Çözüldü DA-G3 Sistemde Mavi Ekran Hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

meybuzcu

Hectopat
Katılım
26 Mart 2019
Mesajlar
101
Çözümler
1
Yer
Körfez/Kocaeli
Daha fazla  
Cinsiyet
Erkek
Birkaç gündür hata alıyorum. Neden kaynaklandığını çözemedim. Bakabilir misiniz? Minidump

Sistem:
  • AMD RYZEN 5 3600 3.6GHz 16MB Önbellek 6 Çekirdek AM4 MPK İşlemci
  • GIGABYTE B450M S2H 3600MHz(OC) DDR4 Soket AM4 M.2 HDMI DVI VGA mATX Anakart
  • 2xCORSAIR 8GB Vengeance LPX Siyah 3200MHz CL16 DDR4 Single Kit Ram
  • GIGABYTE GeForce RTX 2060 D6 6GB GDDR6 192 Bit Ekran Kartı
  • CORSAIR Carbide Serisi SPEC-DELTA RGB 650W 80+ Bronze Tempered Glass USB 3.0 Mid Tower Kasa
  • WD 500GB Blue SN550 NVMe M.2 SSD
 
Son düzenleyen: Moderatör:
Çözüm
Son olana baktım. Ben SSD sorunu diyorum.

Ek bilgiler:

Klif.sys veya Kaspersky Lab Saldırgan Filtresi, Kaspersky Lab tarafından geliştirilen Kaspersky Antivirus'ün ayrılmaz bir parçasıdır.

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd4e67a69d5f0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8011ae75a53, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klif.sys

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 5421

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 29904

    Key  : Analysis.Init.CPU.mSec
    Value: 452

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3452

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffd4e67a69d5f0

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8011ae75a53

BUGCHECK_P4: 2

READ_ADDRESS: fffff801190fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffd4e67a69d5f0

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  fffff089d7ba0200 -- (.trap 0xfffff089d7ba0200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8011ae75a50 rbx=0000000000000000 rcx=ffffbd0ff06aa6c0
rdx=fffff089d7ba04a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011ae75a53 rsp=fffff089d7ba0398 rbp=fffff089d7ba0818
 r8=ffffd4e67a69d5f0  r9=000100000000127c r10=0000fffff8011ae7
r11=ffff77fe9c000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
Ntfs+0xf5a53:
fffff801`1ae75a53 498b10          mov     rdx,qword ptr [r8] ds:ffffd4e6`7a69d5f0=????????????????
Resetting default scope

STACK_TEXT: 
fffff089`d7b9ff58 fffff801`1884a46f     : 00000000`00000050 ffffd4e6`7a69d5f0 00000000`00000000 fffff089`d7ba0200 : nt!KeBugCheckEx
fffff089`d7b9ff60 fffff801`1869f500     : fffff089`d7ba01b0 00000000`00000000 fffff089`d7ba0280 00000000`00000000 : nt!MiSystemFault+0x18d0bf
fffff089`d7ba0060 fffff801`1880535e     : 00005400`ff445760 ffffbd0f`eb7e2e80 ffffd404`7bd175a8 00000000`00000e30 : nt!MmAccessFault+0x400
fffff089`d7ba0200 fffff801`1ae75a53     : fffff801`18602463 fffff089`d7ba0b10 00000000`00000000 00010000`0000127c : nt!KiPageFault+0x35e
fffff089`d7ba0398 fffff801`18602463     : fffff089`d7ba0b10 00000000`00000000 00010000`0000127c fffff089`d7ba0440 : Ntfs+0xf5a53
fffff089`d7ba03a0 fffff801`1aed3344     : 00010000`0000127c ffffd404`7bd17501 fffff089`d7ba0440 00000000`00000000 : nt!RtlLookupElementGenericTableFullAvl+0x53
fffff089`d7ba03d0 fffff801`1ae5ae6c     : fffff089`d7ba0b10 ffffbd0f`f06aa180 00000000`00000000 00010000`0000127c : Ntfs+0x153344
fffff089`d7ba0510 fffff801`1ae5a0db     : fffff089`d7ba0b10 ffffd404`7bd175a0 fffff801`1ae75b30 00000000`00000000 : Ntfs+0xdae6c
fffff089`d7ba06b0 fffff801`1ae59ee3     : 00000000`00000000 00000000`00000000 ffffd404`7bd175a0 00000000`00000000 : Ntfs+0xda0db
fffff089`d7ba0740 fffff801`1ae59c2d     : ffffd404`7dc2aa80 ffffbd0f`faa88a40 fffff089`d7ba0b10 ffffd404`7bd17700 : Ntfs+0xd9ee3
fffff089`d7ba07a0 fffff801`1ae68865     : ffffd404`7bd17700 ffffd404`7bd17700 fffff089`d7ba0b10 fffff089`d7ba0b10 : Ntfs+0xd9c2d
fffff089`d7ba08c0 fffff801`1ae67e86     : fffff089`d7ba0b10 ffffbd00`01451b10 00000000`000000f8 00000000`00000002 : Ntfs+0xe8865
fffff089`d7ba09c0 fffff801`1ae67d10     : fffff089`d7ba0b10 ffffbd00`01451b10 ffffbd00`01451b10 00000000`00000000 : Ntfs+0xe7e86
fffff089`d7ba0af0 fffff801`1868f865     : ffffbd0f`faa88a40 fffff801`1873346c 00000000`0000000d 00000000`00000000 : Ntfs+0xe7d10
fffff089`d7ba0d90 fffff801`14cd9c75     : ffffbd0f`fdf0bce0 ffffbd0f`faa88a40 ffffbd0f`fc79e72c 00000000`00000000 : nt!IofCallDriver+0x55
fffff089`d7ba0dd0 fffff801`14cda91e     : ffffbd0f`f96d46a0 00000000`00000000 00000000`00000000 ffffbd0f`f96d4708 : FLTMGR!FltpGetFileName+0x195
fffff089`d7ba0e70 fffff801`14cdb18b     : ffffbd0f`fdf0bc00 ffffbd0f`fdf0bce0 ffffbd0f`f0696710 fffff801`18608633 : FLTMGR!FltpGetNormalizedFileNameWorker+0x5e
fffff089`d7ba0ef0 fffff801`14ca2f6e     : ffffbd0f`f96d4708 fffff089`d7ba2000 fffff089`d7b9c000 fffff801`14cca060 : FLTMGR!FltpCreateFileNameInformation+0x2eb
fffff089`d7ba0f70 fffff801`14ca3d31     : 00000000`00008000 fffff089`ffff7fff ffffbd0f`f96d46a0 00000000`00000000 : FLTMGR!FltpGetFileNameInformation+0x39e
fffff089`d7ba1020 fffff801`2ac6d2b0     : ffffbd0f`fdf0bce0 ffffbd0f`f0f42a20 00000000`00000000 ffffbd0f`f96d4701 : FLTMGR!FltGetFileNameInformation+0x101
fffff089`d7ba10b0 fffff801`14cdaa4b     : ffffbd0f`f96d46a0 00000000`00000000 ffffbd0f`f0f42a20 fffff801`1869aed8 : luafv!LuafvGenerateFileName+0x60
fffff089`d7ba10e0 fffff801`14cdb18b     : ffffbd0f`fdf0e600 ffffbd0f`fdf0e650 ffffbd0f`f0696710 fffff801`18608633 : FLTMGR!FltpGetNormalizedFileNameWorker+0x18b
fffff089`d7ba1160 fffff801`14ca2f6e     : ffffbd0f`f96d4708 fffff089`d7ba2000 fffff089`d7b9c000 fffff801`14cca060 : FLTMGR!FltpCreateFileNameInformation+0x2eb
fffff089`d7ba11e0 fffff801`14ca3d31     : 00000000`00008000 fffff089`ffff7fff ffffbd0f`f96d46a0 ffffbd0f`f5ce8010 : FLTMGR!FltpGetFileNameInformation+0x39e
fffff089`d7ba1290 fffff801`262a08c5     : ffffbd0f`fdf0e650 fffff089`d7ba1380 00000000`00000000 ffffbd0f`fcae3bd8 : FLTMGR!FltGetFileNameInformation+0x101
fffff089`d7ba1320 ffffbd0f`fdf0e650     : fffff089`d7ba1380 00000000`00000000 ffffbd0f`fcae3bd8 ffffbd00`0566aa70 : klif+0x308c5
fffff089`d7ba1328 fffff089`d7ba1380     : 00000000`00000000 ffffbd0f`fcae3bd8 ffffbd00`0566aa70 fffff801`26313f7b : 0xffffbd0f`fdf0e650
fffff089`d7ba1330 00000000`00000000     : ffffbd0f`fcae3bd8 ffffbd00`0566aa70 fffff801`26313f7b ffffd404`8a7e55a0 : 0xfffff089`d7ba1380


SYMBOL_NAME:  luafv!LuafvGenerateFileName+60

MODULE_NAME: luafv

IMAGE_NAME:  luafv.sys

IMAGE_VERSION:  10.0.19041.906

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  60

FAILURE_BUCKET_ID:  AV_R_(null)_luafv!LuafvGenerateFileName

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {671b7e5c-ace4-9963-2fb1-2dd533d7c36d}

Followup:     MachineOwner
---------

9: kd> lmvm luafv
Browse full module list
start             end                 module name
fffff801`2ac60000 fffff801`2ac89000   luafv    # (pdb symbols)          C:\ProgramData\Dbg\sym\luafv.pdb\69127C459F6A3C7F158EF932A83638541\luafv.pdb
    Loaded symbol image file: luafv.sys
    Mapped memory image file: C:\ProgramData\Dbg\sym\luafv.sys\86E5647D29000\luafv.sys
    Image path: \SystemRoot\system32\drivers\luafv.sys
    Image name: luafv.sys
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        86E5647D (This is a reproducible build file hash, not a timestamp)
    CheckSum:         000296E7
    ImageSize:        00029000
    File version:     10.0.19041.906
    Product version:  10.0.19041.906
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     luafv.sys
        OriginalFilename: luafv.sys
        ProductVersion:   10.0.19041.906
        FileVersion:      10.0.19041.906 (WinBuild.160101.0800)
        FileDescription:  LUA File Virtualization Filter Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
9: kd> lm
start             end                 module name
ffff81e3`f1600000 ffff81e3`f18d3000   win32kbase   (deferred)             
ffff81e3`f1ad0000 ffff81e3`f1b6a000   win32k   # (pdb symbols)          C:\ProgramData\Dbg\sym\win32k.pdb\AD6D3E11D496C8837D0142839435EE071\win32k.pdb
ffff81e3`f1e80000 ffff81e3`f1ec9000   cdd        (deferred)             
ffff81e3`f23c0000 ffff81e3`f2776000   win32kfull   (deferred)             
fffff801`14a60000 fffff801`14a88000   mcupdate_AuthenticAMD   (deferred)             
fffff801`14a90000 fffff801`14a96000   hal        (deferred)             
fffff801`14aa0000 fffff801`14aab000   kd         (deferred)             
fffff801`14ab0000 fffff801`14ad7000   tm         (deferred)             
fffff801`14ae0000 fffff801`14b49000   CLFS       (deferred)             
fffff801`14b50000 fffff801`14b6a000   PSHED      (deferred)             
fffff801`14b70000 fffff801`14b7b000   BOOTVID    (deferred)             
fffff801`14b80000 fffff801`14c94000   clipsp     (deferred)             
fffff801`14ca0000 fffff801`14d0f000   FLTMGR   # (pdb symbols)          C:\ProgramData\Dbg\sym\fltMgr.pdb\41C0B82054675D3AD752BFF86090EED51\fltMgr.pdb
fffff801`14d10000 fffff801`14d39000   ksecdd     (deferred)             
fffff801`14d40000 fffff801`14da3000   msrpc      (deferred)             
fffff801`14db0000 fffff801`14dbe000   cmimcext   (deferred)             
fffff801`14dc0000 fffff801`14dd1000   werkernel   (deferred)             
fffff801`14de0000 fffff801`14dec000   ntosext    (deferred)             
fffff801`14df0000 fffff801`14e03000   WDFLDR     (deferred)             
fffff801`14e10000 fffff801`14e1f000   SleepStudyHelper   (deferred)             
fffff801`14e20000 fffff801`14e31000   WppRecorder   (deferred)             
fffff801`14e40000 fffff801`14e5a000   SgrmAgent   (deferred)             
fffff801`18400000 fffff801`19446000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\1B4A6F5E0766C552C90710C8ACC0295C1\ntkrnlmp.pdb
fffff801`1a400000 fffff801`1a4e3000   CI         (deferred)             
fffff801`1a4f0000 fffff801`1a5ab000   cng        (deferred)             
fffff801`1a5b0000 fffff801`1a681000   Wdf01000   (deferred)             
fffff801`1a690000 fffff801`1a6b6000   acpiex     (deferred)             
fffff801`1a6c0000 fffff801`1a78c000   ACPI       (deferred)             
fffff801`1a790000 fffff801`1a79c000   WMILIB     (deferred)             
fffff801`1a7b0000 fffff801`1a81b000   intelpep   (deferred)             
fffff801`1a820000 fffff801`1a837000   WindowsTrustedRT   (deferred)             
fffff801`1a840000 fffff801`1a84b000   IntelTA    (deferred)             
fffff801`1a850000 fffff801`1a85b000   WindowsTrustedRTProxy   (deferred)             
fffff801`1a860000 fffff801`1a874000   pcw        (deferred)             
fffff801`1a880000 fffff801`1a8c1000   klupd_klif_arkmon   (deferred)             
fffff801`1a8d0000 fffff801`1a8db000   msisadrv   (deferred)             
fffff801`1a8e0000 fffff801`1a957000   pci        (deferred)             
fffff801`1a960000 fffff801`1a975000   vdrvroot   (deferred)             
fffff801`1a980000 fffff801`1a9bb000   cm_km      (deferred)             
fffff801`1a9c0000 fffff801`1a9ef000   pdc        (deferred)             
fffff801`1a9f0000 fffff801`1aa0a000   CEA        (deferred)             
fffff801`1aa10000 fffff801`1aa41000   partmgr    (deferred)             
fffff801`1aa50000 fffff801`1aafa000   spaceport   (deferred)             
fffff801`1ab00000 fffff801`1ab19000   volmgr     (deferred)             
fffff801`1ab20000 fffff801`1ab83000   volmgrx    (deferred)             
fffff801`1ab90000 fffff801`1abae000   mountmgr   (deferred)             
fffff801`1abb0000 fffff801`1abe2000   storahci   (deferred)             
fffff801`1abf0000 fffff801`1abfd000   Fs_Rec     (deferred)             
fffff801`1ac00000 fffff801`1acb3000   storport   (deferred)             
fffff801`1acc0000 fffff801`1aceb000   stornvme   (deferred)             
fffff801`1acf0000 fffff801`1ad0c000   EhStorClass   (deferred)             
fffff801`1ad10000 fffff801`1ad2a000   fileinfo   (deferred)             
fffff801`1ad30000 fffff801`1ad70000   Wof        (deferred)             
fffff801`1ad80000 fffff801`1b059000   Ntfs     # (no symbols)           
fffff801`1b060000 fffff801`1b1d0000   ndis       (deferred)             
fffff801`1b1e0000 fffff801`1b278000   NETIO      (deferred)             
fffff801`1b280000 fffff801`1b2b2000   ksecpkg    (deferred)             
fffff801`1b2c0000 fffff801`1b2cd000   amdpsp     (deferred)             
fffff801`1b2d0000 fffff801`1b5bc000   tcpip      (deferred)             
fffff801`1b5c0000 fffff801`1b63f000   fwpkclnt   (deferred)             
fffff801`1b640000 fffff801`1b670000   wfplwfs    (deferred)             
fffff801`1b680000 fffff801`1b748000   fvevol     (deferred)             
fffff801`1b750000 fffff801`1b75b000   volume     (deferred)             
fffff801`1b760000 fffff801`1b7cd000   volsnap    (deferred)             
fffff801`1b7d0000 fffff801`1b820000   rdyboost   (deferred)             
fffff801`1b830000 fffff801`1b856000   mup        (deferred)             
fffff801`1b860000 fffff801`1b87a000   klupd_klif_klbg   (deferred)             
fffff801`1b880000 fffff801`1b892000   iorate     (deferred)             
fffff801`1b8c0000 fffff801`1b8dc000   disk       (deferred)             
fffff801`1b8e0000 fffff801`1b94d000   CLASSPNP   (deferred)             
fffff801`1be00000 fffff801`1be6c000   fastfat    (deferred)             
fffff801`1be70000 fffff801`1be87000   bam        (deferred)             
fffff801`1be90000 fffff801`1bede000   ahcache    (deferred)             
fffff801`1bee0000 fffff801`1beed000   kltap      (deferred)             
fffff801`1bef0000 fffff801`1bf02000   CompositeBus   (deferred)             
fffff801`1bf10000 fffff801`1bf1d000   kdnic      (deferred)             
fffff801`1bf20000 fffff801`1bf35000   umbus      (deferred)             
fffff801`1bf90000 fffff801`1bf9a000   gpuenergydrv   (deferred)             
fffff801`1bfa0000 fffff801`1bfa8000   ene        (deferred)             
fffff801`1bfb0000 fffff801`1bfdc000   dfsc       (deferred)             
fffff801`1bfe0000 fffff801`1bff4000   mmcss      (deferred)             
fffff801`26200000 fffff801`26231000   klbackupflt   (deferred)             
fffff801`26240000 fffff801`26255000   filecrypt   (deferred)             
fffff801`26260000 fffff801`2626e000   tbs        (deferred)             
fffff801`26270000 fffff801`26370000   klif     T (no symbols)           
fffff801`26380000 fffff801`263f6000   ks         (deferred)             
fffff801`26400000 fffff801`2658f000   klhk       (deferred)             
fffff801`26590000 fffff801`26637000   klgse      (deferred)             
fffff801`26640000 fffff801`26652000   klpd       (deferred)             
fffff801`26660000 fffff801`2667c000   kldisk     (deferred)             
fffff801`26680000 fffff801`2668a000   Null       (deferred)             
fffff801`26690000 fffff801`2669a000   Beep       (deferred)             
fffff801`266a0000 fffff801`26a4a000   dxgkrnl    (deferred)             
fffff801`26a50000 fffff801`26a68000   watchdog   (deferred)             
fffff801`26a70000 fffff801`26a86000   BasicDisplay   (deferred)             
fffff801`26a90000 fffff801`26aa1000   BasicRender   (deferred)             
fffff801`26ab0000 fffff801`26acc000   Npfs       (deferred)             
fffff801`26ad0000 fffff801`26ae1000   Msfs       (deferred)             
fffff801`26af0000 fffff801`26b0e000   CimFS      (deferred)             
fffff801`26b10000 fffff801`26b34000   klwfp      (deferred)             
fffff801`26b40000 fffff801`26b62000   tdx        (deferred)             
fffff801`26b70000 fffff801`26b80000   TDI        (deferred)             
fffff801`26b90000 fffff801`26bec000   netbt      (deferred)             
fffff801`26bf0000 fffff801`26c03000   afunix     (deferred)             
fffff801`26c10000 fffff801`26cb6000   afd        (deferred)             
fffff801`26cc0000 fffff801`26d0b000   klwtp      (deferred)             
fffff801`26d10000 fffff801`26d25000   klim6      (deferred)             
fffff801`26d30000 fffff801`26d4a000   vwififlt   (deferred)             
fffff801`26d50000 fffff801`26d7b000   pacer      (deferred)             
fffff801`26d80000 fffff801`26d94000   ndiscap    (deferred)             
fffff801`26da0000 fffff801`26db4000   netbios    (deferred)             
fffff801`26dc0000 fffff801`26e62000   Vid        (deferred)             
fffff801`26e70000 fffff801`26e91000   winhvr     (deferred)             
fffff801`26ea0000 fffff801`26eb5000   klpnpflt   (deferred)             
fffff801`26ec0000 fffff801`26f3b000   rdbss      (deferred)             
fffff801`26f40000 fffff801`26f52000   nsiproxy   (deferred)             
fffff801`26f60000 fffff801`26f6e000   npsvctrig   (deferred)             
fffff801`26f70000 fffff801`26f80000   mssmbios # (pdb symbols)          C:\ProgramData\Dbg\sym\mssmbios.pdb\53ADC03D875B3F78AC94CE4D75054C461\mssmbios.pdb
fffff801`26f90000 fffff801`26f97000   MsIo64     (deferred)             
fffff801`26fa0000 fffff801`26fe9000   kneps      (deferred)             
fffff801`27020000 fffff801`2703e000   crashdmp   (deferred)             
fffff801`27040000 fffff801`27086000   mrxsmb20   (deferred)             
fffff801`27090000 fffff801`270e3000   srvnet     (deferred)             
fffff801`27100000 fffff801`27119000   klbackupdisk   (deferred)             
fffff801`27120000 fffff801`27152000   cdrom      (deferred)             
fffff801`27160000 fffff801`271ea000   klflt      (deferred)             
fffff801`27200000 fffff801`2731a000   rt640x64   (deferred)             
fffff801`27320000 fffff801`27938000   RTKVHD64   (deferred)             
fffff801`27940000 fffff801`27a21000   dxgmms2    (deferred)             
fffff801`27a30000 fffff801`27a84000   WUDFRd     (deferred)             
fffff801`27a90000 fffff801`27b12000   cldflt     (deferred)             
fffff801`27b20000 fffff801`27b3a000   storqosflt   (deferred)             
fffff801`27b40000 fffff801`27b68000   bindflt    (deferred)             
fffff801`27b70000 fffff801`27b88000   lltdio     (deferred)             
fffff801`27b90000 fffff801`27ba8000   mslldp     (deferred)             
fffff801`27bb0000 fffff801`27bcb000   rspndr     (deferred)             
fffff801`27bd0000 fffff801`27bed000   wanarp     (deferred)             
fffff801`27bf0000 fffff801`27c46000   msquic     (deferred)             
fffff801`27c50000 fffff801`27dd8000   HTTP       (deferred)             
fffff801`27de0000 fffff801`27e05000   bowser     (deferred)             
fffff801`27e10000 fffff801`27e2a000   mpsdrv     (deferred)             
fffff801`27e30000 fffff801`27e57000   Ndu        (deferred)             
fffff801`27e60000 fffff801`27efa000   USBXHCI    (deferred)             
fffff801`27f00000 fffff801`27f44000   ucx01000   (deferred)             
fffff801`27f50000 fffff801`27fe4000   mrxsmb     (deferred)             
fffff801`2a600000 fffff801`2a621000   drmk       (deferred)             
fffff801`2a630000 fffff801`2a6de000   UcmCxUcsiNvppc   (deferred)             
fffff801`2a6e0000 fffff801`2a70e000   UcmCx      (deferred)             
fffff801`2a710000 fffff801`2a71b000   AMDPCIDev   (deferred)             
fffff801`2a720000 fffff801`2a72d000   amdgpio2   (deferred)             
fffff801`2a730000 fffff801`2a762000   msgpioclx   (deferred)             
fffff801`2a770000 fffff801`2a77c000   wmiacpi    (deferred)             
fffff801`2a780000 fffff801`2a7bb000   amdppm     (deferred)             
fffff801`2a7c0000 fffff801`2a7ca000   amdgpio3   (deferred)             
fffff801`2a7d0000 fffff801`2a7de000   UEFI       (deferred)             
fffff801`2a7e0000 fffff801`2a7f1000   nvvad64v   (deferred)             
fffff801`2a800000 fffff801`2a80f000   ksthunk    (deferred)             
fffff801`2a810000 fffff801`2a81d000   NvModuleTracker   (deferred)             
fffff801`2a820000 fffff801`2a830000   nvvhci     (deferred)             
fffff801`2a840000 fffff801`2a84d000   NdisVirtualBus   (deferred)             
fffff801`2a850000 fffff801`2a85c000   swenum     (deferred)             
fffff801`2a860000 fffff801`2a877000   AmdTools64   (deferred)             
fffff801`2a880000 fffff801`2a88e000   rdpbus     (deferred)             
fffff801`2a890000 fffff801`2a933000   UsbHub3    (deferred)             
fffff801`2a940000 fffff801`2a94e000   USBD       (deferred)             
fffff801`2a950000 fffff801`2a973000   nvhda64v   (deferred)             
fffff801`2a980000 fffff801`2a9a5000   USBSTOR    (deferred)             
fffff801`2a9b0000 fffff801`2a9c2000   hidusb     (deferred)             
fffff801`2a9d0000 fffff801`2aa0f000   HIDCLASS   (deferred)             
fffff801`2aa10000 fffff801`2aa23000   HIDPARSE   (deferred)             
fffff801`2aa30000 fffff801`2aa63000   usbccgp    (deferred)             
fffff801`2aa70000 fffff801`2aa80000   RzDev_008a   (deferred)             
fffff801`2aa90000 fffff801`2aaa1000   kbdhid     (deferred)             
fffff801`2aab0000 fffff801`2aac9000   klkbdflt   (deferred)             
fffff801`2aad0000 fffff801`2aae4000   kbdclass   (deferred)             
fffff801`2aaf0000 fffff801`2ab00000   mouhid     (deferred)             
fffff801`2ab10000 fffff801`2ab2a000   klmouflt   (deferred)             
fffff801`2ab30000 fffff801`2ab43000   mouclass   (deferred)             
fffff801`2ab50000 fffff801`2ab5b000   mshidkmdf   (deferred)             
fffff801`2ab60000 fffff801`2ab70000   RzCommon   (deferred)             
fffff801`2ab90000 fffff801`2ab9e000   dump_dumpstorport   (deferred)             
fffff801`2abd0000 fffff801`2abfb000   dump_stornvme   (deferred)             
fffff801`2ac20000 fffff801`2ac3d000   dump_dumpfve   (deferred)             
fffff801`2ac60000 fffff801`2ac89000   luafv    # (pdb symbols)          C:\ProgramData\Dbg\sym\luafv.pdb\69127C459F6A3C7F158EF932A83638541\luafv.pdb
fffff801`2ac90000 fffff801`2acc6000   wcifs      (deferred)             
fffff801`2acd0000 fffff801`2acde000   WpdUpFltr   (deferred)             
fffff801`2ace0000 fffff801`2d146000   nvlddmkm   (deferred)             
fffff801`2d150000 fffff801`2d179000   HDAudBus   (deferred)             
fffff801`2d180000 fffff801`2d1e6000   portcls    (deferred)             
fffff801`6ba00000 fffff801`6bac7000   srv2       (deferred)             
fffff801`6bad0000 fffff801`6bae5000   tcpipreg   (deferred)             
fffff801`6baf0000 fffff801`6bb0c000   rassstp    (deferred)             
fffff801`6bb10000 fffff801`6bb2d000   NDProxy    (deferred)             
fffff801`6bb30000 fffff801`6bb57000   AgileVpn   (deferred)             
fffff801`6bb60000 fffff801`6bb81000   rasl2tp    (deferred)             
fffff801`6bb90000 fffff801`6bbb1000   raspptp    (deferred)             
fffff801`6bbc0000 fffff801`6bbdc000   raspppoe   (deferred)             
fffff801`6bbe0000 fffff801`6bbef000   ndistapi   (deferred)             
fffff801`6bbf0000 fffff801`6bc2b000   ndiswan    (deferred)             
fffff801`6bc30000 fffff801`6bc68000   klupd_klif_mark   (deferred)             
fffff801`6bc70000 fffff801`6bc82000   condrv     (deferred)             
fffff801`6bc90000 fffff801`6bcd1000   klids      (deferred)             
fffff801`6bce0000 fffff801`6bd2d000   klupd_klif_klark   (deferred)             
fffff801`6bd30000 fffff801`6bd3d000   rdpvideominiport   (deferred)             
fffff801`6bfa0000 fffff801`6bfbb000   monitor    (deferred)             
fffff801`6c2f0000 fffff801`6c3c6000   peauth     (deferred)             

Unloaded modules:
fffff801`6c080000 fffff801`6c08f000   hiber_storpo
fffff801`6c090000 fffff801`6c0bc000   hiber_stornv
fffff801`6c0c0000 fffff801`6c0de000   hiber_dumpfv
fffff801`6c020000 fffff801`6c02f000   hiber_storpo
fffff801`6c030000 fffff801`6c05c000   hiber_stornv
fffff801`6c060000 fffff801`6c07e000   hiber_dumpfv
fffff801`6bfc0000 fffff801`6bfcf000   hiber_storpo
fffff801`6bfd0000 fffff801`6bffc000   hiber_stornv
fffff801`6c000000 fffff801`6c01e000   hiber_dumpfv
fffff801`6be60000 fffff801`6be7c000   monitor.sys
fffff801`6bf40000 fffff801`6bf4f000   hiber_storpo
fffff801`6bf50000 fffff801`6bf7c000   hiber_stornv
fffff801`6bf80000 fffff801`6bf9e000   hiber_dumpfv
fffff801`6bee0000 fffff801`6beef000   hiber_storpo
fffff801`6bef0000 fffff801`6bf1c000   hiber_stornv
fffff801`6bf20000 fffff801`6bf3e000   hiber_dumpfv
fffff801`6be80000 fffff801`6be8f000   hiber_storpo
fffff801`6be90000 fffff801`6bebc000   hiber_stornv
fffff801`6bec0000 fffff801`6bede000   hiber_dumpfv
fffff801`2ac40000 fffff801`2ac5c000   monitor.sys
fffff801`6be00000 fffff801`6be0f000   hiber_storpo
fffff801`6be10000 fffff801`6be3c000   hiber_stornv
fffff801`6be40000 fffff801`6be5e000   hiber_dumpfv
fffff801`6bda0000 fffff801`6bdaf000   hiber_storpo
fffff801`6bdb0000 fffff801`6bddc000   hiber_stornv
fffff801`6bde0000 fffff801`6bdfe000   hiber_dumpfv
fffff801`6bd40000 fffff801`6bd4f000   hiber_storpo
fffff801`6bd50000 fffff801`6bd7c000   hiber_stornv
fffff801`6bd80000 fffff801`6bd9e000   hiber_dumpfv
fffff801`1bf40000 fffff801`1bf82000   klids.sys
fffff801`27050000 fffff801`2705f000   dump_storpor
fffff801`27090000 fffff801`270bc000   dump_stornvm
fffff801`270e0000 fffff801`270fe000   dump_dumpfve
fffff801`1bfe0000 fffff801`1bffc000   dam.sys
fffff801`1a7a0000 fffff801`1a7af000   klelam.sys
fffff801`1b8a0000 fffff801`1b8b1000   hwpolicy.sys
9: kd> lmDvmklif
Browse full module list
start             end                 module name
fffff801`26270000 fffff801`26370000   klif     T (no symbols)           
    Loaded symbol image file: klif.sys
    Image path: \SystemRoot\system32\DRIVERS\klif.sys
    Image name: klif.sys
    Browse all global symbols  functions  data
    Timestamp:        Fri Feb 19 14:51:01 2021 (602FA625)
    CheckSum:         0010C5A3
    ImageSize:        00100000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
Son olana baktım. Ben SSD sorunu diyorum.

Ek bilgiler:

Klif.sys veya Kaspersky Lab Saldırgan Filtresi, Kaspersky Lab tarafından geliştirilen Kaspersky Antivirus'ün ayrılmaz bir parçasıdır.

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd4e67a69d5f0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8011ae75a53, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klif.sys

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 5421

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 29904

    Key  : Analysis.Init.CPU.mSec
    Value: 452

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3452

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffd4e67a69d5f0

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8011ae75a53

BUGCHECK_P4: 2

READ_ADDRESS: fffff801190fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffd4e67a69d5f0

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  fffff089d7ba0200 -- (.trap 0xfffff089d7ba0200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8011ae75a50 rbx=0000000000000000 rcx=ffffbd0ff06aa6c0
rdx=fffff089d7ba04a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011ae75a53 rsp=fffff089d7ba0398 rbp=fffff089d7ba0818
 r8=ffffd4e67a69d5f0  r9=000100000000127c r10=0000fffff8011ae7
r11=ffff77fe9c000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
Ntfs+0xf5a53:
fffff801`1ae75a53 498b10          mov     rdx,qword ptr [r8] ds:ffffd4e6`7a69d5f0=????????????????
Resetting default scope

STACK_TEXT: 
fffff089`d7b9ff58 fffff801`1884a46f     : 00000000`00000050 ffffd4e6`7a69d5f0 00000000`00000000 fffff089`d7ba0200 : nt!KeBugCheckEx
fffff089`d7b9ff60 fffff801`1869f500     : fffff089`d7ba01b0 00000000`00000000 fffff089`d7ba0280 00000000`00000000 : nt!MiSystemFault+0x18d0bf
fffff089`d7ba0060 fffff801`1880535e     : 00005400`ff445760 ffffbd0f`eb7e2e80 ffffd404`7bd175a8 00000000`00000e30 : nt!MmAccessFault+0x400
fffff089`d7ba0200 fffff801`1ae75a53     : fffff801`18602463 fffff089`d7ba0b10 00000000`00000000 00010000`0000127c : nt!KiPageFault+0x35e
fffff089`d7ba0398 fffff801`18602463     : fffff089`d7ba0b10 00000000`00000000 00010000`0000127c fffff089`d7ba0440 : Ntfs+0xf5a53
fffff089`d7ba03a0 fffff801`1aed3344     : 00010000`0000127c ffffd404`7bd17501 fffff089`d7ba0440 00000000`00000000 : nt!RtlLookupElementGenericTableFullAvl+0x53
fffff089`d7ba03d0 fffff801`1ae5ae6c     : fffff089`d7ba0b10 ffffbd0f`f06aa180 00000000`00000000 00010000`0000127c : Ntfs+0x153344
fffff089`d7ba0510 fffff801`1ae5a0db     : fffff089`d7ba0b10 ffffd404`7bd175a0 fffff801`1ae75b30 00000000`00000000 : Ntfs+0xdae6c
fffff089`d7ba06b0 fffff801`1ae59ee3     : 00000000`00000000 00000000`00000000 ffffd404`7bd175a0 00000000`00000000 : Ntfs+0xda0db
fffff089`d7ba0740 fffff801`1ae59c2d     : ffffd404`7dc2aa80 ffffbd0f`faa88a40 fffff089`d7ba0b10 ffffd404`7bd17700 : Ntfs+0xd9ee3
fffff089`d7ba07a0 fffff801`1ae68865     : ffffd404`7bd17700 ffffd404`7bd17700 fffff089`d7ba0b10 fffff089`d7ba0b10 : Ntfs+0xd9c2d
fffff089`d7ba08c0 fffff801`1ae67e86     : fffff089`d7ba0b10 ffffbd00`01451b10 00000000`000000f8 00000000`00000002 : Ntfs+0xe8865
fffff089`d7ba09c0 fffff801`1ae67d10     : fffff089`d7ba0b10 ffffbd00`01451b10 ffffbd00`01451b10 00000000`00000000 : Ntfs+0xe7e86
fffff089`d7ba0af0 fffff801`1868f865     : ffffbd0f`faa88a40 fffff801`1873346c 00000000`0000000d 00000000`00000000 : Ntfs+0xe7d10
fffff089`d7ba0d90 fffff801`14cd9c75     : ffffbd0f`fdf0bce0 ffffbd0f`faa88a40 ffffbd0f`fc79e72c 00000000`00000000 : nt!IofCallDriver+0x55
fffff089`d7ba0dd0 fffff801`14cda91e     : ffffbd0f`f96d46a0 00000000`00000000 00000000`00000000 ffffbd0f`f96d4708 : FLTMGR!FltpGetFileName+0x195
fffff089`d7ba0e70 fffff801`14cdb18b     : ffffbd0f`fdf0bc00 ffffbd0f`fdf0bce0 ffffbd0f`f0696710 fffff801`18608633 : FLTMGR!FltpGetNormalizedFileNameWorker+0x5e
fffff089`d7ba0ef0 fffff801`14ca2f6e     : ffffbd0f`f96d4708 fffff089`d7ba2000 fffff089`d7b9c000 fffff801`14cca060 : FLTMGR!FltpCreateFileNameInformation+0x2eb
fffff089`d7ba0f70 fffff801`14ca3d31     : 00000000`00008000 fffff089`ffff7fff ffffbd0f`f96d46a0 00000000`00000000 : FLTMGR!FltpGetFileNameInformation+0x39e
fffff089`d7ba1020 fffff801`2ac6d2b0     : ffffbd0f`fdf0bce0 ffffbd0f`f0f42a20 00000000`00000000 ffffbd0f`f96d4701 : FLTMGR!FltGetFileNameInformation+0x101
fffff089`d7ba10b0 fffff801`14cdaa4b     : ffffbd0f`f96d46a0 00000000`00000000 ffffbd0f`f0f42a20 fffff801`1869aed8 : luafv!LuafvGenerateFileName+0x60
fffff089`d7ba10e0 fffff801`14cdb18b     : ffffbd0f`fdf0e600 ffffbd0f`fdf0e650 ffffbd0f`f0696710 fffff801`18608633 : FLTMGR!FltpGetNormalizedFileNameWorker+0x18b
fffff089`d7ba1160 fffff801`14ca2f6e     : ffffbd0f`f96d4708 fffff089`d7ba2000 fffff089`d7b9c000 fffff801`14cca060 : FLTMGR!FltpCreateFileNameInformation+0x2eb
fffff089`d7ba11e0 fffff801`14ca3d31     : 00000000`00008000 fffff089`ffff7fff ffffbd0f`f96d46a0 ffffbd0f`f5ce8010 : FLTMGR!FltpGetFileNameInformation+0x39e
fffff089`d7ba1290 fffff801`262a08c5     : ffffbd0f`fdf0e650 fffff089`d7ba1380 00000000`00000000 ffffbd0f`fcae3bd8 : FLTMGR!FltGetFileNameInformation+0x101
fffff089`d7ba1320 ffffbd0f`fdf0e650     : fffff089`d7ba1380 00000000`00000000 ffffbd0f`fcae3bd8 ffffbd00`0566aa70 : klif+0x308c5
fffff089`d7ba1328 fffff089`d7ba1380     : 00000000`00000000 ffffbd0f`fcae3bd8 ffffbd00`0566aa70 fffff801`26313f7b : 0xffffbd0f`fdf0e650
fffff089`d7ba1330 00000000`00000000     : ffffbd0f`fcae3bd8 ffffbd00`0566aa70 fffff801`26313f7b ffffd404`8a7e55a0 : 0xfffff089`d7ba1380


SYMBOL_NAME:  luafv!LuafvGenerateFileName+60

MODULE_NAME: luafv

IMAGE_NAME:  luafv.sys

IMAGE_VERSION:  10.0.19041.906

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  60

FAILURE_BUCKET_ID:  AV_R_(null)_luafv!LuafvGenerateFileName

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {671b7e5c-ace4-9963-2fb1-2dd533d7c36d}

Followup:     MachineOwner
---------

9: kd> lmvm luafv
Browse full module list
start             end                 module name
fffff801`2ac60000 fffff801`2ac89000   luafv    # (pdb symbols)          C:\ProgramData\Dbg\sym\luafv.pdb\69127C459F6A3C7F158EF932A83638541\luafv.pdb
    Loaded symbol image file: luafv.sys
    Mapped memory image file: C:\ProgramData\Dbg\sym\luafv.sys\86E5647D29000\luafv.sys
    Image path: \SystemRoot\system32\drivers\luafv.sys
    Image name: luafv.sys
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        86E5647D (This is a reproducible build file hash, not a timestamp)
    CheckSum:         000296E7
    ImageSize:        00029000
    File version:     10.0.19041.906
    Product version:  10.0.19041.906
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     luafv.sys
        OriginalFilename: luafv.sys
        ProductVersion:   10.0.19041.906
        FileVersion:      10.0.19041.906 (WinBuild.160101.0800)
        FileDescription:  LUA File Virtualization Filter Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
9: kd> lm
start             end                 module name
ffff81e3`f1600000 ffff81e3`f18d3000   win32kbase   (deferred)             
ffff81e3`f1ad0000 ffff81e3`f1b6a000   win32k   # (pdb symbols)          C:\ProgramData\Dbg\sym\win32k.pdb\AD6D3E11D496C8837D0142839435EE071\win32k.pdb
ffff81e3`f1e80000 ffff81e3`f1ec9000   cdd        (deferred)             
ffff81e3`f23c0000 ffff81e3`f2776000   win32kfull   (deferred)             
fffff801`14a60000 fffff801`14a88000   mcupdate_AuthenticAMD   (deferred)             
fffff801`14a90000 fffff801`14a96000   hal        (deferred)             
fffff801`14aa0000 fffff801`14aab000   kd         (deferred)             
fffff801`14ab0000 fffff801`14ad7000   tm         (deferred)             
fffff801`14ae0000 fffff801`14b49000   CLFS       (deferred)             
fffff801`14b50000 fffff801`14b6a000   PSHED      (deferred)             
fffff801`14b70000 fffff801`14b7b000   BOOTVID    (deferred)             
fffff801`14b80000 fffff801`14c94000   clipsp     (deferred)             
fffff801`14ca0000 fffff801`14d0f000   FLTMGR   # (pdb symbols)          C:\ProgramData\Dbg\sym\fltMgr.pdb\41C0B82054675D3AD752BFF86090EED51\fltMgr.pdb
fffff801`14d10000 fffff801`14d39000   ksecdd     (deferred)             
fffff801`14d40000 fffff801`14da3000   msrpc      (deferred)             
fffff801`14db0000 fffff801`14dbe000   cmimcext   (deferred)             
fffff801`14dc0000 fffff801`14dd1000   werkernel   (deferred)             
fffff801`14de0000 fffff801`14dec000   ntosext    (deferred)             
fffff801`14df0000 fffff801`14e03000   WDFLDR     (deferred)             
fffff801`14e10000 fffff801`14e1f000   SleepStudyHelper   (deferred)             
fffff801`14e20000 fffff801`14e31000   WppRecorder   (deferred)             
fffff801`14e40000 fffff801`14e5a000   SgrmAgent   (deferred)             
fffff801`18400000 fffff801`19446000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\1B4A6F5E0766C552C90710C8ACC0295C1\ntkrnlmp.pdb
fffff801`1a400000 fffff801`1a4e3000   CI         (deferred)             
fffff801`1a4f0000 fffff801`1a5ab000   cng        (deferred)             
fffff801`1a5b0000 fffff801`1a681000   Wdf01000   (deferred)             
fffff801`1a690000 fffff801`1a6b6000   acpiex     (deferred)             
fffff801`1a6c0000 fffff801`1a78c000   ACPI       (deferred)             
fffff801`1a790000 fffff801`1a79c000   WMILIB     (deferred)             
fffff801`1a7b0000 fffff801`1a81b000   intelpep   (deferred)             
fffff801`1a820000 fffff801`1a837000   WindowsTrustedRT   (deferred)             
fffff801`1a840000 fffff801`1a84b000   IntelTA    (deferred)             
fffff801`1a850000 fffff801`1a85b000   WindowsTrustedRTProxy   (deferred)             
fffff801`1a860000 fffff801`1a874000   pcw        (deferred)             
fffff801`1a880000 fffff801`1a8c1000   klupd_klif_arkmon   (deferred)             
fffff801`1a8d0000 fffff801`1a8db000   msisadrv   (deferred)             
fffff801`1a8e0000 fffff801`1a957000   pci        (deferred)             
fffff801`1a960000 fffff801`1a975000   vdrvroot   (deferred)             
fffff801`1a980000 fffff801`1a9bb000   cm_km      (deferred)             
fffff801`1a9c0000 fffff801`1a9ef000   pdc        (deferred)             
fffff801`1a9f0000 fffff801`1aa0a000   CEA        (deferred)             
fffff801`1aa10000 fffff801`1aa41000   partmgr    (deferred)             
fffff801`1aa50000 fffff801`1aafa000   spaceport   (deferred)             
fffff801`1ab00000 fffff801`1ab19000   volmgr     (deferred)             
fffff801`1ab20000 fffff801`1ab83000   volmgrx    (deferred)             
fffff801`1ab90000 fffff801`1abae000   mountmgr   (deferred)             
fffff801`1abb0000 fffff801`1abe2000   storahci   (deferred)             
fffff801`1abf0000 fffff801`1abfd000   Fs_Rec     (deferred)             
fffff801`1ac00000 fffff801`1acb3000   storport   (deferred)             
fffff801`1acc0000 fffff801`1aceb000   stornvme   (deferred)             
fffff801`1acf0000 fffff801`1ad0c000   EhStorClass   (deferred)             
fffff801`1ad10000 fffff801`1ad2a000   fileinfo   (deferred)             
fffff801`1ad30000 fffff801`1ad70000   Wof        (deferred)             
fffff801`1ad80000 fffff801`1b059000   Ntfs     # (no symbols)           
fffff801`1b060000 fffff801`1b1d0000   ndis       (deferred)             
fffff801`1b1e0000 fffff801`1b278000   NETIO      (deferred)             
fffff801`1b280000 fffff801`1b2b2000   ksecpkg    (deferred)             
fffff801`1b2c0000 fffff801`1b2cd000   amdpsp     (deferred)             
fffff801`1b2d0000 fffff801`1b5bc000   tcpip      (deferred)             
fffff801`1b5c0000 fffff801`1b63f000   fwpkclnt   (deferred)             
fffff801`1b640000 fffff801`1b670000   wfplwfs    (deferred)             
fffff801`1b680000 fffff801`1b748000   fvevol     (deferred)             
fffff801`1b750000 fffff801`1b75b000   volume     (deferred)             
fffff801`1b760000 fffff801`1b7cd000   volsnap    (deferred)             
fffff801`1b7d0000 fffff801`1b820000   rdyboost   (deferred)             
fffff801`1b830000 fffff801`1b856000   mup        (deferred)             
fffff801`1b860000 fffff801`1b87a000   klupd_klif_klbg   (deferred)             
fffff801`1b880000 fffff801`1b892000   iorate     (deferred)             
fffff801`1b8c0000 fffff801`1b8dc000   disk       (deferred)             
fffff801`1b8e0000 fffff801`1b94d000   CLASSPNP   (deferred)             
fffff801`1be00000 fffff801`1be6c000   fastfat    (deferred)             
fffff801`1be70000 fffff801`1be87000   bam        (deferred)             
fffff801`1be90000 fffff801`1bede000   ahcache    (deferred)             
fffff801`1bee0000 fffff801`1beed000   kltap      (deferred)             
fffff801`1bef0000 fffff801`1bf02000   CompositeBus   (deferred)             
fffff801`1bf10000 fffff801`1bf1d000   kdnic      (deferred)             
fffff801`1bf20000 fffff801`1bf35000   umbus      (deferred)             
fffff801`1bf90000 fffff801`1bf9a000   gpuenergydrv   (deferred)             
fffff801`1bfa0000 fffff801`1bfa8000   ene        (deferred)             
fffff801`1bfb0000 fffff801`1bfdc000   dfsc       (deferred)             
fffff801`1bfe0000 fffff801`1bff4000   mmcss      (deferred)             
fffff801`26200000 fffff801`26231000   klbackupflt   (deferred)             
fffff801`26240000 fffff801`26255000   filecrypt   (deferred)             
fffff801`26260000 fffff801`2626e000   tbs        (deferred)             
fffff801`26270000 fffff801`26370000   klif     T (no symbols)           
fffff801`26380000 fffff801`263f6000   ks         (deferred)             
fffff801`26400000 fffff801`2658f000   klhk       (deferred)             
fffff801`26590000 fffff801`26637000   klgse      (deferred)             
fffff801`26640000 fffff801`26652000   klpd       (deferred)             
fffff801`26660000 fffff801`2667c000   kldisk     (deferred)             
fffff801`26680000 fffff801`2668a000   Null       (deferred)             
fffff801`26690000 fffff801`2669a000   Beep       (deferred)             
fffff801`266a0000 fffff801`26a4a000   dxgkrnl    (deferred)             
fffff801`26a50000 fffff801`26a68000   watchdog   (deferred)             
fffff801`26a70000 fffff801`26a86000   BasicDisplay   (deferred)             
fffff801`26a90000 fffff801`26aa1000   BasicRender   (deferred)             
fffff801`26ab0000 fffff801`26acc000   Npfs       (deferred)             
fffff801`26ad0000 fffff801`26ae1000   Msfs       (deferred)             
fffff801`26af0000 fffff801`26b0e000   CimFS      (deferred)             
fffff801`26b10000 fffff801`26b34000   klwfp      (deferred)             
fffff801`26b40000 fffff801`26b62000   tdx        (deferred)             
fffff801`26b70000 fffff801`26b80000   TDI        (deferred)             
fffff801`26b90000 fffff801`26bec000   netbt      (deferred)             
fffff801`26bf0000 fffff801`26c03000   afunix     (deferred)             
fffff801`26c10000 fffff801`26cb6000   afd        (deferred)             
fffff801`26cc0000 fffff801`26d0b000   klwtp      (deferred)             
fffff801`26d10000 fffff801`26d25000   klim6      (deferred)             
fffff801`26d30000 fffff801`26d4a000   vwififlt   (deferred)             
fffff801`26d50000 fffff801`26d7b000   pacer      (deferred)             
fffff801`26d80000 fffff801`26d94000   ndiscap    (deferred)             
fffff801`26da0000 fffff801`26db4000   netbios    (deferred)             
fffff801`26dc0000 fffff801`26e62000   Vid        (deferred)             
fffff801`26e70000 fffff801`26e91000   winhvr     (deferred)             
fffff801`26ea0000 fffff801`26eb5000   klpnpflt   (deferred)             
fffff801`26ec0000 fffff801`26f3b000   rdbss      (deferred)             
fffff801`26f40000 fffff801`26f52000   nsiproxy   (deferred)             
fffff801`26f60000 fffff801`26f6e000   npsvctrig   (deferred)             
fffff801`26f70000 fffff801`26f80000   mssmbios # (pdb symbols)          C:\ProgramData\Dbg\sym\mssmbios.pdb\53ADC03D875B3F78AC94CE4D75054C461\mssmbios.pdb
fffff801`26f90000 fffff801`26f97000   MsIo64     (deferred)             
fffff801`26fa0000 fffff801`26fe9000   kneps      (deferred)             
fffff801`27020000 fffff801`2703e000   crashdmp   (deferred)             
fffff801`27040000 fffff801`27086000   mrxsmb20   (deferred)             
fffff801`27090000 fffff801`270e3000   srvnet     (deferred)             
fffff801`27100000 fffff801`27119000   klbackupdisk   (deferred)             
fffff801`27120000 fffff801`27152000   cdrom      (deferred)             
fffff801`27160000 fffff801`271ea000   klflt      (deferred)             
fffff801`27200000 fffff801`2731a000   rt640x64   (deferred)             
fffff801`27320000 fffff801`27938000   RTKVHD64   (deferred)             
fffff801`27940000 fffff801`27a21000   dxgmms2    (deferred)             
fffff801`27a30000 fffff801`27a84000   WUDFRd     (deferred)             
fffff801`27a90000 fffff801`27b12000   cldflt     (deferred)             
fffff801`27b20000 fffff801`27b3a000   storqosflt   (deferred)             
fffff801`27b40000 fffff801`27b68000   bindflt    (deferred)             
fffff801`27b70000 fffff801`27b88000   lltdio     (deferred)             
fffff801`27b90000 fffff801`27ba8000   mslldp     (deferred)             
fffff801`27bb0000 fffff801`27bcb000   rspndr     (deferred)             
fffff801`27bd0000 fffff801`27bed000   wanarp     (deferred)             
fffff801`27bf0000 fffff801`27c46000   msquic     (deferred)             
fffff801`27c50000 fffff801`27dd8000   HTTP       (deferred)             
fffff801`27de0000 fffff801`27e05000   bowser     (deferred)             
fffff801`27e10000 fffff801`27e2a000   mpsdrv     (deferred)             
fffff801`27e30000 fffff801`27e57000   Ndu        (deferred)             
fffff801`27e60000 fffff801`27efa000   USBXHCI    (deferred)             
fffff801`27f00000 fffff801`27f44000   ucx01000   (deferred)             
fffff801`27f50000 fffff801`27fe4000   mrxsmb     (deferred)             
fffff801`2a600000 fffff801`2a621000   drmk       (deferred)             
fffff801`2a630000 fffff801`2a6de000   UcmCxUcsiNvppc   (deferred)             
fffff801`2a6e0000 fffff801`2a70e000   UcmCx      (deferred)             
fffff801`2a710000 fffff801`2a71b000   AMDPCIDev   (deferred)             
fffff801`2a720000 fffff801`2a72d000   amdgpio2   (deferred)             
fffff801`2a730000 fffff801`2a762000   msgpioclx   (deferred)             
fffff801`2a770000 fffff801`2a77c000   wmiacpi    (deferred)             
fffff801`2a780000 fffff801`2a7bb000   amdppm     (deferred)             
fffff801`2a7c0000 fffff801`2a7ca000   amdgpio3   (deferred)             
fffff801`2a7d0000 fffff801`2a7de000   UEFI       (deferred)             
fffff801`2a7e0000 fffff801`2a7f1000   nvvad64v   (deferred)             
fffff801`2a800000 fffff801`2a80f000   ksthunk    (deferred)             
fffff801`2a810000 fffff801`2a81d000   NvModuleTracker   (deferred)             
fffff801`2a820000 fffff801`2a830000   nvvhci     (deferred)             
fffff801`2a840000 fffff801`2a84d000   NdisVirtualBus   (deferred)             
fffff801`2a850000 fffff801`2a85c000   swenum     (deferred)             
fffff801`2a860000 fffff801`2a877000   AmdTools64   (deferred)             
fffff801`2a880000 fffff801`2a88e000   rdpbus     (deferred)             
fffff801`2a890000 fffff801`2a933000   UsbHub3    (deferred)             
fffff801`2a940000 fffff801`2a94e000   USBD       (deferred)             
fffff801`2a950000 fffff801`2a973000   nvhda64v   (deferred)             
fffff801`2a980000 fffff801`2a9a5000   USBSTOR    (deferred)             
fffff801`2a9b0000 fffff801`2a9c2000   hidusb     (deferred)             
fffff801`2a9d0000 fffff801`2aa0f000   HIDCLASS   (deferred)             
fffff801`2aa10000 fffff801`2aa23000   HIDPARSE   (deferred)             
fffff801`2aa30000 fffff801`2aa63000   usbccgp    (deferred)             
fffff801`2aa70000 fffff801`2aa80000   RzDev_008a   (deferred)             
fffff801`2aa90000 fffff801`2aaa1000   kbdhid     (deferred)             
fffff801`2aab0000 fffff801`2aac9000   klkbdflt   (deferred)             
fffff801`2aad0000 fffff801`2aae4000   kbdclass   (deferred)             
fffff801`2aaf0000 fffff801`2ab00000   mouhid     (deferred)             
fffff801`2ab10000 fffff801`2ab2a000   klmouflt   (deferred)             
fffff801`2ab30000 fffff801`2ab43000   mouclass   (deferred)             
fffff801`2ab50000 fffff801`2ab5b000   mshidkmdf   (deferred)             
fffff801`2ab60000 fffff801`2ab70000   RzCommon   (deferred)             
fffff801`2ab90000 fffff801`2ab9e000   dump_dumpstorport   (deferred)             
fffff801`2abd0000 fffff801`2abfb000   dump_stornvme   (deferred)             
fffff801`2ac20000 fffff801`2ac3d000   dump_dumpfve   (deferred)             
fffff801`2ac60000 fffff801`2ac89000   luafv    # (pdb symbols)          C:\ProgramData\Dbg\sym\luafv.pdb\69127C459F6A3C7F158EF932A83638541\luafv.pdb
fffff801`2ac90000 fffff801`2acc6000   wcifs      (deferred)             
fffff801`2acd0000 fffff801`2acde000   WpdUpFltr   (deferred)             
fffff801`2ace0000 fffff801`2d146000   nvlddmkm   (deferred)             
fffff801`2d150000 fffff801`2d179000   HDAudBus   (deferred)             
fffff801`2d180000 fffff801`2d1e6000   portcls    (deferred)             
fffff801`6ba00000 fffff801`6bac7000   srv2       (deferred)             
fffff801`6bad0000 fffff801`6bae5000   tcpipreg   (deferred)             
fffff801`6baf0000 fffff801`6bb0c000   rassstp    (deferred)             
fffff801`6bb10000 fffff801`6bb2d000   NDProxy    (deferred)             
fffff801`6bb30000 fffff801`6bb57000   AgileVpn   (deferred)             
fffff801`6bb60000 fffff801`6bb81000   rasl2tp    (deferred)             
fffff801`6bb90000 fffff801`6bbb1000   raspptp    (deferred)             
fffff801`6bbc0000 fffff801`6bbdc000   raspppoe   (deferred)             
fffff801`6bbe0000 fffff801`6bbef000   ndistapi   (deferred)             
fffff801`6bbf0000 fffff801`6bc2b000   ndiswan    (deferred)             
fffff801`6bc30000 fffff801`6bc68000   klupd_klif_mark   (deferred)             
fffff801`6bc70000 fffff801`6bc82000   condrv     (deferred)             
fffff801`6bc90000 fffff801`6bcd1000   klids      (deferred)             
fffff801`6bce0000 fffff801`6bd2d000   klupd_klif_klark   (deferred)             
fffff801`6bd30000 fffff801`6bd3d000   rdpvideominiport   (deferred)             
fffff801`6bfa0000 fffff801`6bfbb000   monitor    (deferred)             
fffff801`6c2f0000 fffff801`6c3c6000   peauth     (deferred)             

Unloaded modules:
fffff801`6c080000 fffff801`6c08f000   hiber_storpo
fffff801`6c090000 fffff801`6c0bc000   hiber_stornv
fffff801`6c0c0000 fffff801`6c0de000   hiber_dumpfv
fffff801`6c020000 fffff801`6c02f000   hiber_storpo
fffff801`6c030000 fffff801`6c05c000   hiber_stornv
fffff801`6c060000 fffff801`6c07e000   hiber_dumpfv
fffff801`6bfc0000 fffff801`6bfcf000   hiber_storpo
fffff801`6bfd0000 fffff801`6bffc000   hiber_stornv
fffff801`6c000000 fffff801`6c01e000   hiber_dumpfv
fffff801`6be60000 fffff801`6be7c000   monitor.sys
fffff801`6bf40000 fffff801`6bf4f000   hiber_storpo
fffff801`6bf50000 fffff801`6bf7c000   hiber_stornv
fffff801`6bf80000 fffff801`6bf9e000   hiber_dumpfv
fffff801`6bee0000 fffff801`6beef000   hiber_storpo
fffff801`6bef0000 fffff801`6bf1c000   hiber_stornv
fffff801`6bf20000 fffff801`6bf3e000   hiber_dumpfv
fffff801`6be80000 fffff801`6be8f000   hiber_storpo
fffff801`6be90000 fffff801`6bebc000   hiber_stornv
fffff801`6bec0000 fffff801`6bede000   hiber_dumpfv
fffff801`2ac40000 fffff801`2ac5c000   monitor.sys
fffff801`6be00000 fffff801`6be0f000   hiber_storpo
fffff801`6be10000 fffff801`6be3c000   hiber_stornv
fffff801`6be40000 fffff801`6be5e000   hiber_dumpfv
fffff801`6bda0000 fffff801`6bdaf000   hiber_storpo
fffff801`6bdb0000 fffff801`6bddc000   hiber_stornv
fffff801`6bde0000 fffff801`6bdfe000   hiber_dumpfv
fffff801`6bd40000 fffff801`6bd4f000   hiber_storpo
fffff801`6bd50000 fffff801`6bd7c000   hiber_stornv
fffff801`6bd80000 fffff801`6bd9e000   hiber_dumpfv
fffff801`1bf40000 fffff801`1bf82000   klids.sys
fffff801`27050000 fffff801`2705f000   dump_storpor
fffff801`27090000 fffff801`270bc000   dump_stornvm
fffff801`270e0000 fffff801`270fe000   dump_dumpfve
fffff801`1bfe0000 fffff801`1bffc000   dam.sys
fffff801`1a7a0000 fffff801`1a7af000   klelam.sys
fffff801`1b8a0000 fffff801`1b8b1000   hwpolicy.sys
9: kd> lmDvmklif
Browse full module list
start             end                 module name
fffff801`26270000 fffff801`26370000   klif     T (no symbols)           
    Loaded symbol image file: klif.sys
    Image path: \SystemRoot\system32\DRIVERS\klif.sys
    Image name: klif.sys
    Browse all global symbols  functions  data
    Timestamp:        Fri Feb 19 14:51:01 2021 (602FA625)
    CheckSum:         0010C5A3
    ImageSize:        00100000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
 
Çözüm
Son olana baktım. Ben SSD sorunu diyorum.

Ek bilgiler:

Klif.sys veya Kaspersky Lab Saldırgan Filtresi, Kaspersky Lab tarafından geliştirilen Kaspersky Antivirus'ün ayrılmaz bir parçasıdır.

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd4e67a69d5f0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8011ae75a53, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klif.sys

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 5421

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 29904

    Key  : Analysis.Init.CPU.mSec
    Value: 452

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3452

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffd4e67a69d5f0

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8011ae75a53

BUGCHECK_P4: 2

READ_ADDRESS: fffff801190fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffd4e67a69d5f0

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  fffff089d7ba0200 -- (.trap 0xfffff089d7ba0200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8011ae75a50 rbx=0000000000000000 rcx=ffffbd0ff06aa6c0
rdx=fffff089d7ba04a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011ae75a53 rsp=fffff089d7ba0398 rbp=fffff089d7ba0818
 r8=ffffd4e67a69d5f0  r9=000100000000127c r10=0000fffff8011ae7
r11=ffff77fe9c000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
Ntfs+0xf5a53:
fffff801`1ae75a53 498b10          mov     rdx,qword ptr [r8] ds:ffffd4e6`7a69d5f0=????????????????
Resetting default scope

STACK_TEXT:
fffff089`d7b9ff58 fffff801`1884a46f     : 00000000`00000050 ffffd4e6`7a69d5f0 00000000`00000000 fffff089`d7ba0200 : nt!KeBugCheckEx
fffff089`d7b9ff60 fffff801`1869f500     : fffff089`d7ba01b0 00000000`00000000 fffff089`d7ba0280 00000000`00000000 : nt!MiSystemFault+0x18d0bf
fffff089`d7ba0060 fffff801`1880535e     : 00005400`ff445760 ffffbd0f`eb7e2e80 ffffd404`7bd175a8 00000000`00000e30 : nt!MmAccessFault+0x400
fffff089`d7ba0200 fffff801`1ae75a53     : fffff801`18602463 fffff089`d7ba0b10 00000000`00000000 00010000`0000127c : nt!KiPageFault+0x35e
fffff089`d7ba0398 fffff801`18602463     : fffff089`d7ba0b10 00000000`00000000 00010000`0000127c fffff089`d7ba0440 : Ntfs+0xf5a53
fffff089`d7ba03a0 fffff801`1aed3344     : 00010000`0000127c ffffd404`7bd17501 fffff089`d7ba0440 00000000`00000000 : nt!RtlLookupElementGenericTableFullAvl+0x53
fffff089`d7ba03d0 fffff801`1ae5ae6c     : fffff089`d7ba0b10 ffffbd0f`f06aa180 00000000`00000000 00010000`0000127c : Ntfs+0x153344
fffff089`d7ba0510 fffff801`1ae5a0db     : fffff089`d7ba0b10 ffffd404`7bd175a0 fffff801`1ae75b30 00000000`00000000 : Ntfs+0xdae6c
fffff089`d7ba06b0 fffff801`1ae59ee3     : 00000000`00000000 00000000`00000000 ffffd404`7bd175a0 00000000`00000000 : Ntfs+0xda0db
fffff089`d7ba0740 fffff801`1ae59c2d     : ffffd404`7dc2aa80 ffffbd0f`faa88a40 fffff089`d7ba0b10 ffffd404`7bd17700 : Ntfs+0xd9ee3
fffff089`d7ba07a0 fffff801`1ae68865     : ffffd404`7bd17700 ffffd404`7bd17700 fffff089`d7ba0b10 fffff089`d7ba0b10 : Ntfs+0xd9c2d
fffff089`d7ba08c0 fffff801`1ae67e86     : fffff089`d7ba0b10 ffffbd00`01451b10 00000000`000000f8 00000000`00000002 : Ntfs+0xe8865
fffff089`d7ba09c0 fffff801`1ae67d10     : fffff089`d7ba0b10 ffffbd00`01451b10 ffffbd00`01451b10 00000000`00000000 : Ntfs+0xe7e86
fffff089`d7ba0af0 fffff801`1868f865     : ffffbd0f`faa88a40 fffff801`1873346c 00000000`0000000d 00000000`00000000 : Ntfs+0xe7d10
fffff089`d7ba0d90 fffff801`14cd9c75     : ffffbd0f`fdf0bce0 ffffbd0f`faa88a40 ffffbd0f`fc79e72c 00000000`00000000 : nt!IofCallDriver+0x55
fffff089`d7ba0dd0 fffff801`14cda91e     : ffffbd0f`f96d46a0 00000000`00000000 00000000`00000000 ffffbd0f`f96d4708 : FLTMGR!FltpGetFileName+0x195
fffff089`d7ba0e70 fffff801`14cdb18b     : ffffbd0f`fdf0bc00 ffffbd0f`fdf0bce0 ffffbd0f`f0696710 fffff801`18608633 : FLTMGR!FltpGetNormalizedFileNameWorker+0x5e
fffff089`d7ba0ef0 fffff801`14ca2f6e     : ffffbd0f`f96d4708 fffff089`d7ba2000 fffff089`d7b9c000 fffff801`14cca060 : FLTMGR!FltpCreateFileNameInformation+0x2eb
fffff089`d7ba0f70 fffff801`14ca3d31     : 00000000`00008000 fffff089`ffff7fff ffffbd0f`f96d46a0 00000000`00000000 : FLTMGR!FltpGetFileNameInformation+0x39e
fffff089`d7ba1020 fffff801`2ac6d2b0     : ffffbd0f`fdf0bce0 ffffbd0f`f0f42a20 00000000`00000000 ffffbd0f`f96d4701 : FLTMGR!FltGetFileNameInformation+0x101
fffff089`d7ba10b0 fffff801`14cdaa4b     : ffffbd0f`f96d46a0 00000000`00000000 ffffbd0f`f0f42a20 fffff801`1869aed8 : luafv!LuafvGenerateFileName+0x60
fffff089`d7ba10e0 fffff801`14cdb18b     : ffffbd0f`fdf0e600 ffffbd0f`fdf0e650 ffffbd0f`f0696710 fffff801`18608633 : FLTMGR!FltpGetNormalizedFileNameWorker+0x18b
fffff089`d7ba1160 fffff801`14ca2f6e     : ffffbd0f`f96d4708 fffff089`d7ba2000 fffff089`d7b9c000 fffff801`14cca060 : FLTMGR!FltpCreateFileNameInformation+0x2eb
fffff089`d7ba11e0 fffff801`14ca3d31     : 00000000`00008000 fffff089`ffff7fff ffffbd0f`f96d46a0 ffffbd0f`f5ce8010 : FLTMGR!FltpGetFileNameInformation+0x39e
fffff089`d7ba1290 fffff801`262a08c5     : ffffbd0f`fdf0e650 fffff089`d7ba1380 00000000`00000000 ffffbd0f`fcae3bd8 : FLTMGR!FltGetFileNameInformation+0x101
fffff089`d7ba1320 ffffbd0f`fdf0e650     : fffff089`d7ba1380 00000000`00000000 ffffbd0f`fcae3bd8 ffffbd00`0566aa70 : klif+0x308c5
fffff089`d7ba1328 fffff089`d7ba1380     : 00000000`00000000 ffffbd0f`fcae3bd8 ffffbd00`0566aa70 fffff801`26313f7b : 0xffffbd0f`fdf0e650
fffff089`d7ba1330 00000000`00000000     : ffffbd0f`fcae3bd8 ffffbd00`0566aa70 fffff801`26313f7b ffffd404`8a7e55a0 : 0xfffff089`d7ba1380


SYMBOL_NAME:  luafv!LuafvGenerateFileName+60

MODULE_NAME: luafv

IMAGE_NAME:  luafv.sys

IMAGE_VERSION:  10.0.19041.906

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  60

FAILURE_BUCKET_ID:  AV_R_(null)_luafv!LuafvGenerateFileName

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {671b7e5c-ace4-9963-2fb1-2dd533d7c36d}

Followup:     MachineOwner
---------

9: kd> lmvm luafv
Browse full module list
start             end                 module name
fffff801`2ac60000 fffff801`2ac89000   luafv    # (pdb symbols)          C:\ProgramData\Dbg\sym\luafv.pdb\69127C459F6A3C7F158EF932A83638541\luafv.pdb
    Loaded symbol image file: luafv.sys
    Mapped memory image file: C:\ProgramData\Dbg\sym\luafv.sys\86E5647D29000\luafv.sys
    Image path: \SystemRoot\system32\drivers\luafv.sys
    Image name: luafv.sys
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        86E5647D (This is a reproducible build file hash, not a timestamp)
    CheckSum:         000296E7
    ImageSize:        00029000
    File version:     10.0.19041.906
    Product version:  10.0.19041.906
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     luafv.sys
        OriginalFilename: luafv.sys
        ProductVersion:   10.0.19041.906
        FileVersion:      10.0.19041.906 (WinBuild.160101.0800)
        FileDescription:  LUA File Virtualization Filter Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
9: kd> lm
start             end                 module name
ffff81e3`f1600000 ffff81e3`f18d3000   win32kbase   (deferred)            
ffff81e3`f1ad0000 ffff81e3`f1b6a000   win32k   # (pdb symbols)          C:\ProgramData\Dbg\sym\win32k.pdb\AD6D3E11D496C8837D0142839435EE071\win32k.pdb
ffff81e3`f1e80000 ffff81e3`f1ec9000   cdd        (deferred)            
ffff81e3`f23c0000 ffff81e3`f2776000   win32kfull   (deferred)            
fffff801`14a60000 fffff801`14a88000   mcupdate_AuthenticAMD   (deferred)            
fffff801`14a90000 fffff801`14a96000   hal        (deferred)            
fffff801`14aa0000 fffff801`14aab000   kd         (deferred)            
fffff801`14ab0000 fffff801`14ad7000   tm         (deferred)            
fffff801`14ae0000 fffff801`14b49000   CLFS       (deferred)            
fffff801`14b50000 fffff801`14b6a000   PSHED      (deferred)            
fffff801`14b70000 fffff801`14b7b000   BOOTVID    (deferred)            
fffff801`14b80000 fffff801`14c94000   clipsp     (deferred)            
fffff801`14ca0000 fffff801`14d0f000   FLTMGR   # (pdb symbols)          C:\ProgramData\Dbg\sym\fltMgr.pdb\41C0B82054675D3AD752BFF86090EED51\fltMgr.pdb
fffff801`14d10000 fffff801`14d39000   ksecdd     (deferred)            
fffff801`14d40000 fffff801`14da3000   msrpc      (deferred)            
fffff801`14db0000 fffff801`14dbe000   cmimcext   (deferred)            
fffff801`14dc0000 fffff801`14dd1000   werkernel   (deferred)            
fffff801`14de0000 fffff801`14dec000   ntosext    (deferred)            
fffff801`14df0000 fffff801`14e03000   WDFLDR     (deferred)            
fffff801`14e10000 fffff801`14e1f000   SleepStudyHelper   (deferred)            
fffff801`14e20000 fffff801`14e31000   WppRecorder   (deferred)            
fffff801`14e40000 fffff801`14e5a000   SgrmAgent   (deferred)            
fffff801`18400000 fffff801`19446000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\1B4A6F5E0766C552C90710C8ACC0295C1\ntkrnlmp.pdb
fffff801`1a400000 fffff801`1a4e3000   CI         (deferred)            
fffff801`1a4f0000 fffff801`1a5ab000   cng        (deferred)            
fffff801`1a5b0000 fffff801`1a681000   Wdf01000   (deferred)            
fffff801`1a690000 fffff801`1a6b6000   acpiex     (deferred)            
fffff801`1a6c0000 fffff801`1a78c000   ACPI       (deferred)            
fffff801`1a790000 fffff801`1a79c000   WMILIB     (deferred)            
fffff801`1a7b0000 fffff801`1a81b000   intelpep   (deferred)            
fffff801`1a820000 fffff801`1a837000   WindowsTrustedRT   (deferred)            
fffff801`1a840000 fffff801`1a84b000   IntelTA    (deferred)            
fffff801`1a850000 fffff801`1a85b000   WindowsTrustedRTProxy   (deferred)            
fffff801`1a860000 fffff801`1a874000   pcw        (deferred)            
fffff801`1a880000 fffff801`1a8c1000   klupd_klif_arkmon   (deferred)            
fffff801`1a8d0000 fffff801`1a8db000   msisadrv   (deferred)            
fffff801`1a8e0000 fffff801`1a957000   pci        (deferred)            
fffff801`1a960000 fffff801`1a975000   vdrvroot   (deferred)            
fffff801`1a980000 fffff801`1a9bb000   cm_km      (deferred)            
fffff801`1a9c0000 fffff801`1a9ef000   pdc        (deferred)            
fffff801`1a9f0000 fffff801`1aa0a000   CEA        (deferred)            
fffff801`1aa10000 fffff801`1aa41000   partmgr    (deferred)            
fffff801`1aa50000 fffff801`1aafa000   spaceport   (deferred)            
fffff801`1ab00000 fffff801`1ab19000   volmgr     (deferred)            
fffff801`1ab20000 fffff801`1ab83000   volmgrx    (deferred)            
fffff801`1ab90000 fffff801`1abae000   mountmgr   (deferred)            
fffff801`1abb0000 fffff801`1abe2000   storahci   (deferred)            
fffff801`1abf0000 fffff801`1abfd000   Fs_Rec     (deferred)            
fffff801`1ac00000 fffff801`1acb3000   storport   (deferred)            
fffff801`1acc0000 fffff801`1aceb000   stornvme   (deferred)            
fffff801`1acf0000 fffff801`1ad0c000   EhStorClass   (deferred)            
fffff801`1ad10000 fffff801`1ad2a000   fileinfo   (deferred)            
fffff801`1ad30000 fffff801`1ad70000   Wof        (deferred)            
fffff801`1ad80000 fffff801`1b059000   Ntfs     # (no symbols)          
fffff801`1b060000 fffff801`1b1d0000   ndis       (deferred)            
fffff801`1b1e0000 fffff801`1b278000   NETIO      (deferred)            
fffff801`1b280000 fffff801`1b2b2000   ksecpkg    (deferred)            
fffff801`1b2c0000 fffff801`1b2cd000   amdpsp     (deferred)            
fffff801`1b2d0000 fffff801`1b5bc000   tcpip      (deferred)            
fffff801`1b5c0000 fffff801`1b63f000   fwpkclnt   (deferred)            
fffff801`1b640000 fffff801`1b670000   wfplwfs    (deferred)            
fffff801`1b680000 fffff801`1b748000   fvevol     (deferred)            
fffff801`1b750000 fffff801`1b75b000   volume     (deferred)            
fffff801`1b760000 fffff801`1b7cd000   volsnap    (deferred)            
fffff801`1b7d0000 fffff801`1b820000   rdyboost   (deferred)            
fffff801`1b830000 fffff801`1b856000   mup        (deferred)            
fffff801`1b860000 fffff801`1b87a000   klupd_klif_klbg   (deferred)            
fffff801`1b880000 fffff801`1b892000   iorate     (deferred)            
fffff801`1b8c0000 fffff801`1b8dc000   disk       (deferred)            
fffff801`1b8e0000 fffff801`1b94d000   CLASSPNP   (deferred)            
fffff801`1be00000 fffff801`1be6c000   fastfat    (deferred)            
fffff801`1be70000 fffff801`1be87000   bam        (deferred)            
fffff801`1be90000 fffff801`1bede000   ahcache    (deferred)            
fffff801`1bee0000 fffff801`1beed000   kltap      (deferred)            
fffff801`1bef0000 fffff801`1bf02000   CompositeBus   (deferred)            
fffff801`1bf10000 fffff801`1bf1d000   kdnic      (deferred)            
fffff801`1bf20000 fffff801`1bf35000   umbus      (deferred)            
fffff801`1bf90000 fffff801`1bf9a000   gpuenergydrv   (deferred)            
fffff801`1bfa0000 fffff801`1bfa8000   ene        (deferred)            
fffff801`1bfb0000 fffff801`1bfdc000   dfsc       (deferred)            
fffff801`1bfe0000 fffff801`1bff4000   mmcss      (deferred)            
fffff801`26200000 fffff801`26231000   klbackupflt   (deferred)            
fffff801`26240000 fffff801`26255000   filecrypt   (deferred)            
fffff801`26260000 fffff801`2626e000   tbs        (deferred)            
fffff801`26270000 fffff801`26370000   klif     T (no symbols)          
fffff801`26380000 fffff801`263f6000   ks         (deferred)            
fffff801`26400000 fffff801`2658f000   klhk       (deferred)            
fffff801`26590000 fffff801`26637000   klgse      (deferred)            
fffff801`26640000 fffff801`26652000   klpd       (deferred)            
fffff801`26660000 fffff801`2667c000   kldisk     (deferred)            
fffff801`26680000 fffff801`2668a000   Null       (deferred)            
fffff801`26690000 fffff801`2669a000   Beep       (deferred)            
fffff801`266a0000 fffff801`26a4a000   dxgkrnl    (deferred)            
fffff801`26a50000 fffff801`26a68000   watchdog   (deferred)            
fffff801`26a70000 fffff801`26a86000   BasicDisplay   (deferred)            
fffff801`26a90000 fffff801`26aa1000   BasicRender   (deferred)            
fffff801`26ab0000 fffff801`26acc000   Npfs       (deferred)            
fffff801`26ad0000 fffff801`26ae1000   Msfs       (deferred)            
fffff801`26af0000 fffff801`26b0e000   CimFS      (deferred)            
fffff801`26b10000 fffff801`26b34000   klwfp      (deferred)            
fffff801`26b40000 fffff801`26b62000   tdx        (deferred)            
fffff801`26b70000 fffff801`26b80000   TDI        (deferred)            
fffff801`26b90000 fffff801`26bec000   netbt      (deferred)            
fffff801`26bf0000 fffff801`26c03000   afunix     (deferred)            
fffff801`26c10000 fffff801`26cb6000   afd        (deferred)            
fffff801`26cc0000 fffff801`26d0b000   klwtp      (deferred)            
fffff801`26d10000 fffff801`26d25000   klim6      (deferred)            
fffff801`26d30000 fffff801`26d4a000   vwififlt   (deferred)            
fffff801`26d50000 fffff801`26d7b000   pacer      (deferred)            
fffff801`26d80000 fffff801`26d94000   ndiscap    (deferred)            
fffff801`26da0000 fffff801`26db4000   netbios    (deferred)            
fffff801`26dc0000 fffff801`26e62000   Vid        (deferred)            
fffff801`26e70000 fffff801`26e91000   winhvr     (deferred)            
fffff801`26ea0000 fffff801`26eb5000   klpnpflt   (deferred)            
fffff801`26ec0000 fffff801`26f3b000   rdbss      (deferred)            
fffff801`26f40000 fffff801`26f52000   nsiproxy   (deferred)            
fffff801`26f60000 fffff801`26f6e000   npsvctrig   (deferred)            
fffff801`26f70000 fffff801`26f80000   mssmbios # (pdb symbols)          C:\ProgramData\Dbg\sym\mssmbios.pdb\53ADC03D875B3F78AC94CE4D75054C461\mssmbios.pdb
fffff801`26f90000 fffff801`26f97000   MsIo64     (deferred)            
fffff801`26fa0000 fffff801`26fe9000   kneps      (deferred)            
fffff801`27020000 fffff801`2703e000   crashdmp   (deferred)            
fffff801`27040000 fffff801`27086000   mrxsmb20   (deferred)            
fffff801`27090000 fffff801`270e3000   srvnet     (deferred)            
fffff801`27100000 fffff801`27119000   klbackupdisk   (deferred)            
fffff801`27120000 fffff801`27152000   cdrom      (deferred)            
fffff801`27160000 fffff801`271ea000   klflt      (deferred)            
fffff801`27200000 fffff801`2731a000   rt640x64   (deferred)            
fffff801`27320000 fffff801`27938000   RTKVHD64   (deferred)            
fffff801`27940000 fffff801`27a21000   dxgmms2    (deferred)            
fffff801`27a30000 fffff801`27a84000   WUDFRd     (deferred)            
fffff801`27a90000 fffff801`27b12000   cldflt     (deferred)            
fffff801`27b20000 fffff801`27b3a000   storqosflt   (deferred)            
fffff801`27b40000 fffff801`27b68000   bindflt    (deferred)            
fffff801`27b70000 fffff801`27b88000   lltdio     (deferred)            
fffff801`27b90000 fffff801`27ba8000   mslldp     (deferred)            
fffff801`27bb0000 fffff801`27bcb000   rspndr     (deferred)            
fffff801`27bd0000 fffff801`27bed000   wanarp     (deferred)            
fffff801`27bf0000 fffff801`27c46000   msquic     (deferred)            
fffff801`27c50000 fffff801`27dd8000   HTTP       (deferred)            
fffff801`27de0000 fffff801`27e05000   bowser     (deferred)            
fffff801`27e10000 fffff801`27e2a000   mpsdrv     (deferred)            
fffff801`27e30000 fffff801`27e57000   Ndu        (deferred)            
fffff801`27e60000 fffff801`27efa000   USBXHCI    (deferred)            
fffff801`27f00000 fffff801`27f44000   ucx01000   (deferred)            
fffff801`27f50000 fffff801`27fe4000   mrxsmb     (deferred)            
fffff801`2a600000 fffff801`2a621000   drmk       (deferred)            
fffff801`2a630000 fffff801`2a6de000   UcmCxUcsiNvppc   (deferred)            
fffff801`2a6e0000 fffff801`2a70e000   UcmCx      (deferred)            
fffff801`2a710000 fffff801`2a71b000   AMDPCIDev   (deferred)            
fffff801`2a720000 fffff801`2a72d000   amdgpio2   (deferred)            
fffff801`2a730000 fffff801`2a762000   msgpioclx   (deferred)            
fffff801`2a770000 fffff801`2a77c000   wmiacpi    (deferred)            
fffff801`2a780000 fffff801`2a7bb000   amdppm     (deferred)            
fffff801`2a7c0000 fffff801`2a7ca000   amdgpio3   (deferred)            
fffff801`2a7d0000 fffff801`2a7de000   UEFI       (deferred)            
fffff801`2a7e0000 fffff801`2a7f1000   nvvad64v   (deferred)            
fffff801`2a800000 fffff801`2a80f000   ksthunk    (deferred)            
fffff801`2a810000 fffff801`2a81d000   NvModuleTracker   (deferred)            
fffff801`2a820000 fffff801`2a830000   nvvhci     (deferred)            
fffff801`2a840000 fffff801`2a84d000   NdisVirtualBus   (deferred)            
fffff801`2a850000 fffff801`2a85c000   swenum     (deferred)            
fffff801`2a860000 fffff801`2a877000   AmdTools64   (deferred)            
fffff801`2a880000 fffff801`2a88e000   rdpbus     (deferred)            
fffff801`2a890000 fffff801`2a933000   UsbHub3    (deferred)            
fffff801`2a940000 fffff801`2a94e000   USBD       (deferred)            
fffff801`2a950000 fffff801`2a973000   nvhda64v   (deferred)            
fffff801`2a980000 fffff801`2a9a5000   USBSTOR    (deferred)            
fffff801`2a9b0000 fffff801`2a9c2000   hidusb     (deferred)            
fffff801`2a9d0000 fffff801`2aa0f000   HIDCLASS   (deferred)            
fffff801`2aa10000 fffff801`2aa23000   HIDPARSE   (deferred)            
fffff801`2aa30000 fffff801`2aa63000   usbccgp    (deferred)            
fffff801`2aa70000 fffff801`2aa80000   RzDev_008a   (deferred)            
fffff801`2aa90000 fffff801`2aaa1000   kbdhid     (deferred)            
fffff801`2aab0000 fffff801`2aac9000   klkbdflt   (deferred)            
fffff801`2aad0000 fffff801`2aae4000   kbdclass   (deferred)            
fffff801`2aaf0000 fffff801`2ab00000   mouhid     (deferred)            
fffff801`2ab10000 fffff801`2ab2a000   klmouflt   (deferred)            
fffff801`2ab30000 fffff801`2ab43000   mouclass   (deferred)            
fffff801`2ab50000 fffff801`2ab5b000   mshidkmdf   (deferred)            
fffff801`2ab60000 fffff801`2ab70000   RzCommon   (deferred)            
fffff801`2ab90000 fffff801`2ab9e000   dump_dumpstorport   (deferred)            
fffff801`2abd0000 fffff801`2abfb000   dump_stornvme   (deferred)            
fffff801`2ac20000 fffff801`2ac3d000   dump_dumpfve   (deferred)            
fffff801`2ac60000 fffff801`2ac89000   luafv    # (pdb symbols)          C:\ProgramData\Dbg\sym\luafv.pdb\69127C459F6A3C7F158EF932A83638541\luafv.pdb
fffff801`2ac90000 fffff801`2acc6000   wcifs      (deferred)            
fffff801`2acd0000 fffff801`2acde000   WpdUpFltr   (deferred)            
fffff801`2ace0000 fffff801`2d146000   nvlddmkm   (deferred)            
fffff801`2d150000 fffff801`2d179000   HDAudBus   (deferred)            
fffff801`2d180000 fffff801`2d1e6000   portcls    (deferred)            
fffff801`6ba00000 fffff801`6bac7000   srv2       (deferred)            
fffff801`6bad0000 fffff801`6bae5000   tcpipreg   (deferred)            
fffff801`6baf0000 fffff801`6bb0c000   rassstp    (deferred)            
fffff801`6bb10000 fffff801`6bb2d000   NDProxy    (deferred)            
fffff801`6bb30000 fffff801`6bb57000   AgileVpn   (deferred)            
fffff801`6bb60000 fffff801`6bb81000   rasl2tp    (deferred)            
fffff801`6bb90000 fffff801`6bbb1000   raspptp    (deferred)            
fffff801`6bbc0000 fffff801`6bbdc000   raspppoe   (deferred)            
fffff801`6bbe0000 fffff801`6bbef000   ndistapi   (deferred)            
fffff801`6bbf0000 fffff801`6bc2b000   ndiswan    (deferred)            
fffff801`6bc30000 fffff801`6bc68000   klupd_klif_mark   (deferred)            
fffff801`6bc70000 fffff801`6bc82000   condrv     (deferred)            
fffff801`6bc90000 fffff801`6bcd1000   klids      (deferred)            
fffff801`6bce0000 fffff801`6bd2d000   klupd_klif_klark   (deferred)            
fffff801`6bd30000 fffff801`6bd3d000   rdpvideominiport   (deferred)            
fffff801`6bfa0000 fffff801`6bfbb000   monitor    (deferred)            
fffff801`6c2f0000 fffff801`6c3c6000   peauth     (deferred)            

Unloaded modules:
fffff801`6c080000 fffff801`6c08f000   hiber_storpo
fffff801`6c090000 fffff801`6c0bc000   hiber_stornv
fffff801`6c0c0000 fffff801`6c0de000   hiber_dumpfv
fffff801`6c020000 fffff801`6c02f000   hiber_storpo
fffff801`6c030000 fffff801`6c05c000   hiber_stornv
fffff801`6c060000 fffff801`6c07e000   hiber_dumpfv
fffff801`6bfc0000 fffff801`6bfcf000   hiber_storpo
fffff801`6bfd0000 fffff801`6bffc000   hiber_stornv
fffff801`6c000000 fffff801`6c01e000   hiber_dumpfv
fffff801`6be60000 fffff801`6be7c000   monitor.sys
fffff801`6bf40000 fffff801`6bf4f000   hiber_storpo
fffff801`6bf50000 fffff801`6bf7c000   hiber_stornv
fffff801`6bf80000 fffff801`6bf9e000   hiber_dumpfv
fffff801`6bee0000 fffff801`6beef000   hiber_storpo
fffff801`6bef0000 fffff801`6bf1c000   hiber_stornv
fffff801`6bf20000 fffff801`6bf3e000   hiber_dumpfv
fffff801`6be80000 fffff801`6be8f000   hiber_storpo
fffff801`6be90000 fffff801`6bebc000   hiber_stornv
fffff801`6bec0000 fffff801`6bede000   hiber_dumpfv
fffff801`2ac40000 fffff801`2ac5c000   monitor.sys
fffff801`6be00000 fffff801`6be0f000   hiber_storpo
fffff801`6be10000 fffff801`6be3c000   hiber_stornv
fffff801`6be40000 fffff801`6be5e000   hiber_dumpfv
fffff801`6bda0000 fffff801`6bdaf000   hiber_storpo
fffff801`6bdb0000 fffff801`6bddc000   hiber_stornv
fffff801`6bde0000 fffff801`6bdfe000   hiber_dumpfv
fffff801`6bd40000 fffff801`6bd4f000   hiber_storpo
fffff801`6bd50000 fffff801`6bd7c000   hiber_stornv
fffff801`6bd80000 fffff801`6bd9e000   hiber_dumpfv
fffff801`1bf40000 fffff801`1bf82000   klids.sys
fffff801`27050000 fffff801`2705f000   dump_storpor
fffff801`27090000 fffff801`270bc000   dump_stornvm
fffff801`270e0000 fffff801`270fe000   dump_dumpfve
fffff801`1bfe0000 fffff801`1bffc000   dam.sys
fffff801`1a7a0000 fffff801`1a7af000   klelam.sys
fffff801`1b8a0000 fffff801`1b8b1000   hwpolicy.sys
9: kd> lmDvmklif
Browse full module list
start             end                 module name
fffff801`26270000 fffff801`26370000   klif     T (no symbols)          
    Loaded symbol image file: klif.sys
    Image path: \SystemRoot\system32\DRIVERS\klif.sys
    Image name: klif.sys
    Browse all global symbols  functions  data
    Timestamp:        Fri Feb 19 14:51:01 2021 (602FA625)
    CheckSum:         0010C5A3
    ImageSize:        00100000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
Garanti yolu göründü o zaman :/
 
İlk olarak Kaspersky kaldırın ve bir süre o şekilde kullanın. Baya bir hatada Kaspersky bileşenleri var.


Ekran kartı sorunu gibi olan:

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8c662bfcd68, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8036240d086, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 5187

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 81281

    Key  : Analysis.Init.CPU.mSec
    Value: 671

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2569

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: fffff8c662bfcd68

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8036240d086

BUGCHECK_P4: 2

READ_ADDRESS: fffff8034ecfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff8c662bfcd68

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff850bfe6b56a0 -- (.trap 0xffff850bfe6b56a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd6068c823e01 rbx=0000000000000000 rcx=fffff8c662bfcd68
rdx=0000000000d5f150 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036240d086 rsp=ffff850bfe6b5838 rbp=ffff850bfe6b5909
 r8=ffffd6068c823d88  r9=0000000000000000 r10=fffff80362bfcef0
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nvlddmkm+0xad086:
fffff803`6240d086 488b01          mov     rax,qword ptr [rcx] ds:fffff8c6`62bfcd68=????????????????
Resetting default scope

STACK_TEXT:
ffff850b`fe6b53f8 fffff803`4e44a46f     : 00000000`00000050 fffff8c6`62bfcd68 00000000`00000000 ffff850b`fe6b56a0 : nt!KeBugCheckEx
ffff850b`fe6b5400 fffff803`4e29f500     : 00000000`00000000 00000000`00000000 ffff850b`fe6b5720 00000000`00000000 : nt!MiSystemFault+0x18d0bf
ffff850b`fe6b5500 fffff803`4e40535e     : 00000000`00b81210 fffff803`623e86f3 00000000`04000000 00000000`04000000 : nt!MmAccessFault+0x400
ffff850b`fe6b56a0 fffff803`6240d086     : fffff803`6247b9eb ffff850b`fe6b58c0 ffffd606`846cb2f8 00000000`00000000 : nt!KiPageFault+0x35e
ffff850b`fe6b5838 fffff803`6247b9eb     : ffff850b`fe6b58c0 ffffd606`846cb2f8 00000000`00000000 ffffd606`82b04000 : nvlddmkm+0xad086
ffff850b`fe6b5840 ffff850b`fe6b58c0     : ffffd606`846cb2f8 00000000`00000000 ffffd606`82b04000 ffffd606`82b04000 : nvlddmkm+0x11b9eb
ffff850b`fe6b5848 ffffd606`846cb2f8     : 00000000`00000000 ffffd606`82b04000 ffffd606`82b04000 fffff803`624e6ba6 : 0xffff850b`fe6b58c0
ffff850b`fe6b5850 00000000`00000000     : ffffd606`82b04000 ffffd606`82b04000 fffff803`624e6ba6 ffffd606`846cb000 : 0xffffd606`846cb2f8


SYMBOL_NAME:  nvlddmkm+ad086

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  ad086

FAILURE_BUCKET_ID:  AV_R_(null)_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f899ea14-805d-2454-345d-ba405310c43d}

Followup:     MachineOwner
---------

Kaspersky?

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb52184793a78, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff806613e595c, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klflt.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 5030

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 33250

    Key  : Analysis.Init.CPU.mSec
    Value: 686

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2683

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffb52184793a78

BUGCHECK_P2: 0

BUGCHECK_P3: fffff806613e595c

BUGCHECK_P4: 2

READ_ADDRESS: fffff80661afa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffb52184793a78

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

TRAP_FRAME:  ffffcd8bd0e19200 -- (.trap 0xffffcd8bd0e19200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000001000000 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffb52184793a70 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806613e595c rsp=ffffcd8bd0e19390 rbp=0000000000000000
 r8=ffffb508851cb600  r9=0000000000000001 r10=7ffffffffffffffc
r11=ffffcd8bd0e19408 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!CmpReportNotifyHelper+0xfc:
fffff806`613e595c 8b4a08          mov     ecx,dword ptr [rdx+8] ds:ffffb521`84793a78=????????
Resetting default scope

STACK_TEXT: 
ffffcd8b`d0e18f58 fffff806`6124a46f     : 00000000`00000050 ffffb521`84793a78 00000000`00000000 ffffcd8b`d0e19200 : nt!KeBugCheckEx
ffffcd8b`d0e18f60 fffff806`6109f500     : 00000000`00000000 00000000`00000000 ffffcd8b`d0e19280 00000000`00000000 : nt!MiSystemFault+0x18d0bf
ffffcd8b`d0e19060 fffff806`6120535e     : ffffb508`7f68d000 fffff806`61440de3 00000000`00000002 fffff806`6107c376 : nt!MmAccessFault+0x400
ffffcd8b`d0e19200 fffff806`613e595c     : ffffb508`7f68d000 fffff806`00000004 ffffb508`00000000 00000000`00000001 : nt!KiPageFault+0x35e
ffffcd8b`d0e19390 fffff806`613e5811     : ffffb508`8c01cec0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!CmpReportNotifyHelper+0xfc
ffffcd8b`d0e19410 fffff806`6149ce69     : ffffb508`8c01cec0 ffffcd8b`d0e19680 00000000`00000000 00000000`00000001 : nt!CmpReportNotifyForKcbStack+0x45
ffffcd8b`d0e19450 fffff806`613f00df     : ffffcd8b`d0e196e0 ffffb508`8b91e401 ffffd508`7f23e010 ffffcd8b`d0e197b0 : nt!CmpCreateChild+0x621
ffffcd8b`d0e19580 fffff806`613ee323     : ffffb508`0000001a ffffcd8b`d0e198d0 ffffcd8b`d0e19888 ffffd508`7f23e010 : nt!CmpDoParseKey+0xeef
ffffcd8b`d0e19820 fffff806`613f23ee     : fffff806`613ee001 00000000`00000000 ffffd508`7f23e010 00000040`00000000 : nt!CmpParseKey+0x2c3
ffffcd8b`d0e199c0 fffff806`614940fa     : ffffd508`7f23e000 ffffcd8b`d0e19c28 00000000`00000240 ffffd508`6a2fdd20 : nt!ObpLookupObjectName+0x3fe
ffffcd8b`d0e19b90 fffff806`61493edc     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd508`6a2fdd20 : nt!ObOpenObjectByNameEx+0x1fa
ffffcd8b`d0e19cc0 fffff806`61451e29     : 00000000`00000000 ffffcd8b`d0e1a0e0 ffffcd8b`d0e1a250 00000000`00000000 : nt!ObOpenObjectByName+0x5c
ffffcd8b`d0e19d10 fffff806`614519ce     : 00000000`00000100 00000000`00000000 ffffcd8b`d0e1a0a1 fffff806`6108caf1 : nt!CmCreateKey+0x449
ffffcd8b`d0e19fa0 fffff806`61208bb8     : 00000000`00000000 00000000`000000c0 00000000`000006b8 00000000`67727453 : nt!NtCreateKey+0x2e
ffffcd8b`d0e19ff0 fffff806`611fb020     : fffff806`70808ded 00000000`00000000 ffffd508`6f8fe1f0 ffffffff`80003afc : nt!KiSystemServiceCopyEnd+0x28
ffffcd8b`d0e1a1f8 fffff806`70808ded     : 00000000`00000000 ffffd508`6f8fe1f0 ffffffff`80003afc fffff806`5f3e9c91 : nt!KiServiceLinkage
ffffcd8b`d0e1a200 00000000`00000000     : ffffd508`6f8fe1f0 ffffffff`80003afc fffff806`5f3e9c91 00000000`00000000 : klflt+0x8ded


SYMBOL_NAME:  klflt+8ded

MODULE_NAME: klflt

IMAGE_NAME:  klflt.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  8ded

FAILURE_BUCKET_ID:  AV_R_(null)_klflt!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b708cdd3-eb43-780b-4a7e-fd7c6498cb10}

Followup:     MachineOwner
---------

9: kd> lmvm klflt
Browse full module list
start             end                 module name
fffff806`70800000 fffff806`7088a000   klflt    T (no symbols)          
    Loaded symbol image file: klflt.sys
    Image path: \SystemRoot\system32\DRIVERS\klflt.sys
    Image name: klflt.sys
    Browse all global symbols  functions  data
    Timestamp:        Fri Feb 19 14:50:05 2021 (602FA5ED)
    CheckSum:         00084C56
    ImageSize:        0008A000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008886, The subtype of the BugCheck.
Arg2: fffff10004ef7230
Arg3: fffff3400677b260
Arg4: 0000000000000500

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4624

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11783

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5807

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 8886

BUGCHECK_P2: fffff10004ef7230

BUGCHECK_P3: fffff3400677b260

BUGCHECK_P4: 500

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  avp.exe

STACK_TEXT:
ffff8609`c2141548 fffff806`352aaa90     : 00000000`0000001a 00000000`00008886 fffff100`04ef7230 fffff340`0677b260 : nt!KeBugCheckEx
ffff8609`c2141550 fffff806`352a9b00     : 00000000`00000002 fffff806`00000000 00000000`001a5261 ffff8609`c21416c0 : nt!MiUnlinkPageFromList+0xcb0
ffff8609`c21415e0 fffff806`352a90e4     : ffff8609`c2141880 ffff8609`c2141920 0000000f`ffffffff 00000001`a52618c0 : nt!MiHandleTransitionFault+0x180
ffff8609`c2141660 fffff806`352a8b36     : ffff8609`c2141880 ffffb88b`6eb2ce90 fffff100`06d47510 00000000`00000000 : nt!MiResolveTransitionFault+0x424
ffff8609`c2141720 fffff806`352a1345     : ffff8609`c2141880 00000000`00000000 ffff8609`c2141860 00000000`00000000 : nt!MiResolveProtoPteFault+0x1236
ffff8609`c2141820 fffff806`3529f289     : 00000000`00000110 00000000`00000001 00000000`c0000016 ffff9180`6dad1a28 : nt!MiDispatchFault+0x3d5
ffff8609`c2141960 fffff806`3540535e     : 00000000`00000405 00000000`00000000 ffff8609`c2141b80 ffffffff`fd515ac0 : nt!MmAccessFault+0x189
ffff8609`c2141b00 00000000`68052eec     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`06a7d224 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x68052eec


SYMBOL_NAME:  nt!MiUnlinkPageFromList+cb0

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1237

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  cb0

FAILURE_BUCKET_ID:  0x1a_8886_nt!MiUnlinkPageFromList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf}

Followup:     MachineOwner
---------

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa5906ad7280, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8066642c852, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4921

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11181

    Key  : Analysis.Init.CPU.mSec
    Value: 640

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1478

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: fffffa5906ad7280

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8066642c852

READ_ADDRESS: fffff80666efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffffa5906ad7280

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffca0a5e2b51a0 -- (.trap 0xffffca0a5e2b51a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffff800004f6db80
rdx=0000001000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066642c852 rsp=ffffca0a5e2b5330 rbp=ffffb60d5ae50010
 r8=0000000000000002  r9=ffff800000000000 r10=ffffcd0a30a1a950
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiCheckProtoPtePageState+0x192:
fffff806`6642c852 f60720          test    byte ptr [rdi],20h ds:00000000`00000000=??
Resetting default scope

STACK_TEXT:
ffffca0a`5e2b5058 fffff806`66609169     : 00000000`0000000a fffffa59`06ad7280 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffca0a`5e2b5060 fffff806`66605469     : 00000001`ffffffff fffffff6`0000000d 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffca0a`5e2b51a0 fffff806`6642c852     : ffffcd0a`30a18b18 fffff806`66428871 ffff24d1`481fb2b6 ffffcd0a`30a18ad0 : nt!KiPageFault+0x469
ffffca0a`5e2b5330 fffff806`664ac8ad     : 00000000`00000000 00000000`00000011 ffffca0a`00000000 00000000`00000000 : nt!MiCheckProtoPtePageState+0x192
ffffca0a`5e2b53a0 fffff806`664c25a1     : ffffca0a`5e2b5a88 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiFlushSectionInternal+0x5cd
ffffca0a`5e2b5670 fffff806`664bf38d     : 00000000`00000001 ffffcd0a`304dd040 00000000`00015000 00000000`00000000 : nt!MmFlushSection+0xbd
ffffca0a`5e2b5720 fffff806`664bfd84     : ffffcd0a`30b292c8 00000000`00000000 00000000`00000001 ffffca0a`5e2b58c8 : nt!CcFlushCachePriv+0x6cd
ffffca0a`5e2b5870 fffff806`664c54c5     : ffffcd0a`31b30480 00000000`00000000 ffffcd0a`20a83000 ffffcd0a`00000000 : nt!CcWriteBehindInternal+0x1f4
ffffca0a`5e2b5950 fffff806`664c6da9     : 00000000`00000000 00000000`00000000 ffffcd0a`31b30480 ffffcd0a`00000007 : nt!CcWriteBehind+0x91
ffffca0a`5e2b5a40 fffff806`664b8515     : ffffcd0a`304dd040 ffffcd0a`304dd040 ffffcd0a`20aa18b0 ffffcd0a`00000000 : nt!CcWorkerThread+0x259
ffffca0a`5e2b5b70 fffff806`66555855     : ffffcd0a`304dd040 00000000`00000080 ffffcd0a`20a8e040 000f8067`bcbbbdff : nt!ExpWorkerThread+0x105
ffffca0a`5e2b5c10 fffff806`665fe818     : fffff806`6199d180 ffffcd0a`304dd040 fffff806`66555800 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffca0a`5e2b5c60 00000000`00000000     : ffffca0a`5e2b6000 ffffca0a`5e2b0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiCheckProtoPtePageState+192

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1237

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  192

FAILURE_BUCKET_ID:  AV_nt!MiCheckProtoPtePageState

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ede5e734-f6ab-fb5a-8532-de519e1f5d82}
 
İlk olarak Kaspersky kaldırın ve bir süre o şekilde kullanın. Baya bir hatada Kaspersky bileşenleri var.


Ekran kartı sorunu gibi olan:

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8c662bfcd68, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8036240d086, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 5187

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 81281

    Key  : Analysis.Init.CPU.mSec
    Value: 671

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2569

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: fffff8c662bfcd68

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8036240d086

BUGCHECK_P4: 2

READ_ADDRESS: fffff8034ecfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff8c662bfcd68

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff850bfe6b56a0 -- (.trap 0xffff850bfe6b56a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd6068c823e01 rbx=0000000000000000 rcx=fffff8c662bfcd68
rdx=0000000000d5f150 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036240d086 rsp=ffff850bfe6b5838 rbp=ffff850bfe6b5909
 r8=ffffd6068c823d88  r9=0000000000000000 r10=fffff80362bfcef0
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nvlddmkm+0xad086:
fffff803`6240d086 488b01          mov     rax,qword ptr [rcx] ds:fffff8c6`62bfcd68=????????????????
Resetting default scope

STACK_TEXT:
ffff850b`fe6b53f8 fffff803`4e44a46f     : 00000000`00000050 fffff8c6`62bfcd68 00000000`00000000 ffff850b`fe6b56a0 : nt!KeBugCheckEx
ffff850b`fe6b5400 fffff803`4e29f500     : 00000000`00000000 00000000`00000000 ffff850b`fe6b5720 00000000`00000000 : nt!MiSystemFault+0x18d0bf
ffff850b`fe6b5500 fffff803`4e40535e     : 00000000`00b81210 fffff803`623e86f3 00000000`04000000 00000000`04000000 : nt!MmAccessFault+0x400
ffff850b`fe6b56a0 fffff803`6240d086     : fffff803`6247b9eb ffff850b`fe6b58c0 ffffd606`846cb2f8 00000000`00000000 : nt!KiPageFault+0x35e
ffff850b`fe6b5838 fffff803`6247b9eb     : ffff850b`fe6b58c0 ffffd606`846cb2f8 00000000`00000000 ffffd606`82b04000 : nvlddmkm+0xad086
ffff850b`fe6b5840 ffff850b`fe6b58c0     : ffffd606`846cb2f8 00000000`00000000 ffffd606`82b04000 ffffd606`82b04000 : nvlddmkm+0x11b9eb
ffff850b`fe6b5848 ffffd606`846cb2f8     : 00000000`00000000 ffffd606`82b04000 ffffd606`82b04000 fffff803`624e6ba6 : 0xffff850b`fe6b58c0
ffff850b`fe6b5850 00000000`00000000     : ffffd606`82b04000 ffffd606`82b04000 fffff803`624e6ba6 ffffd606`846cb000 : 0xffffd606`846cb2f8


SYMBOL_NAME:  nvlddmkm+ad086

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  ad086

FAILURE_BUCKET_ID:  AV_R_(null)_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f899ea14-805d-2454-345d-ba405310c43d}

Followup:     MachineOwner
---------

Kaspersky?

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb52184793a78, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff806613e595c, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klflt.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 5030

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 33250

    Key  : Analysis.Init.CPU.mSec
    Value: 686

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2683

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffb52184793a78

BUGCHECK_P2: 0

BUGCHECK_P3: fffff806613e595c

BUGCHECK_P4: 2

READ_ADDRESS: fffff80661afa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffb52184793a78

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

TRAP_FRAME:  ffffcd8bd0e19200 -- (.trap 0xffffcd8bd0e19200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000001000000 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffb52184793a70 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806613e595c rsp=ffffcd8bd0e19390 rbp=0000000000000000
 r8=ffffb508851cb600  r9=0000000000000001 r10=7ffffffffffffffc
r11=ffffcd8bd0e19408 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!CmpReportNotifyHelper+0xfc:
fffff806`613e595c 8b4a08          mov     ecx,dword ptr [rdx+8] ds:ffffb521`84793a78=????????
Resetting default scope

STACK_TEXT:
ffffcd8b`d0e18f58 fffff806`6124a46f     : 00000000`00000050 ffffb521`84793a78 00000000`00000000 ffffcd8b`d0e19200 : nt!KeBugCheckEx
ffffcd8b`d0e18f60 fffff806`6109f500     : 00000000`00000000 00000000`00000000 ffffcd8b`d0e19280 00000000`00000000 : nt!MiSystemFault+0x18d0bf
ffffcd8b`d0e19060 fffff806`6120535e     : ffffb508`7f68d000 fffff806`61440de3 00000000`00000002 fffff806`6107c376 : nt!MmAccessFault+0x400
ffffcd8b`d0e19200 fffff806`613e595c     : ffffb508`7f68d000 fffff806`00000004 ffffb508`00000000 00000000`00000001 : nt!KiPageFault+0x35e
ffffcd8b`d0e19390 fffff806`613e5811     : ffffb508`8c01cec0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!CmpReportNotifyHelper+0xfc
ffffcd8b`d0e19410 fffff806`6149ce69     : ffffb508`8c01cec0 ffffcd8b`d0e19680 00000000`00000000 00000000`00000001 : nt!CmpReportNotifyForKcbStack+0x45
ffffcd8b`d0e19450 fffff806`613f00df     : ffffcd8b`d0e196e0 ffffb508`8b91e401 ffffd508`7f23e010 ffffcd8b`d0e197b0 : nt!CmpCreateChild+0x621
ffffcd8b`d0e19580 fffff806`613ee323     : ffffb508`0000001a ffffcd8b`d0e198d0 ffffcd8b`d0e19888 ffffd508`7f23e010 : nt!CmpDoParseKey+0xeef
ffffcd8b`d0e19820 fffff806`613f23ee     : fffff806`613ee001 00000000`00000000 ffffd508`7f23e010 00000040`00000000 : nt!CmpParseKey+0x2c3
ffffcd8b`d0e199c0 fffff806`614940fa     : ffffd508`7f23e000 ffffcd8b`d0e19c28 00000000`00000240 ffffd508`6a2fdd20 : nt!ObpLookupObjectName+0x3fe
ffffcd8b`d0e19b90 fffff806`61493edc     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd508`6a2fdd20 : nt!ObOpenObjectByNameEx+0x1fa
ffffcd8b`d0e19cc0 fffff806`61451e29     : 00000000`00000000 ffffcd8b`d0e1a0e0 ffffcd8b`d0e1a250 00000000`00000000 : nt!ObOpenObjectByName+0x5c
ffffcd8b`d0e19d10 fffff806`614519ce     : 00000000`00000100 00000000`00000000 ffffcd8b`d0e1a0a1 fffff806`6108caf1 : nt!CmCreateKey+0x449
ffffcd8b`d0e19fa0 fffff806`61208bb8     : 00000000`00000000 00000000`000000c0 00000000`000006b8 00000000`67727453 : nt!NtCreateKey+0x2e
ffffcd8b`d0e19ff0 fffff806`611fb020     : fffff806`70808ded 00000000`00000000 ffffd508`6f8fe1f0 ffffffff`80003afc : nt!KiSystemServiceCopyEnd+0x28
ffffcd8b`d0e1a1f8 fffff806`70808ded     : 00000000`00000000 ffffd508`6f8fe1f0 ffffffff`80003afc fffff806`5f3e9c91 : nt!KiServiceLinkage
ffffcd8b`d0e1a200 00000000`00000000     : ffffd508`6f8fe1f0 ffffffff`80003afc fffff806`5f3e9c91 00000000`00000000 : klflt+0x8ded


SYMBOL_NAME:  klflt+8ded

MODULE_NAME: klflt

IMAGE_NAME:  klflt.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  8ded

FAILURE_BUCKET_ID:  AV_R_(null)_klflt!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b708cdd3-eb43-780b-4a7e-fd7c6498cb10}

Followup:     MachineOwner
---------

9: kd> lmvm klflt
Browse full module list
start             end                 module name
fffff806`70800000 fffff806`7088a000   klflt    T (no symbols)         
    Loaded symbol image file: klflt.sys
    Image path: \SystemRoot\system32\DRIVERS\klflt.sys
    Image name: klflt.sys
    Browse all global symbols  functions  data
    Timestamp:        Fri Feb 19 14:50:05 2021 (602FA5ED)
    CheckSum:         00084C56
    ImageSize:        0008A000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008886, The subtype of the BugCheck.
Arg2: fffff10004ef7230
Arg3: fffff3400677b260
Arg4: 0000000000000500

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4624

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11783

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5807

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 8886

BUGCHECK_P2: fffff10004ef7230

BUGCHECK_P3: fffff3400677b260

BUGCHECK_P4: 500

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  avp.exe

STACK_TEXT:
ffff8609`c2141548 fffff806`352aaa90     : 00000000`0000001a 00000000`00008886 fffff100`04ef7230 fffff340`0677b260 : nt!KeBugCheckEx
ffff8609`c2141550 fffff806`352a9b00     : 00000000`00000002 fffff806`00000000 00000000`001a5261 ffff8609`c21416c0 : nt!MiUnlinkPageFromList+0xcb0
ffff8609`c21415e0 fffff806`352a90e4     : ffff8609`c2141880 ffff8609`c2141920 0000000f`ffffffff 00000001`a52618c0 : nt!MiHandleTransitionFault+0x180
ffff8609`c2141660 fffff806`352a8b36     : ffff8609`c2141880 ffffb88b`6eb2ce90 fffff100`06d47510 00000000`00000000 : nt!MiResolveTransitionFault+0x424
ffff8609`c2141720 fffff806`352a1345     : ffff8609`c2141880 00000000`00000000 ffff8609`c2141860 00000000`00000000 : nt!MiResolveProtoPteFault+0x1236
ffff8609`c2141820 fffff806`3529f289     : 00000000`00000110 00000000`00000001 00000000`c0000016 ffff9180`6dad1a28 : nt!MiDispatchFault+0x3d5
ffff8609`c2141960 fffff806`3540535e     : 00000000`00000405 00000000`00000000 ffff8609`c2141b80 ffffffff`fd515ac0 : nt!MmAccessFault+0x189
ffff8609`c2141b00 00000000`68052eec     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`06a7d224 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x68052eec


SYMBOL_NAME:  nt!MiUnlinkPageFromList+cb0

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1237

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  cb0

FAILURE_BUCKET_ID:  0x1a_8886_nt!MiUnlinkPageFromList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf}

Followup:     MachineOwner
---------

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa5906ad7280, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8066642c852, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4921

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11181

    Key  : Analysis.Init.CPU.mSec
    Value: 640

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1478

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: fffffa5906ad7280

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8066642c852

READ_ADDRESS: fffff80666efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffffa5906ad7280

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffca0a5e2b51a0 -- (.trap 0xffffca0a5e2b51a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffff800004f6db80
rdx=0000001000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066642c852 rsp=ffffca0a5e2b5330 rbp=ffffb60d5ae50010
 r8=0000000000000002  r9=ffff800000000000 r10=ffffcd0a30a1a950
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiCheckProtoPtePageState+0x192:
fffff806`6642c852 f60720          test    byte ptr [rdi],20h ds:00000000`00000000=??
Resetting default scope

STACK_TEXT:
ffffca0a`5e2b5058 fffff806`66609169     : 00000000`0000000a fffffa59`06ad7280 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffca0a`5e2b5060 fffff806`66605469     : 00000001`ffffffff fffffff6`0000000d 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffca0a`5e2b51a0 fffff806`6642c852     : ffffcd0a`30a18b18 fffff806`66428871 ffff24d1`481fb2b6 ffffcd0a`30a18ad0 : nt!KiPageFault+0x469
ffffca0a`5e2b5330 fffff806`664ac8ad     : 00000000`00000000 00000000`00000011 ffffca0a`00000000 00000000`00000000 : nt!MiCheckProtoPtePageState+0x192
ffffca0a`5e2b53a0 fffff806`664c25a1     : ffffca0a`5e2b5a88 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiFlushSectionInternal+0x5cd
ffffca0a`5e2b5670 fffff806`664bf38d     : 00000000`00000001 ffffcd0a`304dd040 00000000`00015000 00000000`00000000 : nt!MmFlushSection+0xbd
ffffca0a`5e2b5720 fffff806`664bfd84     : ffffcd0a`30b292c8 00000000`00000000 00000000`00000001 ffffca0a`5e2b58c8 : nt!CcFlushCachePriv+0x6cd
ffffca0a`5e2b5870 fffff806`664c54c5     : ffffcd0a`31b30480 00000000`00000000 ffffcd0a`20a83000 ffffcd0a`00000000 : nt!CcWriteBehindInternal+0x1f4
ffffca0a`5e2b5950 fffff806`664c6da9     : 00000000`00000000 00000000`00000000 ffffcd0a`31b30480 ffffcd0a`00000007 : nt!CcWriteBehind+0x91
ffffca0a`5e2b5a40 fffff806`664b8515     : ffffcd0a`304dd040 ffffcd0a`304dd040 ffffcd0a`20aa18b0 ffffcd0a`00000000 : nt!CcWorkerThread+0x259
ffffca0a`5e2b5b70 fffff806`66555855     : ffffcd0a`304dd040 00000000`00000080 ffffcd0a`20a8e040 000f8067`bcbbbdff : nt!ExpWorkerThread+0x105
ffffca0a`5e2b5c10 fffff806`665fe818     : fffff806`6199d180 ffffcd0a`304dd040 fffff806`66555800 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffca0a`5e2b5c60 00000000`00000000     : ffffca0a`5e2b6000 ffffca0a`5e2b0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiCheckProtoPtePageState+192

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1237

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  192

FAILURE_BUCKET_ID:  AV_nt!MiCheckProtoPtePageState

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ede5e734-f6ab-fb5a-8532-de519e1f5d82}
Kaspersky ne gibi bir sorun yaratıyor olabilir ki? Ne yapmalıyım?
 
Kaspersky ne gibi bir sorun yaratıyor olabilir ki? Ne yapmalıyım?
Kaspersky bir güvenlik yazılımı olduğu için kendi sürücülerini (SYS) yüklüyor. Bu sürücüler uyumsuz ise soruna sebep olabilir. Kaspersky kaldırın, bir süre gözlemleyin.
 
Kaspersky bir güvenlik yazılımı olduğu için kendi sürücülerini (SYS) yüklüyor. Bu sürücüler uyumsuz ise soruna sebep olabilir. Kaspersky kaldırın, bir süre gözlemleyin.
Az önce online bir oyuna girdim ve mavi hata aldım. Yeniden başlatma bitince client'ı tekrar açmaya çalışırken başka bir mavi hata daha yedim. Yeniden başlattıktan sonra, masaüstü ekranında bir mavi ekran daha yedim ve birkaç dakika sonra tekrar bilgisayarı açtığımda kurtarma ekranı geldi:
1633035373036.png


Minidump2
 
Az önce Online bir oyuna girdim ve mavi hata aldım. Yeniden başlatma bitince Client'ı tekrar açmaya çalışırken başka bir mavi hata daha yedim. Yeniden başlattıktan sonra, masaüstü ekranında bir mavi ekran daha yedim ve birkaç dakika sonra tekrar bilgisayarı açtığımda kurtarma ekranı geldi:Eki Görüntüle 1177469

Minidump2

Sorun disk kaynaklı gibi duruyor hocam diski çıkar direkt olarak servise gönder.
 
Durum
Mesaj gönderimine kapalı.

Geri
Yukarı