PAGE_FAULT_IN_NONPAGED_AREA mavi ekran hatası

Katılım
20 Ocak 2019
Mesajlar
1.507
Çözümler
13
Yer
Klavye
Daha fazla  
Meslek
Harf, sayı yazmak.
Yaklaşık 3 aydır bu sorundan kurtulamadım. YouTube üzerinden 4K video video açınca, oyun oynarken veya daha hiçbir işlem yapmadan masaüstüne gelene kadar bilgisayar kilitleniyor veya mavi ekran veriyor. Bazen de sistem açılırken mavi ekran hatası alıyorum.

Minidump: Minidump (2)

Sistem:
Intel Xeon X5470
Asus P5QC
RX 580

Şimdiden onca zaman uğraşıp beceremediğim işte bana yardım edecek olanlara çok teşekkür ediyorum.
 
Son düzenleyen: Moderatör:
Selam.

Bellekleri test edin.


Sorun belleklerde gibi.

Ek olarak BIOS sürümünüz çok eski, güncelleyin.

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff950ea2fc31a8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8070ece3f32, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 8

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 9

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 68

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff950ea2fc31a8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8070ece3f32

BUGCHECK_P4: 2

READ_ADDRESS: fffff8070f2fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffff950ea2fc31a8

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  atieclxx.exe

TRAP_FRAME:  fffff2870cd4ef20 -- (.trap 0xfffff2870cd4ef20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000008e4dd0ec rbx=0000000000000000 rcx=fffff2870cd4f140
rdx=fffff2870cd4f130 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8070ece3f32 rsp=fffff2870cd4f0b0 rbp=fffff2870cd4f130
 r8=ffff970ea2f0fd80  r9=0000000000000000 r10=ffff950ea2fc3190
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!PiDmCompareObjects+0x12:
fffff807`0ece3f32 413b4218        cmp     eax,dword ptr [r10+18h] ds:ffff950e`a2fc31a8=????????
Resetting default scope

LOCK_ADDRESS:  fffff8070f2449a0 -- (!locks fffff8070f2449a0)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff8070f2449a0)    Available
1 total locks

PNP_TRIAGE_DATA:
    Lock address  : 0xfffff8070f2449a0
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0

STACK_TEXT: 
fffff287`0cd4ec78 fffff807`0ea35c1d : 00000000`00000050 ffff950e`a2fc31a8 00000000`00000000 fffff287`0cd4ef20 : nt!KeBugCheckEx
fffff287`0cd4ec80 fffff807`0e812ce0 : 00000000`00000000 00000000`00000000 fffff287`0cd4efa0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
fffff287`0cd4ed80 fffff807`0e9ebb1e : 00000000`00000000 00000000`02000001 fffff287`0cd4f650 00000000`00000000 : nt!MmAccessFault+0x400
fffff287`0cd4ef20 fffff807`0ece3f32 : 00000000`00000000 00000000`00000000 00000000`00000002 fffff807`0ec76856 : nt!KiPageFault+0x35e
fffff287`0cd4f0b0 fffff807`0e8d9d03 : 00000000`ffffffff 00000000`00000000 00000000`001a0018 ffff970e`ab8556d0 : nt!PiDmCompareObjects+0x12
fffff287`0cd4f0e0 fffff807`0ec7677c : 00000000`00000000 fffff807`0f243a20 ffff970e`ab8556d0 00000000`00000000 : nt!RtlLookupElementGenericTableAvl+0x43
fffff287`0cd4f110 fffff807`0ec766c5 : 00000000`02000001 ffff970e`ab8556d0 ffff970e`ab8556d0 00000000`00000000 : nt!PiDmLookupObject+0x70
fffff287`0cd4f1d0 fffff807`0ec7655a : fffff287`0cd4f680 fffff287`0cd4f2c8 00000000`00000001 00000000`00000000 : nt!PiDmGetObject+0x49
fffff287`0cd4f200 fffff807`0ec75e65 : fffff287`0cd4f680 fffff287`0cd4f311 00000000`00000000 fffff287`0cd4f648 : nt!PiDmObjectGetCachedObjectProperty+0x6a
fffff287`0cd4f270 fffff807`0ec755eb : 00000006`00000000 00000000`52504e50 fffff287`0cd4f520 00000000`00000d5c : nt!PiDmObjectGetCachedCmProperty+0xc9
fffff287`0cd4f360 fffff807`0ec2c113 : 00000000`000000f0 00000000`00000000 00000000`02000001 fffff287`0cd4f648 : nt!PiPnpRtlCmActionCallback+0xbb
fffff287`0cd4f4d0 fffff807`0ec2c514 : 00000000`00000000 fffff287`0cd4f6e0 fffff287`0cd4f918 00000000`00000000 : nt!_CmGetDeviceRegProp+0xaf
fffff287`0cd4f5e0 fffff807`0ec2c163 : 00000000`00000002 fffff807`0ec77317 fffff287`0cd4f801 fffff287`0cd4f890 : nt!_CmGetDeviceRegPropWorker+0x330
fffff287`0cd4f730 fffff807`0ecfb2b8 : 00000000`00000001 fffff287`0cd4fa68 00000000`00000000 fffff287`0cd4f898 : nt!_CmGetDeviceRegProp+0xff
fffff287`0cd4f840 fffff807`0ec74476 : fffff287`0cd4fa68 0000006f`395fec80 00000000`00000038 00000000`00000000 : nt!PiCMGetRegistryProperty+0x12c
fffff287`0cd4f8f0 fffff807`0ec74303 : fffff287`0cd4fa40 00000000`00000014 00000000`0047081b fffff807`0ebf8dce : nt!PiCMHandleIoctl+0x156
fffff287`0cd4f930 fffff807`0eceffca : 00000000`0047081b fffff807`0eceff60 00000000`00000000 fffff807`0e82671a : nt!PiCMFastIoDeviceDispatch+0x53
fffff287`0cd4f980 fffff807`0ec0df82 : 00000000`0047081b 00000000`00000000 00000000`00000000 ffffae87`9ccb9c80 : nt!PiDaFastIoDispatch+0x6a
fffff287`0cd4f9e0 fffff807`0ec0dbe6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
fffff287`0cd4fb20 fffff807`0e9ef375 : fffff287`0cd4fc18 00000000`00000000 ffffae87`9cf85080 0000006f`395ff018 : nt!NtDeviceIoControlFile+0x56
fffff287`0cd4fb90 00007ffa`5f0cae74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000006f`395feb78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`5f0cae74


SYMBOL_NAME:  nt!PiDmCompareObjects+12

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  12

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!PiDmCompareObjects

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {88694318-3f51-91c3-580c-916fcf2cca8f}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: ffff880eec858280
Arg3: 0000000000000009
Arg4: fffffe8f88f01ee0

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 101

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: ffff880eec858280

BUGCHECK_P3: 9

BUGCHECK_P4: fffffe8f88f01ee0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT: 
fffffe8f`88f01d38 fffff807`5ec01fae : 00000000`0000001a 00000000`00061941 ffff880e`ec858280 00000000`00000009 : nt!KeBugCheckEx
fffffe8f`88f01d40 fffff807`5ebebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1ef6ce
fffffe8f`88f01ee0 fffff807`5eed5912 : fffff807`5edeff34 00000000`00000011 00000000`000000e5 fffffe8f`00000000 : nt!KiPageFault+0x35e
fffffe8f`88f02078 fffff807`5edeff34 : 00000000`00000011 00000000`000000e5 fffffe8f`00000000 00000000`00000000 : nt!HvpGetCellPaged+0xa2
fffffe8f`88f02080 fffff807`5edf2b5a : 00000000`00000000 00000000`00000024 00000000`00000000 fffffe8f`88f02510 : nt!CmQueryValueKey+0x284
fffffe8f`88f021e0 fffff807`5ebef375 : ffff880e`00000000 00000000`000000a0 00000000`00000000 ffff880e`e8a00000 : nt!NtQueryValueKey+0x5ba
fffffe8f`88f024e0 fffff807`5ebe1880 : fffff807`5ee2c97a ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
fffffe8f`88f026e8 fffff807`5ee2c97a : ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 fffffe8f`88f02760 : nt!KiServiceLinkage
fffffe8f`88f026f0 fffff807`5ef0c47e : ffff880e`fa4041f0 ffff9883`e86cf000 00000000`00000000 fffffe8f`88f029cc : nt!RtlpQueryRegistryValues+0x18a
fffffe8f`88f027d0 fffff807`6a55a696 : 00000000`00000000 ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 : nt!RtlQueryRegistryValuesEx+0xe
fffffe8f`88f02810 00000000`00000000 : ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 00000000`00000000 : atikmdag+0x6a696


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000096, Exception code that caused the bugcheck
Arg2: fffff8032681ffe4, Address of the instruction which caused the bugcheck
Arg3: ffff9c00f577f920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 5

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000096

BUGCHECK_P2: fffff8032681ffe4

BUGCHECK_P3: ffff9c00f577f920

BUGCHECK_P4: 0

CONTEXT:  ffff9c00f577f920 -- (.cxr 0xffff9c00f577f920)
rax=00000000bbffe173 rbx=0000000000000000 rcx=ffff9c00f57c0180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff878cc9f3ca10
rip=fffff8032681ffe4 rsp=ffffda83ac8377d8 rbp=ffff878ccef50080
 r8=0000000000000002  r9=ffffda83ac837a70 r10=fffff8032681fec0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=ffffffffffffffff r15=ffff878cce27f000
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
nt!ExIsResourceAcquiredSharedLite+0x124:
fffff803`2681ffe4 0f22c3          mov     cr0,rbx
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

BAD_STACK_POINTER:  ffff9c00f577f018

STACK_TEXT: 
ffffda83`ac8377d8 ffff878c`ce27f000 : fffff803`2be5e2ea ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 : nt!ExIsResourceAcquiredSharedLite+0x124
ffffda83`ac837838 fffff803`2be5e2ea : ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 ffff878c`ce27f000 : 0xffff878c`ce27f000
ffffda83`ac837840 fffff803`2be80fd5 : ffffffff`ffffffff ffffda83`ac837ae0 ffff878c`ce27f000 ffff878c`ce27f000 : dxgkrnl!DXGADAPTER::AcquireCoreResourceShared+0x3a
ffffda83`ac8379e0 fffff803`2be80c8a : 00000215`9db96800 ffff878c`c9787860 00000000`000010ac fffff803`26bfb1ba : dxgkrnl!DxgkSetSyncRefreshCountWaitTargetInternal+0x325
ffffda83`ac837ba0 fffff803`269ef375 : 00000000`00000000 ffff878c`00000000 ffffda83`ac837c18 00000000`00000000 : dxgkrnl!DxgkSetSyncRefreshCountWaitTarget+0xca
ffffda83`ac837c00 00007ff9`81505984 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000007c`8577f6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`81505984


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8032681ffd8 - nt!ExIsResourceAcquiredSharedLite+118
    [ 6c:2c ]
1 error : !nt (fffff8032681ffd8)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xffff9c00f577f920 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the bugcheck
Arg2: fffff80240531633, Address of the instruction which caused the bugcheck
Arg3: ffff8880bf6a5a60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: 80000003

BUGCHECK_P2: fffff80240531633

BUGCHECK_P3: ffff8880bf6a5a60

BUGCHECK_P4: 0

CONTEXT:  ffff8880bf6a5a60 -- (.cxr 0xffff8880bf6a5a60)
rax=ffff8880bf6a6488 rbx=ffff8880bf6a7680 rcx=0000000000000001
rdx=ffff8880bf6a7680 rsi=ffff8880bf6a6c80 rdi=0000000000000001
rip=fffff80240531633 rsp=ffff8880bf6a6460 rbp=ffff8880bf6a6a70
 r8=ffff8880bf6a6c80  r9=ffff8880bf6a6ac0 r10=ffff8880bf6a7448
r11=0000000000000000 r12=ffff8880bf6a79e0 r13=ffff8880bf6a7448
r14=ffff8880bf6a6ac0 r15=ffff8880bf6a7448
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000202
nt!KeCheckStackAndTargetAddress+0x53:
fffff802`40531633 cc              int     3
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

TRAP_FRAME:  ffff8880bf6a74f0 -- (.trap 0xffff8880bf6a74f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000021 rbx=0000000000000000 rcx=00000000000000f2
rdx=00000000000000f2 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000001 rsp=ffff8880bf6a7680 rbp=0000000000000001
 r8=0000000000000000  r9=0000000000000041 r10=0000000000100200
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
00000000`00000001 ??              ???
Resetting default scope

STACK_TEXT: 
ffff8880`bf6a6460 fffff802`405b90fb : fffff802`408db2db fffff802`40307df0 00000000`00000000 00000000`00000000 : nt!KeCheckStackAndTargetAddress+0x53
ffff8880`bf6a6490 fffff802`405e68df : fffff802`40307df0 ffff8880`bf6a6a70 fffff802`405b90c0 00000000`00000000 : nt!_C_specific_handler+0x3b
ffff8880`bf6a6500 fffff802`40432fb7 : ffff8880`bf6a6a70 00000000`00000000 ffff8880`bf6a79e0 fffff802`408db2db : nt!RtlpExecuteHandlerForException+0xf
ffff8880`bf6a6530 fffff802`4047b226 : ffff8880`bf6a7448 ffff8880`bf6a7180 ffff8880`bf6a7448 ffff9a8c`7c11ec40 : nt!RtlDispatchException+0x297
ffff8880`bf6a6c50 fffff802`405efa6c : ffff8880`bf6a7570 00000000`00001000 ffff8880`bf6a74f0 ffff8000`00000000 : nt!KiDispatchException+0x186
ffff8880`bf6a7310 fffff802`405ebc03 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000258 : nt!KiExceptionDispatch+0x12c
ffff8880`bf6a74f0 00000000`00000001 : ffff9a8c`7c4ac340 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e : nt!KiPageFault+0x443
ffff8880`bf6a7680 ffff9a8c`7c4ac340 : 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff : 0x1
ffff8880`bf6a7688 00000000`00000041 : ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 : 0xffff9a8c`7c4ac340
ffff8880`bf6a7690 ffff8880`bf6a77d0 : fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 : 0x41
ffff8880`bf6a7698 fffff802`407eb74e : ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 00000000`00000041 : 0xffff8880`bf6a77d0
ffff8880`bf6a76a0 fffff802`4041bfd9 : 00000000`00000041 ffff8880`bf6a77d0 00000000`033eefff 00000000`033ae000 : nt!MiChargeFullProcessCommitment+0x9e
ffff8880`bf6a76d0 fffff802`407eaed4 : ffff9a8c`7c11ec40 00000000`033ae000 00000000`00041001 00000000`00000002 : nt!MiCommitExistingVad+0x1c9
ffff8880`bf6a7860 fffff802`408db2db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0050e070 : nt!MiAllocateVirtualMemory+0x2a4
ffff8880`bf6a79e0 fffff802`405ef375 : ffffffff`ffffffff ffff9a8c`7b97f080 00000000`00000000 00000000`0050e018 : nt!NtAllocateVirtualMemory+0x1ab
ffff8880`bf6a7b90 00007ffe`3fb4b094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0050dff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3fb4b094


SYMBOL_NAME:  nt!KeCheckStackAndTargetAddress+53

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .cxr 0xffff8880bf6a5a60 ; kb

BUCKET_ID_FUNC_OFFSET:  53

FAILURE_BUCKET_ID:  0x3B_80000003_nt!KeCheckStackAndTargetAddress

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3c8e413e-71c2-0077-9ab0-f2dd61308472}

Followup:     MachineOwner
---------
 
İşlemci OC var ise kaldırıp tekrar dener misiniz?

Selam.

Bellekleri test edin.


Sorun belleklerde gibi.

Ek olarak BIOS sürümünüz çok eski, güncelleyin.

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff950ea2fc31a8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8070ece3f32, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 8

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 9

Key : Analysis.Memory.CommitPeak.Mb
Value: 68

Key : Analysis.System
Value: CreateObject

ADDITIONAL_XML: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffff950ea2fc31a8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8070ece3f32

BUGCHECK_P4: 2

READ_ADDRESS: fffff8070f2fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff950ea2fc31a8

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: atieclxx.exe

TRAP_FRAME: fffff2870cd4ef20 -- (.trap 0xfffff2870cd4ef20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000008e4dd0ec rbx=0000000000000000 rcx=fffff2870cd4f140
rdx=fffff2870cd4f130 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8070ece3f32 rsp=fffff2870cd4f0b0 rbp=fffff2870cd4f130
r8=ffff970ea2f0fd80 r9=0000000000000000 r10=ffff950ea2fc3190
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!PiDmCompareObjects+0x12:
fffff807`0ece3f32 413b4218 cmp eax,dword ptr [r10+18h] ds:ffff950e`a2fc31a8=????????
Resetting default scope

LOCK_ADDRESS: fffff8070f2449a0 -- (!locks fffff8070f2449a0)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff8070f2449a0) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff8070f2449a0
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

STACK_TEXT:
fffff287`0cd4ec78 fffff807`0ea35c1d : 00000000`00000050 ffff950e`a2fc31a8 00000000`00000000 fffff287`0cd4ef20 : nt!KeBugCheckEx
fffff287`0cd4ec80 fffff807`0e812ce0 : 00000000`00000000 00000000`00000000 fffff287`0cd4efa0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
fffff287`0cd4ed80 fffff807`0e9ebb1e : 00000000`00000000 00000000`02000001 fffff287`0cd4f650 00000000`00000000 : nt!MmAccessFault+0x400
fffff287`0cd4ef20 fffff807`0ece3f32 : 00000000`00000000 00000000`00000000 00000000`00000002 fffff807`0ec76856 : nt!KiPageFault+0x35e
fffff287`0cd4f0b0 fffff807`0e8d9d03 : 00000000`ffffffff 00000000`00000000 00000000`001a0018 ffff970e`ab8556d0 : nt!PiDmCompareObjects+0x12
fffff287`0cd4f0e0 fffff807`0ec7677c : 00000000`00000000 fffff807`0f243a20 ffff970e`ab8556d0 00000000`00000000 : nt!RtlLookupElementGenericTableAvl+0x43
fffff287`0cd4f110 fffff807`0ec766c5 : 00000000`02000001 ffff970e`ab8556d0 ffff970e`ab8556d0 00000000`00000000 : nt!PiDmLookupObject+0x70
fffff287`0cd4f1d0 fffff807`0ec7655a : fffff287`0cd4f680 fffff287`0cd4f2c8 00000000`00000001 00000000`00000000 : nt!PiDmGetObject+0x49
fffff287`0cd4f200 fffff807`0ec75e65 : fffff287`0cd4f680 fffff287`0cd4f311 00000000`00000000 fffff287`0cd4f648 : nt!PiDmObjectGetCachedObjectProperty+0x6a
fffff287`0cd4f270 fffff807`0ec755eb : 00000006`00000000 00000000`52504e50 fffff287`0cd4f520 00000000`00000d5c : nt!PiDmObjectGetCachedCmProperty+0xc9
fffff287`0cd4f360 fffff807`0ec2c113 : 00000000`000000f0 00000000`00000000 00000000`02000001 fffff287`0cd4f648 : nt!PiPnpRtlCmActionCallback+0xbb
fffff287`0cd4f4d0 fffff807`0ec2c514 : 00000000`00000000 fffff287`0cd4f6e0 fffff287`0cd4f918 00000000`00000000 : nt!_CmGetDeviceRegProp+0xaf
fffff287`0cd4f5e0 fffff807`0ec2c163 : 00000000`00000002 fffff807`0ec77317 fffff287`0cd4f801 fffff287`0cd4f890 : nt!_CmGetDeviceRegPropWorker+0x330
fffff287`0cd4f730 fffff807`0ecfb2b8 : 00000000`00000001 fffff287`0cd4fa68 00000000`00000000 fffff287`0cd4f898 : nt!_CmGetDeviceRegProp+0xff
fffff287`0cd4f840 fffff807`0ec74476 : fffff287`0cd4fa68 0000006f`395fec80 00000000`00000038 00000000`00000000 : nt!PiCMGetRegistryProperty+0x12c
fffff287`0cd4f8f0 fffff807`0ec74303 : fffff287`0cd4fa40 00000000`00000014 00000000`0047081b fffff807`0ebf8dce : nt!PiCMHandleIoctl+0x156
fffff287`0cd4f930 fffff807`0eceffca : 00000000`0047081b fffff807`0eceff60 00000000`00000000 fffff807`0e82671a : nt!PiCMFastIoDeviceDispatch+0x53
fffff287`0cd4f980 fffff807`0ec0df82 : 00000000`0047081b 00000000`00000000 00000000`00000000 ffffae87`9ccb9c80 : nt!PiDaFastIoDispatch+0x6a
fffff287`0cd4f9e0 fffff807`0ec0dbe6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
fffff287`0cd4fb20 fffff807`0e9ef375 : fffff287`0cd4fc18 00000000`00000000 ffffae87`9cf85080 0000006f`395ff018 : nt!NtDeviceIoControlFile+0x56
fffff287`0cd4fb90 00007ffa`5f0cae74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000006f`395feb78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`5f0cae74

SYMBOL_NAME: nt!PiDmCompareObjects+12

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.264

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 12

FAILURE_BUCKET_ID: AV_R_INVALID_nt!PiDmCompareObjects

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {88694318-3f51-91c3-580c-916fcf2cca8f}

Followup: MachineOwner
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: ffff880eec858280
Arg3: 0000000000000009
Arg4: fffffe8f88f01ee0

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 101

Key : Analysis.Memory.CommitPeak.Mb
Value: 70

Key : Analysis.System
Value: CreateObject

ADDITIONAL_XML: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 61941

BUGCHECK_P2: ffff880eec858280

BUGCHECK_P3: 9

BUGCHECK_P4: fffffe8f88f01ee0

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Registry

STACK_TEXT:
fffffe8f`88f01d38 fffff807`5ec01fae : 00000000`0000001a 00000000`00061941 ffff880e`ec858280 00000000`00000009 : nt!KeBugCheckEx
fffffe8f`88f01d40 fffff807`5ebebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1ef6ce
fffffe8f`88f01ee0 fffff807`5eed5912 : fffff807`5edeff34 00000000`00000011 00000000`000000e5 fffffe8f`00000000 : nt!KiPageFault+0x35e
fffffe8f`88f02078 fffff807`5edeff34 : 00000000`00000011 00000000`000000e5 fffffe8f`00000000 00000000`00000000 : nt!HvpGetCellPaged+0xa2
fffffe8f`88f02080 fffff807`5edf2b5a : 00000000`00000000 00000000`00000024 00000000`00000000 fffffe8f`88f02510 : nt!CmQueryValueKey+0x284
fffffe8f`88f021e0 fffff807`5ebef375 : ffff880e`00000000 00000000`000000a0 00000000`00000000 ffff880e`e8a00000 : nt!NtQueryValueKey+0x5ba
fffffe8f`88f024e0 fffff807`5ebe1880 : fffff807`5ee2c97a ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
fffffe8f`88f026e8 fffff807`5ee2c97a : ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 fffffe8f`88f02760 : nt!KiServiceLinkage
fffffe8f`88f026f0 fffff807`5ef0c47e : ffff880e`fa4041f0 ffff9883`e86cf000 00000000`00000000 fffffe8f`88f029cc : nt!RtlpQueryRegistryValues+0x18a
fffffe8f`88f027d0 fffff807`6a55a696 : 00000000`00000000 ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 : nt!RtlQueryRegistryValuesEx+0xe
fffffe8f`88f02810 00000000`00000000 : ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 00000000`00000000 : atikmdag+0x6a696

MODULE_NAME: hardware

IMAGE_NAME: hardware_ram

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000096, Exception code that caused the bugcheck
Arg2: fffff8032681ffe4, Address of the instruction which caused the bugcheck
Arg3: ffff9c00f577f920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 4

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 5

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : Analysis.System
Value: CreateObject

ADDITIONAL_XML: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000096

BUGCHECK_P2: fffff8032681ffe4

BUGCHECK_P3: ffff9c00f577f920

BUGCHECK_P4: 0

CONTEXT: ffff9c00f577f920 -- (.cxr 0xffff9c00f577f920)
rax=00000000bbffe173 rbx=0000000000000000 rcx=ffff9c00f57c0180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff878cc9f3ca10
rip=fffff8032681ffe4 rsp=ffffda83ac8377d8 rbp=ffff878ccef50080
r8=0000000000000002 r9=ffffda83ac837a70 r10=fffff8032681fec0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=ffffffffffffffff r15=ffff878cce27f000
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
nt!ExIsResourceAcquiredSharedLite+0x124:
fffff803`2681ffe4 0f22c3 mov cr0,rbx
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dwm.exe

BAD_STACK_POINTER: ffff9c00f577f018

STACK_TEXT:
ffffda83`ac8377d8 ffff878c`ce27f000 : fffff803`2be5e2ea ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 : nt!ExIsResourceAcquiredSharedLite+0x124
ffffda83`ac837838 fffff803`2be5e2ea : ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 ffff878c`ce27f000 : 0xffff878c`ce27f000
ffffda83`ac837840 fffff803`2be80fd5 : ffffffff`ffffffff ffffda83`ac837ae0 ffff878c`ce27f000 ffff878c`ce27f000 : dxgkrnl!DXGADAPTER::AcquireCoreResourceShared+0x3a
ffffda83`ac8379e0 fffff803`2be80c8a : 00000215`9db96800 ffff878c`c9787860 00000000`000010ac fffff803`26bfb1ba : dxgkrnl!DxgkSetSyncRefreshCountWaitTargetInternal+0x325
ffffda83`ac837ba0 fffff803`269ef375 : 00000000`00000000 ffff878c`00000000 ffffda83`ac837c18 00000000`00000000 : dxgkrnl!DxgkSetSyncRefreshCountWaitTarget+0xca
ffffda83`ac837c00 00007ff9`81505984 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000007c`8577f6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`81505984

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8032681ffd8 - nt!ExIsResourceAcquiredSharedLite+118
[ 6c:2c ]
1 error : !nt (fffff8032681ffd8)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

MEMORY_CORRUPTOR: ONE_BIT

STACK_COMMAND: .cxr 0xffff9c00f577f920 ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: memory_corruption
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the bugcheck
Arg2: fffff80240531633, Address of the instruction which caused the bugcheck
Arg3: ffff8880bf6a5a60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 3

Key : Analysis.Memory.CommitPeak.Mb
Value: 69

Key : Analysis.System
Value: CreateObject

ADDITIONAL_XML: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: 80000003

BUGCHECK_P2: fffff80240531633

BUGCHECK_P3: ffff8880bf6a5a60

BUGCHECK_P4: 0

CONTEXT: ffff8880bf6a5a60 -- (.cxr 0xffff8880bf6a5a60)
rax=ffff8880bf6a6488 rbx=ffff8880bf6a7680 rcx=0000000000000001
rdx=ffff8880bf6a7680 rsi=ffff8880bf6a6c80 rdi=0000000000000001
rip=fffff80240531633 rsp=ffff8880bf6a6460 rbp=ffff8880bf6a6a70
r8=ffff8880bf6a6c80 r9=ffff8880bf6a6ac0 r10=ffff8880bf6a7448
r11=0000000000000000 r12=ffff8880bf6a79e0 r13=ffff8880bf6a7448
r14=ffff8880bf6a6ac0 r15=ffff8880bf6a7448
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000202
nt!KeCheckStackAndTargetAddress+0x53:
fffff802`40531633 cc int 3
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steam.exe

TRAP_FRAME: ffff8880bf6a74f0 -- (.trap 0xffff8880bf6a74f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000021 rbx=0000000000000000 rcx=00000000000000f2
rdx=00000000000000f2 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000001 rsp=ffff8880bf6a7680 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000041 r10=0000000000100200
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
00000000`00000001 ?? ???
Resetting default scope

STACK_TEXT:
ffff8880`bf6a6460 fffff802`405b90fb : fffff802`408db2db fffff802`40307df0 00000000`00000000 00000000`00000000 : nt!KeCheckStackAndTargetAddress+0x53
ffff8880`bf6a6490 fffff802`405e68df : fffff802`40307df0 ffff8880`bf6a6a70 fffff802`405b90c0 00000000`00000000 : nt!_C_specific_handler+0x3b
ffff8880`bf6a6500 fffff802`40432fb7 : ffff8880`bf6a6a70 00000000`00000000 ffff8880`bf6a79e0 fffff802`408db2db : nt!RtlpExecuteHandlerForException+0xf
ffff8880`bf6a6530 fffff802`4047b226 : ffff8880`bf6a7448 ffff8880`bf6a7180 ffff8880`bf6a7448 ffff9a8c`7c11ec40 : nt!RtlDispatchException+0x297
ffff8880`bf6a6c50 fffff802`405efa6c : ffff8880`bf6a7570 00000000`00001000 ffff8880`bf6a74f0 ffff8000`00000000 : nt!KiDispatchException+0x186
ffff8880`bf6a7310 fffff802`405ebc03 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000258 : nt!KiExceptionDispatch+0x12c
ffff8880`bf6a74f0 00000000`00000001 : ffff9a8c`7c4ac340 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e : nt!KiPageFault+0x443
ffff8880`bf6a7680 ffff9a8c`7c4ac340 : 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff : 0x1
ffff8880`bf6a7688 00000000`00000041 : ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 : 0xffff9a8c`7c4ac340
ffff8880`bf6a7690 ffff8880`bf6a77d0 : fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 : 0x41
ffff8880`bf6a7698 fffff802`407eb74e : ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 00000000`00000041 : 0xffff8880`bf6a77d0
ffff8880`bf6a76a0 fffff802`4041bfd9 : 00000000`00000041 ffff8880`bf6a77d0 00000000`033eefff 00000000`033ae000 : nt!MiChargeFullProcessCommitment+0x9e
ffff8880`bf6a76d0 fffff802`407eaed4 : ffff9a8c`7c11ec40 00000000`033ae000 00000000`00041001 00000000`00000002 : nt!MiCommitExistingVad+0x1c9
ffff8880`bf6a7860 fffff802`408db2db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0050e070 : nt!MiAllocateVirtualMemory+0x2a4
ffff8880`bf6a79e0 fffff802`405ef375 : ffffffff`ffffffff ffff9a8c`7b97f080 00000000`00000000 00000000`0050e018 : nt!NtAllocateVirtualMemory+0x1ab
ffff8880`bf6a7b90 00007ffe`3fb4b094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0050dff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3fb4b094

SYMBOL_NAME: nt!KeCheckStackAndTargetAddress+53

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.264

STACK_COMMAND: .cxr 0xffff8880bf6a5a60 ; kb

BUCKET_ID_FUNC_OFFSET: 53

FAILURE_BUCKET_ID: 0x3B_80000003_nt!KeCheckStackAndTargetAddress

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3c8e413e-71c2-0077-9ab0-f2dd61308472}

Followup: MachineOwner
---------

Modlu BIOS kullanması zorunlu hocam.
 
Şimdi bellekleri test edeceğim. Bu arada işlemcim Xeon serisi olduğu için stok BIOS kullanamıyorum. Modlanmış BIOS olarak da daha günceli var ise kuracağım teşekkürler. Bir de sorun bir ara belleklerde idi. Daha sonra ben arızalı belleği bulup, çıkarıp yerine 2GB bellek takmıştım. Voltajı, MHz değeri ve markası aynı ama model farklı.
 
Hataya müsait bir sistem bakmaya bile gerek yok dosyaya. Darboğaz desen var, uyumsuzluk desen var, ısınma zaten vardır :) Bu tür heyacanlar aramaya gerek yok paran kadar uyumlu sistem alın böyle şeyler yapacağınıza.
 
Hataya müsait bir sistem bakmaya bile gerek yok dosyaya. Darboğaz desen var, uyumsuzluk desen var, ısınma zaten vardır :) Bu tür heyacanlar aramaya gerek yok paran kadar uyumlu sistem alın böyle şeyler yapacağınıza.
Sistemde ısınma yok. Şükür ki ekran kartı yükte 60 dereceyi, işlemci yükte 65 dereceyi geçmiyor. Sistemi zaten şu anki aklımla toplamam 1 sene önce elime para geçtikçe yükselte yükselte çift çekirdekli ekran kartsız bir sistemden bu hale geldi. Yani elde hiçbir şey yok iken ben bu paraya şu sistemi toplayayım demedim. Sonuç olarak niye bu sistemi topladın, bu sistem zaten hep hata verir bakmaya gerek yok gibi söylemlere gerek olmadığını düşünüyorum. Darboğaz evet var ama bunun herhangi bir mavi ekran gibi bir hataya sebep olacağını düşünmüyorum. Yine de yorumun için teşekkürler.
Selam.

Bellekleri test edin.


Sorun belleklerde gibi.

Ek olarak BIOS sürümünüz çok eski, güncelleyin.

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff950ea2fc31a8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8070ece3f32, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 8

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 9

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 68

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff950ea2fc31a8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8070ece3f32

BUGCHECK_P4: 2

READ_ADDRESS: fffff8070f2fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff950ea2fc31a8

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  atieclxx.exe

TRAP_FRAME:  fffff2870cd4ef20 -- (.trap 0xfffff2870cd4ef20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000008e4dd0ec rbx=0000000000000000 rcx=fffff2870cd4f140
rdx=fffff2870cd4f130 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8070ece3f32 rsp=fffff2870cd4f0b0 rbp=fffff2870cd4f130
r8=ffff970ea2f0fd80  r9=0000000000000000 r10=ffff950ea2fc3190
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!PiDmCompareObjects+0x12:
fffff807`0ece3f32 413b4218        cmp     eax,dword ptr [r10+18h] ds:ffff950e`a2fc31a8=????????
Resetting default scope

LOCK_ADDRESS:  fffff8070f2449a0 -- (!locks fffff8070f2449a0)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff8070f2449a0)    Available
1 total locks

PNP_TRIAGE_DATA:
    Lock address  : 0xfffff8070f2449a0
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0

STACK_TEXT:
fffff287`0cd4ec78 fffff807`0ea35c1d : 00000000`00000050 ffff950e`a2fc31a8 00000000`00000000 fffff287`0cd4ef20 : nt!KeBugCheckEx
fffff287`0cd4ec80 fffff807`0e812ce0 : 00000000`00000000 00000000`00000000 fffff287`0cd4efa0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
fffff287`0cd4ed80 fffff807`0e9ebb1e : 00000000`00000000 00000000`02000001 fffff287`0cd4f650 00000000`00000000 : nt!MmAccessFault+0x400
fffff287`0cd4ef20 fffff807`0ece3f32 : 00000000`00000000 00000000`00000000 00000000`00000002 fffff807`0ec76856 : nt!KiPageFault+0x35e
fffff287`0cd4f0b0 fffff807`0e8d9d03 : 00000000`ffffffff 00000000`00000000 00000000`001a0018 ffff970e`ab8556d0 : nt!PiDmCompareObjects+0x12
fffff287`0cd4f0e0 fffff807`0ec7677c : 00000000`00000000 fffff807`0f243a20 ffff970e`ab8556d0 00000000`00000000 : nt!RtlLookupElementGenericTableAvl+0x43
fffff287`0cd4f110 fffff807`0ec766c5 : 00000000`02000001 ffff970e`ab8556d0 ffff970e`ab8556d0 00000000`00000000 : nt!PiDmLookupObject+0x70
fffff287`0cd4f1d0 fffff807`0ec7655a : fffff287`0cd4f680 fffff287`0cd4f2c8 00000000`00000001 00000000`00000000 : nt!PiDmGetObject+0x49
fffff287`0cd4f200 fffff807`0ec75e65 : fffff287`0cd4f680 fffff287`0cd4f311 00000000`00000000 fffff287`0cd4f648 : nt!PiDmObjectGetCachedObjectProperty+0x6a
fffff287`0cd4f270 fffff807`0ec755eb : 00000006`00000000 00000000`52504e50 fffff287`0cd4f520 00000000`00000d5c : nt!PiDmObjectGetCachedCmProperty+0xc9
fffff287`0cd4f360 fffff807`0ec2c113 : 00000000`000000f0 00000000`00000000 00000000`02000001 fffff287`0cd4f648 : nt!PiPnpRtlCmActionCallback+0xbb
fffff287`0cd4f4d0 fffff807`0ec2c514 : 00000000`00000000 fffff287`0cd4f6e0 fffff287`0cd4f918 00000000`00000000 : nt!_CmGetDeviceRegProp+0xaf
fffff287`0cd4f5e0 fffff807`0ec2c163 : 00000000`00000002 fffff807`0ec77317 fffff287`0cd4f801 fffff287`0cd4f890 : nt!_CmGetDeviceRegPropWorker+0x330
fffff287`0cd4f730 fffff807`0ecfb2b8 : 00000000`00000001 fffff287`0cd4fa68 00000000`00000000 fffff287`0cd4f898 : nt!_CmGetDeviceRegProp+0xff
fffff287`0cd4f840 fffff807`0ec74476 : fffff287`0cd4fa68 0000006f`395fec80 00000000`00000038 00000000`00000000 : nt!PiCMGetRegistryProperty+0x12c
fffff287`0cd4f8f0 fffff807`0ec74303 : fffff287`0cd4fa40 00000000`00000014 00000000`0047081b fffff807`0ebf8dce : nt!PiCMHandleIoctl+0x156
fffff287`0cd4f930 fffff807`0eceffca : 00000000`0047081b fffff807`0eceff60 00000000`00000000 fffff807`0e82671a : nt!PiCMFastIoDeviceDispatch+0x53
fffff287`0cd4f980 fffff807`0ec0df82 : 00000000`0047081b 00000000`00000000 00000000`00000000 ffffae87`9ccb9c80 : nt!PiDaFastIoDispatch+0x6a
fffff287`0cd4f9e0 fffff807`0ec0dbe6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
fffff287`0cd4fb20 fffff807`0e9ef375 : fffff287`0cd4fc18 00000000`00000000 ffffae87`9cf85080 0000006f`395ff018 : nt!NtDeviceIoControlFile+0x56
fffff287`0cd4fb90 00007ffa`5f0cae74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000006f`395feb78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`5f0cae74


SYMBOL_NAME:  nt!PiDmCompareObjects+12

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  12

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!PiDmCompareObjects

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {88694318-3f51-91c3-580c-916fcf2cca8f}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: ffff880eec858280
Arg3: 0000000000000009
Arg4: fffffe8f88f01ee0

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 101

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: ffff880eec858280

BUGCHECK_P3: 9

BUGCHECK_P4: fffffe8f88f01ee0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT:
fffffe8f`88f01d38 fffff807`5ec01fae : 00000000`0000001a 00000000`00061941 ffff880e`ec858280 00000000`00000009 : nt!KeBugCheckEx
fffffe8f`88f01d40 fffff807`5ebebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1ef6ce
fffffe8f`88f01ee0 fffff807`5eed5912 : fffff807`5edeff34 00000000`00000011 00000000`000000e5 fffffe8f`00000000 : nt!KiPageFault+0x35e
fffffe8f`88f02078 fffff807`5edeff34 : 00000000`00000011 00000000`000000e5 fffffe8f`00000000 00000000`00000000 : nt!HvpGetCellPaged+0xa2
fffffe8f`88f02080 fffff807`5edf2b5a : 00000000`00000000 00000000`00000024 00000000`00000000 fffffe8f`88f02510 : nt!CmQueryValueKey+0x284
fffffe8f`88f021e0 fffff807`5ebef375 : ffff880e`00000000 00000000`000000a0 00000000`00000000 ffff880e`e8a00000 : nt!NtQueryValueKey+0x5ba
fffffe8f`88f024e0 fffff807`5ebe1880 : fffff807`5ee2c97a ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
fffffe8f`88f026e8 fffff807`5ee2c97a : ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 fffffe8f`88f02760 : nt!KiServiceLinkage
fffffe8f`88f026f0 fffff807`5ef0c47e : ffff880e`fa4041f0 ffff9883`e86cf000 00000000`00000000 fffffe8f`88f029cc : nt!RtlpQueryRegistryValues+0x18a
fffffe8f`88f027d0 fffff807`6a55a696 : 00000000`00000000 ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 : nt!RtlQueryRegistryValuesEx+0xe
fffffe8f`88f02810 00000000`00000000 : ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 00000000`00000000 : atikmdag+0x6a696


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000096, Exception code that caused the bugcheck
Arg2: fffff8032681ffe4, Address of the instruction which caused the bugcheck
Arg3: ffff9c00f577f920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 5

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000096

BUGCHECK_P2: fffff8032681ffe4

BUGCHECK_P3: ffff9c00f577f920

BUGCHECK_P4: 0

CONTEXT:  ffff9c00f577f920 -- (.cxr 0xffff9c00f577f920)
rax=00000000bbffe173 rbx=0000000000000000 rcx=ffff9c00f57c0180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff878cc9f3ca10
rip=fffff8032681ffe4 rsp=ffffda83ac8377d8 rbp=ffff878ccef50080
r8=0000000000000002  r9=ffffda83ac837a70 r10=fffff8032681fec0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=ffffffffffffffff r15=ffff878cce27f000
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
nt!ExIsResourceAcquiredSharedLite+0x124:
fffff803`2681ffe4 0f22c3          mov     cr0,rbx
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

BAD_STACK_POINTER:  ffff9c00f577f018

STACK_TEXT:
ffffda83`ac8377d8 ffff878c`ce27f000 : fffff803`2be5e2ea ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 : nt!ExIsResourceAcquiredSharedLite+0x124
ffffda83`ac837838 fffff803`2be5e2ea : ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 ffff878c`ce27f000 : 0xffff878c`ce27f000
ffffda83`ac837840 fffff803`2be80fd5 : ffffffff`ffffffff ffffda83`ac837ae0 ffff878c`ce27f000 ffff878c`ce27f000 : dxgkrnl!DXGADAPTER::AcquireCoreResourceShared+0x3a
ffffda83`ac8379e0 fffff803`2be80c8a : 00000215`9db96800 ffff878c`c9787860 00000000`000010ac fffff803`26bfb1ba : dxgkrnl!DxgkSetSyncRefreshCountWaitTargetInternal+0x325
ffffda83`ac837ba0 fffff803`269ef375 : 00000000`00000000 ffff878c`00000000 ffffda83`ac837c18 00000000`00000000 : dxgkrnl!DxgkSetSyncRefreshCountWaitTarget+0xca
ffffda83`ac837c00 00007ff9`81505984 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000007c`8577f6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`81505984


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8032681ffd8 - nt!ExIsResourceAcquiredSharedLite+118
    [ 6c:2c ]
1 error : !nt (fffff8032681ffd8)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xffff9c00f577f920 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the bugcheck
Arg2: fffff80240531633, Address of the instruction which caused the bugcheck
Arg3: ffff8880bf6a5a60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: 80000003

BUGCHECK_P2: fffff80240531633

BUGCHECK_P3: ffff8880bf6a5a60

BUGCHECK_P4: 0

CONTEXT:  ffff8880bf6a5a60 -- (.cxr 0xffff8880bf6a5a60)
rax=ffff8880bf6a6488 rbx=ffff8880bf6a7680 rcx=0000000000000001
rdx=ffff8880bf6a7680 rsi=ffff8880bf6a6c80 rdi=0000000000000001
rip=fffff80240531633 rsp=ffff8880bf6a6460 rbp=ffff8880bf6a6a70
r8=ffff8880bf6a6c80  r9=ffff8880bf6a6ac0 r10=ffff8880bf6a7448
r11=0000000000000000 r12=ffff8880bf6a79e0 r13=ffff8880bf6a7448
r14=ffff8880bf6a6ac0 r15=ffff8880bf6a7448
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000202
nt!KeCheckStackAndTargetAddress+0x53:
fffff802`40531633 cc              int     3
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

TRAP_FRAME:  ffff8880bf6a74f0 -- (.trap 0xffff8880bf6a74f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000021 rbx=0000000000000000 rcx=00000000000000f2
rdx=00000000000000f2 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000001 rsp=ffff8880bf6a7680 rbp=0000000000000001
r8=0000000000000000  r9=0000000000000041 r10=0000000000100200
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
00000000`00000001 ??              ???
Resetting default scope

STACK_TEXT:
ffff8880`bf6a6460 fffff802`405b90fb : fffff802`408db2db fffff802`40307df0 00000000`00000000 00000000`00000000 : nt!KeCheckStackAndTargetAddress+0x53
ffff8880`bf6a6490 fffff802`405e68df : fffff802`40307df0 ffff8880`bf6a6a70 fffff802`405b90c0 00000000`00000000 : nt!_C_specific_handler+0x3b
ffff8880`bf6a6500 fffff802`40432fb7 : ffff8880`bf6a6a70 00000000`00000000 ffff8880`bf6a79e0 fffff802`408db2db : nt!RtlpExecuteHandlerForException+0xf
ffff8880`bf6a6530 fffff802`4047b226 : ffff8880`bf6a7448 ffff8880`bf6a7180 ffff8880`bf6a7448 ffff9a8c`7c11ec40 : nt!RtlDispatchException+0x297
ffff8880`bf6a6c50 fffff802`405efa6c : ffff8880`bf6a7570 00000000`00001000 ffff8880`bf6a74f0 ffff8000`00000000 : nt!KiDispatchException+0x186
ffff8880`bf6a7310 fffff802`405ebc03 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000258 : nt!KiExceptionDispatch+0x12c
ffff8880`bf6a74f0 00000000`00000001 : ffff9a8c`7c4ac340 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e : nt!KiPageFault+0x443
ffff8880`bf6a7680 ffff9a8c`7c4ac340 : 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff : 0x1
ffff8880`bf6a7688 00000000`00000041 : ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 : 0xffff9a8c`7c4ac340
ffff8880`bf6a7690 ffff8880`bf6a77d0 : fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 : 0x41
ffff8880`bf6a7698 fffff802`407eb74e : ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 00000000`00000041 : 0xffff8880`bf6a77d0
ffff8880`bf6a76a0 fffff802`4041bfd9 : 00000000`00000041 ffff8880`bf6a77d0 00000000`033eefff 00000000`033ae000 : nt!MiChargeFullProcessCommitment+0x9e
ffff8880`bf6a76d0 fffff802`407eaed4 : ffff9a8c`7c11ec40 00000000`033ae000 00000000`00041001 00000000`00000002 : nt!MiCommitExistingVad+0x1c9
ffff8880`bf6a7860 fffff802`408db2db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0050e070 : nt!MiAllocateVirtualMemory+0x2a4
ffff8880`bf6a79e0 fffff802`405ef375 : ffffffff`ffffffff ffff9a8c`7b97f080 00000000`00000000 00000000`0050e018 : nt!NtAllocateVirtualMemory+0x1ab
ffff8880`bf6a7b90 00007ffe`3fb4b094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0050dff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3fb4b094


SYMBOL_NAME:  nt!KeCheckStackAndTargetAddress+53

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .cxr 0xffff8880bf6a5a60 ; kb

BUCKET_ID_FUNC_OFFSET:  53

FAILURE_BUCKET_ID:  0x3B_80000003_nt!KeCheckStackAndTargetAddress

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3c8e413e-71c2-0077-9ab0-f2dd61308472}

Followup:     MachineOwner
---------
Memtest'i USB'ye yazdırıp boot etmeye çalıştığımda bu şekilde sol üstte imleç yanıp sönüyor. Sanırım sistemin UEFİ değil Legacy desteği olduğundan diye tahmin ediyorum. Legacy olarak nasıl yazdırabilirim?
 

Dosya Ekleri

  • 15367616204945160123357714786514.jpg
    15367616204945160123357714786514.jpg
    49,3 KB · Görüntüleme: 63
Son düzenleme:
Legacy için MBR ve NTFS seçeneklerini kullanacaksınız.
MBR ve FAT olarak yazdırıyor. Bir türlü MBR ve NTFS olarak yazdıramadım. Aşağıdaki fotoğrafta NTFS olarak uygulama üzerinden biçimlendirip yazdırsam da FAT olarak gözüküyor. Rufus üzerinden de seçim yapamıyorum. Ne yapabilirim?
Ekran Alıntısı.PNG

@MayCrasH Hocam yardımcı olabilir misiniz rica etsem?
 
Son düzenleme:
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı