SYSTEM_SERVICE_EXCEPTION Mavi ekran hatası

dutyd

Kilopat
Katılım
7 Mayıs 2018
Mesajlar
458
Çözümler
2
Merhaba arkadaşlar. Sistemimde uzun zamandır mavi ekran alıyorum. Bir ara çözmüştük ama tekrardan baş gösterdi. Bu hatayı nasıl çözebiliriz? Bende istemediğiniz kadar dump dosyası var. Bana bir yardımcı olur musunuz? Dump dosyası: 022121-13921-01.dmp

1613925820656.png
 
Hiçbir şey. Sorun da orada. Direkt olarak bir şeyi göstermediği için net bir fikir sunamıyorum. Bu nedenle soruna sebep olabilecek muhtemel 2 şey Driver Booster'ın kurduğu sürücüler ve güncel olmayan Windows.

Driver olabilir ama eski Windows pek sanmam, bence gayet stabil 1909. Hiçbir şey yoksa bende daha 10 tane dump dosyası var, onları atabilirim belki bir şey çıkar.
 
Hocam win32k.sys nedir?
Adından da anlaşılacağı üzere Windows ile ilgili bir dosya. Onlardan bir şey anlaşılmıyor genellikle, o yüzden detaylıca araştırma yapmadım hiç.

Dosyalarda gözüme çarpan her şeyi yazayım, önceden uyguladıklarınızı göz ardı edebilirsiniz.
  • İki dosya, MEMORY_MANAGEMENT durdurma kodu ile direkt olarak belleği işaret ediyor olabilir. Memtest86 temiz çıkmıştı, XMP açıksa bir süreliğine kapatıp kullanmayı deneyin.
  • Core Temp'i, MSI Afterburner'ı kaldırın.
  • DDU ile ekran kartı sürücüsünü kaldırın, WHQL sertifikalı güncel bir sürüm kurun.
  • Shadow Defender'ı kaldırın.
  • GameLoop'u kaldırın.
  • CMD'yi yönetici olarak çalıştırın, SFC /scannow komutunu girin.
  • Tekrardan CMD'yi yönetici olarak çalıştırın, chkdsk /f /r komutunu girin.
  • DISM komutlarını uygulayın.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
    the pagefile offset. Parameter 3 contains the page CRC value.
    Parameter 4 contains the expected CRC value.
Arg2: 000000000014d9ff
Arg3: 000000008d5bcecc
Arg4: 000000000014d807

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3234

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 33316

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 3f

BUGCHECK_P2: 14d9ff

BUGCHECK_P3: 8d5bcecc

BUGCHECK_P4: 14d807

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Update.exe

PAGE_HASH_ERRORS_DETECTED: 1

TRAP_FRAME:  fffff907b16d8120 -- (.trap 0xfffff907b16d8120)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8041e595000 rbx=0000000000000000 rcx=fffff8041e5b3010
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041fe08a37 rsp=fffff907b16d82b8 rbp=fffff907b16d8341
 r8=00000000000205f0  r9=000000000000004b r10=7ffffffffffffffc
r11=fffff77bbddee7f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!memset+0xb7:
fffff804`1fe08a37 0f2941f0        movaps  xmmword ptr [rcx-10h],xmm0 ds:fffff804`1e5b3000=000800010000000000000000307b7fd8
Resetting default scope

STACK_TEXT: 
fffff907`b16d7c98 fffff804`1ff57a7d     : 00000000`0000001a 00000000`0000003f 00000000`0014d9ff 00000000`8d5bcecc : nt!KeBugCheckEx
fffff907`b16d7ca0 fffff804`1fcb69a1     : ffffcc0c`ca273dd0 ffffffff`ffffffff 00000000`00000000 ffffde00`0c658d98 : nt!MiValidatePagefilePageHash+0x331
fffff907`b16d7d80 fffff804`1fcb4b35     : fffff907`00001000 fffff907`b16d7f00 fffff907`b16d7f10 fffff804`00000000 : nt!MiWaitForInPageComplete+0x351
fffff907`b16d7e70 fffff804`1fc0c9c8     : 00000000`c0033333 00000000`00000000 fffff804`1e5b3000 00000000`00000000 : nt!MiIssueHardFault+0x3c5
fffff907`b16d7f80 fffff804`1fe0395e     : 0007ffff`00000003 fffff804`20650b80 00000000`00000030 fffff804`2064e938 : nt!MmAccessFault+0x468
fffff907`b16d8120 fffff804`1fe08a37     : fffff804`2003ceab ffffcc0c`c0699d00 fffff907`00000000 fffff804`20650b80 : nt!KiPageFault+0x35e
fffff907`b16d82b8 fffff804`2003ceab     : ffffcc0c`c0699d00 fffff907`00000000 fffff804`20650b80 ffffde00`0c439ae0 : nt!memset+0xb7
fffff907`b16d82c0 fffff804`2003b4d4     : 00000000`0078e000 ffffde00`0d1c0000 ffffcc0c`c8f38de0 00000000`00000000 : nt!MiUpdateCfgSystemWideBitmapWorker+0x30b
fffff907`b16d83a0 fffff804`200440ee     : 00000000`00000023 fffff907`b16d8660 00000000`00000000 00000000`66540000 : nt!MiUpdateCfgSystemWideBitmap+0x70
fffff907`b16d83e0 fffff804`200431c6     : fffff907`b16d8840 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiRelocateImage+0x32e
fffff907`b16d8560 fffff804`2003056b     : ffffcc0c`cc20f7f0 fffff907`b16d8840 fffff907`b16d8840 00000000`00000ecf : nt!MiCreateNewSection+0x6b2
fffff907`b16d86d0 fffff804`2002fbb4     : fffff907`b16d8700 ffffde00`18706550 ffffcc0c`cc20f7f0 00000000`00000000 : nt!MiCreateImageOrDataSection+0x2db
fffff907`b16d87c0 fffff804`2002f997     : 00000000`01000000 fffff907`b16d8b80 00000000`00000001 00000000`00000010 : nt!MiCreateSection+0xf4
fffff907`b16d8940 fffff804`2002f77c     : 00000000`0113e3e8 00000000`0000000d 00000000`00000000 00000000`00000001 : nt!MiCreateSectionCommon+0x207
fffff907`b16d8a20 fffff804`1fe071b8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x5c
fffff907`b16d8a90 00007ffe`3af8c8f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0113e348 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3af8c8f4


SYMBOL_NAME:  PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup:     MachineOwner
---------

 *** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
 
 
 *******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
    the pagefile offset. Parameter 3 contains the page CRC value.
    Parameter 4 contains the expected CRC value.
Arg2: 00000000001b60e1
Arg3: 0000000037130d8c
Arg4: 00000000a9268e1c

Debugging Details:
------------------

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2984

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 33542

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 3f

BUGCHECK_P2: 1b60e1

BUGCHECK_P3: 37130d8c

BUGCHECK_P4: a9268e1c

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

PAGE_HASH_ERRORS_DETECTED: 1

STACK_TEXT: 
ffffba8d`ce947688 fffff803`4cb656ad     : 00000000`0000001a 00000000`0000003f 00000000`001b60e1 00000000`37130d8c : nt!KeBugCheckEx
ffffba8d`ce947690 fffff803`4ca3c6b3     : ffff8d08`75909e10 ffffffff`ffffffff ffffba8d`ce9478f0 ffff8d08`959ea700 : nt!MiValidatePagefilePageHash+0x331
ffffba8d`ce947770 fffff803`4c893e7e     : 00000000`00000000 ffff8d08`00000000 ffffba8d`ce947900 fffff803`00000000 : nt!MiWaitForInPageComplete+0x1a6da3
ffffba8d`ce947860 fffff803`4c812d48     : 00000000`c0033333 00000000`00000001 00000000`0ed2ed1c fffff803`4c8ec038 : nt!MiIssueHardFault+0x18e
ffffba8d`ce947960 fffff803`4c9ebb1e     : 00000000`77b23fb0 ffff8d08`537de5e0 ffffba8d`00000000 ffff8d08`00000000 : nt!MmAccessFault+0x468
ffffba8d`ce947b00 00000000`029fb1f6     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0dcaf520 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x29fb1f6


SYMBOL_NAME:  PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup:     MachineOwner
---------

 *** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
 
 
 *******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8102b82614ed, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8042d57b9e2, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 132540

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff8102b82614ed

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8042d57b9e2

BUGCHECK_P4: 2

READ_ADDRESS: fffff8041d9713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8041d8283c8: Unable to get Flags value from nt!KdVersionBlock
fffff8041d8283c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffff8102b82614ed

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  aow_exe.exe

TRAP_FRAME:  ffffe9809655cf50 -- (.trap 0xffffe9809655cf50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000018 rbx=0000000000000000 rcx=0000000002171107
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042d57b9e2 rsp=ffffe9809655d0e0 rbp=ffffe9809655d390
 r8=0000000000000000  r9=0000000042e220f8 r10=0000000000000001
r11=0000000042e220d9 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
aow_drv_x64_ev+0x7b9e2:
fffff804`2d57b9e2 8b548e29        mov     edx,dword ptr [rsi+rcx*4+29h] ds:00000000`085c4445=????????
Resetting default scope

STACK_TEXT: 
ffffe980`9655cca8 fffff804`1d613ae0     : 00000000`00000050 ffff8102`b82614ed 00000000`00000000 ffffe980`9655cf50 : nt!KeBugCheckEx
ffffe980`9655ccb0 fffff804`1d4cdcbf     : 00000000`00000005 00000000`00000000 00000000`00000000 ffff8102`b82614ed : nt!MiSystemFault+0x18f320
ffffe980`9655cdb0 fffff804`1d5d1b5e     : ffff8102`b007a080 fffff804`1d44f6c5 ffff8102`afc9d000 00000000`00000000 : nt!MmAccessFault+0x34f
ffffe980`9655cf50 fffff804`2d57b9e2     : ffff8102`af5a9a40 ffffe980`9655d230 ffff8102`a29433d0 ffff8102`b007a080 : nt!KiPageFault+0x35e
ffffe980`9655d0e0 ffff8102`af5a9a40     : ffffe980`9655d230 ffff8102`a29433d0 ffff8102`b007a080 00000000`0000010e : aow_drv_x64_ev+0x7b9e2
ffffe980`9655d0e8 ffffe980`9655d230     : ffff8102`a29433d0 ffff8102`b007a080 00000000`0000010e fffff804`2d560f06 : 0xffff8102`af5a9a40
ffffe980`9655d0f0 ffff8102`a29433d0     : ffff8102`b007a080 00000000`0000010e fffff804`2d560f06 00000000`0000010e : 0xffffe980`9655d230
ffffe980`9655d0f8 ffff8102`b007a080     : 00000000`0000010e fffff804`2d560f06 00000000`0000010e ffff8102`b007a080 : 0xffff8102`a29433d0
ffffe980`9655d100 00000000`0000010e     : fffff804`2d560f06 00000000`0000010e ffff8102`b007a080 00000000`000000ae : 0xffff8102`b007a080
ffffe980`9655d108 fffff804`2d560f06     : 00000000`0000010e ffff8102`b007a080 00000000`000000ae 00000000`00a7e6d0 : 0x10e
ffffe980`9655d110 00000000`0000010e     : ffff8102`b007a080 00000000`000000ae 00000000`00a7e6d0 00000000`00000000 : aow_drv_x64_ev+0x60f06
ffffe980`9655d118 ffff8102`b007a080     : 00000000`000000ae 00000000`00a7e6d0 00000000`00000000 fffff804`2d583675 : 0x10e
ffffe980`9655d120 00000000`000000ae     : 00000000`00a7e6d0 00000000`00000000 fffff804`2d583675 ffff8102`afc9d000 : 0xffff8102`b007a080
ffffe980`9655d128 00000000`00a7e6d0     : 00000000`00000000 fffff804`2d583675 ffff8102`afc9d000 ffff8102`afc9d000 : 0xae
ffffe980`9655d130 00000000`00000000     : fffff804`2d583675 ffff8102`afc9d000 ffff8102`afc9d000 00000000`42e220f9 : 0xa7e6d0


SYMBOL_NAME:  aow_drv_x64_ev+7b9e2

MODULE_NAME: aow_drv_x64_ev

IMAGE_NAME:  aow_drv_x64_ev.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  7b9e2

FAILURE_BUCKET_ID:  AV_R_INVALID_aow_drv_x64_ev!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f12283ae-951b-de5d-11f1-3aa3364fd9fe}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbb8e33db5000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8026546188e, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 46396

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffbb8e33db5000

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8026546188e

BUGCHECK_P4: 0

READ_ADDRESS: fffff802624fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026240f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8026240f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffbb8e33db5000

MM_INTERNAL_CODE:  0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

TRAP_FRAME:  ffff948bd73fdbc0 -- (.trap 0xffff948bd73fdbc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff838fd471e5a0 rbx=0000000000000000 rcx=ffff838fd4724570
rdx=000037fe5f690a60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026546188e rsp=ffff948bd73fdd58 rbp=ffff948bd73fe170
 r8=0000000000000030  r9=0000000003fffd80 r10=0000000000000000
r11=ffffbb8f33dab000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
Ntfs!memcpy+0x1ce:
fffff802`6546188e 0f10641130      movups  xmm4,xmmword ptr [rcx+rdx+30h] ds:ffffbb8e`33db5000=????????????????????????????????
Resetting default scope

STACK_TEXT: 
ffff948b`d73fd918 fffff802`61c35ecd     : 00000000`00000050 ffffbb8e`33db5000 00000000`00000000 ffff948b`d73fdbc0 : nt!KeBugCheckEx
ffff948b`d73fd920 fffff802`61a12ce0     : 00000000`00000114 00000000`00000000 ffff948b`d73fdc40 00000000`00000000 : nt!MiSystemFault+0x1ad79d
ffff948b`d73fda20 fffff802`61bebb1e     : 00000000`00000103 00000000`00000000 ffff948b`d73fdd00 ffff948b`d73fdd08 : nt!MmAccessFault+0x400
ffff948b`d73fdbc0 fffff802`6546188e     : fffff802`6544c70a 00000000`00000000 ffffbb8e`33daf000 00000000`06dda400 : nt!KiPageFault+0x35e
ffff948b`d73fdd58 fffff802`6544c70a     : 00000000`00000000 ffffbb8e`33daf000 00000000`06dda400 00000000`000000f0 : Ntfs!memcpy+0x1ce
ffff948b`d73fdd60 fffff802`6544773b     : 00000000`00000000 ffffbb8e`271b25a0 00000000`00000000 00000000`00000700 : Ntfs!NtfsResidentWrite+0x43e
ffff948b`d73fdf10 fffff802`65445f23     : ffffcb87`2b1a6d28 ffffcb87`2a1eda60 ffff948b`d73fe1b0 00000000`00000000 : Ntfs!NtfsCommonWrite+0x159b
ffff948b`d73fe140 fffff802`61a46d25     : 00000000`00000000 ffffcb87`2a1eda60 fffff802`6519d0a0 ffffcb87`2a1eda60 : Ntfs!NtfsFsdWrite+0x1d3
ffff948b`d73fe210 fffff802`651a248a     : 00000000`00000000 00000000`00000000 fffff802`00000000 ffffcb87`0a702270 : nt!IofCallDriver+0x55
ffff948b`d73fe250 00000000`00000000     : 00000000`00000000 fffff802`00000000 ffffcb87`0a702270 00000000`00000000 : diskpt+0x1248a


SYMBOL_NAME:  diskpt+1248a

MODULE_NAME: diskpt

IMAGE_NAME:  diskpt.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1248a

FAILURE_BUCKET_ID:  AV_R_INVALID_diskpt!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d6511526-f7fa-922c-5438-36d3b6af2a6d}

Followup:     MachineOwner
---------
 
Adından da anlaşılacağı üzere Windows ile ilgili bir dosya. Onlardan bir şey anlaşılmıyor genellikle, o yüzden detaylıca araştırma yapmadım hiç.

Dosyalarda gözüme çarpan her şeyi yazayım, önceden uyguladıklarınızı göz ardı edebilirsiniz.
  • İki dosya, memory_management durdurma kodu ile direkt olarak belleği işaret ediyor olabilir. Memtest86 temiz çıkmıştı, XMP açıksa bir süreliğine kapatıp kullanmayı deneyin.
  • Core Temp'i, MSI Afterburner'ı kaldırın.
  • DDU ile ekran kartı sürücüsünü kaldırın, WHQL sertifikalı güncel bir sürüm kurun.
  • Shadow Defender'ı kaldırın.
  • GameLoop'u kaldırın.
  • CMD'yi yönetici olarak çalıştırın, SFC /scannow komutunu girin.
  • Tekrardan CMD'yi yönetici olarak çalıştırın, chkdsk /f /r komutunu girin.
  • DISM komutlarını uygulayın.
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains.
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000014d9ff.
Arg3: 000000008d5bcecc.
Arg4: 000000000014d807.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3234.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX.

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 33316.

Key : Analysis.Memory.CommitPeak.Mb
Value: 78.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 3f.

BUGCHECK_P2: 14d9ff.

BUGCHECK_P3: 8d5bcecc.

BUGCHECK_P4: 14d807.

ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Update.exe

PAGE_HASH_ERRORS_DETECTED: 1

TRAP_FRAME: fffff907b16d8120 -- (.trap 0xfffff907b16d8120)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8041e595000 rbx=0000000000000000 rcx=fffff8041e5b3010
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041fe08a37 rsp=fffff907b16d82b8 rbp=fffff907b16d8341
r8=00000000000205f0 r9=000000000000004b r10=7ffffffffffffffc
r11=fffff77bbddee7f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
nt!memset+0xb7:
fffff804`1fe08a37 0f2941f0 movaps xmmword ptr [rcx-10h],xmm0 ds:fffff804`1e5b3000=000800010000000000000000307b7fd8
Resetting default scope.

STACK_TEXT:
fffff907`b16d7c98 fffff804`1ff57a7d : 00000000`0000001a 00000000`0000003f 00000000`0014d9ff 00000000`8d5bcecc : nt!KeBugCheckEx
fffff907`b16d7ca0 fffff804`1fcb69a1 : ffffcc0c`ca273dd0 ffffffff`ffffffff 00000000`00000000 ffffde00`0c658d98 : nt!MiValidatePagefilePageHash+0x331
fffff907`b16d7d80 fffff804`1fcb4b35 : fffff907`00001000 fffff907`b16d7f00 fffff907`b16d7f10 fffff804`00000000 : nt!MiWaitForInPageComplete+0x351
fffff907`b16d7e70 fffff804`1fc0c9c8 : 00000000`c0033333 00000000`00000000 fffff804`1e5b3000 00000000`00000000 : nt!MiIssueHardFault+0x3c5
fffff907`b16d7f80 fffff804`1fe0395e : 0007ffff`00000003 fffff804`20650b80 00000000`00000030 fffff804`2064e938 : nt!MmAccessFault+0x468
fffff907`b16d8120 fffff804`1fe08a37 : fffff804`2003ceab ffffcc0c`c0699d00 fffff907`00000000 fffff804`20650b80 : nt!KiPageFault+0x35e
fffff907`b16d82b8 fffff804`2003ceab : ffffcc0c`c0699d00 fffff907`00000000 fffff804`20650b80 ffffde00`0c439ae0 : nt!memset+0xb7
fffff907`b16d82c0 fffff804`2003b4d4 : 00000000`0078e000 ffffde00`0d1c0000 ffffcc0c`c8f38de0 00000000`00000000 : nt!MiUpdateCfgSystemWideBitmapWorker+0x30b
fffff907`b16d83a0 fffff804`200440ee : 00000000`00000023 fffff907`b16d8660 00000000`00000000 00000000`66540000 : nt!MiUpdateCfgSystemWideBitmap+0x70
fffff907`b16d83e0 fffff804`200431c6 : fffff907`b16d8840 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiRelocateImage+0x32e
fffff907`b16d8560 fffff804`2003056b : ffffcc0c`cc20f7f0 fffff907`b16d8840 fffff907`b16d8840 00000000`00000ecf : nt!MiCreateNewSection+0x6b2
fffff907`b16d86d0 fffff804`2002fbb4 : fffff907`b16d8700 ffffde00`18706550 ffffcc0c`cc20f7f0 00000000`00000000 : nt!MiCreateImageOrDataSection+0x2db
fffff907`b16d87c0 fffff804`2002f997 : 00000000`01000000 fffff907`b16d8b80 00000000`00000001 00000000`00000010 : nt!MiCreateSection+0xf4
fffff907`b16d8940 fffff804`2002f77c : 00000000`0113e3e8 00000000`0000000d 00000000`00000000 00000000`00000001 : nt!MiCreateSectionCommon+0x207
fffff907`b16d8a20 fffff804`1fe071b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x5c
fffff907`b16d8a90 00007ffe`3af8c8f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0113e348 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3af8c8f4

SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module.

IMAGE_NAME: Unknown_Image.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup: MachineOwner.
---------

*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains.
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 00000000001b60e1.
Arg3: 0000000037130d8c.
Arg4: 00000000a9268e1c.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2984.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX.

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 33542.

Key : Analysis.Memory.CommitPeak.Mb
Value: 78.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 3f.

BUGCHECK_P2: 1b60e1.

BUGCHECK_P3: 37130d8c.

BUGCHECK_P4: a9268e1c.

ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

PAGE_HASH_ERRORS_DETECTED: 1

STACK_TEXT:
ffffba8d`ce947688 fffff803`4cb656ad : 00000000`0000001a 00000000`0000003f 00000000`001b60e1 00000000`37130d8c : nt!KeBugCheckEx
ffffba8d`ce947690 fffff803`4ca3c6b3 : ffff8d08`75909e10 ffffffff`ffffffff ffffba8d`ce9478f0 ffff8d08`959ea700 : nt!MiValidatePagefilePageHash+0x331
ffffba8d`ce947770 fffff803`4c893e7e : 00000000`00000000 ffff8d08`00000000 ffffba8d`ce947900 fffff803`00000000 : nt!MiWaitForInPageComplete+0x1a6da3
ffffba8d`ce947860 fffff803`4c812d48 : 00000000`c0033333 00000000`00000001 00000000`0ed2ed1c fffff803`4c8ec038 : nt!MiIssueHardFault+0x18e
ffffba8d`ce947960 fffff803`4c9ebb1e : 00000000`77b23fb0 ffff8d08`537de5e0 ffffba8d`00000000 ffff8d08`00000000 : nt!MmAccessFault+0x468
ffffba8d`ce947b00 00000000`029fb1f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0dcaf520 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x29fb1f6.

SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module.

IMAGE_NAME: Unknown_Image.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup: MachineOwner.
---------

*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8102b82614ed, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8042d57b9e2, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3624.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX.

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 132540.

Key : Analysis.Memory.CommitPeak.Mb
Value: 76.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: 19h1_release.

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50.

BUGCHECK_P1: ffff8102b82614ed.

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8042d57b9e2.

BUGCHECK_P4: 2

READ_ADDRESS: fffff8041d9713b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8041d8283c8: Unable to get Flags value from nt!KdVersionBlock
fffff8041d8283c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8102b82614ed.

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: aow_exe.exe

TRAP_FRAME: ffffe9809655cf50 -- (.trap 0xffffe9809655cf50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000018 rbx=0000000000000000 rcx=0000000002171107
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042d57b9e2 rsp=ffffe9809655d0e0 rbp=ffffe9809655d390
r8=0000000000000000 r9=0000000042e220f8 r10=0000000000000001
r11=0000000042e220d9 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
aow_drv_x64_ev+0x7b9e2:
fffff804`2d57b9e2 8b548e29 mov edx,dword ptr [rsi+rcx*4+29h] ds:00000000`085c4445=????????
Resetting default scope.

STACK_TEXT:
ffffe980`9655cca8 fffff804`1d613ae0 : 00000000`00000050 ffff8102`b82614ed 00000000`00000000 ffffe980`9655cf50 : nt!KeBugCheckEx
ffffe980`9655ccb0 fffff804`1d4cdcbf : 00000000`00000005 00000000`00000000 00000000`00000000 ffff8102`b82614ed : nt!MiSystemFault+0x18f320
ffffe980`9655cdb0 fffff804`1d5d1b5e : ffff8102`b007a080 fffff804`1d44f6c5 ffff8102`afc9d000 00000000`00000000 : nt!MmAccessFault+0x34f
ffffe980`9655cf50 fffff804`2d57b9e2 : ffff8102`af5a9a40 ffffe980`9655d230 ffff8102`a29433d0 ffff8102`b007a080 : nt!KiPageFault+0x35e
ffffe980`9655d0e0 ffff8102`af5a9a40 : ffffe980`9655d230 ffff8102`a29433d0 ffff8102`b007a080 00000000`0000010e : aow_drv_x64_ev+0x7b9e2
ffffe980`9655d0e8 ffffe980`9655d230 : ffff8102`a29433d0 ffff8102`b007a080 00000000`0000010e fffff804`2d560f06 : 0xffff8102`af5a9a40
ffffe980`9655d0f0 ffff8102`a29433d0 : ffff8102`b007a080 00000000`0000010e fffff804`2d560f06 00000000`0000010e : 0xffffe980`9655d230
ffffe980`9655d0f8 ffff8102`b007a080 : 00000000`0000010e fffff804`2d560f06 00000000`0000010e ffff8102`b007a080 : 0xffff8102`a29433d0
ffffe980`9655d100 00000000`0000010e : fffff804`2d560f06 00000000`0000010e ffff8102`b007a080 00000000`000000ae : 0xffff8102`b007a080
ffffe980`9655d108 fffff804`2d560f06 : 00000000`0000010e ffff8102`b007a080 00000000`000000ae 00000000`00a7e6d0 : 0x10e.
ffffe980`9655d110 00000000`0000010e : ffff8102`b007a080 00000000`000000ae 00000000`00a7e6d0 00000000`00000000 : aow_drv_x64_ev+0x60f06
ffffe980`9655d118 ffff8102`b007a080 : 00000000`000000ae 00000000`00a7e6d0 00000000`00000000 fffff804`2d583675 : 0x10e.
ffffe980`9655d120 00000000`000000ae : 00000000`00a7e6d0 00000000`00000000 fffff804`2d583675 ffff8102`afc9d000 : 0xffff8102`b007a080
ffffe980`9655d128 00000000`00a7e6d0 : 00000000`00000000 fffff804`2d583675 ffff8102`afc9d000 ffff8102`afc9d000 : 0xae.
ffffe980`9655d130 00000000`00000000 : fffff804`2d583675 ffff8102`afc9d000 ffff8102`afc9d000 00000000`42e220f9 : 0xa7e6d0.

SYMBOL_NAME: aow_drv_x64_ev+7b9e2

MODULE_NAME: aow_drv_x64_ev.

IMAGE_NAME: aow_drv_x64_ev.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 7b9e2.

FAILURE_BUCKET_ID: AV_R_INVALID_aow_drv_x64_ev!unknown_function

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {f12283ae-951b-de5d-11f1-3aa3364fd9fe}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbb8e33db5000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8026546188e, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4343.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX.

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 46396.

Key : Analysis.Memory.CommitPeak.Mb
Value: 83.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50.

BUGCHECK_P1: ffffbb8e33db5000.

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8026546188e.

BUGCHECK_P4: 0

READ_ADDRESS: fffff802624fa388: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8026240f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8026240f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffbb8e33db5000.

MM_INTERNAL_CODE: 0

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Registry.

TRAP_FRAME: ffff948bd73fdbc0 -- (.trap 0xffff948bd73fdbc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff838fd471e5a0 rbx=0000000000000000 rcx=ffff838fd4724570
rdx=000037fe5f690a60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026546188e rsp=ffff948bd73fdd58 rbp=ffff948bd73fe170
r8=0000000000000030 r9=0000000003fffd80 r10=0000000000000000
r11=ffffbb8f33dab000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
Ntfs!memcpy+0x1ce:
fffff802`6546188e 0f10641130 movups xmm4,xmmword ptr [rcx+rdx+30h] ds:ffffbb8e`33db5000=????????????????????????????????
Resetting default scope.

STACK_TEXT:
ffff948b`d73fd918 fffff802`61c35ecd : 00000000`00000050 ffffbb8e`33db5000 00000000`00000000 ffff948b`d73fdbc0 : nt!KeBugCheckEx
ffff948b`d73fd920 fffff802`61a12ce0 : 00000000`00000114 00000000`00000000 ffff948b`d73fdc40 00000000`00000000 : nt!MiSystemFault+0x1ad79d
ffff948b`d73fda20 fffff802`61bebb1e : 00000000`00000103 00000000`00000000 ffff948b`d73fdd00 ffff948b`d73fdd08 : nt!MmAccessFault+0x400
ffff948b`d73fdbc0 fffff802`6546188e : fffff802`6544c70a 00000000`00000000 ffffbb8e`33daf000 00000000`06dda400 : nt!KiPageFault+0x35e
ffff948b`d73fdd58 fffff802`6544c70a : 00000000`00000000 ffffbb8e`33daf000 00000000`06dda400 00000000`000000f0 : Ntfs!memcpy+0x1ce
ffff948b`d73fdd60 fffff802`6544773b : 00000000`00000000 ffffbb8e`271b25a0 00000000`00000000 00000000`00000700 : Ntfs!NtfsResidentWrite+0x43e
ffff948b`d73fdf10 fffff802`65445f23 : ffffcb87`2b1a6d28 ffffcb87`2a1eda60 ffff948b`d73fe1b0 00000000`00000000 : Ntfs!NtfsCommonWrite+0x159b
ffff948b`d73fe140 fffff802`61a46d25 : 00000000`00000000 ffffcb87`2a1eda60 fffff802`6519d0a0 ffffcb87`2a1eda60 : Ntfs!NtfsFsdWrite+0x1d3
ffff948b`d73fe210 fffff802`651a248a : 00000000`00000000 00000000`00000000 fffff802`00000000 ffffcb87`0a702270 : nt!IofCallDriver+0x55
ffff948b`d73fe250 00000000`00000000 : 00000000`00000000 fffff802`00000000 ffffcb87`0a702270 00000000`00000000 : diskpt+0x1248a

SYMBOL_NAME: diskpt+1248a

MODULE_NAME: diskpt.

IMAGE_NAME: diskpt.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1248a.

FAILURE_BUCKET_ID: AV_R_INVALID_diskpt!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {d6511526-f7fa-922c-5438-36d3b6af2a6d}

Followup: MachineOwner.
---------

Bunları uyguladım zaten. Bellekleri XMP açık kapalı test ettim. Neden veriyor hala anlamadım.
 
O halde yapmanız gereken temiz kurulum ile 20H2 sürümüne geçiş yapmak. Driver Booster gibi 3. parti sürücü yükleme uygulamalarını kullanıp tüm riskleri kabul ediyorsunuz ki hala onun verdiği sürücüleri kullanıyorsunuz. Tek tek sürücü kaldırsanız bile kalıntısı kalabileceğinden lütfen temiz kurulum işlemini gerçekleştirin. Aksi taktirde yardım edecek bir şeyimiz olmaz bilginize.
 
O halde yapmanız gereken temiz kurulum ile 20H2 sürümüne geçiş yapmak. Driver Booster gibi 3. parti sürücü yükleme uygulamalarını kullanıp tüm riskleri kabul ediyorsunuz ki hala onun verdiği sürücüleri kullanıyorsunuz. Tek tek sürücü kaldırsanız bile kalıntısı kalabileceğinden lütfen temiz kurulum işlemini gerçekleştirin. Aksi taktirde yardım edecek bir şeyimiz olmaz bilginize.

Öyle yapacagım fakat tek tek elle nasıl kurabilirim? İsimlerini falan bilmiyorum hepsinin bir de Visual'leri kurmak için AiO runtimes kullanıyorum o zararlı mı?
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı