Aşağıdaki linkte vermiş olduğum minidump dosyaları bulunmaktadır. 2 haftada 1 mavi ekran aldım. Sebebi nedir? Şimdiden teşekkürler.
Desktop.rar
drive.google.com
BiosVersion = 1401
BiosReleaseDate = Aralık 2020
SystemManufacturer = ASUS
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME B550M-K
BaseBoardVersion = Rev X.0x
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc00419097760, memory referenced.
Arg2: 0000000000000011, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffc00419097760, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.PTE
Value: Valid
Key : AV.Type
Value: Execute
Key : Analysis.CPU.mSec
Value: 1577
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3791
Key : Analysis.Init.CPU.mSec
Value: 108
Key : Analysis.Init.Elapsed.mSec
Value: 2058
Key : Analysis.Memory.CommitPeak.Mb
Value: 136
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 091422-8875-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffc00419097760
BUGCHECK_P2: 11
BUGCHECK_P3: ffffc00419097760
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff801436fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc00419097760
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffc004190975e0 -- (.trap 0xffffc004190975e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd907a5615e68 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000020 rsi=0000000000000000 rdi=0000000000000000
rip=ffffc00419097760 rsp=ffffc00419097770 rbp=ffffab806e100180
r8=0000000000000000 r9=ffffab806e100180 r10=0000000000000000
r11=ffff9b7ff5800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffc004`19097760 7077 jo ffffc004`190977d9 [br=0]
Resetting default scope
STACK_TEXT:
ffffc004`19097338 fffff801`42e3af53 : 00000000`00000050 ffffc004`19097760 00000000`00000011 ffffc004`190975e0 : nt!KeBugCheckEx
ffffc004`19097340 fffff801`42c6d0e0 : 00000000`00000000 00000000`00000011 ffffc004`19097660 00000000`00000000 : nt!MiSystemFault+0x1afe23
ffffc004`19097440 fffff801`42e06a5e : 00000000`00000000 00000000`00000000 45300000`43300000 00000000`00000000 : nt!MmAccessFault+0x400
ffffc004`190975e0 ffffc004`19097760 : ffffc004`00000002 ffffc004`00000003 00000000`00000000 ffffd907`00000000 : nt!KiPageFault+0x35e
ffffc004`19097770 ffffc004`00000002 : ffffc004`00000003 00000000`00000000 ffffd907`00000000 ffffd907`929e1b40 : 0xffffc004`19097760
ffffc004`19097778 ffffc004`00000003 : 00000000`00000000 ffffd907`00000000 ffffd907`929e1b40 00000000`00000000 : 0xffffc004`00000002
ffffc004`19097780 00000000`00000000 : ffffd907`00000000 ffffd907`929e1b40 00000000`00000000 ffffd907`00000000 : 0xffffc004`00000003
SYMBOL_NAME: nt!MiSystemFault+1afe23
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1889
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1afe23
FAILURE_BUCKET_ID: AV_X_(null)_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {49578414-34a9-c6dc-c795-b8c5552d5975}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb005a93e2760, memory referenced.
Arg2: 0000000000000011, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffb005a93e2760, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.PTE
Value: Valid
Key : AV.Type
Value: Execute
Key : Analysis.CPU.mSec
Value: 1686
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6419
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 3428
Key : Analysis.Memory.CommitPeak.Mb
Value: 138
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 092922-8218-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffb005a93e2760
BUGCHECK_P2: 11
BUGCHECK_P3: ffffb005a93e2760
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff8036ccfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffb005a93e2760
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: ffffb005a93e25e0 -- (.trap 0xffffb005a93e25e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdf88d126ab18 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffb005a93e2760 rsp=ffffb005a93e2770 rbp=ffffc901f4f00180
r8=0000000000000000 r9=ffffc901f4f00180 r10=0000000000000000
r11=ffffb8fec3600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffb005`a93e2760 7027 jo ffffb005`a93e2789 [br=0]
Resetting default scope
STACK_TEXT:
ffffb005`a93e2338 fffff803`6c431a9d : 00000000`00000050 ffffb005`a93e2760 00000000`00000011 ffffb005`a93e25e0 : nt!KeBugCheckEx
ffffb005`a93e2340 fffff803`6c2399e0 : 00000000`00000006 00000000`00000011 ffffb005`a93e2660 00000000`00000000 : nt!MiSystemFault+0x1da08d
ffffb005`a93e2440 fffff803`6c40715e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffb005`a93e25e0 ffffb005`a93e2760 : ffffb005`00000002 ffffb005`00000003 00000000`00000000 ffffdf88`00000000 : nt!KiPageFault+0x35e
ffffb005`a93e2770 ffffb005`00000002 : ffffb005`00000003 00000000`00000000 ffffdf88`00000000 ffffdf88`bed572b0 : 0xffffb005`a93e2760
ffffb005`a93e2778 ffffb005`00000003 : 00000000`00000000 ffffdf88`00000000 ffffdf88`bed572b0 00000000`00000000 : 0xffffb005`00000002
ffffb005`a93e2780 00000000`00000000 : ffffdf88`00000000 ffffdf88`bed572b0 00000000`00000000 ffffdf88`00000000 : 0xffffb005`00000003
SYMBOL_NAME: nt!MiSystemFault+1da08d
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1da08d
FAILURE_BUCKET_ID: AV_X_(null)_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {49578414-34a9-c6dc-c795-b8c5552d5975}
Followup: MachineOwner
---------
BiosVersion = 1401
BiosReleaseDate = Aralık 2020
SystemManufacturer = ASUS
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME B550M-K
BaseBoardVersion = Rev X.0x
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc00419097760, memory referenced.
Arg2: 0000000000000011, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffc00419097760, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.PTE
Value: Valid
Key : AV.Type
Value: Execute
Key : Analysis.CPU.mSec
Value: 1577
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3791
Key : Analysis.Init.CPU.mSec
Value: 108
Key : Analysis.Init.Elapsed.mSec
Value: 2058
Key : Analysis.Memory.CommitPeak.Mb
Value: 136
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 091422-8875-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffc00419097760
BUGCHECK_P2: 11
BUGCHECK_P3: ffffc00419097760
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff801436fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc00419097760
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffc004190975e0 -- (.trap 0xffffc004190975e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd907a5615e68 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000020 rsi=0000000000000000 rdi=0000000000000000
rip=ffffc00419097760 rsp=ffffc00419097770 rbp=ffffab806e100180
r8=0000000000000000 r9=ffffab806e100180 r10=0000000000000000
r11=ffff9b7ff5800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffc004`19097760 7077 jo ffffc004`190977d9 [br=0]
Resetting default scope
STACK_TEXT:
ffffc004`19097338 fffff801`42e3af53 : 00000000`00000050 ffffc004`19097760 00000000`00000011 ffffc004`190975e0 : nt!KeBugCheckEx
ffffc004`19097340 fffff801`42c6d0e0 : 00000000`00000000 00000000`00000011 ffffc004`19097660 00000000`00000000 : nt!MiSystemFault+0x1afe23
ffffc004`19097440 fffff801`42e06a5e : 00000000`00000000 00000000`00000000 45300000`43300000 00000000`00000000 : nt!MmAccessFault+0x400
ffffc004`190975e0 ffffc004`19097760 : ffffc004`00000002 ffffc004`00000003 00000000`00000000 ffffd907`00000000 : nt!KiPageFault+0x35e
ffffc004`19097770 ffffc004`00000002 : ffffc004`00000003 00000000`00000000 ffffd907`00000000 ffffd907`929e1b40 : 0xffffc004`19097760
ffffc004`19097778 ffffc004`00000003 : 00000000`00000000 ffffd907`00000000 ffffd907`929e1b40 00000000`00000000 : 0xffffc004`00000002
ffffc004`19097780 00000000`00000000 : ffffd907`00000000 ffffd907`929e1b40 00000000`00000000 ffffd907`00000000 : 0xffffc004`00000003
SYMBOL_NAME: nt!MiSystemFault+1afe23
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1889
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1afe23
FAILURE_BUCKET_ID: AV_X_(null)_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {49578414-34a9-c6dc-c795-b8c5552d5975}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb005a93e2760, memory referenced.
Arg2: 0000000000000011, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffb005a93e2760, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.PTE
Value: Valid
Key : AV.Type
Value: Execute
Key : Analysis.CPU.mSec
Value: 1686
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6419
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 3428
Key : Analysis.Memory.CommitPeak.Mb
Value: 138
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 092922-8218-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffb005a93e2760
BUGCHECK_P2: 11
BUGCHECK_P3: ffffb005a93e2760
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff8036ccfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffb005a93e2760
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: ffffb005a93e25e0 -- (.trap 0xffffb005a93e25e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdf88d126ab18 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffb005a93e2760 rsp=ffffb005a93e2770 rbp=ffffc901f4f00180
r8=0000000000000000 r9=ffffc901f4f00180 r10=0000000000000000
r11=ffffb8fec3600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffb005`a93e2760 7027 jo ffffb005`a93e2789 [br=0]
Resetting default scope
STACK_TEXT:
ffffb005`a93e2338 fffff803`6c431a9d : 00000000`00000050 ffffb005`a93e2760 00000000`00000011 ffffb005`a93e25e0 : nt!KeBugCheckEx
ffffb005`a93e2340 fffff803`6c2399e0 : 00000000`00000006 00000000`00000011 ffffb005`a93e2660 00000000`00000000 : nt!MiSystemFault+0x1da08d
ffffb005`a93e2440 fffff803`6c40715e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffb005`a93e25e0 ffffb005`a93e2760 : ffffb005`00000002 ffffb005`00000003 00000000`00000000 ffffdf88`00000000 : nt!KiPageFault+0x35e
ffffb005`a93e2770 ffffb005`00000002 : ffffb005`00000003 00000000`00000000 ffffdf88`00000000 ffffdf88`bed572b0 : 0xffffb005`a93e2760
ffffb005`a93e2778 ffffb005`00000003 : 00000000`00000000 ffffdf88`00000000 ffffdf88`bed572b0 00000000`00000000 : 0xffffb005`00000002
ffffb005`a93e2780 00000000`00000000 : ffffdf88`00000000 ffffdf88`bed572b0 00000000`00000000 ffffdf88`00000000 : 0xffffb005`00000003
SYMBOL_NAME: nt!MiSystemFault+1da08d
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1da08d
FAILURE_BUCKET_ID: AV_X_(null)_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {49578414-34a9-c6dc-c795-b8c5552d5975}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.