Anakart değişimi sonrası mavi ekran ve donma

Cpt.semihaksoy

Hectopat
Katılım
12 Mart 2017
Mesajlar
155
Daha fazla  
Cinsiyet
Erkek
Merhaba anakartım arızalandığı için yeni anakart (msı B450 Tomahawk max) aldım fakat şimdi bazen mavi ekran ve kilitlenme sorunları yaşıyorum. Minidump linki aşağıdadır. Sistemimi yazıyorum OC olarak sadece işlemciyi 3,4 GHz çektim.

MSI B450 Tomahawk Max.
Ryzen 1700.
Corsair Vengeance 2x8 3000 MHz.
Sapphire RX 5600XT.
High Power 650W 85+ Bronze.

 
Kullandığınız VPN uygulamasını kaldırın. (Sadece Opera'nın içindeki varsa bir süreliğine Opera'yı kaldırın.)

GameLoop'u ve CPU-Z'yi de kaldırın.

Bağlı tüm USB cihazları çıkarın. Klavye ve mouse'u başka porta takın.

Kullandığınız BİOS beta sürüm. Beta sürüm kullanmanızı önermem. 7C02v39 Sürümünü yükleyin.

Aşağıdaki rehberi uygulayın.

Hata almaya devam ederseniz dosyaları paylaşın.

[CODE title="Kod"]
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Downloads\Compressed\011021-7015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`66600000 PsLoadedModuleList = 0xfffff806`6722a2b0
Debug session time: Sat Jan 9 23:52:13.827 2021 (UTC + 3:00)
System Uptime: 0 days 21:56:05.513
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
.......................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`669f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff800b`3617f340=000000000000003b
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80666956475, Address of the instruction which caused the bugcheck
Arg3: ffff800b3617fc40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8405

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 11367

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80666956475

BUGCHECK_P3: ffff800b3617fc40

BUGCHECK_P4: 0

CONTEXT: ffff800b3617fc40 -- (.cxr 0xffff800b3617fc40)
rax=ffff800b36180690 rbx=ffffa00bff8ae080 rcx=ffff800b36180720
rdx=0000000000000000 rsi=ffffa00bff8ae308 rdi=f7ffa00bff8ae080
rip=fffff80666956475 rsp=ffff800b36180640 rbp=ffff800b36180709
r8=0000000000000008 r9=0000000000000000 r10=0000fffff8066695
r11=ffffbf7d13000000 r12=fffff806669973d0 r13=0000000000000000
r14=0000000000000000 r15=ffff800b36180b00
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!KiSchedulerApc+0x45:
fffff806`66956475 448b7778 mov r14d,dword ptr [rdi+78h] ds:002b:f7ffa00b`ff8ae0f8=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steam.exe

STACK_TEXT:
ffff800b`36180640 fffff806`66867e19 : 00000000`00000000 ffffa00b`ff8ae080 ffffa00b`ff8ae308 ffffa00b`ff8ae118 : nt!KiSchedulerApc+0x45
ffff800b`36180770 fffff806`66865b77 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x2e9
ffff800b`36180820 fffff806`66864d7f : ffffa00b`00000005 0000ffff`0000000c ffff800b`361809e0 00001f80`00000000 : nt!KiSwapThread+0x827
ffff800b`361808d0 fffff806`66864623 : ffff800b`000000cd fffff806`00000000 ffffa00c`016e2801 ffffa00b`ff8ae1c0 : nt!KiCommitThreadWait+0x14f
ffff800b`36180970 fffff806`66c2c6a1 : ffffa00c`016e2860 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffff800b`36180a60 fffff806`66c2c74a : ffffa00b`ff8ae080 00000000`00000000 00000000`00000000 fffff806`66a07018 : nt!ObWaitForSingleObject+0x91
ffff800b`36180ac0 fffff806`66a071b8 : 00000000`6ec17e40 00000000`0000000b ffff800b`36180b18 ffffffff`ffd9da60 : nt!NtWaitForSingleObject+0x6a
ffff800b`36180b00 00000000`77301cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`090df168 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77301cfc


SYMBOL_NAME: nt!KiSchedulerApc+45

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.685

STACK_COMMAND: .cxr 0xffff800b3617fc40 ; kb

BUCKET_ID_FUNC_OFFSET: 45

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KiSchedulerApc

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e85a6041-adb4-a2f5-2ff7-c19c8aa8e87a}

Followup: MachineOwner
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Downloads\Compressed\010521-7015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`33c00000 PsLoadedModuleList = 0xfffff800`3482a2b0
Debug session time: Tue Jan 5 02:00:07.447 2021 (UTC + 3:00)
System Uptime: 0 days 7:35:05.133
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`33ff5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa98c`540a7b40=000000000000000a
12: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000562cac00, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000098, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80033ff910f, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8171

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 10309

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: a

BUGCHECK_P1: 562cac00

BUGCHECK_P2: ff

BUGCHECK_P3: 98

BUGCHECK_P4: fffff80033ff910f

READ_ADDRESS: fffff800348fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8003480f330: Unable to get Flags value from nt!KdVersionBlock
fffff8003480f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000562cac00

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dwm.exe

TRAP_FRAME: ffffa98c540a7c80 -- (.trap 0xffffa98c540a7c80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000097a667f330
rdx=0000000000000018 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80033ff910f rsp=ffffa98c540a7e10 rbp=ffffa98c540a7ec0
r8=00000000562cab00 r9=ffffa98c562c9060 r10=ffffa98c540a7fd0
r11=ffffb00ceb321080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!NtCallbackReturn+0x4f:
fffff800`33ff910f 6641c780000100000000 mov word ptr [r8+100h],0 ds:00000000`562cac00=????
Resetting default scope

STACK_TEXT:
ffffa98c`540a7b38 fffff800`34007769 : 00000000`0000000a 00000000`562cac00 00000000`000000ff 00000000`00000098 : nt!KeBugCheckEx
ffffa98c`540a7b40 fffff800`34003a69 : ffffb00c`002be1c9 ffffb00c`e274c1c0 ffffa98c`549f77b0 ffffb00c`e274c080 : nt!KiBugCheckDispatch+0x69
ffffa98c`540a7c80 fffff800`33ff910f : ffffb00c`e8d26080 ffffa98c`540a7ec0 ffffb00c`e8d26080 00000065`3a9fe2d0 : nt!KiPageFault+0x469
ffffa98c`540a7e10 fffff800`340071b8 : ffffb00c`eb321080 00000000`00000000 00000000`00000000 ffffb00c`00000000 : nt!NtCallbackReturn+0x4f
ffffa98c`540a7e40 00007ff8`f9e4c054 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000097`a667f308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`f9e4c054


SYMBOL_NAME: nt!NtCallbackReturn+4f

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.685

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 4f

FAILURE_BUCKET_ID: AV_nt!NtCallbackReturn

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c5e59f8b-b1d8-17df-8284-4f5cbacae96b}

Followup: MachineOwner
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Downloads\Compressed\010421-6953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`4a400000 PsLoadedModuleList = 0xfffff805`4b02a2b0
Debug session time: Mon Jan 4 18:24:34.950 2021 (UTC + 3:00)
System Uptime: 0 days 0:09:26.637
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`4a7f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff805`5046c440=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6093

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 9647

Key : Analysis.Memory.CommitPeak.Mb
Value: 82

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: 0

READ_ADDRESS: fffff8054b0fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8054b00f330: Unable to get Flags value from nt!KdVersionBlock
fffff8054b00f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

PROCESS_NAME: System

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

TRAP_FRAME: fffff8055046c580 -- (.trap 0xfffff8055046c580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff8055046c710 rbp=0000000000000000
r8=ffffb001da7c7180 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
00000000`00000000 ?? ???
Resetting default scope

IP_IN_FREE_BLOCK: 0

FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000000 ?? ???

STACK_TEXT:
fffff805`5046c438 fffff805`4a807769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff805`5046c440 fffff805`4a803a69 : 00000000`00000020 00000000`00000000 00000000`00000064 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`5046c580 00000000`00000000 : fffff805`5046c960 fffff805`5046cb20 00000001`51dfbcc1 00000000`00989680 : nt!KiPageFault+0x469


SYMBOL_NAME: nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.685

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 469

FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}

Followup: MachineOwner
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Downloads\Compressed\010421-7671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Mini Kernel Dump does not have process information

************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff800`33000000 PsLoadedModuleList = 0xfffff800`33c2a2b0
Debug session time: Mon Jan 4 18:04:03.053 2021 (UTC + 3:00)
System Uptime: 0 days 3:17:39.740
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
.
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`333f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff958d`ab75d650=00000000000000a0
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
hibernation file.
Arg2: 000000000000000a
Arg3: 0000000000008371, Incorrect checksum
Arg4: 000000000000be8e, Previous disk read's checksum

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4062

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 5254

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump

BUGCHECK_CODE: a0

BUGCHECK_P1: 10e

BUGCHECK_P2: a

BUGCHECK_P3: 8371

BUGCHECK_P4: be8e

CUSTOMER_CRASH_COUNT: 1

STACK_TEXT:
ffff958d`ab75d648 fffff800`339a07ee : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00008371 : nt!KeBugCheckEx
ffff958d`ab75d650 fffff800`339adc01 : 00000000`00000001 ffffe08f`bb460b90 00000002`07758000 ffffe08f`d4149000 : nt!PopHiberChecksumHiberFileData+0x103ae
ffff958d`ab75d6b0 fffff800`3399fdc7 : 00000000`00000000 ffffbd08`db135f38 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x7d
ffff958d`ab75d720 fffff800`3398f5d0 : 000025cb`f2426a08 ffffbd08`db135f38 00000000`00000000 00000000`00000000 : nt!PopRestoreHiberContext+0x1069f
ffff958d`ab75d7b0 fffff800`3398f316 : fffff800`33c50460 ffff958d`ab75d930 fffff800`33c50460 00000000`00000100 : nt!PopHandleNextState+0x210
ffff958d`ab75d800 fffff800`3398f093 : 00000000`00000100 fffff800`33c50460 0000001b`9d166555 00000000`00989680 : nt!PopIssueNextState+0x1a
ffff958d`ab75d830 fffff800`33991c99 : 00000000`0000000a ffff958d`ab75db40 00000000`00000000 fffff800`33991a1f : nt!PopInvokeSystemStateHandler+0x33b
ffff958d`ab75da30 fffff800`3398c98a : ffffffff`00000000 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt!PopEndMirroring+0x1e9
ffff958d`ab75daf0 fffff800`3398c675 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MmDuplicateMemory+0x2be
ffff958d`ab75db80 fffff800`33317e25 : ffffe08f`c862c000 ffffe08f`c862c080 fffff800`3398c540 00000000`00000001 : nt!PopTransitionToSleep+0x135
ffff958d`ab75dc10 fffff800`333fcdd8 : ffffa880`2e100180 ffffe08f`c862c080 fffff800`33317dd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffff958d`ab75dc60 00000000`00000000 : ffff958d`ab75e000 ffff958d`ab758000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+103ae

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.685

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 103ae

FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}

Followup: MachineOwner
---------
[/CODE]
 
Kullandığınız VPN uygulamasını kaldırın. (sadece Opera'nın içindeki varsa bir süreliğine Opera'yı kaldırın.)

GameLoop'u ve CPU-Z'yi de kaldırın.

Bağlı tüm USB cihazları çıkarın. Klavye ve Mouse'u başka porta takın.

Kullandığınız BIOS beta sürüm. Beta sürüm kullanmanızı önermem. 7C02v39 sürümünü yükleyin.

Aşağıdaki rehberi uygulayın.

Hata almaya devam ederseniz dosyaları paylaşın.

[CODE title="Kod"]
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\maksu\Downloads\Compressed\011021-7015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff806`66600000 PsLoadedModuleList = 0xfffff806`6722a2b0.
Debug session time: Sat Jan 9 23:52:13.827 2021 (UTC + 3:00)
System Uptime: 0 days 21:56:05.513.
Loading Kernel Symbols.
...............................................................
................................................................
.............................................................
Loading User Symbols.
Loading unloaded module list.
.......................
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff806`669f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff800b`3617f340=000000000000003b.
11: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff80666956475, Address of the instruction which caused the bugcheck.
Arg3: ffff800b3617fc40, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 8405.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-G2EFLS9.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 11367.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 74.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80666956475.

BUGCHECK_P3: ffff800b3617fc40.

BUGCHECK_P4: 0.

CONTEXT: ffff800b3617fc40 -- (.cxr 0xffff800b3617fc40)
rax=ffff800b36180690 rbx=ffffa00bff8ae080 rcx=ffff800b36180720.
rdx=0000000000000000 rsi=ffffa00bff8ae308 rdi=f7ffa00bff8ae080.
rip=fffff80666956475 rsp=ffff800b36180640 rbp=ffff800b36180709.
r8=0000000000000008 r9=0000000000000000 r10=0000fffff8066695.
r11=ffffbf7d13000000 r12=fffff806669973d0 r13=0000000000000000.
r14=0000000000000000 r15=ffff800b36180b00.
iopl=0 nv up ei pl nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202.
nt!KiSchedulerApc+0x45:
fffff806`66956475 448b7778 mov r14d,dword ptr [rdi+78h] ds:002b:f7ffa00b`ff8ae0f8=????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: steam.exe.

STACK_TEXT:
ffff800b`36180640 fffff806`66867e19 : 00000000`00000000 ffffa00b`ff8ae080 ffffa00b`ff8ae308 ffffa00b`ff8ae118 : nt!KiSchedulerApc+0x45.
ffff800b`36180770 fffff806`66865b77 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x2e9.
ffff800b`36180820 fffff806`66864d7f : ffffa00b`00000005 0000ffff`0000000c ffff800b`361809e0 00001f80`00000000 : nt!KiSwapThread+0x827.
ffff800b`361808d0 fffff806`66864623 : ffff800b`000000cd fffff806`00000000 ffffa00c`016e2801 ffffa00b`ff8ae1c0 : nt!KiCommitThreadWait+0x14f.
ffff800b`36180970 fffff806`66c2c6a1 : ffffa00c`016e2860 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233.
ffff800b`36180a60 fffff806`66c2c74a : ffffa00b`ff8ae080 00000000`00000000 00000000`00000000 fffff806`66a07018 : nt!ObWaitForSingleObject+0x91.
ffff800b`36180ac0 fffff806`66a071b8 : 00000000`6ec17e40 00000000`0000000b ffff800b`36180b18 ffffffff`ffd9da60 : nt!NtWaitForSingleObject+0x6a.
ffff800b`36180b00 00000000`77301cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000000`090df168 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77301cfc.

SYMBOL_NAME: nt!KiSchedulerApc+45.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .cxr 0xffff800b3617fc40 ; kb.

BUCKET_ID_FUNC_OFFSET: 45.

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KiSchedulerApc.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e85a6041-adb4-a2f5-2ff7-c19c8aa8e87a}

Followup: MachineOwner.
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\maksu\Downloads\Compressed\010521-7015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff800`33c00000 PsLoadedModuleList = 0xfffff800`3482a2b0.
Debug session time: Tue Jan 5 02:00:07.447 2021 (UTC + 3:00)
System Uptime: 0 days 7:35:05.133.
Loading Kernel Symbols.
...............................................................
................................................................
.............................................................
Loading User Symbols.
Loading unloaded module list.
..........
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff800`33ff5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa98c`540a7b40=000000000000000a.
12: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000562cac00, memory referenced.
Arg2: 00000000000000ff, IRQL.
Arg3: 0000000000000098, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80033ff910f, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 8171.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-G2EFLS9.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 10309.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 562cac00.

BUGCHECK_P2: ff.

BUGCHECK_P3: 98.

BUGCHECK_P4: fffff80033ff910f.

READ_ADDRESS: fffff800348fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8003480f330: Unable to get Flags value from nt!KdVersionBlock.
fffff8003480f330: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
00000000562cac00.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: dwm.exe.

TRAP_FRAME: ffffa98c540a7c80 -- (.trap 0xffffa98c540a7c80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000097a667f330.
rdx=0000000000000018 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80033ff910f rsp=ffffa98c540a7e10 rbp=ffffa98c540a7ec0.
r8=00000000562cab00 r9=ffffa98c562c9060 r10=ffffa98c540a7fd0.
r11=ffffb00ceb321080 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up di pl zr na po nc.
nt!NtCallbackReturn+0x4f:
fffff800`33ff910f 6641c780000100000000 mov word ptr [r8+100h],0 ds:00000000`562cac00=????
Resetting default scope.

STACK_TEXT:
ffffa98c`540a7b38 fffff800`34007769 : 00000000`0000000a 00000000`562cac00 00000000`000000ff 00000000`00000098 : nt!KeBugCheckEx.
ffffa98c`540a7b40 fffff800`34003a69 : ffffb00c`002be1c9 ffffb00c`e274c1c0 ffffa98c`549f77b0 ffffb00c`e274c080 : nt!KiBugCheckDispatch+0x69.
ffffa98c`540a7c80 fffff800`33ff910f : ffffb00c`e8d26080 ffffa98c`540a7ec0 ffffb00c`e8d26080 00000065`3a9fe2d0 : nt!KiPageFault+0x469.
ffffa98c`540a7e10 fffff800`340071b8 : ffffb00c`eb321080 00000000`00000000 00000000`00000000 ffffb00c`00000000 : nt!NtCallbackReturn+0x4f.
ffffa98c`540a7e40 00007ff8`f9e4c054 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000097`a667f308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`f9e4c054.

SYMBOL_NAME: nt!NtCallbackReturn+4f.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 4f.

FAILURE_BUCKET_ID: AV_nt!NtCallbackReturn.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {c5e59f8b-b1d8-17df-8284-4f5cbacae96b}

Followup: MachineOwner.
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\maksu\Downloads\Compressed\010421-6953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff805`4a400000 PsLoadedModuleList = 0xfffff805`4b02a2b0.
Debug session time: Mon Jan 4 18:24:34.950 2021 (UTC + 3:00)
System Uptime: 0 days 0:09:26.637.
Loading Kernel Symbols.
...............................................................
................................................................
............................................................
Loading User Symbols.
Loading unloaded module list.
.......
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff805`4a7f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff805`5046c440=000000000000000a.
0: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg4: 0000000000000000, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 6093.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-G2EFLS9.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 9647.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 82.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: d1.

BUGCHECK_P1: 0.

BUGCHECK_P2: 2.

BUGCHECK_P3: 8.

BUGCHECK_P4: 0.

READ_ADDRESS: fffff8054b0fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8054b00f330: Unable to get Flags value from nt!KdVersionBlock.
fffff8054b00f330: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000000.

PROCESS_NAME: System.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

TRAP_FRAME: fffff8055046c580 -- (.trap 0xfffff8055046c580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000001.
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000.
rip=0000000000000000 rsp=fffff8055046c710 rbp=0000000000000000.
r8=ffffb001da7c7180 r9=0000000000000000 r10=0000000000000000.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na pe nc.
00000000`00000000 ?? ???
Resetting default scope.

IP_IN_FREE_BLOCK: 0.

FAILED_INSTRUCTION_ADDRESS:
+0.
00000000`00000000 ?? ???

STACK_TEXT:
fffff805`5046c438 fffff805`4a807769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx.
fffff805`5046c440 fffff805`4a803a69 : 00000000`00000020 00000000`00000000 00000000`00000064 00000000`00000000 : nt!KiBugCheckDispatch+0x69.
fffff805`5046c580 00000000`00000000 : fffff805`5046c960 fffff805`5046cb20 00000001`51dfbcc1 00000000`00989680 : nt!KiPageFault+0x469.

SYMBOL_NAME: nt!KiPageFault+469.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 469.

FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}

Followup: MachineOwner.
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\maksu\Downloads\Compressed\010421-7671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

Mini Kernel Dump does not have process information.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Machine Name:
Kernel base = 0xfffff800`33000000 PsLoadedModuleList = 0xfffff800`33c2a2b0.
Debug session time: Mon Jan 4 18:04:03.053 2021 (UTC + 3:00)
System Uptime: 0 days 3:17:39.740.
Loading Kernel Symbols.
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
.
Loading User Symbols.
Loading unloaded module list.
.........
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff800`333f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff958d`ab75d650=00000000000000a0.
0: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the.
hibernation file.
Arg2: 000000000000000a.
Arg3: 0000000000008371, Incorrect checksum.
Arg4: 000000000000be8e, Previous disk read's checksum.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4062.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-G2EFLS9.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 5254.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

DUMP_FILE_ATTRIBUTES: 0x9.
Hiber Crash Dump.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a0.

BUGCHECK_P1: 10e.

BUGCHECK_P2: a.

BUGCHECK_P3: 8371.

BUGCHECK_P4: be8e.

CUSTOMER_CRASH_COUNT: 1.

STACK_TEXT:
ffff958d`ab75d648 fffff800`339a07ee : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00008371 : nt!KeBugCheckEx.
ffff958d`ab75d650 fffff800`339adc01 : 00000000`00000001 ffffe08f`bb460b90 00000002`07758000 ffffe08f`d4149000 : nt!PopHiberChecksumHiberFileData+0x103ae.
ffff958d`ab75d6b0 fffff800`3399fdc7 : 00000000`00000000 ffffbd08`db135f38 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x7d.
ffff958d`ab75d720 fffff800`3398f5d0 : 000025cb`f2426a08 ffffbd08`db135f38 00000000`00000000 00000000`00000000 : nt!PopRestoreHiberContext+0x1069f.
ffff958d`ab75d7b0 fffff800`3398f316 : fffff800`33c50460 ffff958d`ab75d930 fffff800`33c50460 00000000`00000100 : nt!PopHandleNextState+0x210.
ffff958d`ab75d800 fffff800`3398f093 : 00000000`00000100 fffff800`33c50460 0000001b`9d166555 00000000`00989680 : nt!PopIssueNextState+0x1a.
ffff958d`ab75d830 fffff800`33991c99 : 00000000`0000000a ffff958d`ab75db40 00000000`00000000 fffff800`33991a1f : nt!PopInvokeSystemStateHandler+0x33b.
ffff958d`ab75da30 fffff800`3398c98a : ffffffff`00000000 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt!PopEndMirroring+0x1e9.
ffff958d`ab75daf0 fffff800`3398c675 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MmDuplicateMemory+0x2be.
ffff958d`ab75db80 fffff800`33317e25 : ffffe08f`c862c000 ffffe08f`c862c080 fffff800`3398c540 00000000`00000001 : nt!PopTransitionToSleep+0x135.
ffff958d`ab75dc10 fffff800`333fcdd8 : ffffa880`2e100180 ffffe08f`c862c080 fffff800`33317dd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55.
ffff958d`ab75dc60 00000000`00000000 : ffff958d`ab75e000 ffff958d`ab758000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28.

SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+103ae.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 103ae.

FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}

Followup: MachineOwner.
---------
[/CODE]

Dediklerinizi harfiyen yaptım fakat durum aynı bazen de sistem çalışmaya devam ederken görüntü ve klavye mouse ışıkları gidiyor fakat kasa çalışmaya devam ediyor. Minidump dosyaları aşağıdadır.

 
Bir süre kullanın sistemi. Tekrar olursa dosyaları paylaşın.
Hocam tekrar merhaba, sizi biraz meşgul ediyorum ama lütfen kusuruma bakmayın ve yardımınızı esirgemeyin. Durum aynen devam ediyor ve bazen sistem takılarak çalışıyor. Yani mesela masaüstünde mouse oynatırken takılarak ilerliyor. Dosyalar takılarak açılıyor. Bazen de donup kalıyor. Operayı falan da kaldırdım ama sonuç aynı. Eşim teknik ressam ve gün içinde Autocad - Magicad ile proje çiziyor sistemin bu durumu defalarca projeye baştan başlamasına sebep oluyor. Minidump dosyalarını tekrar ekledim tekrar teşekkürler.

 
DDU ile ekran kartı sürücüsünü silin. Önerilen WHQL sürümü tekrar yükleyin.

Chipset sürücüsünü güncelleyin.

Logitech kolu kullanıyorsanız kullanmayın. Sürücüsü varsa kaldırın.

Ek olarak aşağıdaki rehberi uygulayın.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı