Bilgisayar oyun oynarken donuyor

İbrahim.Türk

Centipat
Katılım
23 Aralık 2019
Mesajlar
16
Bilgisayarımda herhangi bir oyun falan oynarken ekran donuyor fare oynamıyor klavye falan çalışmıyor. Müzik dinleyerek oyun oynuyordum arkada müzik çalmaya devam ediyor, hatta bekledim müzik bittikten sonra sıradaki müziğe de geçti fakat bilgisayar donuk vaziyette bekledi. Bazen de direkt mavi ekran veriyor sorun ekran kartında sanırım ama ne yaptıysam çözemedim. "GT 630" Ekran Kartı kullanıyorum. Genelde bilgisayarı oyun indirirken falan geceleri açık bıraktığım oluyor ama hiç kapanmıyor. Geçen gece saat 1 civarında açık bıraktım bilgisayarı sabah okula gittim geldim öğlenden sonra saat 5 civarıydı bilgisayar kapanmamış donmamış aynı o şekilde duruyordu sorun oyuna girince oluşuyor sanırım.
 
Son düzenleyen: Moderatör:
@İbrahim.Türk OCCT ile ekran kartı testi yapın aynı hatayı verecek mi? MemTest86 programı ile RAM'leri kontrol edin işi sağlama almak için.

2 Testide yapacağım ve buradan bilgilendireceğim sonucu teşekkür ederim.

Bilgisayarınızda emin olmamakla beraber RAM arızası olabilir. RAM testi yapın veya başka bir RAM ile deneyin bakalım ne olacak?

Elimde 2 adet daha RAM bulunuyor. Fakat ikisini de denedim çıkartıp tek bir tane ile de açtım fakat gene donuyor. Mavi Ekranda çıkan hata sürekli değişiyor mesela sabah "irql_not_less_or_equal" hatası verdi ondan önce başka hata verdi sürekli verdiği hata değişiyor.
 
2 Testide yapacağım ve buradan bilgilendireceğim sonucu teşekkür ederim.



Elimde 2 adet daha RAM bulunuyor. Fakat ikisini de denedim çıkartıp tek bir tane ile de açtım fakat gene donuyor. Mavi Ekranda çıkan hata sürekli değişiyor mesela sabah "irql_not_less_or_equal" hatası verdi ondan önce başka hata verdi sürekli verdiği hata değişiyor.
Minidump dosyalarini yuklersen @MayCrasH yardımcı olur. Temiz kurulum yapmayı denedin mi? BIOS güncellemen varsa yap.
 
Son düzenleme:
Bellek hataları, Memtest86 testi yap, fakat hatalar yanlış yaptığın Overclock nedenli olabilir.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, An illegal page fault occurred while holding working set synchronization.
    Parameter 2 contains the referenced virtual address.
Arg2: 0000000000000038
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

DUMP_TYPE:  2

BUGCHECK_P1: 41287

BUGCHECK_P2: 38

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BUGCHECK_STR:  0x1a_41287

CPU_COUNT: 3

CPU_MHZ: 889

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 2

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-27-2019 17:39:05.0612

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff801d2ec9741 to fffff801d2fbe4a0

STACK_TEXT: 
ffffd000`8dde3568 fffff801`d2ec9741 : 00000000`0000001a 00000000`00041287 00000000`00000038 00000000`00000000 : 0xfffff801`d2fbe4a0
ffffd000`8dde3570 00000000`0000001a : 00000000`00041287 00000000`00000038 00000000`00000000 00000000`00000000 : 0xfffff801`d2ec9741
ffffd000`8dde3578 00000000`00041287 : 00000000`00000038 00000000`00000000 00000000`00000000 00000000`00000000 : <Unloaded_Unknown_Module_00000000`00000000>+0x1a
ffffd000`8dde3580 00000000`00000038 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : <Unloaded_Unknown_Module_00000000`00000000>+0x41287
ffffd000`8dde3588 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : <Unloaded_Unknown_Module_00000000`00000000>+0x38


THREAD_SHA1_HASH_MOD_FUNC:  b86dbb757dabe82126ba7138972e406d419db178

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  12e18a3f62eb753019db02557378693940d8e0be

THREAD_SHA1_HASH_MOD:  71fd9ea671e1593e8490c3c756cd8cbe8a3e28b3

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  CORRUPT_MODULELIST_0x1a_41287

DEFAULT_BUCKET_ID:  CORRUPT_MODULELIST_0x1a_41287

PRIMARY_PROBLEM_CLASS:  CORRUPT_MODULELIST_0x1a_41287

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_0x1a_41287

TARGET_TIME:  2019-12-26T17:28:01.000Z

OSBUILD:  9600

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  191014-1700

BUILDLAB_STR:  winblue_ltsb_escrow

BUILDOSVER_STR:  6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

ANALYSIS_SESSION_ELAPSED_TIME:  1e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:corrupt_modulelist_0x1a_41287

FAILURE_ID_HASH:  {fbb1dd26-a286-560b-f852-874d061cdd41}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffe00111c9a1d0, Virtual address for the attempted execute.
Arg2: 80000000102b2b63, PTE contents.
Arg3: ffffd00108e467a0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800e75cc308

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

SYSTEM_MANUFACTURER:  Unknow

SYSTEM_PRODUCT_NAME:  Unknow

SYSTEM_VERSION:  Unknow

BIOS_VENDOR:  Phoenix Technologies, LTD

BIOS_VERSION:  6.00 PG

BIOS_DATE:  01/02/2009

BASEBOARD_PRODUCT:  RS780-SB700

BASEBOARD_VERSION:  Unknow

DUMP_TYPE:  2

BUGCHECK_P1: ffffe00111c9a1d0

BUGCHECK_P2: 80000000102b2b63

BUGCHECK_P3: ffffd00108e467a0

BUGCHECK_P4: 2

CPU_COUNT: 3

CPU_MHZ: 889

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 2

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xFC

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-27-2019 17:39:45.0362

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd00108e467a0 -- (.trap 0xffffd00108e467a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe00113b74a80
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=ffffe00111c9a1d0 rsp=ffffd00108e46930 rbp=ffffd00108e46a00
 r8=ffffd000fba40180  r9=0000000000000000 r10=ffffe00112758540
r11=ffffe00114368880 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
ffffe001`11c9a1d0 0100            add     dword ptr [rax],eax ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800e735383c to fffff800e73bd4a0

STACK_TEXT: 
ffffd001`08e465c8 fffff800`e735383c : 00000000`000000fc ffffe001`11c9a1d0 80000000`102b2b63 ffffd001`08e467a0 : nt!KeBugCheckEx
ffffd001`08e465d0 fffff800`e74622c5 : 00000000`00000008 ffffd001`08e467a0 fffff800`e75c4ec0 ffffe001`143689c0 : nt!MI_CHECK_KERNEL_NOEXECUTE_FAULT+0x64
ffffd001`08e46610 fffff800`e72c7fb9 : 00000000`00000008 ffffe001`11c9a1d0 ffffd001`08e467a0 ffffe001`11c9a1d0 : nt!MiSystemFault+0xa25
ffffd001`08e466a0 fffff800`e73cab9d : ffffd001`08e46b38 00001f80`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x219
ffffd001`08e467a0 ffffe001`11c9a1d0 : 00000000`00000000 00000000`00000001 ffffd001`08e46960 00000000`00000000 : nt!KiPageFault+0x31d
ffffd001`08e46930 00000000`00000000 : 00000000`00000001 ffffd001`08e46960 00000000`00000000 00000000`00000001 : 0xffffe001`11c9a1d0


THREAD_SHA1_HASH_MOD_FUNC:  43cccc182f2b16152cfaf8789d66ba6ba7d419ba

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  de1dce5366c1d514a3d8e03530e55c883b1afc4a

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!MI_CHECK_KERNEL_NOEXECUTE_FAULT+64
fffff800`e735383c cc              int     3

FAULT_INSTR_CODE:  c48348cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MI_CHECK_KERNEL_NOEXECUTE_FAULT+64

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5da52921

IMAGE_VERSION:  6.3.9600.19538

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  64

FAILURE_BUCKET_ID:  0xFC_nt!MI_CHECK_KERNEL_NOEXECUTE_FAULT

BUCKET_ID:  0xFC_nt!MI_CHECK_KERNEL_NOEXECUTE_FAULT

PRIMARY_PROBLEM_CLASS:  0xFC_nt!MI_CHECK_KERNEL_NOEXECUTE_FAULT

TARGET_TIME:  2019-12-23T15:34:06.000Z

OSBUILD:  9600

OSSERVICEPACK:  19538

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-10-15 05:04:17

BUILDDATESTAMP_STR:  191014-1700

BUILDLAB_STR:  winblue_ltsb_escrow

BUILDOSVER_STR:  6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

ANALYSIS_SESSION_ELAPSED_TIME:  84c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xfc_nt!mi_check_kernel_noexecute_fault

FAILURE_ID_HASH:  {1d0ea106-bc06-493d-fc9b-30e5321b79b0}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802b43636be, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff802b45ce308

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

SYSTEM_MANUFACTURER:  Unknow

SYSTEM_PRODUCT_NAME:  Unknow

SYSTEM_VERSION:  Unknow

BIOS_VENDOR:  Phoenix Technologies, LTD

BIOS_VERSION:  6.00 PG

BIOS_DATE:  01/02/2009

BASEBOARD_PRODUCT:  RS780-SB700

BASEBOARD_VERSION:  Unknow

DUMP_TYPE:  2

BUGCHECK_P1: 48

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff802b43636be

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802b45ce2a8
GetUlongPtrFromAddress: unable to read from fffff802b45ce530
 0000000000000048

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiIdentifyPfn+2de
fffff802`b43636be f00fba6d481f    lock bts dword ptr [rbp+48h],1Fh

CPU_COUNT: 3

CPU_MHZ: 889

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 2

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-27-2019 17:39:43.0143

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd0013ae0c4b0 -- (.trap 0xffffd0013ae0c4b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=e0019db851a00420 rbx=0000000000000000 rcx=e0019db851a00420
rdx=fffff802b427f000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802b43636be rsp=ffffd0013ae0c640 rbp=0000000000000000
 r8=000062c000062cf4  r9=022000000004c114 r10=f400921605420000
r11=e0019db851a00420 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiIdentifyPfn+0x2de:
fffff802`b43636be f00fba6d481f    lock bts dword ptr [rbp+48h],1Fh ss:0018:00000000`00000048=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802b43cf769 to fffff802b43bf4a0

STACK_TEXT: 
ffffd001`3ae0c368 fffff802`b43cf769 : 00000000`0000000a 00000000`00000048 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`3ae0c370 fffff802`b43ccca8 : 00000000`00000200 00000000`00000000 ffffe001`9dfd8800 fffff802`b431c7b1 : nt!KiBugCheckDispatch+0x69
ffffd001`3ae0c4b0 fffff802`b43636be : 0000007f`ffffffff fffffa80`014c7840 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x428
ffffd001`3ae0c640 fffff802`b42e851c : 00000000`00000004 ffffe001`9dfd88c0 00000000`00000000 ffffd001`3ae0c7c0 : nt!MiIdentifyPfn+0x2de
ffffd001`3ae0c6c0 fffff802`b466121b : ffffe001`9dfd83b0 ffffd001`3ae0ccc0 ffffe001`9dfd7000 00000000`00000000 : nt!MiIdentifyPfnWrapper+0x3c
ffffd001`3ae0c6f0 fffff802`b4654246 : ffffc000`4afc1060 00000000`00000001 ffffd001`3ae0c8d4 ffffe001`9dfd7000 : nt!PfpPfnPrioRequest+0xbb
ffffd001`3ae0c770 fffff802`b47153f6 : 00000025`f8d4a800 fffff802`b430ff65 00000000`00000000 00000000`0000004f : nt!PfQuerySuperfetchInformation+0x336
ffffd001`3ae0c8a0 fffff802`b46da711 : 00000025`f8d4a800 00000025`fab327e0 00000026`fa2467f8 00000000`00000001 : nt!ExpQuerySystemInformation+0x14f2
ffffd001`3ae0cc00 fffff802`b43cf3e3 : 00000000`00000001 ffffe001`9bcba800 00000000`00000001 ffffe001`9d487c50 : nt!NtQuerySystemInformation+0x49
ffffd001`3ae0cc40 00007ffa`dcb60aba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000025`f8d4a6f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`dcb60aba


THREAD_SHA1_HASH_MOD_FUNC:  adf7db7e95aa6dee42d5c13ecf7b19cbca76e51f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  58a101c729f9c46f2de078b8498bfbb3db169301

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt!MiIdentifyPfn+2de
fffff802`b43636be f00fba6d481f    lock bts dword ptr [rbp+48h],1Fh

FAULT_INSTR_CODE:  6dba0ff0

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiIdentifyPfn+2de

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5da52921

IMAGE_VERSION:  6.3.9600.19538

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  2de

FAILURE_BUCKET_ID:  AV_nt!MiIdentifyPfn

BUCKET_ID:  AV_nt!MiIdentifyPfn

PRIMARY_PROBLEM_CLASS:  AV_nt!MiIdentifyPfn

TARGET_TIME:  2019-12-26T18:09:14.000Z

OSBUILD:  9600

OSSERVICEPACK:  19538

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-10-15 05:04:17

BUILDDATESTAMP_STR:  191014-1700

BUILDLAB_STR:  winblue_ltsb_escrow

BUILDOSVER_STR:  6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

ANALYSIS_SESSION_ELAPSED_TIME:  85c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!miidentifypfn

FAILURE_ID_HASH:  {4f0b8d4b-7219-bc8c-33a3-7bfc14bc92e1}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802b43636be, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff802b45ce308

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

SYSTEM_MANUFACTURER:  Unknow

SYSTEM_PRODUCT_NAME:  Unknow

SYSTEM_VERSION:  Unknow

BIOS_VENDOR:  Phoenix Technologies, LTD

BIOS_VERSION:  6.00 PG

BIOS_DATE:  01/02/2009

BASEBOARD_PRODUCT:  RS780-SB700

BASEBOARD_VERSION:  Unknow

DUMP_TYPE:  2

BUGCHECK_P1: 48

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff802b43636be

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802b45ce2a8
GetUlongPtrFromAddress: unable to read from fffff802b45ce530
 0000000000000048

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiIdentifyPfn+2de
fffff802`b43636be f00fba6d481f    lock bts dword ptr [rbp+48h],1Fh

CPU_COUNT: 3

CPU_MHZ: 889

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 2

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-27-2019 17:39:43.0143

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd0013ae0c4b0 -- (.trap 0xffffd0013ae0c4b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=e0019db851a00420 rbx=0000000000000000 rcx=e0019db851a00420
rdx=fffff802b427f000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802b43636be rsp=ffffd0013ae0c640 rbp=0000000000000000
 r8=000062c000062cf4  r9=022000000004c114 r10=f400921605420000
r11=e0019db851a00420 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiIdentifyPfn+0x2de:
fffff802`b43636be f00fba6d481f    lock bts dword ptr [rbp+48h],1Fh ss:0018:00000000`00000048=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802b43cf769 to fffff802b43bf4a0

STACK_TEXT: 
ffffd001`3ae0c368 fffff802`b43cf769 : 00000000`0000000a 00000000`00000048 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`3ae0c370 fffff802`b43ccca8 : 00000000`00000200 00000000`00000000 ffffe001`9dfd8800 fffff802`b431c7b1 : nt!KiBugCheckDispatch+0x69
ffffd001`3ae0c4b0 fffff802`b43636be : 0000007f`ffffffff fffffa80`014c7840 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x428
ffffd001`3ae0c640 fffff802`b42e851c : 00000000`00000004 ffffe001`9dfd88c0 00000000`00000000 ffffd001`3ae0c7c0 : nt!MiIdentifyPfn+0x2de
ffffd001`3ae0c6c0 fffff802`b466121b : ffffe001`9dfd83b0 ffffd001`3ae0ccc0 ffffe001`9dfd7000 00000000`00000000 : nt!MiIdentifyPfnWrapper+0x3c
ffffd001`3ae0c6f0 fffff802`b4654246 : ffffc000`4afc1060 00000000`00000001 ffffd001`3ae0c8d4 ffffe001`9dfd7000 : nt!PfpPfnPrioRequest+0xbb
ffffd001`3ae0c770 fffff802`b47153f6 : 00000025`f8d4a800 fffff802`b430ff65 00000000`00000000 00000000`0000004f : nt!PfQuerySuperfetchInformation+0x336
ffffd001`3ae0c8a0 fffff802`b46da711 : 00000025`f8d4a800 00000025`fab327e0 00000026`fa2467f8 00000000`00000001 : nt!ExpQuerySystemInformation+0x14f2
ffffd001`3ae0cc00 fffff802`b43cf3e3 : 00000000`00000001 ffffe001`9bcba800 00000000`00000001 ffffe001`9d487c50 : nt!NtQuerySystemInformation+0x49
ffffd001`3ae0cc40 00007ffa`dcb60aba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000025`f8d4a6f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`dcb60aba


THREAD_SHA1_HASH_MOD_FUNC:  adf7db7e95aa6dee42d5c13ecf7b19cbca76e51f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  58a101c729f9c46f2de078b8498bfbb3db169301

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt!MiIdentifyPfn+2de
fffff802`b43636be f00fba6d481f    lock bts dword ptr [rbp+48h],1Fh

FAULT_INSTR_CODE:  6dba0ff0

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiIdentifyPfn+2de

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5da52921

IMAGE_VERSION:  6.3.9600.19538

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  2de

FAILURE_BUCKET_ID:  AV_nt!MiIdentifyPfn

BUCKET_ID:  AV_nt!MiIdentifyPfn

PRIMARY_PROBLEM_CLASS:  AV_nt!MiIdentifyPfn

TARGET_TIME:  2019-12-26T18:09:14.000Z

OSBUILD:  9600

OSSERVICEPACK:  19538

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-10-15 05:04:17

BUILDDATESTAMP_STR:  191014-1700

BUILDLAB_STR:  winblue_ltsb_escrow

BUILDOSVER_STR:  6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

ANALYSIS_SESSION_ELAPSED_TIME:  85c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!miidentifypfn

FAILURE_ID_HASH:  {4f0b8d4b-7219-bc8c-33a3-7bfc14bc92e1}

Followup:     MachineOwner
---------
 
Sistem özelliklerim:
  • 5 GB Ram
  • Amd Phenom e8250 Triple Core (Overclock'lu)
  • GT 630 2 GB
  • 500 GB Harddisk
Bellek hataları, Memtest86 testi yap, fakat hatalar yanlış yaptığın Overclock nedenli olabilir.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, An illegal page fault occurred while holding working set synchronization.
    Parameter 2 contains the referenced virtual address.
Arg2: 0000000000000038
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

DUMP_TYPE:  2

BUGCHECK_P1: 41287

BUGCHECK_P2: 38

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BUGCHECK_STR:  0x1a_41287

CPU_COUNT: 3

CPU_MHZ: 889

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 2

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-27-2019 17:39:05.0612

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff801d2ec9741 to fffff801d2fbe4a0

STACK_TEXT:
ffffd000`8dde3568 fffff801`d2ec9741 : 00000000`0000001a 00000000`00041287 00000000`00000038 00000000`00000000 : 0xfffff801`d2fbe4a0
ffffd000`8dde3570 00000000`0000001a : 00000000`00041287 00000000`00000038 00000000`00000000 00000000`00000000 : 0xfffff801`d2ec9741
ffffd000`8dde3578 00000000`00041287 : 00000000`00000038 00000000`00000000 00000000`00000000 00000000`00000000 : <Unloaded_Unknown_Module_00000000`00000000>+0x1a
ffffd000`8dde3580 00000000`00000038 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : <Unloaded_Unknown_Module_00000000`00000000>+0x41287
ffffd000`8dde3588 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : <Unloaded_Unknown_Module_00000000`00000000>+0x38


THREAD_SHA1_HASH_MOD_FUNC:  b86dbb757dabe82126ba7138972e406d419db178

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  12e18a3f62eb753019db02557378693940d8e0be

THREAD_SHA1_HASH_MOD:  71fd9ea671e1593e8490c3c756cd8cbe8a3e28b3

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  CORRUPT_MODULELIST_0x1a_41287

DEFAULT_BUCKET_ID:  CORRUPT_MODULELIST_0x1a_41287

PRIMARY_PROBLEM_CLASS:  CORRUPT_MODULELIST_0x1a_41287

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_0x1a_41287

TARGET_TIME:  2019-12-26T17:28:01.000Z

OSBUILD:  9600

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  191014-1700

BUILDLAB_STR:  winblue_ltsb_escrow

BUILDOSVER_STR:  6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

ANALYSIS_SESSION_ELAPSED_TIME:  1e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:corrupt_modulelist_0x1a_41287

FAILURE_ID_HASH:  {fbb1dd26-a286-560b-f852-874d061cdd41}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffe00111c9a1d0, Virtual address for the attempted execute.
Arg2: 80000000102b2b63, PTE contents.
Arg3: ffffd00108e467a0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800e75cc308

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

SYSTEM_MANUFACTURER:  Unknow

SYSTEM_PRODUCT_NAME:  Unknow

SYSTEM_VERSION:  Unknow

BIOS_VENDOR:  Phoenix Technologies, LTD

BIOS_VERSION:  6.00 PG

BIOS_DATE:  01/02/2009

BASEBOARD_PRODUCT:  RS780-SB700

BASEBOARD_VERSION:  Unknow

DUMP_TYPE:  2

BUGCHECK_P1: ffffe00111c9a1d0

BUGCHECK_P2: 80000000102b2b63

BUGCHECK_P3: ffffd00108e467a0

BUGCHECK_P4: 2

CPU_COUNT: 3

CPU_MHZ: 889

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 2

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xFC

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-27-2019 17:39:45.0362

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd00108e467a0 -- (.trap 0xffffd00108e467a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe00113b74a80
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=ffffe00111c9a1d0 rsp=ffffd00108e46930 rbp=ffffd00108e46a00
r8=ffffd000fba40180  r9=0000000000000000 r10=ffffe00112758540
r11=ffffe00114368880 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
ffffe001`11c9a1d0 0100            add     dword ptr [rax],eax ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800e735383c to fffff800e73bd4a0

STACK_TEXT:
ffffd001`08e465c8 fffff800`e735383c : 00000000`000000fc ffffe001`11c9a1d0 80000000`102b2b63 ffffd001`08e467a0 : nt!KeBugCheckEx
ffffd001`08e465d0 fffff800`e74622c5 : 00000000`00000008 ffffd001`08e467a0 fffff800`e75c4ec0 ffffe001`143689c0 : nt!MI_CHECK_KERNEL_NOEXECUTE_FAULT+0x64
ffffd001`08e46610 fffff800`e72c7fb9 : 00000000`00000008 ffffe001`11c9a1d0 ffffd001`08e467a0 ffffe001`11c9a1d0 : nt!MiSystemFault+0xa25
ffffd001`08e466a0 fffff800`e73cab9d : ffffd001`08e46b38 00001f80`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x219
ffffd001`08e467a0 ffffe001`11c9a1d0 : 00000000`00000000 00000000`00000001 ffffd001`08e46960 00000000`00000000 : nt!KiPageFault+0x31d
ffffd001`08e46930 00000000`00000000 : 00000000`00000001 ffffd001`08e46960 00000000`00000000 00000000`00000001 : 0xffffe001`11c9a1d0


THREAD_SHA1_HASH_MOD_FUNC:  43cccc182f2b16152cfaf8789d66ba6ba7d419ba

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  de1dce5366c1d514a3d8e03530e55c883b1afc4a

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!MI_CHECK_KERNEL_NOEXECUTE_FAULT+64
fffff800`e735383c cc              int     3

FAULT_INSTR_CODE:  c48348cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MI_CHECK_KERNEL_NOEXECUTE_FAULT+64

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5da52921

IMAGE_VERSION:  6.3.9600.19538

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  64

FAILURE_BUCKET_ID:  0xFC_nt!MI_CHECK_KERNEL_NOEXECUTE_FAULT

BUCKET_ID:  0xFC_nt!MI_CHECK_KERNEL_NOEXECUTE_FAULT

PRIMARY_PROBLEM_CLASS:  0xFC_nt!MI_CHECK_KERNEL_NOEXECUTE_FAULT

TARGET_TIME:  2019-12-23T15:34:06.000Z

OSBUILD:  9600

OSSERVICEPACK:  19538

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-10-15 05:04:17

BUILDDATESTAMP_STR:  191014-1700

BUILDLAB_STR:  winblue_ltsb_escrow

BUILDOSVER_STR:  6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

ANALYSIS_SESSION_ELAPSED_TIME:  84c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xfc_nt!mi_check_kernel_noexecute_fault

FAILURE_ID_HASH:  {1d0ea106-bc06-493d-fc9b-30e5321b79b0}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802b43636be, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff802b45ce308

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

SYSTEM_MANUFACTURER:  Unknow

SYSTEM_PRODUCT_NAME:  Unknow

SYSTEM_VERSION:  Unknow

BIOS_VENDOR:  Phoenix Technologies, LTD

BIOS_VERSION:  6.00 PG

BIOS_DATE:  01/02/2009

BASEBOARD_PRODUCT:  RS780-SB700

BASEBOARD_VERSION:  Unknow

DUMP_TYPE:  2

BUGCHECK_P1: 48

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff802b43636be

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802b45ce2a8
GetUlongPtrFromAddress: unable to read from fffff802b45ce530
0000000000000048

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiIdentifyPfn+2de
fffff802`b43636be f00fba6d481f    lock bts dword ptr [rbp+48h],1Fh

CPU_COUNT: 3

CPU_MHZ: 889

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 2

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-27-2019 17:39:43.0143

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd0013ae0c4b0 -- (.trap 0xffffd0013ae0c4b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=e0019db851a00420 rbx=0000000000000000 rcx=e0019db851a00420
rdx=fffff802b427f000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802b43636be rsp=ffffd0013ae0c640 rbp=0000000000000000
r8=000062c000062cf4  r9=022000000004c114 r10=f400921605420000
r11=e0019db851a00420 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiIdentifyPfn+0x2de:
fffff802`b43636be f00fba6d481f    lock bts dword ptr [rbp+48h],1Fh ss:0018:00000000`00000048=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802b43cf769 to fffff802b43bf4a0

STACK_TEXT:
ffffd001`3ae0c368 fffff802`b43cf769 : 00000000`0000000a 00000000`00000048 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`3ae0c370 fffff802`b43ccca8 : 00000000`00000200 00000000`00000000 ffffe001`9dfd8800 fffff802`b431c7b1 : nt!KiBugCheckDispatch+0x69
ffffd001`3ae0c4b0 fffff802`b43636be : 0000007f`ffffffff fffffa80`014c7840 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x428
ffffd001`3ae0c640 fffff802`b42e851c : 00000000`00000004 ffffe001`9dfd88c0 00000000`00000000 ffffd001`3ae0c7c0 : nt!MiIdentifyPfn+0x2de
ffffd001`3ae0c6c0 fffff802`b466121b : ffffe001`9dfd83b0 ffffd001`3ae0ccc0 ffffe001`9dfd7000 00000000`00000000 : nt!MiIdentifyPfnWrapper+0x3c
ffffd001`3ae0c6f0 fffff802`b4654246 : ffffc000`4afc1060 00000000`00000001 ffffd001`3ae0c8d4 ffffe001`9dfd7000 : nt!PfpPfnPrioRequest+0xbb
ffffd001`3ae0c770 fffff802`b47153f6 : 00000025`f8d4a800 fffff802`b430ff65 00000000`00000000 00000000`0000004f : nt!PfQuerySuperfetchInformation+0x336
ffffd001`3ae0c8a0 fffff802`b46da711 : 00000025`f8d4a800 00000025`fab327e0 00000026`fa2467f8 00000000`00000001 : nt!ExpQuerySystemInformation+0x14f2
ffffd001`3ae0cc00 fffff802`b43cf3e3 : 00000000`00000001 ffffe001`9bcba800 00000000`00000001 ffffe001`9d487c50 : nt!NtQuerySystemInformation+0x49
ffffd001`3ae0cc40 00007ffa`dcb60aba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000025`f8d4a6f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`dcb60aba


THREAD_SHA1_HASH_MOD_FUNC:  adf7db7e95aa6dee42d5c13ecf7b19cbca76e51f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  58a101c729f9c46f2de078b8498bfbb3db169301

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt!MiIdentifyPfn+2de
fffff802`b43636be f00fba6d481f    lock bts dword ptr [rbp+48h],1Fh

FAULT_INSTR_CODE:  6dba0ff0

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiIdentifyPfn+2de

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5da52921

IMAGE_VERSION:  6.3.9600.19538

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  2de

FAILURE_BUCKET_ID:  AV_nt!MiIdentifyPfn

BUCKET_ID:  AV_nt!MiIdentifyPfn

PRIMARY_PROBLEM_CLASS:  AV_nt!MiIdentifyPfn

TARGET_TIME:  2019-12-26T18:09:14.000Z

OSBUILD:  9600

OSSERVICEPACK:  19538

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-10-15 05:04:17

BUILDDATESTAMP_STR:  191014-1700

BUILDLAB_STR:  winblue_ltsb_escrow

BUILDOSVER_STR:  6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

ANALYSIS_SESSION_ELAPSED_TIME:  85c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!miidentifypfn

FAILURE_ID_HASH:  {4f0b8d4b-7219-bc8c-33a3-7bfc14bc92e1}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802b43636be, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff802b45ce308

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

SYSTEM_MANUFACTURER:  Unknow

SYSTEM_PRODUCT_NAME:  Unknow

SYSTEM_VERSION:  Unknow

BIOS_VENDOR:  Phoenix Technologies, LTD

BIOS_VERSION:  6.00 PG

BIOS_DATE:  01/02/2009

BASEBOARD_PRODUCT:  RS780-SB700

BASEBOARD_VERSION:  Unknow

DUMP_TYPE:  2

BUGCHECK_P1: 48

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff802b43636be

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802b45ce2a8
GetUlongPtrFromAddress: unable to read from fffff802b45ce530
0000000000000048

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiIdentifyPfn+2de
fffff802`b43636be f00fba6d481f    lock bts dword ptr [rbp+48h],1Fh

CPU_COUNT: 3

CPU_MHZ: 889

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 2

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-27-2019 17:39:43.0143

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd0013ae0c4b0 -- (.trap 0xffffd0013ae0c4b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=e0019db851a00420 rbx=0000000000000000 rcx=e0019db851a00420
rdx=fffff802b427f000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802b43636be rsp=ffffd0013ae0c640 rbp=0000000000000000
r8=000062c000062cf4  r9=022000000004c114 r10=f400921605420000
r11=e0019db851a00420 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiIdentifyPfn+0x2de:
fffff802`b43636be f00fba6d481f    lock bts dword ptr [rbp+48h],1Fh ss:0018:00000000`00000048=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802b43cf769 to fffff802b43bf4a0

STACK_TEXT:
ffffd001`3ae0c368 fffff802`b43cf769 : 00000000`0000000a 00000000`00000048 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`3ae0c370 fffff802`b43ccca8 : 00000000`00000200 00000000`00000000 ffffe001`9dfd8800 fffff802`b431c7b1 : nt!KiBugCheckDispatch+0x69
ffffd001`3ae0c4b0 fffff802`b43636be : 0000007f`ffffffff fffffa80`014c7840 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x428
ffffd001`3ae0c640 fffff802`b42e851c : 00000000`00000004 ffffe001`9dfd88c0 00000000`00000000 ffffd001`3ae0c7c0 : nt!MiIdentifyPfn+0x2de
ffffd001`3ae0c6c0 fffff802`b466121b : ffffe001`9dfd83b0 ffffd001`3ae0ccc0 ffffe001`9dfd7000 00000000`00000000 : nt!MiIdentifyPfnWrapper+0x3c
ffffd001`3ae0c6f0 fffff802`b4654246 : ffffc000`4afc1060 00000000`00000001 ffffd001`3ae0c8d4 ffffe001`9dfd7000 : nt!PfpPfnPrioRequest+0xbb
ffffd001`3ae0c770 fffff802`b47153f6 : 00000025`f8d4a800 fffff802`b430ff65 00000000`00000000 00000000`0000004f : nt!PfQuerySuperfetchInformation+0x336
ffffd001`3ae0c8a0 fffff802`b46da711 : 00000025`f8d4a800 00000025`fab327e0 00000026`fa2467f8 00000000`00000001 : nt!ExpQuerySystemInformation+0x14f2
ffffd001`3ae0cc00 fffff802`b43cf3e3 : 00000000`00000001 ffffe001`9bcba800 00000000`00000001 ffffe001`9d487c50 : nt!NtQuerySystemInformation+0x49
ffffd001`3ae0cc40 00007ffa`dcb60aba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000025`f8d4a6f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`dcb60aba


THREAD_SHA1_HASH_MOD_FUNC:  adf7db7e95aa6dee42d5c13ecf7b19cbca76e51f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  58a101c729f9c46f2de078b8498bfbb3db169301

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt!MiIdentifyPfn+2de
fffff802`b43636be f00fba6d481f    lock bts dword ptr [rbp+48h],1Fh

FAULT_INSTR_CODE:  6dba0ff0

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiIdentifyPfn+2de

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5da52921

IMAGE_VERSION:  6.3.9600.19538

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  2de

FAILURE_BUCKET_ID:  AV_nt!MiIdentifyPfn

BUCKET_ID:  AV_nt!MiIdentifyPfn

PRIMARY_PROBLEM_CLASS:  AV_nt!MiIdentifyPfn

TARGET_TIME:  2019-12-26T18:09:14.000Z

OSBUILD:  9600

OSSERVICEPACK:  19538

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-10-15 05:04:17

BUILDDATESTAMP_STR:  191014-1700

BUILDLAB_STR:  winblue_ltsb_escrow

BUILDOSVER_STR:  6.3.9600.19538.amd64fre.winblue_ltsb_escrow.191014-1700

ANALYSIS_SESSION_ELAPSED_TIME:  85c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!miidentifypfn

FAILURE_ID_HASH:  {4f0b8d4b-7219-bc8c-33a3-7bfc14bc92e1}

Followup:     MachineOwner
---------


Overclock işlemcime yaptım, fakat ondan kaynaklı olabilir çünkü Overclock yaparken voltajları ayarladım fakat RAM'leri orjinal MHz'lerinden aşağıya çektim. Çünkü diğer türlü yaptığımda f10 yapıp kaydedip çıktığımda sistem açılmıyordu. Bu oyundaki takılma sebebide bundan kaynaklımıdır, dediğim gibi arkada müzik çalmaya devam ediyordu oyunda kafam karıştı. @MayCrasH
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Yeni konular

Geri
Yukarı