R3 1200 sistem mavi ekran veriyor

glbhkn

Hectopat
Katılım
26 Eylül 2020
Mesajlar
73
İşlemci AMD Ryzen 3 1200 Quad-Core Processor, 3100 MHz, 4 çekirdek, 4 mantıksal işlemci.

Yüklü fiziksel bellek (RAM) 16, 0 GB.

Temel kart ürünü A320M PRO-VH Plus(MS-7B07)

Adı NVIDIA GeForce GTX 1050 Ti 4 GB.

Özelliklerim bunlar.

Bilgisayarım yaklaşık 2-3 saat sonra mavi ekran ya da siyah ekran veriyor ve kendisini kapatıyor. Mavi ekran sorunlarını araştırdım 1 aydan beri çözmeye çalışıyorum, her türlü sorunları düzelttim ama ginede aynı hataları veriyor ya da farklı bir hata veriyor. Driverlarımın hepsi güncel her şeyi tertemiz kurdum C diskimin formatladım tamamen fakat yine de aynı sorunları yaşıyorum. Oyunlarımda hiçbir şekilde sorun yaşamıyorum FPS'ım 300'lerde CS:GO'da veya başka bir oyunda drop yemioyurm ama bir anda dediğim gibi kapanıyor ya da mavi ekran veriyor. Yardımcı olursanız sevinirim.

https://drive.google.com/file/d/1sFTr5g1r05Cktzghy55mE6YTmZip6mXN/view?usp=sharing minidump dosyalarım burada.
 
GPU-Z kaldırın. X.M.P kapalı olarak yaptıysanız testi açıp tekrar yapınız.
Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807744cb380, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
nt!KiTryUnwaitThread+50
fffff807`744cb380 f0480fba6b4000  lock bts qword ptr [rbx+40h],0

EXCEPTION_PARAMETER2:  ffffffffffffffff

BUGCHECK_STR:  0x1E_c0000005_R

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

EXCEPTION_RECORD:  1fba17458948c933 -- (.exr 0x1fba17458948c933)
Cannot read Exception record @ 1fba17458948c933

TRAP_FRAME:  0ff3000002401f45 -- (.trap 0xff3000002401f45)
Unable to read trap frame at 0ff30000`02401f45

LAST_CONTROL_TRANSFER:  from fffff807746f4d4e to fffff807745f3ea0

STACK_TEXT: 
ffffdd01`70528158 fffff807`746f4d4e : 00000000`0000001e ffffffff`c0000005 fffff807`744cb380 00000000`00000000 : nt!KeBugCheckEx
ffffdd01`70528160 fffff807`745fcd62 : fffff807`746f4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffdd01`705281a0 fffff807`74485027 : ffffdd01`70528710 00000000`00000000 ffff8e01`dec37c60 fffff807`745f7a0e : nt!RtlpExecuteHandlerForException+0x12
ffffdd01`705281d0 fffff807`74483ce6 : ffff8e01`dec37598 ffffdd01`70528e20 ffff8e01`dec37598 ffffbc07`13abd100 : nt!RtlDispatchException+0x297
ffffdd01`705288f0 fffff807`745f4d32 : 1fba1745`8948c933 c7076589`44000200 0ff30000`02401f45 20247489`4c27457f : nt!KiDispatchException+0x186
ffffdd01`70528fb0 fffff807`745f4d00 : fffff807`74605fa5 00000000`00000000 00000000`00000003 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8e01`dec37458 fffff807`74605fa5 : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8e01`dec37460 fffff807`74601ce0 : fffff807`7443fff0 fffff807`7443b310 00000000`00000000 ffffbc07`0f7d29a8 : nt!KiExceptionDispatch+0x125
ffff8e01`dec37640 fffff807`744cb380 : 00000000`00000000 ffffbc07`0dbfaae0 00000000`00000001 00000000`00989680 : nt!KiGeneralProtectionFault+0x320
ffff8e01`dec377d0 fffff807`744c42a6 : ffffbc07`13abd188 00000000`00000000 ffffbc07`13abd250 00000000`00000000 : nt!KiTryUnwaitThread+0x50
ffff8e01`dec37830 fffff807`744c3e4c : ffffbc07`13abd180 00000000`00000000 ffff8e01`dec37b18 00000000`00000000 : nt!KiTimerWaitTest+0x1e6
ffff8e01`dec378e0 fffff807`744e9509 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0000aacd : nt!KiProcessExpiredTimerList+0xdc
ffff8e01`dec379d0 fffff807`745f7a0e : ffffffff`00000000 ffffdd01`70508180 ffffdd01`70513140 ffffbc07`141c1080 : nt!KiRetireDpcList+0x9d9
ffff8e01`dec37c60 00000000`00000000 : ffff8e01`dec38000 ffff8e01`dec32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff807745963ae-fffff807745963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:60 fe fc f9 ]
    fffff807745f72ac-fffff807745f72ad  2 bytes - nt!KiIsrLinkage+43b (+0x60efe)
    [ 48 ff:4c 8b ]
    fffff807745f72b3-fffff807745f72b6  4 bytes - nt!KiIsrLinkage+442 (+0x07)
    [ 0f 1f 44 00:e8 68 e1 61 ]
    fffff807745f76b0-fffff807745f76b4  5 bytes - nt!KiCallUserMode+220 (+0x3fd)
    [ ff e1 cc cc cc:e8 0b da 61 00 ]
15 errors : !nt (fffff807745963ae-fffff807745f76b4)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80329c4e0e7, The address that the exception occurred at
Arg3: fffff40ec86298d8, Exception Record Address
Arg4: ffffc601b19e2920, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
nt!KeDeleteThread+1ca8cf
fffff803`29c4e0e7 48397908        cmp     qword ptr [rcx+8],rdi

EXCEPTION_RECORD:  fffff40ec86298d8 -- (.exr 0xfffff40ec86298d8)
ExceptionAddress: fffff80329c4e0e7 (nt!KeDeleteThread+0x00000000001ca8cf)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffc601b19e2920 -- (.cxr 0xffffc601b19e2920;r)
rax=0400000000000000 rbx=ffffd70b160b3080 rcx=0400000000000001
rdx=0000000000001000 rsi=0000000000000000 rdi=ffffd70b160b3470
rip=fffff80329c4e0e7 rsp=fffff40ec8629b10 rbp=ffffffffffffffff
 r8=000000000000000c  r9=ffffc601b19c2180 r10=0000fffff80329a8
r11=ffffb5f987400000 r12=0000000000000b00 r13=0000000000000000
r14=0000000000000000 r15=fffff8032a524440
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!KeDeleteThread+0x1ca8cf:
fffff803`29c4e0e7 48397908        cmp     qword ptr [rcx+8],rdi ds:002b:04000000`00000009=????????????????
Last set context:
rax=0400000000000000 rbx=ffffd70b160b3080 rcx=0400000000000001
rdx=0000000000001000 rsi=0000000000000000 rdi=ffffd70b160b3470
rip=fffff80329c4e0e7 rsp=fffff40ec8629b10 rbp=ffffffffffffffff
 r8=000000000000000c  r9=ffffc601b19c2180 r10=0000fffff80329a8
r11=ffffb5f987400000 r12=0000000000000b00 r13=0000000000000000
r14=0000000000000000 r15=fffff8032a524440
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!KeDeleteThread+0x1ca8cf:
fffff803`29c4e0e7 48397908        cmp     qword ptr [rcx+8],rdi ds:002b:04000000`00000009=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  System

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 ffffffffffffffff

FOLLOWUP_IP:
nt!KeDeleteThread+1ca8cf
fffff803`29c4e0e7 48397908        cmp     qword ptr [rcx+8],rdi

BUGCHECK_STR:  AV

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

EXCEPTION_STR:  0x0

LAST_CONTROL_TRANSFER:  from fffff80329a836ac to fffff80329c4e0e7

STACK_TEXT: 
fffff40e`c8629b10 fffff803`29a836ac : ffffd70b`160b34d8 fffff803`29a83680 00000000`00000000 00000000`00000b00 : nt!KeDeleteThread+0x1ca8cf
fffff40e`c8629b40 fffff803`29ac1f15 : ffffd70b`0dc27540 ffffd70b`0ac6ecf0 ffffd70b`0ac6ecf0 ffffd70b`00000000 : nt!PspReaper+0x2c
fffff40e`c8629b70 fffff803`29a66dd5 : ffffd70b`0dc27540 00000000`00000080 ffffd70b`0ac8a080 00000000`00000001 : nt!ExpWorkerThread+0x105
fffff40e`c8629c10 fffff803`29bfb4f8 : ffffc601`b1908180 ffffd70b`0dc27540 fffff803`29a66d80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff40e`c8629c60 00000000`00000000 : fffff40e`c862a000 fffff40e`c8624000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80329b963ae-fffff80329b963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:00 3a 74 e8 ]
4 errors : !nt (fffff80329b963ae-fffff80329b963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffffc601b19e2920 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8067b5f6ce8, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8067b5f6ce8, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 fffff8067b5f6ce8

CURRENT_IRQL:  0

FAULTING_IP:
+64bd760751e9359
fffff806`7b5f6ce8 ??              ???

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BUGCHECK_STR:  DISABLED_INTERRUPT_FAULT

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  System

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

DPC_STACK_BASE:  FFFF91073F23EFB0

TRAP_FRAME:  ffff91073f237aa0 -- (.trap 0xffff91073f237aa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8067b5f6ce8 rsp=ffff91073f237c38 rbp=0000000000000000
 r8=0000000000000008  r9=0000000000000000 r10=0000fffff8068e81
r11=ffffaf79f4400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na pe nc
fffff806`7b5f6ce8 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8067f605e69 to fffff8067f5f3ea0

FAILED_INSTRUCTION_ADDRESS:
+64bd760751e9359
fffff806`7b5f6ce8 ??              ???

STACK_TEXT: 
ffff9107`3f237958 fffff806`7f605e69 : 00000000`0000000a fffff806`7b5f6ce8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff9107`3f237960 fffff806`7f602169 : 00000000`00000001 00000000`00000000 ffffbf81`edd08180 ffffd08f`e3328010 : nt!KiBugCheckDispatch+0x69
ffff9107`3f237aa0 fffff806`7b5f6ce8 : fffff806`7f5f79ca 00000000`00000010 00000000`00040282 ffff9107`3f237c60 : nt!KiPageFault+0x469
ffff9107`3f237c38 fffff806`7f5f79ca : 00000000`00000010 00000000`00040282 ffff9107`3f237c60 00000000`00000018 : 0xfffff806`7b5f6ce8
ffff9107`3f237c40 ffffbf81`edd13140 : ffffd08f`e6c92080 00000000`00000763 ffff9107`3f237c90 00000000`00000000 : nt!KiIdleLoop+0x5a
ffff9107`3f237c70 ffffd08f`e6c92080 : 00000000`00000763 ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 : 0xffffbf81`edd13140
ffff9107`3f237c78 00000000`00000763 : ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 : 0xffffd08f`e6c92080
ffff9107`3f237c80 ffff9107`3f237c90 : 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 : 0x763
ffff9107`3f237c88 00000000`00000000 : ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 00000000`00000000 : 0xffff9107`3f237c90


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8067f5963ae-fffff8067f5963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:e0 e1 c3 87 ]
4 errors : !nt (fffff8067f5963ae-fffff8067f5963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
 
DRIVER_IRQL_NOT_LESS_OR_EQUEL hatası driver hatasıdır bende de uzun bir süre vardı ekran kartımın driverını silip eski bir driverını kurunca düzelmişti. Genelde ekran kartı driverıyla alakalı oluyor ama başka bir driver da olabilir.
 
GPU-Z kaldırın. X. M.P kapalı olarak yaptıysanız testi açıp tekrar yapınız.
Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff807744cb380, The address that the exception occurred at.
Arg3: 0000000000000000, Parameter 0 of the exception.
Arg4: ffffffffffffffff, Parameter 1 of the exception.

Debugging Details:
------------------

READ_ADDRESS: unable to get nt!MmSpecialPoolStart.
unable to get nt!MmSpecialPoolEnd.
unable to get nt!MmPagedPoolEnd.
unable to get nt!MmNonPagedPoolStart.
unable to get nt!MmSizeOfNonPagedPoolInBytes.
ffffffffffffffff.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba.

FAULTING_IP:
nt!KiTryUnwaitThread+50.
fffff807`744cb380 f0480fba6b4000 lock bts qword ptr [rbx+40h],0.

EXCEPTION_PARAMETER2: ffffffffffffffff.

BUGCHECK_STR: 0x1E_c0000005_R.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: CODE_CORRUPTION.

PROCESS_NAME: System.

CURRENT_IRQL: 2.

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre.

EXCEPTION_RECORD: 1fba17458948c933 -- (.exr 0x1fba17458948c933)
Cannot read Exception record @ 1fba17458948c933.

TRAP_FRAME: 0ff3000002401f45 -- (.trap 0xff3000002401f45)
Unable to read trap frame at 0ff30000`02401f45.

LAST_CONTROL_TRANSFER: from fffff807746f4d4e to fffff807745f3ea0.

STACK_TEXT:
ffffdd01`70528158 fffff807`746f4d4e : 00000000`0000001e ffffffff`c0000005 fffff807`744cb380 00000000`00000000 : nt!KeBugCheckEx.
ffffdd01`70528160 fffff807`745fcd62 : fffff807`746f4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22.
ffffdd01`705281a0 fffff807`74485027 : ffffdd01`70528710 00000000`00000000 ffff8e01`dec37c60 fffff807`745f7a0e : nt!RtlpExecuteHandlerForException+0x12.
ffffdd01`705281d0 fffff807`74483ce6 : ffff8e01`dec37598 ffffdd01`70528e20 ffff8e01`dec37598 ffffbc07`13abd100 : nt!RtlDispatchException+0x297.
ffffdd01`705288f0 fffff807`745f4d32 : 1fba1745`8948c933 c7076589`44000200 0ff30000`02401f45 20247489`4c27457f : nt!KiDispatchException+0x186.
ffffdd01`70528fb0 fffff807`745f4d00 : fffff807`74605fa5 00000000`00000000 00000000`00000003 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12.
ffff8e01`dec37458 fffff807`74605fa5 : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue.
ffff8e01`dec37460 fffff807`74601ce0 : fffff807`7443fff0 fffff807`7443b310 00000000`00000000 ffffbc07`0f7d29a8 : nt!KiExceptionDispatch+0x125.
ffff8e01`dec37640 fffff807`744cb380 : 00000000`00000000 ffffbc07`0dbfaae0 00000000`00000001 00000000`00989680 : nt!KiGeneralProtectionFault+0x320.
ffff8e01`dec377d0 fffff807`744c42a6 : ffffbc07`13abd188 00000000`00000000 ffffbc07`13abd250 00000000`00000000 : nt!KiTryUnwaitThread+0x50.
ffff8e01`dec37830 fffff807`744c3e4c : ffffbc07`13abd180 00000000`00000000 ffff8e01`dec37b18 00000000`00000000 : nt!KiTimerWaitTest+0x1e6.
ffff8e01`dec378e0 fffff807`744e9509 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0000aacd : nt!KiProcessExpiredTimerList+0xdc.
ffff8e01`dec379d0 fffff807`745f7a0e : ffffffff`00000000 ffffdd01`70508180 ffffdd01`70513140 ffffbc07`141c1080 : nt!KiRetireDpcList+0x9d9.
ffff8e01`dec37c60 00000000`00000000 : ffff8e01`dec38000 ffff8e01`dec32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

STACK_COMMAND: kb.

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt.
fffff807745963ae-fffff807745963b1 4 bytes - nt!MiFreeUltraMapping+32.
[ a0 7d fb f6:60 fe fc f9 ]
fffff807745f72ac-fffff807745f72ad 2 bytes - nt!KiIsrLinkage+43b (+0x60efe)
[ 48 ff:4c 8b ]
fffff807745f72b3-fffff807745f72b6 4 bytes - nt!KiIsrLinkage+442 (+0x07)
[ 0f 1f 44 00:e8 68 e1 61 ]
fffff807745f76b0-fffff807745f76b4 5 bytes - nt!KiCallUserMode+220 (+0x3fd)
[ ff e1 cc cc cc:e8 0b da 61 00 ]
15 errors : !nt (fffff807745963ae-fffff807745f76b4)

MODULE_NAME: memory_corruption.

IMAGE_NAME: memory_corruption.

FOLLOWUP_NAME: memory_corruption.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

MEMORY_CORRUPTOR: LARGE.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE.

BUCKET_ID: MEMORY_CORRUPTION_LARGE.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:memory_corruption_large.

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption.
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard.
coded breakpoint or assertion was hit, but this system was booted.
/NODEBUG. This is not supposed to happen as developers should never have.
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the.
system is booted /DEBUG. This will let us see why this breakpoint is.
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff80329c4e0e7, The address that the exception occurred at.
Arg3: fffff40ec86298d8, Exception Record Address.
Arg4: ffffc601b19e2920, Context Record Address.

Debugging Details:
------------------

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba.

FAULTING_IP:
nt!KeDeleteThread+1ca8cf.
fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi.

EXCEPTION_RECORD: fffff40ec86298d8 -- (.exr 0xfffff40ec86298d8)
ExceptionAddress: fffff80329c4e0e7 (nt!KeDeleteThread+0x00000000001ca8cf)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2.
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.

CONTEXT: ffffc601b19e2920 -- (.cxr 0xffffc601b19e2920;r)
rax=0400000000000000 rbx=ffffd70b160b3080 rcx=0400000000000001.
rdx=0000000000001000 rsi=0000000000000000 rdi=ffffd70b160b3470.
rip=fffff80329c4e0e7 rsp=fffff40ec8629b10 rbp=ffffffffffffffff.
r8=000000000000000c r9=ffffc601b19c2180 r10=0000fffff80329a8.
r11=ffffb5f987400000 r12=0000000000000b00 r13=0000000000000000.
r14=0000000000000000 r15=fffff8032a524440.
iopl=0 nv up ei pl nz na po nc.
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050206.
nt!KeDeleteThread+0x1ca8cf:
fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi ds:002b:04000000`00000009=????????????????
Last set context:
rax=0400000000000000 rbx=ffffd70b160b3080 rcx=0400000000000001.
rdx=0000000000001000 rsi=0000000000000000 rdi=ffffd70b160b3470.
rip=fffff80329c4e0e7 rsp=fffff40ec8629b10 rbp=ffffffffffffffff.
r8=000000000000000c r9=ffffc601b19c2180 r10=0000fffff80329a8.
r11=ffffb5f987400000 r12=0000000000000b00 r13=0000000000000000.
r14=0000000000000000 r15=fffff8032a524440.
iopl=0 nv up ei pl nz na po nc.
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050206.
nt!KeDeleteThread+0x1ca8cf:
fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi ds:002b:04000000`00000009=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: CODE_CORRUPTION.

PROCESS_NAME: System.

CURRENT_IRQL: 2.

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba.

EXCEPTION_PARAMETER1: 0000000000000000.

EXCEPTION_PARAMETER2: ffffffffffffffff.

READ_ADDRESS: unable to get nt!MmSpecialPoolStart.
unable to get nt!MmSpecialPoolEnd.
unable to get nt!MmPagedPoolEnd.
unable to get nt!MmNonPagedPoolStart.
unable to get nt!MmSizeOfNonPagedPoolInBytes.
ffffffffffffffff.

FOLLOWUP_IP:
nt!KeDeleteThread+1ca8cf.
fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi.

BUGCHECK_STR: AV.

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre.

EXCEPTION_STR: 0x0.

LAST_CONTROL_TRANSFER: from fffff80329a836ac to fffff80329c4e0e7.

STACK_TEXT:
fffff40e`c8629b10 fffff803`29a836ac : ffffd70b`160b34d8 fffff803`29a83680 00000000`00000000 00000000`00000b00 : nt!KeDeleteThread+0x1ca8cf.
fffff40e`c8629b40 fffff803`29ac1f15 : ffffd70b`0dc27540 ffffd70b`0ac6ecf0 ffffd70b`0ac6ecf0 ffffd70b`00000000 : nt!PspReaper+0x2c.
fffff40e`c8629b70 fffff803`29a66dd5 : ffffd70b`0dc27540 00000000`00000080 ffffd70b`0ac8a080 00000000`00000001 : nt!ExpWorkerThread+0x105.
fffff40e`c8629c10 fffff803`29bfb4f8 : ffffc601`b1908180 ffffd70b`0dc27540 fffff803`29a66d80 00000000`00000000 : nt!PspSystemThreadStartup+0x55.
fffff40e`c8629c60 00000000`00000000 : fffff40e`c862a000 fffff40e`c8624000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28.

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt.
fffff80329b963ae-fffff80329b963b1 4 bytes - nt!MiFreeUltraMapping+32.
[ a0 7d fb f6:00 3a 74 e8 ]
4 errors : !nt (fffff80329b963ae-fffff80329b963b1)

MODULE_NAME: memory_corruption.

IMAGE_NAME: memory_corruption.

FOLLOWUP_NAME: memory_corruption.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

MEMORY_CORRUPTOR: LARGE.

STACK_COMMAND: .cxr 0xffffc601b19e2920 ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE.

BUCKET_ID: MEMORY_CORRUPTION_LARGE.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:memory_corruption_large.

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption.
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8067b5f6ce8, memory referenced.
Arg2: 00000000000000ff, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8067b5f6ce8, address which referenced memory.

Debugging Details:
------------------

READ_ADDRESS: unable to get nt!MmSpecialPoolStart.
unable to get nt!MmSpecialPoolEnd.
unable to get nt!MmPagedPoolEnd.
unable to get nt!MmNonPagedPoolStart.
unable to get nt!MmSizeOfNonPagedPoolInBytes.
fffff8067b5f6ce8.

CURRENT_IRQL: 0.

FAULTING_IP:
+64bd760751e9359.
fffff806`7b5f6ce8 ?? ???

ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.

BUGCHECK_STR: DISABLED_INTERRUPT_FAULT.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: CODE_CORRUPTION.

PROCESS_NAME: System.

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre.

DPC_STACK_BASE: FFFF91073F23EFB0.

TRAP_FRAME: ffff91073f237aa0 -- (.trap 0xffff91073f237aa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8067b5f6ce8 rsp=ffff91073f237c38 rbp=0000000000000000.
r8=0000000000000008 r9=0000000000000000 r10=0000fffff8068e81.
r11=ffffaf79f4400000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up di ng nz na pe nc.
fffff806`7b5f6ce8 ?? ???
Resetting default scope.

LAST_CONTROL_TRANSFER: from fffff8067f605e69 to fffff8067f5f3ea0.

FAILED_INSTRUCTION_ADDRESS:
+64bd760751e9359.
fffff806`7b5f6ce8 ?? ???

STACK_TEXT:
ffff9107`3f237958 fffff806`7f605e69 : 00000000`0000000a fffff806`7b5f6ce8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx.
ffff9107`3f237960 fffff806`7f602169 : 00000000`00000001 00000000`00000000 ffffbf81`edd08180 ffffd08f`e3328010 : nt!KiBugCheckDispatch+0x69.
ffff9107`3f237aa0 fffff806`7b5f6ce8 : fffff806`7f5f79ca 00000000`00000010 00000000`00040282 ffff9107`3f237c60 : nt!KiPageFault+0x469.
ffff9107`3f237c38 fffff806`7f5f79ca : 00000000`00000010 00000000`00040282 ffff9107`3f237c60 00000000`00000018 : 0xfffff806`7b5f6ce8.
ffff9107`3f237c40 ffffbf81`edd13140 : ffffd08f`e6c92080 00000000`00000763 ffff9107`3f237c90 00000000`00000000 : nt!KiIdleLoop+0x5a.
ffff9107`3f237c70 ffffd08f`e6c92080 : 00000000`00000763 ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 : 0xffffbf81`edd13140.
ffff9107`3f237c78 00000000`00000763 : ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 : 0xffffd08f`e6c92080.
ffff9107`3f237c80 ffff9107`3f237c90 : 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 : 0x763.
ffff9107`3f237c88 00000000`00000000 : ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 00000000`00000000 : 0xffff9107`3f237c90.

STACK_COMMAND: kb.

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt.
fffff8067f5963ae-fffff8067f5963b1 4 bytes - nt!MiFreeUltraMapping+32.
[ a0 7d fb f6:e0 e1 c3 87 ]
4 errors : !nt (fffff8067f5963ae-fffff8067f5963b1)

MODULE_NAME: memory_corruption.

IMAGE_NAME: memory_corruption.

FOLLOWUP_NAME: memory_corruption.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

MEMORY_CORRUPTOR: LARGE.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE.

BUCKET_ID: MEMORY_CORRUPTION_LARGE.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:memory_corruption_large.

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption.
---------

XMP kapalıydı test yaparken.

CPU-Z kaldırıp tekrardan mı yükliyim?
DRIVER_IRQL_NOT_LESS_OR_EQUEL hatası driver hatasıdır bende de uzun bir süre vardı ekran kartımın driverını silip eski bir driverını kurunca düzelmişti. Genelde ekran kartı driverıyla alakalı oluyor ama başka bir driver da olabilir.

Ekran kartını tamamen kaldırıp DDU'dan tekrar driverını kuracağım
 
Son düzenleme:
Reis dediklerinizin hepsini yaptım.

Ekran kartında bir şey yok gibi değerlerde normaldi ısınmalar falan olsun.

4.40'da tekrar mavi ekran yedim sorun kodu ise şu DRIVER_IRQL_NOT_LESS_OR_EQUEL (üstte iste minidump dosyasını attım lütfen bakar mısınız)
Memtest86 ile RAM'lerinizi test eder misiniz?
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8067b5f6ce8, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8067b5f6ce8, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3483

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-OOL53A3

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 22487

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff8067b5f6ce8

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8067b5f6ce8

READ_ADDRESS: fffff8067fefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8067fe0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8067fe0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 fffff8067b5f6ce8

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff91073f237aa0 -- (.trap 0xffff91073f237aa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8067b5f6ce8 rsp=ffff91073f237c38 rbp=0000000000000000
 r8=0000000000000008  r9=0000000000000000 r10=0000fffff8068e81
r11=ffffaf79f4400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na pe nc
fffff806`7b5f6ce8 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
fffff806`7b5f6ce8 ??              ???

STACK_TEXT: 
ffff9107`3f237958 fffff806`7f605e69     : 00000000`0000000a fffff806`7b5f6ce8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff9107`3f237960 fffff806`7f602169     : 00000000`00000001 00000000`00000000 ffffbf81`edd08180 ffffd08f`e3328010 : nt!KiBugCheckDispatch+0x69
ffff9107`3f237aa0 fffff806`7b5f6ce8     : fffff806`7f5f79ca 00000000`00000010 00000000`00040282 ffff9107`3f237c60 : nt!KiPageFault+0x469
ffff9107`3f237c38 fffff806`7f5f79ca     : 00000000`00000010 00000000`00040282 ffff9107`3f237c60 00000000`00000018 : 0xfffff806`7b5f6ce8
ffff9107`3f237c40 ffffbf81`edd13140     : ffffd08f`e6c92080 00000000`00000763 ffff9107`3f237c90 00000000`00000000 : nt!KiIdleLoop+0x5a
ffff9107`3f237c70 ffffd08f`e6c92080     : 00000000`00000763 ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 : 0xffffbf81`edd13140
ffff9107`3f237c78 00000000`00000763     : ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 : 0xffffd08f`e6c92080
ffff9107`3f237c80 ffff9107`3f237c90     : 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 : 0x763
ffff9107`3f237c88 00000000`00000000     : ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 00000000`00000000 : 0xffff9107`3f237c90


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f2ab72c5-099d-9077-bfcf-ba12aa825b36}

Followup:     MachineOwner
---------
 
Memtest86 ile RAM'lerinizi test eder misiniz?
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8067b5f6ce8, memory referenced.
Arg2: 00000000000000ff, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8067b5f6ce8, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3483.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-OOL53A3.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 22487.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: d1.

BUGCHECK_P1: fffff8067b5f6ce8.

BUGCHECK_P2: ff.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff8067b5f6ce8.

READ_ADDRESS: fffff8067fefa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8067fe0f2e0: Unable to get Flags value from nt!KdVersionBlock.
fffff8067fe0f2e0: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
fffff8067b5f6ce8.

ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

TRAP_FRAME: ffff91073f237aa0 -- (.trap 0xffff91073f237aa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8067b5f6ce8 rsp=ffff91073f237c38 rbp=0000000000000000.
r8=0000000000000008 r9=0000000000000000 r10=0000fffff8068e81.
r11=ffffaf79f4400000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up di ng nz na pe nc.
fffff806`7b5f6ce8 ?? ???
Resetting default scope.

FAILED_INSTRUCTION_ADDRESS:
+0.
fffff806`7b5f6ce8 ?? ???

STACK_TEXT:
ffff9107`3f237958 fffff806`7f605e69 : 00000000`0000000a fffff806`7b5f6ce8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx.
ffff9107`3f237960 fffff806`7f602169 : 00000000`00000001 00000000`00000000 ffffbf81`edd08180 ffffd08f`e3328010 : nt!KiBugCheckDispatch+0x69.
ffff9107`3f237aa0 fffff806`7b5f6ce8 : fffff806`7f5f79ca 00000000`00000010 00000000`00040282 ffff9107`3f237c60 : nt!KiPageFault+0x469.
ffff9107`3f237c38 fffff806`7f5f79ca : 00000000`00000010 00000000`00040282 ffff9107`3f237c60 00000000`00000018 : 0xfffff806`7b5f6ce8.
ffff9107`3f237c40 ffffbf81`edd13140 : ffffd08f`e6c92080 00000000`00000763 ffff9107`3f237c90 00000000`00000000 : nt!KiIdleLoop+0x5a.
ffff9107`3f237c70 ffffd08f`e6c92080 : 00000000`00000763 ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 : 0xffffbf81`edd13140.
ffff9107`3f237c78 00000000`00000763 : ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 : 0xffffd08f`e6c92080.
ffff9107`3f237c80 ffff9107`3f237c90 : 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 : 0x763.
ffff9107`3f237c88 00000000`00000000 : ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 00000000`00000000 : 0xffff9107`3f237c90.

SYMBOL_NAME: nt!KiPageFault+469.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.508.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 469.

FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36}

Followup: MachineOwner.
---------

Reis ettim zaten 4 saat 20 dakika sürdü tam tamına fakat hiçbir erorrs yazmadı bir sorun çıkmadı.
 
DDU ile sürücü kaldırıp kurmadan sonra sorununuz çözüldü mü? Çözülmediyse yeni dosyaları atın.
 
Son düzenleme:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı