Windows 10 Stopcode mavi ekran hatası

İşletim sistemi
Windows 10
mountmgr.sys diye bir dosya görüyorum, Mount Point Manager olarak geçiyormuş. sfc /scannow yapıp komut ekranında görünen sonucu paylaşırsanız iyi olur.

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa07f43200000, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: ffffa07f43200000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6390

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8054

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa07f43200000

BUGCHECK_P2: 10

BUGCHECK_P3: ffffa07f43200000

BUGCHECK_P4: 2

READ_ADDRESS: fffff80104efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80104e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80104e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa07f43200000

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  2

PROCESS_NAME:  steam.exe

TRAP_FRAME:  fffffb888e17fe30 -- (.trap 0xfffffb888e17fe30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffb080cf300180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffa07f43200000 rsp=fffffb888e17ffc0 rbp=fffffb888e1800b9
r8=ffff9c0f664e3310  r9=0000000000000000 r10=0000000000000000
r11=ffffa07f43200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffffa07f`43200000 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
ffffa07f`43200000 ??              ???

STACK_TEXT:
fffffb88`8e17fb88 fffff801`04679b57     : 00000000`00000050 ffffa07f`43200000 00000000`00000010 fffffb88`8e17fe30 : nt!KeBugCheckEx
fffffb88`8e17fb90 fffff801`044ea5e0     : fffff801`009dfac0 00000000`00000010 fffffb88`8e17feb0 00000000`00000000 : nt!MiSystemFault+0x1716c7
fffffb88`8e17fc90 fffff801`0460275e     : 00000000`00010224 fffff801`047b33d0 00000000`00000000 fffffb88`8e17ff50 : nt!MmAccessFault+0x400
fffffb88`8e17fe30 ffffa07f`43200000     : fffff801`04503ee0 00000000`00000001 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x35e
fffffb88`8e17ffc0 fffff801`04503edf     : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : 0xffffa07f`43200000
fffffb88`8e17ffc8 00000000`00000001     : 00000000`00000000 00000000`00000001 00000000`00000000 ffffa07f`43200000 : nt!PsGetIoPriorityThread+0x5f
fffffb88`8e17ffd0 00000000`00000000     : 00000000`00000001 00000000`00000000 ffffa07f`43200000 fffff801`044dc740 : 0x1


SYMBOL_NAME:  nt!MiSystemFault+1716c7

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1716c7

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {48ad9531-e3f8-1044-fc5f-d917677674c7}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80500400a02, memory referenced
Arg2: 0000000000000006, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80500400a02, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6546

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10436

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff80500400a02

BUGCHECK_P2: 6

BUGCHECK_P3: 8

BUGCHECK_P4: fffff80500400a02

READ_ADDRESS: fffff805722fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057220f340: Unable to get Flags value from nt!KdVersionBlock
fffff8057220f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff80500400a02

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  2

PROCESS_NAME:  System

TRAP_FRAME:  fffff80577c79db0 -- (.trap 0xfffff80577c79db0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000006
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80500400a02 rsp=fffff80577c79f40 rbp=ffffd08e21b47a50
r8=0000000000000000  r9=0000000000000029 r10=0000000000000022
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
fffff805`00400a02 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
fffff805`00400a02 ??              ???

STACK_TEXT:
fffff805`77c79c68 fffff805`71a06569     : 00000000`0000000a fffff805`00400a02 00000000`00000006 00000000`00000008 : nt!KeBugCheckEx
fffff805`77c79c70 fffff805`71a02869     : 00000000`00000006 00000000`00000028 ffffd08e`20576040 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`77c79db0 fffff805`00400a02     : ffffe701`b13d2640 00000000`00006301 fffff805`6fa7e180 fffff805`77c79fc0 : nt!KiPageFault+0x469
fffff805`77c79f40 ffffe701`b13d2640     : 00000000`00006301 fffff805`6fa7e180 fffff805`77c79fc0 ffffd08e`20470040 : 0xfffff805`00400a02
fffff805`77c79f48 00000000`00006301     : fffff805`6fa7e180 fffff805`77c79fc0 ffffd08e`20470040 00000000`00000000 : 0xffffe701`b13d2640
fffff805`77c79f50 fffff805`6fa7e180     : fffff805`77c79fc0 ffffd08e`20470040 00000000`00000000 fffff805`77c60000 : 0x6301
fffff805`77c79f58 fffff805`77c79fc0     : ffffd08e`20470040 00000000`00000000 fffff805`77c60000 ffffd08e`2b9f5080 : 0xfffff805`6fa7e180
fffff805`77c79f60 ffffd08e`20470040     : 00000000`00000000 fffff805`77c60000 ffffd08e`2b9f5080 fffff805`6fa7e180 : 0xfffff805`77c79fc0
fffff805`77c79f68 00000000`00000000     : fffff805`77c60000 ffffd08e`2b9f5080 fffff805`6fa7e180 fffff805`719f5dcf : 0xffffd08e`20470040


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff588682908ae, Address of the instruction which caused the bugcheck
Arg3: ffff9004f05ccf00, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6359

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7921

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff588682908ae

BUGCHECK_P3: ffff9004f05ccf00

BUGCHECK_P4: 0

CONTEXT:  ffff9004f05ccf00 -- (.cxr 0xffff9004f05ccf00)
rax=ffff9701b8583080 rbx=0000000000000000 rcx=ffff9701b8583080
rdx=fffff5ca0294e010 rsi=fffff5ca0294e010 rdi=0000000000000000
rip=ffff9701b974a9d0 rsp=ffff9004f05cd900 rbp=ffff9004f05cd9d9
r8=ffff9004f05cd910  r9=0000000000000022 r10=fffff804250db230
r11=ffff9004f05cd890 r12=0000000000000001 r13=fffff5ca02938be8
r14=fffff5ca063021c0 r15=fffff5886845b718
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
ffff9701`b974a9d0 a0889302caf5ffffa9 mov   al,byte ptr [A9FFFFF5CA029388h] ds:002b:a9fffff5`ca029388=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  3

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT:
ffff9004`f05cd900 00000000`00000000     : fffff5ca`00000001 ffff9701`00000000 fffff5ca`0294e010 fffff5ca`029388a0 : 0xffff9701`b974a9d0


SYMBOL_NAME:  win32kbase!tagObjLock::LockExclusive+3e

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffff9004f05ccf00 ; kb

BUCKET_ID_FUNC_OFFSET:  3e

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kbase!tagObjLock::LockExclusive

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {421f3a1e-9e63-0579-e503-f0f5880a0b5d}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80304023e53, Address of the instruction which caused the bugcheck
Arg3: ffffa90387d06520, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6109

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6219

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80304023e53

BUGCHECK_P3: ffffa90387d06520

BUGCHECK_P4: 0

CONTEXT:  ffffa90387d06520 -- (.cxr 0xffffa90387d06520)
rax=0000000000000000 rbx=ffffbba6c621fcc0 rcx=ffffbba6c0200200
rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffbba6c0200100
rip=fffff80304023e53 rsp=ffffa90387d06f28 rbp=00000000ff80ffa0
r8=0000000000000000  r9=ffffbba6c621fcc0 r10=0000000000000000
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000020 r15=0000000079737355
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlpHpSegDescriptorValidate+0x13:
fffff803`04023e53 498b4010        mov     rax,qword ptr [r8+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT:
ffffa903`87d06f28 fffff803`0438e559     : 00000000`00000000 ffffd17e`ada00000 ffffbbec`c7e5b6e0 01400020`c7c4f028 : nt!RtlpHpSegDescriptorValidate+0x13
ffffa903`87d06f30 fffff803`0438e487     : ffffbba6`c0200100 ffffa903`87d07b80 ffffbba6`c621fcc0 ffffa903`87d07b80 : nt!RtlpHpSizeHeapInternal+0x89
ffffa903`87d06f80 fffff803`04266f6c     : ffffbba6`c0200100 00000000`11000000 ffffa903`87d07b80 ffffbba6`00000000 : nt!RtlpHpSizeHeap+0x5f
ffffa903`87d06fb0 fffff803`047b1019     : 00000000`00000000 ffffa903`87d07000 ffffbbec`c7fc4060 01000000`00100000 : nt!ExFreeHeapPool+0x19ff2c
ffffa903`87d07090 ffffbbec`c7fc40b2     : ffffffff`ffff63c0 ffffbba6`c40208a0 00000000`00041cff ffffab02`409e7080 : nt!ExFreePool+0x9
ffffa903`87d070c0 ffffbbec`c7c366f7     : 00000000`00000000 ffffbba6`c621fcd0 ffffbba6`c621fcd0 ffffbba6`c40208a0 : win32kfull!Win32FreePoolImpl+0x52
ffffa903`87d070f0 ffffbbec`c7f37b68     : 00000000`00000000 ffffbba6`c40208a0 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
ffffa903`87d07120 ffffbbec`c8726fcf     : ffffa903`87d07aa8 00000000`00000000 00000025`00000004 ffffa903`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
ffffa903`87d07a50 fffff803`04205fb8     : 00000025`9abdf900 00000000`00000108 00000000`00000040 00000025`9abdf100 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
ffffa903`87d07a90 00007ff8`7bf4a104     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000025`9abdf788 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`7bf4a104


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.572

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xffffa90387d06520 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c9913766-80de-cdf5-a1a8-15c856d3f064}

Followup:     Pool_corruption
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8005c8ec3ed, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000018, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7639

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 32621

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8005c8ec3ed

BUGCHECK_P3: 0

BUGCHECK_P4: 18

READ_ADDRESS: fffff8005cefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8005ce0f340: Unable to get Flags value from nt!KdVersionBlock
fffff8005ce0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000018

EXCEPTION_PARAMETER2:  0000000000000018

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
ffffbc82`4658c918 fffff800`5c630105     : 00000000`0000001e ffffffff`c0000005 fffff800`5c8ec3ed 00000000`00000000 : nt!KeBugCheckEx
ffffbc82`4658c920 fffff800`5c6066ac     : 00000000`00001000 ffffbc82`4658d1c0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
ffffbc82`4658cfe0 fffff800`5c602843     : 00000000`00000000 00000000`00000000 ffffbe89`f0db7e00 fffff800`5c8c45e8 : nt!KiExceptionDispatch+0x12c
ffffbc82`4658d1c0 fffff800`5c8ec3ed     : ffffbe89`e5ec68f0 00000000`00000000 ffffbe89`ef8a0010 fffff800`5c4c7300 : nt!KiPageFault+0x443
ffffbc82`4658d350 fffff800`5c8f566a     : ffffbe89`ef8a0000 ffffbc82`4658d5b8 00000000`00000240 ffffbe89`e2cf5900 : nt!ObpLookupObjectName+0x43d
ffffbc82`4658d520 fffff800`5c7ff52f     : 00000000`00000000 ffffbc82`4658d9d8 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1fa
ffffbc82`4658d650 fffff800`5c7ff078     : ffffbc82`4658da20 00000000`5fe531ff ffffbc82`4658d9d8 ffffbc82`4658d9c8 : nt!IopCreateFile+0x40f
ffffbc82`4658d6f0 fffff800`5c605fb8     : 000927fc`0000ffff 00000000`000007ff ffff958e`ffffffff 00000000`00000000 : nt!NtOpenFile+0x58
ffffbc82`4658d780 fffff800`5c5f8400     : fffff800`5c8a9b24 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffffbc82`4658d988 fffff800`5c8a9b24     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
ffffbc82`4658d990 fffff800`5f3492a2     : 00000000`00000000 00000000`00000000 ffffbe89`e551a1b0 00000000`00000000 : nt!IoGetDeviceObjectPointer+0x94
ffffbc82`4658da20 fffff800`5f3490c3     : ffffbe89`e551a1b0 ffffbe89`ee9f0eb0 00000000`00000000 00000000`00000000 : mountmgr!MountMgrQueryDosVolumePath+0xd2
ffffbc82`4658db50 fffff800`5c4cd805     : ffffbc82`4658dcf0 ffff958e`9285ad60 ffff958e`927fde50 ffffbc82`4658dc48 : mountmgr!MountMgrDeviceControl+0xb3
ffffbc82`4658dbb0 fffff800`5c8a99f2     : 00000000`00000010 ffffbc82`4658dcf0 ffff958e`9285ad60 00000000`00000000 : nt!IofCallDriver+0x55
ffffbc82`4658dbf0 fffff800`5c8a9217     : be89ef99`b050fffe 00000000`000000c0 ffff958e`9285ad60 ffff958e`9285ad60 : nt!IoVolumeDeviceToDosName+0x232
ffffbc82`4658dec0 fffff800`5c8a912e     : ffffbe89`f0679850 ffffbe89`00000000 ffffbc82`4658e001 ffff958e`9285ad60 : nt!IopQueryNameInternal+0xa3
ffffbc82`4658df70 fffff800`5c8aa608     : ffffbe89`f0679850 ffffbc82`4658eb80 00000000`000000d0 000002a5`4dd32c70 : nt!IoQueryFileDosDeviceName+0x5e
ffffbc82`4658dfc0 fffff800`5c605fb8     : 00000000`ffffffff 00000000`00000000 00000000`00000000 000002a5`4db1077c : nt!NtQueryInformationProcess+0x968
ffffbc82`4658ea90 00007ffc`e178c0b4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ab`ba3ff4b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`e178c0b4


SYMBOL_NAME:  mountmgr!MountMgrQueryDosVolumePath+d2

MODULE_NAME: mountmgr

IMAGE_NAME:  mountmgr.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d2

FAILURE_BUCKET_ID:  0x1E_c0000005_R_mountmgr!MountMgrQueryDosVolumePath

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f447c6f5-bb7a-e285-9236-4fdc78780103}

Followup:     MachineOwner
---------


16 GB RAM'li sistemlerde ortalama 3 saat sürdüğünü gözlemledim. Daha uzun da sürebilir, daha kısa da.


Battleye bir hile koruma sistemidir ve bazı çevrimiçi oyunlarda bulunur. Hangi oyun bunu kullanıyorsa o oyunun kurulu olduğu dizinden Battleye'yi silebilirsiniz.
1604163247625.png
 
@Doktor78 bazı hatalı dosyaları bulmuş ve onarmış. Bu, görmek istediğimiz bir pencere.

MemTest86'yı yaptınız mı?
hala memtest ypama fırsatım olmadı. bu gece yapıcam inşallah. bu akşam 10 dk içidne yine 4 kere falan kapandı. oyun oynarken asla kapanmıyor. ne zaman spotify acık olsa aynı anda 3 5 chrome sekmesi acık olsa kapanıyor bunu farkettim
@Doktor78 bazı hatalı dosyaları bulmuş ve onarmış. Bu, görmek istediğimiz bir pencere.

MemTest86'yı yaptınız mı?
yeni mini dump dosyalarım

@yika38 şeyi de merak ediyorum. mesela oyundayken hiç yemedim bu hatayı 0 yani. ama denetim masasına bakarken bile yiyebiliyorum. neyden kaynaklanıyo olabilir
 
Son düzenleme:

Yeni konular

Geri
Yukarı