A4 880k sistemde mavi ekran hataları

İşletim sistemi
Windows 10

BehicGezgin

Femtopat
Katılım
6 Mayıs 2021
Mesajlar
3
Daha fazla  
Cinsiyet
Erkek
2.75 MB folder on MEGA
  • ASUS A58M-K anakart.
  • AMD A4 880k işlemci.
  • ASUS GT1030 ekran kartı.
  • 8 GB DDR3 1600 MHz RAM.
  • 350W PSU.

Uzun süredir mavi ekran hataları alıyordum. Daha önce RAM'lerim değişmişti. Yine RAM'lerden yapıyor düşüncesiyle yeni RAM aldım fakat mavi ekran hatalarım arttı. Yeni RAM'ım tek slot 8 GB RAM. Eski RAM'lerim 4x2 8 GB RAM'di. Anakartımda 2 slotluk yer var. 2 slotta da yeni aldığım RAM'i denedim fakat bir çözüme ulaşamadım. Yardımınızı rica ederim.
 
Bana RAM sorunu gibi geldi, ancak çok tecrübeli değilim.


DMP analyze sonuçları:
Kod:
************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff803`5ea00000 PsLoadedModuleList = 0xfffff803`5ee47590
Debug session time: Wed May 12 00:08:10.288 2021 (UTC + 3:00)
System Uptime: 0 days 0:18:04.328
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`5ebc1080 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff8302`b1d6a0a0=000000000000003b
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80361959090, Address of the instruction which caused the BugCheck
Arg3: ffff8302b1d6a9d0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nsiproxy.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4108

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 53163

    Key  : Analysis.Init.CPU.mSec
    Value: 2452

    Key  : Analysis.Init.Elapsed.mSec
    Value: 69984

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80361959090

BUGCHECK_P3: ffff8302b1d6a9d0

BUGCHECK_P4: 0

CONTEXT:  ffff8302b1d6a9d0 -- (.cxr 0xffff8302b1d6a9d0)
rax=00000000ffffffff rbx=0000000000000000 rcx=000000000000002c
rdx=ffff858528a1441c rsi=0000000000000008 rdi=ffff858528a14448
rip=fffff80361959090 rsp=ffff8302b1d6b3c8 rbp=ffff8302b1d6b459
 r8=0000000000000018  r9=0000000000000002 r10=fffff803619a7630
r11=ffff8302b1d6b360 r12=fffff803619a7730 r13=0000000000000000
r14=ffff858528a143e8 r15=0000000000020019
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
NETIO!FeGetWfpGlobalPtr+0x1c0:
fffff803`61959090 8a01            mov     al,byte ptr [rcx] ds:002b:00000000`0000002c=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
ffff8302`b1d6b3c8 fffff803`6193ff02     : 00000000`00000001 00000000`00000001 00000000`00000008 00000000`00000001 : NETIO!FeGetWfpGlobalPtr+0x1c0
ffff8302`b1d6b3d0 fffff803`6193f76a     : 00000000`00000000 ffff8585`28a143e0 fffff803`61999508 ffff8585`28a14448 : NETIO!NsiGetParameterEx+0x602
ffff8302`b1d6b4c0 fffff803`9a5920c8     : 000000ed`171fe610 ffff8585`226e17b0 ffff8585`28a143e0 00000000`00000001 : NETIO!NsiGetAllParametersEx+0x1ca
ffff8302`b1d6b5e0 000000ed`171fe610     : ffff8585`226e17b0 ffff8585`28a143e0 00000000`00000001 00000000`00000000 : nsiproxy+0x20c8
ffff8302`b1d6b5e8 ffff8585`226e17b0     : ffff8585`28a143e0 00000000`00000001 00000000`00000000 000000ed`171fe648 : 0x000000ed`171fe610
ffff8302`b1d6b5f0 ffff8585`28a143e0     : 00000000`00000001 00000000`00000000 000000ed`171fe648 00000000`00000000 : 0xffff8585`226e17b0
ffff8302`b1d6b5f8 00000000`00000001     : 00000000`00000000 000000ed`171fe648 00000000`00000000 00000000`00000000 : 0xffff8585`28a143e0
ffff8302`b1d6b600 00000000`00000000     : 000000ed`171fe648 00000000`00000000 00000000`00000000 ffffb50b`8bcfc901 : 0x1


SYMBOL_NAME:  NETIO!FeGetWfpGlobalPtr+1c0

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.18362.1110

STACK_COMMAND:  .cxr 0xffff8302b1d6a9d0 ; kb

BUCKET_ID_FUNC_OFFSET:  1c0

FAILURE_BUCKET_ID:  0x3B_c0000005_NETIO!FeGetWfpGlobalPtr

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a0b73e8a-9a20-c58f-bed8-908a0fdcd6f4}

Followup:     MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80361959090, Address of the instruction which caused the BugCheck
Arg3: ffff8302b1d6a9d0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3078

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5954

    Key  : Analysis.Init.CPU.mSec
    Value: 6562

    Key  : Analysis.Init.Elapsed.mSec
    Value: 123151

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80361959090

BUGCHECK_P3: ffff8302b1d6a9d0

BUGCHECK_P4: 0

CONTEXT:  ffff8302b1d6a9d0 -- (.cxr 0xffff8302b1d6a9d0)
rax=00000000ffffffff rbx=0000000000000000 rcx=000000000000002c
rdx=ffff858528a1441c rsi=0000000000000008 rdi=ffff858528a14448
rip=fffff80361959090 rsp=ffff8302b1d6b3c8 rbp=ffff8302b1d6b459
 r8=0000000000000018  r9=0000000000000002 r10=fffff803619a7630
r11=ffff8302b1d6b360 r12=fffff803619a7730 r13=0000000000000000
r14=ffff858528a143e8 r15=0000000000020019
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
NETIO!FeGetWfpGlobalPtr+0x1c0:
fffff803`61959090 8a01            mov     al,byte ptr [rcx] ds:002b:00000000`0000002c=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
ffff8302`b1d6b3c8 fffff803`6193ff02     : 00000000`00000001 00000000`00000001 00000000`00000008 00000000`00000001 : NETIO!FeGetWfpGlobalPtr+0x1c0
ffff8302`b1d6b3d0 fffff803`6193f76a     : 00000000`00000000 ffff8585`28a143e0 fffff803`61999508 ffff8585`28a14448 : NETIO!NsiGetParameterEx+0x602
ffff8302`b1d6b4c0 fffff803`9a5920c8     : 000000ed`171fe610 ffff8585`226e17b0 ffff8585`28a143e0 00000000`00000001 : NETIO!NsiGetAllParametersEx+0x1ca
ffff8302`b1d6b5e0 000000ed`171fe610     : ffff8585`226e17b0 ffff8585`28a143e0 00000000`00000001 00000000`00000000 : nsiproxy+0x20c8
ffff8302`b1d6b5e8 ffff8585`226e17b0     : ffff8585`28a143e0 00000000`00000001 00000000`00000000 000000ed`171fe648 : 0x000000ed`171fe610
ffff8302`b1d6b5f0 ffff8585`28a143e0     : 00000000`00000001 00000000`00000000 000000ed`171fe648 00000000`00000000 : 0xffff8585`226e17b0
ffff8302`b1d6b5f8 00000000`00000001     : 00000000`00000000 000000ed`171fe648 00000000`00000000 00000000`00000000 : 0xffff8585`28a143e0
ffff8302`b1d6b600 00000000`00000000     : 000000ed`171fe648 00000000`00000000 00000000`00000000 ffffb50b`8bcfc901 : 0x1


SYMBOL_NAME:  NETIO!FeGetWfpGlobalPtr+1c0

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.18362.1110

STACK_COMMAND:  .cxr 0xffff8302b1d6a9d0 ; kb

BUCKET_ID_FUNC_OFFSET:  1c0

FAILURE_BUCKET_ID:  0x3B_c0000005_NETIO!FeGetWfpGlobalPtr

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a0b73e8a-9a20-c58f-bed8-908a0fdcd6f4}

Followup:     MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80361959090, Address of the instruction which caused the BugCheck
Arg3: ffff8302b1d6a9d0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3124

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6170

    Key  : Analysis.Init.CPU.mSec
    Value: 9640

    Key  : Analysis.Init.Elapsed.mSec
    Value: 129108

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80361959090

BUGCHECK_P3: ffff8302b1d6a9d0

BUGCHECK_P4: 0

CONTEXT:  ffff8302b1d6a9d0 -- (.cxr 0xffff8302b1d6a9d0)
rax=00000000ffffffff rbx=0000000000000000 rcx=000000000000002c
rdx=ffff858528a1441c rsi=0000000000000008 rdi=ffff858528a14448
rip=fffff80361959090 rsp=ffff8302b1d6b3c8 rbp=ffff8302b1d6b459
 r8=0000000000000018  r9=0000000000000002 r10=fffff803619a7630
r11=ffff8302b1d6b360 r12=fffff803619a7730 r13=0000000000000000
r14=ffff858528a143e8 r15=0000000000020019
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
NETIO!FeGetWfpGlobalPtr+0x1c0:
fffff803`61959090 8a01            mov     al,byte ptr [rcx] ds:002b:00000000`0000002c=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
ffff8302`b1d6b3c8 fffff803`6193ff02     : 00000000`00000001 00000000`00000001 00000000`00000008 00000000`00000001 : NETIO!FeGetWfpGlobalPtr+0x1c0
ffff8302`b1d6b3d0 fffff803`6193f76a     : 00000000`00000000 ffff8585`28a143e0 fffff803`61999508 ffff8585`28a14448 : NETIO!NsiGetParameterEx+0x602
ffff8302`b1d6b4c0 fffff803`9a5920c8     : 000000ed`171fe610 ffff8585`226e17b0 ffff8585`28a143e0 00000000`00000001 : NETIO!NsiGetAllParametersEx+0x1ca
ffff8302`b1d6b5e0 000000ed`171fe610     : ffff8585`226e17b0 ffff8585`28a143e0 00000000`00000001 00000000`00000000 : nsiproxy+0x20c8
ffff8302`b1d6b5e8 ffff8585`226e17b0     : ffff8585`28a143e0 00000000`00000001 00000000`00000000 000000ed`171fe648 : 0x000000ed`171fe610
ffff8302`b1d6b5f0 ffff8585`28a143e0     : 00000000`00000001 00000000`00000000 000000ed`171fe648 00000000`00000000 : 0xffff8585`226e17b0
ffff8302`b1d6b5f8 00000000`00000001     : 00000000`00000000 000000ed`171fe648 00000000`00000000 00000000`00000000 : 0xffff8585`28a143e0
ffff8302`b1d6b600 00000000`00000000     : 000000ed`171fe648 00000000`00000000 00000000`00000000 ffffb50b`8bcfc901 : 0x1


SYMBOL_NAME:  NETIO!FeGetWfpGlobalPtr+1c0

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.18362.1110

STACK_COMMAND:  .cxr 0xffff8302b1d6a9d0 ; kb

BUCKET_ID_FUNC_OFFSET:  1c0

FAILURE_BUCKET_ID:  0x3B_c0000005_NETIO!FeGetWfpGlobalPtr

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a0b73e8a-9a20-c58f-bed8-908a0fdcd6f4}

Followup:     MachineOwner
---------

Kod:
************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff806`74200000 PsLoadedModuleList = 0xfffff806`74647590
Debug session time: Tue May 11 23:49:39.753 2021 (UTC + 3:00)
System Uptime: 0 days 0:10:36.793
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`743c1080 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff9d8a`da245380=0000000000000139
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff9d8ada2456a0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff9d8ada2455f8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3218

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 30941

    Key  : Analysis.Init.CPU.mSec
    Value: 2311

    Key  : Analysis.Init.Elapsed.mSec
    Value: 73729

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff9d8ada2456a0

BUGCHECK_P3: ffff9d8ada2455f8

BUGCHECK_P4: 0

TRAP_FRAME:  ffff9d8ada2456a0 -- (.trap 0xffff9d8ada2456a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8402dd298158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff8402dec83158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806743dcedb rsp=ffff9d8ada245830 rbp=ffffe30109780180
 r8=0000000000000102  r9=0000000000000000 r10=fffff80671bc9800
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiTryUnwaitThread+0x19209b:
fffff806`743dcedb cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff9d8ada2455f8 -- (.exr 0xffff9d8ada2455f8)
ExceptionAddress: fffff806743dcedb (nt!KiTryUnwaitThread+0x000000000019209b)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffff9d8a`da245378 fffff806`743d2ee9     : 00000000`00000139 00000000`00000003 ffff9d8a`da2456a0 ffff9d8a`da2455f8 : nt!KeBugCheckEx
ffff9d8a`da245380 fffff806`743d3310     : ffff9d8a`da245580 00000000`00002710 ffff9d8a`da24550f fffff806`7416e211 : nt!KiBugCheckDispatch+0x69
ffff9d8a`da2454c0 fffff806`743d16a5     : 00000000`0000314d fffff806`7415e331 00000001`7ba54a44 fffff806`7415ec54 : nt!KiFastFailDispatch+0xd0
ffff9d8a`da2456a0 fffff806`743dcedb     : ffff6473`ffffffff ffffffff`dd298000 00000007`00000000 00000000`00000003 : nt!KiRaiseSecurityCheckFailure+0x325
ffff9d8a`da245830 fffff806`7426bfe6     : ffff8402`dd298188 00000001`00000000 ffff8402`dd298250 ffff8402`dd298180 : nt!KiTryUnwaitThread+0x19209b
ffff9d8a`da245890 fffff806`7426bbc2     : ffff8402`dd298180 00000001`7b8ec092 00000001`00000002 ffff8402`d9672010 : nt!KiTimerWaitTest+0x1b6
ffff9d8a`da245940 fffff806`7426a9b9     : 00000000`00000012 00000000`00989680 00000000`00005ee3 00000000`000000fb : nt!KiProcessExpiredTimerList+0xd2
ffff9d8a`da245a30 fffff806`743c4bc4     : ffffffff`00000000 ffffe301`09780180 ffffe301`09791140 ffff8402`db724080 : nt!KiRetireDpcList+0x4e9
ffff9d8a`da245c60 00000000`00000000     : ffff9d8a`da246000 ffff9d8a`da240000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84


SYMBOL_NAME:  nt!KiTimerWaitTest+1b6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.327

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1b6

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiTimerWaitTest

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {efb56395-a173-53f8-073d-d3c8cfd50e2b}

Followup:     MachineOwner
---------

Kod:
************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
WARNING: .reload failed, module list may be incomplete
Debugger can not determine kernel base address
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff800`39e00000 PsLoadedModuleList = 0xfffff800`3a247590
Debug session time: Tue May 11 23:29:39.664 2021 (UTC + 3:00)
System Uptime: 0 days 0:49:31.708
Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
WARNING: .reload failed, module list may be incomplete
Debugger can not determine kernel base address
Loading Kernel Symbols
.Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000

Loading User Symbols
For analysis of this file, run !analyze -v
fffff800`39fc1080 ??              ???
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffeffff3ffffe8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffc58d112a59a0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 30

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 63

    Key  : Analysis.Init.CPU.mSec
    Value: 296

    Key  : Analysis.Init.Elapsed.mSec
    Value: 29668

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 45

    Key  : WER.CorruptModuleList
    Value: 1


BUGCHECK_CODE:  be

BUGCHECK_P1: ffffeffff3ffffe8

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: ffffc58d112a59a0

BUGCHECK_P4: a

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT:
ffffc58d`112a57b8 fffff800`3a04ebbd     : 00000000`000000be ffffefff`f3ffffe8 8a000000`00200121 ffffc58d`112a59a0 : 0xfffff800`39fc1080
ffffc58d`112a57c0 00000000`000000be     : ffffefff`f3ffffe8 8a000000`00200121 ffffc58d`112a59a0 00000000`0000000a : 0xfffff800`3a04ebbd
ffffc58d`112a57c8 ffffefff`f3ffffe8     : 8a000000`00200121 ffffc58d`112a59a0 00000000`0000000a 00001f80`0000000f : 0xbe
ffffc58d`112a57d0 8a000000`00200121     : ffffc58d`112a59a0 00000000`0000000a 00001f80`0000000f ffffefff`f3ffffe8 : 0xffffefff`f3ffffe8
ffffc58d`112a57d8 ffffc58d`112a59a0     : 00000000`0000000a 00001f80`0000000f ffffefff`f3ffffe8 fffff800`39e731fa : 0x8a000000`00200121
ffffc58d`112a57e0 00000000`0000000a     : 00001f80`0000000f ffffefff`f3ffffe8 fffff800`39e731fa 8a000000`00200121 : 0xffffc58d`112a59a0
ffffc58d`112a57e8 00001f80`0000000f     : ffffefff`f3ffffe8 fffff800`39e731fa 8a000000`00200121 00000000`00000003 : 0xa
ffffc58d`112a57f0 ffffefff`f3ffffe8     : fffff800`39e731fa 8a000000`00200121 00000000`00000003 ffffc58d`112a5900 : 0x00001f80`0000000f
ffffc58d`112a57f8 fffff800`39e731fa     : 8a000000`00200121 00000000`00000003 ffffc58d`112a5900 00000000`00000000 : 0xffffefff`f3ffffe8
ffffc58d`112a5800 8a000000`00200121     : 00000000`00000003 ffffc58d`112a5900 00000000`00000000 fffff800`3a269480 : 0xfffff800`39e731fa
ffffc58d`112a5808 00000000`00000003     : ffffc58d`112a5900 00000000`00000000 fffff800`3a269480 ffffc58d`112a5a20 : 0x8a000000`00200121
ffffc58d`112a5810 ffffc58d`112a5900     : 00000000`00000000 fffff800`3a269480 ffffc58d`112a5a20 fffff800`3a269480 : 0x3
ffffc58d`112a5818 00000000`00000000     : fffff800`3a269480 ffffc58d`112a5a20 fffff800`3a269480 00000000`001ecc62 : 0xffffc58d`112a5900


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_0xBE

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b9ec5406-e1f1-d3be-f9c9-b5e8bd40d43d}

Followup:     MachineOwner
---------

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffb74a0814e800, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80438f01760, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6578

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 19776

    Key  : Analysis.Init.CPU.mSec
    Value: 2405

    Key  : Analysis.Init.Elapsed.mSec
    Value: 77890

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  a

BUGCHECK_P1: ffffb74a0814e800

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80438f01760

READ_ADDRESS: fffff804393723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffb74a0814e800

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8043b867100 -- (.trap 0xfffff8043b867100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000005 rbx=0000000000000000 rcx=ffffb74a0814e800
rdx=000000000000082f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80438f01760 rsp=fffff8043b867298 rbp=fffff8043b8673a0
 r8=000000000002082f  r9=000000000000002f r10=fffff80433fe6100
r11=fffff8043b866f30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExQueryDepthSList:
fffff804`38f01760 0fb701          movzx   eax,word ptr [rcx] ds:ffffb74a`0814e800=????
Resetting default scope

STACK_TEXT:
fffff804`3b866fb8 fffff804`38fd2ee9     : 00000000`0000000a ffffb74a`0814e800 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`3b866fc0 fffff804`38fcf22b     : ffffb70a`1bee1368 ffffb70a`1815f030 ffffb70a`1bee1010 fffff804`3a923582 : nt!KiBugCheckDispatch+0x69
fffff804`3b867100 fffff804`38f01760     : fffff804`3b3e6ee7 00000000`00000000 ffffb70a`1baa4230 fffff804`3b8673a0 : nt!KiPageFault+0x46b
fffff804`3b867298 fffff804`3b3e6ee7     : 00000000`00000000 ffffb70a`1baa4230 fffff804`3b8673a0 ffffb70a`1baa4230 : nt!ExQueryDepthSList
fffff804`3b8672a0 fffff804`38e47799     : ffffb70a`1b8fbdab fffff80b`0200fbf7 ffffb70a`00000000 00000000`00000002 : CLASSPNP!TransferPktComplete+0x6e7
fffff804`3b8674a0 fffff804`38e47667     : 00000000`00008001 ffffb70a`15e6f101 ffffb70a`15e6f1b0 ffffa101`ede71fa0 : nt!IopfCompleteRequest+0x119
fffff804`3b8675b0 fffff804`3a77999d     : fffff804`3b867720 ffffb70a`15e1f6f0 fffff804`3b8677b0 00000000`00000001 : nt!IofCompleteRequest+0x17
fffff804`3b8675e0 fffff804`3a77928a     : 00000000`00000000 00000000`00989680 fffff804`3b8677b0 ffffa101`ede71ef0 : storport!RaidCompleteRequestEx+0x8d
fffff804`3b8676b0 fffff804`3a78d60c     : ffffb70a`185de148 00000000`00000000 00000000`00000000 00000000`00000000 : storport!RaidUnitCompleteRequest+0x5da
fffff804`3b867850 fffff804`38e6b065     : ffffb70a`15ed5000 00000000`00000001 fffff804`3b8678a8 00000000`00000000 : storport!RaidpAdapterRedirectDpcRoutine+0x8c
fffff804`3b8678f0 fffff804`38e6a6bf     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
fffff804`3b867a30 fffff804`38fc4bc4     : 00000000`00000000 fffff804`33fe6180 fffff804`39390400 ffffb70a`1a782080 : nt!KiRetireDpcList+0x1ef
fffff804`3b867c60 00000000`00000000     : fffff804`3b868000 fffff804`3b862000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80438f9c3ba-fffff80438f9c3be  5 bytes - nt!_C_specific_handler+1ea
    [ cc cc cc cc cc:4c 87 00 98 c3 ]
    fffff80438fc9faa-fffff80438fc9fab  2 bytes - nt!XRestoreSHelper+1a (+0x2dbf0)
    [ 84 00:4c 87 ]
    fffff80438fc9fad-fffff80438fc9fae  2 bytes - nt!XRestoreSHelper+1d (+0x03)
    [ 00 00:98 c3 ]
9 errors : !nt (fffff80438f9c3ba-fffff80438fc9fae)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------

Kod:
************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff802`50200000 PsLoadedModuleList = 0xfffff802`50647590
Debug session time: Wed May 12 00:18:09.986 2021 (UTC + 3:00)
System Uptime: 0 days 0:09:21.026
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`503c1080 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff9787`490a74d0=0000000000000018
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

REFERENCE_BY_POINTER (18)
Arguments:
Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
Arg2: ffff988102e572e0, Object whose reference count is being lowered
Arg3: 0000000000000002, Reserved
Arg4: ffffffffffffffff, Reserved
    The reference count of an object is illegal for the current state of the object.
    Each time a driver uses a pointer to an object the driver calls a kernel routine
    to increment the reference count of the object. When the driver is done with the
    pointer the driver calls another kernel routine to decrement the reference count.
    Drivers must match calls to the increment and decrement routines. This BugCheck
    can occur because an object's reference count goes to zero while there are still
    open handles to the object, in which case the fourth parameter indicates the number
    of opened handles. It may also occur when the object's reference count drops below zero
    whether or not there are open handles to the object, and in that case the fourth parameter
    contains the actual value of the pointer references count.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3374

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 26065

    Key  : Analysis.Init.CPU.mSec
    Value: 2405

    Key  : Analysis.Init.Elapsed.mSec
    Value: 61177

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  18

BUGCHECK_P1: 0

BUGCHECK_P2: ffff988102e572e0

BUGCHECK_P3: 2

BUGCHECK_P4: ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
ffff9787`490a74c8 fffff802`503f70b7     : 00000000`00000018 00000000`00000000 ffff9881`02e572e0 00000000`00000002 : nt!KeBugCheckEx
ffff9787`490a74d0 fffff802`507eb0e7     : 00000000`ffff87a9 ffff9881`02e572b0 ffff9881`00000000 00000000`00007f53 : nt!ObfDereferenceObjectWithTag+0x1bc817
ffff9787`490a7510 fffff802`50836605     : ffff9881`0313f098 fffff802`50236a4f ffff9881`0313f060 ffff9881`020c0080 : nt!ObCloseHandleTableEntry+0x2c7
ffff9787`490a7650 fffff802`508362a1     : ffff9881`0313f060 ffff9881`020c0080 ffffffff`ffffff01 ffff9881`02be93c0 : nt!ExSweepHandleTable+0xd5
ffff9787`490a7700 fffff802`508367c9     : ffffffff`ffffffff ffff9881`02be90c0 ffff9787`490a7750 ffff9881`00000000 : nt!ObKillProcess+0x35
ffff9787`490a7730 fffff802`5085cde3     : ffff9881`02be90c0 ffffab0f`2add2060 ffff9787`490a7959 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffff9787`490a77b0 fffff802`508ca473     : 00000000`80000003 fffff802`4e9a6101 00000024`bbbec000 00000000`00000000 : nt!PspExitThread+0x60b
ffff9787`490a78c0 fffff802`5023e511     : ffff9881`020c0080 ffff988f`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffff9787`490a7900 fffff802`503c5600     : ffff9881`031c0001 ffff9787`490a79c0 00000000`00000000 fffff802`00000000 : nt!KiDeliverApc+0x481
ffff9787`490a79c0 fffff802`503d29bf     : ffff9881`020c0080 00000024`bebffa98 ffff9787`490a7b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff9787`490a7b00 00007ffb`0951c154     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000024`bebffa68 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`0951c154


SYMBOL_NAME:  nt!ObfDereferenceObjectWithTag+1bc817

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.327

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1bc817

FAILURE_BUCKET_ID:  0x18_OVER_DEREFERENCE_nt!ObfDereferenceObjectWithTag

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4139309c-4e9f-52f0-ac5e-4041e7a86a20}

Followup:     MachineOwner
---------
 
RAM'i 1 gün önce sıfır olarak aldım. Yeni RAM'i taktıktan sonra da mavi ekran almaya devam ettim. Bende RAM'den kaynaklı olduğunu düşündüğüm için değiştirdim. Ama sorunum devam ediyor.
 
RAM'i 1 gün önce sıfır olarak aldım. Yeni RAM'i taktıktan sonra da mavi ekran almaya devam ettim. Bende RAM'den kaynaklı olduğunu düşündüğüm için değiştirdim. Ama sorunum devam ediyor.

RAM'lerin modelleri aynı mı? Aynı değilse arasında uyumsuzluk olmuş olabilir. Eğer aynıysa sistemi tek RAM ile kullanmayı deneyin. Sorun yoksa sokette arıza olabilir. Anakartı garantiye gönderirsiniz.
 

Geri
Yukarı