Çözüldü BIOS güncelledikten sonra mavi ekran sorunu

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

csmemo

Hectopat
Katılım
3 Mayıs 2018
Mesajlar
5
Merhaba arkadaşlar,
Sistemim gayet güzel çalışıyordu. BIOS'u ayarlarından BIOS'u internet üzerinden güncelledikten sonra olsa gerek tam emin değilim mavi ekran şeklinde "PAGE_FAULT_IN_NONPAGED_AREA" hata alıyorum. Bu hatayı ara sıra alıyorum.


Minidump klasörünü yukarıdaki linkte paylaştım. Yardımlarınızı bekliyorum.

Sistemim;
ASUS ROG STRIX GTX 1660 Ti.
G.Skill 2x8 3000 MHz RAM.
ASUS Prime B450M-K 4400MHz (OC)
Ryzen 5 2600.
 
Son düzenleyen: Moderatör:
Çözüm
Bellek testi yapar mısın?


AIDA64 kullanıyorsan, geçici bir süreliğine kaldırır mısın?

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa98000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 11

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa98000000000

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff803095733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8030942a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8030942a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffa98000000000

MM_INTERNAL_CODE:  6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc08f081027f0 -- (.trap 0xffffc08f081027f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa98000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803090c46d0 rsp=ffffc08f08102988 rbp=0000000000000004
 r8=ffffa98000000000  r9=ffffa9d4ea600000 r10=0000000000000002
r11=ffffa9d4ea7537f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff803`090c46d0 488b01          mov     rax,qword ptr [rcx] ds:ffffa980`00000000=????????????????
Resetting default scope

STACK_TEXT: 
ffffc08f`08102448 fffff803`0925860a : 00000000`00000050 ffffa980`00000000 00000000`00000000 ffffa9d4`ea600000 : nt!KeBugCheckEx
ffffc08f`08102450 fffff803`090c9c7c : ffffa9ff`ffffffff 00000000`00000001 ffffa980`00000000 ffffac82`62c222d0 : nt!MiInPagePageTable+0x1603fa
ffffc08f`081025a0 fffff803`090c8fae : 00000000`00000000 00000000`00000000 00000000`00000001 ffffa980`00000000 : nt!MiUserFault+0x7dc
ffffc08f`08102650 fffff803`091d041e : ffffda80`e7a79180 00000000`000000cc 00000000`00000000 ffff9780`03f960c0 : nt!MmAccessFault+0x14e
ffffc08f`081027f0 fffff803`090c46d0 : fffff803`090199b4 ffff9780`03f961c0 fffff803`0911507d ffffda80`e7bc3180 : nt!KiPageFault+0x35e
ffffc08f`08102988 fffff803`090199b4 : ffff9780`03f961c0 fffff803`0911507d ffffda80`e7bc3180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
ffffc08f`08102990 fffff803`090198c2 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff803`0958f240 : nt!MiMappingHasIoTracker+0x44
ffffc08f`081029c0 fffff803`4fb9b981 : ffffac82`4a0e2300 ffff9780`03f96200 fffff803`4fb9f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc08f`08102af0 ffffac82`4a0e2300 : ffff9780`03f96200 fffff803`4fb9f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc08f`08102af8 ffff9780`03f96200 : fffff803`4fb9f1c8 00000000`00000004 00000000`00320030 fffff803`4fb9c160 : 0xffffac82`4a0e2300
ffffc08f`08102b00 fffff803`4fb9f1c8 : 00000000`00000004 00000000`00320030 fffff803`4fb9c160 ffffc08f`08511750 : 0xffff9780`03f96200
ffffc08f`08102b08 00000000`00000004 : 00000000`00320030 fffff803`4fb9c160 ffffc08f`08511750 fffff803`097beecd : kerneld+0xf1c8
ffffc08f`08102b10 00000000`00320030 : fffff803`4fb9c160 ffffc08f`08511750 fffff803`097beecd ffff9780`03f960c0 : 0x4
ffffc08f`08102b18 fffff803`4fb9c160 : ffffc08f`08511750 fffff803`097beecd ffff9780`03f960c0 fffff803`096f7e90 : 0x320030
ffffc08f`08102b20 ffffc08f`08511750 : fffff803`097beecd ffff9780`03f960c0 fffff803`096f7e90 00000000`00000000 : kerneld+0xc160
ffffc08f`08102b28 fffff803`097beecd : ffff9780`03f960c0 fffff803`096f7e90 00000000`00000000 ffff9780`060f8c98 : 0xffffc08f`08511750
ffffc08f`08102b30 fffff803`090f43b5 : ffff9780`015359a0 ffff9780`03f96000 ffff9780`03f960c0 ffff9780`015359a0 : nt!IopLoadUnloadDriver+0xc703d
ffffc08f`08102b70 fffff803`0906bcd5 : ffff9780`03f960c0 00000000`00000080 ffff9780`01477080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffc08f`08102c10 fffff803`091c9998 : fffff803`07284180 ffff9780`03f960c0 fffff803`0906bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc08f`08102c60 00000000`00000000 : ffffc08f`08103000 ffffc08f`080fd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  kerneld+b981

MODULE_NAME: kerneld

IMAGE_NAME:  kerneld.x64

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b981

FAILURE_BUCKET_ID:  AV_R_INVALID_kerneld!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffed8000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 12

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffed8000000000

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff80318f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80318e2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80318e2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffed8000000000

MM_INTERNAL_CODE:  6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc48a038927f0 -- (.trap 0xffffc48a038927f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffed8000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80318ac46d0 rsp=ffffc48a03892988 rbp=0000000000000004
 r8=ffffed8000000000  r9=ffffedf6fb600000 r10=0000000000000002
r11=ffffedf6fb7db7f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff803`18ac46d0 488b01          mov     rax,qword ptr [rcx] ds:ffffed80`00000000=????????????????
Resetting default scope

STACK_TEXT: 
ffffc48a`03892448 fffff803`18c5860a : 00000000`00000050 ffffed80`00000000 00000000`00000000 ffffedf6`fb600000 : nt!KeBugCheckEx
ffffc48a`03892450 fffff803`18ac9c7c : ffffedff`ffffffff ffff910b`19031540 ffffed80`00000000 fffff803`18b21593 : nt!MiInPagePageTable+0x1603fa
ffffc48a`038925a0 fffff803`18ac8fae : ffff910b`16826be0 00000000`00000000 00000000`00000001 ffffed80`00000000 : nt!MiUserFault+0x7dc
ffffc48a`03892650 fffff803`18bd041e : ffffc980`56279180 00000000`00000220 00000000`00000300 ffff910b`12973040 : nt!MmAccessFault+0x14e
ffffc48a`038927f0 fffff803`18ac46d0 : fffff803`18a199b4 ffff910b`12973140 fffff803`18b1507d ffffc980`56279180 : nt!KiPageFault+0x35e
ffffc48a`03892988 fffff803`18a199b4 : ffff910b`12973140 fffff803`18b1507d ffffc980`56279180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
ffffc48a`03892990 fffff803`18a198c2 : 00000000`00000001 00000000`00000000 ffff910b`177a0010 fffff803`18f8f240 : nt!MiMappingHasIoTracker+0x44
ffffc48a`038929c0 fffff803`5d36b981 : ffff910b`177a0000 ffff910b`12973180 fffff803`5d36f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc48a`03892af0 ffff910b`177a0000 : ffff910b`12973180 fffff803`5d36f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc48a`03892af8 ffff910b`12973180 : fffff803`5d36f1c8 00000000`00000004 00000000`00320030 fffff803`5d36c160 : 0xffff910b`177a0000
ffffc48a`03892b00 fffff803`5d36f1c8 : 00000000`00000004 00000000`00320030 fffff803`5d36c160 ffffc48a`02364750 : 0xffff910b`12973180
ffffc48a`03892b08 00000000`00000004 : 00000000`00320030 fffff803`5d36c160 ffffc48a`02364750 fffff803`191beecd : kerneld+0xf1c8
ffffc48a`03892b10 00000000`00320030 : fffff803`5d36c160 ffffc48a`02364750 fffff803`191beecd ffff910b`12973040 : 0x4
ffffc48a`03892b18 fffff803`5d36c160 : ffffc48a`02364750 fffff803`191beecd ffff910b`12973040 fffff803`190f7e90 : 0x320030
ffffc48a`03892b20 ffffc48a`02364750 : fffff803`191beecd ffff910b`12973040 fffff803`190f7e90 00000000`00000300 : kerneld+0xc160
ffffc48a`03892b28 fffff803`191beecd : ffff910b`12973040 fffff803`190f7e90 00000000`00000300 fffff803`18e38bc0 : 0xffffc48a`02364750
ffffc48a`03892b30 fffff803`18af43b5 : ffff910b`09477ce0 ffff910b`09477c00 ffff910b`12973040 ffff910b`16bd86b8 : nt!IopLoadUnloadDriver+0xc703d
ffffc48a`03892b70 fffff803`18a6bcd5 : ffff910b`12973040 00000000`00000080 ffff910b`09479040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffc48a`03892c10 fffff803`18bc9998 : ffffc980`5631d180 ffff910b`12973040 fffff803`18a6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc48a`03892c60 00000000`00000000 : ffffc48a`03893000 ffffc48a`0388d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  kerneld+b981

MODULE_NAME: kerneld

IMAGE_NAME:  kerneld.x64

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b981

FAILURE_BUCKET_ID:  AV_R_INVALID_kerneld!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffc8000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 45

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.CorruptModuleList
    Value: 1


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffffc8000000000

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
 fffffc8000000000

MM_INTERNAL_CODE:  6

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
fffff38a`ce917448 fffff801`1ac5860a : 00000000`00000050 fffffc80`00000000 00000000`00000000 fffffcfe`7f200000 : 0xfffff801`1abc2390
fffff38a`ce917450 00000000`00000050 : fffffc80`00000000 00000000`00000000 fffffcfe`7f200000 00000000`00000006 : 0xfffff801`1ac5860a
fffff38a`ce917458 fffffc80`00000000 : 00000000`00000000 fffffcfe`7f200000 00000000`00000006 ffffe284`83ddb600 : <Unloaded_Unknown_Module_00000000`00000000>+0x50
fffff38a`ce917460 00000000`00000000 : fffffcfe`7f200000 00000000`00000006 ffffe284`83ddb600 00000000`00000001 : 0xfffffc80`00000000


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_AV

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fc259191-ef0c-6215-476f-d32e5dcaf1b7}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe08000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 12

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffe08000000000

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff802653733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026522a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8026522a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffe08000000000

MM_INTERNAL_CODE:  6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc90e07fe77f0 -- (.trap 0xffffc90e07fe77f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe08000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80264ec46d0 rsp=ffffc90e07fe7988 rbp=0000000000000004
 r8=ffffe08000000000  r9=ffffe0f078200000 r10=0000000000000002
r11=ffffe0f0783c17f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff802`64ec46d0 488b01          mov     rax,qword ptr [rcx] ds:ffffe080`00000000=????????????????
Resetting default scope

STACK_TEXT: 
ffffc90e`07fe7448 fffff802`6505860a : 00000000`00000050 ffffe080`00000000 00000000`00000000 ffffe0f0`78200000 : nt!KeBugCheckEx
ffffc90e`07fe7450 fffff802`64ec9c7c : ffffe0ff`ffffffff 00000000`00000000 ffffe080`00000000 ffffa189`9f164010 : nt!MiInPagePageTable+0x1603fa
ffffc90e`07fe75a0 fffff802`64ec8fae : 00000000`00000000 00000000`00000000 00000000`00000001 ffffe080`00000000 : nt!MiUserFault+0x7dc
ffffc90e`07fe7650 fffff802`64fd041e : ffffcb01`026b2180 00000000`000000aa 00000000`00000a00 ffffa189`9c8f7300 : nt!MmAccessFault+0x14e
ffffc90e`07fe77f0 fffff802`64ec46d0 : fffff802`64e199b4 ffffa189`9c8f7400 fffff802`64f1507d ffffcb01`026b2180 : nt!KiPageFault+0x35e
ffffc90e`07fe7988 fffff802`64e199b4 : ffffa189`9c8f7400 fffff802`64f1507d ffffcb01`026b2180 00000000`ffffff00 : nt!MI_READ_PTE_LOCK_FREE
ffffc90e`07fe7990 fffff802`64e198c2 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff802`6538f240 : nt!MiMappingHasIoTracker+0x44
ffffc90e`07fe79c0 fffff802`b1a4b981 : ffffa189`9f7d4e00 ffffa189`9c8f7440 fffff802`b1a4f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc90e`07fe7af0 ffffa189`9f7d4e00 : ffffa189`9c8f7440 fffff802`b1a4f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc90e`07fe7af8 ffffa189`9c8f7440 : fffff802`b1a4f1c8 00000000`00000004 00000000`00320030 fffff802`b1a4c160 : 0xffffa189`9f7d4e00
ffffc90e`07fe7b00 fffff802`b1a4f1c8 : 00000000`00000004 00000000`00320030 fffff802`b1a4c160 ffffc90e`05499750 : 0xffffa189`9c8f7440
ffffc90e`07fe7b08 00000000`00000004 : 00000000`00320030 fffff802`b1a4c160 ffffc90e`05499750 fffff802`655beecd : kerneld+0xf1c8
ffffc90e`07fe7b10 00000000`00320030 : fffff802`b1a4c160 ffffc90e`05499750 fffff802`655beecd ffffa189`9c8f7300 : 0x4
ffffc90e`07fe7b18 fffff802`b1a4c160 : ffffc90e`05499750 fffff802`655beecd ffffa189`9c8f7300 fffff802`654f7e90 : 0x320030
ffffc90e`07fe7b20 ffffc90e`05499750 : fffff802`655beecd ffffa189`9c8f7300 fffff802`654f7e90 00000000`00000a00 : kerneld+0xc160
ffffc90e`07fe7b28 fffff802`655beecd : ffffa189`9c8f7300 fffff802`654f7e90 00000000`00000a00 ffffa189`9f7d4e90 : 0xffffc90e`05499750
ffffc90e`07fe7b30 fffff802`64ef43b5 : ffffa189`8f877ce0 ffffa189`8f877c00 ffffa189`9c8f7300 00000000`00000002 : nt!IopLoadUnloadDriver+0xc703d
ffffc90e`07fe7b70 fffff802`64e6bcd5 : ffffa189`9c8f7300 00000000`00000080 ffffa189`8f879040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffc90e`07fe7c10 fffff802`64fc9998 : fffff802`63454180 ffffa189`9c8f7300 fffff802`64e6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc90e`07fe7c60 00000000`00000000 : ffffc90e`07fe8000 ffffc90e`07fe2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  kerneld+b981

MODULE_NAME: kerneld

IMAGE_NAME:  kerneld.x64

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b981

FAILURE_BUCKET_ID:  AV_R_INVALID_kerneld!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}

Followup:     MachineOwner
---------
Bellek testi yapar mısın?


AIDA64 kullanıyorsan, geçici bir süreliğine kaldırır mısın?

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa98000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 11

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa98000000000

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff803095733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8030942a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8030942a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffa98000000000

MM_INTERNAL_CODE:  6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc08f081027f0 -- (.trap 0xffffc08f081027f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa98000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803090c46d0 rsp=ffffc08f08102988 rbp=0000000000000004
 r8=ffffa98000000000  r9=ffffa9d4ea600000 r10=0000000000000002
r11=ffffa9d4ea7537f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff803`090c46d0 488b01          mov     rax,qword ptr [rcx] ds:ffffa980`00000000=????????????????
Resetting default scope

STACK_TEXT: 
ffffc08f`08102448 fffff803`0925860a : 00000000`00000050 ffffa980`00000000 00000000`00000000 ffffa9d4`ea600000 : nt!KeBugCheckEx
ffffc08f`08102450 fffff803`090c9c7c : ffffa9ff`ffffffff 00000000`00000001 ffffa980`00000000 ffffac82`62c222d0 : nt!MiInPagePageTable+0x1603fa
ffffc08f`081025a0 fffff803`090c8fae : 00000000`00000000 00000000`00000000 00000000`00000001 ffffa980`00000000 : nt!MiUserFault+0x7dc
ffffc08f`08102650 fffff803`091d041e : ffffda80`e7a79180 00000000`000000cc 00000000`00000000 ffff9780`03f960c0 : nt!MmAccessFault+0x14e
ffffc08f`081027f0 fffff803`090c46d0 : fffff803`090199b4 ffff9780`03f961c0 fffff803`0911507d ffffda80`e7bc3180 : nt!KiPageFault+0x35e
ffffc08f`08102988 fffff803`090199b4 : ffff9780`03f961c0 fffff803`0911507d ffffda80`e7bc3180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
ffffc08f`08102990 fffff803`090198c2 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff803`0958f240 : nt!MiMappingHasIoTracker+0x44
ffffc08f`081029c0 fffff803`4fb9b981 : ffffac82`4a0e2300 ffff9780`03f96200 fffff803`4fb9f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc08f`08102af0 ffffac82`4a0e2300 : ffff9780`03f96200 fffff803`4fb9f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc08f`08102af8 ffff9780`03f96200 : fffff803`4fb9f1c8 00000000`00000004 00000000`00320030 fffff803`4fb9c160 : 0xffffac82`4a0e2300
ffffc08f`08102b00 fffff803`4fb9f1c8 : 00000000`00000004 00000000`00320030 fffff803`4fb9c160 ffffc08f`08511750 : 0xffff9780`03f96200
ffffc08f`08102b08 00000000`00000004 : 00000000`00320030 fffff803`4fb9c160 ffffc08f`08511750 fffff803`097beecd : kerneld+0xf1c8
ffffc08f`08102b10 00000000`00320030 : fffff803`4fb9c160 ffffc08f`08511750 fffff803`097beecd ffff9780`03f960c0 : 0x4
ffffc08f`08102b18 fffff803`4fb9c160 : ffffc08f`08511750 fffff803`097beecd ffff9780`03f960c0 fffff803`096f7e90 : 0x320030
ffffc08f`08102b20 ffffc08f`08511750 : fffff803`097beecd ffff9780`03f960c0 fffff803`096f7e90 00000000`00000000 : kerneld+0xc160
ffffc08f`08102b28 fffff803`097beecd : ffff9780`03f960c0 fffff803`096f7e90 00000000`00000000 ffff9780`060f8c98 : 0xffffc08f`08511750
ffffc08f`08102b30 fffff803`090f43b5 : ffff9780`015359a0 ffff9780`03f96000 ffff9780`03f960c0 ffff9780`015359a0 : nt!IopLoadUnloadDriver+0xc703d
ffffc08f`08102b70 fffff803`0906bcd5 : ffff9780`03f960c0 00000000`00000080 ffff9780`01477080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffc08f`08102c10 fffff803`091c9998 : fffff803`07284180 ffff9780`03f960c0 fffff803`0906bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc08f`08102c60 00000000`00000000 : ffffc08f`08103000 ffffc08f`080fd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  kerneld+b981

MODULE_NAME: kerneld

IMAGE_NAME:  kerneld.x64

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b981

FAILURE_BUCKET_ID:  AV_R_INVALID_kerneld!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffed8000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 12

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffed8000000000

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff80318f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80318e2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80318e2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffed8000000000

MM_INTERNAL_CODE:  6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc48a038927f0 -- (.trap 0xffffc48a038927f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffed8000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80318ac46d0 rsp=ffffc48a03892988 rbp=0000000000000004
 r8=ffffed8000000000  r9=ffffedf6fb600000 r10=0000000000000002
r11=ffffedf6fb7db7f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff803`18ac46d0 488b01          mov     rax,qword ptr [rcx] ds:ffffed80`00000000=????????????????
Resetting default scope

STACK_TEXT: 
ffffc48a`03892448 fffff803`18c5860a : 00000000`00000050 ffffed80`00000000 00000000`00000000 ffffedf6`fb600000 : nt!KeBugCheckEx
ffffc48a`03892450 fffff803`18ac9c7c : ffffedff`ffffffff ffff910b`19031540 ffffed80`00000000 fffff803`18b21593 : nt!MiInPagePageTable+0x1603fa
ffffc48a`038925a0 fffff803`18ac8fae : ffff910b`16826be0 00000000`00000000 00000000`00000001 ffffed80`00000000 : nt!MiUserFault+0x7dc
ffffc48a`03892650 fffff803`18bd041e : ffffc980`56279180 00000000`00000220 00000000`00000300 ffff910b`12973040 : nt!MmAccessFault+0x14e
ffffc48a`038927f0 fffff803`18ac46d0 : fffff803`18a199b4 ffff910b`12973140 fffff803`18b1507d ffffc980`56279180 : nt!KiPageFault+0x35e
ffffc48a`03892988 fffff803`18a199b4 : ffff910b`12973140 fffff803`18b1507d ffffc980`56279180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
ffffc48a`03892990 fffff803`18a198c2 : 00000000`00000001 00000000`00000000 ffff910b`177a0010 fffff803`18f8f240 : nt!MiMappingHasIoTracker+0x44
ffffc48a`038929c0 fffff803`5d36b981 : ffff910b`177a0000 ffff910b`12973180 fffff803`5d36f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc48a`03892af0 ffff910b`177a0000 : ffff910b`12973180 fffff803`5d36f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc48a`03892af8 ffff910b`12973180 : fffff803`5d36f1c8 00000000`00000004 00000000`00320030 fffff803`5d36c160 : 0xffff910b`177a0000
ffffc48a`03892b00 fffff803`5d36f1c8 : 00000000`00000004 00000000`00320030 fffff803`5d36c160 ffffc48a`02364750 : 0xffff910b`12973180
ffffc48a`03892b08 00000000`00000004 : 00000000`00320030 fffff803`5d36c160 ffffc48a`02364750 fffff803`191beecd : kerneld+0xf1c8
ffffc48a`03892b10 00000000`00320030 : fffff803`5d36c160 ffffc48a`02364750 fffff803`191beecd ffff910b`12973040 : 0x4
ffffc48a`03892b18 fffff803`5d36c160 : ffffc48a`02364750 fffff803`191beecd ffff910b`12973040 fffff803`190f7e90 : 0x320030
ffffc48a`03892b20 ffffc48a`02364750 : fffff803`191beecd ffff910b`12973040 fffff803`190f7e90 00000000`00000300 : kerneld+0xc160
ffffc48a`03892b28 fffff803`191beecd : ffff910b`12973040 fffff803`190f7e90 00000000`00000300 fffff803`18e38bc0 : 0xffffc48a`02364750
ffffc48a`03892b30 fffff803`18af43b5 : ffff910b`09477ce0 ffff910b`09477c00 ffff910b`12973040 ffff910b`16bd86b8 : nt!IopLoadUnloadDriver+0xc703d
ffffc48a`03892b70 fffff803`18a6bcd5 : ffff910b`12973040 00000000`00000080 ffff910b`09479040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffc48a`03892c10 fffff803`18bc9998 : ffffc980`5631d180 ffff910b`12973040 fffff803`18a6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc48a`03892c60 00000000`00000000 : ffffc48a`03893000 ffffc48a`0388d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  kerneld+b981

MODULE_NAME: kerneld

IMAGE_NAME:  kerneld.x64

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b981

FAILURE_BUCKET_ID:  AV_R_INVALID_kerneld!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffc8000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 45

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.CorruptModuleList
    Value: 1


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffffc8000000000

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
 fffffc8000000000

MM_INTERNAL_CODE:  6

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
fffff38a`ce917448 fffff801`1ac5860a : 00000000`00000050 fffffc80`00000000 00000000`00000000 fffffcfe`7f200000 : 0xfffff801`1abc2390
fffff38a`ce917450 00000000`00000050 : fffffc80`00000000 00000000`00000000 fffffcfe`7f200000 00000000`00000006 : 0xfffff801`1ac5860a
fffff38a`ce917458 fffffc80`00000000 : 00000000`00000000 fffffcfe`7f200000 00000000`00000006 ffffe284`83ddb600 : <Unloaded_Unknown_Module_00000000`00000000>+0x50
fffff38a`ce917460 00000000`00000000 : fffffcfe`7f200000 00000000`00000006 ffffe284`83ddb600 00000000`00000001 : 0xfffffc80`00000000


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_AV

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fc259191-ef0c-6215-476f-d32e5dcaf1b7}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe08000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 12

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffe08000000000

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff802653733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026522a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8026522a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffe08000000000

MM_INTERNAL_CODE:  6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc90e07fe77f0 -- (.trap 0xffffc90e07fe77f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe08000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80264ec46d0 rsp=ffffc90e07fe7988 rbp=0000000000000004
 r8=ffffe08000000000  r9=ffffe0f078200000 r10=0000000000000002
r11=ffffe0f0783c17f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff802`64ec46d0 488b01          mov     rax,qword ptr [rcx] ds:ffffe080`00000000=????????????????
Resetting default scope

STACK_TEXT: 
ffffc90e`07fe7448 fffff802`6505860a : 00000000`00000050 ffffe080`00000000 00000000`00000000 ffffe0f0`78200000 : nt!KeBugCheckEx
ffffc90e`07fe7450 fffff802`64ec9c7c : ffffe0ff`ffffffff 00000000`00000000 ffffe080`00000000 ffffa189`9f164010 : nt!MiInPagePageTable+0x1603fa
ffffc90e`07fe75a0 fffff802`64ec8fae : 00000000`00000000 00000000`00000000 00000000`00000001 ffffe080`00000000 : nt!MiUserFault+0x7dc
ffffc90e`07fe7650 fffff802`64fd041e : ffffcb01`026b2180 00000000`000000aa 00000000`00000a00 ffffa189`9c8f7300 : nt!MmAccessFault+0x14e
ffffc90e`07fe77f0 fffff802`64ec46d0 : fffff802`64e199b4 ffffa189`9c8f7400 fffff802`64f1507d ffffcb01`026b2180 : nt!KiPageFault+0x35e
ffffc90e`07fe7988 fffff802`64e199b4 : ffffa189`9c8f7400 fffff802`64f1507d ffffcb01`026b2180 00000000`ffffff00 : nt!MI_READ_PTE_LOCK_FREE
ffffc90e`07fe7990 fffff802`64e198c2 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff802`6538f240 : nt!MiMappingHasIoTracker+0x44
ffffc90e`07fe79c0 fffff802`b1a4b981 : ffffa189`9f7d4e00 ffffa189`9c8f7440 fffff802`b1a4f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc90e`07fe7af0 ffffa189`9f7d4e00 : ffffa189`9c8f7440 fffff802`b1a4f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc90e`07fe7af8 ffffa189`9c8f7440 : fffff802`b1a4f1c8 00000000`00000004 00000000`00320030 fffff802`b1a4c160 : 0xffffa189`9f7d4e00
ffffc90e`07fe7b00 fffff802`b1a4f1c8 : 00000000`00000004 00000000`00320030 fffff802`b1a4c160 ffffc90e`05499750 : 0xffffa189`9c8f7440
ffffc90e`07fe7b08 00000000`00000004 : 00000000`00320030 fffff802`b1a4c160 ffffc90e`05499750 fffff802`655beecd : kerneld+0xf1c8
ffffc90e`07fe7b10 00000000`00320030 : fffff802`b1a4c160 ffffc90e`05499750 fffff802`655beecd ffffa189`9c8f7300 : 0x4
ffffc90e`07fe7b18 fffff802`b1a4c160 : ffffc90e`05499750 fffff802`655beecd ffffa189`9c8f7300 fffff802`654f7e90 : 0x320030
ffffc90e`07fe7b20 ffffc90e`05499750 : fffff802`655beecd ffffa189`9c8f7300 fffff802`654f7e90 00000000`00000a00 : kerneld+0xc160
ffffc90e`07fe7b28 fffff802`655beecd : ffffa189`9c8f7300 fffff802`654f7e90 00000000`00000a00 ffffa189`9f7d4e90 : 0xffffc90e`05499750
ffffc90e`07fe7b30 fffff802`64ef43b5 : ffffa189`8f877ce0 ffffa189`8f877c00 ffffa189`9c8f7300 00000000`00000002 : nt!IopLoadUnloadDriver+0xc703d
ffffc90e`07fe7b70 fffff802`64e6bcd5 : ffffa189`9c8f7300 00000000`00000080 ffffa189`8f879040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffc90e`07fe7c10 fffff802`64fc9998 : fffff802`63454180 ffffa189`9c8f7300 fffff802`64e6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc90e`07fe7c60 00000000`00000000 : ffffc90e`07fe8000 ffffc90e`07fe2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  kerneld+b981

MODULE_NAME: kerneld

IMAGE_NAME:  kerneld.x64

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b981

FAILURE_BUCKET_ID:  AV_R_INVALID_kerneld!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}

Followup:     MachineOwner
---------
 
Çözüm
AIDA64 sildim. Testi başlattım. Baya uzun sürüyor herhalde bitmedi daha bekliyorum bitince paylaşacağım sonuçları.
Bellek testi yapar mısın?


AIDA64 kullanıyorsan, geçici bir süreliğine kaldırır mısın?

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa98000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 11

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa98000000000

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff803095733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8030942a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8030942a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa98000000000

MM_INTERNAL_CODE:  6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc08f081027f0 -- (.trap 0xffffc08f081027f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa98000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803090c46d0 rsp=ffffc08f08102988 rbp=0000000000000004
r8=ffffa98000000000  r9=ffffa9d4ea600000 r10=0000000000000002
r11=ffffa9d4ea7537f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff803`090c46d0 488b01          mov     rax,qword ptr [rcx] ds:ffffa980`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffffc08f`08102448 fffff803`0925860a : 00000000`00000050 ffffa980`00000000 00000000`00000000 ffffa9d4`ea600000 : nt!KeBugCheckEx
ffffc08f`08102450 fffff803`090c9c7c : ffffa9ff`ffffffff 00000000`00000001 ffffa980`00000000 ffffac82`62c222d0 : nt!MiInPagePageTable+0x1603fa
ffffc08f`081025a0 fffff803`090c8fae : 00000000`00000000 00000000`00000000 00000000`00000001 ffffa980`00000000 : nt!MiUserFault+0x7dc
ffffc08f`08102650 fffff803`091d041e : ffffda80`e7a79180 00000000`000000cc 00000000`00000000 ffff9780`03f960c0 : nt!MmAccessFault+0x14e
ffffc08f`081027f0 fffff803`090c46d0 : fffff803`090199b4 ffff9780`03f961c0 fffff803`0911507d ffffda80`e7bc3180 : nt!KiPageFault+0x35e
ffffc08f`08102988 fffff803`090199b4 : ffff9780`03f961c0 fffff803`0911507d ffffda80`e7bc3180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
ffffc08f`08102990 fffff803`090198c2 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff803`0958f240 : nt!MiMappingHasIoTracker+0x44
ffffc08f`081029c0 fffff803`4fb9b981 : ffffac82`4a0e2300 ffff9780`03f96200 fffff803`4fb9f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc08f`08102af0 ffffac82`4a0e2300 : ffff9780`03f96200 fffff803`4fb9f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc08f`08102af8 ffff9780`03f96200 : fffff803`4fb9f1c8 00000000`00000004 00000000`00320030 fffff803`4fb9c160 : 0xffffac82`4a0e2300
ffffc08f`08102b00 fffff803`4fb9f1c8 : 00000000`00000004 00000000`00320030 fffff803`4fb9c160 ffffc08f`08511750 : 0xffff9780`03f96200
ffffc08f`08102b08 00000000`00000004 : 00000000`00320030 fffff803`4fb9c160 ffffc08f`08511750 fffff803`097beecd : kerneld+0xf1c8
ffffc08f`08102b10 00000000`00320030 : fffff803`4fb9c160 ffffc08f`08511750 fffff803`097beecd ffff9780`03f960c0 : 0x4
ffffc08f`08102b18 fffff803`4fb9c160 : ffffc08f`08511750 fffff803`097beecd ffff9780`03f960c0 fffff803`096f7e90 : 0x320030
ffffc08f`08102b20 ffffc08f`08511750 : fffff803`097beecd ffff9780`03f960c0 fffff803`096f7e90 00000000`00000000 : kerneld+0xc160
ffffc08f`08102b28 fffff803`097beecd : ffff9780`03f960c0 fffff803`096f7e90 00000000`00000000 ffff9780`060f8c98 : 0xffffc08f`08511750
ffffc08f`08102b30 fffff803`090f43b5 : ffff9780`015359a0 ffff9780`03f96000 ffff9780`03f960c0 ffff9780`015359a0 : nt!IopLoadUnloadDriver+0xc703d
ffffc08f`08102b70 fffff803`0906bcd5 : ffff9780`03f960c0 00000000`00000080 ffff9780`01477080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffc08f`08102c10 fffff803`091c9998 : fffff803`07284180 ffff9780`03f960c0 fffff803`0906bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc08f`08102c60 00000000`00000000 : ffffc08f`08103000 ffffc08f`080fd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  kerneld+b981

MODULE_NAME: kerneld

IMAGE_NAME:  kerneld.x64

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b981

FAILURE_BUCKET_ID:  AV_R_INVALID_kerneld!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffed8000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 12

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffed8000000000

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff80318f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80318e2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80318e2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffed8000000000

MM_INTERNAL_CODE:  6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc48a038927f0 -- (.trap 0xffffc48a038927f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffed8000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80318ac46d0 rsp=ffffc48a03892988 rbp=0000000000000004
r8=ffffed8000000000  r9=ffffedf6fb600000 r10=0000000000000002
r11=ffffedf6fb7db7f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff803`18ac46d0 488b01          mov     rax,qword ptr [rcx] ds:ffffed80`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffffc48a`03892448 fffff803`18c5860a : 00000000`00000050 ffffed80`00000000 00000000`00000000 ffffedf6`fb600000 : nt!KeBugCheckEx
ffffc48a`03892450 fffff803`18ac9c7c : ffffedff`ffffffff ffff910b`19031540 ffffed80`00000000 fffff803`18b21593 : nt!MiInPagePageTable+0x1603fa
ffffc48a`038925a0 fffff803`18ac8fae : ffff910b`16826be0 00000000`00000000 00000000`00000001 ffffed80`00000000 : nt!MiUserFault+0x7dc
ffffc48a`03892650 fffff803`18bd041e : ffffc980`56279180 00000000`00000220 00000000`00000300 ffff910b`12973040 : nt!MmAccessFault+0x14e
ffffc48a`038927f0 fffff803`18ac46d0 : fffff803`18a199b4 ffff910b`12973140 fffff803`18b1507d ffffc980`56279180 : nt!KiPageFault+0x35e
ffffc48a`03892988 fffff803`18a199b4 : ffff910b`12973140 fffff803`18b1507d ffffc980`56279180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
ffffc48a`03892990 fffff803`18a198c2 : 00000000`00000001 00000000`00000000 ffff910b`177a0010 fffff803`18f8f240 : nt!MiMappingHasIoTracker+0x44
ffffc48a`038929c0 fffff803`5d36b981 : ffff910b`177a0000 ffff910b`12973180 fffff803`5d36f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc48a`03892af0 ffff910b`177a0000 : ffff910b`12973180 fffff803`5d36f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc48a`03892af8 ffff910b`12973180 : fffff803`5d36f1c8 00000000`00000004 00000000`00320030 fffff803`5d36c160 : 0xffff910b`177a0000
ffffc48a`03892b00 fffff803`5d36f1c8 : 00000000`00000004 00000000`00320030 fffff803`5d36c160 ffffc48a`02364750 : 0xffff910b`12973180
ffffc48a`03892b08 00000000`00000004 : 00000000`00320030 fffff803`5d36c160 ffffc48a`02364750 fffff803`191beecd : kerneld+0xf1c8
ffffc48a`03892b10 00000000`00320030 : fffff803`5d36c160 ffffc48a`02364750 fffff803`191beecd ffff910b`12973040 : 0x4
ffffc48a`03892b18 fffff803`5d36c160 : ffffc48a`02364750 fffff803`191beecd ffff910b`12973040 fffff803`190f7e90 : 0x320030
ffffc48a`03892b20 ffffc48a`02364750 : fffff803`191beecd ffff910b`12973040 fffff803`190f7e90 00000000`00000300 : kerneld+0xc160
ffffc48a`03892b28 fffff803`191beecd : ffff910b`12973040 fffff803`190f7e90 00000000`00000300 fffff803`18e38bc0 : 0xffffc48a`02364750
ffffc48a`03892b30 fffff803`18af43b5 : ffff910b`09477ce0 ffff910b`09477c00 ffff910b`12973040 ffff910b`16bd86b8 : nt!IopLoadUnloadDriver+0xc703d
ffffc48a`03892b70 fffff803`18a6bcd5 : ffff910b`12973040 00000000`00000080 ffff910b`09479040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffc48a`03892c10 fffff803`18bc9998 : ffffc980`5631d180 ffff910b`12973040 fffff803`18a6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc48a`03892c60 00000000`00000000 : ffffc48a`03893000 ffffc48a`0388d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  kerneld+b981

MODULE_NAME: kerneld

IMAGE_NAME:  kerneld.x64

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b981

FAILURE_BUCKET_ID:  AV_R_INVALID_kerneld!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffc8000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 45

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.CorruptModuleList
    Value: 1


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffffc8000000000

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
fffffc8000000000

MM_INTERNAL_CODE:  6

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT:
fffff38a`ce917448 fffff801`1ac5860a : 00000000`00000050 fffffc80`00000000 00000000`00000000 fffffcfe`7f200000 : 0xfffff801`1abc2390
fffff38a`ce917450 00000000`00000050 : fffffc80`00000000 00000000`00000000 fffffcfe`7f200000 00000000`00000006 : 0xfffff801`1ac5860a
fffff38a`ce917458 fffffc80`00000000 : 00000000`00000000 fffffcfe`7f200000 00000000`00000006 ffffe284`83ddb600 : <Unloaded_Unknown_Module_00000000`00000000>+0x50
fffff38a`ce917460 00000000`00000000 : fffffcfe`7f200000 00000000`00000006 ffffe284`83ddb600 00000000`00000001 : 0xfffffc80`00000000


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_AV

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fc259191-ef0c-6215-476f-d32e5dcaf1b7}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe08000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 12

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffe08000000000

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff802653733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026522a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8026522a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe08000000000

MM_INTERNAL_CODE:  6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc90e07fe77f0 -- (.trap 0xffffc90e07fe77f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe08000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80264ec46d0 rsp=ffffc90e07fe7988 rbp=0000000000000004
r8=ffffe08000000000  r9=ffffe0f078200000 r10=0000000000000002
r11=ffffe0f0783c17f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff802`64ec46d0 488b01          mov     rax,qword ptr [rcx] ds:ffffe080`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffffc90e`07fe7448 fffff802`6505860a : 00000000`00000050 ffffe080`00000000 00000000`00000000 ffffe0f0`78200000 : nt!KeBugCheckEx
ffffc90e`07fe7450 fffff802`64ec9c7c : ffffe0ff`ffffffff 00000000`00000000 ffffe080`00000000 ffffa189`9f164010 : nt!MiInPagePageTable+0x1603fa
ffffc90e`07fe75a0 fffff802`64ec8fae : 00000000`00000000 00000000`00000000 00000000`00000001 ffffe080`00000000 : nt!MiUserFault+0x7dc
ffffc90e`07fe7650 fffff802`64fd041e : ffffcb01`026b2180 00000000`000000aa 00000000`00000a00 ffffa189`9c8f7300 : nt!MmAccessFault+0x14e
ffffc90e`07fe77f0 fffff802`64ec46d0 : fffff802`64e199b4 ffffa189`9c8f7400 fffff802`64f1507d ffffcb01`026b2180 : nt!KiPageFault+0x35e
ffffc90e`07fe7988 fffff802`64e199b4 : ffffa189`9c8f7400 fffff802`64f1507d ffffcb01`026b2180 00000000`ffffff00 : nt!MI_READ_PTE_LOCK_FREE
ffffc90e`07fe7990 fffff802`64e198c2 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff802`6538f240 : nt!MiMappingHasIoTracker+0x44
ffffc90e`07fe79c0 fffff802`b1a4b981 : ffffa189`9f7d4e00 ffffa189`9c8f7440 fffff802`b1a4f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc90e`07fe7af0 ffffa189`9f7d4e00 : ffffa189`9c8f7440 fffff802`b1a4f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc90e`07fe7af8 ffffa189`9c8f7440 : fffff802`b1a4f1c8 00000000`00000004 00000000`00320030 fffff802`b1a4c160 : 0xffffa189`9f7d4e00
ffffc90e`07fe7b00 fffff802`b1a4f1c8 : 00000000`00000004 00000000`00320030 fffff802`b1a4c160 ffffc90e`05499750 : 0xffffa189`9c8f7440
ffffc90e`07fe7b08 00000000`00000004 : 00000000`00320030 fffff802`b1a4c160 ffffc90e`05499750 fffff802`655beecd : kerneld+0xf1c8
ffffc90e`07fe7b10 00000000`00320030 : fffff802`b1a4c160 ffffc90e`05499750 fffff802`655beecd ffffa189`9c8f7300 : 0x4
ffffc90e`07fe7b18 fffff802`b1a4c160 : ffffc90e`05499750 fffff802`655beecd ffffa189`9c8f7300 fffff802`654f7e90 : 0x320030
ffffc90e`07fe7b20 ffffc90e`05499750 : fffff802`655beecd ffffa189`9c8f7300 fffff802`654f7e90 00000000`00000a00 : kerneld+0xc160
ffffc90e`07fe7b28 fffff802`655beecd : ffffa189`9c8f7300 fffff802`654f7e90 00000000`00000a00 ffffa189`9f7d4e90 : 0xffffc90e`05499750
ffffc90e`07fe7b30 fffff802`64ef43b5 : ffffa189`8f877ce0 ffffa189`8f877c00 ffffa189`9c8f7300 00000000`00000002 : nt!IopLoadUnloadDriver+0xc703d
ffffc90e`07fe7b70 fffff802`64e6bcd5 : ffffa189`9c8f7300 00000000`00000080 ffffa189`8f879040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffc90e`07fe7c10 fffff802`64fc9998 : fffff802`63454180 ffffa189`9c8f7300 fffff802`64e6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc90e`07fe7c60 00000000`00000000 : ffffc90e`07fe8000 ffffc90e`07fe2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  kerneld+b981

MODULE_NAME: kerneld

IMAGE_NAME:  kerneld.x64

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b981

FAILURE_BUCKET_ID:  AV_R_INVALID_kerneld!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}

Followup:     MachineOwner
---------

Sonuçları yükledim.
WhatsApp Image 2020-05-09 at 18.57.04 (1).jpeg

WhatsApp Image 2020-05-09 at 18.57.04 (2).jpeg

WhatsApp Image 2020-05-09 at 18.57.04 (3).jpeg

WhatsApp Image 2020-05-09 at 18.57.04.jpeg
 
Son düzenleyen: Moderatör:
Yukarıda denilenleri yapın sadece 2004 sürümüne geçmeyin.
Tekrarlarsa Vanguard'ı kaldırın. Defender yerine de kaliteli bir AV kullanın.

BIOS'a gir ve oprimize defaults Save yap. ASUS araçlarını kaldır. Ayrıca Sosyal'den 2004 sürümünü indir ve geçiş yap.

ASUS araçlarını kaldırdım. BIOS default yapacağım RAM'i tekrar 3000MHz'e çeksem sorun olur mu peki? Bir de Vanguard ne bilmiyorum?
 
Son düzenleme:
Çözüldü: AIDA64 ve ASUS araçlarını sildim 2 gündür sıkıntı yaşamıyorum. Yardımlarınız için teşekkür ederim sorun çözüldü.

Yüklediğin oyunu nasıl bilmiyorsun? Valorant Vanguard yüklü kaldır.

Olur, elleme ayarları.

Şimdilik RAM değeri ile oynama, optimize defaults Save yap yeterli BIOS'da. O araç ise bilgisayarınıza olan bir program. Program ekle veya kaldır bölümünden kontrol edebilirsin.
 
Durum
Mesaj gönderimine kapalı.

Yeni konular

Geri
Yukarı