Doktor78
Decapat
- Katılım
- 27 Eylül 2020
- Mesajlar
- 11
Bilgisayarımı yeni topladım. Daha ilk günde bu hatayı yemek biraz korkuttu açıkcası. Minidump dosyam ektedir.
Microsoft OneDrive
1drv.ms
mountmgr.sys
diye bir dosya görüyorum, Mount Point Manager olarak geçiyormuş.sfc /scannow
yapıp komut ekranında görünen sonucu paylaşırsanız iyi olur.
Kod:PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffa07f43200000, memory referenced. Arg2: 0000000000000010, value 0 = read operation, 1 = write operation. Arg3: ffffa07f43200000, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6390 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 8054 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: ffffa07f43200000 BUGCHECK_P2: 10 BUGCHECK_P3: ffffa07f43200000 BUGCHECK_P4: 2 READ_ADDRESS: fffff80104efb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff80104e0f340: Unable to get Flags value from nt!KdVersionBlock fffff80104e0f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffa07f43200000 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 2 PROCESS_NAME: steam.exe TRAP_FRAME: fffffb888e17fe30 -- (.trap 0xfffffb888e17fe30) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=ffffb080cf300180 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=ffffa07f43200000 rsp=fffffb888e17ffc0 rbp=fffffb888e1800b9 r8=ffff9c0f664e3310 r9=0000000000000000 r10=0000000000000000 r11=ffffa07f43200000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc ffffa07f`43200000 ?? ??? Resetting default scope FAILED_INSTRUCTION_ADDRESS: +0 ffffa07f`43200000 ?? ??? STACK_TEXT: fffffb88`8e17fb88 fffff801`04679b57 : 00000000`00000050 ffffa07f`43200000 00000000`00000010 fffffb88`8e17fe30 : nt!KeBugCheckEx fffffb88`8e17fb90 fffff801`044ea5e0 : fffff801`009dfac0 00000000`00000010 fffffb88`8e17feb0 00000000`00000000 : nt!MiSystemFault+0x1716c7 fffffb88`8e17fc90 fffff801`0460275e : 00000000`00010224 fffff801`047b33d0 00000000`00000000 fffffb88`8e17ff50 : nt!MmAccessFault+0x400 fffffb88`8e17fe30 ffffa07f`43200000 : fffff801`04503ee0 00000000`00000001 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x35e fffffb88`8e17ffc0 fffff801`04503edf : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : 0xffffa07f`43200000 fffffb88`8e17ffc8 00000000`00000001 : 00000000`00000000 00000000`00000001 00000000`00000000 ffffa07f`43200000 : nt!PsGetIoPriorityThread+0x5f fffffb88`8e17ffd0 00000000`00000000 : 00000000`00000001 00000000`00000000 ffffa07f`43200000 fffff801`044dc740 : 0x1 SYMBOL_NAME: nt!MiSystemFault+1716c7 MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 1716c7 FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {48ad9531-e3f8-1044-fc5f-d917677674c7} Followup: MachineOwner --------- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: fffff80500400a02, memory referenced Arg2: 0000000000000006, IRQL Arg3: 0000000000000008, value 0 = read operation, 1 = write operation Arg4: fffff80500400a02, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6546 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 10436 Key : Analysis.Memory.CommitPeak.Mb Value: 82 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: d1 BUGCHECK_P1: fffff80500400a02 BUGCHECK_P2: 6 BUGCHECK_P3: 8 BUGCHECK_P4: fffff80500400a02 READ_ADDRESS: fffff805722fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8057220f340: Unable to get Flags value from nt!KdVersionBlock fffff8057220f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse fffff80500400a02 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 2 PROCESS_NAME: System TRAP_FRAME: fffff80577c79db0 -- (.trap 0xfffff80577c79db0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000006 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80500400a02 rsp=fffff80577c79f40 rbp=ffffd08e21b47a50 r8=0000000000000000 r9=0000000000000029 r10=0000000000000022 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc fffff805`00400a02 ?? ??? Resetting default scope FAILED_INSTRUCTION_ADDRESS: +0 fffff805`00400a02 ?? ??? STACK_TEXT: fffff805`77c79c68 fffff805`71a06569 : 00000000`0000000a fffff805`00400a02 00000000`00000006 00000000`00000008 : nt!KeBugCheckEx fffff805`77c79c70 fffff805`71a02869 : 00000000`00000006 00000000`00000028 ffffd08e`20576040 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff805`77c79db0 fffff805`00400a02 : ffffe701`b13d2640 00000000`00006301 fffff805`6fa7e180 fffff805`77c79fc0 : nt!KiPageFault+0x469 fffff805`77c79f40 ffffe701`b13d2640 : 00000000`00006301 fffff805`6fa7e180 fffff805`77c79fc0 ffffd08e`20470040 : 0xfffff805`00400a02 fffff805`77c79f48 00000000`00006301 : fffff805`6fa7e180 fffff805`77c79fc0 ffffd08e`20470040 00000000`00000000 : 0xffffe701`b13d2640 fffff805`77c79f50 fffff805`6fa7e180 : fffff805`77c79fc0 ffffd08e`20470040 00000000`00000000 fffff805`77c60000 : 0x6301 fffff805`77c79f58 fffff805`77c79fc0 : ffffd08e`20470040 00000000`00000000 fffff805`77c60000 ffffd08e`2b9f5080 : 0xfffff805`6fa7e180 fffff805`77c79f60 ffffd08e`20470040 : 00000000`00000000 fffff805`77c60000 ffffd08e`2b9f5080 fffff805`6fa7e180 : 0xfffff805`77c79fc0 fffff805`77c79f68 00000000`00000000 : fffff805`77c60000 ffffd08e`2b9f5080 fffff805`6fa7e180 fffff805`719f5dcf : 0xffffd08e`20470040 SYMBOL_NAME: nt!KiPageFault+469 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 469 FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff588682908ae, Address of the instruction which caused the bugcheck Arg3: ffff9004f05ccf00, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6359 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 7921 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff588682908ae BUGCHECK_P3: ffff9004f05ccf00 BUGCHECK_P4: 0 CONTEXT: ffff9004f05ccf00 -- (.cxr 0xffff9004f05ccf00) rax=ffff9701b8583080 rbx=0000000000000000 rcx=ffff9701b8583080 rdx=fffff5ca0294e010 rsi=fffff5ca0294e010 rdi=0000000000000000 rip=ffff9701b974a9d0 rsp=ffff9004f05cd900 rbp=ffff9004f05cd9d9 r8=ffff9004f05cd910 r9=0000000000000022 r10=fffff804250db230 r11=ffff9004f05cd890 r12=0000000000000001 r13=fffff5ca02938be8 r14=fffff5ca063021c0 r15=fffff5886845b718 iopl=0 nv up ei ng nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286 ffff9701`b974a9d0 a0889302caf5ffffa9 mov al,byte ptr [A9FFFFF5CA029388h] ds:002b:a9fffff5`ca029388=?? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 3 PROCESS_NAME: NVIDIA Share.exe STACK_TEXT: ffff9004`f05cd900 00000000`00000000 : fffff5ca`00000001 ffff9701`00000000 fffff5ca`0294e010 fffff5ca`029388a0 : 0xffff9701`b974a9d0 SYMBOL_NAME: win32kbase!tagObjLock::LockExclusive+3e MODULE_NAME: win32kbase IMAGE_NAME: win32kbase.sys IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .cxr 0xffff9004f05ccf00 ; kb BUCKET_ID_FUNC_OFFSET: 3e FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!tagObjLock::LockExclusive OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {421f3a1e-9e63-0579-e503-f0f5880a0b5d} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80304023e53, Address of the instruction which caused the bugcheck Arg3: ffffa90387d06520, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6109 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 6219 Key : Analysis.Memory.CommitPeak.Mb Value: 91 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80304023e53 BUGCHECK_P3: ffffa90387d06520 BUGCHECK_P4: 0 CONTEXT: ffffa90387d06520 -- (.cxr 0xffffa90387d06520) rax=0000000000000000 rbx=ffffbba6c621fcc0 rcx=ffffbba6c0200200 rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffbba6c0200100 rip=fffff80304023e53 rsp=ffffa90387d06f28 rbp=00000000ff80ffa0 r8=0000000000000000 r9=ffffbba6c621fcc0 r10=0000000000000000 r11=00000000000000ff r12=000000000000002b r13=00000000000000a9 r14=0000000000000020 r15=0000000079737355 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!RtlpHpSegDescriptorValidate+0x13: fffff803`04023e53 498b4010 mov rax,qword ptr [r8+10h] ds:002b:00000000`00000010=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: NVIDIA Share.exe STACK_TEXT: ffffa903`87d06f28 fffff803`0438e559 : 00000000`00000000 ffffd17e`ada00000 ffffbbec`c7e5b6e0 01400020`c7c4f028 : nt!RtlpHpSegDescriptorValidate+0x13 ffffa903`87d06f30 fffff803`0438e487 : ffffbba6`c0200100 ffffa903`87d07b80 ffffbba6`c621fcc0 ffffa903`87d07b80 : nt!RtlpHpSizeHeapInternal+0x89 ffffa903`87d06f80 fffff803`04266f6c : ffffbba6`c0200100 00000000`11000000 ffffa903`87d07b80 ffffbba6`00000000 : nt!RtlpHpSizeHeap+0x5f ffffa903`87d06fb0 fffff803`047b1019 : 00000000`00000000 ffffa903`87d07000 ffffbbec`c7fc4060 01000000`00100000 : nt!ExFreeHeapPool+0x19ff2c ffffa903`87d07090 ffffbbec`c7fc40b2 : ffffffff`ffff63c0 ffffbba6`c40208a0 00000000`00041cff ffffab02`409e7080 : nt!ExFreePool+0x9 ffffa903`87d070c0 ffffbbec`c7c366f7 : 00000000`00000000 ffffbba6`c621fcd0 ffffbba6`c621fcd0 ffffbba6`c40208a0 : win32kfull!Win32FreePoolImpl+0x52 ffffa903`87d070f0 ffffbbec`c7f37b68 : 00000000`00000000 ffffbba6`c40208a0 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37 ffffa903`87d07120 ffffbbec`c8726fcf : ffffa903`87d07aa8 00000000`00000000 00000025`00000004 ffffa903`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508 ffffa903`87d07a50 fffff803`04205fb8 : 00000025`9abdf900 00000000`00000108 00000000`00000040 00000025`9abdf100 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f ffffa903`87d07a90 00007ff8`7bf4a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000025`9abdf788 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`7bf4a104 SYMBOL_NAME: nt!ExFreePool+9 IMAGE_NAME: Pool_Corruption IMAGE_VERSION: 10.0.19041.572 MODULE_NAME: Pool_Corruption STACK_COMMAND: .cxr 0xffffa90387d06520 ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064} Followup: Pool_corruption --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8005c8ec3ed, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000018, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 7639 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 32621 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8005c8ec3ed BUGCHECK_P3: 0 BUGCHECK_P4: 18 READ_ADDRESS: fffff8005cefb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8005ce0f340: Unable to get Flags value from nt!KdVersionBlock fffff8005ce0f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000018 EXCEPTION_PARAMETER2: 0000000000000018 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: nvcontainer.exe TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000) Unable to read trap frame at ffff8000`00000000 STACK_TEXT: ffffbc82`4658c918 fffff800`5c630105 : 00000000`0000001e ffffffff`c0000005 fffff800`5c8ec3ed 00000000`00000000 : nt!KeBugCheckEx ffffbc82`4658c920 fffff800`5c6066ac : 00000000`00001000 ffffbc82`4658d1c0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5 ffffbc82`4658cfe0 fffff800`5c602843 : 00000000`00000000 00000000`00000000 ffffbe89`f0db7e00 fffff800`5c8c45e8 : nt!KiExceptionDispatch+0x12c ffffbc82`4658d1c0 fffff800`5c8ec3ed : ffffbe89`e5ec68f0 00000000`00000000 ffffbe89`ef8a0010 fffff800`5c4c7300 : nt!KiPageFault+0x443 ffffbc82`4658d350 fffff800`5c8f566a : ffffbe89`ef8a0000 ffffbc82`4658d5b8 00000000`00000240 ffffbe89`e2cf5900 : nt!ObpLookupObjectName+0x43d ffffbc82`4658d520 fffff800`5c7ff52f : 00000000`00000000 ffffbc82`4658d9d8 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1fa ffffbc82`4658d650 fffff800`5c7ff078 : ffffbc82`4658da20 00000000`5fe531ff ffffbc82`4658d9d8 ffffbc82`4658d9c8 : nt!IopCreateFile+0x40f ffffbc82`4658d6f0 fffff800`5c605fb8 : 000927fc`0000ffff 00000000`000007ff ffff958e`ffffffff 00000000`00000000 : nt!NtOpenFile+0x58 ffffbc82`4658d780 fffff800`5c5f8400 : fffff800`5c8a9b24 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 ffffbc82`4658d988 fffff800`5c8a9b24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage ffffbc82`4658d990 fffff800`5f3492a2 : 00000000`00000000 00000000`00000000 ffffbe89`e551a1b0 00000000`00000000 : nt!IoGetDeviceObjectPointer+0x94 ffffbc82`4658da20 fffff800`5f3490c3 : ffffbe89`e551a1b0 ffffbe89`ee9f0eb0 00000000`00000000 00000000`00000000 : mountmgr!MountMgrQueryDosVolumePath+0xd2 ffffbc82`4658db50 fffff800`5c4cd805 : ffffbc82`4658dcf0 ffff958e`9285ad60 ffff958e`927fde50 ffffbc82`4658dc48 : mountmgr!MountMgrDeviceControl+0xb3 ffffbc82`4658dbb0 fffff800`5c8a99f2 : 00000000`00000010 ffffbc82`4658dcf0 ffff958e`9285ad60 00000000`00000000 : nt!IofCallDriver+0x55 ffffbc82`4658dbf0 fffff800`5c8a9217 : be89ef99`b050fffe 00000000`000000c0 ffff958e`9285ad60 ffff958e`9285ad60 : nt!IoVolumeDeviceToDosName+0x232 ffffbc82`4658dec0 fffff800`5c8a912e : ffffbe89`f0679850 ffffbe89`00000000 ffffbc82`4658e001 ffff958e`9285ad60 : nt!IopQueryNameInternal+0xa3 ffffbc82`4658df70 fffff800`5c8aa608 : ffffbe89`f0679850 ffffbc82`4658eb80 00000000`000000d0 000002a5`4dd32c70 : nt!IoQueryFileDosDeviceName+0x5e ffffbc82`4658dfc0 fffff800`5c605fb8 : 00000000`ffffffff 00000000`00000000 00000000`00000000 000002a5`4db1077c : nt!NtQueryInformationProcess+0x968 ffffbc82`4658ea90 00007ffc`e178c0b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000ab`ba3ff4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`e178c0b4 SYMBOL_NAME: mountmgr!MountMgrQueryDosVolumePath+d2 MODULE_NAME: mountmgr IMAGE_NAME: mountmgr.sys IMAGE_VERSION: 10.0.19041.1030 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: d2 FAILURE_BUCKET_ID: 0x1E_c0000005_R_mountmgr!MountMgrQueryDosVolumePath OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f447c6f5-bb7a-e285-9236-4fdc78780103} Followup: MachineOwner ---------
16 GB RAM'li sistemlerde ortalama 3 saat sürdüğünü gözlemledim. Daha uzun da sürebilir, daha kısa da.
Battleye bir hile koruma sistemidir ve bazı çevrimiçi oyunlarda bulunur. Hangi oyun bunu kullanıyorsa o oyunun kurulu olduğu dizinden Battleye'yi silebilirsiniz.
hala memtest ypama fırsatım olmadı. bu gece yapıcam inşallah. bu akşam 10 dk içidne yine 4 kere falan kapandı. oyun oynarken asla kapanmıyor. ne zaman spotify acık olsa aynı anda 3 5 chrome sekmesi acık olsa kapanıyor bunu farkettim@Doktor78 bazı hatalı dosyaları bulmuş ve onarmış. Bu, görmek istediğimiz bir pencere.
MemTest86'yı yaptınız mı?
yeni mini dump dosyalarım@Doktor78 bazı hatalı dosyaları bulmuş ve onarmış. Bu, görmek istediğimiz bir pencere.
MemTest86'yı yaptınız mı?
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.