PAGE_FAULT_IN_NONPAGED_AREA Mavi ekran hatası

DDU ile ekran kartı sürücünü kaldır, WHQL sürümü kur.
Ses sürücünü, BIOS'unu, SATA sürücülerini güncelle. Support For B450M PRO-M2 V2 | Motherboard - The world leader in motherboard design | MSI Global
Klavye ve fare dışındaki USB aygıtları çıkart.
MalwareBytes'ı kaldır.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000024, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80145c65f40, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 18265

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-74VRRQ7

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 40000

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 24

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80145c65f40

WRITE_ADDRESS: fffff801466fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8014660f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8014660f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000024

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  proven_ground_client.exe

TRAP_FRAME:  ffffad84c157fa60 -- (.trap 0xffffad84c157fa60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc5876cdb32d0 rbx=0000000000000000 rcx=ffffc5876cdbda00
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80145c65f40 rsp=ffffad84c157fbf8 rbp=0000000000000000
 r8=ffffc5876cdb25e0  r9=0000000000000000 r10=fffff80145c65f40
r11=ffffcbfe57a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KeAcquireInterruptSpinLock:
fffff801`45c65f40 48895c2408      mov     qword ptr [rsp+8],rbx ss:0018:ffffad84`c157fc00=ff282828ff282828
Resetting default scope

STACK_TEXT: 
ffffad84`c157f918 fffff801`45e05e69     : 00000000`0000000a 00000000`00000024 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffad84`c157f920 fffff801`45e02169     : ff282828`ff282828 ff282828`ff282828 ff282828`ff282828 ff282828`ff282828 : nt!KiBugCheckDispatch+0x69
ffffad84`c157fa60 fffff801`45c65f40     : fffff801`479c651b ff282828`ff282828 ff282828`ff282828 ff282828`ff282828 : nt!KiPageFault+0x469
ffffad84`c157fbf8 fffff801`479c651b     : ff282828`ff282828 ff282828`ff282828 ff282828`ff282828 ff282828`ff282828 : nt!KeAcquireInterruptSpinLock
ffffad84`c157fc00 fffff801`479e0bb1     : ffffad84`c157fd38 ffffc587`6cdb31a0 ff282828`ff282828 ff282828`ff282828 : storport!RaidAdapterAcquireInterruptLock+0x33
ffffad84`c157fc30 fffff801`47985ab1     : ff282828`ff282828 ffffc587`6cdb25e0 00000000`00000003 00000000`00000000 : storport!StorPortNotification+0x139c1
ffffad84`c157fd00 fffff801`47985480     : 00000000`00000000 ff282828`ff282800 ff282828`ff282828 ff282828`ff282800 : storahci!AhciProcessIo+0x141
ffffad84`c157fd90 fffff801`479c5e35     : 00000000`00000001 00000000`00000000 ffffc587`6cd30270 00000000`00000000 : storahci!AhciHwStartIo+0xf0
ffffad84`c1580070 fffff801`479c4f02     : ffffdc00`40200342 ffffc587`7341e4f0 ffffdc00`1b874ef0 00000000`00280000 : storport!RaidAdapterPostScatterGatherExecute+0x215
ffffad84`c1580100 fffff801`45d9abb9     : fffff801`479c4ec0 ffffdc00`1b872190 00000000`00000000 00000003`a3d63000 : storport!RaidpAdapterContinueScatterGather+0x42
ffffad84`c1580130 fffff801`45d9aae3     : ffffdc00`1b872190 ffffc587`6cdbd6f0 ffffc587`00005000 00000000`00000000 : nt!HalpAllocateAdapterCallbackV3+0xa9
ffffad84`c15801b0 fffff801`45d9a923     : ffffc587`6cdc01a0 00000000`00000000 00000000`00000000 ffffc587`6cdb31a0 : nt!HalpBuildScatterGatherList+0x1af
ffffad84`c1580230 fffff801`479c53be     : ff1880c9`ff1880c9 ff1880c9`ff1880c9 ff1498f6`ff1880c9 ff205579`ff1497f4 : nt!HalBuildScatterGatherListV3+0x73
ffffad84`c15802c0 fffff801`479cac20     : 00000000`00000028 ffffc587`40200342 ffffad84`c1580460 00000000`00000001 : storport!RaUnitStartIo+0x48e
ffffad84`c15803c0 fffff801`479ca4ec     : 00000000`00000003 fffff801`45c4dd02 00000000`00000000 ffffc587`6cdb3101 : storport!RaidStartIoPacket+0x4f0
ffffad84`c15804f0 fffff801`479ca28a     : ff1880c9`ff188000 ff1880c9`ff188000 00000000`00000000 ff1880c9`ff1880c9 : storport!RaUnitScsiIrp+0x21c
ffffad84`c1580590 fffff801`45cd1f35     : ffffc587`6f0a9a50 00000000`00005000 00000000`ba888000 00000000`00000000 : storport!RaDriverScsiIrp+0x5a
ffffad84`c15805d0 fffff801`486f70ed     : ffffc587`6f0a9a50 00000000`00005000 ffffc587`6cfcf040 ffffc587`6cfcf040 : nt!IofCallDriver+0x55
ffffad84`c1580610 fffff801`486f660c     : 00000000`00000000 00000000`00000000 00000000`00005000 00000000`00000028 : CLASSPNP!SubmitTransferPacket+0x29d
ffffad84`c1580660 fffff801`486f636b     : ffffc587`6f0a9a50 ffffc587`7a5a7b20 ffffc587`7a5a7b00 00000000`00000000 : CLASSPNP!ServiceTransferRequest+0x21c
ffffad84`c15806f0 fffff801`486f83e3     : 00000000`00000000 ffffc587`6cf3ea20 00000000`9228d000 00000000`00989680 : CLASSPNP!ClassReadWrite+0x14b
ffffad84`c1580740 fffff801`45cd1f35     : ffffc587`6cf438a0 ffffc587`7a5a7b20 ffffc587`6cffc820 00000000`00000000 : CLASSPNP!ClassGlobalDispatch+0x23
ffffad84`c1580770 fffff801`477e39cb     : 00000000`00000000 00000000`0537f1ec 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffad84`c15807b0 fffff801`477e3cff     : 00000001`00000001 00000005`bb27a5b7 00000000`00000000 00000000`0000ffff : partmgr!PmIo+0xeb
ffffad84`c1580830 fffff801`45cd1f35     : ffffc587`7a5360c0 ffffc587`7b183600 00000000`00000001 ffffc587`7b183600 : partmgr!PmGlobalDispatch+0x1f
ffffad84`c1580860 fffff801`477e3534     : ffffc587`7b183600 00000000`00005000 f5ae02ae`00000000 ffffad84`c15808e0 : nt!IofCallDriver+0x55
ffffad84`c15808a0 fffff801`477e3cff     : 00000000`00005000 ffffc587`7a5a7d58 ffffad84`c1580ac9 00000000`00000000 : partmgr!PartitionIo+0x1d4
ffffad84`c1580950 fffff801`45cd1f35     : ffffad84`c1580ac9 fffff801`477e3c7d 00000000`00000000 ffffad84`c15809c0 : partmgr!PmGlobalDispatch+0x1f
ffffad84`c1580980 fffff801`478d1109     : ffffc587`6cf2ba40 00000000`00000001 00000005`bb27a5aa ffffc587`6cf2b8f0 : nt!IofCallDriver+0x55
ffffad84`c15809c0 fffff801`45cd1f35     : ffffad84`c1580ac9 ffffc587`6f070180 00000000`00000002 00000000`00000000 : volmgr!VmReadWrite+0xf9
ffffad84`c1580a00 fffff801`484d4ece     : ffffc587`6f070180 ffffad84`c1580ac9 ffffc587`6f0701b8 00000000`00000000 : nt!IofCallDriver+0x55
ffffad84`c1580a40 fffff801`484d4b77     : 00000000`00000000 ffffad84`c1580c20 00000000`00000000 ffffc587`7a5a7b20 : fvevol!FveFilterRundownReadWrite+0x33e
ffffad84`c1580b30 fffff801`45cd1f35     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fvevol!FveFilterRundownRead+0x27
ffffad84`c1580b60 fffff801`48693cb7     : ffff2886`c0fd2bfc 00000000`00000000 ffffc587`6cf51a20 ffffc587`7a5a7b20 : nt!IofCallDriver+0x55
ffffad84`c1580ba0 fffff801`48694fe5     : 00000000`00000002 ffffad84`c1580d69 ffffc587`6cf9cbc0 ffffc587`7a5a7b20 : iorate!IoRateIssueAndRecordIo+0x7f
ffffad84`c1580be0 fffff801`4869519f     : 00000000`00000022 00000000`00000000 ffffad84`c1580e40 ffffad84`c1580d00 : iorate!IoRateProcessIrpWrapper+0x69
ffffad84`c1580c70 fffff801`45cd1f35     : 00000000`00000000 fffff024`44e84010 00000000`00000000 00000000`00030000 : iorate!IoRateDispatchReadWrite+0x5f
ffffad84`c1580cb0 fffff801`48601280     : 00000000`00000000 fffff801`45df4666 00007ff8`cbd23775 00000000`04fbc550 : nt!IofCallDriver+0x55
ffffad84`c1580cf0 fffff801`48601095     : 00000000`00000000 ffffc587`79f6c0c0 00000000`00000001 ffffc587`6cf51a20 : rdyboost!SmdProcessReadWrite+0x1a0
ffffad84`c1580dd0 fffff801`45cd1f35     : ffffc587`7b183600 ffffc587`6cf94190 ffffad84`c129f902 00000000`00000000 : rdyboost!SmdDispatchReadWrite+0x85
ffffad84`c1580e00 fffff801`47de1033     : ffffc587`6cfa2500 fffff801`48591a98 00000000`00000000 ffffc587`7263f080 : nt!IofCallDriver+0x55
ffffad84`c1580e40 fffff801`45cd1f35     : ffffc587`6cf94190 fffff801`485dacf8 00000000`00000018 00000099`8ddff158 : volume!VolumePassThrough+0x23
ffffad84`c1580e70 fffff801`48594e3a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffad84`c1580eb0 fffff801`485911a9     : ffffad84`c129fa88 00000000`00000000 00000000`00000000 00000000`00000000 : volsnap!VolSnapReadFilter+0x3c7a
ffffad84`c1580ee0 fffff801`45cd1f35     : 00007ff8`c5a53d88 00000000`00000000 00000000`00000000 00000000`00000000 : volsnap!VolSnapRead+0x19
ffffad84`c1580f10 fffff801`47e1f90c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffad84`c1580f50 fffff801`45df777e     : 00000000`00000000 00000000`00000000 00000000`00000000 0000026b`6c4d2740 : Ntfs!NtfsStorageDriverCallout+0x1c
ffffad84`c1580f80 fffff801`45df773c     : ffffad84`c1580fd0 ffffc587`7b183600 ffffad84`c1581000 fffff801`45cb8c6d : nt!KxSwitchKernelStackCallout+0x2e
ffffad84`c129f870 fffff801`45cb8c6d     : ffffad84`c1580fd0 ffffc587`7b183600 ffffad84`c129f902 00000000`00000000 : nt!KiSwitchKernelStackContinue
ffffad84`c129f890 fffff801`45cb8a62     : fffff801`47e1f8f0 ffffad84`c129fa88 ffffad84`00000002 ffffc587`00000002 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x19d
ffffad84`c129f930 fffff801`45cb88c3     : ffffad84`c129fbd0 00000000`00000001 ffff8984`00000000 ffffc587`6cf94040 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2
ffffad84`c129f9a0 fffff801`45cb887d     : fffff801`47e1f8f0 ffffad84`c129fa88 ffffc587`7974d058 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0x33
ffffad84`c129fa10 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d


SYMBOL_NAME:  storahci!AhciProcessIo+141

MODULE_NAME: storahci

IMAGE_NAME:  storahci.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  141

FAILURE_BUCKET_ID:  AV_storahci!AhciProcessIo

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {efc52757-3035-e81e-2717-53469e0482b8}

Followup:     MachineOwner
---------


Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff800738aae70
Arg3: ffff9c0427c94000
Arg4: fffff8006e684769

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6421

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-74VRRQ7

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10224

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: fffff800738aae70

BUGCHECK_P3: ffff9c0427c94000

BUGCHECK_P4: fffff8006e684769

TRAP_FRAME:  fffff800738aae70 -- (.trap 0xfffff800738aae70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9c0427c94058 rbx=0000000000000000 rcx=ffff9c0427c94090
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8006e684769 rsp=ffff9c0427c94000 rbp=ffff9c0427c94600
 r8=0000000000000068  r9=0000000040000000 r10=ffff9c0427c94140
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiOpDecode+0x49:
fffff800`6e684769 e812291800      call    nt!memset (fffff800`6e807080)
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  proven_ground_client.exe

STACK_OVERFLOW: Stack Limit: ffff9c0427c94000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xfffff8006e683ca1 was blamed for the stack overflow. It is using 14192 bytes of stack total in 8 instances (likely recursion).

STACK_TEXT: 
ffff9c04`27c94000 fffff800`6e68422f     : ffff9c04`27c94908 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiOpDecode+0x49
ffff9c04`27c94060 fffff800`6e683ca1     : ffff9c04`27c94908 ffff9c04`27c94640 ffff9c04`27c94140 ffff9c04`27c94c00 : nt!KiPreprocessFault+0xbf
ffff9c04`27c94110 fffff800`6e805fac     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x141
ffff9c04`27c947d0 fffff800`6e8004e9     : 3f800000`00000001 00000000`00000000 3f800000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffff9c04`27c949b0 fffff800`6e6849c1     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x329
ffff9c04`27c94b40 fffff800`6e684808     : ffff9c04`27c94c00 00000000`40000000 00000000`00000000 00000000`00000000 : nt!KiOpLocateDecodeEntry+0x4d
ffff9c04`27c94b70 fffff800`6e68422f     : ffff9c04`27c95478 00000000`00000000 00000000`00000082 00000000`00000000 : nt!KiOpDecode+0xe8
ffff9c04`27c94bd0 fffff800`6e683ca1     : ffff9c04`27c95478 ffff9c04`27c951b0 ffff9c04`27c94cb0 ffff9c04`27c95770 : nt!KiPreprocessFault+0xbf
ffff9c04`27c94c80 fffff800`6e805fac     : 00610071`00630039 0061002b`00730045 00520032`004c006d 00660039`006b002b : nt!KiDispatchException+0x141
ffff9c04`27c95340 fffff800`6e8004e9     : 007a0038`00510065 00720072`00610046 00450063`0071002b 00670042`00650057 : nt!KiExceptionDispatch+0x12c
ffff9c04`27c95520 fffff800`6e6849c1     : 006e0066`006c004d 00340049`00440034 0066005a`00550055 00570071`006e004f : nt!KiInvalidOpcodeFault+0x329
ffff9c04`27c956b0 fffff800`6e684808     : ffff9c04`27c95770 00000000`40000000 00730033`006c0038 004e0036`00410048 : nt!KiOpLocateDecodeEntry+0x4d
ffff9c04`27c956e0 fffff800`6e68422f     : ffff9c04`27c95fe8 00760057`00770000 00570062`00510082 0048005a`00520000 : nt!KiOpDecode+0xe8
ffff9c04`27c95740 fffff800`6e683ca1     : ffff9c04`27c95fe8 ffff9c04`27c95d20 ffff9c04`27c95820 ffff9c04`27c962e0 : nt!KiPreprocessFault+0xbf
ffff9c04`27c957f0 fffff800`6e805fac     : 34c3d378`43497bba 0000021c`b5b0d548 0000021c`b5b26b48 0000021c`b5b11d98 : nt!KiDispatchException+0x141
ffff9c04`27c95eb0 fffff800`6e8004e9     : 00000100`437e0000 00000001`00000100 00000000`00000010 00000000`00000008 : nt!KiExceptionDispatch+0x12c
ffff9c04`27c96090 fffff800`6e6849c1     : 00000100`437e0000 00000001`00000100 00000000`00000010 00000000`00000038 : nt!KiInvalidOpcodeFault+0x329
ffff9c04`27c96220 fffff800`6e684808     : ffff9c04`27c962e0 00000000`40000000 00000000`00000000 00000000`00000000 : nt!KiOpLocateDecodeEntry+0x4d
ffff9c04`27c96250 fffff800`6e68422f     : ffff9c04`27c96b58 000000fe`00000000 033a6984`00000082 00000350`00000000 : nt!KiOpDecode+0xe8
ffff9c04`27c962b0 fffff800`6e683ca1     : ffff9c04`27c96b58 ffff9c04`27c96890 ffff9c04`27c96390 ffff9c04`27c96e50 : nt!KiPreprocessFault+0xbf
ffff9c04`27c96360 fffff800`6e805fac     : 00000000`00000010 00000000`00000008 00000010`00000018 b0a440d1`d62cfa45 : nt!KiDispatchException+0x141
ffff9c04`27c96a20 fffff800`6e8004e9     : 000002fb`000002fb 00000034`000000fe 000002fb`000002fb 00000034`000000fe : nt!KiExceptionDispatch+0x12c
ffff9c04`27c96c00 fffff800`6e6849c1     : 000002fb`000004f7 00000034`00000020 000002fb`000004f7 00000034`00000020 : nt!KiInvalidOpcodeFault+0x329
ffff9c04`27c96d90 fffff800`6e684808     : ffff9c04`27c96e50 00000000`40000000 42000000`3f800000 00000100`42500000 : nt!KiOpLocateDecodeEntry+0x4d
ffff9c04`27c96dc0 fffff800`6e68422f     : ffff9c04`27c976c8 00000000`00000000 00000000`00000082 00000000`00000000 : nt!KiOpDecode+0xe8
ffff9c04`27c96e20 fffff800`6e683ca1     : ffff9c04`27c976c8 ffff9c04`27c97400 ffff9c04`27c96f00 ffff9c04`27c979c0 : nt!KiPreprocessFault+0xbf
ffff9c04`27c96ed0 fffff800`6e805fac     : 00000000`00000000 00000000`00000038 00000000`0000034b 00000002`00000000 : nt!KiDispatchException+0x141
ffff9c04`27c97590 fffff800`6e8004e9     : 00000000`00000000 00000000`00000028 0000000e`00000001 00000002`00000001 : nt!KiExceptionDispatch+0x12c
ffff9c04`27c97770 fffff800`6e6849c1     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x329
ffff9c04`27c97900 fffff800`6e684808     : ffff9c04`27c979c0 00000000`40000000 00000000`00000000 00000000`00000000 : nt!KiOpLocateDecodeEntry+0x4d
ffff9c04`27c97930 fffff800`6e68422f     : ffff9c04`27c98238 fffff800`6e6e5700 ffff8381`ca3ec682 ffff9c04`27c97a00 : nt!KiOpDecode+0xe8
ffff9c04`27c97990 fffff800`6e683ca1     : ffff9c04`27c98238 ffff9c04`27c97f70 ffff9c04`27c97a70 ffff9c04`27c98530 : nt!KiPreprocessFault+0xbf
ffff9c04`27c97a40 fffff800`6e805fac     : ffffc884`69ce042c ffffc884`91fde060 ffffc884`91fde060 ffffc884`69ce0300 : nt!KiDispatchException+0x141
ffff9c04`27c98100 fffff800`6e8004e9     : fffff800`6f050b00 ffff9c04`27c983e8 ffff9c04`27c98348 ffff9c04`27c98310 : nt!KiExceptionDispatch+0x12c
ffff9c04`27c982e0 fffff800`6e6849c1     : ffff8381`c77e6740 ffff8381`c77e6740 fffff178`b6a4b420 ffff9c04`27c98620 : nt!KiInvalidOpcodeFault+0x329
ffff9c04`27c98470 fffff800`6e684808     : ffff9c04`27c98530 00000000`10000000 00000000`00000000 ffff9c04`27c98620 : nt!KiOpLocateDecodeEntry+0x4d
ffff9c04`27c984a0 fffff800`6e68422f     : ffff9c04`27c98da8 fffff800`6e6c8600 00000000`0000008a fffff800`6e6fd000 : nt!KiOpDecode+0xe8
ffff9c04`27c98500 fffff800`6e683ca1     : ffff9c04`27c98da8 ffff9c04`27c98ae0 ffff9c04`27c985e0 ffff9c04`27c99120 : nt!KiPreprocessFault+0xbf
ffff9c04`27c985b0 fffff800`6e805fac     : 00000000`00001000 ffff9c04`27c98e50 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x141
ffff9c04`27c98c70 fffff800`6e802143     : fffff800`6e7eff90 fffff800`6e63f03a 00000000`00000006 fffff800`6e63f03a : nt!KiExceptionDispatch+0x12c
ffff9c04`27c98e50 fffff800`6e684856     : 00000000`00000000 fffff800`6e6fcba7 ffff8381`ca3ec080 ffff8381`ca3ec080 : nt!KiPageFault+0x443
ffff9c04`27c98fe0 fffff800`6e68422f     : ffff9c04`27c99a58 00000000`00000000 ffff9c04`27c99b00 fffff800`6e71de00 : nt!KiOpDecode+0x136
ffff9c04`27c99040 fffff800`6e683ca1     : ffff9c04`27c99a58 ffff9c04`27c99790 ffff9c04`27c99120 00000000`00000050 : nt!KiPreprocessFault+0xbf
ffff9c04`27c990f0 fffff800`6e805fac     : 00000000`00001000 ffff9c04`27c99b00 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x141
ffff9c04`27c99920 fffff800`6e802143     : 00000241`ff4201e0 00000000`00029489 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffff9c04`27c99b00 00000001`19930522     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
00000241`ff420258 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`19930522


STACK_COMMAND:  .trap 0xfffff800738aae70 ; kb

SYMBOL_NAME:  nt!KiDispatchException+141

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

BUCKET_ID_FUNC_OFFSET:  141

FAILURE_BUCKET_ID:  0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {cbb9a1ac-821c-b542-365f-2dd5602e6100}

Followup:     MachineOwner
---------

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 000000000000000b, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff804876e6904, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for amdkmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9812

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-74VRRQ7

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 112630

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: b

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804876e6904

READ_ADDRESS: fffff804746fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8047460f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8047460f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8047709c1e0 -- (.trap 0xfffff8047709c1e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8047709c500
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804876e6904 rsp=fffff8047709c370 rbp=fffff8047709c9d0
 r8=0000000000000038  r9=ffffbc8b7ac4c310 r10=0000fffff80473d6
r11=ffff96fc86600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
amdkmdag+0x1bc6904:
fffff804`876e6904 0fb600          movzx   eax,byte ptr [rax] ds:00000000`00000000=??
Resetting default scope

STACK_TEXT: 
fffff804`7709c098 fffff804`73e05e69     : 00000000`0000000a 00000000`00000000 00000000`0000000b 00000000`00000000 : nt!KeBugCheckEx
fffff804`7709c0a0 fffff804`73e02169     : ffffbc8b`810bf080 fffffff6`00000009 fffff804`6f02a180 fffff804`87729c8f : nt!KiBugCheckDispatch+0x69
fffff804`7709c1e0 fffff804`876e6904     : 00000000`00000000 ffffbc8b`7ac4c070 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff804`7709c370 00000000`00000000     : ffffbc8b`7ac4c070 00000000`00000000 00000000`00000000 ffffbc8b`77f5c000 : amdkmdag+0x1bc6904


SYMBOL_NAME:  amdkmdag+1bc6904

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1bc6904

FAILURE_BUCKET_ID:  AV_amdkmdag!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c753a2f9-94a6-448f-1d0e-e079b3442215}

Followup:     MachineOwner
---------


Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffe8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffffc9d62dba9781, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11156

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-74VRRQ7

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 23783

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffffffffe8

BUGCHECK_P2: 0

BUGCHECK_P3: ffffc9d62dba9781

BUGCHECK_P4: 2

READ_ADDRESS: fffff80712cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80712c0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff80712c0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffe8

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  ffffb80715e11590 -- (.trap 0xffffb80715e11590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb80715e11750 rbx=0000000000000000 rcx=ffffc9adc610b060
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffc9d62dba9781 rsp=ffffb80715e11720 rbp=ffffc9adc610b0a8
 r8=ffffb80715e11660  r9=0000000000000000 r10=ffffc9d62d86f3c0
r11=ffffb80715e11790 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
win32kfull!TimersProc+0x121:
ffffc9d6`2dba9781 8b7ee8          mov     edi,dword ptr [rsi-18h] ds:ffffffff`ffffffe8=????????
Resetting default scope

STACK_TEXT: 
ffffb807`15e112e8 fffff807`12486729     : 00000000`00000050 ffffffff`ffffffe8 00000000`00000000 ffffb807`15e11590 : nt!KeBugCheckEx
ffffb807`15e112f0 fffff807`122eeb80     : ffff8c81`15cea0c0 00000000`00000000 ffffb807`15e11610 00000000`00000000 : nt!MiSystemFault+0x13faf9
ffffb807`15e113f0 fffff807`1240205e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffb807`15e11590 ffffc9d6`2dba9781     : 00000000`00000000 ffffb807`15e11730 00000000`00000001 ffffc9d6`2d864d01 : nt!KiPageFault+0x35e
ffffb807`15e11720 ffffc9d6`2dba9346     : 00000000`00000010 00000000`00108fbf 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x121
ffffb807`15e117b0 ffffc9d6`2d881eb3     : ffff8c81`15cea0c0 ffff8c81`15cea0c0 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
ffffb807`15e11970 ffffc9d6`2db48960     : ffff8c81`15cea0c0 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffffb807`15e11aa0 ffffc9d6`2e3d474d     : ffff8c81`15cea0c0 ffff8c81`15cea0c0 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffffb807`15e11ad0 fffff807`124058b8     : ffff8c81`00000005 00000000`00000005 00000220`e5804060 00000000`000003e0 : win32k!NtUserCallNoParam+0x15
ffffb807`15e11b00 00007ffd`ec1310e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000051`8b0bfe48 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ec1310e4


SYMBOL_NAME:  win32kfull!TimersProc+121

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  121

FAILURE_BUCKET_ID:  AV_R_INVALID_win32kfull!TimersProc

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {cf53bb28-5d77-c2a1-718c-fd1b2b89b30e}

Followup:     MachineOwner
---------
 
Malwarebytes bilgisayarda yüklü olarak gözükmüyor (antimalware service executable) isminde Microsoft Defender çalışıyor.
 
Son düzenleyen: Moderatör:
Malwarebytes bilgisayarda yüklü olarak gözükmüyor (antimalware service executable) isminde Microsoft Defender çalışıyor.
Tamam, sonuç nedir?
 

Geri
Yukarı