PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa98000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 11
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa98000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff803095733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8030942a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8030942a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa98000000000
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc08f081027f0 -- (.trap 0xffffc08f081027f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa98000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803090c46d0 rsp=ffffc08f08102988 rbp=0000000000000004
r8=ffffa98000000000 r9=ffffa9d4ea600000 r10=0000000000000002
r11=ffffa9d4ea7537f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff803`090c46d0 488b01 mov rax,qword ptr [rcx] ds:ffffa980`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffc08f`08102448 fffff803`0925860a : 00000000`00000050 ffffa980`00000000 00000000`00000000 ffffa9d4`ea600000 : nt!KeBugCheckEx
ffffc08f`08102450 fffff803`090c9c7c : ffffa9ff`ffffffff 00000000`00000001 ffffa980`00000000 ffffac82`62c222d0 : nt!MiInPagePageTable+0x1603fa
ffffc08f`081025a0 fffff803`090c8fae : 00000000`00000000 00000000`00000000 00000000`00000001 ffffa980`00000000 : nt!MiUserFault+0x7dc
ffffc08f`08102650 fffff803`091d041e : ffffda80`e7a79180 00000000`000000cc 00000000`00000000 ffff9780`03f960c0 : nt!MmAccessFault+0x14e
ffffc08f`081027f0 fffff803`090c46d0 : fffff803`090199b4 ffff9780`03f961c0 fffff803`0911507d ffffda80`e7bc3180 : nt!KiPageFault+0x35e
ffffc08f`08102988 fffff803`090199b4 : ffff9780`03f961c0 fffff803`0911507d ffffda80`e7bc3180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
ffffc08f`08102990 fffff803`090198c2 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff803`0958f240 : nt!MiMappingHasIoTracker+0x44
ffffc08f`081029c0 fffff803`4fb9b981 : ffffac82`4a0e2300 ffff9780`03f96200 fffff803`4fb9f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc08f`08102af0 ffffac82`4a0e2300 : ffff9780`03f96200 fffff803`4fb9f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc08f`08102af8 ffff9780`03f96200 : fffff803`4fb9f1c8 00000000`00000004 00000000`00320030 fffff803`4fb9c160 : 0xffffac82`4a0e2300
ffffc08f`08102b00 fffff803`4fb9f1c8 : 00000000`00000004 00000000`00320030 fffff803`4fb9c160 ffffc08f`08511750 : 0xffff9780`03f96200
ffffc08f`08102b08 00000000`00000004 : 00000000`00320030 fffff803`4fb9c160 ffffc08f`08511750 fffff803`097beecd : kerneld+0xf1c8
ffffc08f`08102b10 00000000`00320030 : fffff803`4fb9c160 ffffc08f`08511750 fffff803`097beecd ffff9780`03f960c0 : 0x4
ffffc08f`08102b18 fffff803`4fb9c160 : ffffc08f`08511750 fffff803`097beecd ffff9780`03f960c0 fffff803`096f7e90 : 0x320030
ffffc08f`08102b20 ffffc08f`08511750 : fffff803`097beecd ffff9780`03f960c0 fffff803`096f7e90 00000000`00000000 : kerneld+0xc160
ffffc08f`08102b28 fffff803`097beecd : ffff9780`03f960c0 fffff803`096f7e90 00000000`00000000 ffff9780`060f8c98 : 0xffffc08f`08511750
ffffc08f`08102b30 fffff803`090f43b5 : ffff9780`015359a0 ffff9780`03f96000 ffff9780`03f960c0 ffff9780`015359a0 : nt!IopLoadUnloadDriver+0xc703d
ffffc08f`08102b70 fffff803`0906bcd5 : ffff9780`03f960c0 00000000`00000080 ffff9780`01477080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffc08f`08102c10 fffff803`091c9998 : fffff803`07284180 ffff9780`03f960c0 fffff803`0906bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc08f`08102c60 00000000`00000000 : ffffc08f`08103000 ffffc08f`080fd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: kerneld+b981
MODULE_NAME: kerneld
IMAGE_NAME: kerneld.x64
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b981
FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffed8000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 12
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffed8000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff80318f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80318e2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80318e2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffed8000000000
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc48a038927f0 -- (.trap 0xffffc48a038927f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffed8000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80318ac46d0 rsp=ffffc48a03892988 rbp=0000000000000004
r8=ffffed8000000000 r9=ffffedf6fb600000 r10=0000000000000002
r11=ffffedf6fb7db7f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff803`18ac46d0 488b01 mov rax,qword ptr [rcx] ds:ffffed80`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffc48a`03892448 fffff803`18c5860a : 00000000`00000050 ffffed80`00000000 00000000`00000000 ffffedf6`fb600000 : nt!KeBugCheckEx
ffffc48a`03892450 fffff803`18ac9c7c : ffffedff`ffffffff ffff910b`19031540 ffffed80`00000000 fffff803`18b21593 : nt!MiInPagePageTable+0x1603fa
ffffc48a`038925a0 fffff803`18ac8fae : ffff910b`16826be0 00000000`00000000 00000000`00000001 ffffed80`00000000 : nt!MiUserFault+0x7dc
ffffc48a`03892650 fffff803`18bd041e : ffffc980`56279180 00000000`00000220 00000000`00000300 ffff910b`12973040 : nt!MmAccessFault+0x14e
ffffc48a`038927f0 fffff803`18ac46d0 : fffff803`18a199b4 ffff910b`12973140 fffff803`18b1507d ffffc980`56279180 : nt!KiPageFault+0x35e
ffffc48a`03892988 fffff803`18a199b4 : ffff910b`12973140 fffff803`18b1507d ffffc980`56279180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
ffffc48a`03892990 fffff803`18a198c2 : 00000000`00000001 00000000`00000000 ffff910b`177a0010 fffff803`18f8f240 : nt!MiMappingHasIoTracker+0x44
ffffc48a`038929c0 fffff803`5d36b981 : ffff910b`177a0000 ffff910b`12973180 fffff803`5d36f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc48a`03892af0 ffff910b`177a0000 : ffff910b`12973180 fffff803`5d36f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc48a`03892af8 ffff910b`12973180 : fffff803`5d36f1c8 00000000`00000004 00000000`00320030 fffff803`5d36c160 : 0xffff910b`177a0000
ffffc48a`03892b00 fffff803`5d36f1c8 : 00000000`00000004 00000000`00320030 fffff803`5d36c160 ffffc48a`02364750 : 0xffff910b`12973180
ffffc48a`03892b08 00000000`00000004 : 00000000`00320030 fffff803`5d36c160 ffffc48a`02364750 fffff803`191beecd : kerneld+0xf1c8
ffffc48a`03892b10 00000000`00320030 : fffff803`5d36c160 ffffc48a`02364750 fffff803`191beecd ffff910b`12973040 : 0x4
ffffc48a`03892b18 fffff803`5d36c160 : ffffc48a`02364750 fffff803`191beecd ffff910b`12973040 fffff803`190f7e90 : 0x320030
ffffc48a`03892b20 ffffc48a`02364750 : fffff803`191beecd ffff910b`12973040 fffff803`190f7e90 00000000`00000300 : kerneld+0xc160
ffffc48a`03892b28 fffff803`191beecd : ffff910b`12973040 fffff803`190f7e90 00000000`00000300 fffff803`18e38bc0 : 0xffffc48a`02364750
ffffc48a`03892b30 fffff803`18af43b5 : ffff910b`09477ce0 ffff910b`09477c00 ffff910b`12973040 ffff910b`16bd86b8 : nt!IopLoadUnloadDriver+0xc703d
ffffc48a`03892b70 fffff803`18a6bcd5 : ffff910b`12973040 00000000`00000080 ffff910b`09479040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffc48a`03892c10 fffff803`18bc9998 : ffffc980`5631d180 ffff910b`12973040 fffff803`18a6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc48a`03892c60 00000000`00000000 : ffffc48a`03893000 ffffc48a`0388d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: kerneld+b981
MODULE_NAME: kerneld
IMAGE_NAME: kerneld.x64
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b981
FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffc8000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 0
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 0
Key : Analysis.Memory.CommitPeak.Mb
Value: 45
Key : Analysis.System
Value: CreateObject
Key : WER.CorruptModuleList
Value: 1
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffffc8000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
fffffc8000000000
MM_INTERNAL_CODE: 6
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
fffff38a`ce917448 fffff801`1ac5860a : 00000000`00000050 fffffc80`00000000 00000000`00000000 fffffcfe`7f200000 : 0xfffff801`1abc2390
fffff38a`ce917450 00000000`00000050 : fffffc80`00000000 00000000`00000000 fffffcfe`7f200000 00000000`00000006 : 0xfffff801`1ac5860a
fffff38a`ce917458 fffffc80`00000000 : 00000000`00000000 fffffcfe`7f200000 00000000`00000006 ffffe284`83ddb600 : <Unloaded_Unknown_Module_00000000`00000000>+0x50
fffff38a`ce917460 00000000`00000000 : fffffcfe`7f200000 00000000`00000006 ffffe284`83ddb600 00000000`00000001 : 0xfffffc80`00000000
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe08000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 12
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe08000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff802653733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026522a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8026522a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe08000000000
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc90e07fe77f0 -- (.trap 0xffffc90e07fe77f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe08000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80264ec46d0 rsp=ffffc90e07fe7988 rbp=0000000000000004
r8=ffffe08000000000 r9=ffffe0f078200000 r10=0000000000000002
r11=ffffe0f0783c17f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff802`64ec46d0 488b01 mov rax,qword ptr [rcx] ds:ffffe080`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffc90e`07fe7448 fffff802`6505860a : 00000000`00000050 ffffe080`00000000 00000000`00000000 ffffe0f0`78200000 : nt!KeBugCheckEx
ffffc90e`07fe7450 fffff802`64ec9c7c : ffffe0ff`ffffffff 00000000`00000000 ffffe080`00000000 ffffa189`9f164010 : nt!MiInPagePageTable+0x1603fa
ffffc90e`07fe75a0 fffff802`64ec8fae : 00000000`00000000 00000000`00000000 00000000`00000001 ffffe080`00000000 : nt!MiUserFault+0x7dc
ffffc90e`07fe7650 fffff802`64fd041e : ffffcb01`026b2180 00000000`000000aa 00000000`00000a00 ffffa189`9c8f7300 : nt!MmAccessFault+0x14e
ffffc90e`07fe77f0 fffff802`64ec46d0 : fffff802`64e199b4 ffffa189`9c8f7400 fffff802`64f1507d ffffcb01`026b2180 : nt!KiPageFault+0x35e
ffffc90e`07fe7988 fffff802`64e199b4 : ffffa189`9c8f7400 fffff802`64f1507d ffffcb01`026b2180 00000000`ffffff00 : nt!MI_READ_PTE_LOCK_FREE
ffffc90e`07fe7990 fffff802`64e198c2 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff802`6538f240 : nt!MiMappingHasIoTracker+0x44
ffffc90e`07fe79c0 fffff802`b1a4b981 : ffffa189`9f7d4e00 ffffa189`9c8f7440 fffff802`b1a4f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc90e`07fe7af0 ffffa189`9f7d4e00 : ffffa189`9c8f7440 fffff802`b1a4f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc90e`07fe7af8 ffffa189`9c8f7440 : fffff802`b1a4f1c8 00000000`00000004 00000000`00320030 fffff802`b1a4c160 : 0xffffa189`9f7d4e00
ffffc90e`07fe7b00 fffff802`b1a4f1c8 : 00000000`00000004 00000000`00320030 fffff802`b1a4c160 ffffc90e`05499750 : 0xffffa189`9c8f7440
ffffc90e`07fe7b08 00000000`00000004 : 00000000`00320030 fffff802`b1a4c160 ffffc90e`05499750 fffff802`655beecd : kerneld+0xf1c8
ffffc90e`07fe7b10 00000000`00320030 : fffff802`b1a4c160 ffffc90e`05499750 fffff802`655beecd ffffa189`9c8f7300 : 0x4
ffffc90e`07fe7b18 fffff802`b1a4c160 : ffffc90e`05499750 fffff802`655beecd ffffa189`9c8f7300 fffff802`654f7e90 : 0x320030
ffffc90e`07fe7b20 ffffc90e`05499750 : fffff802`655beecd ffffa189`9c8f7300 fffff802`654f7e90 00000000`00000a00 : kerneld+0xc160
ffffc90e`07fe7b28 fffff802`655beecd : ffffa189`9c8f7300 fffff802`654f7e90 00000000`00000a00 ffffa189`9f7d4e90 : 0xffffc90e`05499750
ffffc90e`07fe7b30 fffff802`64ef43b5 : ffffa189`8f877ce0 ffffa189`8f877c00 ffffa189`9c8f7300 00000000`00000002 : nt!IopLoadUnloadDriver+0xc703d
ffffc90e`07fe7b70 fffff802`64e6bcd5 : ffffa189`9c8f7300 00000000`00000080 ffffa189`8f879040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffc90e`07fe7c10 fffff802`64fc9998 : fffff802`63454180 ffffa189`9c8f7300 fffff802`64e6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc90e`07fe7c60 00000000`00000000 : ffffc90e`07fe8000 ffffc90e`07fe2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: kerneld+b981
MODULE_NAME: kerneld
IMAGE_NAME: kerneld.x64
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b981
FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa98000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 11
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa98000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff803095733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8030942a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8030942a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa98000000000
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc08f081027f0 -- (.trap 0xffffc08f081027f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa98000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803090c46d0 rsp=ffffc08f08102988 rbp=0000000000000004
r8=ffffa98000000000 r9=ffffa9d4ea600000 r10=0000000000000002
r11=ffffa9d4ea7537f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff803`090c46d0 488b01 mov rax,qword ptr [rcx] ds:ffffa980`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffc08f`08102448 fffff803`0925860a : 00000000`00000050 ffffa980`00000000 00000000`00000000 ffffa9d4`ea600000 : nt!KeBugCheckEx
ffffc08f`08102450 fffff803`090c9c7c : ffffa9ff`ffffffff 00000000`00000001 ffffa980`00000000 ffffac82`62c222d0 : nt!MiInPagePageTable+0x1603fa
ffffc08f`081025a0 fffff803`090c8fae : 00000000`00000000 00000000`00000000 00000000`00000001 ffffa980`00000000 : nt!MiUserFault+0x7dc
ffffc08f`08102650 fffff803`091d041e : ffffda80`e7a79180 00000000`000000cc 00000000`00000000 ffff9780`03f960c0 : nt!MmAccessFault+0x14e
ffffc08f`081027f0 fffff803`090c46d0 : fffff803`090199b4 ffff9780`03f961c0 fffff803`0911507d ffffda80`e7bc3180 : nt!KiPageFault+0x35e
ffffc08f`08102988 fffff803`090199b4 : ffff9780`03f961c0 fffff803`0911507d ffffda80`e7bc3180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
ffffc08f`08102990 fffff803`090198c2 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff803`0958f240 : nt!MiMappingHasIoTracker+0x44
ffffc08f`081029c0 fffff803`4fb9b981 : ffffac82`4a0e2300 ffff9780`03f96200 fffff803`4fb9f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc08f`08102af0 ffffac82`4a0e2300 : ffff9780`03f96200 fffff803`4fb9f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc08f`08102af8 ffff9780`03f96200 : fffff803`4fb9f1c8 00000000`00000004 00000000`00320030 fffff803`4fb9c160 : 0xffffac82`4a0e2300
ffffc08f`08102b00 fffff803`4fb9f1c8 : 00000000`00000004 00000000`00320030 fffff803`4fb9c160 ffffc08f`08511750 : 0xffff9780`03f96200
ffffc08f`08102b08 00000000`00000004 : 00000000`00320030 fffff803`4fb9c160 ffffc08f`08511750 fffff803`097beecd : kerneld+0xf1c8
ffffc08f`08102b10 00000000`00320030 : fffff803`4fb9c160 ffffc08f`08511750 fffff803`097beecd ffff9780`03f960c0 : 0x4
ffffc08f`08102b18 fffff803`4fb9c160 : ffffc08f`08511750 fffff803`097beecd ffff9780`03f960c0 fffff803`096f7e90 : 0x320030
ffffc08f`08102b20 ffffc08f`08511750 : fffff803`097beecd ffff9780`03f960c0 fffff803`096f7e90 00000000`00000000 : kerneld+0xc160
ffffc08f`08102b28 fffff803`097beecd : ffff9780`03f960c0 fffff803`096f7e90 00000000`00000000 ffff9780`060f8c98 : 0xffffc08f`08511750
ffffc08f`08102b30 fffff803`090f43b5 : ffff9780`015359a0 ffff9780`03f96000 ffff9780`03f960c0 ffff9780`015359a0 : nt!IopLoadUnloadDriver+0xc703d
ffffc08f`08102b70 fffff803`0906bcd5 : ffff9780`03f960c0 00000000`00000080 ffff9780`01477080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffc08f`08102c10 fffff803`091c9998 : fffff803`07284180 ffff9780`03f960c0 fffff803`0906bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc08f`08102c60 00000000`00000000 : ffffc08f`08103000 ffffc08f`080fd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: kerneld+b981
MODULE_NAME: kerneld
IMAGE_NAME: kerneld.x64
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b981
FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffed8000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 12
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffed8000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff80318f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80318e2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80318e2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffed8000000000
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc48a038927f0 -- (.trap 0xffffc48a038927f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffed8000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80318ac46d0 rsp=ffffc48a03892988 rbp=0000000000000004
r8=ffffed8000000000 r9=ffffedf6fb600000 r10=0000000000000002
r11=ffffedf6fb7db7f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff803`18ac46d0 488b01 mov rax,qword ptr [rcx] ds:ffffed80`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffc48a`03892448 fffff803`18c5860a : 00000000`00000050 ffffed80`00000000 00000000`00000000 ffffedf6`fb600000 : nt!KeBugCheckEx
ffffc48a`03892450 fffff803`18ac9c7c : ffffedff`ffffffff ffff910b`19031540 ffffed80`00000000 fffff803`18b21593 : nt!MiInPagePageTable+0x1603fa
ffffc48a`038925a0 fffff803`18ac8fae : ffff910b`16826be0 00000000`00000000 00000000`00000001 ffffed80`00000000 : nt!MiUserFault+0x7dc
ffffc48a`03892650 fffff803`18bd041e : ffffc980`56279180 00000000`00000220 00000000`00000300 ffff910b`12973040 : nt!MmAccessFault+0x14e
ffffc48a`038927f0 fffff803`18ac46d0 : fffff803`18a199b4 ffff910b`12973140 fffff803`18b1507d ffffc980`56279180 : nt!KiPageFault+0x35e
ffffc48a`03892988 fffff803`18a199b4 : ffff910b`12973140 fffff803`18b1507d ffffc980`56279180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
ffffc48a`03892990 fffff803`18a198c2 : 00000000`00000001 00000000`00000000 ffff910b`177a0010 fffff803`18f8f240 : nt!MiMappingHasIoTracker+0x44
ffffc48a`038929c0 fffff803`5d36b981 : ffff910b`177a0000 ffff910b`12973180 fffff803`5d36f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc48a`03892af0 ffff910b`177a0000 : ffff910b`12973180 fffff803`5d36f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc48a`03892af8 ffff910b`12973180 : fffff803`5d36f1c8 00000000`00000004 00000000`00320030 fffff803`5d36c160 : 0xffff910b`177a0000
ffffc48a`03892b00 fffff803`5d36f1c8 : 00000000`00000004 00000000`00320030 fffff803`5d36c160 ffffc48a`02364750 : 0xffff910b`12973180
ffffc48a`03892b08 00000000`00000004 : 00000000`00320030 fffff803`5d36c160 ffffc48a`02364750 fffff803`191beecd : kerneld+0xf1c8
ffffc48a`03892b10 00000000`00320030 : fffff803`5d36c160 ffffc48a`02364750 fffff803`191beecd ffff910b`12973040 : 0x4
ffffc48a`03892b18 fffff803`5d36c160 : ffffc48a`02364750 fffff803`191beecd ffff910b`12973040 fffff803`190f7e90 : 0x320030
ffffc48a`03892b20 ffffc48a`02364750 : fffff803`191beecd ffff910b`12973040 fffff803`190f7e90 00000000`00000300 : kerneld+0xc160
ffffc48a`03892b28 fffff803`191beecd : ffff910b`12973040 fffff803`190f7e90 00000000`00000300 fffff803`18e38bc0 : 0xffffc48a`02364750
ffffc48a`03892b30 fffff803`18af43b5 : ffff910b`09477ce0 ffff910b`09477c00 ffff910b`12973040 ffff910b`16bd86b8 : nt!IopLoadUnloadDriver+0xc703d
ffffc48a`03892b70 fffff803`18a6bcd5 : ffff910b`12973040 00000000`00000080 ffff910b`09479040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffc48a`03892c10 fffff803`18bc9998 : ffffc980`5631d180 ffff910b`12973040 fffff803`18a6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc48a`03892c60 00000000`00000000 : ffffc48a`03893000 ffffc48a`0388d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: kerneld+b981
MODULE_NAME: kerneld
IMAGE_NAME: kerneld.x64
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b981
FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffc8000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 0
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 0
Key : Analysis.Memory.CommitPeak.Mb
Value: 45
Key : Analysis.System
Value: CreateObject
Key : WER.CorruptModuleList
Value: 1
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffffc8000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
fffffc8000000000
MM_INTERNAL_CODE: 6
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
fffff38a`ce917448 fffff801`1ac5860a : 00000000`00000050 fffffc80`00000000 00000000`00000000 fffffcfe`7f200000 : 0xfffff801`1abc2390
fffff38a`ce917450 00000000`00000050 : fffffc80`00000000 00000000`00000000 fffffcfe`7f200000 00000000`00000006 : 0xfffff801`1ac5860a
fffff38a`ce917458 fffffc80`00000000 : 00000000`00000000 fffffcfe`7f200000 00000000`00000006 ffffe284`83ddb600 : <Unloaded_Unknown_Module_00000000`00000000>+0x50
fffff38a`ce917460 00000000`00000000 : fffffcfe`7f200000 00000000`00000006 ffffe284`83ddb600 00000000`00000001 : 0xfffffc80`00000000
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe08000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 12
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe08000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff802653733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026522a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8026522a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe08000000000
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc90e07fe77f0 -- (.trap 0xffffc90e07fe77f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe08000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80264ec46d0 rsp=ffffc90e07fe7988 rbp=0000000000000004
r8=ffffe08000000000 r9=ffffe0f078200000 r10=0000000000000002
r11=ffffe0f0783c17f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff802`64ec46d0 488b01 mov rax,qword ptr [rcx] ds:ffffe080`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffc90e`07fe7448 fffff802`6505860a : 00000000`00000050 ffffe080`00000000 00000000`00000000 ffffe0f0`78200000 : nt!KeBugCheckEx
ffffc90e`07fe7450 fffff802`64ec9c7c : ffffe0ff`ffffffff 00000000`00000000 ffffe080`00000000 ffffa189`9f164010 : nt!MiInPagePageTable+0x1603fa
ffffc90e`07fe75a0 fffff802`64ec8fae : 00000000`00000000 00000000`00000000 00000000`00000001 ffffe080`00000000 : nt!MiUserFault+0x7dc
ffffc90e`07fe7650 fffff802`64fd041e : ffffcb01`026b2180 00000000`000000aa 00000000`00000a00 ffffa189`9c8f7300 : nt!MmAccessFault+0x14e
ffffc90e`07fe77f0 fffff802`64ec46d0 : fffff802`64e199b4 ffffa189`9c8f7400 fffff802`64f1507d ffffcb01`026b2180 : nt!KiPageFault+0x35e
ffffc90e`07fe7988 fffff802`64e199b4 : ffffa189`9c8f7400 fffff802`64f1507d ffffcb01`026b2180 00000000`ffffff00 : nt!MI_READ_PTE_LOCK_FREE
ffffc90e`07fe7990 fffff802`64e198c2 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff802`6538f240 : nt!MiMappingHasIoTracker+0x44
ffffc90e`07fe79c0 fffff802`b1a4b981 : ffffa189`9f7d4e00 ffffa189`9c8f7440 fffff802`b1a4f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc90e`07fe7af0 ffffa189`9f7d4e00 : ffffa189`9c8f7440 fffff802`b1a4f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc90e`07fe7af8 ffffa189`9c8f7440 : fffff802`b1a4f1c8 00000000`00000004 00000000`00320030 fffff802`b1a4c160 : 0xffffa189`9f7d4e00
ffffc90e`07fe7b00 fffff802`b1a4f1c8 : 00000000`00000004 00000000`00320030 fffff802`b1a4c160 ffffc90e`05499750 : 0xffffa189`9c8f7440
ffffc90e`07fe7b08 00000000`00000004 : 00000000`00320030 fffff802`b1a4c160 ffffc90e`05499750 fffff802`655beecd : kerneld+0xf1c8
ffffc90e`07fe7b10 00000000`00320030 : fffff802`b1a4c160 ffffc90e`05499750 fffff802`655beecd ffffa189`9c8f7300 : 0x4
ffffc90e`07fe7b18 fffff802`b1a4c160 : ffffc90e`05499750 fffff802`655beecd ffffa189`9c8f7300 fffff802`654f7e90 : 0x320030
ffffc90e`07fe7b20 ffffc90e`05499750 : fffff802`655beecd ffffa189`9c8f7300 fffff802`654f7e90 00000000`00000a00 : kerneld+0xc160
ffffc90e`07fe7b28 fffff802`655beecd : ffffa189`9c8f7300 fffff802`654f7e90 00000000`00000a00 ffffa189`9f7d4e90 : 0xffffc90e`05499750
ffffc90e`07fe7b30 fffff802`64ef43b5 : ffffa189`8f877ce0 ffffa189`8f877c00 ffffa189`9c8f7300 00000000`00000002 : nt!IopLoadUnloadDriver+0xc703d
ffffc90e`07fe7b70 fffff802`64e6bcd5 : ffffa189`9c8f7300 00000000`00000080 ffffa189`8f879040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffc90e`07fe7c10 fffff802`64fc9998 : fffff802`63454180 ffffa189`9c8f7300 fffff802`64e6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc90e`07fe7c60 00000000`00000000 : ffffc90e`07fe8000 ffffc90e`07fe2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: kerneld+b981
MODULE_NAME: kerneld
IMAGE_NAME: kerneld.x64
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b981
FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}
Followup: MachineOwner
---------
Bellek testi yapar mısın?
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
AIDA64 kullanıyorsan, geçici bir süreliğine kaldırır mısın?
Kod:PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffa98000000000, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000006, (reserved) Debugging Details: ------------------ Could not read faulting driver name *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 3 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-VFOM7MS Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 11 Key : Analysis.Memory.CommitPeak.Mb Value: 70 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: ffffa98000000000 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 6 READ_ADDRESS: fffff803095733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8030942a3c8: Unable to get Flags value from nt!KdVersionBlock fffff8030942a3c8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffa98000000000 MM_INTERNAL_CODE: 6 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: ffffc08f081027f0 -- (.trap 0xffffc08f081027f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffa98000000000 rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000 rip=fffff803090c46d0 rsp=ffffc08f08102988 rbp=0000000000000004 r8=ffffa98000000000 r9=ffffa9d4ea600000 r10=0000000000000002 r11=ffffa9d4ea7537f8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!MI_READ_PTE_LOCK_FREE: fffff803`090c46d0 488b01 mov rax,qword ptr [rcx] ds:ffffa980`00000000=???????????????? Resetting default scope STACK_TEXT: ffffc08f`08102448 fffff803`0925860a : 00000000`00000050 ffffa980`00000000 00000000`00000000 ffffa9d4`ea600000 : nt!KeBugCheckEx ffffc08f`08102450 fffff803`090c9c7c : ffffa9ff`ffffffff 00000000`00000001 ffffa980`00000000 ffffac82`62c222d0 : nt!MiInPagePageTable+0x1603fa ffffc08f`081025a0 fffff803`090c8fae : 00000000`00000000 00000000`00000000 00000000`00000001 ffffa980`00000000 : nt!MiUserFault+0x7dc ffffc08f`08102650 fffff803`091d041e : ffffda80`e7a79180 00000000`000000cc 00000000`00000000 ffff9780`03f960c0 : nt!MmAccessFault+0x14e ffffc08f`081027f0 fffff803`090c46d0 : fffff803`090199b4 ffff9780`03f961c0 fffff803`0911507d ffffda80`e7bc3180 : nt!KiPageFault+0x35e ffffc08f`08102988 fffff803`090199b4 : ffff9780`03f961c0 fffff803`0911507d ffffda80`e7bc3180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE ffffc08f`08102990 fffff803`090198c2 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff803`0958f240 : nt!MiMappingHasIoTracker+0x44 ffffc08f`081029c0 fffff803`4fb9b981 : ffffac82`4a0e2300 ffff9780`03f96200 fffff803`4fb9f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62 ffffc08f`08102af0 ffffac82`4a0e2300 : ffff9780`03f96200 fffff803`4fb9f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981 ffffc08f`08102af8 ffff9780`03f96200 : fffff803`4fb9f1c8 00000000`00000004 00000000`00320030 fffff803`4fb9c160 : 0xffffac82`4a0e2300 ffffc08f`08102b00 fffff803`4fb9f1c8 : 00000000`00000004 00000000`00320030 fffff803`4fb9c160 ffffc08f`08511750 : 0xffff9780`03f96200 ffffc08f`08102b08 00000000`00000004 : 00000000`00320030 fffff803`4fb9c160 ffffc08f`08511750 fffff803`097beecd : kerneld+0xf1c8 ffffc08f`08102b10 00000000`00320030 : fffff803`4fb9c160 ffffc08f`08511750 fffff803`097beecd ffff9780`03f960c0 : 0x4 ffffc08f`08102b18 fffff803`4fb9c160 : ffffc08f`08511750 fffff803`097beecd ffff9780`03f960c0 fffff803`096f7e90 : 0x320030 ffffc08f`08102b20 ffffc08f`08511750 : fffff803`097beecd ffff9780`03f960c0 fffff803`096f7e90 00000000`00000000 : kerneld+0xc160 ffffc08f`08102b28 fffff803`097beecd : ffff9780`03f960c0 fffff803`096f7e90 00000000`00000000 ffff9780`060f8c98 : 0xffffc08f`08511750 ffffc08f`08102b30 fffff803`090f43b5 : ffff9780`015359a0 ffff9780`03f96000 ffff9780`03f960c0 ffff9780`015359a0 : nt!IopLoadUnloadDriver+0xc703d ffffc08f`08102b70 fffff803`0906bcd5 : ffff9780`03f960c0 00000000`00000080 ffff9780`01477080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105 ffffc08f`08102c10 fffff803`091c9998 : fffff803`07284180 ffff9780`03f960c0 fffff803`0906bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffffc08f`08102c60 00000000`00000000 : ffffc08f`08103000 ffffc08f`080fd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: kerneld+b981 MODULE_NAME: kerneld IMAGE_NAME: kerneld.x64 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: b981 FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffed8000000000, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000006, (reserved) Debugging Details: ------------------ Could not read faulting driver name *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 3 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-VFOM7MS Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 12 Key : Analysis.Memory.CommitPeak.Mb Value: 70 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: ffffed8000000000 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 6 READ_ADDRESS: fffff80318f733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff80318e2a3c8: Unable to get Flags value from nt!KdVersionBlock fffff80318e2a3c8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffed8000000000 MM_INTERNAL_CODE: 6 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: ffffc48a038927f0 -- (.trap 0xffffc48a038927f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffed8000000000 rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80318ac46d0 rsp=ffffc48a03892988 rbp=0000000000000004 r8=ffffed8000000000 r9=ffffedf6fb600000 r10=0000000000000002 r11=ffffedf6fb7db7f8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!MI_READ_PTE_LOCK_FREE: fffff803`18ac46d0 488b01 mov rax,qword ptr [rcx] ds:ffffed80`00000000=???????????????? Resetting default scope STACK_TEXT: ffffc48a`03892448 fffff803`18c5860a : 00000000`00000050 ffffed80`00000000 00000000`00000000 ffffedf6`fb600000 : nt!KeBugCheckEx ffffc48a`03892450 fffff803`18ac9c7c : ffffedff`ffffffff ffff910b`19031540 ffffed80`00000000 fffff803`18b21593 : nt!MiInPagePageTable+0x1603fa ffffc48a`038925a0 fffff803`18ac8fae : ffff910b`16826be0 00000000`00000000 00000000`00000001 ffffed80`00000000 : nt!MiUserFault+0x7dc ffffc48a`03892650 fffff803`18bd041e : ffffc980`56279180 00000000`00000220 00000000`00000300 ffff910b`12973040 : nt!MmAccessFault+0x14e ffffc48a`038927f0 fffff803`18ac46d0 : fffff803`18a199b4 ffff910b`12973140 fffff803`18b1507d ffffc980`56279180 : nt!KiPageFault+0x35e ffffc48a`03892988 fffff803`18a199b4 : ffff910b`12973140 fffff803`18b1507d ffffc980`56279180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE ffffc48a`03892990 fffff803`18a198c2 : 00000000`00000001 00000000`00000000 ffff910b`177a0010 fffff803`18f8f240 : nt!MiMappingHasIoTracker+0x44 ffffc48a`038929c0 fffff803`5d36b981 : ffff910b`177a0000 ffff910b`12973180 fffff803`5d36f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62 ffffc48a`03892af0 ffff910b`177a0000 : ffff910b`12973180 fffff803`5d36f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981 ffffc48a`03892af8 ffff910b`12973180 : fffff803`5d36f1c8 00000000`00000004 00000000`00320030 fffff803`5d36c160 : 0xffff910b`177a0000 ffffc48a`03892b00 fffff803`5d36f1c8 : 00000000`00000004 00000000`00320030 fffff803`5d36c160 ffffc48a`02364750 : 0xffff910b`12973180 ffffc48a`03892b08 00000000`00000004 : 00000000`00320030 fffff803`5d36c160 ffffc48a`02364750 fffff803`191beecd : kerneld+0xf1c8 ffffc48a`03892b10 00000000`00320030 : fffff803`5d36c160 ffffc48a`02364750 fffff803`191beecd ffff910b`12973040 : 0x4 ffffc48a`03892b18 fffff803`5d36c160 : ffffc48a`02364750 fffff803`191beecd ffff910b`12973040 fffff803`190f7e90 : 0x320030 ffffc48a`03892b20 ffffc48a`02364750 : fffff803`191beecd ffff910b`12973040 fffff803`190f7e90 00000000`00000300 : kerneld+0xc160 ffffc48a`03892b28 fffff803`191beecd : ffff910b`12973040 fffff803`190f7e90 00000000`00000300 fffff803`18e38bc0 : 0xffffc48a`02364750 ffffc48a`03892b30 fffff803`18af43b5 : ffff910b`09477ce0 ffff910b`09477c00 ffff910b`12973040 ffff910b`16bd86b8 : nt!IopLoadUnloadDriver+0xc703d ffffc48a`03892b70 fffff803`18a6bcd5 : ffff910b`12973040 00000000`00000080 ffff910b`09479040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105 ffffc48a`03892c10 fffff803`18bc9998 : ffffc980`5631d180 ffff910b`12973040 fffff803`18a6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffffc48a`03892c60 00000000`00000000 : ffffc48a`03893000 ffffc48a`0388d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: kerneld+b981 MODULE_NAME: kerneld IMAGE_NAME: kerneld.x64 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: b981 FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffffc8000000000, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000006, (reserved) Debugging Details: ------------------ ***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057. KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 0 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-VFOM7MS Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 0 Key : Analysis.Memory.CommitPeak.Mb Value: 45 Key : Analysis.System Value: CreateObject Key : WER.CorruptModuleList Value: 1 ADDITIONAL_XML: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: fffffc8000000000 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 6 READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols fffffc8000000000 MM_INTERNAL_CODE: 6 CUSTOMER_CRASH_COUNT: 1 STACK_TEXT: fffff38a`ce917448 fffff801`1ac5860a : 00000000`00000050 fffffc80`00000000 00000000`00000000 fffffcfe`7f200000 : 0xfffff801`1abc2390 fffff38a`ce917450 00000000`00000050 : fffffc80`00000000 00000000`00000000 fffffcfe`7f200000 00000000`00000006 : 0xfffff801`1ac5860a fffff38a`ce917458 fffffc80`00000000 : 00000000`00000000 fffffcfe`7f200000 00000000`00000006 ffffe284`83ddb600 : <Unloaded_Unknown_Module_00000000`00000000>+0x50 fffff38a`ce917460 00000000`00000000 : fffffcfe`7f200000 00000000`00000006 ffffe284`83ddb600 00000000`00000001 : 0xfffffc80`00000000 SYMBOL_NAME: ANALYSIS_INCONCLUSIVE MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffe08000000000, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000006, (reserved) Debugging Details: ------------------ Could not read faulting driver name *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 3 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-VFOM7MS Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 12 Key : Analysis.Memory.CommitPeak.Mb Value: 71 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: ffffe08000000000 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 6 READ_ADDRESS: fffff802653733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8026522a3c8: Unable to get Flags value from nt!KdVersionBlock fffff8026522a3c8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffe08000000000 MM_INTERNAL_CODE: 6 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: ffffc90e07fe77f0 -- (.trap 0xffffc90e07fe77f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffe08000000000 rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80264ec46d0 rsp=ffffc90e07fe7988 rbp=0000000000000004 r8=ffffe08000000000 r9=ffffe0f078200000 r10=0000000000000002 r11=ffffe0f0783c17f8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!MI_READ_PTE_LOCK_FREE: fffff802`64ec46d0 488b01 mov rax,qword ptr [rcx] ds:ffffe080`00000000=???????????????? Resetting default scope STACK_TEXT: ffffc90e`07fe7448 fffff802`6505860a : 00000000`00000050 ffffe080`00000000 00000000`00000000 ffffe0f0`78200000 : nt!KeBugCheckEx ffffc90e`07fe7450 fffff802`64ec9c7c : ffffe0ff`ffffffff 00000000`00000000 ffffe080`00000000 ffffa189`9f164010 : nt!MiInPagePageTable+0x1603fa ffffc90e`07fe75a0 fffff802`64ec8fae : 00000000`00000000 00000000`00000000 00000000`00000001 ffffe080`00000000 : nt!MiUserFault+0x7dc ffffc90e`07fe7650 fffff802`64fd041e : ffffcb01`026b2180 00000000`000000aa 00000000`00000a00 ffffa189`9c8f7300 : nt!MmAccessFault+0x14e ffffc90e`07fe77f0 fffff802`64ec46d0 : fffff802`64e199b4 ffffa189`9c8f7400 fffff802`64f1507d ffffcb01`026b2180 : nt!KiPageFault+0x35e ffffc90e`07fe7988 fffff802`64e199b4 : ffffa189`9c8f7400 fffff802`64f1507d ffffcb01`026b2180 00000000`ffffff00 : nt!MI_READ_PTE_LOCK_FREE ffffc90e`07fe7990 fffff802`64e198c2 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff802`6538f240 : nt!MiMappingHasIoTracker+0x44 ffffc90e`07fe79c0 fffff802`b1a4b981 : ffffa189`9f7d4e00 ffffa189`9c8f7440 fffff802`b1a4f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62 ffffc90e`07fe7af0 ffffa189`9f7d4e00 : ffffa189`9c8f7440 fffff802`b1a4f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981 ffffc90e`07fe7af8 ffffa189`9c8f7440 : fffff802`b1a4f1c8 00000000`00000004 00000000`00320030 fffff802`b1a4c160 : 0xffffa189`9f7d4e00 ffffc90e`07fe7b00 fffff802`b1a4f1c8 : 00000000`00000004 00000000`00320030 fffff802`b1a4c160 ffffc90e`05499750 : 0xffffa189`9c8f7440 ffffc90e`07fe7b08 00000000`00000004 : 00000000`00320030 fffff802`b1a4c160 ffffc90e`05499750 fffff802`655beecd : kerneld+0xf1c8 ffffc90e`07fe7b10 00000000`00320030 : fffff802`b1a4c160 ffffc90e`05499750 fffff802`655beecd ffffa189`9c8f7300 : 0x4 ffffc90e`07fe7b18 fffff802`b1a4c160 : ffffc90e`05499750 fffff802`655beecd ffffa189`9c8f7300 fffff802`654f7e90 : 0x320030 ffffc90e`07fe7b20 ffffc90e`05499750 : fffff802`655beecd ffffa189`9c8f7300 fffff802`654f7e90 00000000`00000a00 : kerneld+0xc160 ffffc90e`07fe7b28 fffff802`655beecd : ffffa189`9c8f7300 fffff802`654f7e90 00000000`00000a00 ffffa189`9f7d4e90 : 0xffffc90e`05499750 ffffc90e`07fe7b30 fffff802`64ef43b5 : ffffa189`8f877ce0 ffffa189`8f877c00 ffffa189`9c8f7300 00000000`00000002 : nt!IopLoadUnloadDriver+0xc703d ffffc90e`07fe7b70 fffff802`64e6bcd5 : ffffa189`9c8f7300 00000000`00000080 ffffa189`8f879040 00000000`00000000 : nt!ExpWorkerThread+0x105 ffffc90e`07fe7c10 fffff802`64fc9998 : fffff802`63454180 ffffa189`9c8f7300 fffff802`64e6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffffc90e`07fe7c60 00000000`00000000 : ffffc90e`07fe8000 ffffc90e`07fe2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: kerneld+b981 MODULE_NAME: kerneld IMAGE_NAME: kerneld.x64 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: b981 FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9} Followup: MachineOwner ---------
Yukarıda denilenleri yapın sadece 2004 sürümüne geçmeyin.
Tekrarlarsa Vanguard'ı kaldırın. Defender yerine de kaliteli bir AV kullanın.
BIOS'a gir ve oprimize defaults Save yap. ASUS araçlarını kaldır. Ayrıca Sosyal'den 2004 sürümünü indir ve geçiş yap.
Yüklediğin oyunu nasıl bilmiyorsun? Valorant Vanguard yüklü kaldır.Bir de Vanguard ne bilmiyorum?
Olur, elleme ayarları.RAM'i tekrar 3000MHz'e çeksem sorun olur mu peki?
Yüklediğin oyunu nasıl bilmiyorsun? Valorant Vanguard yüklü kaldır.
Olur, elleme ayarları.
Şimdilik RAM değeri ile oynama, optimize defaults Save yap yeterli BIOS'da. O araç ise bilgisayarınıza olan bir program. Program ekle veya kaldır bölümünden kontrol edebilirsin.