Windows 10 Stopcode mavi ekran hatası

İşletim sistemi
Windows 10
Sisteminiz 1 günlük ama işletim sisteminiz 1,5 yıllık. 20H2 sürümüne geçin. Temiz kurulum yapmanız tercihimdir.

Ayrıca sürücü bulucu kullandıysanız zaten format atın.

Sistem ve işlemci bilgilerinizi göremiyorum. Sistem özelliklerinizi paylaşırsanız BIOS güncellemesi varsa bulalım.

Hatada da çok fazla bir şey göremedim. Bir OC falan yaptıysanız, RAM'lerde XMP açtıysanız şimdilik kapatın. İlla bir test yapmanız gerekiyorsa MemTest yapmayı deneyebilirsiniz:

Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffbc011598b1b0
Arg3: e7978cf500000001
Arg4: fffff801407d2b94

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4124

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 79254

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffbc011598b1b0

BUGCHECK_P3: e7978cf500000001

BUGCHECK_P4: fffff801407d2b94

TRAP_FRAME:  ffffbc011598b1b0 -- (.trap 0xffffbc011598b1b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=5f8c72d423070000
rdx=0000000100000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801407d2b94 rsp=e7978cf500000001 rbp=0000000100060000
r8=0000000000000000  r9=00000000ffffffff r10=fffff80140707c30
r11=ffff810fbed46080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiSystemServiceExit+0x274:
fffff801`407d2b94 c3              ret
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LeagueClientUxRender.exe

BAD_STACK_POINTER:  e7978cf500000001

UNALIGNED_STACK_POINTER:  e7978cf500000001

STACK_TEXT:
ffffbc01`1598b068 fffff801`407d2ee9     : 00000000`0000007f 00000000`00000008 ffffbc01`1598b1b0 e7978cf5`00000001 : nt!KeBugCheckEx
ffffbc01`1598b070 fffff801`407cdd45     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffbc01`1598b1b0 fffff801`407d2b94     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
e7978cf5`00000001 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x274


SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c5

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.327

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c5

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------

Sorununuz çözülürse belirtin, çözülmezse yeni dosyaları paylaşın.
 
Sisteminiz 1 günlük ama işletim sisteminiz 1,5 yıllık. 20H2 sürümüne geçin. Temiz kurulum yapmanız tercihimdir.

Ayrıca sürücü bulucu kullandıysanız zaten format atın.

Sistem ve işlemci bilgilerinizi göremiyorum. Sistem özelliklerinizi paylaşırsanız BIOS güncellemesi varsa bulalım.

Hatada da çok fazla bir şey göremedim. Bir OC falan yaptıysanız, RAM'lerde XMP açtıysanız şimdilik kapatın. İlla bir test yapmanız gerekiyorsa MemTest yapmayı deneyebilirsiniz:

Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffbc011598b1b0
Arg3: e7978cf500000001
Arg4: fffff801407d2b94

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4124

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 79254

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffbc011598b1b0

BUGCHECK_P3: e7978cf500000001

BUGCHECK_P4: fffff801407d2b94

TRAP_FRAME:  ffffbc011598b1b0 -- (.trap 0xffffbc011598b1b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=5f8c72d423070000
rdx=0000000100000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801407d2b94 rsp=e7978cf500000001 rbp=0000000100060000
r8=0000000000000000  r9=00000000ffffffff r10=fffff80140707c30
r11=ffff810fbed46080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiSystemServiceExit+0x274:
fffff801`407d2b94 c3              ret
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LeagueClientUxRender.exe

BAD_STACK_POINTER:  e7978cf500000001

UNALIGNED_STACK_POINTER:  e7978cf500000001

STACK_TEXT:
ffffbc01`1598b068 fffff801`407d2ee9     : 00000000`0000007f 00000000`00000008 ffffbc01`1598b1b0 e7978cf5`00000001 : nt!KeBugCheckEx
ffffbc01`1598b070 fffff801`407cdd45     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffbc01`1598b1b0 fffff801`407d2b94     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
e7978cf5`00000001 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x274


SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c5

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.327

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c5

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------

Sorununuz çözülürse belirtin, çözülmezse yeni dosyaları paylaşın.
Teşekkürler deneyip geri dönüş yapıcam
 
Son düzenleme:
Anakart gigabyte b450m s2h
ekran kartı msi nvidia gtx 1650s
işlemci amd ryzen 5 3600
Hyperx Fu 16 GB DDR4 3200mhz CL16 ram
Kingston A2000 500GB 2200MB/2000MB/s M.2 PCIe NVMe SSD Disk
Bu arada sadece bilgisayarı kullanırken sıkıntı yok ama steamde pubg indirirken 3 4 kere daha oldu aynı sorun
 
  • Battleye'yi kaldırın.
  • MemTest86'yı yaptınız mı?
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffb8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80778ccd7e6, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4390

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8667

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffffffffb8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80778ccd7e6

BUGCHECK_P4: 2

READ_ADDRESS: fffff807796fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8077960f340: Unable to get Flags value from nt!KdVersionBlock
fffff8077960f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffb8

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Spotify.exe

TRAP_FRAME:  ffffaf088ea05720 -- (.trap 0xffffaf088ea05720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffffffb8 rbx=0000000000000000 rcx=ffffd58e5abbddb0
rdx=ffffd58e6bedd050 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80778ccd7e6 rsp=ffffaf088ea058b0 rbp=0000000000000001
 r8=ffffd58e6a7e7300  r9=ffffd58e5abbddb0 r10=ffffd58e5abbddb0
r11=0000000000000110 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!IofCallDriver+0x36:
fffff807`78ccd7e6 440fb600        movzx   r8d,byte ptr [rax] ds:ffffffff`ffffffb8=??
Resetting default scope

STACK_TEXT: 
ffffaf08`8ea05478 fffff807`78e79b57     : 00000000`00000050 ffffffff`ffffffb8 00000000`00000000 ffffaf08`8ea05720 : nt!KeBugCheckEx
ffffaf08`8ea05480 fffff807`78cea5e0     : ffffaf08`8ea055e0 00000000`00000000 ffffaf08`8ea057a0 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffaf08`8ea05580 fffff807`78e0275e     : 00000000`00000000 00000000`00000020 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffaf08`8ea05720 fffff807`78ccd7e6     : 00000000`00000002 ffffc500`08d89180 ffffd58e`6a7e7300 fffff807`78cdf4cf : nt!KiPageFault+0x35e
ffffaf08`8ea058b0 fffff807`790c2528     : ffffd58e`6bedd050 00000000`00000000 ffffd58e`6bedd050 00000000`00000000 : nt!IofCallDriver+0x36
ffffaf08`8ea058f0 fffff807`790b8e7f     : ffff9c89`00000000 ffffaf08`8ea05b80 00000000`0c21efe4 ffffaf08`8ea05b80 : nt!IopSynchronousServiceTail+0x1a8
ffffaf08`8ea05990 fffff807`78e05fb8     : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`097cde70 : nt!NtWriteFile+0x66f
ffffaf08`8ea05a90 00000000`77841cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0c11f1b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77841cfc


SYMBOL_NAME:  nt!IofCallDriver+36

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  36

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!IofCallDriver

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f262b9cd-e2e3-697f-3ad7-29c7abdb673b}

Followup:     MachineOwner
---------
 
  • Battleye'yi kaldırın.
  • MemTest86'yı yaptınız mı?
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffb8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80778ccd7e6, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4390

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8667

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffffffffb8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80778ccd7e6

BUGCHECK_P4: 2

READ_ADDRESS: fffff807796fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8077960f340: Unable to get Flags value from nt!KdVersionBlock
fffff8077960f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffb8

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Spotify.exe

TRAP_FRAME:  ffffaf088ea05720 -- (.trap 0xffffaf088ea05720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffffffb8 rbx=0000000000000000 rcx=ffffd58e5abbddb0
rdx=ffffd58e6bedd050 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80778ccd7e6 rsp=ffffaf088ea058b0 rbp=0000000000000001
r8=ffffd58e6a7e7300  r9=ffffd58e5abbddb0 r10=ffffd58e5abbddb0
r11=0000000000000110 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!IofCallDriver+0x36:
fffff807`78ccd7e6 440fb600        movzx   r8d,byte ptr [rax] ds:ffffffff`ffffffb8=??
Resetting default scope

STACK_TEXT:
ffffaf08`8ea05478 fffff807`78e79b57     : 00000000`00000050 ffffffff`ffffffb8 00000000`00000000 ffffaf08`8ea05720 : nt!KeBugCheckEx
ffffaf08`8ea05480 fffff807`78cea5e0     : ffffaf08`8ea055e0 00000000`00000000 ffffaf08`8ea057a0 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffaf08`8ea05580 fffff807`78e0275e     : 00000000`00000000 00000000`00000020 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffaf08`8ea05720 fffff807`78ccd7e6     : 00000000`00000002 ffffc500`08d89180 ffffd58e`6a7e7300 fffff807`78cdf4cf : nt!KiPageFault+0x35e
ffffaf08`8ea058b0 fffff807`790c2528     : ffffd58e`6bedd050 00000000`00000000 ffffd58e`6bedd050 00000000`00000000 : nt!IofCallDriver+0x36
ffffaf08`8ea058f0 fffff807`790b8e7f     : ffff9c89`00000000 ffffaf08`8ea05b80 00000000`0c21efe4 ffffaf08`8ea05b80 : nt!IopSynchronousServiceTail+0x1a8
ffffaf08`8ea05990 fffff807`78e05fb8     : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`097cde70 : nt!NtWriteFile+0x66f
ffffaf08`8ea05a90 00000000`77841cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0c11f1b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77841cfc


SYMBOL_NAME:  nt!IofCallDriver+36

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  36

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!IofCallDriver

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f262b9cd-e2e3-697f-3ad7-29c7abdb673b}

Followup:     MachineOwner
---------
bu ara hastanede yoğunuz evde pek duramadım. bu memtest de incelediğim kadarıyla kısa bişey değil sanırım 16 gb kaç saatte yapar acaba. batttleeye dediğiniz uygulamayı göremedim bilgisayarımda. bu arada ddu ile ekran kartını kaldırıp yenısını kurdum ek olarak. hala devam ediyo çeşitli kodlarla hata alıyorum.

  • IRQL_NOT_LESS_OR_EQUAL
  • SYSTEM_SERVICE_EXCEPTION
  • DPC_WATCHDOG_VIOLATION
gibi stopcode larla yine mavi ekran aldım.

minidumplar:

 
mountmgr.sys diye bir dosya görüyorum, Mount Point Manager olarak geçiyormuş. sfc /scannow yapıp komut ekranında görünen sonucu paylaşırsanız iyi olur.

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa07f43200000, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: ffffa07f43200000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6390

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8054

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa07f43200000

BUGCHECK_P2: 10

BUGCHECK_P3: ffffa07f43200000

BUGCHECK_P4: 2

READ_ADDRESS: fffff80104efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80104e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80104e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa07f43200000

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  2

PROCESS_NAME:  steam.exe

TRAP_FRAME:  fffffb888e17fe30 -- (.trap 0xfffffb888e17fe30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffb080cf300180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffa07f43200000 rsp=fffffb888e17ffc0 rbp=fffffb888e1800b9
r8=ffff9c0f664e3310  r9=0000000000000000 r10=0000000000000000
r11=ffffa07f43200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffffa07f`43200000 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
ffffa07f`43200000 ??              ???

STACK_TEXT:
fffffb88`8e17fb88 fffff801`04679b57     : 00000000`00000050 ffffa07f`43200000 00000000`00000010 fffffb88`8e17fe30 : nt!KeBugCheckEx
fffffb88`8e17fb90 fffff801`044ea5e0     : fffff801`009dfac0 00000000`00000010 fffffb88`8e17feb0 00000000`00000000 : nt!MiSystemFault+0x1716c7
fffffb88`8e17fc90 fffff801`0460275e     : 00000000`00010224 fffff801`047b33d0 00000000`00000000 fffffb88`8e17ff50 : nt!MmAccessFault+0x400
fffffb88`8e17fe30 ffffa07f`43200000     : fffff801`04503ee0 00000000`00000001 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x35e
fffffb88`8e17ffc0 fffff801`04503edf     : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : 0xffffa07f`43200000
fffffb88`8e17ffc8 00000000`00000001     : 00000000`00000000 00000000`00000001 00000000`00000000 ffffa07f`43200000 : nt!PsGetIoPriorityThread+0x5f
fffffb88`8e17ffd0 00000000`00000000     : 00000000`00000001 00000000`00000000 ffffa07f`43200000 fffff801`044dc740 : 0x1


SYMBOL_NAME:  nt!MiSystemFault+1716c7

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1716c7

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {48ad9531-e3f8-1044-fc5f-d917677674c7}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80500400a02, memory referenced
Arg2: 0000000000000006, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80500400a02, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6546

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10436

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff80500400a02

BUGCHECK_P2: 6

BUGCHECK_P3: 8

BUGCHECK_P4: fffff80500400a02

READ_ADDRESS: fffff805722fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057220f340: Unable to get Flags value from nt!KdVersionBlock
fffff8057220f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff80500400a02

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  2

PROCESS_NAME:  System

TRAP_FRAME:  fffff80577c79db0 -- (.trap 0xfffff80577c79db0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000006
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80500400a02 rsp=fffff80577c79f40 rbp=ffffd08e21b47a50
r8=0000000000000000  r9=0000000000000029 r10=0000000000000022
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
fffff805`00400a02 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
fffff805`00400a02 ??              ???

STACK_TEXT:
fffff805`77c79c68 fffff805`71a06569     : 00000000`0000000a fffff805`00400a02 00000000`00000006 00000000`00000008 : nt!KeBugCheckEx
fffff805`77c79c70 fffff805`71a02869     : 00000000`00000006 00000000`00000028 ffffd08e`20576040 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`77c79db0 fffff805`00400a02     : ffffe701`b13d2640 00000000`00006301 fffff805`6fa7e180 fffff805`77c79fc0 : nt!KiPageFault+0x469
fffff805`77c79f40 ffffe701`b13d2640     : 00000000`00006301 fffff805`6fa7e180 fffff805`77c79fc0 ffffd08e`20470040 : 0xfffff805`00400a02
fffff805`77c79f48 00000000`00006301     : fffff805`6fa7e180 fffff805`77c79fc0 ffffd08e`20470040 00000000`00000000 : 0xffffe701`b13d2640
fffff805`77c79f50 fffff805`6fa7e180     : fffff805`77c79fc0 ffffd08e`20470040 00000000`00000000 fffff805`77c60000 : 0x6301
fffff805`77c79f58 fffff805`77c79fc0     : ffffd08e`20470040 00000000`00000000 fffff805`77c60000 ffffd08e`2b9f5080 : 0xfffff805`6fa7e180
fffff805`77c79f60 ffffd08e`20470040     : 00000000`00000000 fffff805`77c60000 ffffd08e`2b9f5080 fffff805`6fa7e180 : 0xfffff805`77c79fc0
fffff805`77c79f68 00000000`00000000     : fffff805`77c60000 ffffd08e`2b9f5080 fffff805`6fa7e180 fffff805`719f5dcf : 0xffffd08e`20470040


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff588682908ae, Address of the instruction which caused the bugcheck
Arg3: ffff9004f05ccf00, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6359

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7921

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff588682908ae

BUGCHECK_P3: ffff9004f05ccf00

BUGCHECK_P4: 0

CONTEXT:  ffff9004f05ccf00 -- (.cxr 0xffff9004f05ccf00)
rax=ffff9701b8583080 rbx=0000000000000000 rcx=ffff9701b8583080
rdx=fffff5ca0294e010 rsi=fffff5ca0294e010 rdi=0000000000000000
rip=ffff9701b974a9d0 rsp=ffff9004f05cd900 rbp=ffff9004f05cd9d9
r8=ffff9004f05cd910  r9=0000000000000022 r10=fffff804250db230
r11=ffff9004f05cd890 r12=0000000000000001 r13=fffff5ca02938be8
r14=fffff5ca063021c0 r15=fffff5886845b718
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
ffff9701`b974a9d0 a0889302caf5ffffa9 mov   al,byte ptr [A9FFFFF5CA029388h] ds:002b:a9fffff5`ca029388=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  3

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT:
ffff9004`f05cd900 00000000`00000000     : fffff5ca`00000001 ffff9701`00000000 fffff5ca`0294e010 fffff5ca`029388a0 : 0xffff9701`b974a9d0


SYMBOL_NAME:  win32kbase!tagObjLock::LockExclusive+3e

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffff9004f05ccf00 ; kb

BUCKET_ID_FUNC_OFFSET:  3e

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kbase!tagObjLock::LockExclusive

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {421f3a1e-9e63-0579-e503-f0f5880a0b5d}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80304023e53, Address of the instruction which caused the bugcheck
Arg3: ffffa90387d06520, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6109

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6219

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80304023e53

BUGCHECK_P3: ffffa90387d06520

BUGCHECK_P4: 0

CONTEXT:  ffffa90387d06520 -- (.cxr 0xffffa90387d06520)
rax=0000000000000000 rbx=ffffbba6c621fcc0 rcx=ffffbba6c0200200
rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffbba6c0200100
rip=fffff80304023e53 rsp=ffffa90387d06f28 rbp=00000000ff80ffa0
r8=0000000000000000  r9=ffffbba6c621fcc0 r10=0000000000000000
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000020 r15=0000000079737355
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlpHpSegDescriptorValidate+0x13:
fffff803`04023e53 498b4010        mov     rax,qword ptr [r8+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT:
ffffa903`87d06f28 fffff803`0438e559     : 00000000`00000000 ffffd17e`ada00000 ffffbbec`c7e5b6e0 01400020`c7c4f028 : nt!RtlpHpSegDescriptorValidate+0x13
ffffa903`87d06f30 fffff803`0438e487     : ffffbba6`c0200100 ffffa903`87d07b80 ffffbba6`c621fcc0 ffffa903`87d07b80 : nt!RtlpHpSizeHeapInternal+0x89
ffffa903`87d06f80 fffff803`04266f6c     : ffffbba6`c0200100 00000000`11000000 ffffa903`87d07b80 ffffbba6`00000000 : nt!RtlpHpSizeHeap+0x5f
ffffa903`87d06fb0 fffff803`047b1019     : 00000000`00000000 ffffa903`87d07000 ffffbbec`c7fc4060 01000000`00100000 : nt!ExFreeHeapPool+0x19ff2c
ffffa903`87d07090 ffffbbec`c7fc40b2     : ffffffff`ffff63c0 ffffbba6`c40208a0 00000000`00041cff ffffab02`409e7080 : nt!ExFreePool+0x9
ffffa903`87d070c0 ffffbbec`c7c366f7     : 00000000`00000000 ffffbba6`c621fcd0 ffffbba6`c621fcd0 ffffbba6`c40208a0 : win32kfull!Win32FreePoolImpl+0x52
ffffa903`87d070f0 ffffbbec`c7f37b68     : 00000000`00000000 ffffbba6`c40208a0 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
ffffa903`87d07120 ffffbbec`c8726fcf     : ffffa903`87d07aa8 00000000`00000000 00000025`00000004 ffffa903`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
ffffa903`87d07a50 fffff803`04205fb8     : 00000025`9abdf900 00000000`00000108 00000000`00000040 00000025`9abdf100 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
ffffa903`87d07a90 00007ff8`7bf4a104     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000025`9abdf788 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`7bf4a104


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.572

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xffffa90387d06520 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c9913766-80de-cdf5-a1a8-15c856d3f064}

Followup:     Pool_corruption
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8005c8ec3ed, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000018, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7639

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 32621

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8005c8ec3ed

BUGCHECK_P3: 0

BUGCHECK_P4: 18

READ_ADDRESS: fffff8005cefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8005ce0f340: Unable to get Flags value from nt!KdVersionBlock
fffff8005ce0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000018

EXCEPTION_PARAMETER2:  0000000000000018

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
ffffbc82`4658c918 fffff800`5c630105     : 00000000`0000001e ffffffff`c0000005 fffff800`5c8ec3ed 00000000`00000000 : nt!KeBugCheckEx
ffffbc82`4658c920 fffff800`5c6066ac     : 00000000`00001000 ffffbc82`4658d1c0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
ffffbc82`4658cfe0 fffff800`5c602843     : 00000000`00000000 00000000`00000000 ffffbe89`f0db7e00 fffff800`5c8c45e8 : nt!KiExceptionDispatch+0x12c
ffffbc82`4658d1c0 fffff800`5c8ec3ed     : ffffbe89`e5ec68f0 00000000`00000000 ffffbe89`ef8a0010 fffff800`5c4c7300 : nt!KiPageFault+0x443
ffffbc82`4658d350 fffff800`5c8f566a     : ffffbe89`ef8a0000 ffffbc82`4658d5b8 00000000`00000240 ffffbe89`e2cf5900 : nt!ObpLookupObjectName+0x43d
ffffbc82`4658d520 fffff800`5c7ff52f     : 00000000`00000000 ffffbc82`4658d9d8 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1fa
ffffbc82`4658d650 fffff800`5c7ff078     : ffffbc82`4658da20 00000000`5fe531ff ffffbc82`4658d9d8 ffffbc82`4658d9c8 : nt!IopCreateFile+0x40f
ffffbc82`4658d6f0 fffff800`5c605fb8     : 000927fc`0000ffff 00000000`000007ff ffff958e`ffffffff 00000000`00000000 : nt!NtOpenFile+0x58
ffffbc82`4658d780 fffff800`5c5f8400     : fffff800`5c8a9b24 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffffbc82`4658d988 fffff800`5c8a9b24     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
ffffbc82`4658d990 fffff800`5f3492a2     : 00000000`00000000 00000000`00000000 ffffbe89`e551a1b0 00000000`00000000 : nt!IoGetDeviceObjectPointer+0x94
ffffbc82`4658da20 fffff800`5f3490c3     : ffffbe89`e551a1b0 ffffbe89`ee9f0eb0 00000000`00000000 00000000`00000000 : mountmgr!MountMgrQueryDosVolumePath+0xd2
ffffbc82`4658db50 fffff800`5c4cd805     : ffffbc82`4658dcf0 ffff958e`9285ad60 ffff958e`927fde50 ffffbc82`4658dc48 : mountmgr!MountMgrDeviceControl+0xb3
ffffbc82`4658dbb0 fffff800`5c8a99f2     : 00000000`00000010 ffffbc82`4658dcf0 ffff958e`9285ad60 00000000`00000000 : nt!IofCallDriver+0x55
ffffbc82`4658dbf0 fffff800`5c8a9217     : be89ef99`b050fffe 00000000`000000c0 ffff958e`9285ad60 ffff958e`9285ad60 : nt!IoVolumeDeviceToDosName+0x232
ffffbc82`4658dec0 fffff800`5c8a912e     : ffffbe89`f0679850 ffffbe89`00000000 ffffbc82`4658e001 ffff958e`9285ad60 : nt!IopQueryNameInternal+0xa3
ffffbc82`4658df70 fffff800`5c8aa608     : ffffbe89`f0679850 ffffbc82`4658eb80 00000000`000000d0 000002a5`4dd32c70 : nt!IoQueryFileDosDeviceName+0x5e
ffffbc82`4658dfc0 fffff800`5c605fb8     : 00000000`ffffffff 00000000`00000000 00000000`00000000 000002a5`4db1077c : nt!NtQueryInformationProcess+0x968
ffffbc82`4658ea90 00007ffc`e178c0b4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ab`ba3ff4b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`e178c0b4


SYMBOL_NAME:  mountmgr!MountMgrQueryDosVolumePath+d2

MODULE_NAME: mountmgr

IMAGE_NAME:  mountmgr.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d2

FAILURE_BUCKET_ID:  0x1E_c0000005_R_mountmgr!MountMgrQueryDosVolumePath

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f447c6f5-bb7a-e285-9236-4fdc78780103}

Followup:     MachineOwner
---------

Bu MemTest de incelediğim kadarıyla kısa bir şey değil sanırım, 16 GB kaç saatte yapar acaba?
16 GB RAM'li sistemlerde ortalama 3 saat sürdüğünü gözlemledim. Daha uzun da sürebilir, daha kısa da.

Battleye dediğiniz uygulamayı göremedim bilgisayarımda.
Battleye bir hile koruma sistemidir ve bazı çevrimiçi oyunlarda bulunur. Hangi oyun bunu kullanıyorsa o oyunun kurulu olduğu dizinden Battleye'yi silebilirsiniz.
 

Geri
Yukarı