Çözüldü APC_INDEX_MISMATCH mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

desst

Hectopat
Katılım
23 Temmuz 2015
Mesajlar
9
Makaleler
2
Daha fazla  
Cinsiyet
Erkek
PC özellikleri;

ASUS B450mk anakart.
ROG STRIX RTX2060OC ekran kartı.
Ryzen 5 3500X işlemci.
G.Skill 300MHz 8x2 GB RAM.

Yardımlarınızı rica ederim.

Minidump dosyası:
 
Çözüm
1) BIOS'unuzu güncelleyin. En Anakartınıza ait en güncel 3211 sürümlü BIOS dosyası aşağıda yer almaktadır.


2) HD Tune 5.75 indirip sistemdeki tüm disklerin Health sekmesinin ekran alıntısını paylaşırsanız sevinirim.

3) Sistemde klavye ve fare harici diğer tüm USB aygıtları çıkartın. Klavye ve fareyi de farklı bir USB portuna takın.

Cevabınızı bekliyor olacağım. Sorun çözülürse belirtirseniz sevinirim.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffde83759ac278, Virtual address for the attempted execute.
Arg2: 8600000155f51963, PTE contents.
Arg3: ffff888ab2aa75e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8640

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 20897

Key : Analysis.Init.CPU.mSec
Value: 952

Key : Analysis.Init.Elapsed.mSec
Value: 4467

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: fc

BUGCHECK_P1: ffffde83759ac278

BUGCHECK_P2: 8600000155f51963

BUGCHECK_P3: ffff888ab2aa75e0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: ffff888ab2aa75e0 -- (.trap 0xffff888ab2aa75e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9e0e127989d8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000051 rsi=0000000000000000 rdi=0000000000000000
rip=ffffde83759ac278 rsp=ffff888ab2aa7770 rbp=ffffcb009ef5c180
r8=00000001000005c0 r9=ffffcb009ef5c180 r10=ffff9e0e11067080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffde83`759ac278 a8c2 test al,0C2h
Resetting default scope

STACK_TEXT:
ffff888a`b2aa72f8 fffff804`2c683f32 : 00000000`000000fc ffffde83`759ac278 86000001`55f51963 ffff888a`b2aa75e0 : nt!KeBugCheckEx
ffff888a`b2aa7300 fffff804`2c4bda66 : ffffde83`759ac278 ffff888a`b2aa7500 ffff888a`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12df1a
ffff888a`b2aa7340 fffff804`2c49f4f0 : ffffcb00`9ef5c180 00000000`00000011 ffff888a`b2aa7660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffff888a`b2aa7440 fffff804`2c60535e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff888a`b2aa75e0 ffffde83`759ac278 : ffffde83`00000002 fffff804`00000004 00000000`00000000 ffff9e0e`00000000 : nt!KiPageFault+0x35e
ffff888a`b2aa7770 ffffde83`00000002 : fffff804`00000004 00000000`00000000 ffff9e0e`00000000 ffffde83`00000000 : 0xffffde83`759ac278
ffff888a`b2aa7778 fffff804`00000004 : 00000000`00000000 ffff9e0e`00000000 ffffde83`00000000 ffff9e0e`129912b0 : 0xffffde83`00000002
ffff888a`b2aa7780 00000000`00000000 : ffff9e0e`00000000 ffffde83`00000000 ffff9e0e`129912b0 ffffcb00`00000000 : 0xfffff804`00000004


SYMBOL_NAME: nt!MiCheckSystemNxFault+12df1a

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 12df1a

FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffe2602dc14, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 00000000ffff0000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffffe009132cb80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6702

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 19427

Key : Analysis.Init.CPU.mSec
Value: 968

Key : Analysis.Init.Elapsed.mSec
Value: 5898

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 1

BUGCHECK_P1: 7ffe2602dc14

BUGCHECK_P2: 0

BUGCHECK_P3: ffff0000

BUGCHECK_P4: fffffe009132cb80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Zoom.exe

STACK_TEXT:
fffffe00`9132c9b8 fffff806`84409169 : 00000000`00000001 00007ffe`2602dc14 00000000`00000000 00000000`ffff0000 : nt!KeBugCheckEx
fffffe00`9132c9c0 fffff806`84409033 : ffffb60a`514e0080 ffffb60a`4f870080 ffffb60a`4c64d060 ffffb60a`00000000 : nt!KiBugCheckDispatch+0x69
fffffe00`9132cb00 00007ffe`2602dc14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000067`843ff9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2602dc14


SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1fe

FAILURE_BUCKET_ID: 0x1_SysCallNum_70_nt!KiSystemServiceExitPico

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {0e389774-a50e-39b4-aec5-52d8ef3c8cf9}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffa50b174543b8, Virtual address for the attempted execute.
Arg2: 810000011434f963, PTE contents.
Arg3: ffffc00bcbd6b5e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6905

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 21454

Key : Analysis.Init.CPU.mSec
Value: 937

Key : Analysis.Init.Elapsed.mSec
Value: 4510

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: fc

BUGCHECK_P1: ffffa50b174543b8

BUGCHECK_P2: 810000011434f963

BUGCHECK_P3: ffffc00bcbd6b5e0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: ffffc00bcbd6b5e0 -- (.trap 0xffffc00bcbd6b5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdb8f560b64e8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000083 rsi=0000000000000000 rdi=0000000000000000
rip=ffffa50b174543b8 rsp=ffffc00bcbd6b770 rbp=ffff93808d15c180
r8=0000000100000579 r9=ffff93808d15c180 r10=ffffdb8f56643340
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffa50b`174543b8 e84345170b call ffffa50b`225c8900
Resetting default scope

STACK_TEXT:
ffffc00b`cbd6b2f8 fffff801`70e83f32 : 00000000`000000fc ffffa50b`174543b8 81000001`1434f963 ffffc00b`cbd6b5e0 : nt!KeBugCheckEx
ffffc00b`cbd6b300 fffff801`70cbda66 : ffffa50b`174543b8 ffffc00b`cbd6b500 ffffc00b`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12df1a
ffffc00b`cbd6b340 fffff801`70c9f4f0 : ffffc00b`cbd6b4a0 00000000`00000011 ffffc00b`cbd6b660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffc00b`cbd6b440 fffff801`70e0535e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffc00b`cbd6b5e0 ffffa50b`174543b8 : ffffa50b`00000002 fffff801`00000004 00000000`00000000 ffffdb8f`00000000 : nt!KiPageFault+0x35e
ffffc00b`cbd6b770 ffffa50b`00000002 : fffff801`00000004 00000000`00000000 ffffdb8f`00000000 ffffa50b`00000000 : 0xffffa50b`174543b8
ffffc00b`cbd6b778 fffff801`00000004 : 00000000`00000000 ffffdb8f`00000000 ffffa50b`00000000 ffffdb8f`59c8ce80 : 0xffffa50b`00000002
ffffc00b`cbd6b780 00000000`00000000 : ffffdb8f`00000000 ffffa50b`00000000 ffffdb8f`59c8ce80 ffff9380`00000000 : 0xfffff801`00000004


SYMBOL_NAME: nt!MiCheckSystemNxFault+12df1a

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 12df1a

FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffd00c03485c18, Virtual address for the attempted execute.
Arg2: 81000002d0597963, PTE contents.
Arg3: fffff8809527b5e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8655

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 31927

Key : Analysis.Init.CPU.mSec
Value: 905

Key : Analysis.Init.Elapsed.mSec
Value: 4608

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: fc

BUGCHECK_P1: ffffd00c03485c18

BUGCHECK_P2: 81000002d0597963

BUGCHECK_P3: fffff8809527b5e0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: fffff8809527b5e0 -- (.trap 0xfffff8809527b5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe708dcaa1b68 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000c5 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd00c03485c18 rsp=fffff8809527b770 rbp=ffffa80136b5c180
r8=000000010000026c r9=ffffa80136b5c180 r10=ffffe708db85c080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffd00c`03485c18 7052 jo ffffd00c`03485c6c [br=0]
Resetting default scope

STACK_TEXT:
fffff880`9527b2f8 fffff806`11283f32 : 00000000`000000fc ffffd00c`03485c18 81000002`d0597963 fffff880`9527b5e0 : nt!KeBugCheckEx
fffff880`9527b300 fffff806`110bda66 : ffffd00c`03485c18 fffff880`9527b500 fffff880`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12df1a
fffff880`9527b340 fffff806`1109f4f0 : fffff880`9527b4a0 00000000`00000011 fffff880`9527b660 00000000`00000000 : nt!MiSystemFault+0x6c6
fffff880`9527b440 fffff806`1120535e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
fffff880`9527b5e0 ffffd00c`03485c18 : ffffd00c`00000002 fffff806`00000005 00000000`00000000 ffffe708`00000000 : nt!KiPageFault+0x35e
fffff880`9527b770 ffffd00c`00000002 : fffff806`00000005 00000000`00000000 ffffe708`00000000 ffffd00c`00000000 : 0xffffd00c`03485c18
fffff880`9527b778 fffff806`00000005 : 00000000`00000000 ffffe708`00000000 ffffd00c`00000000 ffffe708`e3726400 : 0xffffd00c`00000002
fffff880`9527b780 00000000`00000000 : ffffe708`00000000 ffffd00c`00000000 ffffe708`e3726400 ffffe708`00000000 : 0xfffff806`00000005


SYMBOL_NAME: nt!MiCheckSystemNxFault+12df1a

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 12df1a

FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffafdfad974, Address of system call function or worker routine
Arg2: 0000000000000001, Thread->ApcStateIndex
Arg3: 0000000000000000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffaa082e2aeb80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7468

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 24254

Key : Analysis.Init.CPU.mSec
Value: 764

Key : Analysis.Init.Elapsed.mSec
Value: 4407

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 1

BUGCHECK_P1: 7ffafdfad974

BUGCHECK_P2: 1

BUGCHECK_P3: 0

BUGCHECK_P4: ffffaa082e2aeb80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

BAD_STACK_POINTER: ffffaa082e2ae948

STACK_TEXT:
ffffaa08`2e2ae948 fffff801`6f209169 : 00000000`00000001 00007ffa`fdfad974 00000000`00000001 00000000`00000000 : nt!KeBugCheckEx
ffffaa08`2e2ae950 fffff801`6f209033 : 00000000`00000020 fffff801`78544766 ffffd18f`f9e4a080 ffffd18f`faa1b3e0 : nt!KiBugCheckDispatch+0x69
ffffaa08`2e2aea90 00007ffa`fdfad974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000001e`4ceff548 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`fdfad974


SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1fe

FAILURE_BUCKET_ID: 0x1_SysCallNum_0_STACKPTR_ERROR_nt!KiSystemServiceExitPico

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {29841e22-ca67-b63d-5b1c-3557be9f186c}

Followup: MachineOwner
---------[/CODE]
1) BIOS'unuzu güncelleyin. En Anakartınıza ait en güncel 3211 sürümlü BIOS dosyası aşağıda yer almaktadır.


2) HD Tune 5.75 indirip sistemdeki tüm disklerin Health sekmesinin ekran alıntısını paylaşırsanız sevinirim.

3) Sistemde klavye ve fare harici diğer tüm USB aygıtları çıkartın. Klavye ve fareyi de farklı bir USB portuna takın.

Cevabınızı bekliyor olacağım. Sorun çözülürse belirtirseniz sevinirim.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffde83759ac278, Virtual address for the attempted execute.
Arg2: 8600000155f51963, PTE contents.
Arg3: ffff888ab2aa75e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8640

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 20897

Key : Analysis.Init.CPU.mSec
Value: 952

Key : Analysis.Init.Elapsed.mSec
Value: 4467

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: fc

BUGCHECK_P1: ffffde83759ac278

BUGCHECK_P2: 8600000155f51963

BUGCHECK_P3: ffff888ab2aa75e0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: ffff888ab2aa75e0 -- (.trap 0xffff888ab2aa75e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9e0e127989d8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000051 rsi=0000000000000000 rdi=0000000000000000
rip=ffffde83759ac278 rsp=ffff888ab2aa7770 rbp=ffffcb009ef5c180
r8=00000001000005c0 r9=ffffcb009ef5c180 r10=ffff9e0e11067080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffde83`759ac278 a8c2 test al,0C2h
Resetting default scope

STACK_TEXT:
ffff888a`b2aa72f8 fffff804`2c683f32 : 00000000`000000fc ffffde83`759ac278 86000001`55f51963 ffff888a`b2aa75e0 : nt!KeBugCheckEx
ffff888a`b2aa7300 fffff804`2c4bda66 : ffffde83`759ac278 ffff888a`b2aa7500 ffff888a`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12df1a
ffff888a`b2aa7340 fffff804`2c49f4f0 : ffffcb00`9ef5c180 00000000`00000011 ffff888a`b2aa7660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffff888a`b2aa7440 fffff804`2c60535e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff888a`b2aa75e0 ffffde83`759ac278 : ffffde83`00000002 fffff804`00000004 00000000`00000000 ffff9e0e`00000000 : nt!KiPageFault+0x35e
ffff888a`b2aa7770 ffffde83`00000002 : fffff804`00000004 00000000`00000000 ffff9e0e`00000000 ffffde83`00000000 : 0xffffde83`759ac278
ffff888a`b2aa7778 fffff804`00000004 : 00000000`00000000 ffff9e0e`00000000 ffffde83`00000000 ffff9e0e`129912b0 : 0xffffde83`00000002
ffff888a`b2aa7780 00000000`00000000 : ffff9e0e`00000000 ffffde83`00000000 ffff9e0e`129912b0 ffffcb00`00000000 : 0xfffff804`00000004


SYMBOL_NAME: nt!MiCheckSystemNxFault+12df1a

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 12df1a

FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffe2602dc14, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 00000000ffff0000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffffe009132cb80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6702

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 19427

Key : Analysis.Init.CPU.mSec
Value: 968

Key : Analysis.Init.Elapsed.mSec
Value: 5898

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 1

BUGCHECK_P1: 7ffe2602dc14

BUGCHECK_P2: 0

BUGCHECK_P3: ffff0000

BUGCHECK_P4: fffffe009132cb80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Zoom.exe

STACK_TEXT:
fffffe00`9132c9b8 fffff806`84409169 : 00000000`00000001 00007ffe`2602dc14 00000000`00000000 00000000`ffff0000 : nt!KeBugCheckEx
fffffe00`9132c9c0 fffff806`84409033 : ffffb60a`514e0080 ffffb60a`4f870080 ffffb60a`4c64d060 ffffb60a`00000000 : nt!KiBugCheckDispatch+0x69
fffffe00`9132cb00 00007ffe`2602dc14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000067`843ff9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2602dc14


SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1fe

FAILURE_BUCKET_ID: 0x1_SysCallNum_70_nt!KiSystemServiceExitPico

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {0e389774-a50e-39b4-aec5-52d8ef3c8cf9}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffa50b174543b8, Virtual address for the attempted execute.
Arg2: 810000011434f963, PTE contents.
Arg3: ffffc00bcbd6b5e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6905

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 21454

Key : Analysis.Init.CPU.mSec
Value: 937

Key : Analysis.Init.Elapsed.mSec
Value: 4510

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: fc

BUGCHECK_P1: ffffa50b174543b8

BUGCHECK_P2: 810000011434f963

BUGCHECK_P3: ffffc00bcbd6b5e0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: ffffc00bcbd6b5e0 -- (.trap 0xffffc00bcbd6b5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdb8f560b64e8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000083 rsi=0000000000000000 rdi=0000000000000000
rip=ffffa50b174543b8 rsp=ffffc00bcbd6b770 rbp=ffff93808d15c180
r8=0000000100000579 r9=ffff93808d15c180 r10=ffffdb8f56643340
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffa50b`174543b8 e84345170b call ffffa50b`225c8900
Resetting default scope

STACK_TEXT:
ffffc00b`cbd6b2f8 fffff801`70e83f32 : 00000000`000000fc ffffa50b`174543b8 81000001`1434f963 ffffc00b`cbd6b5e0 : nt!KeBugCheckEx
ffffc00b`cbd6b300 fffff801`70cbda66 : ffffa50b`174543b8 ffffc00b`cbd6b500 ffffc00b`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12df1a
ffffc00b`cbd6b340 fffff801`70c9f4f0 : ffffc00b`cbd6b4a0 00000000`00000011 ffffc00b`cbd6b660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffc00b`cbd6b440 fffff801`70e0535e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffc00b`cbd6b5e0 ffffa50b`174543b8 : ffffa50b`00000002 fffff801`00000004 00000000`00000000 ffffdb8f`00000000 : nt!KiPageFault+0x35e
ffffc00b`cbd6b770 ffffa50b`00000002 : fffff801`00000004 00000000`00000000 ffffdb8f`00000000 ffffa50b`00000000 : 0xffffa50b`174543b8
ffffc00b`cbd6b778 fffff801`00000004 : 00000000`00000000 ffffdb8f`00000000 ffffa50b`00000000 ffffdb8f`59c8ce80 : 0xffffa50b`00000002
ffffc00b`cbd6b780 00000000`00000000 : ffffdb8f`00000000 ffffa50b`00000000 ffffdb8f`59c8ce80 ffff9380`00000000 : 0xfffff801`00000004


SYMBOL_NAME: nt!MiCheckSystemNxFault+12df1a

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 12df1a

FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffd00c03485c18, Virtual address for the attempted execute.
Arg2: 81000002d0597963, PTE contents.
Arg3: fffff8809527b5e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8655

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 31927

Key : Analysis.Init.CPU.mSec
Value: 905

Key : Analysis.Init.Elapsed.mSec
Value: 4608

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: fc

BUGCHECK_P1: ffffd00c03485c18

BUGCHECK_P2: 81000002d0597963

BUGCHECK_P3: fffff8809527b5e0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: fffff8809527b5e0 -- (.trap 0xfffff8809527b5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe708dcaa1b68 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000c5 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd00c03485c18 rsp=fffff8809527b770 rbp=ffffa80136b5c180
r8=000000010000026c r9=ffffa80136b5c180 r10=ffffe708db85c080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffd00c`03485c18 7052 jo ffffd00c`03485c6c [br=0]
Resetting default scope

STACK_TEXT:
fffff880`9527b2f8 fffff806`11283f32 : 00000000`000000fc ffffd00c`03485c18 81000002`d0597963 fffff880`9527b5e0 : nt!KeBugCheckEx
fffff880`9527b300 fffff806`110bda66 : ffffd00c`03485c18 fffff880`9527b500 fffff880`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12df1a
fffff880`9527b340 fffff806`1109f4f0 : fffff880`9527b4a0 00000000`00000011 fffff880`9527b660 00000000`00000000 : nt!MiSystemFault+0x6c6
fffff880`9527b440 fffff806`1120535e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
fffff880`9527b5e0 ffffd00c`03485c18 : ffffd00c`00000002 fffff806`00000005 00000000`00000000 ffffe708`00000000 : nt!KiPageFault+0x35e
fffff880`9527b770 ffffd00c`00000002 : fffff806`00000005 00000000`00000000 ffffe708`00000000 ffffd00c`00000000 : 0xffffd00c`03485c18
fffff880`9527b778 fffff806`00000005 : 00000000`00000000 ffffe708`00000000 ffffd00c`00000000 ffffe708`e3726400 : 0xffffd00c`00000002
fffff880`9527b780 00000000`00000000 : ffffe708`00000000 ffffd00c`00000000 ffffe708`e3726400 ffffe708`00000000 : 0xfffff806`00000005


SYMBOL_NAME: nt!MiCheckSystemNxFault+12df1a

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 12df1a

FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffafdfad974, Address of system call function or worker routine
Arg2: 0000000000000001, Thread->ApcStateIndex
Arg3: 0000000000000000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffaa082e2aeb80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7468

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 24254

Key : Analysis.Init.CPU.mSec
Value: 764

Key : Analysis.Init.Elapsed.mSec
Value: 4407

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 1

BUGCHECK_P1: 7ffafdfad974

BUGCHECK_P2: 1

BUGCHECK_P3: 0

BUGCHECK_P4: ffffaa082e2aeb80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

BAD_STACK_POINTER: ffffaa082e2ae948

STACK_TEXT:
ffffaa08`2e2ae948 fffff801`6f209169 : 00000000`00000001 00007ffa`fdfad974 00000000`00000001 00000000`00000000 : nt!KeBugCheckEx
ffffaa08`2e2ae950 fffff801`6f209033 : 00000000`00000020 fffff801`78544766 ffffd18f`f9e4a080 ffffd18f`faa1b3e0 : nt!KiBugCheckDispatch+0x69
ffffaa08`2e2aea90 00007ffa`fdfad974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000001e`4ceff548 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`fdfad974


SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1fe

FAILURE_BUCKET_ID: 0x1_SysCallNum_0_STACKPTR_ERROR_nt!KiSystemServiceExitPico

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {29841e22-ca67-b63d-5b1c-3557be9f186c}

Followup: MachineOwner
---------[/CODE]
 
Çözüm
1) BIOS'unuzu güncelleyin. En anakartınıza ait en güncel 3211 sürümlü BIOS dosyası aşağıda yer almaktadır.


2) HD Tune 5.75 indirip sistemdeki tüm disklerin health sekmesinin ekran alıntısını paylaşırsanız sevinirim.

3) sistemde klavye ve fare harici diğer tüm USB aygıtları çıkartın. Klavye ve fareyi de farklı bir USB portuna takın.

Cevabınızı bekliyor olacağım. Sorun çözülürse belirtirseniz sevinirim.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver.
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on.
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffde83759ac278, Virtual address for the attempted execute.
Arg2: 8600000155f51963, PTE contents.
Arg3: ffff888ab2aa75e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8640.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 20897.

Key : Analysis.Init.CPU.mSec
Value: 952.

Key : Analysis.Init.Elapsed.mSec
Value: 4467.

Key : Analysis.Memory.CommitPeak.Mb
Value: 77.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: fc.

BUGCHECK_P1: ffffde83759ac278.

BUGCHECK_P2: 8600000155f51963.

BUGCHECK_P3: ffff888ab2aa75e0.

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: ffff888ab2aa75e0 -- (.trap 0xffff888ab2aa75e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9e0e127989d8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000051 rsi=0000000000000000 rdi=0000000000000000
rip=ffffde83759ac278 rsp=ffff888ab2aa7770 rbp=ffffcb009ef5c180
r8=00000001000005c0 r9=ffffcb009ef5c180 r10=ffff9e0e11067080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
ffffde83`759ac278 a8c2 test al,0C2h
Resetting default scope.

STACK_TEXT:
ffff888a`b2aa72f8 fffff804`2c683f32 : 00000000`000000fc ffffde83`759ac278 86000001`55f51963 ffff888a`b2aa75e0 : nt!KeBugCheckEx
ffff888a`b2aa7300 fffff804`2c4bda66 : ffffde83`759ac278 ffff888a`b2aa7500 ffff888a`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12df1a
ffff888a`b2aa7340 fffff804`2c49f4f0 : ffffcb00`9ef5c180 00000000`00000011 ffff888a`b2aa7660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffff888a`b2aa7440 fffff804`2c60535e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff888a`b2aa75e0 ffffde83`759ac278 : ffffde83`00000002 fffff804`00000004 00000000`00000000 ffff9e0e`00000000 : nt!KiPageFault+0x35e
ffff888a`b2aa7770 ffffde83`00000002 : fffff804`00000004 00000000`00000000 ffff9e0e`00000000 ffffde83`00000000 : 0xffffde83`759ac278
ffff888a`b2aa7778 fffff804`00000004 : 00000000`00000000 ffff9e0e`00000000 ffffde83`00000000 ffff9e0e`129912b0 : 0xffffde83`00000002
ffff888a`b2aa7780 00000000`00000000 : ffff9e0e`00000000 ffffde83`00000000 ffff9e0e`129912b0 ffffcb00`00000000 : 0xfffff804`00000004

SYMBOL_NAME: nt!MiCheckSystemNxFault+12df1a

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 12df1a.

FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this.
BugCheck is when a filesystem or a driver has a mismatched number of.
calls to disable and re-enable APCs. The key data item is the.
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value.
of either indicates that a driver has disabled special or normal APCs.
(respectively) without re-enabling them; a positive value indicates that.
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffe2602dc14, Address of system call function or worker routine.
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 00000000ffff0000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffffe009132cb80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6702.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 19427.

Key : Analysis.Init.CPU.mSec
Value: 968.

Key : Analysis.Init.Elapsed.mSec
Value: 5898.

Key : Analysis.Memory.CommitPeak.Mb
Value: 73.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 1

BUGCHECK_P1: 7ffe2602dc14.

BUGCHECK_P2: 0

BUGCHECK_P3: ffff0000.

BUGCHECK_P4: fffffe009132cb80.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Zoom.exe

STACK_TEXT:
fffffe00`9132c9b8 fffff806`84409169 : 00000000`00000001 00007ffe`2602dc14 00000000`00000000 00000000`ffff0000 : nt!KeBugCheckEx
fffffe00`9132c9c0 fffff806`84409033 : ffffb60a`514e0080 ffffb60a`4f870080 ffffb60a`4c64d060 ffffb60a`00000000 : nt!KiBugCheckDispatch+0x69
fffffe00`9132cb00 00007ffe`2602dc14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000067`843ff9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2602dc14

SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1fe.

FAILURE_BUCKET_ID: 0x1_SysCallNum_70_nt!KiSystemServiceExitPico

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {0e389774-a50e-39b4-aec5-52d8ef3c8cf9}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver.
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on.
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffa50b174543b8, Virtual address for the attempted execute.
Arg2: 810000011434f963, PTE contents.
Arg3: ffffc00bcbd6b5e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6905.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 21454.

Key : Analysis.Init.CPU.mSec
Value: 937.

Key : Analysis.Init.Elapsed.mSec
Value: 4510.

Key : Analysis.Memory.CommitPeak.Mb
Value: 73.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: fc.

BUGCHECK_P1: ffffa50b174543b8.

BUGCHECK_P2: 810000011434f963.

BUGCHECK_P3: ffffc00bcbd6b5e0.

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: ffffc00bcbd6b5e0 -- (.trap 0xffffc00bcbd6b5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdb8f560b64e8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000083 rsi=0000000000000000 rdi=0000000000000000
rip=ffffa50b174543b8 rsp=ffffc00bcbd6b770 rbp=ffff93808d15c180
r8=0000000100000579 r9=ffff93808d15c180 r10=ffffdb8f56643340
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
ffffa50b`174543b8 e84345170b call ffffa50b`225c8900
Resetting default scope.

STACK_TEXT:
ffffc00b`cbd6b2f8 fffff801`70e83f32 : 00000000`000000fc ffffa50b`174543b8 81000001`1434f963 ffffc00b`cbd6b5e0 : nt!KeBugCheckEx
ffffc00b`cbd6b300 fffff801`70cbda66 : ffffa50b`174543b8 ffffc00b`cbd6b500 ffffc00b`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12df1a
ffffc00b`cbd6b340 fffff801`70c9f4f0 : ffffc00b`cbd6b4a0 00000000`00000011 ffffc00b`cbd6b660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffc00b`cbd6b440 fffff801`70e0535e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffc00b`cbd6b5e0 ffffa50b`174543b8 : ffffa50b`00000002 fffff801`00000004 00000000`00000000 ffffdb8f`00000000 : nt!KiPageFault+0x35e
ffffc00b`cbd6b770 ffffa50b`00000002 : fffff801`00000004 00000000`00000000 ffffdb8f`00000000 ffffa50b`00000000 : 0xffffa50b`174543b8
ffffc00b`cbd6b778 fffff801`00000004 : 00000000`00000000 ffffdb8f`00000000 ffffa50b`00000000 ffffdb8f`59c8ce80 : 0xffffa50b`00000002
ffffc00b`cbd6b780 00000000`00000000 : ffffdb8f`00000000 ffffa50b`00000000 ffffdb8f`59c8ce80 ffff9380`00000000 : 0xfffff801`00000004

SYMBOL_NAME: nt!MiCheckSystemNxFault+12df1a

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 12df1a.

FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver.
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on.
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffd00c03485c18, Virtual address for the attempted execute.
Arg2: 81000002d0597963, PTE contents.
Arg3: fffff8809527b5e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8655.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 31927.

Key : Analysis.Init.CPU.mSec
Value: 905.

Key : Analysis.Init.Elapsed.mSec
Value: 4608.

Key : Analysis.Memory.CommitPeak.Mb
Value: 81.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: fc.

BUGCHECK_P1: ffffd00c03485c18.

BUGCHECK_P2: 81000002d0597963.

BUGCHECK_P3: fffff8809527b5e0.

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: fffff8809527b5e0 -- (.trap 0xfffff8809527b5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe708dcaa1b68 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000c5 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd00c03485c18 rsp=fffff8809527b770 rbp=ffffa80136b5c180
r8=000000010000026c r9=ffffa80136b5c180 r10=ffffe708db85c080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
ffffd00c`03485c18 7052 jo ffffd00c`03485c6c [br=0]
Resetting default scope.

STACK_TEXT:
fffff880`9527b2f8 fffff806`11283f32 : 00000000`000000fc ffffd00c`03485c18 81000002`d0597963 fffff880`9527b5e0 : nt!KeBugCheckEx
fffff880`9527b300 fffff806`110bda66 : ffffd00c`03485c18 fffff880`9527b500 fffff880`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12df1a
fffff880`9527b340 fffff806`1109f4f0 : fffff880`9527b4a0 00000000`00000011 fffff880`9527b660 00000000`00000000 : nt!MiSystemFault+0x6c6
fffff880`9527b440 fffff806`1120535e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
fffff880`9527b5e0 ffffd00c`03485c18 : ffffd00c`00000002 fffff806`00000005 00000000`00000000 ffffe708`00000000 : nt!KiPageFault+0x35e
fffff880`9527b770 ffffd00c`00000002 : fffff806`00000005 00000000`00000000 ffffe708`00000000 ffffd00c`00000000 : 0xffffd00c`03485c18
fffff880`9527b778 fffff806`00000005 : 00000000`00000000 ffffe708`00000000 ffffd00c`00000000 ffffe708`e3726400 : 0xffffd00c`00000002
fffff880`9527b780 00000000`00000000 : ffffe708`00000000 ffffd00c`00000000 ffffe708`e3726400 ffffe708`00000000 : 0xfffff806`00000005

SYMBOL_NAME: nt!MiCheckSystemNxFault+12df1a

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 12df1a.

FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this.
BugCheck is when a filesystem or a driver has a mismatched number of.
calls to disable and re-enable APCs. The key data item is the.
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value.
of either indicates that a driver has disabled special or normal APCs.
(respectively) without re-enabling them; a positive value indicates that.
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffafdfad974, Address of system call function or worker routine.
Arg2: 0000000000000001, Thread->ApcStateIndex
Arg3: 0000000000000000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffaa082e2aeb80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7468.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 24254.

Key : Analysis.Init.CPU.mSec
Value: 764.

Key : Analysis.Init.Elapsed.mSec
Value: 4407.

Key : Analysis.Memory.CommitPeak.Mb
Value: 81.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 1

BUGCHECK_P1: 7ffafdfad974.

BUGCHECK_P2: 1

BUGCHECK_P3: 0

BUGCHECK_P4: ffffaa082e2aeb80.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

BAD_STACK_POINTER: ffffaa082e2ae948.

STACK_TEXT:
ffffaa08`2e2ae948 fffff801`6f209169 : 00000000`00000001 00007ffa`fdfad974 00000000`00000001 00000000`00000000 : nt!KeBugCheckEx
ffffaa08`2e2ae950 fffff801`6f209033 : 00000000`00000020 fffff801`78544766 ffffd18f`f9e4a080 ffffd18f`faa1b3e0 : nt!KiBugCheckDispatch+0x69
ffffaa08`2e2aea90 00007ffa`fdfad974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000001e`4ceff548 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`fdfad974

SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1165

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1fe.

FAILURE_BUCKET_ID: 0x1_SysCallNum_0_STACKPTR_ERROR_nt!KiSystemServiceExitPico

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {29841e22-ca67-b63d-5b1c-3557be9f186c}

Followup: MachineOwner.
---------[/CODE]

Merhaba ilginiz için teşekkür ederim. Dediğiniz gibi BIOS güncelledim ve HD Tune 5.75 health sekmesinin ekran görüntüsünü paylaşıyorum. Sistemde tek disk mevcut. Klavye fare harici USB portunda hiçbir şey takılı değil. Deneyip sonucu sizinle paylaşacağım. Teşekkürler.

hdtune.png
 
Son düzenleyen: Moderatör:
Anladım. Burada gördüğüm kadarıyla piyasada genel anlamda tavsiye edilmeyen bir SSD kullanıyorsunuz. Ki CRC hatası oluşmuş bir defa. Size tavsiyem en yakın zamanda SATA kablonuzu değiştirin. Ayrıca diski farklı bir SATA portuna takın. Sorunun devamı durumunda diski de değişebilirsiniz zira bu da sorunun bir nedeni. Bunu da belirtmek istedim.
 
Anladım. Burada gördüğüm kadarıyla piyasada genel anlamda tavsiye edilmeyen bir SSD kullanıyorsunuz. Ki CRC hatası oluşmuş bir defa. Size tavsiyem en yakın zamanda SATA kablonuzu değiştirin. Ayrıca diski farklı bir SATA portuna takın. Sorunun devamı durumunda diski de değişebilirsiniz zira bu da sorunun bir nedeni. Bunu da belirtmek istedim.

Merhaba, BIOS güncellemesi yaptım. 2 gündür mavi ekran hatası almıyorum. Sanırım problem düzeldi. İlginiz için teşekkürler.
 
Son düzenleyen: Moderatör:

Yeni konular

Geri
Yukarı