Bozuk PC Tuşu
Kilopat
Daha fazla
- Meslek
- Harf, sayı yazmak.
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff950ea2fc31a8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8070ece3f32, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 8
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 9
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff950ea2fc31a8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8070ece3f32
BUGCHECK_P4: 2
READ_ADDRESS: fffff8070f2fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff950ea2fc31a8
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: atieclxx.exe
TRAP_FRAME: fffff2870cd4ef20 -- (.trap 0xfffff2870cd4ef20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000008e4dd0ec rbx=0000000000000000 rcx=fffff2870cd4f140
rdx=fffff2870cd4f130 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8070ece3f32 rsp=fffff2870cd4f0b0 rbp=fffff2870cd4f130
r8=ffff970ea2f0fd80 r9=0000000000000000 r10=ffff950ea2fc3190
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!PiDmCompareObjects+0x12:
fffff807`0ece3f32 413b4218 cmp eax,dword ptr [r10+18h] ds:ffff950e`a2fc31a8=????????
Resetting default scope
LOCK_ADDRESS: fffff8070f2449a0 -- (!locks fffff8070f2449a0)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff8070f2449a0) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff8070f2449a0
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
STACK_TEXT:
fffff287`0cd4ec78 fffff807`0ea35c1d : 00000000`00000050 ffff950e`a2fc31a8 00000000`00000000 fffff287`0cd4ef20 : nt!KeBugCheckEx
fffff287`0cd4ec80 fffff807`0e812ce0 : 00000000`00000000 00000000`00000000 fffff287`0cd4efa0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
fffff287`0cd4ed80 fffff807`0e9ebb1e : 00000000`00000000 00000000`02000001 fffff287`0cd4f650 00000000`00000000 : nt!MmAccessFault+0x400
fffff287`0cd4ef20 fffff807`0ece3f32 : 00000000`00000000 00000000`00000000 00000000`00000002 fffff807`0ec76856 : nt!KiPageFault+0x35e
fffff287`0cd4f0b0 fffff807`0e8d9d03 : 00000000`ffffffff 00000000`00000000 00000000`001a0018 ffff970e`ab8556d0 : nt!PiDmCompareObjects+0x12
fffff287`0cd4f0e0 fffff807`0ec7677c : 00000000`00000000 fffff807`0f243a20 ffff970e`ab8556d0 00000000`00000000 : nt!RtlLookupElementGenericTableAvl+0x43
fffff287`0cd4f110 fffff807`0ec766c5 : 00000000`02000001 ffff970e`ab8556d0 ffff970e`ab8556d0 00000000`00000000 : nt!PiDmLookupObject+0x70
fffff287`0cd4f1d0 fffff807`0ec7655a : fffff287`0cd4f680 fffff287`0cd4f2c8 00000000`00000001 00000000`00000000 : nt!PiDmGetObject+0x49
fffff287`0cd4f200 fffff807`0ec75e65 : fffff287`0cd4f680 fffff287`0cd4f311 00000000`00000000 fffff287`0cd4f648 : nt!PiDmObjectGetCachedObjectProperty+0x6a
fffff287`0cd4f270 fffff807`0ec755eb : 00000006`00000000 00000000`52504e50 fffff287`0cd4f520 00000000`00000d5c : nt!PiDmObjectGetCachedCmProperty+0xc9
fffff287`0cd4f360 fffff807`0ec2c113 : 00000000`000000f0 00000000`00000000 00000000`02000001 fffff287`0cd4f648 : nt!PiPnpRtlCmActionCallback+0xbb
fffff287`0cd4f4d0 fffff807`0ec2c514 : 00000000`00000000 fffff287`0cd4f6e0 fffff287`0cd4f918 00000000`00000000 : nt!_CmGetDeviceRegProp+0xaf
fffff287`0cd4f5e0 fffff807`0ec2c163 : 00000000`00000002 fffff807`0ec77317 fffff287`0cd4f801 fffff287`0cd4f890 : nt!_CmGetDeviceRegPropWorker+0x330
fffff287`0cd4f730 fffff807`0ecfb2b8 : 00000000`00000001 fffff287`0cd4fa68 00000000`00000000 fffff287`0cd4f898 : nt!_CmGetDeviceRegProp+0xff
fffff287`0cd4f840 fffff807`0ec74476 : fffff287`0cd4fa68 0000006f`395fec80 00000000`00000038 00000000`00000000 : nt!PiCMGetRegistryProperty+0x12c
fffff287`0cd4f8f0 fffff807`0ec74303 : fffff287`0cd4fa40 00000000`00000014 00000000`0047081b fffff807`0ebf8dce : nt!PiCMHandleIoctl+0x156
fffff287`0cd4f930 fffff807`0eceffca : 00000000`0047081b fffff807`0eceff60 00000000`00000000 fffff807`0e82671a : nt!PiCMFastIoDeviceDispatch+0x53
fffff287`0cd4f980 fffff807`0ec0df82 : 00000000`0047081b 00000000`00000000 00000000`00000000 ffffae87`9ccb9c80 : nt!PiDaFastIoDispatch+0x6a
fffff287`0cd4f9e0 fffff807`0ec0dbe6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
fffff287`0cd4fb20 fffff807`0e9ef375 : fffff287`0cd4fc18 00000000`00000000 ffffae87`9cf85080 0000006f`395ff018 : nt!NtDeviceIoControlFile+0x56
fffff287`0cd4fb90 00007ffa`5f0cae74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000006f`395feb78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`5f0cae74
SYMBOL_NAME: nt!PiDmCompareObjects+12
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12
FAILURE_BUCKET_ID: AV_R_INVALID_nt!PiDmCompareObjects
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {88694318-3f51-91c3-580c-916fcf2cca8f}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: ffff880eec858280
Arg3: 0000000000000009
Arg4: fffffe8f88f01ee0
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 101
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: ffff880eec858280
BUGCHECK_P3: 9
BUGCHECK_P4: fffffe8f88f01ee0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
fffffe8f`88f01d38 fffff807`5ec01fae : 00000000`0000001a 00000000`00061941 ffff880e`ec858280 00000000`00000009 : nt!KeBugCheckEx
fffffe8f`88f01d40 fffff807`5ebebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1ef6ce
fffffe8f`88f01ee0 fffff807`5eed5912 : fffff807`5edeff34 00000000`00000011 00000000`000000e5 fffffe8f`00000000 : nt!KiPageFault+0x35e
fffffe8f`88f02078 fffff807`5edeff34 : 00000000`00000011 00000000`000000e5 fffffe8f`00000000 00000000`00000000 : nt!HvpGetCellPaged+0xa2
fffffe8f`88f02080 fffff807`5edf2b5a : 00000000`00000000 00000000`00000024 00000000`00000000 fffffe8f`88f02510 : nt!CmQueryValueKey+0x284
fffffe8f`88f021e0 fffff807`5ebef375 : ffff880e`00000000 00000000`000000a0 00000000`00000000 ffff880e`e8a00000 : nt!NtQueryValueKey+0x5ba
fffffe8f`88f024e0 fffff807`5ebe1880 : fffff807`5ee2c97a ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
fffffe8f`88f026e8 fffff807`5ee2c97a : ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 fffffe8f`88f02760 : nt!KiServiceLinkage
fffffe8f`88f026f0 fffff807`5ef0c47e : ffff880e`fa4041f0 ffff9883`e86cf000 00000000`00000000 fffffe8f`88f029cc : nt!RtlpQueryRegistryValues+0x18a
fffffe8f`88f027d0 fffff807`6a55a696 : 00000000`00000000 ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 : nt!RtlQueryRegistryValuesEx+0xe
fffffe8f`88f02810 00000000`00000000 : ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 00000000`00000000 : atikmdag+0x6a696
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000096, Exception code that caused the bugcheck
Arg2: fffff8032681ffe4, Address of the instruction which caused the bugcheck
Arg3: ffff9c00f577f920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000096
BUGCHECK_P2: fffff8032681ffe4
BUGCHECK_P3: ffff9c00f577f920
BUGCHECK_P4: 0
CONTEXT: ffff9c00f577f920 -- (.cxr 0xffff9c00f577f920)
rax=00000000bbffe173 rbx=0000000000000000 rcx=ffff9c00f57c0180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff878cc9f3ca10
rip=fffff8032681ffe4 rsp=ffffda83ac8377d8 rbp=ffff878ccef50080
r8=0000000000000002 r9=ffffda83ac837a70 r10=fffff8032681fec0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=ffffffffffffffff r15=ffff878cce27f000
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
nt!ExIsResourceAcquiredSharedLite+0x124:
fffff803`2681ffe4 0f22c3 mov cr0,rbx
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
BAD_STACK_POINTER: ffff9c00f577f018
STACK_TEXT:
ffffda83`ac8377d8 ffff878c`ce27f000 : fffff803`2be5e2ea ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 : nt!ExIsResourceAcquiredSharedLite+0x124
ffffda83`ac837838 fffff803`2be5e2ea : ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 ffff878c`ce27f000 : 0xffff878c`ce27f000
ffffda83`ac837840 fffff803`2be80fd5 : ffffffff`ffffffff ffffda83`ac837ae0 ffff878c`ce27f000 ffff878c`ce27f000 : dxgkrnl!DXGADAPTER::AcquireCoreResourceShared+0x3a
ffffda83`ac8379e0 fffff803`2be80c8a : 00000215`9db96800 ffff878c`c9787860 00000000`000010ac fffff803`26bfb1ba : dxgkrnl!DxgkSetSyncRefreshCountWaitTargetInternal+0x325
ffffda83`ac837ba0 fffff803`269ef375 : 00000000`00000000 ffff878c`00000000 ffffda83`ac837c18 00000000`00000000 : dxgkrnl!DxgkSetSyncRefreshCountWaitTarget+0xca
ffffda83`ac837c00 00007ff9`81505984 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000007c`8577f6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`81505984
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8032681ffd8 - nt!ExIsResourceAcquiredSharedLite+118
[ 6c:2c ]
1 error : !nt (fffff8032681ffd8)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xffff9c00f577f920 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the bugcheck
Arg2: fffff80240531633, Address of the instruction which caused the bugcheck
Arg3: ffff8880bf6a5a60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff80240531633
BUGCHECK_P3: ffff8880bf6a5a60
BUGCHECK_P4: 0
CONTEXT: ffff8880bf6a5a60 -- (.cxr 0xffff8880bf6a5a60)
rax=ffff8880bf6a6488 rbx=ffff8880bf6a7680 rcx=0000000000000001
rdx=ffff8880bf6a7680 rsi=ffff8880bf6a6c80 rdi=0000000000000001
rip=fffff80240531633 rsp=ffff8880bf6a6460 rbp=ffff8880bf6a6a70
r8=ffff8880bf6a6c80 r9=ffff8880bf6a6ac0 r10=ffff8880bf6a7448
r11=0000000000000000 r12=ffff8880bf6a79e0 r13=ffff8880bf6a7448
r14=ffff8880bf6a6ac0 r15=ffff8880bf6a7448
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000202
nt!KeCheckStackAndTargetAddress+0x53:
fffff802`40531633 cc int 3
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
TRAP_FRAME: ffff8880bf6a74f0 -- (.trap 0xffff8880bf6a74f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000021 rbx=0000000000000000 rcx=00000000000000f2
rdx=00000000000000f2 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000001 rsp=ffff8880bf6a7680 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000041 r10=0000000000100200
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
00000000`00000001 ?? ???
Resetting default scope
STACK_TEXT:
ffff8880`bf6a6460 fffff802`405b90fb : fffff802`408db2db fffff802`40307df0 00000000`00000000 00000000`00000000 : nt!KeCheckStackAndTargetAddress+0x53
ffff8880`bf6a6490 fffff802`405e68df : fffff802`40307df0 ffff8880`bf6a6a70 fffff802`405b90c0 00000000`00000000 : nt!_C_specific_handler+0x3b
ffff8880`bf6a6500 fffff802`40432fb7 : ffff8880`bf6a6a70 00000000`00000000 ffff8880`bf6a79e0 fffff802`408db2db : nt!RtlpExecuteHandlerForException+0xf
ffff8880`bf6a6530 fffff802`4047b226 : ffff8880`bf6a7448 ffff8880`bf6a7180 ffff8880`bf6a7448 ffff9a8c`7c11ec40 : nt!RtlDispatchException+0x297
ffff8880`bf6a6c50 fffff802`405efa6c : ffff8880`bf6a7570 00000000`00001000 ffff8880`bf6a74f0 ffff8000`00000000 : nt!KiDispatchException+0x186
ffff8880`bf6a7310 fffff802`405ebc03 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000258 : nt!KiExceptionDispatch+0x12c
ffff8880`bf6a74f0 00000000`00000001 : ffff9a8c`7c4ac340 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e : nt!KiPageFault+0x443
ffff8880`bf6a7680 ffff9a8c`7c4ac340 : 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff : 0x1
ffff8880`bf6a7688 00000000`00000041 : ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 : 0xffff9a8c`7c4ac340
ffff8880`bf6a7690 ffff8880`bf6a77d0 : fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 : 0x41
ffff8880`bf6a7698 fffff802`407eb74e : ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 00000000`00000041 : 0xffff8880`bf6a77d0
ffff8880`bf6a76a0 fffff802`4041bfd9 : 00000000`00000041 ffff8880`bf6a77d0 00000000`033eefff 00000000`033ae000 : nt!MiChargeFullProcessCommitment+0x9e
ffff8880`bf6a76d0 fffff802`407eaed4 : ffff9a8c`7c11ec40 00000000`033ae000 00000000`00041001 00000000`00000002 : nt!MiCommitExistingVad+0x1c9
ffff8880`bf6a7860 fffff802`408db2db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0050e070 : nt!MiAllocateVirtualMemory+0x2a4
ffff8880`bf6a79e0 fffff802`405ef375 : ffffffff`ffffffff ffff9a8c`7b97f080 00000000`00000000 00000000`0050e018 : nt!NtAllocateVirtualMemory+0x1ab
ffff8880`bf6a7b90 00007ffe`3fb4b094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0050dff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3fb4b094
SYMBOL_NAME: nt!KeCheckStackAndTargetAddress+53
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .cxr 0xffff8880bf6a5a60 ; kb
BUCKET_ID_FUNC_OFFSET: 53
FAILURE_BUCKET_ID: 0x3B_80000003_nt!KeCheckStackAndTargetAddress
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3c8e413e-71c2-0077-9ab0-f2dd61308472}
Followup: MachineOwner
---------
Selam.
Bellekleri test edin.
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Sorun belleklerde gibi.
Ek olarak BIOS sürümünüz çok eski, güncelleyin.
Kod:PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffff950ea2fc31a8, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff8070ece3f32, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 8 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-VFOM7MS Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 9 Key : Analysis.Memory.CommitPeak.Mb Value: 68 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: ffff950ea2fc31a8 BUGCHECK_P2: 0 BUGCHECK_P3: fffff8070ece3f32 BUGCHECK_P4: 2 READ_ADDRESS: fffff8070f2fa388: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffff950ea2fc31a8 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: atieclxx.exe TRAP_FRAME: fffff2870cd4ef20 -- (.trap 0xfffff2870cd4ef20) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000000008e4dd0ec rbx=0000000000000000 rcx=fffff2870cd4f140 rdx=fffff2870cd4f130 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8070ece3f32 rsp=fffff2870cd4f0b0 rbp=fffff2870cd4f130 r8=ffff970ea2f0fd80 r9=0000000000000000 r10=ffff950ea2fc3190 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!PiDmCompareObjects+0x12: fffff807`0ece3f32 413b4218 cmp eax,dword ptr [r10+18h] ds:ffff950e`a2fc31a8=???????? Resetting default scope LOCK_ADDRESS: fffff8070f2449a0 -- (!locks fffff8070f2449a0) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff8070f2449a0) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff8070f2449a0 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 STACK_TEXT: fffff287`0cd4ec78 fffff807`0ea35c1d : 00000000`00000050 ffff950e`a2fc31a8 00000000`00000000 fffff287`0cd4ef20 : nt!KeBugCheckEx fffff287`0cd4ec80 fffff807`0e812ce0 : 00000000`00000000 00000000`00000000 fffff287`0cd4efa0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed fffff287`0cd4ed80 fffff807`0e9ebb1e : 00000000`00000000 00000000`02000001 fffff287`0cd4f650 00000000`00000000 : nt!MmAccessFault+0x400 fffff287`0cd4ef20 fffff807`0ece3f32 : 00000000`00000000 00000000`00000000 00000000`00000002 fffff807`0ec76856 : nt!KiPageFault+0x35e fffff287`0cd4f0b0 fffff807`0e8d9d03 : 00000000`ffffffff 00000000`00000000 00000000`001a0018 ffff970e`ab8556d0 : nt!PiDmCompareObjects+0x12 fffff287`0cd4f0e0 fffff807`0ec7677c : 00000000`00000000 fffff807`0f243a20 ffff970e`ab8556d0 00000000`00000000 : nt!RtlLookupElementGenericTableAvl+0x43 fffff287`0cd4f110 fffff807`0ec766c5 : 00000000`02000001 ffff970e`ab8556d0 ffff970e`ab8556d0 00000000`00000000 : nt!PiDmLookupObject+0x70 fffff287`0cd4f1d0 fffff807`0ec7655a : fffff287`0cd4f680 fffff287`0cd4f2c8 00000000`00000001 00000000`00000000 : nt!PiDmGetObject+0x49 fffff287`0cd4f200 fffff807`0ec75e65 : fffff287`0cd4f680 fffff287`0cd4f311 00000000`00000000 fffff287`0cd4f648 : nt!PiDmObjectGetCachedObjectProperty+0x6a fffff287`0cd4f270 fffff807`0ec755eb : 00000006`00000000 00000000`52504e50 fffff287`0cd4f520 00000000`00000d5c : nt!PiDmObjectGetCachedCmProperty+0xc9 fffff287`0cd4f360 fffff807`0ec2c113 : 00000000`000000f0 00000000`00000000 00000000`02000001 fffff287`0cd4f648 : nt!PiPnpRtlCmActionCallback+0xbb fffff287`0cd4f4d0 fffff807`0ec2c514 : 00000000`00000000 fffff287`0cd4f6e0 fffff287`0cd4f918 00000000`00000000 : nt!_CmGetDeviceRegProp+0xaf fffff287`0cd4f5e0 fffff807`0ec2c163 : 00000000`00000002 fffff807`0ec77317 fffff287`0cd4f801 fffff287`0cd4f890 : nt!_CmGetDeviceRegPropWorker+0x330 fffff287`0cd4f730 fffff807`0ecfb2b8 : 00000000`00000001 fffff287`0cd4fa68 00000000`00000000 fffff287`0cd4f898 : nt!_CmGetDeviceRegProp+0xff fffff287`0cd4f840 fffff807`0ec74476 : fffff287`0cd4fa68 0000006f`395fec80 00000000`00000038 00000000`00000000 : nt!PiCMGetRegistryProperty+0x12c fffff287`0cd4f8f0 fffff807`0ec74303 : fffff287`0cd4fa40 00000000`00000014 00000000`0047081b fffff807`0ebf8dce : nt!PiCMHandleIoctl+0x156 fffff287`0cd4f930 fffff807`0eceffca : 00000000`0047081b fffff807`0eceff60 00000000`00000000 fffff807`0e82671a : nt!PiCMFastIoDeviceDispatch+0x53 fffff287`0cd4f980 fffff807`0ec0df82 : 00000000`0047081b 00000000`00000000 00000000`00000000 ffffae87`9ccb9c80 : nt!PiDaFastIoDispatch+0x6a fffff287`0cd4f9e0 fffff807`0ec0dbe6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382 fffff287`0cd4fb20 fffff807`0e9ef375 : fffff287`0cd4fc18 00000000`00000000 ffffae87`9cf85080 0000006f`395ff018 : nt!NtDeviceIoControlFile+0x56 fffff287`0cd4fb90 00007ffa`5f0cae74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 0000006f`395feb78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`5f0cae74 SYMBOL_NAME: nt!PiDmCompareObjects+12 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.264 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 12 FAILURE_BUCKET_ID: AV_R_INVALID_nt!PiDmCompareObjects OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {88694318-3f51-91c3-580c-916fcf2cca8f} Followup: MachineOwner --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000061941, The subtype of the bugcheck. Arg2: ffff880eec858280 Arg3: 0000000000000009 Arg4: fffffe8f88f01ee0 Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for atikmdag.sys *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 3 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-VFOM7MS Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 101 Key : Analysis.Memory.CommitPeak.Mb Value: 70 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 61941 BUGCHECK_P2: ffff880eec858280 BUGCHECK_P3: 9 BUGCHECK_P4: fffffe8f88f01ee0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Registry STACK_TEXT: fffffe8f`88f01d38 fffff807`5ec01fae : 00000000`0000001a 00000000`00061941 ffff880e`ec858280 00000000`00000009 : nt!KeBugCheckEx fffffe8f`88f01d40 fffff807`5ebebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1ef6ce fffffe8f`88f01ee0 fffff807`5eed5912 : fffff807`5edeff34 00000000`00000011 00000000`000000e5 fffffe8f`00000000 : nt!KiPageFault+0x35e fffffe8f`88f02078 fffff807`5edeff34 : 00000000`00000011 00000000`000000e5 fffffe8f`00000000 00000000`00000000 : nt!HvpGetCellPaged+0xa2 fffffe8f`88f02080 fffff807`5edf2b5a : 00000000`00000000 00000000`00000024 00000000`00000000 fffffe8f`88f02510 : nt!CmQueryValueKey+0x284 fffffe8f`88f021e0 fffff807`5ebef375 : ffff880e`00000000 00000000`000000a0 00000000`00000000 ffff880e`e8a00000 : nt!NtQueryValueKey+0x5ba fffffe8f`88f024e0 fffff807`5ebe1880 : fffff807`5ee2c97a ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 fffffe8f`88f026e8 fffff807`5ee2c97a : ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 fffffe8f`88f02760 : nt!KiServiceLinkage fffffe8f`88f026f0 fffff807`5ef0c47e : ffff880e`fa4041f0 ffff9883`e86cf000 00000000`00000000 fffffe8f`88f029cc : nt!RtlpQueryRegistryValues+0x18a fffffe8f`88f027d0 fffff807`6a55a696 : 00000000`00000000 ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 : nt!RtlQueryRegistryValuesEx+0xe fffffe8f`88f02810 00000000`00000000 : ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 00000000`00000000 : atikmdag+0x6a696 MODULE_NAME: hardware IMAGE_NAME: hardware_ram STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000096, Exception code that caused the bugcheck Arg2: fffff8032681ffe4, Address of the instruction which caused the bugcheck Arg3: ffff9c00f577f920, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 4 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-VFOM7MS Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 5 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000096 BUGCHECK_P2: fffff8032681ffe4 BUGCHECK_P3: ffff9c00f577f920 BUGCHECK_P4: 0 CONTEXT: ffff9c00f577f920 -- (.cxr 0xffff9c00f577f920) rax=00000000bbffe173 rbx=0000000000000000 rcx=ffff9c00f57c0180 rdx=0000000000000000 rsi=0000000000000000 rdi=ffff878cc9f3ca10 rip=fffff8032681ffe4 rsp=ffffda83ac8377d8 rbp=ffff878ccef50080 r8=0000000000000002 r9=ffffda83ac837a70 r10=fffff8032681fec0 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=ffffffffffffffff r15=ffff878cce27f000 iopl=0 nv up ei ng nz ac pe cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293 nt!ExIsResourceAcquiredSharedLite+0x124: fffff803`2681ffe4 0f22c3 mov cr0,rbx Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: dwm.exe BAD_STACK_POINTER: ffff9c00f577f018 STACK_TEXT: ffffda83`ac8377d8 ffff878c`ce27f000 : fffff803`2be5e2ea ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 : nt!ExIsResourceAcquiredSharedLite+0x124 ffffda83`ac837838 fffff803`2be5e2ea : ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 ffff878c`ce27f000 : 0xffff878c`ce27f000 ffffda83`ac837840 fffff803`2be80fd5 : ffffffff`ffffffff ffffda83`ac837ae0 ffff878c`ce27f000 ffff878c`ce27f000 : dxgkrnl!DXGADAPTER::AcquireCoreResourceShared+0x3a ffffda83`ac8379e0 fffff803`2be80c8a : 00000215`9db96800 ffff878c`c9787860 00000000`000010ac fffff803`26bfb1ba : dxgkrnl!DxgkSetSyncRefreshCountWaitTargetInternal+0x325 ffffda83`ac837ba0 fffff803`269ef375 : 00000000`00000000 ffff878c`00000000 ffffda83`ac837c18 00000000`00000000 : dxgkrnl!DxgkSetSyncRefreshCountWaitTarget+0xca ffffda83`ac837c00 00007ff9`81505984 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 0000007c`8577f6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`81505984 CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt fffff8032681ffd8 - nt!ExIsResourceAcquiredSharedLite+118 [ 6c:2c ] 1 error : !nt (fffff8032681ffd8) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption MEMORY_CORRUPTOR: ONE_BIT STACK_COMMAND: .cxr 0xffff9c00f577f920 ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: memory_corruption --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 0000000080000003, Exception code that caused the bugcheck Arg2: fffff80240531633, Address of the instruction which caused the bugcheck Arg3: ffff8880bf6a5a60, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 3 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-VFOM7MS Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 3 Key : Analysis.Memory.CommitPeak.Mb Value: 69 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: 80000003 BUGCHECK_P2: fffff80240531633 BUGCHECK_P3: ffff8880bf6a5a60 BUGCHECK_P4: 0 CONTEXT: ffff8880bf6a5a60 -- (.cxr 0xffff8880bf6a5a60) rax=ffff8880bf6a6488 rbx=ffff8880bf6a7680 rcx=0000000000000001 rdx=ffff8880bf6a7680 rsi=ffff8880bf6a6c80 rdi=0000000000000001 rip=fffff80240531633 rsp=ffff8880bf6a6460 rbp=ffff8880bf6a6a70 r8=ffff8880bf6a6c80 r9=ffff8880bf6a6ac0 r10=ffff8880bf6a7448 r11=0000000000000000 r12=ffff8880bf6a79e0 r13=ffff8880bf6a7448 r14=ffff8880bf6a6ac0 r15=ffff8880bf6a7448 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000202 nt!KeCheckStackAndTargetAddress+0x53: fffff802`40531633 cc int 3 Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: steam.exe TRAP_FRAME: ffff8880bf6a74f0 -- (.trap 0xffff8880bf6a74f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000021 rbx=0000000000000000 rcx=00000000000000f2 rdx=00000000000000f2 rsi=0000000000000000 rdi=0000000000000000 rip=0000000000000001 rsp=ffff8880bf6a7680 rbp=0000000000000001 r8=0000000000000000 r9=0000000000000041 r10=0000000000100200 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc 00000000`00000001 ?? ??? Resetting default scope STACK_TEXT: ffff8880`bf6a6460 fffff802`405b90fb : fffff802`408db2db fffff802`40307df0 00000000`00000000 00000000`00000000 : nt!KeCheckStackAndTargetAddress+0x53 ffff8880`bf6a6490 fffff802`405e68df : fffff802`40307df0 ffff8880`bf6a6a70 fffff802`405b90c0 00000000`00000000 : nt!_C_specific_handler+0x3b ffff8880`bf6a6500 fffff802`40432fb7 : ffff8880`bf6a6a70 00000000`00000000 ffff8880`bf6a79e0 fffff802`408db2db : nt!RtlpExecuteHandlerForException+0xf ffff8880`bf6a6530 fffff802`4047b226 : ffff8880`bf6a7448 ffff8880`bf6a7180 ffff8880`bf6a7448 ffff9a8c`7c11ec40 : nt!RtlDispatchException+0x297 ffff8880`bf6a6c50 fffff802`405efa6c : ffff8880`bf6a7570 00000000`00001000 ffff8880`bf6a74f0 ffff8000`00000000 : nt!KiDispatchException+0x186 ffff8880`bf6a7310 fffff802`405ebc03 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000258 : nt!KiExceptionDispatch+0x12c ffff8880`bf6a74f0 00000000`00000001 : ffff9a8c`7c4ac340 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e : nt!KiPageFault+0x443 ffff8880`bf6a7680 ffff9a8c`7c4ac340 : 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff : 0x1 ffff8880`bf6a7688 00000000`00000041 : ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 : 0xffff9a8c`7c4ac340 ffff8880`bf6a7690 ffff8880`bf6a77d0 : fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 : 0x41 ffff8880`bf6a7698 fffff802`407eb74e : ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 00000000`00000041 : 0xffff8880`bf6a77d0 ffff8880`bf6a76a0 fffff802`4041bfd9 : 00000000`00000041 ffff8880`bf6a77d0 00000000`033eefff 00000000`033ae000 : nt!MiChargeFullProcessCommitment+0x9e ffff8880`bf6a76d0 fffff802`407eaed4 : ffff9a8c`7c11ec40 00000000`033ae000 00000000`00041001 00000000`00000002 : nt!MiCommitExistingVad+0x1c9 ffff8880`bf6a7860 fffff802`408db2db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0050e070 : nt!MiAllocateVirtualMemory+0x2a4 ffff8880`bf6a79e0 fffff802`405ef375 : ffffffff`ffffffff ffff9a8c`7b97f080 00000000`00000000 00000000`0050e018 : nt!NtAllocateVirtualMemory+0x1ab ffff8880`bf6a7b90 00007ffe`3fb4b094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000000`0050dff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3fb4b094 SYMBOL_NAME: nt!KeCheckStackAndTargetAddress+53 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.264 STACK_COMMAND: .cxr 0xffff8880bf6a5a60 ; kb BUCKET_ID_FUNC_OFFSET: 53 FAILURE_BUCKET_ID: 0x3B_80000003_nt!KeCheckStackAndTargetAddress OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {3c8e413e-71c2-0077-9ab0-f2dd61308472} Followup: MachineOwner ---------
Sistemde ısınma yok. Şükür ki ekran kartı yükte 60 dereceyi, işlemci yükte 65 dereceyi geçmiyor. Sistemi zaten şu anki aklımla toplamam 1 sene önce elime para geçtikçe yükselte yükselte çift çekirdekli ekran kartsız bir sistemden bu hale geldi. Yani elde hiçbir şey yok iken ben bu paraya şu sistemi toplayayım demedim. Sonuç olarak niye bu sistemi topladın, bu sistem zaten hep hata verir bakmaya gerek yok gibi söylemlere gerek olmadığını düşünüyorum. Darboğaz evet var ama bunun herhangi bir mavi ekran gibi bir hataya sebep olacağını düşünmüyorum. Yine de yorumun için teşekkürler.Hataya müsait bir sistem bakmaya bile gerek yok dosyaya. Darboğaz desen var, uyumsuzluk desen var, ısınma zaten vardırBu tür heyacanlar aramaya gerek yok paran kadar uyumlu sistem alın böyle şeyler yapacağınıza.
Memtest'i USB'ye yazdırıp boot etmeye çalıştığımda bu şekilde sol üstte imleç yanıp sönüyor. Sanırım sistemin UEFİ değil Legacy desteği olduğundan diye tahmin ediyorum. Legacy olarak nasıl yazdırabilirim?Selam.
Bellekleri test edin.
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Sorun belleklerde gibi.
Ek olarak BIOS sürümünüz çok eski, güncelleyin.
Kod:PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffff950ea2fc31a8, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff8070ece3f32, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 8 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-VFOM7MS Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 9 Key : Analysis.Memory.CommitPeak.Mb Value: 68 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: ffff950ea2fc31a8 BUGCHECK_P2: 0 BUGCHECK_P3: fffff8070ece3f32 BUGCHECK_P4: 2 READ_ADDRESS: fffff8070f2fa388: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffff950ea2fc31a8 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: atieclxx.exe TRAP_FRAME: fffff2870cd4ef20 -- (.trap 0xfffff2870cd4ef20) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000000008e4dd0ec rbx=0000000000000000 rcx=fffff2870cd4f140 rdx=fffff2870cd4f130 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8070ece3f32 rsp=fffff2870cd4f0b0 rbp=fffff2870cd4f130 r8=ffff970ea2f0fd80 r9=0000000000000000 r10=ffff950ea2fc3190 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!PiDmCompareObjects+0x12: fffff807`0ece3f32 413b4218 cmp eax,dword ptr [r10+18h] ds:ffff950e`a2fc31a8=???????? Resetting default scope LOCK_ADDRESS: fffff8070f2449a0 -- (!locks fffff8070f2449a0) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff8070f2449a0) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff8070f2449a0 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 STACK_TEXT: fffff287`0cd4ec78 fffff807`0ea35c1d : 00000000`00000050 ffff950e`a2fc31a8 00000000`00000000 fffff287`0cd4ef20 : nt!KeBugCheckEx fffff287`0cd4ec80 fffff807`0e812ce0 : 00000000`00000000 00000000`00000000 fffff287`0cd4efa0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed fffff287`0cd4ed80 fffff807`0e9ebb1e : 00000000`00000000 00000000`02000001 fffff287`0cd4f650 00000000`00000000 : nt!MmAccessFault+0x400 fffff287`0cd4ef20 fffff807`0ece3f32 : 00000000`00000000 00000000`00000000 00000000`00000002 fffff807`0ec76856 : nt!KiPageFault+0x35e fffff287`0cd4f0b0 fffff807`0e8d9d03 : 00000000`ffffffff 00000000`00000000 00000000`001a0018 ffff970e`ab8556d0 : nt!PiDmCompareObjects+0x12 fffff287`0cd4f0e0 fffff807`0ec7677c : 00000000`00000000 fffff807`0f243a20 ffff970e`ab8556d0 00000000`00000000 : nt!RtlLookupElementGenericTableAvl+0x43 fffff287`0cd4f110 fffff807`0ec766c5 : 00000000`02000001 ffff970e`ab8556d0 ffff970e`ab8556d0 00000000`00000000 : nt!PiDmLookupObject+0x70 fffff287`0cd4f1d0 fffff807`0ec7655a : fffff287`0cd4f680 fffff287`0cd4f2c8 00000000`00000001 00000000`00000000 : nt!PiDmGetObject+0x49 fffff287`0cd4f200 fffff807`0ec75e65 : fffff287`0cd4f680 fffff287`0cd4f311 00000000`00000000 fffff287`0cd4f648 : nt!PiDmObjectGetCachedObjectProperty+0x6a fffff287`0cd4f270 fffff807`0ec755eb : 00000006`00000000 00000000`52504e50 fffff287`0cd4f520 00000000`00000d5c : nt!PiDmObjectGetCachedCmProperty+0xc9 fffff287`0cd4f360 fffff807`0ec2c113 : 00000000`000000f0 00000000`00000000 00000000`02000001 fffff287`0cd4f648 : nt!PiPnpRtlCmActionCallback+0xbb fffff287`0cd4f4d0 fffff807`0ec2c514 : 00000000`00000000 fffff287`0cd4f6e0 fffff287`0cd4f918 00000000`00000000 : nt!_CmGetDeviceRegProp+0xaf fffff287`0cd4f5e0 fffff807`0ec2c163 : 00000000`00000002 fffff807`0ec77317 fffff287`0cd4f801 fffff287`0cd4f890 : nt!_CmGetDeviceRegPropWorker+0x330 fffff287`0cd4f730 fffff807`0ecfb2b8 : 00000000`00000001 fffff287`0cd4fa68 00000000`00000000 fffff287`0cd4f898 : nt!_CmGetDeviceRegProp+0xff fffff287`0cd4f840 fffff807`0ec74476 : fffff287`0cd4fa68 0000006f`395fec80 00000000`00000038 00000000`00000000 : nt!PiCMGetRegistryProperty+0x12c fffff287`0cd4f8f0 fffff807`0ec74303 : fffff287`0cd4fa40 00000000`00000014 00000000`0047081b fffff807`0ebf8dce : nt!PiCMHandleIoctl+0x156 fffff287`0cd4f930 fffff807`0eceffca : 00000000`0047081b fffff807`0eceff60 00000000`00000000 fffff807`0e82671a : nt!PiCMFastIoDeviceDispatch+0x53 fffff287`0cd4f980 fffff807`0ec0df82 : 00000000`0047081b 00000000`00000000 00000000`00000000 ffffae87`9ccb9c80 : nt!PiDaFastIoDispatch+0x6a fffff287`0cd4f9e0 fffff807`0ec0dbe6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382 fffff287`0cd4fb20 fffff807`0e9ef375 : fffff287`0cd4fc18 00000000`00000000 ffffae87`9cf85080 0000006f`395ff018 : nt!NtDeviceIoControlFile+0x56 fffff287`0cd4fb90 00007ffa`5f0cae74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 0000006f`395feb78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`5f0cae74 SYMBOL_NAME: nt!PiDmCompareObjects+12 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.264 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 12 FAILURE_BUCKET_ID: AV_R_INVALID_nt!PiDmCompareObjects OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {88694318-3f51-91c3-580c-916fcf2cca8f} Followup: MachineOwner --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000061941, The subtype of the bugcheck. Arg2: ffff880eec858280 Arg3: 0000000000000009 Arg4: fffffe8f88f01ee0 Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for atikmdag.sys *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 3 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-VFOM7MS Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 101 Key : Analysis.Memory.CommitPeak.Mb Value: 70 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 61941 BUGCHECK_P2: ffff880eec858280 BUGCHECK_P3: 9 BUGCHECK_P4: fffffe8f88f01ee0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Registry STACK_TEXT: fffffe8f`88f01d38 fffff807`5ec01fae : 00000000`0000001a 00000000`00061941 ffff880e`ec858280 00000000`00000009 : nt!KeBugCheckEx fffffe8f`88f01d40 fffff807`5ebebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1ef6ce fffffe8f`88f01ee0 fffff807`5eed5912 : fffff807`5edeff34 00000000`00000011 00000000`000000e5 fffffe8f`00000000 : nt!KiPageFault+0x35e fffffe8f`88f02078 fffff807`5edeff34 : 00000000`00000011 00000000`000000e5 fffffe8f`00000000 00000000`00000000 : nt!HvpGetCellPaged+0xa2 fffffe8f`88f02080 fffff807`5edf2b5a : 00000000`00000000 00000000`00000024 00000000`00000000 fffffe8f`88f02510 : nt!CmQueryValueKey+0x284 fffffe8f`88f021e0 fffff807`5ebef375 : ffff880e`00000000 00000000`000000a0 00000000`00000000 ffff880e`e8a00000 : nt!NtQueryValueKey+0x5ba fffffe8f`88f024e0 fffff807`5ebe1880 : fffff807`5ee2c97a ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 fffffe8f`88f026e8 fffff807`5ee2c97a : ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 fffffe8f`88f02760 : nt!KiServiceLinkage fffffe8f`88f026f0 fffff807`5ef0c47e : ffff880e`fa4041f0 ffff9883`e86cf000 00000000`00000000 fffffe8f`88f029cc : nt!RtlpQueryRegistryValues+0x18a fffffe8f`88f027d0 fffff807`6a55a696 : 00000000`00000000 ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 : nt!RtlQueryRegistryValuesEx+0xe fffffe8f`88f02810 00000000`00000000 : ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 00000000`00000000 : atikmdag+0x6a696 MODULE_NAME: hardware IMAGE_NAME: hardware_ram STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000096, Exception code that caused the bugcheck Arg2: fffff8032681ffe4, Address of the instruction which caused the bugcheck Arg3: ffff9c00f577f920, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 4 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-VFOM7MS Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 5 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000096 BUGCHECK_P2: fffff8032681ffe4 BUGCHECK_P3: ffff9c00f577f920 BUGCHECK_P4: 0 CONTEXT: ffff9c00f577f920 -- (.cxr 0xffff9c00f577f920) rax=00000000bbffe173 rbx=0000000000000000 rcx=ffff9c00f57c0180 rdx=0000000000000000 rsi=0000000000000000 rdi=ffff878cc9f3ca10 rip=fffff8032681ffe4 rsp=ffffda83ac8377d8 rbp=ffff878ccef50080 r8=0000000000000002 r9=ffffda83ac837a70 r10=fffff8032681fec0 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=ffffffffffffffff r15=ffff878cce27f000 iopl=0 nv up ei ng nz ac pe cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293 nt!ExIsResourceAcquiredSharedLite+0x124: fffff803`2681ffe4 0f22c3 mov cr0,rbx Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: dwm.exe BAD_STACK_POINTER: ffff9c00f577f018 STACK_TEXT: ffffda83`ac8377d8 ffff878c`ce27f000 : fffff803`2be5e2ea ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 : nt!ExIsResourceAcquiredSharedLite+0x124 ffffda83`ac837838 fffff803`2be5e2ea : ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 ffff878c`ce27f000 : 0xffff878c`ce27f000 ffffda83`ac837840 fffff803`2be80fd5 : ffffffff`ffffffff ffffda83`ac837ae0 ffff878c`ce27f000 ffff878c`ce27f000 : dxgkrnl!DXGADAPTER::AcquireCoreResourceShared+0x3a ffffda83`ac8379e0 fffff803`2be80c8a : 00000215`9db96800 ffff878c`c9787860 00000000`000010ac fffff803`26bfb1ba : dxgkrnl!DxgkSetSyncRefreshCountWaitTargetInternal+0x325 ffffda83`ac837ba0 fffff803`269ef375 : 00000000`00000000 ffff878c`00000000 ffffda83`ac837c18 00000000`00000000 : dxgkrnl!DxgkSetSyncRefreshCountWaitTarget+0xca ffffda83`ac837c00 00007ff9`81505984 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 0000007c`8577f6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`81505984 CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt fffff8032681ffd8 - nt!ExIsResourceAcquiredSharedLite+118 [ 6c:2c ] 1 error : !nt (fffff8032681ffd8) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption MEMORY_CORRUPTOR: ONE_BIT STACK_COMMAND: .cxr 0xffff9c00f577f920 ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: memory_corruption --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 0000000080000003, Exception code that caused the bugcheck Arg2: fffff80240531633, Address of the instruction which caused the bugcheck Arg3: ffff8880bf6a5a60, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 3 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-VFOM7MS Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 3 Key : Analysis.Memory.CommitPeak.Mb Value: 69 Key : Analysis.System Value: CreateObject ADDITIONAL_XML: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: 80000003 BUGCHECK_P2: fffff80240531633 BUGCHECK_P3: ffff8880bf6a5a60 BUGCHECK_P4: 0 CONTEXT: ffff8880bf6a5a60 -- (.cxr 0xffff8880bf6a5a60) rax=ffff8880bf6a6488 rbx=ffff8880bf6a7680 rcx=0000000000000001 rdx=ffff8880bf6a7680 rsi=ffff8880bf6a6c80 rdi=0000000000000001 rip=fffff80240531633 rsp=ffff8880bf6a6460 rbp=ffff8880bf6a6a70 r8=ffff8880bf6a6c80 r9=ffff8880bf6a6ac0 r10=ffff8880bf6a7448 r11=0000000000000000 r12=ffff8880bf6a79e0 r13=ffff8880bf6a7448 r14=ffff8880bf6a6ac0 r15=ffff8880bf6a7448 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000202 nt!KeCheckStackAndTargetAddress+0x53: fffff802`40531633 cc int 3 Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: steam.exe TRAP_FRAME: ffff8880bf6a74f0 -- (.trap 0xffff8880bf6a74f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000021 rbx=0000000000000000 rcx=00000000000000f2 rdx=00000000000000f2 rsi=0000000000000000 rdi=0000000000000000 rip=0000000000000001 rsp=ffff8880bf6a7680 rbp=0000000000000001 r8=0000000000000000 r9=0000000000000041 r10=0000000000100200 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc 00000000`00000001 ?? ??? Resetting default scope STACK_TEXT: ffff8880`bf6a6460 fffff802`405b90fb : fffff802`408db2db fffff802`40307df0 00000000`00000000 00000000`00000000 : nt!KeCheckStackAndTargetAddress+0x53 ffff8880`bf6a6490 fffff802`405e68df : fffff802`40307df0 ffff8880`bf6a6a70 fffff802`405b90c0 00000000`00000000 : nt!_C_specific_handler+0x3b ffff8880`bf6a6500 fffff802`40432fb7 : ffff8880`bf6a6a70 00000000`00000000 ffff8880`bf6a79e0 fffff802`408db2db : nt!RtlpExecuteHandlerForException+0xf ffff8880`bf6a6530 fffff802`4047b226 : ffff8880`bf6a7448 ffff8880`bf6a7180 ffff8880`bf6a7448 ffff9a8c`7c11ec40 : nt!RtlDispatchException+0x297 ffff8880`bf6a6c50 fffff802`405efa6c : ffff8880`bf6a7570 00000000`00001000 ffff8880`bf6a74f0 ffff8000`00000000 : nt!KiDispatchException+0x186 ffff8880`bf6a7310 fffff802`405ebc03 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000258 : nt!KiExceptionDispatch+0x12c ffff8880`bf6a74f0 00000000`00000001 : ffff9a8c`7c4ac340 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e : nt!KiPageFault+0x443 ffff8880`bf6a7680 ffff9a8c`7c4ac340 : 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff : 0x1 ffff8880`bf6a7688 00000000`00000041 : ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 : 0xffff9a8c`7c4ac340 ffff8880`bf6a7690 ffff8880`bf6a77d0 : fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 : 0x41 ffff8880`bf6a7698 fffff802`407eb74e : ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 00000000`00000041 : 0xffff8880`bf6a77d0 ffff8880`bf6a76a0 fffff802`4041bfd9 : 00000000`00000041 ffff8880`bf6a77d0 00000000`033eefff 00000000`033ae000 : nt!MiChargeFullProcessCommitment+0x9e ffff8880`bf6a76d0 fffff802`407eaed4 : ffff9a8c`7c11ec40 00000000`033ae000 00000000`00041001 00000000`00000002 : nt!MiCommitExistingVad+0x1c9 ffff8880`bf6a7860 fffff802`408db2db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0050e070 : nt!MiAllocateVirtualMemory+0x2a4 ffff8880`bf6a79e0 fffff802`405ef375 : ffffffff`ffffffff ffff9a8c`7b97f080 00000000`00000000 00000000`0050e018 : nt!NtAllocateVirtualMemory+0x1ab ffff8880`bf6a7b90 00007ffe`3fb4b094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000000`0050dff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3fb4b094 SYMBOL_NAME: nt!KeCheckStackAndTargetAddress+53 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.264 STACK_COMMAND: .cxr 0xffff8880bf6a5a60 ; kb BUCKET_ID_FUNC_OFFSET: 53 FAILURE_BUCKET_ID: 0x3B_80000003_nt!KeCheckStackAndTargetAddress OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {3c8e413e-71c2-0077-9ab0-f2dd61308472} Followup: MachineOwner ---------
MBR ve FAT olarak yazdırıyor. Bir türlü MBR ve NTFS olarak yazdıramadım. Aşağıdaki fotoğrafta NTFS olarak uygulama üzerinden biçimlendirip yazdırsam da FAT olarak gözüküyor. Rufus üzerinden de seçim yapamıyorum. Ne yapabilirim?Legacy için MBR ve NTFS seçeneklerini kullanacaksınız.