Çözüldü Sık sık mavi ekran alıyorum

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

Kadri Fidan

Kilopat
Katılım
17 Aralık 2014
Mesajlar
20
Daha fazla  
Cinsiyet
Erkek
Arkadaşlar merhaba, yaklaşık 2-3 aydır kullandığım sistemimde son 1, 5 haftadır hepsi farklı nedenlerden olmak üzere sık sık mavi ekran hatalarıyla karşılaşmaktayım. İlk hata BAD_SYSTEM_CONFIG_INFO idi. Ne yazık ki ne yaptıysam masaüstü ekranıma dönemedim ve format atmak zorunda kaldım. Format attıktan sonraki çıkan mavi ekranlara ait minidump dosyalarını da paylaşıyorum.


Bilgisayarı yeni topladım sayılır, yeni nesil oyunlarda bir tık zorlanan ama takır takır çalışan Intel sistemimi satıp Ryzen'e geçtim ama bu mavi ekran hataları cidden beni bilgisayardan soğuttu. Hepsinin açıklaması farklı ve internetten çözümlerine baktığımda hepsine sürücülerini güncelleştirin, Windows Update'inizi kontrol edin vs. diyor, hepsini yapıyorum. Anakart sitesinden chipset, Realtek vs. sürücülerini güncelleştirdim, BIOS'umu güncelleştirdim, ekran kartımı güncelleştirdim ama mavi ekranlar devam ediyor. Oyun oynama sırasında hiç olmadı, genelde Opera'da dolanırken ya da bilgisayar boştayken yaşandı hepsi de.

Sistem özellikleri:
Ryzen 5 3600.
MSI GTX 1070.
MSI B450M Bazooka v2.
XPG D60G 16 GB 3200 MHz.
James Donkey 480 GB SSD.
1 TB WD purple 5400 RPM.

Cidden alakası var mıdır bilmiyorum ama wallpaper engine kullanmaya başladıktan sonra oldu. Benim sistemimden daha düşük sistemlere sahip arkadaşlarımda bir sıkıntı çıkar mıyor ama sorunun gerçek sebebini bulamadığım için dipnot olarak ekleyeyim dedim.
 
Son düzenleyen: Moderatör:
Çözüm
MSI yazılımları hala sistemde yüklüler kaldır demiştim ama.

Chipset, Ses ve Ağ sürücüsünü güvenli mod ile kaldır tekrar kur.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000031c, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000047, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8060d822097, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 31c

BUGCHECK_P2: ff

BUGCHECK_P3: 47

BUGCHECK_P4: fffff8060d822097

WRITE_ADDRESS: fffff8060dd733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000031c

CURRENT_IRQL:  0

FAULTING_IP:
nt!PpmIdleExecuteTransition+927
fffff806`0d822097 899d1c030000    mov     dword ptr [rbp+31Ch],ebx

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-13-2020 19:12:29.0537

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffffe811a6b5650 -- (.trap 0xfffffe811a6b5650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8060d975280 rbx=0000000000000000 rcx=33c5ed4faa2e0001
rdx=00000000002cbf16 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060d822097 rsp=fffffe811a6b57e0 rbp=0000000000000000
r8=00000000004b1201  r9=0000000000000000 r10=00000000ffffffff
r11=ffffce7f6fc00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!PpmIdleExecuteTransition+0x927:
fffff806`0d822097 899d1c030000    mov     dword ptr [rbp+31Ch],ebx ss:0018:00000000`0000031c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8060d9d33e9 to fffff8060d9c1510

STACK_TEXT:
fffffe81`1a6b5508 fffff806`0d9d33e9 : 00000000`0000000a 00000000`0000031c 00000000`000000ff 00000000`00000047 : nt!KeBugCheckEx
fffffe81`1a6b5510 fffff806`0d9cf72b : fffffe81`1a6b5620 00000000`00000002 ffffde81`d5e80251 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffe81`1a6b5650 fffff806`0d822097 : 00006446`17e64a57 00006446`17e64a57 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
fffffe81`1a6b57e0 fffff806`0d8215ce : 00000000`00000003 00000000`00000002 ffffa60b`a7d35100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x927
fffffe81`1a6b5b00 fffff806`0d9c5018 : ffffffff`00000000 ffffde81`d5e80180 ffffa60b`ae6af080 00000000`00000360 : nt!PoIdle+0x36e
fffffe81`1a6b5c60 00000000`00000000 : fffffe81`1a6b6000 fffffe81`1a6b0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  fbc86847fe4eb6c3c1fac4537ef130091fd9343a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6efa8337f1f83fb6c761e7f449f6066ab3a91f1e

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!PpmIdleExecuteTransition+927
fffff806`0d822097 899d1c030000    mov     dword ptr [rbp+31Ch],ebx

FAULT_INSTR_CODE:  31c9d89

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PpmIdleExecuteTransition+927

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4269a790

IMAGE_VERSION:  10.0.18362.657

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  927

FAILURE_BUCKET_ID:  AV_CODE_AV_nt!PpmIdleExecuteTransition

BUCKET_ID:  AV_CODE_AV_nt!PpmIdleExecuteTransition

PRIMARY_PROBLEM_CLASS:  AV_CODE_AV_nt!PpmIdleExecuteTransition

TARGET_TIME:  2020-02-12T21:10:52.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  8c65

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_code_av_nt!ppmidleexecutetransition

FAILURE_ID_HASH:  {3d77750b-80a6-c195-659c-ebcffecd3d05}

Followup:     MachineOwner
---------
  • Ryzen Master, MSI yazılımlarını kaldır.
  • Virüs taraması yap.
  • Sanallaştırma açık ise kapat.
  • DDU ile ekran kartı sürücüsünü kaldır tekrar yükle.
  • Memtest86 testi yap.

Kod:
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffc8012ed9c080, The address of the thread.
Arg2: fffff8074de65bb0, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffc8012ed9c080

BUGCHECK_P2: fffff8074de65bb0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x192

PROCESS_NAME:  LEDKeeper.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-10-2020 20:46:39.0416

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8074da39e37 to fffff8074dbc14e0

STACK_TEXT: 
ffffd981`3022f738 fffff807`4da39e37 : 00000000`00000192 ffffc801`2ed9c080 fffff807`4de65bb0 00000000`00000000 : nt!KeBugCheckEx
ffffd981`3022f740 fffff807`4dfee780 : ffffd981`3022f930 fffff807`00000000 00000000`00001058 fffff807`4de65bc0 : nt!ExAcquirePushLockSharedEx+0x147
ffffd981`3022f780 fffff807`4dff65bc : 00000000`00000007 ffffd981`3022f930 00000000`00000000 ffffd981`3022fb01 : nt!CmpCallCallBacksEx+0xe0
ffffd981`3022f890 fffff807`4dbd2d18 : ffffc801`2ed9c080 00000000`08a3e1d8 ffffd981`3022faa8 00000000`00000000 : nt!NtQueryKey+0x3bc
ffffd981`3022fa90 00007ffb`b33bc384 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`08a3e3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b33bc384


THREAD_SHA1_HASH_MOD_FUNC:  5e69771f2fb64443fcd9f414d5ef970e5deb8ec6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  4e672a2b177d1ada6ed4e5bbea4c534759a91d6e

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!ExAcquirePushLockSharedEx+147
fffff807`4da39e37 cc              int     3

FAULT_INSTR_CODE:  8b8b48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExAcquirePushLockSharedEx+147

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  29371fe3

IMAGE_VERSION:  10.0.18362.628

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  147

FAILURE_BUCKET_ID:  0x192_nt!ExAcquirePushLockSharedEx

BUCKET_ID:  0x192_nt!ExAcquirePushLockSharedEx

PRIMARY_PROBLEM_CLASS:  0x192_nt!ExAcquirePushLockSharedEx

TARGET_TIME:  2020-02-10T16:46:09.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  26f8

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x192_nt!exacquirepushlocksharedex

FAILURE_ID_HASH:  {292e4563-5d10-0ceb-86fc-152da5e999ce}

Followup:     MachineOwner
---------


APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff8015c8d39f0, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 00000000ffff0000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: fffff8015c8d39f0

BUGCHECK_P2: 0

BUGCHECK_P3: ffff0000

BUGCHECK_P4: 1

FAULTING_IP:
nt!ExpWnfWorkItemRoutine+0
fffff801`5c8d39f0 4883ec28        sub     rsp,28h

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-10-2020 20:46:36.0432

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8015c42b5ad to fffff8015c3c14e0

STACK_TEXT: 
ffffd18f`67d72b68 fffff801`5c42b5ad : 00000000`00000001 fffff801`5c8d39f0 00000000`00000000 00000000`ffff0000 : nt!KeBugCheckEx
ffffd18f`67d72b70 fffff801`5c32a7a5 : ffffe60e`1eda0040 00000000`00000080 ffffe60e`0d870280 00000000`00000000 : nt!ExpWorkerThread+0x16e61d
ffffd18f`67d72c10 fffff801`5c3c8b2a : ffffd601`b43c1180 ffffe60e`1eda0040 fffff801`5c32a750 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffd18f`67d72c60 00000000`00000000 : ffffd18f`67d73000 ffffd18f`67d6d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  abb52af8f664ebdb0a7322917295d92230a3de05

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e582783d64de53ea39b28692770c41b4dc51541f

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!ExpWnfWorkItemRoutine+0
fffff801`5c8d39f0 4883ec28        sub     rsp,28h

FAULT_INSTR_CODE:  28ec8348

SYMBOL_NAME:  nt!ExpWnfWorkItemRoutine+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  29371fe3

IMAGE_VERSION:  10.0.18362.628

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x1_SysCallNum_0_nt!ExpWnfWorkItemRoutine

BUCKET_ID:  0x1_SysCallNum_0_nt!ExpWnfWorkItemRoutine

PRIMARY_PROBLEM_CLASS:  0x1_SysCallNum_0_nt!ExpWnfWorkItemRoutine

TARGET_TIME:  2020-02-09T19:37:06.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2920

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1_syscallnum_0_nt!expwnfworkitemroutine

FAILURE_ID_HASH:  {10e36050-f896-7f32-c18d-23b6c4b2f487}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80430719a81, Address of the instruction which caused the bugcheck
Arg3: ffffa28ecf44b010, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for WdFilter.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80430719a81

BUGCHECK_P3: ffffa28ecf44b010

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
Ntfs!NtfsCleanupIrpContext+221
fffff804`30719a81 488b10          mov     rdx,qword ptr [rax]

CONTEXT:  ffffa28ecf44b010 -- (.cxr 0xffffa28ecf44b010)
rax=00010000000015fa rbx=ffffa28ecf44bd20 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffa28ecf44bd58
rip=fffff80430719a81 rsp=ffffa28ecf44ba00 rbp=0000000000000000
 r8=00000000ffffffff  r9=7fffa50cbfafa408 r10=7ffffffffffffffc
r11=ffffa28ecf44b9f8 r12=ffffcc0cf8934528 r13=0000000000000000
r14=ffffcc0cf89341b0 r15=ffffa28ecf44bdc0
iopl=0         nv up ei pl nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050207
Ntfs!NtfsCleanupIrpContext+0x221:
fffff804`30719a81 488b10          mov     rdx,qword ptr [rax] ds:002b:00010000`000015fa=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  MsMpEng.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-10-2020 20:46:33.0150

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff804307196cf to fffff80430719a81

STACK_TEXT: 
ffffa28e`cf44ba00 fffff804`307196cf : ffffa50c`bf562900 fffff804`00000001 ffffa28e`cf44bd20 00000000`00000000 : Ntfs!NtfsCleanupIrpContext+0x221
ffffa28e`cf44ba60 fffff804`30819a00 : 00000000`00000000 ffffcc0d`06ecfde0 00000000`00000000 ffffcc0d`06ecfde0 : Ntfs!NtfsExtendedCompleteRequestInternal+0x13f
ffffa28e`cf44bad0 fffff804`308184a1 : ffffa28e`cf44bd20 ffffa50c`c7d739c0 ffffa50c`000000ba 00000000`00000002 : Ntfs!NtfsCommonQueryInformation+0xf80
ffffa28e`cf44bbd0 fffff804`30818a60 : ffffa28e`cf44bd20 ffffa50c`c7d739c0 ffffa50c`c7d739c0 ffffa50c`bf8f9718 : Ntfs!NtfsFsdDispatchSwitch+0x141
ffffa28e`cf44bd00 fffff804`2ba31f79 : 00000000`00000000 fffff804`2bb00740 00000000`0000000b ffff0da0`b642b304 : Ntfs!NtfsFsdDispatchWait+0x40
ffffa28e`cf44bfa0 fffff804`2fd1e99c : ffffa50c`c79b52f0 00000000`00000000 ffffa50c`cdaa0c10 ffffa50c`c9f5331c : nt!IofCallDriver+0x59
ffffa28e`cf44bfe0 fffff804`2fd1e6b9 : 00000000`00000000 ffffa50c`c79b52f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpGetFileName+0x19c
ffffa28e`cf44c080 fffff804`2fd1e430 : ffffcc0c`f8934100 ffffa50c`c79b52f0 ffffa50c`c32fc6c8 fffff804`2ba6b465 : FLTMGR!FltpCallOpenedFileNameHandler+0x39
ffffa28e`cf44c0e0 fffff804`2fd1df71 : ffffa50c`c79b52f0 00000000`00000000 00000000`00000000 ffffa50c`c32fc6c8 : FLTMGR!FltpGetNormalizedFileNameWorker+0x30
ffffa28e`cf44c130 fffff804`2fce74cf : ffffa28e`cf44d000 ffffa28e`cf447000 ffffa50c`cdaa0c10 ffffa50c`c32fc6c8 : FLTMGR!FltpCreateFileNameInformation+0xf1
ffffa28e`cf44c190 fffff804`2fce8325 : 00000000`00008000 ffffcc0c`ffff7fff ffffa50c`c32fc660 00000000`00000000 : FLTMGR!FltpGetFileNameInformation+0x4bf
ffffa28e`cf44c230 fffff804`3ea2e487 : ffffa28e`cf44c448 ffffa50c`cc079700 00000000`00000004 fffff804`2baa09a6 : FLTMGR!FltGetFileNameInformation+0x195
ffffa28e`cf44c2b0 fffff804`2fd1e6fe : 00000000`00003000 ffffa50c`c759f260 ffffa50c`cc079700 fffff804`2baa077e : luafv!LuafvGenerateFileName+0x57
ffffa28e`cf44c2e0 fffff804`2fd1e430 : ffffcc0c`f8934100 ffffa50c`cc079700 ffffa50c`c32fc6c8 fffff804`2ba6b465 : FLTMGR!FltpCallOpenedFileNameHandler+0x7e
ffffa28e`cf44c340 fffff804`2fd1df71 : ffffa50c`cc079700 00000000`00000000 00000000`00000000 ffffa50c`c32fc6c8 : FLTMGR!FltpGetNormalizedFileNameWorker+0x30
ffffa28e`cf44c390 fffff804`2fce74cf : ffffa28e`cf44d000 ffffa28e`cf447000 ffffa50c`cdaa0c10 ffffa50c`c32fc6c8 : FLTMGR!FltpCreateFileNameInformation+0xf1
ffffa28e`cf44c3f0 fffff804`2fce8325 : 00000000`00008000 ffffa50c`ffff7fff ffffa50c`c32fc660 ffffa50c`c60c2010 : FLTMGR!FltpGetFileNameInformation+0x4bf
ffffa28e`cf44c490 fffff804`306da09a : ffffa28e`cf44c618 ffffa50c`c65680f8 ffffa50c`c32fc660 ffffa50c`c65680f8 : FLTMGR!FltGetFileNameInformation+0x195
ffffa28e`cf44c510 ffffa28e`cf44c618 : ffffa50c`c65680f8 ffffa50c`c32fc660 ffffa50c`c65680f8 ffffa28e`cf44c600 : WdFilter+0x3a09a
ffffa28e`cf44c518 ffffa50c`c65680f8 : ffffa50c`c32fc660 ffffa50c`c65680f8 ffffa28e`cf44c600 00000000`00000000 : 0xffffa28e`cf44c618
ffffa28e`cf44c520 ffffa50c`c32fc660 : ffffa50c`c65680f8 ffffa28e`cf44c600 00000000`00000000 ffffa28e`cf44c688 : 0xffffa50c`c65680f8
ffffa28e`cf44c528 ffffa50c`c65680f8 : ffffa28e`cf44c600 00000000`00000000 ffffa28e`cf44c688 fffff804`306da03a : 0xffffa50c`c32fc660
ffffa28e`cf44c530 ffffa28e`cf44c600 : 00000000`00000000 ffffa28e`cf44c688 fffff804`306da03a ffffa50c`c65680f8 : 0xffffa50c`c65680f8
ffffa28e`cf44c538 00000000`00000000 : ffffa28e`cf44c688 fffff804`306da03a ffffa50c`c65680f8 00000000`00000000 : 0xffffa28e`cf44c600


THREAD_SHA1_HASH_MOD_FUNC:  cfa66520a66b412456d5c69544130de72c5f7111

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0217f078f2a472046edead16c595337a005d9424

THREAD_SHA1_HASH_MOD:  a6a06051b0876c1d7b117f1d0b30f134853e0c32

FOLLOWUP_IP:
luafv!LuafvGenerateFileName+57
fffff804`3ea2e487 8bd8            mov     ebx,eax

FAULT_INSTR_CODE:  c085d88b

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  luafv!LuafvGenerateFileName+57

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: luafv

IMAGE_NAME:  luafv.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  8a8e82a

IMAGE_VERSION:  10.0.18362.53

STACK_COMMAND:  .cxr 0xffffa28ecf44b010 ; kb

BUCKET_ID_FUNC_OFFSET:  57

FAILURE_BUCKET_ID:  0x3B_c0000005_luafv!LuafvGenerateFileName

BUCKET_ID:  0x3B_c0000005_luafv!LuafvGenerateFileName

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_luafv!LuafvGenerateFileName

TARGET_TIME:  2020-02-06T14:02:30.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  99f5

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_luafv!luafvgeneratefilename

FAILURE_ID_HASH:  {528d35d3-ff80-5f65-e340-8b82fd9b5a30}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80540db0088, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000b7, value 0 = read operation, 1 = write operation
Arg4: fffff80540db0088, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: fffff80540db0088

BUGCHECK_P2: ff

BUGCHECK_P3: b7

BUGCHECK_P4: fffff80540db0088

CURRENT_IRQL:  0

FAULTING_IP:
+0
fffff805`40db0088 ??              ???

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BUGCHECK_STR:  DISABLED_INTERRUPT_FAULT

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-10-2020 20:46:29.0383

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff6889eaa7610 -- (.trap 0xfffff6889eaa7610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80540db0088 rbx=0000000000000000 rcx=ffff840a468f9188
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80540db0088 rsp=fffff6889eaa77a8 rbp=ffff840a468de010
 r8=0000000000000001  r9=ffff840a468f90d0 r10=0000fffff80540db
r11=ffffd37d42600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
fffff805`40db0088 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80563bd32e9 to fffff80563bc14e0

STACK_TEXT: 
fffff688`9eaa74c8 fffff805`63bd32e9 : 00000000`0000000a fffff805`40db0088 00000000`000000ff 00000000`000000b7 : nt!KeBugCheckEx
fffff688`9eaa74d0 fffff805`63bcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff688`9eaa7610 fffff805`40db0088 : fffff805`6750a863 ffff840a`424cfec0 00000000`00989680 ffffe381`907c5100 : nt!KiPageFault+0x46b
fffff688`9eaa77a8 fffff805`6750a863 : ffff840a`424cfec0 00000000`00989680 ffffe381`907c5100 000032f9`05d26bb3 : 0xfffff805`40db0088
fffff688`9eaa77b0 fffff805`63a21e7c : 00000000`00000035 00000000`00000000 ffff840a`468de010 00000000`00000035 : amdppm!AcpiCStateIdleExecute+0x23
fffff688`9eaa77e0 fffff805`63a215ce : 00000000`00000003 00000000`00000002 ffff840a`468de100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c
fffff688`9eaa7b00 fffff805`63bc4fe8 : ffffffff`00000000 ffffe381`907c5180 ffff840a`4be61080 00000000`00000d14 : nt!PoIdle+0x36e
fffff688`9eaa7c60 00000000`00000000 : fffff688`9eaa8000 fffff688`9eaa2000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  202d15306e0cc33d1baba638b271a0a711a33f51

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5353dcac572e4947ce17e9703e4373879184aa42

THREAD_SHA1_HASH_MOD:  6f8028aef8dcafa1703c129d6f17905076f3b53a

FOLLOWUP_IP:
amdppm!AcpiCStateIdleExecute+23
fffff805`6750a863 90              nop

FAULT_INSTR_CODE:  48c03390

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  amdppm!AcpiCStateIdleExecute+23

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: amdppm

IMAGE_NAME:  amdppm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.387

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  23

FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!AcpiCStateIdleExecute

BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!AcpiCStateIdleExecute

PRIMARY_PROBLEM_CLASS:  DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!AcpiCStateIdleExecute

TARGET_TIME:  2020-02-05T02:12:26.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  9a34

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:disabled_interrupt_fault_code_av_amdppm!acpicstateidleexecute

FAILURE_ID_HASH:  {ecc2fd4d-3006-9cb6-c7fc-79e201867827}

Followup:     MachineOwner
---------
 
  • Ryzen Master, MSI yazılımlarını kaldır.
  • Virüs taraması yap.
  • Sanallaştırma açık ise kapat.
  • DDU ile ekran kartı sürücüsünü kaldır tekrar yükle.
  • Memtest86 testi yap.

Kod:
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffc8012ed9c080, The address of the thread.
Arg2: fffff8074de65bb0, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffc8012ed9c080

BUGCHECK_P2: fffff8074de65bb0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x192

PROCESS_NAME:  LEDKeeper.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-10-2020 20:46:39.0416

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8074da39e37 to fffff8074dbc14e0

STACK_TEXT:
ffffd981`3022f738 fffff807`4da39e37 : 00000000`00000192 ffffc801`2ed9c080 fffff807`4de65bb0 00000000`00000000 : nt!KeBugCheckEx
ffffd981`3022f740 fffff807`4dfee780 : ffffd981`3022f930 fffff807`00000000 00000000`00001058 fffff807`4de65bc0 : nt!ExAcquirePushLockSharedEx+0x147
ffffd981`3022f780 fffff807`4dff65bc : 00000000`00000007 ffffd981`3022f930 00000000`00000000 ffffd981`3022fb01 : nt!CmpCallCallBacksEx+0xe0
ffffd981`3022f890 fffff807`4dbd2d18 : ffffc801`2ed9c080 00000000`08a3e1d8 ffffd981`3022faa8 00000000`00000000 : nt!NtQueryKey+0x3bc
ffffd981`3022fa90 00007ffb`b33bc384 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`08a3e3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b33bc384


THREAD_SHA1_HASH_MOD_FUNC:  5e69771f2fb64443fcd9f414d5ef970e5deb8ec6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  4e672a2b177d1ada6ed4e5bbea4c534759a91d6e

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!ExAcquirePushLockSharedEx+147
fffff807`4da39e37 cc              int     3

FAULT_INSTR_CODE:  8b8b48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExAcquirePushLockSharedEx+147

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  29371fe3

IMAGE_VERSION:  10.0.18362.628

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  147

FAILURE_BUCKET_ID:  0x192_nt!ExAcquirePushLockSharedEx

BUCKET_ID:  0x192_nt!ExAcquirePushLockSharedEx

PRIMARY_PROBLEM_CLASS:  0x192_nt!ExAcquirePushLockSharedEx

TARGET_TIME:  2020-02-10T16:46:09.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  26f8

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x192_nt!exacquirepushlocksharedex

FAILURE_ID_HASH:  {292e4563-5d10-0ceb-86fc-152da5e999ce}

Followup:     MachineOwner
---------


APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff8015c8d39f0, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 00000000ffff0000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: fffff8015c8d39f0

BUGCHECK_P2: 0

BUGCHECK_P3: ffff0000

BUGCHECK_P4: 1

FAULTING_IP:
nt!ExpWnfWorkItemRoutine+0
fffff801`5c8d39f0 4883ec28        sub     rsp,28h

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-10-2020 20:46:36.0432

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8015c42b5ad to fffff8015c3c14e0

STACK_TEXT:
ffffd18f`67d72b68 fffff801`5c42b5ad : 00000000`00000001 fffff801`5c8d39f0 00000000`00000000 00000000`ffff0000 : nt!KeBugCheckEx
ffffd18f`67d72b70 fffff801`5c32a7a5 : ffffe60e`1eda0040 00000000`00000080 ffffe60e`0d870280 00000000`00000000 : nt!ExpWorkerThread+0x16e61d
ffffd18f`67d72c10 fffff801`5c3c8b2a : ffffd601`b43c1180 ffffe60e`1eda0040 fffff801`5c32a750 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffd18f`67d72c60 00000000`00000000 : ffffd18f`67d73000 ffffd18f`67d6d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  abb52af8f664ebdb0a7322917295d92230a3de05

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e582783d64de53ea39b28692770c41b4dc51541f

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!ExpWnfWorkItemRoutine+0
fffff801`5c8d39f0 4883ec28        sub     rsp,28h

FAULT_INSTR_CODE:  28ec8348

SYMBOL_NAME:  nt!ExpWnfWorkItemRoutine+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  29371fe3

IMAGE_VERSION:  10.0.18362.628

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x1_SysCallNum_0_nt!ExpWnfWorkItemRoutine

BUCKET_ID:  0x1_SysCallNum_0_nt!ExpWnfWorkItemRoutine

PRIMARY_PROBLEM_CLASS:  0x1_SysCallNum_0_nt!ExpWnfWorkItemRoutine

TARGET_TIME:  2020-02-09T19:37:06.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2920

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1_syscallnum_0_nt!expwnfworkitemroutine

FAILURE_ID_HASH:  {10e36050-f896-7f32-c18d-23b6c4b2f487}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80430719a81, Address of the instruction which caused the bugcheck
Arg3: ffffa28ecf44b010, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for WdFilter.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80430719a81

BUGCHECK_P3: ffffa28ecf44b010

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
Ntfs!NtfsCleanupIrpContext+221
fffff804`30719a81 488b10          mov     rdx,qword ptr [rax]

CONTEXT:  ffffa28ecf44b010 -- (.cxr 0xffffa28ecf44b010)
rax=00010000000015fa rbx=ffffa28ecf44bd20 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffa28ecf44bd58
rip=fffff80430719a81 rsp=ffffa28ecf44ba00 rbp=0000000000000000
r8=00000000ffffffff  r9=7fffa50cbfafa408 r10=7ffffffffffffffc
r11=ffffa28ecf44b9f8 r12=ffffcc0cf8934528 r13=0000000000000000
r14=ffffcc0cf89341b0 r15=ffffa28ecf44bdc0
iopl=0         nv up ei pl nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050207
Ntfs!NtfsCleanupIrpContext+0x221:
fffff804`30719a81 488b10          mov     rdx,qword ptr [rax] ds:002b:00010000`000015fa=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  MsMpEng.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-10-2020 20:46:33.0150

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff804307196cf to fffff80430719a81

STACK_TEXT:
ffffa28e`cf44ba00 fffff804`307196cf : ffffa50c`bf562900 fffff804`00000001 ffffa28e`cf44bd20 00000000`00000000 : Ntfs!NtfsCleanupIrpContext+0x221
ffffa28e`cf44ba60 fffff804`30819a00 : 00000000`00000000 ffffcc0d`06ecfde0 00000000`00000000 ffffcc0d`06ecfde0 : Ntfs!NtfsExtendedCompleteRequestInternal+0x13f
ffffa28e`cf44bad0 fffff804`308184a1 : ffffa28e`cf44bd20 ffffa50c`c7d739c0 ffffa50c`000000ba 00000000`00000002 : Ntfs!NtfsCommonQueryInformation+0xf80
ffffa28e`cf44bbd0 fffff804`30818a60 : ffffa28e`cf44bd20 ffffa50c`c7d739c0 ffffa50c`c7d739c0 ffffa50c`bf8f9718 : Ntfs!NtfsFsdDispatchSwitch+0x141
ffffa28e`cf44bd00 fffff804`2ba31f79 : 00000000`00000000 fffff804`2bb00740 00000000`0000000b ffff0da0`b642b304 : Ntfs!NtfsFsdDispatchWait+0x40
ffffa28e`cf44bfa0 fffff804`2fd1e99c : ffffa50c`c79b52f0 00000000`00000000 ffffa50c`cdaa0c10 ffffa50c`c9f5331c : nt!IofCallDriver+0x59
ffffa28e`cf44bfe0 fffff804`2fd1e6b9 : 00000000`00000000 ffffa50c`c79b52f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpGetFileName+0x19c
ffffa28e`cf44c080 fffff804`2fd1e430 : ffffcc0c`f8934100 ffffa50c`c79b52f0 ffffa50c`c32fc6c8 fffff804`2ba6b465 : FLTMGR!FltpCallOpenedFileNameHandler+0x39
ffffa28e`cf44c0e0 fffff804`2fd1df71 : ffffa50c`c79b52f0 00000000`00000000 00000000`00000000 ffffa50c`c32fc6c8 : FLTMGR!FltpGetNormalizedFileNameWorker+0x30
ffffa28e`cf44c130 fffff804`2fce74cf : ffffa28e`cf44d000 ffffa28e`cf447000 ffffa50c`cdaa0c10 ffffa50c`c32fc6c8 : FLTMGR!FltpCreateFileNameInformation+0xf1
ffffa28e`cf44c190 fffff804`2fce8325 : 00000000`00008000 ffffcc0c`ffff7fff ffffa50c`c32fc660 00000000`00000000 : FLTMGR!FltpGetFileNameInformation+0x4bf
ffffa28e`cf44c230 fffff804`3ea2e487 : ffffa28e`cf44c448 ffffa50c`cc079700 00000000`00000004 fffff804`2baa09a6 : FLTMGR!FltGetFileNameInformation+0x195
ffffa28e`cf44c2b0 fffff804`2fd1e6fe : 00000000`00003000 ffffa50c`c759f260 ffffa50c`cc079700 fffff804`2baa077e : luafv!LuafvGenerateFileName+0x57
ffffa28e`cf44c2e0 fffff804`2fd1e430 : ffffcc0c`f8934100 ffffa50c`cc079700 ffffa50c`c32fc6c8 fffff804`2ba6b465 : FLTMGR!FltpCallOpenedFileNameHandler+0x7e
ffffa28e`cf44c340 fffff804`2fd1df71 : ffffa50c`cc079700 00000000`00000000 00000000`00000000 ffffa50c`c32fc6c8 : FLTMGR!FltpGetNormalizedFileNameWorker+0x30
ffffa28e`cf44c390 fffff804`2fce74cf : ffffa28e`cf44d000 ffffa28e`cf447000 ffffa50c`cdaa0c10 ffffa50c`c32fc6c8 : FLTMGR!FltpCreateFileNameInformation+0xf1
ffffa28e`cf44c3f0 fffff804`2fce8325 : 00000000`00008000 ffffa50c`ffff7fff ffffa50c`c32fc660 ffffa50c`c60c2010 : FLTMGR!FltpGetFileNameInformation+0x4bf
ffffa28e`cf44c490 fffff804`306da09a : ffffa28e`cf44c618 ffffa50c`c65680f8 ffffa50c`c32fc660 ffffa50c`c65680f8 : FLTMGR!FltGetFileNameInformation+0x195
ffffa28e`cf44c510 ffffa28e`cf44c618 : ffffa50c`c65680f8 ffffa50c`c32fc660 ffffa50c`c65680f8 ffffa28e`cf44c600 : WdFilter+0x3a09a
ffffa28e`cf44c518 ffffa50c`c65680f8 : ffffa50c`c32fc660 ffffa50c`c65680f8 ffffa28e`cf44c600 00000000`00000000 : 0xffffa28e`cf44c618
ffffa28e`cf44c520 ffffa50c`c32fc660 : ffffa50c`c65680f8 ffffa28e`cf44c600 00000000`00000000 ffffa28e`cf44c688 : 0xffffa50c`c65680f8
ffffa28e`cf44c528 ffffa50c`c65680f8 : ffffa28e`cf44c600 00000000`00000000 ffffa28e`cf44c688 fffff804`306da03a : 0xffffa50c`c32fc660
ffffa28e`cf44c530 ffffa28e`cf44c600 : 00000000`00000000 ffffa28e`cf44c688 fffff804`306da03a ffffa50c`c65680f8 : 0xffffa50c`c65680f8
ffffa28e`cf44c538 00000000`00000000 : ffffa28e`cf44c688 fffff804`306da03a ffffa50c`c65680f8 00000000`00000000 : 0xffffa28e`cf44c600


THREAD_SHA1_HASH_MOD_FUNC:  cfa66520a66b412456d5c69544130de72c5f7111

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0217f078f2a472046edead16c595337a005d9424

THREAD_SHA1_HASH_MOD:  a6a06051b0876c1d7b117f1d0b30f134853e0c32

FOLLOWUP_IP:
luafv!LuafvGenerateFileName+57
fffff804`3ea2e487 8bd8            mov     ebx,eax

FAULT_INSTR_CODE:  c085d88b

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  luafv!LuafvGenerateFileName+57

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: luafv

IMAGE_NAME:  luafv.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  8a8e82a

IMAGE_VERSION:  10.0.18362.53

STACK_COMMAND:  .cxr 0xffffa28ecf44b010 ; kb

BUCKET_ID_FUNC_OFFSET:  57

FAILURE_BUCKET_ID:  0x3B_c0000005_luafv!LuafvGenerateFileName

BUCKET_ID:  0x3B_c0000005_luafv!LuafvGenerateFileName

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_luafv!LuafvGenerateFileName

TARGET_TIME:  2020-02-06T14:02:30.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  99f5

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_luafv!luafvgeneratefilename

FAILURE_ID_HASH:  {528d35d3-ff80-5f65-e340-8b82fd9b5a30}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80540db0088, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000b7, value 0 = read operation, 1 = write operation
Arg4: fffff80540db0088, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: fffff80540db0088

BUGCHECK_P2: ff

BUGCHECK_P3: b7

BUGCHECK_P4: fffff80540db0088

CURRENT_IRQL:  0

FAULTING_IP:
+0
fffff805`40db0088 ??              ???

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BUGCHECK_STR:  DISABLED_INTERRUPT_FAULT

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-10-2020 20:46:29.0383

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff6889eaa7610 -- (.trap 0xfffff6889eaa7610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80540db0088 rbx=0000000000000000 rcx=ffff840a468f9188
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80540db0088 rsp=fffff6889eaa77a8 rbp=ffff840a468de010
r8=0000000000000001  r9=ffff840a468f90d0 r10=0000fffff80540db
r11=ffffd37d42600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
fffff805`40db0088 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80563bd32e9 to fffff80563bc14e0

STACK_TEXT:
fffff688`9eaa74c8 fffff805`63bd32e9 : 00000000`0000000a fffff805`40db0088 00000000`000000ff 00000000`000000b7 : nt!KeBugCheckEx
fffff688`9eaa74d0 fffff805`63bcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff688`9eaa7610 fffff805`40db0088 : fffff805`6750a863 ffff840a`424cfec0 00000000`00989680 ffffe381`907c5100 : nt!KiPageFault+0x46b
fffff688`9eaa77a8 fffff805`6750a863 : ffff840a`424cfec0 00000000`00989680 ffffe381`907c5100 000032f9`05d26bb3 : 0xfffff805`40db0088
fffff688`9eaa77b0 fffff805`63a21e7c : 00000000`00000035 00000000`00000000 ffff840a`468de010 00000000`00000035 : amdppm!AcpiCStateIdleExecute+0x23
fffff688`9eaa77e0 fffff805`63a215ce : 00000000`00000003 00000000`00000002 ffff840a`468de100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c
fffff688`9eaa7b00 fffff805`63bc4fe8 : ffffffff`00000000 ffffe381`907c5180 ffff840a`4be61080 00000000`00000d14 : nt!PoIdle+0x36e
fffff688`9eaa7c60 00000000`00000000 : fffff688`9eaa8000 fffff688`9eaa2000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  202d15306e0cc33d1baba638b271a0a711a33f51

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5353dcac572e4947ce17e9703e4373879184aa42

THREAD_SHA1_HASH_MOD:  6f8028aef8dcafa1703c129d6f17905076f3b53a

FOLLOWUP_IP:
amdppm!AcpiCStateIdleExecute+23
fffff805`6750a863 90              nop

FAULT_INSTR_CODE:  48c03390

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  amdppm!AcpiCStateIdleExecute+23

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: amdppm

IMAGE_NAME:  amdppm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.387

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  23

FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!AcpiCStateIdleExecute

BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!AcpiCStateIdleExecute

PRIMARY_PROBLEM_CLASS:  DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!AcpiCStateIdleExecute

TARGET_TIME:  2020-02-05T02:12:26.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  9a34

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:disabled_interrupt_fault_code_av_amdppm!acpicstateidleexecute

FAILURE_ID_HASH:  {ecc2fd4d-3006-9cb6-c7fc-79e201867827}

Followup:     MachineOwner
---------
Memtest86 yerine Windows'un bellek tanılama aracı olur mu?
 
USB yok şu an elimde ne yazık ki, anca yarın sonucu atabilirim o zaman.
Güvenli mod da açıp mavi ekran verip vermediğine bakın vermiyorsa sürücü sorunudur veriyorsa ya Windows ya da donanımdır.
Her mavi ekrandan sonra kendini güvenli mod da başlatıyor, o durumda mavi ekran verdiğini hatırlamıyorum.


Virüs taramasında bir şey çıkmadı bu arada.
 

Dosya Ekleri

  • Ekran Alıntısı.PNG
    Ekran Alıntısı.PNG
    29,1 KB · Görüntüleme: 75
Son düzenleyen: Moderatör:
Durum
Mesaj gönderimine kapalı.

Technopat Haberler

Geri
Yukarı