8bc45698 fffff801`18607169     : 00000000`0000000a 00000000`00000102 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffe105`8bc456a0 fffff801`18603469     : ffffce01`aebd5100 ffffaa87`174526e7 00000000`00000000 ffffa682`a1d10440 : nt!KiBugCheckDispatch+0x69
ffffe105`8bc457e0 fffff801`184deb8e     : ffffce01`0000007b fffff801`00000000 ffffce01`aee43101 ffffa682`a1d10480 : nt!KiPageFault+0x469
ffffe105`8bc45970 fffff801`188f1531     : 00000000`00000102 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18e
ffffe105`8bc45a60 fffff801`188f15da     : ffffa682`a1d10340 00000093`d204fc58 00000000`00000000 fffff801`18606a18 : nt!ObWaitForSingleObject+0x91
ffffe105`8bc45ac0 fffff801`18606bb8     : 00000000`00000000 00000000`00000000 ffffe105`8bc45b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffe105`8bc45b00 00007ffa`fe5cbe24     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000093`d204fc28 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`fe5cbe24


SYMBOL_NAME:  nt!KeWaitForSingleObject+18e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  18e

FAILURE_BUCKET_ID:  AV_nt!KeWaitForSingleObject

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {505415ce-6277-25db-2465-e86127b1616c}

Followup:     MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077581cfc, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff838ecd395b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3453

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3455

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1

BUGCHECK_P1: 77581cfc

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: ffff838ecd395b80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT:
ffff838e`cd3959b8 fffff801`71807169     : 00000000`00000001 00000000`77581cfc 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffff838e`cd3959c0 fffff801`71807033     : ffffd68f`24faa080 00007ff9`0ffb7f01 ffff838e`cd395b18 ffffffff`fffea070 : nt!KiBugCheckDispatch+0x69
ffff838e`cd395b00 00000000`77581cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000000`099fe928 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77581cfc


SYMBOL_NAME:  nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1fe

FAILURE_BUCKET_ID:  0x1_SysCallNum_d0004_nt!KiSystemServiceExitPico

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1e5e8093-a7e6-a911-7b9b-47d4229c250f}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8045b41a876, Address of the instruction which caused the bugcheck
Arg3: ffff8200ecff5920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3921

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5319

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8045b41a876

BUGCHECK_P3: ffff8200ecff5920

BUGCHECK_P4: 0

CONTEXT:  ffff8200ecff5920 -- (.cxr 0xffff8200ecff5920)
rax=ffffcc05c65057e8 rbx=ffffcc05c3bad080 rcx=cc05c65057b00000
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffcc05c65057e0
rip=fffff8045b41a876 rsp=ffffb00da0b95940 rbp=ffffb00da0b95a01
r8=0000000000000000  r9=0000000040e07c36 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=cc05c65057b00000
r14=0000000000000000 r15=ffffcc05c3bad1c0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!KeAbPreWait+0x6:
fffff804`5b41a876 0fb64120        movzx   eax,byte ptr [rcx+20h] ds:002b:cc05c650`57b00020=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

BAD_STACK_POINTER:  ffff8200ecff5018

STACK_TEXT:
ffffb00d`a0b95940 fffff804`5b66f029     : 00000000`00000000 fffff804`5b8efe11 00000000`00000000 00000000`00000000 : nt!KeAbPreWait+0x6
ffffb00d`a0b95970 fffff804`5b8f1531     : ffffcc05`c65057e0 00000000`00000006 ffffcc05`00000001 00000000`00000900 : nt!KeWaitForSingleObject+0x190629
ffffb00d`a0b95a60 fffff804`5b8f15da     : ffffcc05`c3bad080 000000a9`75fff5d8 00000000`00000000 0000022f`5cc19a80 : nt!ObWaitForSingleObject+0x91
ffffb00d`a0b95ac0 fffff804`5b606bb8     : 000000a9`75fff700 ffffcc05`c46b2080 ffffb00d`a0b95b18 ffffffff`ffb38db0 : nt!NtWaitForSingleObject+0x6a
ffffb00d`a0b95b00 00007ffe`4738be24     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a9`75fff5a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`4738be24


SYMBOL_NAME:  nt!KeAbPreWait+6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .cxr 0xffff8200ecff5920 ; kb

BUCKET_ID_FUNC_OFFSET:  6

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!KeAbPreWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ddcb9656-083d-2ea8-831a-b13145df4ef7}

Followup:     MachineOwner
---------
 
Memtest yapmış mıydın? Yapmadıysan yap.

Bir de XMP açık mı kapalı mı?

Yarın devam...

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe5857765a004, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80717666e84, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4749

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6806

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffe5857765a004

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80717666e84

BUGCHECK_P4: 2

READ_ADDRESS: fffff807180fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8071800f340: Unable to get Flags value from nt!KdVersionBlock
fffff8071800f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe5857765a004

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

TRAP_FRAME:  ffff8086458df800 -- (.trap 0xffff8086458df800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000006f4 rbx=0000000000000000 rcx=0000000000000004
rdx=ffffe5855be87048 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80717666e84 rsp=ffff8086458df990 rbp=ffffe5855a0f7e0e
r8=ffffe5857765a004  r9=ffffe5855be96f29 r10=ffffe5855a0f7e0e
r11=ffffe5855a0f8000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
nt!RtlCompressBufferXpressLzStandard+0x144:
fffff807`17666e84 413808          cmp     byte ptr [r8],cl ds:ffffe585`7765a004=??
Resetting default scope

STACK_TEXT:
ffff8086`458df558 fffff807`1787a665     : 00000000`00000050 ffffe585`7765a004 00000000`00000000 ffff8086`458df800 : nt!KeBugCheckEx
ffff8086`458df560 fffff807`176ea4a0     : 00000000`00000000 00000000`00000000 ffff8086`458df880 00000000`00000000 : nt!MiSystemFault+0x172315
ffff8086`458df660 fffff807`1780335e     : ffffe585`584267b0 00000000`000017d4 00000000`000000c0 00000000`00000001 : nt!MmAccessFault+0x400
ffff8086`458df800 fffff807`17666e84     : ffff8086`458df9b8 00000000`00000000 00000000`00000000 00000008`00000000 : nt!KiPageFault+0x35e
ffff8086`458df990 fffff807`17666d31     : ffffe585`5be96f29 00000000`00000003 ffffe585`5a0f7070 ffffe585`5be95f4f : nt!RtlCompressBufferXpressLzStandard+0x144
ffff8086`458dfa40 fffff807`1764b6bf     : 00000000`c0000055 fffff97c`be5f2e58 ffffe585`59efa000 ffffe585`581b0b10 : nt!RtlCompressBufferXpressLz+0x61
ffff8086`458dfaa0 fffff807`1764b76e     : fffff807`18123eb0 00000000`00000070 ffffe585`59efa028 fffff972`c2acf7d8 : nt!RtlCompressBuffer+0x6f
ffff8086`458dfb00 fffff807`1764b4f6     : fffff807`18123eb0 fffff807`181239c0 fffff807`18123eb0 ffffe585`564cf100 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxProcessEntry+0x92
ffff8086`458dfb90 fffff807`176a29a5     : ffffffff`fd050f80 ffffe585`568450c0 fffff807`1764b380 ffffe585`5be87000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxWorkerThread+0x176
ffff8086`458dfc10 fffff807`177fc868     : ffffbb00`4095c180 ffffe585`568450c0 fffff807`176a2950 ffffe43e`33d05b6b : nt!PspSystemThreadStartup+0x55
ffff8086`458dfc60 00000000`00000000     : ffff8086`458e0000 ffff8086`458da000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!RtlCompressBufferXpressLzStandard+144

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  144

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!RtlCompressBufferXpressLzStandard

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5dc26c18-791e-2b65-66c1-84251459e2c3}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000005d, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8046a086e6b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4890

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7493

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: ff

BUGCHECK_P3: 5d

BUGCHECK_P4: fffff8046a086e6b

WRITE_ADDRESS: fffff8046a8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8046a80f340: Unable to get Flags value from nt!KdVersionBlock
fffff8046a80f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8d002da45960 -- (.trap 0xffff8d002da45960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000058 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046a086e6b rsp=ffff8d002da45af0 rbp=ffff8d002da45bf0
r8=00000000ffffffff  r9=0000000000000000 r10=ffff9583fb69ea00
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz ac pe cy
nt!PoIdle+0x1601db:
fffff804`6a086e6b 8908            mov     dword ptr [rax],ecx ds:00000000`00000000=????????
Resetting default scope

STACK_TEXT:
ffff8d00`2da45818 fffff804`6a007169     : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`0000005d : nt!KeBugCheckEx
ffff8d00`2da45820 fffff804`6a003469     : ffff9583`fbc23010 ffffffff`ffffffff ffffffff`00100000 ffff9583`fbc231f8 : nt!KiBugCheckDispatch+0x69
ffff8d00`2da45960 fffff804`6a086e6b     : 00000000`00000000 00001f80`00e5005b 00000000`00178c06 00000000`00000002 : nt!KiPageFault+0x469
ffff8d00`2da45af0 fffff804`69ff8d34     : ffffffff`00000000 ffffe781`a55e0340 ffff9584`00e8e080 00000000`00000b88 : nt!PoIdle+0x1601db
ffff8d00`2da45c60 00000000`00000000     : ffff8d00`2da46000 ffff8d00`2da40000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!PoIdle+1601db

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1601db

FAILURE_BUCKET_ID:  AV_nt!PoIdle

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0f00f4f4-fc66-441c-10bf-8ccc2952f11b}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000102, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801184deb8e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3730

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 102

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff801184deb8e

WRITE_ADDRESS: fffff80118efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80118e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80118e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000102

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

TRAP_FRAME:  ffffe1058bc457e0 -- (.trap 0xffffe1058bc457e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000184c rbx=0000000000000000 rcx=ffffce01aebd5180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801184deb8e rsp=ffffe1058bc45970 rbp=ffffe1058bc45a01
r8=0000000000000001  r9=0000000039f06995 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeWaitForSingleObject+0x18e:
fffff801`184deb8e f00fba2f07      lock bts dword ptr [rdi],7 ds:00000000`00000000=????????
Resetting default scope

STACK_TEXT:
ffffe105`8bc45698 fffff801`18607169     : 00000000`0000000a 00000000`00000102 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffe105`8bc456a0 fffff801`18603469     : ffffce01`aebd5100 ffffaa87`174526e7 00000000`00000000 ffffa682`a1d10440 : nt!KiBugCheckDispatch+0x69
ffffe105`8bc457e0 fffff801`184deb8e     : ffffce01`0000007b fffff801`00000000 ffffce01`aee43101 ffffa682`a1d10480 : nt!KiPageFault+0x469
ffffe105`8bc45970 fffff801`188f1531     : 00000000`00000102 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18e
ffffe105`8bc45a60 fffff801`188f15da     : ffffa682`a1d10340 00000093`d204fc58 00000000`00000000 fffff801`18606a18 : nt!ObWaitForSingleObject+0x91
ffffe105`8bc45ac0 fffff801`18606bb8     : 00000000`00000000 00000000`00000000 ffffe105`8bc45b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffe105`8bc45b00 00007ffa`fe5cbe24     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000093`d204fc28 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`fe5cbe24


SYMBOL_NAME:  nt!KeWaitForSingleObject+18e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  18e

FAILURE_BUCKET_ID:  AV_nt!KeWaitForSingleObject

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {505415ce-6277-25db-2465-e86127b1616c}

Followup:     MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077581cfc, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff838ecd395b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3453

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3455

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1

BUGCHECK_P1: 77581cfc

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: ffff838ecd395b80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT:
ffff838e`cd3959b8 fffff801`71807169     : 00000000`00000001 00000000`77581cfc 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffff838e`cd3959c0 fffff801`71807033     : ffffd68f`24faa080 00007ff9`0ffb7f01 ffff838e`cd395b18 ffffffff`fffea070 : nt!KiBugCheckDispatch+0x69
ffff838e`cd395b00 00000000`77581cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000000`099fe928 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77581cfc


SYMBOL_NAME:  nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1fe

FAILURE_BUCKET_ID:  0x1_SysCallNum_d0004_nt!KiSystemServiceExitPico

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1e5e8093-a7e6-a911-7b9b-47d4229c250f}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8045b41a876, Address of the instruction which caused the bugcheck
Arg3: ffff8200ecff5920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3921

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5319

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8045b41a876

BUGCHECK_P3: ffff8200ecff5920

BUGCHECK_P4: 0

CONTEXT:  ffff8200ecff5920 -- (.cxr 0xffff8200ecff5920)
rax=ffffcc05c65057e8 rbx=ffffcc05c3bad080 rcx=cc05c65057b00000
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffcc05c65057e0
rip=fffff8045b41a876 rsp=ffffb00da0b95940 rbp=ffffb00da0b95a01
r8=0000000000000000  r9=0000000040e07c36 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=cc05c65057b00000
r14=0000000000000000 r15=ffffcc05c3bad1c0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!KeAbPreWait+0x6:
fffff804`5b41a876 0fb64120        movzx   eax,byte ptr [rcx+20h] ds:002b:cc05c650`57b00020=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

BAD_STACK_POINTER:  ffff8200ecff5018

STACK_TEXT:
ffffb00d`a0b95940 fffff804`5b66f029     : 00000000`00000000 fffff804`5b8efe11 00000000`00000000 00000000`00000000 : nt!KeAbPreWait+0x6
ffffb00d`a0b95970 fffff804`5b8f1531     : ffffcc05`c65057e0 00000000`00000006 ffffcc05`00000001 00000000`00000900 : nt!KeWaitForSingleObject+0x190629
ffffb00d`a0b95a60 fffff804`5b8f15da     : ffffcc05`c3bad080 000000a9`75fff5d8 00000000`00000000 0000022f`5cc19a80 : nt!ObWaitForSingleObject+0x91
ffffb00d`a0b95ac0 fffff804`5b606bb8     : 000000a9`75fff700 ffffcc05`c46b2080 ffffb00d`a0b95b18 ffffffff`ffb38db0 : nt!NtWaitForSingleObject+0x6a
ffffb00d`a0b95b00 00007ffe`4738be24     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a9`75fff5a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`4738be24


SYMBOL_NAME:  nt!KeAbPreWait+6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .cxr 0xffff8200ecff5920 ; kb

BUCKET_ID_FUNC_OFFSET:  6

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!KeAbPreWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ddcb9656-083d-2ea8-831a-b13145df4ef7}

Followup:     MachineOwner
---------

Aynen geç oldu. XMP kapalı ve açık şekilde sistemi test etmiştim. Memtest86 ile test yaptığımda temiz çıktı. Yaklaşık 2 saat sürmüştü.
 
Diğer modül ile dene bir süre. Olmazsa anakartı servise yollamanı isteyebilirim. Ya da başka CPU/RAM ile denemeni.

İki modülü de test ettim gene mavi ekran verdi. Sistem parçalarını kutuluyorum. Anakartı iade etmeyi düşünüyorum. Değişim yapabilirlerse MSI alabilirim. Önerdiğiniz bir model varsa tavsiyenizi beklerim.
 
Durum
Mesaj gönderimine kapalı.

Technopat Haberler

Geri
Yukarı