Windows 7 Mavi Ekran Hatası

Katılım
25 Ocak 2020
Mesajlar
1.184
Çözümler
8
Merhabalar. Önceden Windows 10 Home Single Language 64 Bit kullanıyordum, bilgisayarıma Windows 7 Home Basic 64 Bit kurdum. Öncelikle sürücüleri vesaire her şeyi kurdum. Fakat bilgisayar dünden kurduğumdan beri uzun saatler aralığında mavi ekran veriyor. Bilgisayarımın sitesindeki en son Windows 8.1 ve Windows 10 uyumlu BIOS sürümü (F. 49) yüklü Windows 10'da iken kurmuştum. Bundan kaynaklı olduğunu düşünüyorum ben yine de Minidump dosyalarını aşağıya bıraktım. Bundan kaynaklı mı? Neden kaynaklı olabilir?

 
Son düzenleyen: Moderatör:
  • MediaTek Ralink kablosuz bağdaştırıcınız sorun çıkarmış.
  • Ses sürücülerinizi de güncellerseniz iyi olur.
  • Battleye'yi kaldırın.
  • Klavye ve fare haricinde USB cihazı kullanıyorsanız şimdilik çıkarın, USB HDD gibi.
  • Çipsetinizi paylaşırsanız USB kontrolcü sürücünüzü bulmaya çalışalım.
Kod:
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000000b, The hibernation file is too small.
Arg2: 00000000bd039000, Size of the hibernation file.
Arg3: 0000000000000003, HIBERFILE_PROGRESS_SECURE_RANGES
Arg4: 00000000272c0000

Debugging Details:
------------------

fffff800030390e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800030f4300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 23069

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 65

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a0

BUGCHECK_P1: b

BUGCHECK_P2: bd039000

BUGCHECK_P3: 3

BUGCHECK_P4: 272c0000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
fffff880`09a1e078 fffff800`030fd043     : 00000000`000000a0 00000000`0000000b 00000000`bd039000 00000000`00000003 : nt!KeBugCheckEx
fffff880`09a1e080 fffff800`030fd6eb     : fffffa80`09e69e70 00000000`0000e000 fffffa80`09e69e70 00000000`000088e0 : nt!PopWriteHiberPages+0xa3
fffff880`09a1e280 fffff800`030fd855     : 000010f6`03af5b60 fffff880`09a1e588 fffff880`0000e000 00000000`00000010 : nt!PopAddPagesToCompressedPageSet+0x1eb
fffff880`09a1e310 fffff800`030fec62     : fffff880`0bc78000 fffff880`09a1e588 00000000`00000020 00000000`000000df : nt!PopBufferCompressedPageSet+0xd5
fffff880`09a1e380 fffff800`030ff49a     : fffffa80`00007bc2 fffff880`0b628000 00000000`000bd02b 00000000`000088e0 : nt!PopWriteHiberImage+0x3d2
fffff880`09a1e570 fffff800`02e1406e     : 00000000`00008fb4 00000000`00000000 fffff800`030ff2b0 00000000`00000000 : nt!PopSaveHiberContext+0x1ea
fffff880`09a1e720 fffff800`03105d6a     : 00000000`00001406 00000000`00000000 00000000`00000000 fffff880`09a1e8c0 : hal!HaliAcpiSleep+0x18f
fffff880`09a1e790 fffff800`03105e0f     : 00000000`00000000 fffffa80`09e69e70 fffff800`03073240 00000000`03100a30 : nt!PopHandleNextState+0x12a
fffff880`09a1e7e0 fffff800`0310b4b0     : 00000000`00000005 00000000`0023ae2d 00000000`00000000 fffff880`09a1e960 : nt!PopIssueNextState+0x1f
fffff880`09a1e810 fffff800`0310b914     : 00000000`00000000 00000000`00158f44 00000000`00000000 00000000`00000001 : nt!PopInvokeSystemStateHandler+0x3c0
fffff880`09a1e9d0 fffff800`03107754     : ffffffff`ffffffff ffffffff`ffffffff 00000000`00158f44 00000000`00000000 : nt!PopEndMirroring+0x84
fffff880`09a1eaa0 fffff800`0310bc95     : fffff880`09a1ebc0 fffff880`00000007 00000000`00000000 00000000`00000007 : nt!MmDuplicateMemory+0xb64
fffff880`09a1eb90 fffff800`03194e68     : fffff880`0357b180 fffffa80`00000002 00000000`00000000 00000000`00000000 : nt!PopTransitionToSleep+0xd5
fffff880`09a1ec00 fffff800`02ef0bc6     : fffff880`0357b180 fffffa80`04962040 fffffa80`075c6b50 00000000`00000000 : nt!PspSystemThreadStartup+0x194
fffff880`09a1ec40 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_NAME:  nt!PopWriteHiberPages+a3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24557

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xa0_b_HIBERFILE_TOO_SMALL_nt!PopWriteHiberPages+a3

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {7921f116-3993-4d78-a596-89c58c5fe28a}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a0054b1004, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030e40ee, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for ndis.sys
fffff80002ff50e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800030b0300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2234

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 18133

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 63

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: fffff8a0054b1004

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff800030e40ee

READ_ADDRESS: fffff80002ff50e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff50e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff50e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b02f0
GetUlongPtrFromAddress: unable to read from fffff800030b04a8
fffff8a0054b1004 Paged pool

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80004c91860 -- (.trap 0xfffff80004c91860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0054b1000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000a27000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030e40ee rsp=fffff80004c919f0 rbp=0000000000000a27
r8=0000000000000027  r9=0000000000000000 r10=0000000000000145
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!HvpScanForFreeCellInViewWindow+0x16a:
fffff800`030e40ee 8b4804          mov     ecx,dword ptr [rax+4] ds:fffff8a0`054b1004=????????
Resetting default scope

STACK_TEXT:
fffff800`04c91718 fffff800`02eb4fe9     : 00000000`0000000a fffff8a0`054b1004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04c91720 fffff800`02eb2dce     : 00000000`00000000 fffff8a0`054b1004 fffff800`03007100 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`04c91860 fffff800`030e40ee     : 00000000`00000000 00000000`00986000 00000000`00001000 00000000`00000000 : nt!KiPageFault+0x44e
fffff800`04c919f0 fffff800`030e3efa     : fffff800`00a27000 fffff800`00000009 00000000`00000030 fffff800`00000000 : nt!HvpScanForFreeCellInViewWindow+0x16a
fffff800`04c91a70 fffff800`030e3a62     : 00000000`00000030 00000000`00000005 00000000`00000030 00000000`00000000 : nt!HvpFindFreeCell+0x1ba
fffff800`04c91ae0 fffff800`03123e0d     : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x72
fffff800`04c91b40 fffff800`03123c9d     : 00000000`00000000 fffff8a0`008b7290 00000000`00000008 fffff800`031105ec : nt!HvAllocateCell+0x55
fffff800`04c91b70 fffff800`030d9247     : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0521e640 fffff800`04c91e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04c91c40 fffff800`032bd4e3     : 01d6a924`5b295744 fffff800`04c91ff0 fffff8a0`0a48d258 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04c91c90 fffff800`030e2142     : fffff8a0`02494620 fffff800`04c91e18 00000000`00000004 fffff800`04c92210 : nt!CmSetValueKey+0xba3
fffff800`04c91dd0 fffff800`02eb4c53     : ffffffff`80000b4c 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x34e
fffff800`04c91f00 fffff800`02eaa3e0     : fffff800`031f6152 fffff800`04c92248 fffff880`01b58152 fffffa80`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c92108 fffff800`031f6152     : fffff800`04c92248 fffff880`01b58152 fffffa80`00000000 fffff800`04c92270 : nt!KiServiceLinkage
fffff800`04c92110 fffff880`01b5fd96     : 00000000`00000004 fffffa80`0a38b160 fffffa80`074461a0 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c92170 00000000`00000004     : fffffa80`0a38b160 fffffa80`074461a0 00000000`000007ff fffff800`04c92210 : ndis+0xafd96
fffff800`04c92178 fffffa80`0a38b160     : fffffa80`074461a0 00000000`000007ff fffff800`04c92210 00000000`00000004 : 0x4
fffff800`04c92180 fffffa80`074461a0     : 00000000`000007ff fffff800`04c92210 00000000`00000004 00000000`00000000 : 0xfffffa80`0a38b160
fffff800`04c92188 00000000`000007ff     : fffff800`04c92210 00000000`00000004 00000000`00000000 00000000`ffff0000 : 0xfffffa80`074461a0
fffff800`04c92190 fffff800`04c92210     : 00000000`00000004 00000000`00000000 00000000`ffff0000 fffff880`064914b0 : 0x7ff
fffff800`04c92198 00000000`00000004     : 00000000`00000000 00000000`ffff0000 fffff880`064914b0 fffff880`06486000 : 0xfffff800`04c92210
fffff800`04c921a0 00000000`00000000     : 00000000`ffff0000 fffff880`064914b0 fffff880`06486000 00000000`00000001 : 0x4


SYMBOL_NAME:  ndis+afd96

MODULE_NAME: ndis

IMAGE_NAME:  ndis.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xA_ndis+afd96

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {a5c8f976-7479-4c27-589e-5dc5e53d93c3}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a00531c034, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800031527dc, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80003103300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2139

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13998

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 64

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: fffff8a00531c034

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff800031527dc

READ_ADDRESS: fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800031032f0
GetUlongPtrFromAddress: unable to read from fffff800031034a8
fffff8a00531c034 Paged pool

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80004c86990 -- (.trap 0xfffff80004c86990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000cc2020 rbx=0000000000000000 rcx=fffff80004c86c31
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031527dc rsp=fffff80004c86b20 rbp=fffff80004c86ff0
r8=fffff8a00531c024  r9=000000000000ffff r10=fffffa8009c13472
r11=fffff8a00531dff1 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0x12c:
fffff800`031527dc 41f6401001      test    byte ptr [r8+10h],1 ds:fffff8a0`0531c034=??
Resetting default scope

STACK_TEXT:
fffff800`04c86848 fffff800`02f07fe9     : 00000000`0000000a fffff8a0`0531c034 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04c86850 fffff800`02f05dce     : 00000000`00000000 fffff8a0`0531c034 fffffa80`046f2000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c86990 fffff800`031527dc     : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00049840 00000003`a52e2f9b : nt!KiPageFault+0x44e
fffff800`04c86b20 fffff800`03176afc     : fffff8a0`03c2ca70 fffff800`04c86e18 fffff800`04c86c60 fffff800`04c86c48 : nt!CmpFindValueByNameFromCache+0x12c
fffff800`04c86bf0 fffff800`0330ffe7     : fffff8a0`03c2ca70 01d6a938`39d370d1 fffff8a0`03c2ca70 fffff800`03075630 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`04c86c90 fffff800`03135142     : fffff8a0`03185f10 fffff800`04c86e18 00000000`00000004 fffff800`04c87210 : nt!CmSetValueKey+0x6a7
fffff800`04c86dd0 fffff800`02f07f39     : ffffffff`80000b7c 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x34e
fffff800`04c86f00 fffff800`02efd3e0     : fffff800`03249152 fffff800`04c87248 fffff880`01b91152 fffffa80`00000000 : nt!KiSystemServiceExit+0x2de
fffff800`04c87108 fffff800`03249152     : fffff800`04c87248 fffff880`01b91152 fffffa80`00000000 fffff800`04c87270 : nt!KiServiceLinkage
fffff800`04c87110 fffff880`01b98d96     : 00000000`00000004 fffffa80`09c13470 fffff800`0304a180 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c87170 fffff880`05ec798d     : fffff800`04c87270 fffff880`060d6c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c871d0 fffff800`04c87270     : fffff880`060d6c28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`04c871d8 fffff880`060d6c28     : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`0737d1a0 : 0xfffff800`04c87270
fffff800`04c871e0 00000000`00000000     : 00000000`00000000 fffffa80`001801a9 fffffa80`0737d1a0 00000000`00000000 : netr28x+0x25ac28


SYMBOL_NAME:  netr28x+4b98d

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xA_netr28x+4b98d

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {5ef59956-668a-318f-f13d-779ad8e5e0f7}

Followup:     MachineOwner
---------
 
HWiNFO yazılımında sol taraftan "Motherboard" bölümünü seçin, çıkan ekranın ekran görüntüsünü atın.
1603468116700.png
 
Attığınız linklerdeki bağdaştırıcı ve ses sürücülerini kaldırıp onları kurdum, BattlEye ve onu kullanan programları sildim. Başka yapmam gereken bir şey var mı, böyle kontrol edeyim mi?
Başka yapmanız gereken bir şey yok. Umarım sorununuz çözülmüştür.

Bir daha mavi ekran almazsanız belirtin, alırsanız yeni dosyaları paylaşın.
 
Evet, yine aynı şey yaşadım.

Yine MediaTek adaptörünüz kaynaklı.

Adaptörü sisteminizden çıkartıp ethernet ile internete bağlanabilme imkânınız var mı?

Kod:
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is
caused by drivers that have corrupted the system pool.  Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: fffff8a004f86018, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800030235d7, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys
fffff8000302b0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800030e6300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1796

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12733

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 64

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  c5

BUGCHECK_P1: fffff8a004f86018

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff800030235d7

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80004c91ca0 -- (.trap 0xfffff80004c91ca0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8000303d1c0 rbx=0000000000000000 rcx=fffff8a004f86010
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030235d7 rsp=fffff80004c91e30 rbp=0000000000001000
 r8=0000000000000001  r9=fffff80002e48000 r10=fffffa800426a508
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!ExAllocatePoolWithTag+0x517:
fffff800`030235d7 4c8b4908        mov     r9,qword ptr [rcx+8] ds:fffff8a0`04f86018=fffffa800426abc0
Resetting default scope

STACK_TEXT: 
fffff800`04c91b58 fffff800`02eeafe9     : 00000000`0000000a fffff8a0`04f86018 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04c91b60 fffff800`02ee8dce     : 00000000`00000000 fffff8a0`04f86018 fffff800`0303d100 fffffa80`0426abc0 : nt!KiBugCheckDispatch+0x69
fffff800`04c91ca0 fffff800`030235d7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x44e
fffff800`04c91e30 fffff800`03174056     : fffffa80`00000004 fffffa80`055c8a10 fffff980`41194c10 fffffa80`00000000 : nt!ExAllocatePoolWithTag+0x517
fffff800`04c91f20 fffff800`031844e9     : 00000000`ffff0000 fffffa80`0a42e8f0 fffff880`01a97110 fffffa80`05df28b0 : nt!IopOpenOrCreateDeviceRegistryKey+0x82
fffff800`04c920e0 fffff880`01adc152     : fffffa80`042dd710 fffff800`04c92270 fffff800`02ee014a 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`04c92120 fffff880`01a47b34     : fffff800`04c92270 fffff800`04c92248 fffffa80`05a221a0 fffff800`030c3a74 : ndis!NdisOpenConfiguration+0xb2
fffff800`04c92160 fffff880`05c8394f     : fffff800`00000000 fffff800`04c92270 fffff880`05e92c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`04c921d0 fffff800`00000000     : fffff800`04c92270 fffff880`05e92c28 00000000`00000000 00000001`001801a9 : netr28x+0x4b94f
fffff800`04c921d8 fffff800`04c92270     : fffff880`05e92c28 00000000`00000000 00000001`001801a9 fffffa80`05a221a0 : 0xfffff800`00000000
fffff800`04c921e0 fffff880`05e92c28     : 00000000`00000000 00000001`001801a9 fffffa80`05a221a0 fffff800`00000000 : 0xfffff800`04c92270
fffff800`04c921e8 00000000`00000000     : 00000001`001801a9 fffffa80`05a221a0 fffff800`00000000 fffff800`04c8d000 : netr28x+0x25ac28


SYMBOL_NAME:  netr28x+4b94f

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xC5_2_VRF_netr28x+4b94f

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {ecb62684-fbca-1623-9f57-99e794582ed0}

Followup:     MachineOwner
---------
 

Geri
Yukarı