efarslannn
Hectopat
- Katılım
- 20 Eylül 2020
- Mesajlar
- 30
5: kd> !error 00000000c0000005
Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff801274c690e, Address of the instruction which caused the bugcheck
Arg3: ffffc501262df930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3921
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5204
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff801274c690e
BUGCHECK_P3: ffffc501262df930
BUGCHECK_P4: 0
CONTEXT: ffffc501262df930 -- (.cxr 0xffffc501262df930)
rax=0000000000000000 rbx=00196471ce891370 rcx=0000000000000000
rdx=0000000000000002 rsi=ffffc50126280180 rdi=00196471ce891388
rip=fffff801274c690e rsp=ffffc281e65f07c0 rbp=0000000000000000
r8=000000000004001f r9=000000000000001f r10=0000fffff8012736
r11=ffffb4fb50c00000 r12=0000000000000000 r13=0000000000000000
r14=ffffae8ece891080 r15=ffffae8ece891388
iopl=0 nv up ei pl nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050207
nt!KiRundownMutants+0xe6:
fffff801`274c690e 807b3100 cmp byte ptr [rbx+31h],0 ds:002b:00196471`ce8913a1=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
BAD_STACK_POINTER: ffffc501262deff8
STACK_TEXT:
ffffc281`e65f07c0 fffff801`27a246f3 : ffffae8e`ce891080 ffffae8e`c9b31090 00000000`00000001 00000000`00000000 : nt!KiRundownMutants+0xe6
ffffc281`e65f0960 fffff801`27a22843 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffae8e`ccf107e0 : nt!PspExitThread+0x2db
ffffc281`e65f0a70 fffff801`27a227ca : 00000000`00000000 00000000`00000000 ffffae8e`ce891080 00000000`00000318 : nt!PspTerminateThreadByPointer+0x53
ffffc281`e65f0ab0 fffff801`275d4258 : 00000000`00000000 ffffae8e`ce891080 ffffc281`e65f0b80 ffffae8e`ccf107e0 : nt!NtTerminateThread+0x4a
ffffc281`e65f0b00 00007ffc`2bafcad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008f`248ffac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2bafcad4
SYMBOL_NAME: nt!KiRundownMutants+e6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1082
STACK_COMMAND: .cxr 0xffffc501262df930 ; kb
BUCKET_ID_FUNC_OFFSET: e6
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KiRundownMutants
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {47ef8bd0-66f8-e00c-2f59-1f631a8fdb27}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff97, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8071ca10a12, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3812
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 33648
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffffffffffff97
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8071ca10a12
BUGCHECK_P4: 2
READ_ADDRESS: fffff8071c9713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffff97
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
TRAP_FRAME: fffffb8af45fe5c0 -- (.trap 0xfffffb8af45fe5c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb80a2d510048
rdx=fffffb8af45fe6f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071ca10a12 rsp=fffffb8af45fe750 rbp=0000000000000000
r8=ffffb80a2d42c000 r9=000000000000001c r10=0000000003803020
r11=0000000003803020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmQueryValueKey+0x152:
fffff807`1ca10a12 8b5d97 mov ebx,dword ptr [rbp-69h] ss:0018:ffffffff`ffffff97=????????
Resetting default scope
STACK_TEXT:
fffffb8a`f45fe318 fffff807`1c5ed55a : 00000000`00000050 ffffffff`ffffff97 00000000`00000000 fffffb8a`f45fe5c0 : nt!KeBugCheckEx
fffffb8a`f45fe320 fffff807`1c45889f : 000000ce`2956ee01 00000000`00000000 00000000`00000000 ffffffff`ffffff97 : nt!MiSystemFault+0x1c60fa
fffffb8a`f45fe420 fffff807`1c5d0a5e : 00000000`00000000 00000000`00000000 fffffb8a`f45fe920 00000000`00000000 : nt!MmAccessFault+0x34f
fffffb8a`f45fe5c0 fffff807`1ca10a12 : 00000000`00000000 000001d2`fc8d4024 ffffb80a`3c6a10e0 ffffb80a`00000000 : nt!KiPageFault+0x35e
fffffb8a`f45fe750 fffff807`1ca111be : 00000000`0000025c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x152
fffffb8a`f45fe850 fffff807`1c5d4258 : 00000000`004e18c3 00000000`00000000 00000000`0000002b 00000000`00000003 : nt!NtQueryValueKey+0x4ee
fffffb8a`f45fea90 00007ff8`905fc354 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ce`2956ee98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`905fc354
SYMBOL_NAME: nt!CmQueryValueKey+152
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1082
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 152
FAILURE_BUCKET_ID: AV_R_INVALID_nt!CmQueryValueKey
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8d4c5c01-a14c-b322-d4eb-f6a12193f162}
Followup: MachineOwner
---------
hemen deniyorum bende arkadasımla facetime üzerinden yardımcı olmaya calısıyorum ama düzeltmeye ugrasırken surekli maviekranı yiyoruz en kısa sürede döneceğim size indripİlk olarak, sürüm 1903'ten 2004'e geçin.
Windows 10 Türkçe İndirme ve Kurulum
Windows 10 Sürüm 22H2 resmi Microsoft Türkçe ISO dosyasını buradan indirebilirsiniz. Format atmak yerine dosyalarınızı kaybetmeden sadece son sürüme yükseltmek istiyorsanız Microsoft'un bu aracını indirip çalıştırmanız yeterli. İndirin: Windows 10 Sürüm 22H2 64 Bit Türkçe | Resmi Microsoft ISO...www.technopat.net
Okuma hatası görüyorum.
Kod:5: kd> !error 00000000c0000005 Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
HD Tune ile diskinizde "Quick Scan" kapalı bir şekilde "Error Scan" yapın. "Health" sekmesinin fotoğrafını atarsanız güzel olur.
Ek olarak, MemTest86 ile bellekleri kontrol ederseniz güzel olur.
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff801274c690e, Address of the instruction which caused the bugcheck Arg3: ffffc501262df930, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3921 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 5204 Key : Analysis.Memory.CommitPeak.Mb Value: 73 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: 19h1_release Key : WER.OS.Timestamp Value: 2019-03-18T12:02:00Z Key : WER.OS.Version Value: 10.0.18362.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff801274c690e BUGCHECK_P3: ffffc501262df930 BUGCHECK_P4: 0 CONTEXT: ffffc501262df930 -- (.cxr 0xffffc501262df930) rax=0000000000000000 rbx=00196471ce891370 rcx=0000000000000000 rdx=0000000000000002 rsi=ffffc50126280180 rdi=00196471ce891388 rip=fffff801274c690e rsp=ffffc281e65f07c0 rbp=0000000000000000 r8=000000000004001f r9=000000000000001f r10=0000fffff8012736 r11=ffffb4fb50c00000 r12=0000000000000000 r13=0000000000000000 r14=ffffae8ece891080 r15=ffffae8ece891388 iopl=0 nv up ei pl nz na po cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050207 nt!KiRundownMutants+0xe6: fffff801`274c690e 807b3100 cmp byte ptr [rbx+31h],0 ds:002b:00196471`ce8913a1=?? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe BAD_STACK_POINTER: ffffc501262deff8 STACK_TEXT: ffffc281`e65f07c0 fffff801`27a246f3 : ffffae8e`ce891080 ffffae8e`c9b31090 00000000`00000001 00000000`00000000 : nt!KiRundownMutants+0xe6 ffffc281`e65f0960 fffff801`27a22843 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffae8e`ccf107e0 : nt!PspExitThread+0x2db ffffc281`e65f0a70 fffff801`27a227ca : 00000000`00000000 00000000`00000000 ffffae8e`ce891080 00000000`00000318 : nt!PspTerminateThreadByPointer+0x53 ffffc281`e65f0ab0 fffff801`275d4258 : 00000000`00000000 ffffae8e`ce891080 ffffc281`e65f0b80 ffffae8e`ccf107e0 : nt!NtTerminateThread+0x4a ffffc281`e65f0b00 00007ffc`2bafcad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 0000008f`248ffac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2bafcad4 SYMBOL_NAME: nt!KiRundownMutants+e6 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.18362.1082 STACK_COMMAND: .cxr 0xffffc501262df930 ; kb BUCKET_ID_FUNC_OFFSET: e6 FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KiRundownMutants OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {47ef8bd0-66f8-e00c-2f59-1f631a8fdb27} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffffffffffff97, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff8071ca10a12, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3812 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 33648 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: 19h1_release Key : WER.OS.Timestamp Value: 2019-03-18T12:02:00Z Key : WER.OS.Version Value: 10.0.18362.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: ffffffffffffff97 BUGCHECK_P2: 0 BUGCHECK_P3: fffff8071ca10a12 BUGCHECK_P4: 2 READ_ADDRESS: fffff8071c9713b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffffffffffffff97 MM_INTERNAL_CODE: 2 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Registry TRAP_FRAME: fffffb8af45fe5c0 -- (.trap 0xfffffb8af45fe5c0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffb80a2d510048 rdx=fffffb8af45fe6f8 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8071ca10a12 rsp=fffffb8af45fe750 rbp=0000000000000000 r8=ffffb80a2d42c000 r9=000000000000001c r10=0000000003803020 r11=0000000003803020 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!CmQueryValueKey+0x152: fffff807`1ca10a12 8b5d97 mov ebx,dword ptr [rbp-69h] ss:0018:ffffffff`ffffff97=???????? Resetting default scope STACK_TEXT: fffffb8a`f45fe318 fffff807`1c5ed55a : 00000000`00000050 ffffffff`ffffff97 00000000`00000000 fffffb8a`f45fe5c0 : nt!KeBugCheckEx fffffb8a`f45fe320 fffff807`1c45889f : 000000ce`2956ee01 00000000`00000000 00000000`00000000 ffffffff`ffffff97 : nt!MiSystemFault+0x1c60fa fffffb8a`f45fe420 fffff807`1c5d0a5e : 00000000`00000000 00000000`00000000 fffffb8a`f45fe920 00000000`00000000 : nt!MmAccessFault+0x34f fffffb8a`f45fe5c0 fffff807`1ca10a12 : 00000000`00000000 000001d2`fc8d4024 ffffb80a`3c6a10e0 ffffb80a`00000000 : nt!KiPageFault+0x35e fffffb8a`f45fe750 fffff807`1ca111be : 00000000`0000025c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x152 fffffb8a`f45fe850 fffff807`1c5d4258 : 00000000`004e18c3 00000000`00000000 00000000`0000002b 00000000`00000003 : nt!NtQueryValueKey+0x4ee fffffb8a`f45fea90 00007ff8`905fc354 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000ce`2956ee98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`905fc354 SYMBOL_NAME: nt!CmQueryValueKey+152 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.18362.1082 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 152 FAILURE_BUCKET_ID: AV_R_INVALID_nt!CmQueryValueKey OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {8d4c5c01-a14c-b322-d4eb-f6a12193f162} Followup: MachineOwner ---------
İlk olarak, sürüm 1903'ten 2004'e geçin.
Windows 10 Türkçe İndirme ve Kurulum
Windows 10 Sürüm 22H2 resmi Microsoft Türkçe ISO dosyasını buradan indirebilirsiniz. Format atmak yerine dosyalarınızı kaybetmeden sadece son sürüme yükseltmek istiyorsanız Microsoft'un bu aracını indirip çalıştırmanız yeterli. İndirin: Windows 10 Sürüm 22H2 64 Bit Türkçe | Resmi Microsoft ISO...www.technopat.net
Okuma hatası görüyorum.
Kod:5: kd> !error 00000000c0000005. Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
HD Tune ile diskinizde "quick scan" kapalı bir şekilde "error scan" yapın. "Health" sekmesinin fotoğrafını atarsanız güzel olur.
Ek olarak, Memtest86 ile bellekleri kontrol ederseniz güzel olur.
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff801274c690e, Address of the instruction which caused the bugcheck. Arg3: ffffc501262df930, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 3921. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 5204. Key : Analysis.Memory.CommitPeak.Mb. Value: 73. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: 19h1_release. Key : WER.OS.Timestamp. Value: 2019-03-18T12:02:00Z. Key : WER.OS.Version. Value: 10.0.18362.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff801274c690e. BUGCHECK_P3: ffffc501262df930. BUGCHECK_P4: 0. CONTEXT: ffffc501262df930 -- (.cxr 0xffffc501262df930) rax=0000000000000000 rbx=00196471ce891370 rcx=0000000000000000. rdx=0000000000000002 rsi=ffffc50126280180 rdi=00196471ce891388. rip=fffff801274c690e rsp=ffffc281e65f07c0 rbp=0000000000000000. r8=000000000004001f r9=000000000000001f r10=0000fffff8012736. r11=ffffb4fb50c00000 r12=0000000000000000 r13=0000000000000000. r14=ffffae8ece891080 r15=ffffae8ece891388. iopl=0 nv up ei pl nz na po cy. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050207. nt!KiRundownMutants+0xe6: fffff801`274c690e 807b3100 cmp byte ptr [rbx+31h],0 ds:002b:00196471`ce8913a1=?? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: svchost.exe. BAD_STACK_POINTER: ffffc501262deff8. STACK_TEXT: ffffc281`e65f07c0 fffff801`27a246f3 : ffffae8e`ce891080 ffffae8e`c9b31090 00000000`00000001 00000000`00000000 : nt!KiRundownMutants+0xe6. ffffc281`e65f0960 fffff801`27a22843 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffae8e`ccf107e0 : nt!PspExitThread+0x2db. ffffc281`e65f0a70 fffff801`27a227ca : 00000000`00000000 00000000`00000000 ffffae8e`ce891080 00000000`00000318 : nt!PspTerminateThreadByPointer+0x53. ffffc281`e65f0ab0 fffff801`275d4258 : 00000000`00000000 ffffae8e`ce891080 ffffc281`e65f0b80 ffffae8e`ccf107e0 : nt!NtTerminateThread+0x4a. ffffc281`e65f0b00 00007ffc`2bafcad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 0000008f`248ffac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2bafcad4. SYMBOL_NAME: nt!KiRundownMutants+e6. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. IMAGE_VERSION: 10.0.18362.1082. STACK_COMMAND: .cxr 0xffffc501262df930 ; kb. BUCKET_ID_FUNC_OFFSET: e6. FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KiRundownMutants. OS_VERSION: 10.0.18362.1. BUILDLAB_STR: 19h1_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {47ef8bd0-66f8-e00c-2f59-1f631a8fdb27} Followup: MachineOwner. --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffffffffffff97, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff8071ca10a12, If non-zero, the instruction address which referenced the bad memory. address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name. *** WARNING: Unable to verify timestamp for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 3812. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 33648. Key : Analysis.Memory.CommitPeak.Mb. Value: 74. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: 19h1_release. Key : WER.OS.Timestamp. Value: 2019-03-18T12:02:00Z. Key : WER.OS.Version. Value: 10.0.18362.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 50. BUGCHECK_P1: ffffffffffffff97. BUGCHECK_P2: 0. BUGCHECK_P3: fffff8071ca10a12. BUGCHECK_P4: 2. READ_ADDRESS: fffff8071c9713b8: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock. fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. ffffffffffffff97. MM_INTERNAL_CODE: 2. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: Registry. TRAP_FRAME: fffffb8af45fe5c0 -- (.trap 0xfffffb8af45fe5c0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffb80a2d510048. rdx=fffffb8af45fe6f8 rsi=0000000000000000 rdi=0000000000000000. rip=fffff8071ca10a12 rsp=fffffb8af45fe750 rbp=0000000000000000. r8=ffffb80a2d42c000 r9=000000000000001c r10=0000000003803020. r11=0000000003803020 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei pl zr na po nc. nt!CmQueryValueKey+0x152: fffff807`1ca10a12 8b5d97 mov ebx,dword ptr [rbp-69h] ss:0018:ffffffff`ffffff97=???????? Resetting default scope. STACK_TEXT: fffffb8a`f45fe318 fffff807`1c5ed55a : 00000000`00000050 ffffffff`ffffff97 00000000`00000000 fffffb8a`f45fe5c0 : nt!KeBugCheckEx. fffffb8a`f45fe320 fffff807`1c45889f : 000000ce`2956ee01 00000000`00000000 00000000`00000000 ffffffff`ffffff97 : nt!MiSystemFault+0x1c60fa. fffffb8a`f45fe420 fffff807`1c5d0a5e : 00000000`00000000 00000000`00000000 fffffb8a`f45fe920 00000000`00000000 : nt!MmAccessFault+0x34f. fffffb8a`f45fe5c0 fffff807`1ca10a12 : 00000000`00000000 000001d2`fc8d4024 ffffb80a`3c6a10e0 ffffb80a`00000000 : nt!KiPageFault+0x35e. fffffb8a`f45fe750 fffff807`1ca111be : 00000000`0000025c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x152. fffffb8a`f45fe850 fffff807`1c5d4258 : 00000000`004e18c3 00000000`00000000 00000000`0000002b 00000000`00000003 : nt!NtQueryValueKey+0x4ee. fffffb8a`f45fea90 00007ff8`905fc354 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 000000ce`2956ee98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`905fc354. SYMBOL_NAME: nt!CmQueryValueKey+152. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. IMAGE_VERSION: 10.0.18362.1082. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 152. FAILURE_BUCKET_ID: AV_R_INVALID_nt!CmQueryValueKey. OS_VERSION: 10.0.18362.1. BUILDLAB_STR: 19h1_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {8d4c5c01-a14c-b322-d4eb-f6a12193f162} Followup: MachineOwner. ---------
İlk olarak, sürüm 1903'ten 2004'e geçin.
Windows 10 Türkçe İndirme ve Kurulum
Windows 10 Sürüm 22H2 resmi Microsoft Türkçe ISO dosyasını buradan indirebilirsiniz. Format atmak yerine dosyalarınızı kaybetmeden sadece son sürüme yükseltmek istiyorsanız Microsoft'un bu aracını indirip çalıştırmanız yeterli. İndirin: Windows 10 Sürüm 22H2 64 Bit Türkçe | Resmi Microsoft ISO...www.technopat.net
Okuma hatası görüyorum.
Kod:5: kd> !error 00000000c0000005. Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
HD Tune ile diskinizde "quick scan" kapalı bir şekilde "error scan" yapın. "Health" sekmesinin fotoğrafını atarsanız güzel olur.
Ek olarak, Memtest86 ile bellekleri kontrol ederseniz güzel olur.
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff801274c690e, Address of the instruction which caused the bugcheck. Arg3: ffffc501262df930, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 3921. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 5204. Key : Analysis.Memory.CommitPeak.Mb. Value: 73. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: 19h1_release. Key : WER.OS.Timestamp. Value: 2019-03-18T12:02:00Z. Key : WER.OS.Version. Value: 10.0.18362.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff801274c690e. BUGCHECK_P3: ffffc501262df930. BUGCHECK_P4: 0. CONTEXT: ffffc501262df930 -- (.cxr 0xffffc501262df930) rax=0000000000000000 rbx=00196471ce891370 rcx=0000000000000000. rdx=0000000000000002 rsi=ffffc50126280180 rdi=00196471ce891388. rip=fffff801274c690e rsp=ffffc281e65f07c0 rbp=0000000000000000. r8=000000000004001f r9=000000000000001f r10=0000fffff8012736. r11=ffffb4fb50c00000 r12=0000000000000000 r13=0000000000000000. r14=ffffae8ece891080 r15=ffffae8ece891388. iopl=0 nv up ei pl nz na po cy. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050207. nt!KiRundownMutants+0xe6: fffff801`274c690e 807b3100 cmp byte ptr [rbx+31h],0 ds:002b:00196471`ce8913a1=?? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: svchost.exe. BAD_STACK_POINTER: ffffc501262deff8. STACK_TEXT: ffffc281`e65f07c0 fffff801`27a246f3 : ffffae8e`ce891080 ffffae8e`c9b31090 00000000`00000001 00000000`00000000 : nt!KiRundownMutants+0xe6. ffffc281`e65f0960 fffff801`27a22843 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffae8e`ccf107e0 : nt!PspExitThread+0x2db. ffffc281`e65f0a70 fffff801`27a227ca : 00000000`00000000 00000000`00000000 ffffae8e`ce891080 00000000`00000318 : nt!PspTerminateThreadByPointer+0x53. ffffc281`e65f0ab0 fffff801`275d4258 : 00000000`00000000 ffffae8e`ce891080 ffffc281`e65f0b80 ffffae8e`ccf107e0 : nt!NtTerminateThread+0x4a. ffffc281`e65f0b00 00007ffc`2bafcad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 0000008f`248ffac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2bafcad4. SYMBOL_NAME: nt!KiRundownMutants+e6. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. IMAGE_VERSION: 10.0.18362.1082. STACK_COMMAND: .cxr 0xffffc501262df930 ; kb. BUCKET_ID_FUNC_OFFSET: e6. FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KiRundownMutants. OS_VERSION: 10.0.18362.1. BUILDLAB_STR: 19h1_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {47ef8bd0-66f8-e00c-2f59-1f631a8fdb27} Followup: MachineOwner. --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffffffffffff97, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff8071ca10a12, If non-zero, the instruction address which referenced the bad memory. address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name. *** WARNING: Unable to verify timestamp for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 3812. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 33648. Key : Analysis.Memory.CommitPeak.Mb. Value: 74. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: 19h1_release. Key : WER.OS.Timestamp. Value: 2019-03-18T12:02:00Z. Key : WER.OS.Version. Value: 10.0.18362.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 50. BUGCHECK_P1: ffffffffffffff97. BUGCHECK_P2: 0. BUGCHECK_P3: fffff8071ca10a12. BUGCHECK_P4: 2. READ_ADDRESS: fffff8071c9713b8: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock. fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. ffffffffffffff97. MM_INTERNAL_CODE: 2. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: Registry. TRAP_FRAME: fffffb8af45fe5c0 -- (.trap 0xfffffb8af45fe5c0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffb80a2d510048. rdx=fffffb8af45fe6f8 rsi=0000000000000000 rdi=0000000000000000. rip=fffff8071ca10a12 rsp=fffffb8af45fe750 rbp=0000000000000000. r8=ffffb80a2d42c000 r9=000000000000001c r10=0000000003803020. r11=0000000003803020 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei pl zr na po nc. nt!CmQueryValueKey+0x152: fffff807`1ca10a12 8b5d97 mov ebx,dword ptr [rbp-69h] ss:0018:ffffffff`ffffff97=???????? Resetting default scope. STACK_TEXT: fffffb8a`f45fe318 fffff807`1c5ed55a : 00000000`00000050 ffffffff`ffffff97 00000000`00000000 fffffb8a`f45fe5c0 : nt!KeBugCheckEx. fffffb8a`f45fe320 fffff807`1c45889f : 000000ce`2956ee01 00000000`00000000 00000000`00000000 ffffffff`ffffff97 : nt!MiSystemFault+0x1c60fa. fffffb8a`f45fe420 fffff807`1c5d0a5e : 00000000`00000000 00000000`00000000 fffffb8a`f45fe920 00000000`00000000 : nt!MmAccessFault+0x34f. fffffb8a`f45fe5c0 fffff807`1ca10a12 : 00000000`00000000 000001d2`fc8d4024 ffffb80a`3c6a10e0 ffffb80a`00000000 : nt!KiPageFault+0x35e. fffffb8a`f45fe750 fffff807`1ca111be : 00000000`0000025c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x152. fffffb8a`f45fe850 fffff807`1c5d4258 : 00000000`004e18c3 00000000`00000000 00000000`0000002b 00000000`00000003 : nt!NtQueryValueKey+0x4ee. fffffb8a`f45fea90 00007ff8`905fc354 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 000000ce`2956ee98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`905fc354. SYMBOL_NAME: nt!CmQueryValueKey+152. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. IMAGE_VERSION: 10.0.18362.1082. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 152. FAILURE_BUCKET_ID: AV_R_INVALID_nt!CmQueryValueKey. OS_VERSION: 10.0.18362.1. BUILDLAB_STR: 19h1_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {8d4c5c01-a14c-b322-d4eb-f6a12193f162} Followup: MachineOwner. ---------
Sistem özellikleriniz nedir?
İlk olarak, sürüm 1903'ten 2004'e geçin.
Windows 10 Türkçe İndirme ve Kurulum
Windows 10 Sürüm 22H2 resmi Microsoft Türkçe ISO dosyasını buradan indirebilirsiniz. Format atmak yerine dosyalarınızı kaybetmeden sadece son sürüme yükseltmek istiyorsanız Microsoft'un bu aracını indirip çalıştırmanız yeterli. İndirin: Windows 10 Sürüm 22H2 64 Bit Türkçe | Resmi Microsoft ISO...www.technopat.net
Okuma hatası görüyorum.
Kod:5: kd> !error 00000000c0000005. Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
HD Tune ile diskinizde "quick scan" kapalı bir şekilde "error scan" yapın. "Health" sekmesinin fotoğrafını atarsanız güzel olur.
Ek olarak, Memtest86 ile bellekleri kontrol ederseniz güzel olur.
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff801274c690e, Address of the instruction which caused the bugcheck. Arg3: ffffc501262df930, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 3921. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 5204. Key : Analysis.Memory.CommitPeak.Mb. Value: 73. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: 19h1_release. Key : WER.OS.Timestamp. Value: 2019-03-18T12:02:00Z. Key : WER.OS.Version. Value: 10.0.18362.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff801274c690e. BUGCHECK_P3: ffffc501262df930. BUGCHECK_P4: 0. CONTEXT: ffffc501262df930 -- (.cxr 0xffffc501262df930) rax=0000000000000000 rbx=00196471ce891370 rcx=0000000000000000. rdx=0000000000000002 rsi=ffffc50126280180 rdi=00196471ce891388. rip=fffff801274c690e rsp=ffffc281e65f07c0 rbp=0000000000000000. r8=000000000004001f r9=000000000000001f r10=0000fffff8012736. r11=ffffb4fb50c00000 r12=0000000000000000 r13=0000000000000000. r14=ffffae8ece891080 r15=ffffae8ece891388. iopl=0 nv up ei pl nz na po cy. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050207. nt!KiRundownMutants+0xe6: fffff801`274c690e 807b3100 cmp byte ptr [rbx+31h],0 ds:002b:00196471`ce8913a1=?? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: svchost.exe. BAD_STACK_POINTER: ffffc501262deff8. STACK_TEXT: ffffc281`e65f07c0 fffff801`27a246f3 : ffffae8e`ce891080 ffffae8e`c9b31090 00000000`00000001 00000000`00000000 : nt!KiRundownMutants+0xe6. ffffc281`e65f0960 fffff801`27a22843 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffae8e`ccf107e0 : nt!PspExitThread+0x2db. ffffc281`e65f0a70 fffff801`27a227ca : 00000000`00000000 00000000`00000000 ffffae8e`ce891080 00000000`00000318 : nt!PspTerminateThreadByPointer+0x53. ffffc281`e65f0ab0 fffff801`275d4258 : 00000000`00000000 ffffae8e`ce891080 ffffc281`e65f0b80 ffffae8e`ccf107e0 : nt!NtTerminateThread+0x4a. ffffc281`e65f0b00 00007ffc`2bafcad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 0000008f`248ffac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2bafcad4. SYMBOL_NAME: nt!KiRundownMutants+e6. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. IMAGE_VERSION: 10.0.18362.1082. STACK_COMMAND: .cxr 0xffffc501262df930 ; kb. BUCKET_ID_FUNC_OFFSET: e6. FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KiRundownMutants. OS_VERSION: 10.0.18362.1. BUILDLAB_STR: 19h1_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {47ef8bd0-66f8-e00c-2f59-1f631a8fdb27} Followup: MachineOwner. --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffffffffffff97, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff8071ca10a12, If non-zero, the instruction address which referenced the bad memory. address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name. *** WARNING: Unable to verify timestamp for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 3812. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 33648. Key : Analysis.Memory.CommitPeak.Mb. Value: 74. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: 19h1_release. Key : WER.OS.Timestamp. Value: 2019-03-18T12:02:00Z. Key : WER.OS.Version. Value: 10.0.18362.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 50. BUGCHECK_P1: ffffffffffffff97. BUGCHECK_P2: 0. BUGCHECK_P3: fffff8071ca10a12. BUGCHECK_P4: 2. READ_ADDRESS: fffff8071c9713b8: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock. fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. ffffffffffffff97. MM_INTERNAL_CODE: 2. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: Registry. TRAP_FRAME: fffffb8af45fe5c0 -- (.trap 0xfffffb8af45fe5c0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffb80a2d510048. rdx=fffffb8af45fe6f8 rsi=0000000000000000 rdi=0000000000000000. rip=fffff8071ca10a12 rsp=fffffb8af45fe750 rbp=0000000000000000. r8=ffffb80a2d42c000 r9=000000000000001c r10=0000000003803020. r11=0000000003803020 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei pl zr na po nc. nt!CmQueryValueKey+0x152: fffff807`1ca10a12 8b5d97 mov ebx,dword ptr [rbp-69h] ss:0018:ffffffff`ffffff97=???????? Resetting default scope. STACK_TEXT: fffffb8a`f45fe318 fffff807`1c5ed55a : 00000000`00000050 ffffffff`ffffff97 00000000`00000000 fffffb8a`f45fe5c0 : nt!KeBugCheckEx. fffffb8a`f45fe320 fffff807`1c45889f : 000000ce`2956ee01 00000000`00000000 00000000`00000000 ffffffff`ffffff97 : nt!MiSystemFault+0x1c60fa. fffffb8a`f45fe420 fffff807`1c5d0a5e : 00000000`00000000 00000000`00000000 fffffb8a`f45fe920 00000000`00000000 : nt!MmAccessFault+0x34f. fffffb8a`f45fe5c0 fffff807`1ca10a12 : 00000000`00000000 000001d2`fc8d4024 ffffb80a`3c6a10e0 ffffb80a`00000000 : nt!KiPageFault+0x35e. fffffb8a`f45fe750 fffff807`1ca111be : 00000000`0000025c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x152. fffffb8a`f45fe850 fffff807`1c5d4258 : 00000000`004e18c3 00000000`00000000 00000000`0000002b 00000000`00000003 : nt!NtQueryValueKey+0x4ee. fffffb8a`f45fea90 00007ff8`905fc354 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 000000ce`2956ee98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`905fc354. SYMBOL_NAME: nt!CmQueryValueKey+152. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. IMAGE_VERSION: 10.0.18362.1082. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 152. FAILURE_BUCKET_ID: AV_R_INVALID_nt!CmQueryValueKey. OS_VERSION: 10.0.18362.1. BUILDLAB_STR: 19h1_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {8d4c5c01-a14c-b322-d4eb-f6a12193f162} Followup: MachineOwner. ---------
Sistem özellikleriniz nedir?
Adata SU630 240GB 520/450 MB/s 2.5'' SATA SSD@efarslannn yeni görmeniz normal, çünkü mesajımı sonradan düzenledim.
SSD ve HDD'nizin tam modelleri nedir?
SU630 SSD kronik sorunlu. Ben sorunun bundan kaynaklı olduğunu düşünüyorum ama yine de "Error Scan" sonuçlarını beklememiz iyi olacaktır.Adata SU630 240GB 520/450 MB/s 2.5'' SATA SSD
ben de aynı modeli kullanıyorum fakat ben hiç böyle bir şey yaşamadım arkadaşımda ikinci günden başlaması cok değisik ayrıca ilk gün hicbir sorun cıkmamıstı aksam kapatırken windows güncellemesi yapıldıktan sonra başladı sonrasında ben de bunu düşünüp sildim zaten sizde gördünüz win10 güncellemesi gerektiğiniBildiğim kadarı ile Adata bu modeli sorunlu.
error scanden hiçbir sorun çıkmadı an itibariyle şimdi crystaldiskmark yapacağımSU630 SSD kronik sorunlu. Ben sorunun bundan kaynaklı olduğunu düşünüyorum ama yine de "Error Scan" sonuçlarını beklememiz iyi olacaktır.
Error Scan bittikten sonra CrystalDiskMark ile SSD'nize test yapabilir misiniz?
tam ben bunu yazarken bu seferde Kernel Security Check Failure hatası verdi indirme esnasındaben de aynı modeli kullanıyorum fakat ben hiç böyle bir şey yaşamadım arkadaşımda ikinci günden başlaması cok değisik ayrıca ilk gün hicbir sorun cıkmamıstı aksam kapatırken windows güncellemesi yapıldıktan sonra başladı sonrasında ben de bunu düşünüp sildim zaten sizde gördünüz win10 güncellemesi gerektiğini
error scanden hiçbir sorun çıkmadı an itibariyle şimdi crystaldiskmark yapacağım