1) BIOS'unuzu güncelleyin. En anakartınıza ait en güncel
3211
sürümlü BIOS dosyası aşağıda yer almaktadır.
2) HD Tune 5.75 indirip sistemdeki tüm disklerin health sekmesinin ekran alıntısını paylaşırsanız sevinirim.
3) sistemde klavye ve fare harici diğer tüm USB aygıtları çıkartın. Klavye ve fareyi de farklı bir USB portuna takın.
Cevabınızı bekliyor olacağım. Sorun çözülürse belirtirseniz sevinirim.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver.
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on.
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffde83759ac278, Virtual address for the attempted execute.
Arg2: 8600000155f51963, PTE contents.
Arg3: ffff888ab2aa75e0, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8640.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 20897.
Key : Analysis.Init.CPU.mSec
Value: 952.
Key : Analysis.Init.Elapsed.mSec
Value: 4467.
Key : Analysis.Memory.CommitPeak.Mb
Value: 77.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: fc.
BUGCHECK_P1: ffffde83759ac278.
BUGCHECK_P2: 8600000155f51963.
BUGCHECK_P3: ffff888ab2aa75e0.
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffff888ab2aa75e0 -- (.trap 0xffff888ab2aa75e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9e0e127989d8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000051 rsi=0000000000000000 rdi=0000000000000000
rip=ffffde83759ac278 rsp=ffff888ab2aa7770 rbp=ffffcb009ef5c180
r8=00000001000005c0 r9=ffffcb009ef5c180 r10=ffff9e0e11067080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
ffffde83`759ac278 a8c2 test al,0C2h
Resetting default scope.
STACK_TEXT:
ffff888a`b2aa72f8 fffff804`2c683f32 : 00000000`000000fc ffffde83`759ac278 86000001`55f51963 ffff888a`b2aa75e0 : nt!KeBugCheckEx
ffff888a`b2aa7300 fffff804`2c4bda66 : ffffde83`759ac278 ffff888a`b2aa7500 ffff888a`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12df1a
ffff888a`b2aa7340 fffff804`2c49f4f0 : ffffcb00`9ef5c180 00000000`00000011 ffff888a`b2aa7660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffff888a`b2aa7440 fffff804`2c60535e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff888a`b2aa75e0 ffffde83`759ac278 : ffffde83`00000002 fffff804`00000004 00000000`00000000 ffff9e0e`00000000 : nt!KiPageFault+0x35e
ffff888a`b2aa7770 ffffde83`00000002 : fffff804`00000004 00000000`00000000 ffff9e0e`00000000 ffffde83`00000000 : 0xffffde83`759ac278
ffff888a`b2aa7778 fffff804`00000004 : 00000000`00000000 ffff9e0e`00000000 ffffde83`00000000 ffff9e0e`129912b0 : 0xffffde83`00000002
ffff888a`b2aa7780 00000000`00000000 : ffff9e0e`00000000 ffffde83`00000000 ffff9e0e`129912b0 ffffcb00`00000000 : 0xfffff804`00000004
SYMBOL_NAME: nt!MiCheckSystemNxFault+12df1a
MODULE_NAME: nt.
IMAGE_VERSION: 10.0.19041.1165
STACK_COMMAND: .thread ; .cxr ; kb.
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 12df1a.
FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
Followup: MachineOwner.
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this.
BugCheck is when a filesystem or a driver has a mismatched number of.
calls to disable and re-enable APCs. The key data item is the.
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value.
of either indicates that a driver has disabled special or normal APCs.
(respectively) without re-enabling them; a positive value indicates that.
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffe2602dc14, Address of system call function or worker routine.
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 00000000ffff0000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffffe009132cb80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6702.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 19427.
Key : Analysis.Init.CPU.mSec
Value: 968.
Key : Analysis.Init.Elapsed.mSec
Value: 5898.
Key : Analysis.Memory.CommitPeak.Mb
Value: 73.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1
BUGCHECK_P1: 7ffe2602dc14.
BUGCHECK_P2: 0
BUGCHECK_P3: ffff0000.
BUGCHECK_P4: fffffe009132cb80.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Zoom.exe
STACK_TEXT:
fffffe00`9132c9b8 fffff806`84409169 : 00000000`00000001 00007ffe`2602dc14 00000000`00000000 00000000`ffff0000 : nt!KeBugCheckEx
fffffe00`9132c9c0 fffff806`84409033 : ffffb60a`514e0080 ffffb60a`4f870080 ffffb60a`4c64d060 ffffb60a`00000000 : nt!KiBugCheckDispatch+0x69
fffffe00`9132cb00 00007ffe`2602dc14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000067`843ff9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2602dc14
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1165
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 1fe.
FAILURE_BUCKET_ID: 0x1_SysCallNum_70_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {0e389774-a50e-39b4-aec5-52d8ef3c8cf9}
Followup: MachineOwner.
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver.
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on.
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffa50b174543b8, Virtual address for the attempted execute.
Arg2: 810000011434f963, PTE contents.
Arg3: ffffc00bcbd6b5e0, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6905.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 21454.
Key : Analysis.Init.CPU.mSec
Value: 937.
Key : Analysis.Init.Elapsed.mSec
Value: 4510.
Key : Analysis.Memory.CommitPeak.Mb
Value: 73.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: fc.
BUGCHECK_P1: ffffa50b174543b8.
BUGCHECK_P2: 810000011434f963.
BUGCHECK_P3: ffffc00bcbd6b5e0.
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffc00bcbd6b5e0 -- (.trap 0xffffc00bcbd6b5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdb8f560b64e8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000083 rsi=0000000000000000 rdi=0000000000000000
rip=ffffa50b174543b8 rsp=ffffc00bcbd6b770 rbp=ffff93808d15c180
r8=0000000100000579 r9=ffff93808d15c180 r10=ffffdb8f56643340
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
ffffa50b`174543b8 e84345170b call ffffa50b`225c8900
Resetting default scope.
STACK_TEXT:
ffffc00b`cbd6b2f8 fffff801`70e83f32 : 00000000`000000fc ffffa50b`174543b8 81000001`1434f963 ffffc00b`cbd6b5e0 : nt!KeBugCheckEx
ffffc00b`cbd6b300 fffff801`70cbda66 : ffffa50b`174543b8 ffffc00b`cbd6b500 ffffc00b`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12df1a
ffffc00b`cbd6b340 fffff801`70c9f4f0 : ffffc00b`cbd6b4a0 00000000`00000011 ffffc00b`cbd6b660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffc00b`cbd6b440 fffff801`70e0535e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffc00b`cbd6b5e0 ffffa50b`174543b8 : ffffa50b`00000002 fffff801`00000004 00000000`00000000 ffffdb8f`00000000 : nt!KiPageFault+0x35e
ffffc00b`cbd6b770 ffffa50b`00000002 : fffff801`00000004 00000000`00000000 ffffdb8f`00000000 ffffa50b`00000000 : 0xffffa50b`174543b8
ffffc00b`cbd6b778 fffff801`00000004 : 00000000`00000000 ffffdb8f`00000000 ffffa50b`00000000 ffffdb8f`59c8ce80 : 0xffffa50b`00000002
ffffc00b`cbd6b780 00000000`00000000 : ffffdb8f`00000000 ffffa50b`00000000 ffffdb8f`59c8ce80 ffff9380`00000000 : 0xfffff801`00000004
SYMBOL_NAME: nt!MiCheckSystemNxFault+12df1a
MODULE_NAME: nt.
IMAGE_VERSION: 10.0.19041.1165
STACK_COMMAND: .thread ; .cxr ; kb.
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 12df1a.
FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
Followup: MachineOwner.
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver.
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on.
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffd00c03485c18, Virtual address for the attempted execute.
Arg2: 81000002d0597963, PTE contents.
Arg3: fffff8809527b5e0, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8655.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 31927.
Key : Analysis.Init.CPU.mSec
Value: 905.
Key : Analysis.Init.Elapsed.mSec
Value: 4608.
Key : Analysis.Memory.CommitPeak.Mb
Value: 81.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: fc.
BUGCHECK_P1: ffffd00c03485c18.
BUGCHECK_P2: 81000002d0597963.
BUGCHECK_P3: fffff8809527b5e0.
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: fffff8809527b5e0 -- (.trap 0xfffff8809527b5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe708dcaa1b68 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000c5 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd00c03485c18 rsp=fffff8809527b770 rbp=ffffa80136b5c180
r8=000000010000026c r9=ffffa80136b5c180 r10=ffffe708db85c080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
ffffd00c`03485c18 7052 jo ffffd00c`03485c6c [br=0]
Resetting default scope.
STACK_TEXT:
fffff880`9527b2f8 fffff806`11283f32 : 00000000`000000fc ffffd00c`03485c18 81000002`d0597963 fffff880`9527b5e0 : nt!KeBugCheckEx
fffff880`9527b300 fffff806`110bda66 : ffffd00c`03485c18 fffff880`9527b500 fffff880`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12df1a
fffff880`9527b340 fffff806`1109f4f0 : fffff880`9527b4a0 00000000`00000011 fffff880`9527b660 00000000`00000000 : nt!MiSystemFault+0x6c6
fffff880`9527b440 fffff806`1120535e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
fffff880`9527b5e0 ffffd00c`03485c18 : ffffd00c`00000002 fffff806`00000005 00000000`00000000 ffffe708`00000000 : nt!KiPageFault+0x35e
fffff880`9527b770 ffffd00c`00000002 : fffff806`00000005 00000000`00000000 ffffe708`00000000 ffffd00c`00000000 : 0xffffd00c`03485c18
fffff880`9527b778 fffff806`00000005 : 00000000`00000000 ffffe708`00000000 ffffd00c`00000000 ffffe708`e3726400 : 0xffffd00c`00000002
fffff880`9527b780 00000000`00000000 : ffffe708`00000000 ffffd00c`00000000 ffffe708`e3726400 ffffe708`00000000 : 0xfffff806`00000005
SYMBOL_NAME: nt!MiCheckSystemNxFault+12df1a
MODULE_NAME: nt.
IMAGE_VERSION: 10.0.19041.1165
STACK_COMMAND: .thread ; .cxr ; kb.
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 12df1a.
FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
Followup: MachineOwner.
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this.
BugCheck is when a filesystem or a driver has a mismatched number of.
calls to disable and re-enable APCs. The key data item is the.
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value.
of either indicates that a driver has disabled special or normal APCs.
(respectively) without re-enabling them; a positive value indicates that.
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffafdfad974, Address of system call function or worker routine.
Arg2: 0000000000000001, Thread->ApcStateIndex
Arg3: 0000000000000000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffaa082e2aeb80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7468.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 24254.
Key : Analysis.Init.CPU.mSec
Value: 764.
Key : Analysis.Init.Elapsed.mSec
Value: 4407.
Key : Analysis.Memory.CommitPeak.Mb
Value: 81.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1
BUGCHECK_P1: 7ffafdfad974.
BUGCHECK_P2: 1
BUGCHECK_P3: 0
BUGCHECK_P4: ffffaa082e2aeb80.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
BAD_STACK_POINTER: ffffaa082e2ae948.
STACK_TEXT:
ffffaa08`2e2ae948 fffff801`6f209169 : 00000000`00000001 00007ffa`fdfad974 00000000`00000001 00000000`00000000 : nt!KeBugCheckEx
ffffaa08`2e2ae950 fffff801`6f209033 : 00000000`00000020 fffff801`78544766 ffffd18f`f9e4a080 ffffd18f`faa1b3e0 : nt!KiBugCheckDispatch+0x69
ffffaa08`2e2aea90 00007ffa`fdfad974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000001e`4ceff548 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`fdfad974
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1165
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 1fe.
FAILURE_BUCKET_ID: 0x1_SysCallNum_0_STACKPTR_ERROR_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {29841e22-ca67-b63d-5b1c-3557be9f186c}
Followup: MachineOwner.
---------[/CODE]