Mavi Ekran Hatası

heyaman12

Hectopat
Katılım
21 Haziran 2014
Mesajlar
8
Daha fazla  
Cinsiyet
Erkek
Arkadaşlar merhaba,
4 günden beri mavi ekran hatası alıyorum. Birçok farklı hata kodu alıyorum. Bunları minidump dosyasına yükledim ve yardımcı olmanızı istiyorum. Herkese şimdiden teşekkür ederim.

Mavi Ekran Minidump.rar
 
Son düzenleyen: Moderatör:
  • Windows 10 sürüm 1507 gibi ilkel bir sürüm kullanıyorsunuz. Sürüm 20H2'ye geçin.
  • BIOS'u sürüm 411'e güncelleyin.
  • Intel ve NVIDIA GPU sürücünüzü DDU ile kaldırıp yeniden kurun.
  • MemTest86 ile belleklerde tarama yapın.
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc20012935fd0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800b7c87a3f, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1843

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9863

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: th1

    Key  : WER.OS.Timestamp
    Value: 2015-07-09T17:00:00Z

    Key  : WER.OS.Version
    Value: 10.0.10240.16384


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffc20012935fd0

BUGCHECK_P2: 0

BUGCHECK_P3: fffff800b7c87a3f

BUGCHECK_P4: 2

READ_ADDRESS: fffff8018f5d2500: Unable to get MiVisibleState
fffff8018f517e80: Unable to get Flags value from nt!KdVersionBlock
 ffffc20012935fd0 Paged pool

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  metin2client.b

TRAP_FRAME:  ffffd000254aa540 -- (.trap 0xffffd000254aa540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc00016b76520 rbx=0000000000000000 rcx=ffffc20012935fd0
rdx=ffffc0000be75770 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800b7c87a3f rsp=ffffd000254aa6d0 rbp=ffffe00087013000
 r8=0000000000000000  r9=0000000000000008 r10=ffffc00009d749c0
r11=000000000000001d r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
dxgmms1!VIDMM_GLOBAL::ReclaimOneAllocation+0x8f:
fffff800`b7c87a3f 483901          cmp     qword ptr [rcx],rax ds:ffffc200`12935fd0=????????????????
Resetting default scope

STACK_TEXT: 
ffffd000`254aa2f8 fffff801`8f3abbc5     : 00000000`00000050 ffffc200`12935fd0 00000000`00000000 ffffd000`254aa540 : nt!KeBugCheckEx
ffffd000`254aa300 fffff801`8f22d636     : 00000000`00000000 00000000`00000000 ffffd000`254aa540 fffff801`8f480297 : nt! ?? ::FNODOBFM::`string'+0x423c5
ffffd000`254aa3f0 fffff801`8f363cbd     : ffffe000`8be9b090 00000000`00000801 50646641`0000000f 00000000`00000001 : nt!MmAccessFault+0x696
ffffd000`254aa540 fffff800`b7c87a3f     : ffffe000`8701cbc0 00000000`00000003 ffffc000`16b76350 00000000`000001a5 : nt!KiPageFault+0x13d
ffffd000`254aa6d0 fffff800`b7c8bbdd     : ffffc000`0a41bb40 00000000`00000002 ffffc000`0515eca0 ffffe000`8ddfcdb0 : dxgmms1!VIDMM_GLOBAL::ReclaimOneAllocation+0x8f
ffffd000`254aa7d0 fffff800`b7e3a256     : ffffc000`0a41bbb8 00000000`00000000 00000000`00000111 ffffd000`254aaaa0 : dxgmms1!VIDMM_GLOBAL::BeginCPUAccess+0x89d
ffffd000`254aa940 fffff800`b7e36dfc     : 00000000`00000001 00000000`00000000 ffffd000`254aaa50 ffffc000`0c3212c0 : dxgkrnl!DXGDEVICE::Lock+0x276
ffffd000`254aa9f0 fffff801`8f365263     : 00000000`00c7eac0 ffffc000`000007db ffffc000`052fe000 ffffc000`052fe000 : dxgkrnl!DxgkLock+0x25c
ffffd000`254aab00 00000000`736e519a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00c7ea98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x736e519a


SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::ReclaimOneAllocation+8f

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

IMAGE_VERSION:  10.0.10240.16384

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  8f

FAILURE_BUCKET_ID:  AV_R_INVALID_dxgmms1!VIDMM_GLOBAL::ReclaimOneAllocation

OS_VERSION:  10.0.10240.16384

BUILDLAB_STR:  th1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d8bf8125-05f2-4393-e7f7-5417cbb464ac}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000020000000020, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80212604950, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1749

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13887

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 66

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: th1

    Key  : WER.OS.Timestamp
    Value: 2015-07-09T17:00:00Z

    Key  : WER.OS.Version
    Value: 10.0.10240.16384


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20000000020

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80212604950

READ_ADDRESS: fffff802127d2500: Unable to get MiVisibleState
fffff80212717e80: Unable to get Flags value from nt!KdVersionBlock
 0000020000000020

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffd000c5e06a50 -- (.trap 0xffffd000c5e06a50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd000c5e06be8 rbx=0000000000000000 rcx=ffffe000cabe0040
rdx=ffffd000c5f81d01 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80212604950 rsp=ffffd000c5e06be8 rbp=0000000000000001
 r8=0000020000000000  r9=0000000000000020 r10=0000000000000001
r11=0000000000000102 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na po nc
nt!KiBeginCounterAccumulation+0x20:
fffff802`12604950 498b7820        mov     rdi,qword ptr [r8+20h] ds:00000200`00000020=????????????????
Resetting default scope

BAD_STACK_POINTER:  ffffd000c5e06908

STACK_TEXT: 
ffffd000`c5e06908 fffff802`125655a9     : 00000000`0000000a 00000200`00000020 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffd000`c5e06910 fffff802`12563dc8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd000`c5e06a50 fffff802`12604950     : fffff802`125a8a6e ffffe000`cabe0040 00000000`00000000 ffffe000`cabe0040 : nt!KiPageFault+0x248
ffffd000`c5e06be8 fffff802`125a8a6e     : ffffe000`cabe0040 00000000`00000000 ffffe000`cabe0040 ffffd000`c5f7c180 : nt!KiBeginCounterAccumulation+0x20
ffffd000`c5e06bf0 fffff802`1255fc20     : ffffd000`c5f7c180 00000000`00000000 ffffd000`c5f82b40 fffff802`1255d952 : nt! ?? ::FNODOBFM::`string'+0x3f26e
ffffd000`c5e06c20 fffff802`1255da3d     : ffffd000`c5f7c180 ffffd000`c5f7c180 ffffd000`c5f88bc0 ffffe000`cbfd84c0 : nt!SwapContext+0x310
ffffd000`c5e06c60 00000000`00000000     : ffffd000`c5e07000 ffffd000`c5e01000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x11d


SYMBOL_NAME:  nt!KiBeginCounterAccumulation+20

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.10240.16384

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  20

FAILURE_BUCKET_ID:  AV_STACKPTR_ERROR_nt!KiBeginCounterAccumulation

OS_VERSION:  10.0.10240.16384

BUILDLAB_STR:  th1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e19fe251-46e0-b6e6-00f0-67f8682bdf94}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc20143caf3b0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80197fa7193, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1858

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8539

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: th1

    Key  : WER.OS.Timestamp
    Value: 2015-07-09T17:00:00Z

    Key  : WER.OS.Version
    Value: 10.0.10240.16384


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffc20143caf3b0

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80197fa7193

BUGCHECK_P4: 2

READ_ADDRESS: fffff803693d0500: Unable to get MiVisibleState
fffff80369315e80: Unable to get Flags value from nt!KdVersionBlock
 ffffc20143caf3b0 Paged pool

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffd001fd4a6570 -- (.trap 0xffffd001fd4a6570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc20143caf390 rbx=0000000000000000 rcx=ffffe00031a78230
rdx=ffffe000319c5890 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa0197fa7193 rsp=ffffd001fd4a6700 rbp=ffffd001fd4a67d1
 r8=0000000000000070  r9=0000000000000008 r10=0000000000000008
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
fffffa01`97fa7193 ??              ???
Resetting default scope

STACK_TEXT: 
ffffd001`fd4a6328 fffff803`691a9bc5     : 00000000`00000050 ffffc201`43caf3b0 00000000`00000000 ffffd001`fd4a6570 : nt!KeBugCheckEx
ffffd001`fd4a6330 fffff803`6902b636     : 00000000`00000000 00000000`00000000 ffffd001`fd4a6570 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x423c5
ffffd001`fd4a6420 fffff803`69161cbd     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x696
ffffd001`fd4a6570 fffffa01`97fa7193     : ffffc001`4d59bf98 ffffc001`4d59bf98 ffffe000`322c1000 ffffe000`31271000 : nt!KiPageFault+0x13d
ffffd001`fd4a6700 ffffc001`4d59bf98     : ffffc001`4d59bf98 ffffe000`322c1000 ffffe000`31271000 ffffe000`31272300 : 0xfffffa01`97fa7193
ffffd001`fd4a6708 ffffc001`4d59bf98     : ffffe000`322c1000 ffffe000`31271000 ffffe000`31272300 ffffe000`31272310 : 0xffffc001`4d59bf98
ffffd001`fd4a6710 ffffe000`322c1000     : ffffe000`31271000 ffffe000`31272300 ffffe000`31272310 ffffd001`fd4a68c0 : 0xffffc001`4d59bf98
ffffd001`fd4a6718 ffffe000`31271000     : ffffe000`31272300 ffffe000`31272310 ffffd001`fd4a68c0 00000000`00000000 : 0xffffe000`322c1000
ffffd001`fd4a6720 ffffe000`31272300     : ffffe000`31272310 ffffd001`fd4a68c0 00000000`00000000 00000000`00000003 : 0xffffe000`31271000
ffffd001`fd4a6728 ffffe000`31272310     : ffffd001`fd4a68c0 00000000`00000000 00000000`00000003 00000000`00000000 : 0xffffe000`31272300
ffffd001`fd4a6730 ffffd001`fd4a68c0     : 00000000`00000000 00000000`00000003 00000000`00000000 ffffe001`00000000 : 0xffffe000`31272310
ffffd001`fd4a6738 00000000`00000000     : 00000000`00000003 00000000`00000000 ffffe001`00000000 000003cc`00000000 : 0xffffd001`fd4a68c0


SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+1943

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

IMAGE_VERSION:  10.0.10240.16384

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1943

FAILURE_BUCKET_ID:  AV_R_INVALID_dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer

OS_VERSION:  10.0.10240.16384

BUILDLAB_STR:  th1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {25f01a38-57e0-64cb-c7f8-a2f24289c030}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc200ff3d0350, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80149567193, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1796

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12201

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: th1

    Key  : WER.OS.Timestamp
    Value: 2015-07-09T17:00:00Z

    Key  : WER.OS.Version
    Value: 10.0.10240.16384


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffc200ff3d0350

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80149567193

BUGCHECK_P4: 2

READ_ADDRESS: fffff8012a038500: Unable to get MiVisibleState
fffff80129f7de80: Unable to get Flags value from nt!KdVersionBlock
 ffffc200ff3d0350 Paged pool

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffd001dcd6e570 -- (.trap 0xffffd001dcd6e570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc200ff3d0330 rbx=0000000000000000 rcx=ffffe001a6745ab0
rdx=ffffe001a0980a40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80149567193 rsp=ffffd001dcd6e700 rbp=ffffd001dcd6e7d1
 r8=0000000000000070  r9=0000000000000008 r10=0000000000000008
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x1943:
fffff801`49567193 4c034020        add     r8,qword ptr [rax+20h] ds:ffffc200`ff3d0350=????????????????
Resetting default scope

STACK_TEXT: 
ffffd001`dcd6e328 fffff801`29e11bc5     : 00000000`00000050 ffffc200`ff3d0350 00000000`00000000 ffffd001`dcd6e570 : nt!KeBugCheckEx
ffffd001`dcd6e330 fffff801`29c93636     : 00000000`00000000 00000000`00000000 ffffd001`dcd6e570 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x423c5
ffffd001`dcd6e420 fffff801`29dc9cbd     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x696
ffffd001`dcd6e570 fffff801`49567193     : ffffc001`01eebf98 ffffc001`01eebf98 ffffe001`a53c7000 ffffe001`a53ed000 : nt!KiPageFault+0x13d
ffffd001`dcd6e700 fffff801`4955e007     : ffffe001`00000000 ffffc000`ff3d0330 00000000`00000000 ffffe001`a68c65f0 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x1943
ffffd001`dcd6e820 fffff801`49577f12     : ffffe001`a46f87c0 ffffe001`00000000 ffffe001`00000000 ffffe001`00000003 : dxgmms1!VidSchiSubmitRenderCommand+0x1e7
ffffd001`dcd6eb70 fffff801`49577e5d     : ffffe001`a53f3000 00000000`00000080 ffffe001`a018b780 ffffe001`a018b700 : dxgmms1!VidSchiRun_PriorityTable+0xb2
ffffd001`dcd6ebc0 fffff801`29d596d8     : ffffe001`a018b780 ffffd001`dcd6ec90 ffffd001`daa40180 fffff801`29dc5c30 : dxgmms1!VidSchiWorkerThread+0x8d
ffffd001`dcd6ec00 fffff801`29dc5d06     : ffffd001`daa40180 ffffe001`a019c080 ffffd001`daa4cbc0 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd001`dcd6ec60 00000000`00000000     : ffffd001`dcd6f000 ffffd001`dcd69000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+1943

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

IMAGE_VERSION:  10.0.10240.16384

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1943

FAILURE_BUCKET_ID:  AV_R_INVALID_dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer

OS_VERSION:  10.0.10240.16384

BUILDLAB_STR:  th1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {25f01a38-57e0-64cb-c7f8-a2f24289c030}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe20159624570, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80014adab48, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1780

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8635

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: th1

    Key  : WER.OS.Timestamp
    Value: 2015-07-09T17:00:00Z

    Key  : WER.OS.Version
    Value: 10.0.10240.16384


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffe20159624570

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80014adab48

READ_ADDRESS: fffff80014e54500: Unable to get MiVisibleState
fffff80014d99e80: Unable to get Flags value from nt!KdVersionBlock
 ffffe20159624570 Nonpaged pool

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

IRP_ADDRESS: ffffffffffffff88

TRAP_FRAME:  ffffd000213ed3c0 -- (.trap 0xffffd000213ed3c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe20159624570 rbx=0000000000000000 rcx=ffffe0015e1381a8
rdx=ffffe20159624570 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80014adab48 rsp=ffffd000213ed550 rbp=ffffd000213ed698
 r8=0000000000000000  r9=0000000000000002 r10=ffffd0011277d120
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!IopCompleteRequest+0xf78:
fffff800`14adab48 488b00          mov     rax,qword ptr [rax] ds:ffffe201`59624570=????????????????
Resetting default scope

STACK_TEXT: 
ffffd000`213ed278 fffff800`14be75a9     : 00000000`0000000a ffffe201`59624570 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`213ed280 fffff800`14be5dc8     : 00000000`00000000 00000000`00000200 00000000`00000010 ffffe001`5db391a0 : nt!KiBugCheckDispatch+0x69
ffffd000`213ed3c0 fffff800`14adab48     : 00000000`00000000 00000000`00000000 00000000`00000005 00000000`00000000 : nt!KiPageFault+0x248
ffffd000`213ed550 fffff800`14ad1656     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xf78
ffffd000`213ed650 fffff800`14ad5496     : ffffe001`5db29080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x136
ffffd000`213ed6d0 fffff800`14ad4be8     : 00000018`1c7909b2 ffffe001`5db29080 00000000`00000000 00000000`00000001 : nt!KiSwapThread+0x426
ffffd000`213ed780 fffff800`14ad40d9     : ffffe001`5db2f9b0 00000000`0000000a 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x148
ffffd000`213ed810 fffff960`ed064e2e     : fffff901`0000000a ffffe001`5db2f9b0 fffff901`401a40a0 fffff800`0000000d : nt!KeWaitForMultipleObjects+0x229
ffffd000`213ed8d0 fffff960`ed12fed1     : ffffe001`5d9ad2d0 00000000`00000001 00000000`00000001 ffffe001`5d9ad2d0 : win32kfull!xxxDesktopThreadWaiter+0x14e
ffffd000`213ed960 fffff960`ed413d55     : 00000000`00000001 00000000`00000001 00000000`00000003 00000000`00000001 : win32kfull!xxxDesktopThread+0x4f1
ffffd000`213eda90 fffff960`ed0f59fd     : 00000000`00000001 fffff960`ed497ab0 00000000`00000004 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x85
ffffd000`213edad0 fffff800`14be7263     : ffffe001`5db29080 00000000`00000004 000000ee`315097d8 000000ee`31504c50 : win32kfull!NtUserCallNoParam+0x2d
ffffd000`213edb00 00007ffd`6fd37a5a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000ee`320ffc78 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6fd37a5a


SYMBOL_NAME:  win32kfull!xxxDesktopThreadWaiter+14e

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.10240.16384

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  14e

FAILURE_BUCKET_ID:  AV_win32kfull!xxxDesktopThreadWaiter

OS_VERSION:  10.0.10240.16384

BUILDLAB_STR:  th1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0143e876-c439-d336-acae-d9f6d2868b4e}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe200e29d1eb0, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff803c7c52e72, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1811

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9764

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: th1

    Key  : WER.OS.Timestamp
    Value: 2015-07-09T17:00:00Z

    Key  : WER.OS.Version
    Value: 10.0.10240.16384


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffe200e29d1eb0

BUGCHECK_P2: 2

BUGCHECK_P3: fffff803c7c52e72

BUGCHECK_P4: 2

READ_ADDRESS: fffff803c7fe1500: Unable to get MiVisibleState
fffff803c7f26e80: Unable to get Flags value from nt!KdVersionBlock
 ffffe200e29d1eb0 Nonpaged pool

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  sedsvc.exe

DEVICE_OBJECT: 0000000000000408

TRAP_FRAME:  ffffd0002036fba0 -- (.trap 0xffffd0002036fba0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000007
rdx=0000000000000200 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803c7c52e72 rsp=ffffd0002036fd30 rbp=ffffd0002036fe30
 r8=00000000ffffffff  r9=0000098000000000 r10=00000000ffffffff
r11=7ff0000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!MmCheckCachedPageStates+0x732:
fffff803`c7c52e72 898bb0060000    mov     dword ptr [rbx+6B0h],ecx ds:00000000`000006b0=????????
Resetting default scope

STACK_TEXT: 
ffffd000`2036f958 fffff803`c7dbabc5     : 00000000`00000050 ffffe200`e29d1eb0 00000000`00000002 ffffd000`2036fba0 : nt!KeBugCheckEx
ffffd000`2036f960 fffff803`c7c3c636     : 00000000`00000002 00000000`00000000 ffffd000`2036fba0 ffffe000`00000000 : nt! ?? ::FNODOBFM::`string'+0x423c5
ffffd000`2036fa50 fffff803`c7d72cbd     : ffffb001`53b00000 ffff7a78`307e060b 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x696
ffffd000`2036fba0 fffff803`c7c52e72     : 00000000`000000a0 ffffe000`e29d1800 ffffe000`e4bdb3f0 ffffd000`2036fe48 : nt!KiPageFault+0x13d
ffffd000`2036fd30 fffff803`c7c52655     : ffffe000`e29fa9b0 00000000`00000001 ffffe000`dfb123c0 00000000`00001000 : nt!MmCheckCachedPageStates+0x732
ffffd000`2036fed0 fffff803`c80307e7     : ffffc000`00000000 00000000`00000000 ffffd000`2036ff01 00000000`00000001 : nt!CcMapAndRead+0xe5
ffffd000`2036ff30 fffff801`d26cb29c     : ffffe000`dfca1cd8 ffffc000`53c87938 00000000`00001000 ffffc000`00040000 : nt!CcMapData+0x97
ffffd000`2036ffa0 fffff801`d26cac8f     : ffffe000`e67c9978 ffffc000`53c87930 ffffb001`507c3658 ffffe000`00000000 : NTFS!ReadIndexBuffer+0xdc
ffffd000`20370050 fffff801`d26d0e05     : ffffc000`57633b40 ffffd000`20370150 00000000`00000000 ffffb001`507c3658 : NTFS!FindFirstIndexEntry+0x17f
ffffd000`20370100 fffff801`d26cdb28     : ffffc000`57633e08 ffffc000`57633b40 ffffe000`e6901bb0 00000000`0000002a : NTFS!NtfsRestartIndexEnumeration+0x145
ffffd000`20370390 fffff801`d26cfc63     : 00000000`00000000 ffffe000`e29fecb0 ffffd000`203708c0 00000000`00000000 : NTFS!NtfsQueryDirectory+0xb68
ffffd000`20370770 fffff801`d26cfda7     : 00000000`00000000 ffffe000`e6901810 ffffe000`e6901801 ffffd000`203708c0 : NTFS!NtfsCommonDirectoryControl+0xa3
ffffd000`203707b0 fffff801`d1df51c4     : ffffe000`e6901810 ffffe000`e6901810 ffffe000`e67c9978 ffffd000`203707d8 : NTFS!NtfsFsdDirectoryControl+0xb7
ffffd000`20370820 fffff801`d1df3a16     : ffffe000`dfbb5e40 ffffd000`20370b80 00000000`00000401 ffffe000`e128e400 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2a4
ffffd000`203708a0 fffff803`c803d72b     : 00000000`00000002 ffffd000`20370981 ffffe000`e68e6850 ffffe000`e68e6804 : FLTMGR!FltpDispatch+0xb6
ffffd000`20370900 fffff803`c803c0ef     : 00000000`00000408 00000000`00000000 00000000`00000000 ffffe000`e29d1800 : nt!IopSynchronousServiceTail+0x16b
ffffd000`203709d0 fffff803`c7d74263     : ffffc000`53861780 fffff803`c803e05d fffff803`c84bb1e0 ffffd000`20370b80 : nt!NtQueryDirectoryFile+0xcf
ffffd000`20370a90 00007fff`a275389a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000006e`df58c4c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a275389a


SYMBOL_NAME:  nt!MmCheckCachedPageStates+732

MODULE_NAME: nt

IMAGE_VERSION:  10.0.10240.16384

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  732

FAILURE_BUCKET_ID:  AV_INVALID_nt!MmCheckCachedPageStates

OS_VERSION:  10.0.10240.16384

BUILDLAB_STR:  th1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c23772ba-b187-2947-9bda-16ca1f251011}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041289, The subtype of the bugcheck.
Arg2: 00007fffc1f6b000
Arg3: 00000000000059f1
Arg4: 00007dffc1f6b205

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1718

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8448

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 66

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: th1

    Key  : WER.OS.Timestamp
    Value: 2015-07-09T17:00:00Z

    Key  : WER.OS.Version
    Value: 10.0.10240.16384


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41289

BUGCHECK_P2: 7fffc1f6b000

BUGCHECK_P3: 59f1

BUGCHECK_P4: 7dffc1f6b205

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffffd000`21e29628 fffff802`d53944de     : 00000000`0000001a 00000000`00041289 00007fff`c1f6b000 00000000`000059f1 : nt!KeBugCheckEx
ffffd000`21e29630 fffff802`d526cdd6     : ffff0000`00000000 ffffe000`acede578 ffffe000`b106ee00 00000000`000021bd : nt! ?? ::FNODOBFM::`string'+0x21cde
ffffd000`21e29690 fffff802`d523d506     : fffffa80`016b9b70 fffff802`d52f9921 fffff6bf`ffe0f9c0 fffff802`d524e02a : nt!MiLocateWsle+0x16
ffffd000`21e296f0 fffff802`d523f837     : 00000000`0000003a 1f100000`652a8025 00000000`00000000 fffff6bf`ffe0f9c0 : nt!MiGetPageProtection+0x106
ffffd000`21e29740 fffff802`d523f319     : ffffe000`acede080 00000000`00000000 00000000`00000000 00000000`00000118 : nt!MiQueryAddressState+0x307
ffffd000`21e29840 fffff802`d5620178     : 00000000`00000003 00000007`00000003 00007fff`c1f6b000 00007fff`bfc9f000 : nt!MiQueryAddressSpan+0x139
ffffd000`21e298d0 fffff802`d561fb1d     : 00000000`00000000 00000000`00000080 00000000`00000000 00000000`00000000 : nt!MmQueryVirtualMemory+0x648
ffffd000`21e29a40 fffff802`d536e263     : fffff6fb`40128860 fffff680`2510c550 ffffc9b2`60ed292b 0000004a`2737f208 : nt!NtQueryVirtualMemory+0x25
ffffd000`21e29a90 00007fff`e346377a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000004a`2737e8c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`e346377a


SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+21cde

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.10240.16384

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  21cde

FAILURE_BUCKET_ID:  0x1a_41289_nt!_??_::FNODOBFM::_string_

OS_VERSION:  10.0.10240.16384

BUILDLAB_STR:  th1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e01cf37e-0b3f-17aa-251b-4e0e5b8f0b0f}

Followup:     MachineOwner
---------
 
Son düzenleme:
USB ile temiz kurulum nasıl oluyor, açıklar mısınız? Ya da link bırakmanız mümkün müdür?
Eski Windows'u silip yerine güncel Windows'u kurmak demek istedim.

Nasıl yapıldığına bu rehberden bakabilirsiniz:
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Ayrıca attığım bağlantıda da rehber var.

6:48'deki yere geldiğiniz zaman eski Windows'unuza dair tüm bölümleri seçip "Sil"e basmayı unutmayın. Tabii, bundan önce verilerinizi yedekleyin.
 
BIOS adresinden indirme işlemini tamamladım, karşıma bir dosya çıktı. Onu nereye atmam gerekiyor peki?
Hangi dosyadan bahsediyorsunuz? .411 uzantılı dosya mı?

O dosyadan bahsediyorsanız dosyayı bir USB belleğin içine atın ve aşağıdaki rehbere bakın:

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Türkçe altyazı desteği var.
 
Hangi dosyadan bahsediyorsunuz? .411 uzantılı dosya mı?

O dosyadan bahsediyorsanız dosyayı bir USB belleğin içine atın ve aşağıdaki rehbere bakın:

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Türkçe altyazı desteği var.
Advanced bölümünden Asus EZ Flash kısmını seçmem gerekiyor ancak o bölüm ben de yok flash bellek pcye takılı olmasına rağmen. Sizi de çok uğraştırıyorum ama zahmet olmazsa yardımcı olur musunuz?
 

Yeni konular

Geri
Yukarı