Üst üste mavi ekran hataları

efarslannn

Centipat
Katılım
20 Eylül 2020
Mesajlar
30
Arkadaşımın bilgisayarında dün hiçbir sorun yokken bugün üst üste mavi ekran hataları vermeye başladı ve hemen hemen her seferinde farklı hata kodlarıyla verdi. Minidumpı buraya atmak için sıkıştıracak kadar bile durmuyor bilgisayar halledemiyoruz kapanıyor. DDU ile ekran kartı driverını sildik yükledik çözülmedi daha sonrasında kişisel dosyaları tut diyerek formatladık yine düzelmedi fakat 5 dakika önceden itibaren artık mavi ekran vermeden baştan başlatmaya başladı, anlayan kisiler yardımcı olabilir mi?
 
İlk olarak, sürüm 1903'ten 2004'e geçin.

Okuma hatası görüyorum.
Kod:
5: kd> !error 00000000c0000005
Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

HD Tune ile diskinizde "Quick Scan" kapalı bir şekilde "Error Scan" yapın. "Health" sekmesinin fotoğrafını atarsanız güzel olur.

Ek olarak, MemTest86 ile bellekleri kontrol ederseniz güzel olur.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff801274c690e, Address of the instruction which caused the bugcheck
Arg3: ffffc501262df930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3921

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5204

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff801274c690e

BUGCHECK_P3: ffffc501262df930

BUGCHECK_P4: 0

CONTEXT:  ffffc501262df930 -- (.cxr 0xffffc501262df930)
rax=0000000000000000 rbx=00196471ce891370 rcx=0000000000000000
rdx=0000000000000002 rsi=ffffc50126280180 rdi=00196471ce891388
rip=fffff801274c690e rsp=ffffc281e65f07c0 rbp=0000000000000000
r8=000000000004001f  r9=000000000000001f r10=0000fffff8012736
r11=ffffb4fb50c00000 r12=0000000000000000 r13=0000000000000000
r14=ffffae8ece891080 r15=ffffae8ece891388
iopl=0         nv up ei pl nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050207
nt!KiRundownMutants+0xe6:
fffff801`274c690e 807b3100        cmp     byte ptr [rbx+31h],0 ds:002b:00196471`ce8913a1=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

BAD_STACK_POINTER:  ffffc501262deff8

STACK_TEXT:
ffffc281`e65f07c0 fffff801`27a246f3     : ffffae8e`ce891080 ffffae8e`c9b31090 00000000`00000001 00000000`00000000 : nt!KiRundownMutants+0xe6
ffffc281`e65f0960 fffff801`27a22843     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffae8e`ccf107e0 : nt!PspExitThread+0x2db
ffffc281`e65f0a70 fffff801`27a227ca     : 00000000`00000000 00000000`00000000 ffffae8e`ce891080 00000000`00000318 : nt!PspTerminateThreadByPointer+0x53
ffffc281`e65f0ab0 fffff801`275d4258     : 00000000`00000000 ffffae8e`ce891080 ffffc281`e65f0b80 ffffae8e`ccf107e0 : nt!NtTerminateThread+0x4a
ffffc281`e65f0b00 00007ffc`2bafcad4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008f`248ffac8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2bafcad4


SYMBOL_NAME:  nt!KiRundownMutants+e6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1082

STACK_COMMAND:  .cxr 0xffffc501262df930 ; kb

BUCKET_ID_FUNC_OFFSET:  e6

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!KiRundownMutants

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {47ef8bd0-66f8-e00c-2f59-1f631a8fdb27}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff97, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8071ca10a12, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3812

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 33648

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffffffff97

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8071ca10a12

BUGCHECK_P4: 2

READ_ADDRESS: fffff8071c9713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffff97

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

TRAP_FRAME:  fffffb8af45fe5c0 -- (.trap 0xfffffb8af45fe5c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb80a2d510048
rdx=fffffb8af45fe6f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071ca10a12 rsp=fffffb8af45fe750 rbp=0000000000000000
r8=ffffb80a2d42c000  r9=000000000000001c r10=0000000003803020
r11=0000000003803020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!CmQueryValueKey+0x152:
fffff807`1ca10a12 8b5d97          mov     ebx,dword ptr [rbp-69h] ss:0018:ffffffff`ffffff97=????????
Resetting default scope

STACK_TEXT:
fffffb8a`f45fe318 fffff807`1c5ed55a     : 00000000`00000050 ffffffff`ffffff97 00000000`00000000 fffffb8a`f45fe5c0 : nt!KeBugCheckEx
fffffb8a`f45fe320 fffff807`1c45889f     : 000000ce`2956ee01 00000000`00000000 00000000`00000000 ffffffff`ffffff97 : nt!MiSystemFault+0x1c60fa
fffffb8a`f45fe420 fffff807`1c5d0a5e     : 00000000`00000000 00000000`00000000 fffffb8a`f45fe920 00000000`00000000 : nt!MmAccessFault+0x34f
fffffb8a`f45fe5c0 fffff807`1ca10a12     : 00000000`00000000 000001d2`fc8d4024 ffffb80a`3c6a10e0 ffffb80a`00000000 : nt!KiPageFault+0x35e
fffffb8a`f45fe750 fffff807`1ca111be     : 00000000`0000025c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x152
fffffb8a`f45fe850 fffff807`1c5d4258     : 00000000`004e18c3 00000000`00000000 00000000`0000002b 00000000`00000003 : nt!NtQueryValueKey+0x4ee
fffffb8a`f45fea90 00007ff8`905fc354     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ce`2956ee98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`905fc354


SYMBOL_NAME:  nt!CmQueryValueKey+152

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1082

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  152

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!CmQueryValueKey

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8d4c5c01-a14c-b322-d4eb-f6a12193f162}

Followup:     MachineOwner
---------

Sistem özellikleriniz nedir?
 
İlk olarak, sürüm 1903'ten 2004'e geçin.

Okuma hatası görüyorum.
Kod:
5: kd> !error 00000000c0000005
Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

HD Tune ile diskinizde "Quick Scan" kapalı bir şekilde "Error Scan" yapın. "Health" sekmesinin fotoğrafını atarsanız güzel olur.

Ek olarak, MemTest86 ile bellekleri kontrol ederseniz güzel olur.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff801274c690e, Address of the instruction which caused the bugcheck
Arg3: ffffc501262df930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3921

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5204

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff801274c690e

BUGCHECK_P3: ffffc501262df930

BUGCHECK_P4: 0

CONTEXT:  ffffc501262df930 -- (.cxr 0xffffc501262df930)
rax=0000000000000000 rbx=00196471ce891370 rcx=0000000000000000
rdx=0000000000000002 rsi=ffffc50126280180 rdi=00196471ce891388
rip=fffff801274c690e rsp=ffffc281e65f07c0 rbp=0000000000000000
r8=000000000004001f  r9=000000000000001f r10=0000fffff8012736
r11=ffffb4fb50c00000 r12=0000000000000000 r13=0000000000000000
r14=ffffae8ece891080 r15=ffffae8ece891388
iopl=0         nv up ei pl nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050207
nt!KiRundownMutants+0xe6:
fffff801`274c690e 807b3100        cmp     byte ptr [rbx+31h],0 ds:002b:00196471`ce8913a1=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

BAD_STACK_POINTER:  ffffc501262deff8

STACK_TEXT:
ffffc281`e65f07c0 fffff801`27a246f3     : ffffae8e`ce891080 ffffae8e`c9b31090 00000000`00000001 00000000`00000000 : nt!KiRundownMutants+0xe6
ffffc281`e65f0960 fffff801`27a22843     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffae8e`ccf107e0 : nt!PspExitThread+0x2db
ffffc281`e65f0a70 fffff801`27a227ca     : 00000000`00000000 00000000`00000000 ffffae8e`ce891080 00000000`00000318 : nt!PspTerminateThreadByPointer+0x53
ffffc281`e65f0ab0 fffff801`275d4258     : 00000000`00000000 ffffae8e`ce891080 ffffc281`e65f0b80 ffffae8e`ccf107e0 : nt!NtTerminateThread+0x4a
ffffc281`e65f0b00 00007ffc`2bafcad4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008f`248ffac8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2bafcad4


SYMBOL_NAME:  nt!KiRundownMutants+e6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1082

STACK_COMMAND:  .cxr 0xffffc501262df930 ; kb

BUCKET_ID_FUNC_OFFSET:  e6

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!KiRundownMutants

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {47ef8bd0-66f8-e00c-2f59-1f631a8fdb27}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff97, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8071ca10a12, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3812

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 33648

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffffffff97

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8071ca10a12

BUGCHECK_P4: 2

READ_ADDRESS: fffff8071c9713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffff97

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

TRAP_FRAME:  fffffb8af45fe5c0 -- (.trap 0xfffffb8af45fe5c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb80a2d510048
rdx=fffffb8af45fe6f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071ca10a12 rsp=fffffb8af45fe750 rbp=0000000000000000
r8=ffffb80a2d42c000  r9=000000000000001c r10=0000000003803020
r11=0000000003803020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!CmQueryValueKey+0x152:
fffff807`1ca10a12 8b5d97          mov     ebx,dword ptr [rbp-69h] ss:0018:ffffffff`ffffff97=????????
Resetting default scope

STACK_TEXT:
fffffb8a`f45fe318 fffff807`1c5ed55a     : 00000000`00000050 ffffffff`ffffff97 00000000`00000000 fffffb8a`f45fe5c0 : nt!KeBugCheckEx
fffffb8a`f45fe320 fffff807`1c45889f     : 000000ce`2956ee01 00000000`00000000 00000000`00000000 ffffffff`ffffff97 : nt!MiSystemFault+0x1c60fa
fffffb8a`f45fe420 fffff807`1c5d0a5e     : 00000000`00000000 00000000`00000000 fffffb8a`f45fe920 00000000`00000000 : nt!MmAccessFault+0x34f
fffffb8a`f45fe5c0 fffff807`1ca10a12     : 00000000`00000000 000001d2`fc8d4024 ffffb80a`3c6a10e0 ffffb80a`00000000 : nt!KiPageFault+0x35e
fffffb8a`f45fe750 fffff807`1ca111be     : 00000000`0000025c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x152
fffffb8a`f45fe850 fffff807`1c5d4258     : 00000000`004e18c3 00000000`00000000 00000000`0000002b 00000000`00000003 : nt!NtQueryValueKey+0x4ee
fffffb8a`f45fea90 00007ff8`905fc354     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ce`2956ee98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`905fc354


SYMBOL_NAME:  nt!CmQueryValueKey+152

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1082

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  152

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!CmQueryValueKey

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8d4c5c01-a14c-b322-d4eb-f6a12193f162}

Followup:     MachineOwner
---------
hemen deniyorum bende arkadasımla facetime üzerinden yardımcı olmaya calısıyorum ama düzeltmeye ugrasırken surekli maviekranı yiyoruz en kısa sürede döneceğim size indrip
 
İlk olarak, sürüm 1903'ten 2004'e geçin.

Okuma hatası görüyorum.
Kod:
5: kd> !error 00000000c0000005.
Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

HD Tune ile diskinizde "quick scan" kapalı bir şekilde "error scan" yapın. "Health" sekmesinin fotoğrafını atarsanız güzel olur.

Ek olarak, Memtest86 ile bellekleri kontrol ederseniz güzel olur.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff801274c690e, Address of the instruction which caused the bugcheck.
Arg3: ffffc501262df930, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3921.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 5204.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 73.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: 19h1_release.

Key : WER.OS.Timestamp.
Value: 2019-03-18T12:02:00Z.

Key : WER.OS.Version.
Value: 10.0.18362.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff801274c690e.

BUGCHECK_P3: ffffc501262df930.

BUGCHECK_P4: 0.

CONTEXT: ffffc501262df930 -- (.cxr 0xffffc501262df930)
rax=0000000000000000 rbx=00196471ce891370 rcx=0000000000000000.
rdx=0000000000000002 rsi=ffffc50126280180 rdi=00196471ce891388.
rip=fffff801274c690e rsp=ffffc281e65f07c0 rbp=0000000000000000.
r8=000000000004001f r9=000000000000001f r10=0000fffff8012736.
r11=ffffb4fb50c00000 r12=0000000000000000 r13=0000000000000000.
r14=ffffae8ece891080 r15=ffffae8ece891388.
iopl=0 nv up ei pl nz na po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050207.
nt!KiRundownMutants+0xe6:
fffff801`274c690e 807b3100 cmp byte ptr [rbx+31h],0 ds:002b:00196471`ce8913a1=??
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: svchost.exe.

BAD_STACK_POINTER: ffffc501262deff8.

STACK_TEXT:
ffffc281`e65f07c0 fffff801`27a246f3 : ffffae8e`ce891080 ffffae8e`c9b31090 00000000`00000001 00000000`00000000 : nt!KiRundownMutants+0xe6.
ffffc281`e65f0960 fffff801`27a22843 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffae8e`ccf107e0 : nt!PspExitThread+0x2db.
ffffc281`e65f0a70 fffff801`27a227ca : 00000000`00000000 00000000`00000000 ffffae8e`ce891080 00000000`00000318 : nt!PspTerminateThreadByPointer+0x53.
ffffc281`e65f0ab0 fffff801`275d4258 : 00000000`00000000 ffffae8e`ce891080 ffffc281`e65f0b80 ffffae8e`ccf107e0 : nt!NtTerminateThread+0x4a.
ffffc281`e65f0b00 00007ffc`2bafcad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
0000008f`248ffac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2bafcad4.

SYMBOL_NAME: nt!KiRundownMutants+e6.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.18362.1082.

STACK_COMMAND: .cxr 0xffffc501262df930 ; kb.

BUCKET_ID_FUNC_OFFSET: e6.

FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KiRundownMutants.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {47ef8bd0-66f8-e00c-2f59-1f631a8fdb27}

Followup: MachineOwner.
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff97, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8071ca10a12, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name.
*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3812.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 33648.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 74.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: 19h1_release.

Key : WER.OS.Timestamp.
Value: 2019-03-18T12:02:00Z.

Key : WER.OS.Version.
Value: 10.0.18362.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 50.

BUGCHECK_P1: ffffffffffffff97.

BUGCHECK_P2: 0.

BUGCHECK_P3: fffff8071ca10a12.

BUGCHECK_P4: 2.

READ_ADDRESS: fffff8071c9713b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock.
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffffffffffffff97.

MM_INTERNAL_CODE: 2.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: Registry.

TRAP_FRAME: fffffb8af45fe5c0 -- (.trap 0xfffffb8af45fe5c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb80a2d510048.
rdx=fffffb8af45fe6f8 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8071ca10a12 rsp=fffffb8af45fe750 rbp=0000000000000000.
r8=ffffb80a2d42c000 r9=000000000000001c r10=0000000003803020.
r11=0000000003803020 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!CmQueryValueKey+0x152:
fffff807`1ca10a12 8b5d97 mov ebx,dword ptr [rbp-69h] ss:0018:ffffffff`ffffff97=????????
Resetting default scope.

STACK_TEXT:
fffffb8a`f45fe318 fffff807`1c5ed55a : 00000000`00000050 ffffffff`ffffff97 00000000`00000000 fffffb8a`f45fe5c0 : nt!KeBugCheckEx.
fffffb8a`f45fe320 fffff807`1c45889f : 000000ce`2956ee01 00000000`00000000 00000000`00000000 ffffffff`ffffff97 : nt!MiSystemFault+0x1c60fa.
fffffb8a`f45fe420 fffff807`1c5d0a5e : 00000000`00000000 00000000`00000000 fffffb8a`f45fe920 00000000`00000000 : nt!MmAccessFault+0x34f.
fffffb8a`f45fe5c0 fffff807`1ca10a12 : 00000000`00000000 000001d2`fc8d4024 ffffb80a`3c6a10e0 ffffb80a`00000000 : nt!KiPageFault+0x35e.
fffffb8a`f45fe750 fffff807`1ca111be : 00000000`0000025c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x152.
fffffb8a`f45fe850 fffff807`1c5d4258 : 00000000`004e18c3 00000000`00000000 00000000`0000002b 00000000`00000003 : nt!NtQueryValueKey+0x4ee.
fffffb8a`f45fea90 00007ff8`905fc354 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
000000ce`2956ee98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`905fc354.

SYMBOL_NAME: nt!CmQueryValueKey+152.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.18362.1082.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 152.

FAILURE_BUCKET_ID: AV_R_INVALID_nt!CmQueryValueKey.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {8d4c5c01-a14c-b322-d4eb-f6a12193f162}

Followup: MachineOwner.
---------

Bu kadar güzel anlatılamazdı kral helal olsun tebrik ederim :D.
 
İlk olarak, sürüm 1903'ten 2004'e geçin.

Okuma hatası görüyorum.
Kod:
5: kd> !error 00000000c0000005.
Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

HD Tune ile diskinizde "quick scan" kapalı bir şekilde "error scan" yapın. "Health" sekmesinin fotoğrafını atarsanız güzel olur.

Ek olarak, Memtest86 ile bellekleri kontrol ederseniz güzel olur.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff801274c690e, Address of the instruction which caused the bugcheck.
Arg3: ffffc501262df930, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3921.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 5204.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 73.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: 19h1_release.

Key : WER.OS.Timestamp.
Value: 2019-03-18T12:02:00Z.

Key : WER.OS.Version.
Value: 10.0.18362.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff801274c690e.

BUGCHECK_P3: ffffc501262df930.

BUGCHECK_P4: 0.

CONTEXT: ffffc501262df930 -- (.cxr 0xffffc501262df930)
rax=0000000000000000 rbx=00196471ce891370 rcx=0000000000000000.
rdx=0000000000000002 rsi=ffffc50126280180 rdi=00196471ce891388.
rip=fffff801274c690e rsp=ffffc281e65f07c0 rbp=0000000000000000.
r8=000000000004001f r9=000000000000001f r10=0000fffff8012736.
r11=ffffb4fb50c00000 r12=0000000000000000 r13=0000000000000000.
r14=ffffae8ece891080 r15=ffffae8ece891388.
iopl=0 nv up ei pl nz na po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050207.
nt!KiRundownMutants+0xe6:
fffff801`274c690e 807b3100 cmp byte ptr [rbx+31h],0 ds:002b:00196471`ce8913a1=??
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: svchost.exe.

BAD_STACK_POINTER: ffffc501262deff8.

STACK_TEXT:
ffffc281`e65f07c0 fffff801`27a246f3 : ffffae8e`ce891080 ffffae8e`c9b31090 00000000`00000001 00000000`00000000 : nt!KiRundownMutants+0xe6.
ffffc281`e65f0960 fffff801`27a22843 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffae8e`ccf107e0 : nt!PspExitThread+0x2db.
ffffc281`e65f0a70 fffff801`27a227ca : 00000000`00000000 00000000`00000000 ffffae8e`ce891080 00000000`00000318 : nt!PspTerminateThreadByPointer+0x53.
ffffc281`e65f0ab0 fffff801`275d4258 : 00000000`00000000 ffffae8e`ce891080 ffffc281`e65f0b80 ffffae8e`ccf107e0 : nt!NtTerminateThread+0x4a.
ffffc281`e65f0b00 00007ffc`2bafcad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
0000008f`248ffac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2bafcad4.

SYMBOL_NAME: nt!KiRundownMutants+e6.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.18362.1082.

STACK_COMMAND: .cxr 0xffffc501262df930 ; kb.

BUCKET_ID_FUNC_OFFSET: e6.

FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KiRundownMutants.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {47ef8bd0-66f8-e00c-2f59-1f631a8fdb27}

Followup: MachineOwner.
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff97, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8071ca10a12, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name.
*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3812.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 33648.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 74.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: 19h1_release.

Key : WER.OS.Timestamp.
Value: 2019-03-18T12:02:00Z.

Key : WER.OS.Version.
Value: 10.0.18362.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 50.

BUGCHECK_P1: ffffffffffffff97.

BUGCHECK_P2: 0.

BUGCHECK_P3: fffff8071ca10a12.

BUGCHECK_P4: 2.

READ_ADDRESS: fffff8071c9713b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock.
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffffffffffffff97.

MM_INTERNAL_CODE: 2.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: Registry.

TRAP_FRAME: fffffb8af45fe5c0 -- (.trap 0xfffffb8af45fe5c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb80a2d510048.
rdx=fffffb8af45fe6f8 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8071ca10a12 rsp=fffffb8af45fe750 rbp=0000000000000000.
r8=ffffb80a2d42c000 r9=000000000000001c r10=0000000003803020.
r11=0000000003803020 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!CmQueryValueKey+0x152:
fffff807`1ca10a12 8b5d97 mov ebx,dword ptr [rbp-69h] ss:0018:ffffffff`ffffff97=????????
Resetting default scope.

STACK_TEXT:
fffffb8a`f45fe318 fffff807`1c5ed55a : 00000000`00000050 ffffffff`ffffff97 00000000`00000000 fffffb8a`f45fe5c0 : nt!KeBugCheckEx.
fffffb8a`f45fe320 fffff807`1c45889f : 000000ce`2956ee01 00000000`00000000 00000000`00000000 ffffffff`ffffff97 : nt!MiSystemFault+0x1c60fa.
fffffb8a`f45fe420 fffff807`1c5d0a5e : 00000000`00000000 00000000`00000000 fffffb8a`f45fe920 00000000`00000000 : nt!MmAccessFault+0x34f.
fffffb8a`f45fe5c0 fffff807`1ca10a12 : 00000000`00000000 000001d2`fc8d4024 ffffb80a`3c6a10e0 ffffb80a`00000000 : nt!KiPageFault+0x35e.
fffffb8a`f45fe750 fffff807`1ca111be : 00000000`0000025c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x152.
fffffb8a`f45fe850 fffff807`1c5d4258 : 00000000`004e18c3 00000000`00000000 00000000`0000002b 00000000`00000003 : nt!NtQueryValueKey+0x4ee.
fffffb8a`f45fea90 00007ff8`905fc354 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
000000ce`2956ee98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`905fc354.

SYMBOL_NAME: nt!CmQueryValueKey+152.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.18362.1082.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 152.

FAILURE_BUCKET_ID: AV_R_INVALID_nt!CmQueryValueKey.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {8d4c5c01-a14c-b322-d4eb-f6a12193f162}

Followup: MachineOwner.
---------

Sistem özellikleriniz nedir?

Sistem özellikleriniz nediri yeni gördüm. İşlemci Ryzen5 3500X GTX1660 Super 16 GB RAM 1TB HDD ve 240GB Windows'un kurulu oldugu SSD var.

İlk olarak, sürüm 1903'ten 2004'e geçin.

Okuma hatası görüyorum.
Kod:
5: kd> !error 00000000c0000005.
Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

HD Tune ile diskinizde "quick scan" kapalı bir şekilde "error scan" yapın. "Health" sekmesinin fotoğrafını atarsanız güzel olur.

Ek olarak, Memtest86 ile bellekleri kontrol ederseniz güzel olur.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff801274c690e, Address of the instruction which caused the bugcheck.
Arg3: ffffc501262df930, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3921.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 5204.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 73.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: 19h1_release.

Key : WER.OS.Timestamp.
Value: 2019-03-18T12:02:00Z.

Key : WER.OS.Version.
Value: 10.0.18362.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff801274c690e.

BUGCHECK_P3: ffffc501262df930.

BUGCHECK_P4: 0.

CONTEXT: ffffc501262df930 -- (.cxr 0xffffc501262df930)
rax=0000000000000000 rbx=00196471ce891370 rcx=0000000000000000.
rdx=0000000000000002 rsi=ffffc50126280180 rdi=00196471ce891388.
rip=fffff801274c690e rsp=ffffc281e65f07c0 rbp=0000000000000000.
r8=000000000004001f r9=000000000000001f r10=0000fffff8012736.
r11=ffffb4fb50c00000 r12=0000000000000000 r13=0000000000000000.
r14=ffffae8ece891080 r15=ffffae8ece891388.
iopl=0 nv up ei pl nz na po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050207.
nt!KiRundownMutants+0xe6:
fffff801`274c690e 807b3100 cmp byte ptr [rbx+31h],0 ds:002b:00196471`ce8913a1=??
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: svchost.exe.

BAD_STACK_POINTER: ffffc501262deff8.

STACK_TEXT:
ffffc281`e65f07c0 fffff801`27a246f3 : ffffae8e`ce891080 ffffae8e`c9b31090 00000000`00000001 00000000`00000000 : nt!KiRundownMutants+0xe6.
ffffc281`e65f0960 fffff801`27a22843 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffae8e`ccf107e0 : nt!PspExitThread+0x2db.
ffffc281`e65f0a70 fffff801`27a227ca : 00000000`00000000 00000000`00000000 ffffae8e`ce891080 00000000`00000318 : nt!PspTerminateThreadByPointer+0x53.
ffffc281`e65f0ab0 fffff801`275d4258 : 00000000`00000000 ffffae8e`ce891080 ffffc281`e65f0b80 ffffae8e`ccf107e0 : nt!NtTerminateThread+0x4a.
ffffc281`e65f0b00 00007ffc`2bafcad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
0000008f`248ffac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2bafcad4.

SYMBOL_NAME: nt!KiRundownMutants+e6.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.18362.1082.

STACK_COMMAND: .cxr 0xffffc501262df930 ; kb.

BUCKET_ID_FUNC_OFFSET: e6.

FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KiRundownMutants.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {47ef8bd0-66f8-e00c-2f59-1f631a8fdb27}

Followup: MachineOwner.
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff97, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8071ca10a12, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name.
*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3812.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 33648.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 74.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: 19h1_release.

Key : WER.OS.Timestamp.
Value: 2019-03-18T12:02:00Z.

Key : WER.OS.Version.
Value: 10.0.18362.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 50.

BUGCHECK_P1: ffffffffffffff97.

BUGCHECK_P2: 0.

BUGCHECK_P3: fffff8071ca10a12.

BUGCHECK_P4: 2.

READ_ADDRESS: fffff8071c9713b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock.
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffffffffffffff97.

MM_INTERNAL_CODE: 2.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: Registry.

TRAP_FRAME: fffffb8af45fe5c0 -- (.trap 0xfffffb8af45fe5c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb80a2d510048.
rdx=fffffb8af45fe6f8 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8071ca10a12 rsp=fffffb8af45fe750 rbp=0000000000000000.
r8=ffffb80a2d42c000 r9=000000000000001c r10=0000000003803020.
r11=0000000003803020 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!CmQueryValueKey+0x152:
fffff807`1ca10a12 8b5d97 mov ebx,dword ptr [rbp-69h] ss:0018:ffffffff`ffffff97=????????
Resetting default scope.

STACK_TEXT:
fffffb8a`f45fe318 fffff807`1c5ed55a : 00000000`00000050 ffffffff`ffffff97 00000000`00000000 fffffb8a`f45fe5c0 : nt!KeBugCheckEx.
fffffb8a`f45fe320 fffff807`1c45889f : 000000ce`2956ee01 00000000`00000000 00000000`00000000 ffffffff`ffffff97 : nt!MiSystemFault+0x1c60fa.
fffffb8a`f45fe420 fffff807`1c5d0a5e : 00000000`00000000 00000000`00000000 fffffb8a`f45fe920 00000000`00000000 : nt!MmAccessFault+0x34f.
fffffb8a`f45fe5c0 fffff807`1ca10a12 : 00000000`00000000 000001d2`fc8d4024 ffffb80a`3c6a10e0 ffffb80a`00000000 : nt!KiPageFault+0x35e.
fffffb8a`f45fe750 fffff807`1ca111be : 00000000`0000025c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x152.
fffffb8a`f45fe850 fffff807`1c5d4258 : 00000000`004e18c3 00000000`00000000 00000000`0000002b 00000000`00000003 : nt!NtQueryValueKey+0x4ee.
fffffb8a`f45fea90 00007ff8`905fc354 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
000000ce`2956ee98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`905fc354.

SYMBOL_NAME: nt!CmQueryValueKey+152.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.18362.1082.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 152.

FAILURE_BUCKET_ID: AV_R_INVALID_nt!CmQueryValueKey.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {8d4c5c01-a14c-b322-d4eb-f6a12193f162}

Followup: MachineOwner.
---------

Sistem özellikleriniz nedir?

Buyurun health sekmesi arkada da error scan yapılıyor.
 

Dosya Ekleri

  • WhatsApp Image 2020-09-26 at 22.10.27.jpeg
    WhatsApp Image 2020-09-26 at 22.10.27.jpeg
    116,4 KB · Görüntüleme: 26
Son düzenleyen: Moderatör:
Bildiğim kadarı ile Adata bu modeli sorunlu.
ben de aynı modeli kullanıyorum fakat ben hiç böyle bir şey yaşamadım arkadaşımda ikinci günden başlaması cok değisik ayrıca ilk gün hicbir sorun cıkmamıstı aksam kapatırken windows güncellemesi yapıldıktan sonra başladı sonrasında ben de bunu düşünüp sildim zaten sizde gördünüz win10 güncellemesi gerektiğini
SU630 SSD kronik sorunlu. Ben sorunun bundan kaynaklı olduğunu düşünüyorum ama yine de "Error Scan" sonuçlarını beklememiz iyi olacaktır.

Error Scan bittikten sonra CrystalDiskMark ile SSD'nize test yapabilir misiniz?
error scanden hiçbir sorun çıkmadı an itibariyle şimdi crystaldiskmark yapacağım
ben de aynı modeli kullanıyorum fakat ben hiç böyle bir şey yaşamadım arkadaşımda ikinci günden başlaması cok değisik ayrıca ilk gün hicbir sorun cıkmamıstı aksam kapatırken windows güncellemesi yapıldıktan sonra başladı sonrasında ben de bunu düşünüp sildim zaten sizde gördünüz win10 güncellemesi gerektiğini

error scanden hiçbir sorun çıkmadı an itibariyle şimdi crystaldiskmark yapacağım
tam ben bunu yazarken bu seferde Kernel Security Check Failure hatası verdi indirme esnasında
 

Yeni konular

Geri
Yukarı