Bir ekran kartınızı resetleyin (CTRL+Shift+Windows tuşu+b) tuşu ile yapabilirsiniz bilgisayarınızın içini açın ve temizleyin soğumaya bırakın bir de mavi ekran hata kodunu söyler misiniz hata kodu ile hangi hatadan olduğunu anlayabiliriz.
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffdc0fc539c2d0, memory referenced.
Arg2: 0000000000000011, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffdc0fc539c2d0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.PTE
Value: Valid
Key : AV.Type
Value: Execute
Key : Analysis.CPU.mSec
Value: 3092
Key : Analysis.Elapsed.mSec
Value: 8429
Key : Analysis.IO.Other.Mb
Value: 1
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 2
Key : Analysis.Init.CPU.mSec
Value: 561
Key : Analysis.Init.Elapsed.mSec
Value: 9639
Key : Analysis.Memory.CommitPeak.Mb
Value: 101
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: AV_X_(null)_dxgkrnl!DXGDEVICELOCKONAPPROPRIATETHREADMODEL::_DXGDEVICELOCKONAPPROPRIATETHREADMODEL
Key : Failure.Hash
Value: {90793167-1008-e1c9-6835-886d9e98e00a}
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffdc0fc539c2d0
BUGCHECK_P2: 11
BUGCHECK_P3: ffffdc0fc539c2d0
BUGCHECK_P4: 2
FILE_IN_CAB: 061123-43750-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
WRITE_ADDRESS: fffff8047bf1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffdc0fc539c2d0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA RTX Voi
TRAP_FRAME: ffffdc0fc539ba50 -- (.trap 0xffffdc0fc539ba50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffdc0fc539bcb8
rdx=ffffdc0fc539bd98 rsi=0000000000000000 rdi=0000000000000000
rip=ffffdc0fc539c2d0 rsp=ffffdc0fc539bbe0 rbp=ffffdc0fc539c200
r8=0000005a784ffa38 r9=ffffdc0fc539bd98 r10=0000000000000007
r11=fffff8047b200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ffffdc0f`c539c2d0 00a0c1d8fd7f add byte ptr [rax+7FFDD8C1h],ah ds:00000000`7ffdd8c1=??
Resetting default scope
STACK_TEXT:
ffffdc0f`c539bbe0 00007ffd`d8b60000 : 00007ffd`d8b726bd 0000005a`784ffa10 00007ffd`d8c1aa38 ffffdc0f`c539bd00 : 0xffffdc0f`c539c2d0
ffffdc0f`c539bbe8 00007ffd`d8b726bd : 0000005a`784ffa10 00007ffd`d8c1aa38 ffffdc0f`c539bd00 ffffdc0f`c539c201 : 0x00007ffd`d8b60000
ffffdc0f`c539bbf0 0000005a`784ffa10 : 00007ffd`d8c1aa38 ffffdc0f`c539bd00 ffffdc0f`c539c201 ffffdc0f`c539bcb8 : 0x00007ffd`d8b726bd
ffffdc0f`c539bbf8 00007ffd`d8c1aa38 : ffffdc0f`c539bd00 ffffdc0f`c539c201 ffffdc0f`c539bcb8 ffffdc0f`c539c308 : 0x0000005a`784ffa10
ffffdc0f`c539bc00 ffffdc0f`c539bd00 : ffffdc0f`c539c201 ffffdc0f`c539bcb8 ffffdc0f`c539c308 00000000`784ffa10 : 0x00007ffd`d8c1aa38
ffffdc0f`c539bc08 ffffdc0f`c539c201 : ffffdc0f`c539bcb8 ffffdc0f`c539c308 00000000`784ffa10 fffff804`7b411900 : 0xffffdc0f`c539bd00
ffffdc0f`c539bc10 ffffdc0f`c539bcb8 : ffffdc0f`c539c308 00000000`784ffa10 fffff804`7b411900 00007ffd`d8b726bd : 0xffffdc0f`c539c201
ffffdc0f`c539bc18 ffffdc0f`c539c308 : 00000000`784ffa10 fffff804`7b411900 00007ffd`d8b726bd ffffdc0f`00000000 : 0xffffdc0f`c539bcb8
ffffdc0f`c539bc20 00000000`784ffa10 : fffff804`7b411900 00007ffd`d8b726bd ffffdc0f`00000000 ffffdc0f`c539c200 : 0xffffdc0f`c539c308
ffffdc0f`c539bc28 fffff804`7b411900 : 00007ffd`d8b726bd ffffdc0f`00000000 ffffdc0f`c539c200 ffffdc0f`00000001 : 0x784ffa10
ffffdc0f`c539bc30 fffff804`7b411230 : ffffdc0f`c539cae0 00000000`00000000 00007ffd`d8b726bd 00007ffd`d8c1aa38 : nt!RtlpLookupFunctionEntryForStackWalks+0x1e0
ffffdc0f`c539bca0 fffff804`7b4108ec : 00000000`00000001 00000000`00000101 00000000`00000001 fffff804`7b669cf0 : nt!RtlpWalkFrameChain+0x910
ffffdc0f`c539c3e0 fffff804`7b66a47c : 00000000`00001000 ffffdc0f`c539c460 00000000`00000000 ffffdc0f`c5397000 : nt!RtlWalkFrameChain+0x11c
ffffdc0f`c539c430 fffff804`7b66a2b3 : ffffcc07`34510000 ffffcc07`20143310 ffffdc0f`c539c7f0 fffff804`8a1c4288 : nt!EtwpTraceStackWalk+0x190
ffffdc0f`c539c510 fffff804`7b41b25a : ffffcc07`34454731 fffff804`7befd350 00000000`00000001 ffffcc07`34454080 : nt!EtwpStackWalkApc+0x1d3
ffffdc0f`c539c790 fffff804`7b41a24b : 00000000`00000000 00000000`00000000 00000000`00000004 fffff804`00000000 : nt!KiDeliverApc+0x2ba
ffffdc0f`c539c850 fffff804`7b4cd2da : 00000000`00000000 ffffdc0f`c539cb60 00000000`00000000 00000000`00000020 : nt!KiCheckForKernelApcDelivery+0x2b
ffffdc0f`c539c880 fffff804`8f60bf26 : 00000000`00000000 ffffcc07`34dd4810 00000000`00000000 00000000`00000401 : nt!KeLeaveCriticalRegion+0x3a
ffffdc0f`c539c8b0 fffff804`8f81569a : ffffdc0f`c539c988 ffffa406`55cb85a0 ffffdc0f`c539c988 00000000`00000000 : dxgkrnl!DXGDEVICELOCKONAPPROPRIATETHREADMODEL::~DXGDEVICELOCKONAPPROPRIATETHREADMODEL+0x36
ffffdc0f`c539c8e0 fffff804`8f90ca1b : 00000175`2cb68780 ffffcc07`34454080 00000000`deadbeef 00000000`00000400 : dxgkrnl!DxgkSubmitCommandToHwQueueInternal+0x4c2
ffffdc0f`c539cab0 fffff804`7b63dce8 : 00000000`00000000 00000000`00000000 00000000`00000004 00000000`00000000 : dxgkrnl!DxgkSubmitCommandToHwQueue+0xb
ffffdc0f`c539cae0 00007ffd`d88b5fd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000005a`784f67d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`d88b5fd4
STACK_COMMAND: .trap 0xffffdc0fc539ba50 ; kb
SYMBOL_NAME: dxgkrnl!DXGDEVICELOCKONAPPROPRIATETHREADMODEL::~DXGDEVICELOCKONAPPROPRIATETHREADMODEL+36
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.23403.1001
BUCKET_ID_FUNC_OFFSET: 36
FAILURE_BUCKET_ID: AV_X_(null)_dxgkrnl!DXGDEVICELOCKONAPPROPRIATETHREADMODEL::_DXGDEVICELOCKONAPPROPRIATETHREADMODEL
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {90793167-1008-e1c9-6835-886d9e98e00a}
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa205465f6ed0, memory referenced.
Arg2: 0000000000000011, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffa205465f6ed0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.PTE
Value: Valid
Key : AV.Type
Value: Execute
Key : Analysis.CPU.mSec
Value: 3421
Key : Analysis.Elapsed.mSec
Value: 5154
Key : Analysis.IO.Other.Mb
Value: 27
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 30
Key : Analysis.Init.CPU.mSec
Value: 608
Key : Analysis.Init.Elapsed.mSec
Value: 64361
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: AV_X_(null)_nt!MiSystemFault
Key : Failure.Hash
Value: {49578414-34a9-c6dc-c795-b8c5552d5975}
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa205465f6ed0
BUGCHECK_P2: 11
BUGCHECK_P3: ffffa205465f6ed0
BUGCHECK_P4: 2
FILE_IN_CAB: 061323-38890-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
WRITE_ADDRESS: fffff8041bf1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa205465f6ed0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffffa205465f6650 -- (.trap 0xffffa205465f6650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa205465f68b8
rdx=ffffa205465f6998 rsi=0000000000000000 rdi=0000000000000000
rip=ffffa205465f6ed0 rsp=ffffa205465f67e0 rbp=ffffa205465f6e00
r8=00000005106ff9d8 r9=ffffa205465f6998 r10=0000000000000007
r11=fffff8041b200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ffffa205`465f6ed0 00a08b87f87f add byte ptr [rax+7FF8878Bh],ah ds:00000000`7ff8878b=??
Resetting default scope
STACK_TEXT:
ffffa205`465f6428 fffff804`1b681b13 : 00000000`00000050 ffffa205`465f6ed0 00000000`00000011 ffffa205`465f6650 : nt!KeBugCheckEx
ffffa205`465f6430 fffff804`1b45758c : 00007ff8`87730000 00000000`00000011 ffffa205`465f65e9 00000000`00000000 : nt!MiSystemFault+0x22d4a3
ffffa205`465f6530 fffff804`1b639b29 : fffff804`1b2b4fd0 fffff804`1b411a14 00000000`00000001 fffff804`1b63dce8 : nt!MmAccessFault+0x29c
ffffa205`465f6650 ffffa205`465f6ed0 : 00007ff8`87730000 00007ff8`8777f547 00000005`106ff990 00007ff8`878bc3c4 : nt!KiPageFault+0x369
ffffa205`465f67e0 00007ff8`87730000 : 00007ff8`8777f547 00000005`106ff990 00007ff8`878bc3c4 ffffa205`465f6900 : 0xffffa205`465f6ed0
ffffa205`465f67e8 00007ff8`8777f547 : 00000005`106ff990 00007ff8`878bc3c4 ffffa205`465f6900 ffffa205`465f6e01 : 0x00007ff8`87730000
ffffa205`465f67f0 00000005`106ff990 : 00007ff8`878bc3c4 ffffa205`465f6900 ffffa205`465f6e01 ffffa205`465f68b8 : 0x00007ff8`8777f547
ffffa205`465f67f8 00007ff8`878bc3c4 : ffffa205`465f6900 ffffa205`465f6e01 ffffa205`465f68b8 ffffa205`465f6f08 : 0x00000005`106ff990
ffffa205`465f6800 ffffa205`465f6900 : ffffa205`465f6e01 ffffa205`465f68b8 ffffa205`465f6f08 00000000`106ff990 : 0x00007ff8`878bc3c4
ffffa205`465f6808 ffffa205`465f6e01 : ffffa205`465f68b8 ffffa205`465f6f08 00000000`106ff990 fffff804`1b411900 : 0xffffa205`465f6900
ffffa205`465f6810 ffffa205`465f68b8 : ffffa205`465f6f08 00000000`106ff990 fffff804`1b411900 00007ff8`8777f547 : 0xffffa205`465f6e01
ffffa205`465f6818 ffffa205`465f6f08 : 00000000`106ff990 fffff804`1b411900 00007ff8`8777f547 ffffa205`00000000 : 0xffffa205`465f68b8
ffffa205`465f6820 00000000`106ff990 : fffff804`1b411900 00007ff8`8777f547 ffffa205`00000000 00000000`00000000 : 0xffffa205`465f6f08
ffffa205`465f6828 fffff804`1b411900 : 00007ff8`8777f547 ffffa205`00000000 00000000`00000000 0000017c`00000001 : 0x106ff990
ffffa205`465f6830 fffff804`1b411230 : ffffa205`465f7ae0 00000000`00000000 00007ff8`8777f547 00007ff8`878bc3c4 : nt!RtlpLookupFunctionEntryForStackWalks+0x1e0
ffffa205`465f68a0 fffff804`1b4108ec : 00000000`00000001 00000000`00000101 00000000`00000001 fffff804`1b669cf0 : nt!RtlpWalkFrameChain+0x910
ffffa205`465f6fe0 fffff804`1b66a47c : 00000000`00001000 ffffa205`465f7060 00000000`00000000 ffffa205`465f2000 : nt!RtlWalkFrameChain+0x11c
ffffa205`465f7030 fffff804`1b66a2b3 : ffffa205`465f7150 00000000`00000000 ffffa205`465f73f0 fffff804`1b579e5e : nt!EtwpTraceStackWalk+0x190
ffffa205`465f7110 fffff804`1b41b25a : fffff804`1b5917b0 fffff804`1b6b8cd0 00000000`0000002f ffffa408`93ac5040 : nt!EtwpStackWalkApc+0x1d3
ffffa205`465f7390 fffff804`1b4cec5a : 00000001`ffffff00 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiDeliverApc+0x2ba
ffffa205`465f7450 fffff804`1b496b5e : 00000000`00000000 00000000`00000000 0000017c`8f046470 ffffa408`8b3a2070 : nt!KeWaitForSingleObject+0x6ea
ffffa205`465f77f0 fffff804`1b8c4bf6 : 0000017c`8e293968 ffffa408`93ac5040 ffffa205`465f78d8 00000000`00020000 : nt!AlpcpSignalAndWait+0x5e
ffffa205`465f7830 fffff804`1b8c48e7 : ffffa205`465f7910 0000017c`8e293968 0000017c`8f046470 00000005`106fd268 : nt!AlpcpReceiveSynchronousReply+0x56
ffffa205`465f7890 fffff804`1b8c2099 : ffffa408`8b3a2070 00000000`00020000 0000017c`8f046470 0000017c`8e293968 : nt!AlpcpProcessSynchronousRequest+0x397
ffffa205`465f79b0 fffff804`1b63dce8 : ffffa408`93ac5040 ffffa205`465f7b60 00000005`106fd238 ffffa205`465f7a88 : nt!NtAlpcSendWaitReceivePort+0x1d9
ffffa205`465f7a70 00007ff8`877cff74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000005`106fd218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`877cff74
SYMBOL_NAME: nt!MiSystemFault+22d4a3
MODULE_NAME: nt
IMAGE_VERSION: 10.0.23403.1001
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 22d4a3
FAILURE_BUCKET_ID: AV_X_(null)_nt!MiSystemFault
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {49578414-34a9-c6dc-c795-b8c5552d5975}
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa205465f6ed0, memory referenced.
Arg2: 0000000000000011, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffa205465f6ed0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.PTE
Value: Valid
Key : AV.Type
Value: Execute
Key : Analysis.CPU.mSec
Value: 3311
Key : Analysis.Elapsed.mSec
Value: 3302
Key : Analysis.IO.Other.Mb
Value: 27
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 30
Key : Analysis.Init.CPU.mSec
Value: 7139
Key : Analysis.Init.Elapsed.mSec
Value: 72629
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: AV_X_(null)_nt!MiSystemFault
Key : Failure.Hash
Value: {49578414-34a9-c6dc-c795-b8c5552d5975}
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa205465f6ed0
BUGCHECK_P2: 11
BUGCHECK_P3: ffffa205465f6ed0
BUGCHECK_P4: 2
FILE_IN_CAB: 061323-38890-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
WRITE_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffa205465f6ed0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffffa205465f6650 -- (.trap 0xffffa205465f6650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa205465f68b8
rdx=ffffa205465f6998 rsi=0000000000000000 rdi=0000000000000000
rip=ffffa205465f6ed0 rsp=ffffa205465f67e0 rbp=ffffa205465f6e00
r8=00000005106ff9d8 r9=ffffa205465f6998 r10=0000000000000007
r11=fffff8041b200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ffffa205`465f6ed0 00a08b87f87f add byte ptr [rax+7FF8878Bh],ah ds:00000000`7ff8878b=??
Resetting default scope
STACK_TEXT:
ffffa205`465f6428 fffff804`1b681b13 : 00000000`00000050 ffffa205`465f6ed0 00000000`00000011 ffffa205`465f6650 : nt!KeBugCheckEx
ffffa205`465f6430 fffff804`1b45758c : 00007ff8`87730000 00000000`00000011 ffffa205`465f65e9 00000000`00000000 : nt!MiSystemFault+0x22d4a3
ffffa205`465f6530 fffff804`1b639b29 : fffff804`1b2b4fd0 fffff804`1b411a14 00000000`00000001 fffff804`1b63dce8 : nt!MmAccessFault+0x29c
ffffa205`465f6650 ffffa205`465f6ed0 : 00007ff8`87730000 00007ff8`8777f547 00000005`106ff990 00007ff8`878bc3c4 : nt!KiPageFault+0x369
ffffa205`465f67e0 00007ff8`87730000 : 00007ff8`8777f547 00000005`106ff990 00007ff8`878bc3c4 ffffa205`465f6900 : 0xffffa205`465f6ed0
ffffa205`465f67e8 00007ff8`8777f547 : 00000005`106ff990 00007ff8`878bc3c4 ffffa205`465f6900 ffffa205`465f6e01 : 0x00007ff8`87730000
ffffa205`465f67f0 00000005`106ff990 : 00007ff8`878bc3c4 ffffa205`465f6900 ffffa205`465f6e01 ffffa205`465f68b8 : 0x00007ff8`8777f547
ffffa205`465f67f8 00007ff8`878bc3c4 : ffffa205`465f6900 ffffa205`465f6e01 ffffa205`465f68b8 ffffa205`465f6f08 : 0x00000005`106ff990
ffffa205`465f6800 ffffa205`465f6900 : ffffa205`465f6e01 ffffa205`465f68b8 ffffa205`465f6f08 00000000`106ff990 : 0x00007ff8`878bc3c4
ffffa205`465f6808 ffffa205`465f6e01 : ffffa205`465f68b8 ffffa205`465f6f08 00000000`106ff990 fffff804`1b411900 : 0xffffa205`465f6900
ffffa205`465f6810 ffffa205`465f68b8 : ffffa205`465f6f08 00000000`106ff990 fffff804`1b411900 00007ff8`8777f547 : 0xffffa205`465f6e01
ffffa205`465f6818 ffffa205`465f6f08 : 00000000`106ff990 fffff804`1b411900 00007ff8`8777f547 ffffa205`00000000 : 0xffffa205`465f68b8
ffffa205`465f6820 00000000`106ff990 : fffff804`1b411900 00007ff8`8777f547 ffffa205`00000000 00000000`00000000 : 0xffffa205`465f6f08
ffffa205`465f6828 fffff804`1b411900 : 00007ff8`8777f547 ffffa205`00000000 00000000`00000000 0000017c`00000001 : 0x106ff990
ffffa205`465f6830 fffff804`1b411230 : ffffa205`465f7ae0 00000000`00000000 00007ff8`8777f547 00007ff8`878bc3c4 : nt!RtlpLookupFunctionEntryForStackWalks+0x1e0
ffffa205`465f68a0 fffff804`1b4108ec : 00000000`00000001 00000000`00000101 00000000`00000001 fffff804`1b669cf0 : nt!RtlpWalkFrameChain+0x910
ffffa205`465f6fe0 fffff804`1b66a47c : 00000000`00001000 ffffa205`465f7060 00000000`00000000 ffffa205`465f2000 : nt!RtlWalkFrameChain+0x11c
ffffa205`465f7030 fffff804`1b66a2b3 : ffffa205`465f7150 00000000`00000000 ffffa205`465f73f0 fffff804`1b579e5e : nt!EtwpTraceStackWalk+0x190
ffffa205`465f7110 fffff804`1b41b25a : fffff804`1b5917b0 fffff804`1b6b8cd0 00000000`0000002f ffffa408`93ac5040 : nt!EtwpStackWalkApc+0x1d3
ffffa205`465f7390 fffff804`1b4cec5a : 00000001`ffffff00 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiDeliverApc+0x2ba
ffffa205`465f7450 fffff804`1b496b5e : 00000000`00000000 00000000`00000000 0000017c`8f046470 ffffa408`8b3a2070 : nt!KeWaitForSingleObject+0x6ea
ffffa205`465f77f0 fffff804`1b8c4bf6 : 0000017c`8e293968 ffffa408`93ac5040 ffffa205`465f78d8 00000000`00020000 : nt!AlpcpSignalAndWait+0x5e
ffffa205`465f7830 fffff804`1b8c48e7 : ffffa205`465f7910 0000017c`8e293968 0000017c`8f046470 00000005`106fd268 : nt!AlpcpReceiveSynchronousReply+0x56
ffffa205`465f7890 fffff804`1b8c2099 : ffffa408`8b3a2070 00000000`00020000 0000017c`8f046470 0000017c`8e293968 : nt!AlpcpProcessSynchronousRequest+0x397
ffffa205`465f79b0 fffff804`1b63dce8 : ffffa408`93ac5040 ffffa205`465f7b60 00000005`106fd238 ffffa205`465f7a88 : nt!NtAlpcSendWaitReceivePort+0x1d9
ffffa205`465f7a70 00007ff8`877cff74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000005`106fd218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`877cff74
SYMBOL_NAME: nt!MiSystemFault+22d4a3
MODULE_NAME: nt
IMAGE_VERSION: 10.0.23403.1001
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 22d4a3
FAILURE_BUCKET_ID: AV_X_(null)_nt!MiSystemFault
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {49578414-34a9-c6dc-c795-b8c5552d5975}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.