Windows 10 mavi ekran hatası

Belleklere test yapın.

Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

BIOS versiyonunuz 324 olarak görünüyor ama cihazınızın sitesinde böyle bir BIOS yok. Sonradan kaldırılmış bir BIOS kullanıyorsunuz sanırım, buradan 320'yi kurun. Ayrıca aşağıdaki linkteki ürünün sizinkiyle aynı olduğuna emin olun.

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000dddd99b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8005af48771, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7374

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9970

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: dddd99b8

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8005af48771

WRITE_ADDRESS: fffff80052cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80052c0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80052c0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 00000000dddd99b8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

DPC_STACK_BASE:  FFFFF68941E4CFB0

TRAP_FRAME:  fffff689426eb6b0 -- (.trap 0xfffff689426eb6b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9982bdf7a060 rbx=0000000000000000 rcx=0000000000000294
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffffb7553e9b1b4f rbp=0000000000000000
 r8=fffff689426eb750  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
00000000`00000000 ??              ???
Resetting default scope

BAD_STACK_POINTER:  ffffb7553e9b1b4f

IP_IN_FREE_BLOCK: 0

UNALIGNED_STACK_POINTER:  ffffb7553e9b1b4f

STACK_TEXT: 
fffff689`41e4c4f8 fffff800`52406569     : 00000000`0000000a 00000000`dddd99b8 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff689`41e4c500 fffff800`52402869     : fffff800`523f0690 fffff800`5227460a 00000000`00000000 00000000`00000014 : nt!KiBugCheckDispatch+0x69
fffff689`41e4c640 fffff800`5af48771     : 00000000`00000001 00000000`00000000 ffffffff`ffffffd2 00000000`000000c0 : nt!KiPageFault+0x469
fffff689`41e4c7d0 fffff800`5af48562     : ffffdb0c`f6cb3458 ffffb000`47dfd100 ffffdb0c`f67f8378 00000000`00000001 : usbehci!EHCI_sMode_AbortSlot+0x6d
fffff689`41e4c820 fffff800`5af4b985     : ffffdb0c`f82e09a4 ffffdb0c`f82e053c ffffdb0c`f67f71a0 fffff689`41e4c9a8 : usbehci!EHCI_sMode_AbortAsyncTransfer+0x62
fffff689`41e4c880 fffff800`5af67a7b     : ffffdb0c`f67f7102 ffffdb0c`f67f71a0 ffffdb0c`f1c02100 fffff800`522c73a2 : usbehci!EHCI_AbortTransfer+0x25
fffff689`41e4c8b0 fffff800`5af7161e     : ffffdb0c`f67f71a0 00000000`00000006 ffffdb0c`f67f7050 00000000`00000000 : USBPORT!MPf_AbortTransfer+0x7f
fffff689`41e4c900 fffff800`5af65ae4     : ffffdb0c`f67f82f0 ffffdb0c`f67f7050 ffffdb0c`f26ba4bc ffffdb0c`f82e053c : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x8fe
fffff689`41e4c960 fffff800`5af74a9f     : ffffdb0c`f6cb3010 fffff800`00000000 ffffdb0c`f67f7050 ffffb000`47dfd100 : USBPORT!USBPORT_Core_iCancelPriorityTransfer+0xe4
fffff689`41e4c9a0 fffff800`5af714e8     : ffffdb0c`f67f71a0 00000000`0000000a ffffdb0c`f67f7050 00000000`00000000 : USBPORT!USBPORT_Core_iEndpointPaused+0x12f
fffff689`41e4c9f0 fffff800`5af6181d     : ffffdb0c`f6cb3010 00000000`00000006 00000000`ffffffff 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c8
fffff689`41e4ca50 fffff800`5af75e8e     : ffffb000`469ec100 00000000`00000002 ffffdb0c`00e86dcf ffffb000`00000006 : USBPORT!USBPORT_ProcessNeoStateChangeList+0x47d
fffff689`41e4cae0 fffff800`522e549e     : fffff689`41e4ce80 ffffb000`469ec180 ffffb000`469ec180 ffffdb0c`f22e8080 : USBPORT!USBPORT_IsrDpc+0x1fe
fffff689`41e4cbb0 fffff800`522e4784     : ffffb000`469ec180 6e556c65`00000000 00000000`00000008 00000000`00284a8f : nt!KiExecuteAllDpcs+0x30e
fffff689`41e4cd20 fffff800`523fb5e5     : 61706143`64656e67 ffffb000`469ec180 ffffdb0c`f22a6e60 ffffdb0c`f22750c0 : nt!KiRetireDpcList+0x1f4
fffff689`41e4cfb0 fffff800`523fb3d0     : fffff800`523f0690 fffff800`5227460a ffff0100`00000000 00000000`64536553 : nt!KxRetireDpcList+0x5
fffff689`426eb420 fffff800`523fac85     : ffffdb0c`f22750c0 fffff800`523f6631 ffffdb0c`fdf8ad00 00000000`00000000 : nt!KiDispatchInterruptContinue
fffff689`426eb450 fffff800`523f6631     : ffffdb0c`fdf8ad00 00000000`00000000 ffff9982`b9600100 fffff800`522c73a2 : nt!KiDpcInterruptBypass+0x25
fffff689`426eb460 fffff800`526c71b1     : ffffdb0c`fdf8ad00 fffff689`426eb6f0 fffff689`426eb6b0 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
fffff689`426eb5f0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObInsertObjectEx+0x481


CHKIMG_EXTENSION: !chkimg -lo 50 -d !usbehci
    fffff8005af4876c - usbehci!EHCI_sMode_AbortSlot+68
    [ a8:b8 ]
1 error : !usbehci (fffff8005af4876c)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa683a8a0f318, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8071bed77af, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5765

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11015

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa683a8a0f318

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8071bed77af

BUGCHECK_P4: 2

READ_ADDRESS: fffff807180fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8071800f340: Unable to get Flags value from nt!KdVersionBlock
fffff8071800f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffa683a8a0f318

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffffd0d64c760a0 -- (.trap 0xfffffd0d64c760a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9408b8ce8938 rbx=0000000000000000 rcx=ffffa683a8a0f330
rdx=ffff9408b8ce8948 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071bed77af rsp=fffffd0d64c76230 rbp=fffffd0d64c76940
 r8=fffffd0d64c76240  r9=ffffa68ba8bfa1a8 r10=fffff807176da920
r11=fffffd0d64c76190 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
Ntfs!NtfsCheckpointVolume+0x1abf:
fffff807`1bed77af 488b41e8        mov     rax,qword ptr [rcx-18h] ds:ffffa683`a8a0f318=????????????????
Resetting default scope

STACK_TEXT: 
fffffd0d`64c75df8 fffff807`17879b57     : 00000000`00000050 ffffa683`a8a0f318 00000000`00000000 fffffd0d`64c760a0 : nt!KeBugCheckEx
fffffd0d`64c75e00 fffff807`176ea5e0     : ffff8ce8`8055c4b0 00000000`00000000 fffffd0d`64c76120 00000000`00000000 : nt!MiSystemFault+0x1716c7
fffffd0d`64c75f00 fffff807`1780275e     : 00000000`00000000 fffff807`1bbf56bf ffff9408`00000088 ffff9408`b8a42980 : nt!MmAccessFault+0x400
fffffd0d`64c760a0 fffff807`1bed77af     : fffffd0d`64c76940 fffffd0d`00000000 fffffd0d`00000000 00000000`00000000 : nt!KiPageFault+0x35e
fffffd0d`64c76230 fffff807`1becb8a2     : 00000000`00000000 fffffd0d`64c77000 01d6a4e8`66851d00 ffff9408`b8ce8100 : Ntfs!NtfsCheckpointVolume+0x1abf
fffffd0d`64c76730 fffff807`1bee54fc     : fffffd0d`64c768d0 ffff9408`b8ce8180 fffffd0d`64c76880 01d6a4e8`66851d01 : Ntfs!NtfsCheckpointAllVolumesWorker+0xe2
fffffd0d`64c76790 fffff807`1bee2e4e     : fffffd0d`64c768d0 00000000`00000000 00000000`00000000 fffff807`1becb7c0 : Ntfs!NtfsForEachVcb+0x200
fffffd0d`64c76840 fffff807`177035f5     : ffff9408`b8d2d040 ffff9408`b8d2d040 ffff9408`b80a5b70 fffff807`1be862b0 : Ntfs!NtfsCheckpointAllVolumes+0x1ee
fffffd0d`64c76b70 fffff807`176a2ae5     : ffff9408`b8d2d040 00000000`00000080 ffff9408`b8081040 00078404`ad9bbffe : nt!ExpWorkerThread+0x105
fffffd0d`64c76c10 fffff807`177fbbf8     : ffffd100`ab340180 ffff9408`b8d2d040 fffff807`176a2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffd0d`64c76c60 00000000`00000000     : fffffd0d`64c77000 fffffd0d`64c71000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  Ntfs!NtfsCheckpointVolume+1abf

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1abf

FAILURE_BUCKET_ID:  AV_R_INVALID_Ntfs!NtfsCheckpointVolume

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {40c25745-b3ad-22bb-ff8b-42e5af3f2798}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80311e4f0a0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80111e84c27, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6202

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 20967

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff80311e4f0a0

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80111e84c27

BUGCHECK_P4: 2

READ_ADDRESS: fffff8010acfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8010ac0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8010ac0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 fffff80311e4f0a0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  ffffc303549c6250 -- (.trap 0xffffc303549c6250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80311e4f0a0 rbx=0000000000000000 rcx=ffffc50ee59368a0
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80111e84c27 rsp=ffffc303549c63e0 rbp=0000000000000020
 r8=ffff9983350e5db0  r9=000000000000001a r10=00000000ffffffff
r11=00000000000000bd r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
dxgmms2!VIDMM_PROCESS::~VIDMM_PROCESS+0x97:
fffff801`11e84c27 488b00          mov     rax,qword ptr [rax] ds:fffff803`11e4f0a0=????????????????
Resetting default scope

STACK_TEXT: 
ffffc303`549c5fa8 fffff801`0a486729     : 00000000`00000050 fffff803`11e4f0a0 00000000`00000000 ffffc303`549c6250 : nt!KeBugCheckEx
ffffc303`549c5fb0 fffff801`0a2eeb80     : 00000000`00000000 00000000`00000000 ffffc303`549c62d0 00000000`00000000 : nt!MiSystemFault+0x13faf9
ffffc303`549c60b0 fffff801`0a40205e     : 00000000`00000000 00000000`33316956 00000000`00000110 00000000`00000541 : nt!MmAccessFault+0x400
ffffc303`549c6250 fffff801`11e84c27     : 00000000`00000068 ffffc50e`00000001 ffffc50e`00000000 01000000`00100000 : nt!KiPageFault+0x35e
ffffc303`549c63e0 fffff801`11e13112     : ffff9983`3452f9e0 ffff9983`350e5db0 ffffc50e`e3a6a270 00000000`00000070 : dxgmms2!VIDMM_PROCESS::~VIDMM_PROCESS+0x97
ffffc303`549c6410 fffff801`0ee1ca13     : ffff9983`350e5db0 00000000`00000000 ffffc50e`e3993b50 00000000`00000000 : dxgmms2!VidMmTerminateProcess+0x12
ffffc303`549c6440 fffff801`0ee1c517     : ffff9983`350e5ee0 ffffc303`549c6570 ffffc303`549c67b0 fffff801`0a2cd56c : dxgkrnl!VidMmTerminateProcessX+0x63
ffffc303`549c6470 fffff801`0ee178b5     : ffff9983`350e5db0 00000000`00000b59 ffff9983`350e5db0 ffffc50e`e53fb020 : dxgkrnl!DXGPROCESS::Destroy+0x1bf
ffffc303`549c66e0 fffff801`0ed157c7     : 00000000`00000000 ffff9983`350e5db0 ffffc50e`e06066e0 fffff801`0acec3c8 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffffc303`549c6830 fffff801`0a69c5cf     : 00000000`00000000 ffffc50e`e596b080 00000000`0000ff00 ffffc50e`e36a3660 : dxgkrnl!DxgkProcessNotify+0xf7
ffffc303`549c6890 fffff801`0a701c84     : ffffc50e`e596b000 ffffc50e`e596b080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffffc303`549c6960 fffff801`0a69ea46     : ffffc50e`e594b4b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
ffffc303`549c6990 fffff801`0a5f3eae     : ffffc50e`c000004b 00000000`00000001 00000021`264ef738 00000021`267cf000 : nt!PspExitThread+0x5b2
ffffc303`549c6a90 fffff801`0a4058b8     : ffffc50e`e596b080 ffffc50e`e594b080 ffffc303`549c6b80 ffffc303`549c6b80 : nt!NtTerminateProcess+0xde
ffffc303`549c6b00 00007ffb`149cc344     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000021`264ef638 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`149cc344


SYMBOL_NAME:  dxgmms2!VIDMM_PROCESS::~VIDMM_PROCESS+97

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  97

FAILURE_BUCKET_ID:  AV_R_INVALID_dxgmms2!VIDMM_PROCESS::_VIDMM_PROCESS

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {33a330ce-02e8-bfc9-91f7-6b8ccfb97a0c}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffd2b3150c8
Arg3: 000000000000000d
Arg4: ffff9a01d4f09e40

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6906

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11577

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 7ffd2b3150c8

BUGCHECK_P3: d

BUGCHECK_P4: ffff9a01d4f09e40

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  explorer.exe

STACK_TEXT: 
ffff9a01`d4f09c98 fffff802`2b472c08     : 00000000`0000001a 00000000`00061941 00007ffd`2b3150c8 00000000`0000000d : nt!KeBugCheckEx
ffff9a01`d4f09ca0 fffff802`2b40205e     : 00000000`00000000 00000000`00000001 00000000`00000001 ffff9a01`d2cebb80 : nt!MmAccessFault+0x184488
ffff9a01`d4f09e40 00007ffd`4b662862     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0707f310 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`4b662862


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------
 
Belleklere test yapın.

Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

BIOS versiyonunuz 324 olarak görünüyor ama cihazınızın sitesinde böyle bir BIOS yok. Sonradan kaldırılmış bir BIOS kullanıyorsunuz sanırım, buradan 320'yi kurun. Ayrıca aşağıdaki linkteki ürünün sizinkiyle aynı olduğuna emin olun.

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000dddd99b8, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg4: fffff8005af48771, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 7374.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 9970.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 78.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: d1.

BUGCHECK_P1: dddd99b8.

BUGCHECK_P2: 2.

BUGCHECK_P3: 1.

BUGCHECK_P4: fffff8005af48771.

WRITE_ADDRESS: fffff80052cfb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80052c0f340: Unable to get Flags value from nt!KdVersionBlock.
fffff80052c0f340: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
00000000dddd99b8.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: svchost.exe.

DPC_STACK_BASE: FFFFF68941E4CFB0.

TRAP_FRAME: fffff689426eb6b0 -- (.trap 0xfffff689426eb6b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9982bdf7a060 rbx=0000000000000000 rcx=0000000000000294.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=0000000000000000 rsp=ffffb7553e9b1b4f rbp=0000000000000000.
r8=fffff689426eb750 r9=0000000000000000 r10=0000000000000000.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up di pl nz na pe nc.
00000000`00000000 ?? ???
Resetting default scope.

BAD_STACK_POINTER: ffffb7553e9b1b4f.

IP_IN_FREE_BLOCK: 0.

UNALIGNED_STACK_POINTER: ffffb7553e9b1b4f.

STACK_TEXT:
fffff689`41e4c4f8 fffff800`52406569 : 00000000`0000000a 00000000`dddd99b8 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
fffff689`41e4c500 fffff800`52402869 : fffff800`523f0690 fffff800`5227460a 00000000`00000000 00000000`00000014 : nt!KiBugCheckDispatch+0x69.
fffff689`41e4c640 fffff800`5af48771 : 00000000`00000001 00000000`00000000 ffffffff`ffffffd2 00000000`000000c0 : nt!KiPageFault+0x469.
fffff689`41e4c7d0 fffff800`5af48562 : ffffdb0c`f6cb3458 ffffb000`47dfd100 ffffdb0c`f67f8378 00000000`00000001 : usbehci!EHCI_sMode_AbortSlot+0x6d.
fffff689`41e4c820 fffff800`5af4b985 : ffffdb0c`f82e09a4 ffffdb0c`f82e053c ffffdb0c`f67f71a0 fffff689`41e4c9a8 : usbehci!EHCI_sMode_AbortAsyncTransfer+0x62.
fffff689`41e4c880 fffff800`5af67a7b : ffffdb0c`f67f7102 ffffdb0c`f67f71a0 ffffdb0c`f1c02100 fffff800`522c73a2 : usbehci!EHCI_AbortTransfer+0x25.
fffff689`41e4c8b0 fffff800`5af7161e : ffffdb0c`f67f71a0 00000000`00000006 ffffdb0c`f67f7050 00000000`00000000 : USBPORT!MPf_AbortTransfer+0x7f.
fffff689`41e4c900 fffff800`5af65ae4 : ffffdb0c`f67f82f0 ffffdb0c`f67f7050 ffffdb0c`f26ba4bc ffffdb0c`f82e053c : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x8fe.
fffff689`41e4c960 fffff800`5af74a9f : ffffdb0c`f6cb3010 fffff800`00000000 ffffdb0c`f67f7050 ffffb000`47dfd100 : USBPORT!USBPORT_Core_iCancelPriorityTransfer+0xe4.
fffff689`41e4c9a0 fffff800`5af714e8 : ffffdb0c`f67f71a0 00000000`0000000a ffffdb0c`f67f7050 00000000`00000000 : USBPORT!USBPORT_Core_iEndpointPaused+0x12f.
fffff689`41e4c9f0 fffff800`5af6181d : ffffdb0c`f6cb3010 00000000`00000006 00000000`ffffffff 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c8.
fffff689`41e4ca50 fffff800`5af75e8e : ffffb000`469ec100 00000000`00000002 ffffdb0c`00e86dcf ffffb000`00000006 : USBPORT!USBPORT_ProcessNeoStateChangeList+0x47d.
fffff689`41e4cae0 fffff800`522e549e : fffff689`41e4ce80 ffffb000`469ec180 ffffb000`469ec180 ffffdb0c`f22e8080 : USBPORT!USBPORT_IsrDpc+0x1fe.
fffff689`41e4cbb0 fffff800`522e4784 : ffffb000`469ec180 6e556c65`00000000 00000000`00000008 00000000`00284a8f : nt!KiExecuteAllDpcs+0x30e.
fffff689`41e4cd20 fffff800`523fb5e5 : 61706143`64656e67 ffffb000`469ec180 ffffdb0c`f22a6e60 ffffdb0c`f22750c0 : nt!KiRetireDpcList+0x1f4.
fffff689`41e4cfb0 fffff800`523fb3d0 : fffff800`523f0690 fffff800`5227460a ffff0100`00000000 00000000`64536553 : nt!KxRetireDpcList+0x5.
fffff689`426eb420 fffff800`523fac85 : ffffdb0c`f22750c0 fffff800`523f6631 ffffdb0c`fdf8ad00 00000000`00000000 : nt!KiDispatchInterruptContinue.
fffff689`426eb450 fffff800`523f6631 : ffffdb0c`fdf8ad00 00000000`00000000 ffff9982`b9600100 fffff800`522c73a2 : nt!KiDpcInterruptBypass+0x25.
fffff689`426eb460 fffff800`526c71b1 : ffffdb0c`fdf8ad00 fffff689`426eb6f0 fffff689`426eb6b0 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1.
fffff689`426eb5f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObInsertObjectEx+0x481.

CHKIMG_EXTENSION: !chkimg -lo 50 -d !usbehci.
fffff8005af4876c - usbehci!EHCI_sMode_AbortSlot+68.
[ a8:b8 ]
1 error : !usbehci (fffff8005af4876c)

MODULE_NAME: memory_corruption.

IMAGE_NAME: memory_corruption.

MEMORY_CORRUPTOR: ONE_BIT.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: memory_corruption.
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa683a8a0f318, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8071bed77af, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name.
*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 5765.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 11015.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 50.

BUGCHECK_P1: ffffa683a8a0f318.

BUGCHECK_P2: 0.

BUGCHECK_P3: fffff8071bed77af.

BUGCHECK_P4: 2.

READ_ADDRESS: fffff807180fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8071800f340: Unable to get Flags value from nt!KdVersionBlock.
fffff8071800f340: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffffa683a8a0f318.

MM_INTERNAL_CODE: 2.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

TRAP_FRAME: fffffd0d64c760a0 -- (.trap 0xfffffd0d64c760a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9408b8ce8938 rbx=0000000000000000 rcx=ffffa683a8a0f330.
rdx=ffff9408b8ce8948 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8071bed77af rsp=fffffd0d64c76230 rbp=fffffd0d64c76940.
r8=fffffd0d64c76240 r9=ffffa68ba8bfa1a8 r10=fffff807176da920.
r11=fffffd0d64c76190 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz ac pe nc.
Ntfs!NtfsCheckpointVolume+0x1abf:
fffff807`1bed77af 488b41e8 mov rax,qword ptr [rcx-18h] ds:ffffa683`a8a0f318=????????????????
Resetting default scope.

STACK_TEXT:
fffffd0d`64c75df8 fffff807`17879b57 : 00000000`00000050 ffffa683`a8a0f318 00000000`00000000 fffffd0d`64c760a0 : nt!KeBugCheckEx.
fffffd0d`64c75e00 fffff807`176ea5e0 : ffff8ce8`8055c4b0 00000000`00000000 fffffd0d`64c76120 00000000`00000000 : nt!MiSystemFault+0x1716c7.
fffffd0d`64c75f00 fffff807`1780275e : 00000000`00000000 fffff807`1bbf56bf ffff9408`00000088 ffff9408`b8a42980 : nt!MmAccessFault+0x400.
fffffd0d`64c760a0 fffff807`1bed77af : fffffd0d`64c76940 fffffd0d`00000000 fffffd0d`00000000 00000000`00000000 : nt!KiPageFault+0x35e.
fffffd0d`64c76230 fffff807`1becb8a2 : 00000000`00000000 fffffd0d`64c77000 01d6a4e8`66851d00 ffff9408`b8ce8100 : Ntfs!NtfsCheckpointVolume+0x1abf.
fffffd0d`64c76730 fffff807`1bee54fc : fffffd0d`64c768d0 ffff9408`b8ce8180 fffffd0d`64c76880 01d6a4e8`66851d01 : Ntfs!NtfsCheckpointAllVolumesWorker+0xe2.
fffffd0d`64c76790 fffff807`1bee2e4e : fffffd0d`64c768d0 00000000`00000000 00000000`00000000 fffff807`1becb7c0 : Ntfs!NtfsForEachVcb+0x200.
fffffd0d`64c76840 fffff807`177035f5 : ffff9408`b8d2d040 ffff9408`b8d2d040 ffff9408`b80a5b70 fffff807`1be862b0 : Ntfs!NtfsCheckpointAllVolumes+0x1ee.
fffffd0d`64c76b70 fffff807`176a2ae5 : ffff9408`b8d2d040 00000000`00000080 ffff9408`b8081040 00078404`ad9bbffe : nt!ExpWorkerThread+0x105.
fffffd0d`64c76c10 fffff807`177fbbf8 : ffffd100`ab340180 ffff9408`b8d2d040 fffff807`176a2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55.
fffffd0d`64c76c60 00000000`00000000 : fffffd0d`64c77000 fffffd0d`64c71000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28.

SYMBOL_NAME: Ntfs!NtfsCheckpointVolume+1abf.

MODULE_NAME: Ntfs.

IMAGE_NAME: Ntfs.sys.

IMAGE_VERSION: 10.0.19041.508.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1abf.

FAILURE_BUCKET_ID: AV_R_INVALID_Ntfs!NtfsCheckpointVolume.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {40c25745-b3ad-22bb-ff8b-42e5af3f2798}

Followup: MachineOwner.
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80311e4f0a0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80111e84c27, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name.
*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 6202.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 20967.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 84.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 50.

BUGCHECK_P1: fffff80311e4f0a0.

BUGCHECK_P2: 0.

BUGCHECK_P3: fffff80111e84c27.

BUGCHECK_P4: 2.

READ_ADDRESS: fffff8010acfa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8010ac0f2e0: Unable to get Flags value from nt!KdVersionBlock.
fffff8010ac0f2e0: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
fffff80311e4f0a0.

MM_INTERNAL_CODE: 2.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: svchost.exe.

TRAP_FRAME: ffffc303549c6250 -- (.trap 0xffffc303549c6250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80311e4f0a0 rbx=0000000000000000 rcx=ffffc50ee59368a0.
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80111e84c27 rsp=ffffc303549c63e0 rbp=0000000000000020.
r8=ffff9983350e5db0 r9=000000000000001a r10=00000000ffffffff.
r11=00000000000000bd r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na po nc.
dxgmms2!VIDMM_PROCESS::~VIDMM_PROCESS+0x97:
fffff801`11e84c27 488b00 mov rax,qword ptr [rax] ds:fffff803`11e4f0a0=????????????????
Resetting default scope.

STACK_TEXT:
ffffc303`549c5fa8 fffff801`0a486729 : 00000000`00000050 fffff803`11e4f0a0 00000000`00000000 ffffc303`549c6250 : nt!KeBugCheckEx.
ffffc303`549c5fb0 fffff801`0a2eeb80 : 00000000`00000000 00000000`00000000 ffffc303`549c62d0 00000000`00000000 : nt!MiSystemFault+0x13faf9.
ffffc303`549c60b0 fffff801`0a40205e : 00000000`00000000 00000000`33316956 00000000`00000110 00000000`00000541 : nt!MmAccessFault+0x400.
ffffc303`549c6250 fffff801`11e84c27 : 00000000`00000068 ffffc50e`00000001 ffffc50e`00000000 01000000`00100000 : nt!KiPageFault+0x35e.
ffffc303`549c63e0 fffff801`11e13112 : ffff9983`3452f9e0 ffff9983`350e5db0 ffffc50e`e3a6a270 00000000`00000070 : dxgmms2!VIDMM_PROCESS::~VIDMM_PROCESS+0x97.
ffffc303`549c6410 fffff801`0ee1ca13 : ffff9983`350e5db0 00000000`00000000 ffffc50e`e3993b50 00000000`00000000 : dxgmms2!VidMmTerminateProcess+0x12.
ffffc303`549c6440 fffff801`0ee1c517 : ffff9983`350e5ee0 ffffc303`549c6570 ffffc303`549c67b0 fffff801`0a2cd56c : dxgkrnl!VidMmTerminateProcessX+0x63.
ffffc303`549c6470 fffff801`0ee178b5 : ffff9983`350e5db0 00000000`00000b59 ffff9983`350e5db0 ffffc50e`e53fb020 : dxgkrnl!DXGPROCESS::Destroy+0x1bf.
ffffc303`549c66e0 fffff801`0ed157c7 : 00000000`00000000 ffff9983`350e5db0 ffffc50e`e06066e0 fffff801`0acec3c8 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105.
ffffc303`549c6830 fffff801`0a69c5cf : 00000000`00000000 ffffc50e`e596b080 00000000`0000ff00 ffffc50e`e36a3660 : dxgkrnl!DxgkProcessNotify+0xf7.
ffffc303`549c6890 fffff801`0a701c84 : ffffc50e`e596b000 ffffc50e`e596b080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213.
ffffc303`549c6960 fffff801`0a69ea46 : ffffc50e`e594b4b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70.
ffffc303`549c6990 fffff801`0a5f3eae : ffffc50e`c000004b 00000000`00000001 00000021`264ef738 00000021`267cf000 : nt!PspExitThread+0x5b2.
ffffc303`549c6a90 fffff801`0a4058b8 : ffffc50e`e596b080 ffffc50e`e594b080 ffffc303`549c6b80 ffffc303`549c6b80 : nt!NtTerminateProcess+0xde.
ffffc303`549c6b00 00007ffb`149cc344 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000021`264ef638 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`149cc344.

SYMBOL_NAME: dxgmms2!VIDMM_PROCESS::~VIDMM_PROCESS+97.

MODULE_NAME: dxgmms2.

IMAGE_NAME: dxgmms2.sys.

IMAGE_VERSION: 10.0.19041.508.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 97.

FAILURE_BUCKET_ID: AV_R_INVALID_dxgmms2!VIDMM_PROCESS::_VIDMM_PROCESS.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {33a330ce-02e8-bfc9-91f7-6b8ccfb97a0c}

Followup: MachineOwner.
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffd2b3150c8.
Arg3: 000000000000000d.
Arg4: ffff9a01d4f09e40.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 6906.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 11577.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 61941.

BUGCHECK_P2: 7ffd2b3150c8.

BUGCHECK_P3: d.

BUGCHECK_P4: ffff9a01d4f09e40.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: explorer.exe.

STACK_TEXT:
ffff9a01`d4f09c98 fffff802`2b472c08 : 00000000`0000001a 00000000`00061941 00007ffd`2b3150c8 00000000`0000000d : nt!KeBugCheckEx.
ffff9a01`d4f09ca0 fffff802`2b40205e : 00000000`00000000 00000000`00000001 00000000`00000001 ffff9a01`d2cebb80 : nt!MmAccessFault+0x184488.
ffff9a01`d4f09e40 00007ffd`4b662862 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e.
00000000`0707f310 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`4b662862.

MODULE_NAME: hardware.

IMAGE_NAME: hardware_ram.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup: MachineOwner.
---------

Bellek testi yaptim bu çikti ekran karti güncel ve BIOS sürümüm anakart yabanci olduğu için cinden aldiğim için BIOS sürümü böyle bütün anakartlarda.
Olası etkenler;
1. sisteminiz.
2. virüsler.
3. Windows güncellemeleri.

Virüs yok format attildi gine ayni Windows güncellemeleri hepsi yüklü günceldir.
 

Dosya Ekleri

  • IMG_20200419_193929.jpg
    IMG_20200419_193929.jpg
    173,2 KB · Görüntüleme: 22
4 Pass tamamlanana kadar yapın testi, sadece bir tanesi tamamlanmış. Dediğim diğer işlemleri de yapın. BIOS işlemini atlayabilirsiniz.

Eğer bütün bunlar işe yaramazsa sorun anakartta olabilir, Çin piyasasına bu konuda pek güvenemiyorum.
 
Bellek testi yaptim bu çikti ekran karti güncel ve BIOS sürümüm anakart yabanci olduğu için cinden aldiğim için BIOS sürümü böyle bütün anakartlarda.


Virüs yok format attildi gine ayni Windows güncellemeleri hepsi yüklü günceldir.
Windows güncellemeleri derken, yeni güncellemelerde sorun olabiliyor anlamında dedim. Windows 8 kurun bakalım ne olacak =)
 

Yeni konular

Geri
Yukarı