fffff807`94ac0000 fffff807`94acd000 amdgpio2 (deferred)
Image path: \SystemRoot\System32\drivers\amdgpio2.sys
Image name: amdgpio2.sys
Browse all global symbols functions data
Timestamp: Wed Mar 11 14:15:48 2020 (5E68C864)
CheckSum: 0001C48D
ImageSize: 0000D000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: 00007fffffff0000, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8073184f8dc, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 000000000000000b, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 3421
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9249
Key : Analysis.IO.Other.Mb
Value: 1
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 452
Key : Analysis.Init.Elapsed.mSec
Value: 1887
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 061123-16531-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: 7fffffff0000
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8073184f8dc
BUGCHECK_P4: b
READ_ADDRESS: fffff8073231c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00007fffffff0000
MM_INTERNAL_CODE: b
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
TRAP_FRAME: ffffe180f8ea1f10 -- (.trap 0xffffe180f8ea1f10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007fffffff0000 rbx=0000000000000000 rcx=00007fffffff0000
rdx=ffffe180f8ea2258 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8073184f8dc rsp=ffffe180f8ea20a0 rbp=ffffe180f8ea26c0
r8=0000000000000000 r9=0000000000000000 r10=ffffe180f8ea21c0
r11=ffffe04072800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!RtlpxVirtualUnwind+0x48c:
fffff807`3184f8dc 0fb600 movzx eax,byte ptr [rax] ds:00007fff`ffff0000=??
Resetting default scope
STACK_TEXT:
ffffe180`f8ea1d98 fffff807`31adbe3d : 00000000`00000050 00007fff`ffff0000 00000000`00000000 ffffe180`f8ea1f10 : nt!KeBugCheckEx
ffffe180`f8ea1da0 fffff807`3183794f : 00300031`00300041 00000000`00000000 ffffe180`f8ea1ea9 00000000`00000000 : nt!MiRaisedIrqlFault+0x1a0eed
ffffe180`f8ea1df0 fffff807`31a3cd29 : 00000000`00000000 fffff807`316bc398 ffffe180`f8ea21c0 ffffac83`a786f2f8 : nt!MmAccessFault+0x3af
ffffe180`f8ea1f10 fffff807`3184f8dc : fffff807`31600000 fffff807`31838506 ffffac83`a7d64840 fffff807`3165b688 : nt!KiPageFault+0x369
ffffe180`f8ea20a0 fffff807`3184d925 : ffffac83`a7d64840 ffffac83`a7d64608 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x48c
ffffe180`f8ea2160 fffff807`318cf15e : ffffffff`ffffffff ffffac83`a7d646b0 ffffac83`a7d646b0 ffffe180`f8ea2900 : nt!RtlDispatchException+0x215
ffffe180`f8ea28d0 fffff807`31a2d2b2 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1ae
ffffe180`f8ea2fb0 fffff807`31a2d280 : fffff807`31a418f5 ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffac83`a7d644c8 fffff807`31a418f5 : ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffac83`a7d644d0 fffff807`31a3ce0e : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9c8a`d6fca320 : nt!KiExceptionDispatch+0x135
ffffac83`a7d646b0 fffff807`31838506 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x44e
ffffac83`a7d64840 00000000`00000000 : 00000000`00000000 ffffac83`a7d64a00 ffff9c8a`d70e7180 fffff807`31838447 : nt!MiResolvePageTablePage+0x106
SYMBOL_NAME: nt!RtlpxVirtualUnwind+48c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1778
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 48c
FAILURE_BUCKET_ID: AV_R_(null)_nt!RtlpxVirtualUnwind
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {955b8b2f-25e7-b167-acd3-0cfdca67a101}
Followup: MachineOwner
--------
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the BugCheck
Arg2: fffff8033e03b521, Address of the instruction which caused the BugCheck
Arg3: ffffd680fbd32900, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3921
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8920
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 3864
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 061123-18468-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c000001d
BUGCHECK_P2: fffff8033e03b521
BUGCHECK_P3: ffffd680fbd32900
BUGCHECK_P4: 0
CONTEXT: ffffd680fbd32900 -- (.cxr 0xffffd680fbd32900)
rax=00000000000000ae rbx=ffffc582ef4af080 rcx=0000000000008aae
rdx=ffffc582f18a0158 rsi=ffffd680fbd11180 rdi=0000000000000002
rip=fffff8033e03b521 rsp=ffff8b80321095f0 rbp=0000000000000001
r8=0000000000000002 r9=0000000000000000 r10=0000000000000001
r11=ffffc582ef4af1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=ffffc582ef4af180
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!KiCommitThreadWait+0x141:
fffff803`3e03b521 c4 ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
MISALIGNED_IP:
nt!KiCommitThreadWait+141
fffff803`3e03b521 c4 ???
STACK_TEXT:
ffff8b80`321095f0 fffff803`3e03a896 : 00000000`00000000 00000000`00000001 00000000`000000ae 00000002`2abbf769 : nt!KiCommitThreadWait+0x141
ffff8b80`321096a0 fffff803`3e5797ac : ffffc582`f33f8080 ffffc582`ef05c0e0 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
ffff8b80`32109a40 fffff803`3e57969e : ffffc582`ef4af080 00000000`19d55020 00000000`00000000 00000000`1a15fb04 : nt!ObWaitForSingleObject+0xcc
ffff8b80`32109aa0 fffff803`3e240ee8 : 00000000`00000000 ffffd680`fc7493c0 ffff8b80`32109af8 ffffffff`ff676980 : nt!NtWaitForSingleObject+0x3e
ffff8b80`32109ae0 00000000`77051cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1a05edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77051cf3
SYMBOL_NAME: nt!KiCommitThreadWait+141
IMAGE_VERSION: 10.0.22621.1778
STACK_COMMAND: .cxr 0xffffd680fbd32900 ; kb
MODULE_NAME: AuthenticAMD
IMAGE_NAME: AuthenticAMD.sys
FAILURE_BUCKET_ID: IP_MISALIGNED_AuthenticAMD.sys
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {716d112a-8330-4bbb-160c-ec98297019d2}
Followup: MachineOwner
---------
Mavi ekrandan bağımsız olarak chipset konusunda bir düzeltme yapmak istiyorum.
Chipset güncel değil.
Kod:fffff807`94ac0000 fffff807`94acd000 amdgpio2 (deferred) Image path: \SystemRoot\System32\drivers\amdgpio2.sys Image name: amdgpio2.sys Browse all global symbols functions data. Timestamp: Wed Mar 11 14:15:48 2020 (5E68C864) CheckSum: 0001C48D. ImageSize: 0000D000. Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 Information from resource tables:
Chipset güncelleyin.
RAM modellerin birbirinden farklı sonradan eklediğin RAM'den sonra mı bu hataları almaya başladın?
RAM testi yapın ve sonuçları burada paylaşın.
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net
Güncel test uygulamasını buradan edinin.
AMD Cleanup Utility ile dahili grafik kartını kaldırın. (iGPU diye geçmektedir.)
AMD Cleanup Utility | AMD
This article provides information about the AMD Cleanup Utility and is organized into the following sections:www.amd.com
Sonrasında en güncel dahili grafik kartı sürücüsünü kurun.
Kod:8: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: 00007fffffff0000, memory referenced. Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE. bit 1 is set if the fault was due to a write, clear if a read. bit 3 is set if the processor decided the fault was due to a corrupted PTE. bit 4 is set if the fault was due to attempted execute of a no-execute PTE. - ARM64: bit 1 is set if the fault was due to a write, clear if a read. bit 3 is set if the fault was due to attempted execute of a no-execute PTE. Arg3: fffff8073184f8dc, If non-zero, the instruction address which referenced the bad memory. address. Arg4: 000000000000000b, (reserved) Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : AV.Type Value: Read. Key : Analysis.CPU.mSec Value: 3421. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 9249. Key : Analysis.IO.Other.Mb Value: 1 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 1 Key : Analysis.Init.CPU.mSec Value: 452. Key : Analysis.Init.Elapsed.mSec Value: 1887. Key : Analysis.Memory.CommitPeak.Mb Value: 98. Key : Bugcheck.Code.DumpHeader Value: 0x50. Key : Bugcheck.Code.Register Value: 0x50. Key : WER.OS.Branch Value: ni_release. Key : WER.OS.Timestamp Value: 2022-05-06T12:50:00Z Key : WER.OS.Version Value: 10.0.22621.1 FILE_IN_CAB: 061123-16531-01.dmp BUGCHECK_CODE: 50. BUGCHECK_P1: 7fffffff0000. BUGCHECK_P2: 0 BUGCHECK_P3: fffff8073184f8dc. BUGCHECK_P4: b READ_ADDRESS: fffff8073231c468: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. unable to get nt!MmSpecialPagesInUse 00007fffffff0000. MM_INTERNAL_CODE: b BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: steamwebhelper.exe TRAP_FRAME: ffffe180f8ea1f10 -- (.trap 0xffffe180f8ea1f10) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00007fffffff0000 rbx=0000000000000000 rcx=00007fffffff0000 rdx=ffffe180f8ea2258 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8073184f8dc rsp=ffffe180f8ea20a0 rbp=ffffe180f8ea26c0 r8=0000000000000000 r9=0000000000000000 r10=ffffe180f8ea21c0 r11=ffffe04072800000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc. nt!RtlpxVirtualUnwind+0x48c: fffff807`3184f8dc 0fb600 movzx eax,byte ptr [rax] ds:00007fff`ffff0000=?? Resetting default scope. STACK_TEXT: ffffe180`f8ea1d98 fffff807`31adbe3d : 00000000`00000050 00007fff`ffff0000 00000000`00000000 ffffe180`f8ea1f10 : nt!KeBugCheckEx ffffe180`f8ea1da0 fffff807`3183794f : 00300031`00300041 00000000`00000000 ffffe180`f8ea1ea9 00000000`00000000 : nt!MiRaisedIrqlFault+0x1a0eed ffffe180`f8ea1df0 fffff807`31a3cd29 : 00000000`00000000 fffff807`316bc398 ffffe180`f8ea21c0 ffffac83`a786f2f8 : nt!MmAccessFault+0x3af ffffe180`f8ea1f10 fffff807`3184f8dc : fffff807`31600000 fffff807`31838506 ffffac83`a7d64840 fffff807`3165b688 : nt!KiPageFault+0x369 ffffe180`f8ea20a0 fffff807`3184d925 : ffffac83`a7d64840 ffffac83`a7d64608 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x48c ffffe180`f8ea2160 fffff807`318cf15e : ffffffff`ffffffff ffffac83`a7d646b0 ffffac83`a7d646b0 ffffe180`f8ea2900 : nt!RtlDispatchException+0x215 ffffe180`f8ea28d0 fffff807`31a2d2b2 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1ae ffffe180`f8ea2fb0 fffff807`31a2d280 : fffff807`31a418f5 ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 : nt!KxExceptionDispatchOnExceptionStack+0x12 ffffac83`a7d644c8 fffff807`31a418f5 : ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue ffffac83`a7d644d0 fffff807`31a3ce0e : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9c8a`d6fca320 : nt!KiExceptionDispatch+0x135 ffffac83`a7d646b0 fffff807`31838506 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x44e ffffac83`a7d64840 00000000`00000000 : 00000000`00000000 ffffac83`a7d64a00 ffff9c8a`d70e7180 fffff807`31838447 : nt!MiResolvePageTablePage+0x106 SYMBOL_NAME: nt!RtlpxVirtualUnwind+48c MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.22621.1778 STACK_COMMAND: .cxr; .ecxr ; kb. BUCKET_ID_FUNC_OFFSET: 48c. FAILURE_BUCKET_ID: AV_R_(null)_nt!RtlpxVirtualUnwind OS_VERSION: 10.0.22621.1 BUILDLAB_STR: ni_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {955b8b2f-25e7-b167-acd3-0cfdca67a101} Followup: MachineOwner. -------- 9: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c000001d, Exception code that caused the BugCheck. Arg2: fffff8033e03b521, Address of the instruction which caused the BugCheck. Arg3: ffffd680fbd32900, Address of the context record for the exception that caused the BugCheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3921. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 8920. Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 374. Key : Analysis.Init.Elapsed.mSec Value: 3864. Key : Analysis.Memory.CommitPeak.Mb Value: 99. Key : Bugcheck.Code.DumpHeader Value: 0x3b. Key : Bugcheck.Code.Register Value: 0x3b. Key : WER.OS.Branch Value: ni_release. Key : WER.OS.Timestamp Value: 2022-05-06T12:50:00Z Key : WER.OS.Version Value: 10.0.22621.1 FILE_IN_CAB: 061123-18468-01.dmp BUGCHECK_CODE: 3b. BUGCHECK_P1: c000001d. BUGCHECK_P2: fffff8033e03b521. BUGCHECK_P3: ffffd680fbd32900. BUGCHECK_P4: 0 CONTEXT: ffffd680fbd32900 -- (.cxr 0xffffd680fbd32900) rax=00000000000000ae rbx=ffffc582ef4af080 rcx=0000000000008aae rdx=ffffc582f18a0158 rsi=ffffd680fbd11180 rdi=0000000000000002 rip=fffff8033e03b521 rsp=ffff8b80321095f0 rbp=0000000000000001 r8=0000000000000002 r9=0000000000000000 r10=0000000000000001 r11=ffffc582ef4af1c0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=ffffc582ef4af180 iopl=0 nv up ei pl zr na po nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!KiCommitThreadWait+0x141: fffff803`3e03b521 c4 ??? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Discord.exe MISALIGNED_IP: nt!KiCommitThreadWait+141 fffff803`3e03b521 c4 ??? STACK_TEXT: ffff8b80`321095f0 fffff803`3e03a896 : 00000000`00000000 00000000`00000001 00000000`000000ae 00000002`2abbf769 : nt!KiCommitThreadWait+0x141 ffff8b80`321096a0 fffff803`3e5797ac : ffffc582`f33f8080 ffffc582`ef05c0e0 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256 ffff8b80`32109a40 fffff803`3e57969e : ffffc582`ef4af080 00000000`19d55020 00000000`00000000 00000000`1a15fb04 : nt!ObWaitForSingleObject+0xcc ffff8b80`32109aa0 fffff803`3e240ee8 : 00000000`00000000 ffffd680`fc7493c0 ffff8b80`32109af8 ffffffff`ff676980 : nt!NtWaitForSingleObject+0x3e ffff8b80`32109ae0 00000000`77051cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`1a05edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77051cf3. SYMBOL_NAME: nt!KiCommitThreadWait+141 IMAGE_VERSION: 10.0.22621.1778 STACK_COMMAND: .cxr 0xffffd680fbd32900 ; kb. MODULE_NAME: AuthenticAMD. IMAGE_NAME: AuthenticAMD.sys FAILURE_BUCKET_ID: IP_MISALIGNED_AuthenticAMD.sys OS_VERSION: 10.0.22621.1 BUILDLAB_STR: ni_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {716d112a-8330-4bbb-160c-ec98297019d2} Followup: MachineOwner. ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.