fffff807`94ac0000 fffff807`94acd000 amdgpio2 (deferred)
Image path: \SystemRoot\System32\drivers\amdgpio2.sys
Image name: amdgpio2.sys
Browse all global symbols functions data
Timestamp: Wed Mar 11 14:15:48 2020 (5E68C864)
CheckSum: 0001C48D
ImageSize: 0000D000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: 00007fffffff0000, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8073184f8dc, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 000000000000000b, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 3421
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9249
Key : Analysis.IO.Other.Mb
Value: 1
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 452
Key : Analysis.Init.Elapsed.mSec
Value: 1887
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 061123-16531-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: 7fffffff0000
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8073184f8dc
BUGCHECK_P4: b
READ_ADDRESS: fffff8073231c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00007fffffff0000
MM_INTERNAL_CODE: b
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
TRAP_FRAME: ffffe180f8ea1f10 -- (.trap 0xffffe180f8ea1f10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007fffffff0000 rbx=0000000000000000 rcx=00007fffffff0000
rdx=ffffe180f8ea2258 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8073184f8dc rsp=ffffe180f8ea20a0 rbp=ffffe180f8ea26c0
r8=0000000000000000 r9=0000000000000000 r10=ffffe180f8ea21c0
r11=ffffe04072800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!RtlpxVirtualUnwind+0x48c:
fffff807`3184f8dc 0fb600 movzx eax,byte ptr [rax] ds:00007fff`ffff0000=??
Resetting default scope
STACK_TEXT:
ffffe180`f8ea1d98 fffff807`31adbe3d : 00000000`00000050 00007fff`ffff0000 00000000`00000000 ffffe180`f8ea1f10 : nt!KeBugCheckEx
ffffe180`f8ea1da0 fffff807`3183794f : 00300031`00300041 00000000`00000000 ffffe180`f8ea1ea9 00000000`00000000 : nt!MiRaisedIrqlFault+0x1a0eed
ffffe180`f8ea1df0 fffff807`31a3cd29 : 00000000`00000000 fffff807`316bc398 ffffe180`f8ea21c0 ffffac83`a786f2f8 : nt!MmAccessFault+0x3af
ffffe180`f8ea1f10 fffff807`3184f8dc : fffff807`31600000 fffff807`31838506 ffffac83`a7d64840 fffff807`3165b688 : nt!KiPageFault+0x369
ffffe180`f8ea20a0 fffff807`3184d925 : ffffac83`a7d64840 ffffac83`a7d64608 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x48c
ffffe180`f8ea2160 fffff807`318cf15e : ffffffff`ffffffff ffffac83`a7d646b0 ffffac83`a7d646b0 ffffe180`f8ea2900 : nt!RtlDispatchException+0x215
ffffe180`f8ea28d0 fffff807`31a2d2b2 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1ae
ffffe180`f8ea2fb0 fffff807`31a2d280 : fffff807`31a418f5 ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffac83`a7d644c8 fffff807`31a418f5 : ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffac83`a7d644d0 fffff807`31a3ce0e : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9c8a`d6fca320 : nt!KiExceptionDispatch+0x135
ffffac83`a7d646b0 fffff807`31838506 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x44e
ffffac83`a7d64840 00000000`00000000 : 00000000`00000000 ffffac83`a7d64a00 ffff9c8a`d70e7180 fffff807`31838447 : nt!MiResolvePageTablePage+0x106
SYMBOL_NAME: nt!RtlpxVirtualUnwind+48c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1778
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 48c
FAILURE_BUCKET_ID: AV_R_(null)_nt!RtlpxVirtualUnwind
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {955b8b2f-25e7-b167-acd3-0cfdca67a101}
Followup: MachineOwner
--------
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the BugCheck
Arg2: fffff8033e03b521, Address of the instruction which caused the BugCheck
Arg3: ffffd680fbd32900, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3921
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8920
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 3864
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 061123-18468-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c000001d
BUGCHECK_P2: fffff8033e03b521
BUGCHECK_P3: ffffd680fbd32900
BUGCHECK_P4: 0
CONTEXT: ffffd680fbd32900 -- (.cxr 0xffffd680fbd32900)
rax=00000000000000ae rbx=ffffc582ef4af080 rcx=0000000000008aae
rdx=ffffc582f18a0158 rsi=ffffd680fbd11180 rdi=0000000000000002
rip=fffff8033e03b521 rsp=ffff8b80321095f0 rbp=0000000000000001
r8=0000000000000002 r9=0000000000000000 r10=0000000000000001
r11=ffffc582ef4af1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=ffffc582ef4af180
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!KiCommitThreadWait+0x141:
fffff803`3e03b521 c4 ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
MISALIGNED_IP:
nt!KiCommitThreadWait+141
fffff803`3e03b521 c4 ???
STACK_TEXT:
ffff8b80`321095f0 fffff803`3e03a896 : 00000000`00000000 00000000`00000001 00000000`000000ae 00000002`2abbf769 : nt!KiCommitThreadWait+0x141
ffff8b80`321096a0 fffff803`3e5797ac : ffffc582`f33f8080 ffffc582`ef05c0e0 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
ffff8b80`32109a40 fffff803`3e57969e : ffffc582`ef4af080 00000000`19d55020 00000000`00000000 00000000`1a15fb04 : nt!ObWaitForSingleObject+0xcc
ffff8b80`32109aa0 fffff803`3e240ee8 : 00000000`00000000 ffffd680`fc7493c0 ffff8b80`32109af8 ffffffff`ff676980 : nt!NtWaitForSingleObject+0x3e
ffff8b80`32109ae0 00000000`77051cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1a05edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77051cf3
SYMBOL_NAME: nt!KiCommitThreadWait+141
IMAGE_VERSION: 10.0.22621.1778
STACK_COMMAND: .cxr 0xffffd680fbd32900 ; kb
MODULE_NAME: AuthenticAMD
IMAGE_NAME: AuthenticAMD.sys
FAILURE_BUCKET_ID: IP_MISALIGNED_AuthenticAMD.sys
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {716d112a-8330-4bbb-160c-ec98297019d2}
Followup: MachineOwner
---------
Mavi ekrandan bağımsız olarak chipset konusunda bir düzeltme yapmak istiyorum.
Chipset güncel değil.
Kod:fffff807`94ac0000 fffff807`94acd000 amdgpio2 (deferred) Image path: \SystemRoot\System32\drivers\amdgpio2.sys Image name: amdgpio2.sys Browse all global symbols functions data. Timestamp: Wed Mar 11 14:15:48 2020 (5E68C864) CheckSum: 0001C48D. ImageSize: 0000D000. Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 Information from resource tables:
Chipset güncelleyin.
RAM modellerin birbirinden farklı sonradan eklediğin RAM'den sonra mı bu hataları almaya başladın?
RAM testi yapın ve sonuçları burada paylaşın.
![]()
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net
Güncel test uygulamasını buradan edinin.
![]()
AMD Cleanup Utility ile dahili grafik kartını kaldırın. (iGPU diye geçmektedir.)
AMD Cleanup Utility | AMD
This article provides information about the AMD Cleanup Utility and is organized into the following sections:www.amd.com
Sonrasında en güncel dahili grafik kartı sürücüsünü kurun.
Kod:8: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: 00007fffffff0000, memory referenced. Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE. bit 1 is set if the fault was due to a write, clear if a read. bit 3 is set if the processor decided the fault was due to a corrupted PTE. bit 4 is set if the fault was due to attempted execute of a no-execute PTE. - ARM64: bit 1 is set if the fault was due to a write, clear if a read. bit 3 is set if the fault was due to attempted execute of a no-execute PTE. Arg3: fffff8073184f8dc, If non-zero, the instruction address which referenced the bad memory. address. Arg4: 000000000000000b, (reserved) Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : AV.Type Value: Read. Key : Analysis.CPU.mSec Value: 3421. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 9249. Key : Analysis.IO.Other.Mb Value: 1 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 1 Key : Analysis.Init.CPU.mSec Value: 452. Key : Analysis.Init.Elapsed.mSec Value: 1887. Key : Analysis.Memory.CommitPeak.Mb Value: 98. Key : Bugcheck.Code.DumpHeader Value: 0x50. Key : Bugcheck.Code.Register Value: 0x50. Key : WER.OS.Branch Value: ni_release. Key : WER.OS.Timestamp Value: 2022-05-06T12:50:00Z Key : WER.OS.Version Value: 10.0.22621.1 FILE_IN_CAB: 061123-16531-01.dmp BUGCHECK_CODE: 50. BUGCHECK_P1: 7fffffff0000. BUGCHECK_P2: 0 BUGCHECK_P3: fffff8073184f8dc. BUGCHECK_P4: b READ_ADDRESS: fffff8073231c468: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. unable to get nt!MmSpecialPagesInUse 00007fffffff0000. MM_INTERNAL_CODE: b BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: steamwebhelper.exe TRAP_FRAME: ffffe180f8ea1f10 -- (.trap 0xffffe180f8ea1f10) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00007fffffff0000 rbx=0000000000000000 rcx=00007fffffff0000 rdx=ffffe180f8ea2258 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8073184f8dc rsp=ffffe180f8ea20a0 rbp=ffffe180f8ea26c0 r8=0000000000000000 r9=0000000000000000 r10=ffffe180f8ea21c0 r11=ffffe04072800000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc. nt!RtlpxVirtualUnwind+0x48c: fffff807`3184f8dc 0fb600 movzx eax,byte ptr [rax] ds:00007fff`ffff0000=?? Resetting default scope. STACK_TEXT: ffffe180`f8ea1d98 fffff807`31adbe3d : 00000000`00000050 00007fff`ffff0000 00000000`00000000 ffffe180`f8ea1f10 : nt!KeBugCheckEx ffffe180`f8ea1da0 fffff807`3183794f : 00300031`00300041 00000000`00000000 ffffe180`f8ea1ea9 00000000`00000000 : nt!MiRaisedIrqlFault+0x1a0eed ffffe180`f8ea1df0 fffff807`31a3cd29 : 00000000`00000000 fffff807`316bc398 ffffe180`f8ea21c0 ffffac83`a786f2f8 : nt!MmAccessFault+0x3af ffffe180`f8ea1f10 fffff807`3184f8dc : fffff807`31600000 fffff807`31838506 ffffac83`a7d64840 fffff807`3165b688 : nt!KiPageFault+0x369 ffffe180`f8ea20a0 fffff807`3184d925 : ffffac83`a7d64840 ffffac83`a7d64608 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x48c ffffe180`f8ea2160 fffff807`318cf15e : ffffffff`ffffffff ffffac83`a7d646b0 ffffac83`a7d646b0 ffffe180`f8ea2900 : nt!RtlDispatchException+0x215 ffffe180`f8ea28d0 fffff807`31a2d2b2 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1ae ffffe180`f8ea2fb0 fffff807`31a2d280 : fffff807`31a418f5 ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 : nt!KxExceptionDispatchOnExceptionStack+0x12 ffffac83`a7d644c8 fffff807`31a418f5 : ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue ffffac83`a7d644d0 fffff807`31a3ce0e : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9c8a`d6fca320 : nt!KiExceptionDispatch+0x135 ffffac83`a7d646b0 fffff807`31838506 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x44e ffffac83`a7d64840 00000000`00000000 : 00000000`00000000 ffffac83`a7d64a00 ffff9c8a`d70e7180 fffff807`31838447 : nt!MiResolvePageTablePage+0x106 SYMBOL_NAME: nt!RtlpxVirtualUnwind+48c MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.22621.1778 STACK_COMMAND: .cxr; .ecxr ; kb. BUCKET_ID_FUNC_OFFSET: 48c. FAILURE_BUCKET_ID: AV_R_(null)_nt!RtlpxVirtualUnwind OS_VERSION: 10.0.22621.1 BUILDLAB_STR: ni_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {955b8b2f-25e7-b167-acd3-0cfdca67a101} Followup: MachineOwner. -------- 9: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c000001d, Exception code that caused the BugCheck. Arg2: fffff8033e03b521, Address of the instruction which caused the BugCheck. Arg3: ffffd680fbd32900, Address of the context record for the exception that caused the BugCheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3921. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 8920. Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 374. Key : Analysis.Init.Elapsed.mSec Value: 3864. Key : Analysis.Memory.CommitPeak.Mb Value: 99. Key : Bugcheck.Code.DumpHeader Value: 0x3b. Key : Bugcheck.Code.Register Value: 0x3b. Key : WER.OS.Branch Value: ni_release. Key : WER.OS.Timestamp Value: 2022-05-06T12:50:00Z Key : WER.OS.Version Value: 10.0.22621.1 FILE_IN_CAB: 061123-18468-01.dmp BUGCHECK_CODE: 3b. BUGCHECK_P1: c000001d. BUGCHECK_P2: fffff8033e03b521. BUGCHECK_P3: ffffd680fbd32900. BUGCHECK_P4: 0 CONTEXT: ffffd680fbd32900 -- (.cxr 0xffffd680fbd32900) rax=00000000000000ae rbx=ffffc582ef4af080 rcx=0000000000008aae rdx=ffffc582f18a0158 rsi=ffffd680fbd11180 rdi=0000000000000002 rip=fffff8033e03b521 rsp=ffff8b80321095f0 rbp=0000000000000001 r8=0000000000000002 r9=0000000000000000 r10=0000000000000001 r11=ffffc582ef4af1c0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=ffffc582ef4af180 iopl=0 nv up ei pl zr na po nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!KiCommitThreadWait+0x141: fffff803`3e03b521 c4 ??? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Discord.exe MISALIGNED_IP: nt!KiCommitThreadWait+141 fffff803`3e03b521 c4 ??? STACK_TEXT: ffff8b80`321095f0 fffff803`3e03a896 : 00000000`00000000 00000000`00000001 00000000`000000ae 00000002`2abbf769 : nt!KiCommitThreadWait+0x141 ffff8b80`321096a0 fffff803`3e5797ac : ffffc582`f33f8080 ffffc582`ef05c0e0 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256 ffff8b80`32109a40 fffff803`3e57969e : ffffc582`ef4af080 00000000`19d55020 00000000`00000000 00000000`1a15fb04 : nt!ObWaitForSingleObject+0xcc ffff8b80`32109aa0 fffff803`3e240ee8 : 00000000`00000000 ffffd680`fc7493c0 ffff8b80`32109af8 ffffffff`ff676980 : nt!NtWaitForSingleObject+0x3e ffff8b80`32109ae0 00000000`77051cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`1a05edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77051cf3. SYMBOL_NAME: nt!KiCommitThreadWait+141 IMAGE_VERSION: 10.0.22621.1778 STACK_COMMAND: .cxr 0xffffd680fbd32900 ; kb. MODULE_NAME: AuthenticAMD. IMAGE_NAME: AuthenticAMD.sys FAILURE_BUCKET_ID: IP_MISALIGNED_AuthenticAMD.sys OS_VERSION: 10.0.22621.1 BUILDLAB_STR: ni_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {716d112a-8330-4bbb-160c-ec98297019d2} Followup: MachineOwner. ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.