Bilgisayar mavi ekran sorunu

Gunslinger

Kilopat
Katılım
17 Kasım 2017
Mesajlar
133
Daha fazla  
Cinsiyet
Erkek
Öncellikle merhaba, benim bilgisayarım aldığım haftadan beri rastgele bir şekilde çöküyor. Bazen günde 2 veya 3 kere, bazen de günlerce çökmüyor. Sürücü güncellemelerini Driver easy programıyla yaptım şu an bütün sürücülerim güncel gözüküyor. Ben Wi-Fi adaptöründen olduğunu düşünüyorum çünkü onu aldığımdan beri çöküyor. Genelde aldığım hata SYSTEM_SERVICE_EXCEPTION oluyor. (Minidump dosyam)
 
Son düzenleyen: Moderatör:
Öncellikle merhaba, benim bilgisayarım aldığım haftadan beri rastgele bir şekilde çöküyor. Bazen günde 2 veya 3 kere, bazen de günlerce çökmüyor. Sürücü güncellemelerini Driver easy programıyla yaptım şu an bütün sürücülerim güncel gözüküyor. Ben Wi-Fi adaptöründen olduğunu düşünüyorum çünkü onu aldığımdan beri çöküyor. Genelde aldığım hata SYSTEM_SERVICE_EXCEPTION oluyor. (Minidump dosyam)

Yaşadığınız sorun ile ilgili olarak, bilgisayarınızın BIOS, Chipset, ekran kartı ve diğer aygırlarının, Windows 10 işletim sistemi ile uyumlu olan güncel sürücülerini kurunuz. Mavi ekran hataları, genellikle donanım kaynaklı hatalardır. Mavi ekran hatalarını giderme ve Mavi Ekran hatalarını çözme makalelerindeki belirtilen adımları uygulayın ve sorunun çözülüp çözülmediğini gözlemleyiniz.

Ek olarak;

Görüntü + S tuşlarına aynı anda basın, CMD yazın ve arama sonucunda gelen Komut İstemi'ne sağ tıklayarak ''Yönetici olarak çalıştır'' seçeneği ile açınız. Açılan pencereye SFC/SCANNOW yazıp ENTER tuşuna basınız. Sistem taraması %100 olunca bilgisayarınızı yeniden başlatarak durumu kontrol ediniz.

Sorunun devam etmesi durumunda, BURADA yer alan dosyayı masaüstüne indirip, sıkıştırılmış dosyadan çıkartınız. Çıkarttığınız Allupdate.bat dosyasına sağ tıklayarak ''Yönetici olarak çalıştır'' seçeneği ile çalıştırınız. İşlem tamamlanıp, DOS ekranı kapandıktan sonra test ediniz.

Sorunun devam etmesi durumunda, Görüntü + S tuşlarına aynı anda basın, CMD yazın ve arama sonucunda gelen Komut İstemi'ne sağ tıklayarak ''Yönetici olarak çalıştır'' seçeneği ile açınız. Açılan pencereye aşağıdaki komutları sırasıyla girerek ENTER tuşuna basınız.

DISM.exe /Online /Cleanup-image /Scanhealth
DISM.exe /Online /Cleanup-image /Restorehealth


Kaynak: system_service_exception mavi ekran sıkıntısı
 
Son düzenleyen: Moderatör:
Sürücü yükleme programı kullandıysanız format atın bir daha da öyle programlar kullanmayın. Ayrıca Memtest86 ile USB üzerinden bellek testi yapın. Adaptör modelini de söyleyin sürücüsünü biz bulalım. Diğer arkadaşın attıkları hatanızla alakasız.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffda26326ddb84, Address of the instruction which caused the bugcheck
Arg3: ffff838f467a15f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffda26326ddb84

BUGCHECK_P3: ffff838f467a15f0

BUGCHECK_P4: 0

CONTEXT:  ffff838f467a15f0 -- (.cxr 0xffff838f467a15f0)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffda47846d6010
rdx=0000000008424000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffda26326ddb84 rsp=ffff838f467a1fe0 rbp=ffff838f467a2b80
 r8=ffffda478068a8a0  r9=0000000000000000 r10=fffff8078124eb90
r11=ffff7df9da600000 r12=0000000000000000 r13=0000000000000001
r14=ffffda47846d6010 r15=ffffda478068a8a0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
win32kfull!xxxScanSysQueue+0x3e24:
ffffda26`326ddb84 0000            add     byte ptr [rax],al ds:002b:00000000`00000000=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

STACK_TEXT: 
ffff838f`467a1fe0 ffffda26`326a4aab : ffffda47`846d6010 ffff838f`467a2b80 00000000`00000000 ffff7df9`da600000 : win32kfull!xxxScanSysQueue+0x3e24
ffff838f`467a2800 ffffda26`326a40a7 : ffff838f`467a2a20 00000000`00000000 0000003a`00000000 0000003a`4c5feb30 : win32kfull!xxxRealInternalGetMessage+0x98b
ffff838f`467a29e0 fffff807`813d3c18 : 0000003a`4c5feb30 ffffb488`540b4080 ffff838f`467a2aa8 00000000`00000000 : win32kfull!NtUserPeekMessage+0x157
ffff838f`467a2a90 00007ffb`1ca010c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003a`4c5fea18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1ca010c4


CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32kfull
29 errors : !win32kfull (ffffda26326dd911-ffffda26326ddbf9)
ffffda26326dd910  24 *00  04  00  00  0f  11  40  18 *3f  10  8c  24  20  04  00 $......@.?..$ ..
ffffda26326dd920  00  0f  11  48  28  0f  10  84  24 *00  04  00  00  0f  11  40 ...H(...$......@
ffffda26326dd930  38 *ff  10  8c  24  40  04  00  00 *ff  11  48  48  0f  10  84 8...$@.....HH...
...
ffffda26326ddb00  8b *8e  e8  19  5c  f4  ff  83  bc *74  88  00  00  00  00  74 ....\....t.....t
ffffda26326ddb10  6b *03  bc  24  98  00  00  00  00 *84  61  49  8b  86  c8  01 k..$......aI....
ffffda26326ddb20  00 *f0  48  8b  08  8b  41  10  41 *2b  8e  a0  02  00  00  0b ..H...A.A+......
ffffda26326ddb30  c8 *a6  c1  40  74  46  48  8d  8c *84  80  00  00  00  4c  8b ...@tFH.......L.
...
ffffda26326ddb60  8d *89  01  e8  38  ea  fc  ff  48 *3d  8c  24  80  00  00  00 ....8...H=.$....
...
ffffda26326ddb80  89 *14  24  98  00  00  00  0f  b7 *0c  24  ac  00  00  00  c1 ..$.......$.....
ffffda26326ddb90  e1 *20  0f  b7  84  24  a8  00  00 *80  0b  c1  48  98  48  89 . ...$......H.H.
ffffda26326ddba0  84 *74  b8  00  00  00  81  bc  24 *04  00  00  00  00  02  00 .t......$.......
ffffda26326ddbb0  00 *02  16  49  8b  8e  a8  01  00  00  e8  19  e5  fa  ff  8b ...I............
ffffda26326ddbc0  c0 *88  89  84  24  b0  00  00  00 *7b  8c  24  84  00  00  00 ....$....{.$....
ffffda26326ddbd0  8d  81  55  ff  ff  ff  83  f8  02 *16  0b  8d  81  f5  fd  ff ..U.............
ffffda26326ddbe0  ff *03  f8  02  77  14  85  f6  75 *00  48  8b  84  24  30  01 ....w...u.H..$0.
ffffda26326ddbf0  00 *f0  48  09  84  24  b0  00  00 *f0  49  8b  9e  58  02  00 ..H..$....I..X..

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .cxr 0xffff838f467a15f0 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb18fe0b9e1c4, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8001473b202, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for WdFilter.sys

Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 2

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 7

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffb18fe0b9e1c4

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8001473b202

BUGCHECK_P4: 2

READ_ADDRESS: fffff80011b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80011a2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80011a2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffb18fe0b9e1c4

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  TWCU.exe

TRAP_FRAME:  ffffb18fead0df80 -- (.trap 0xffffb18fead0df80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcd86f8fa5660 rbx=0000000000000000 rcx=ffffcd86f2f38380
rdx=ffffb18fead0e1c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001473b202 rsp=ffffb18fead0e110 rbp=ffffb18fead0e130
 r8=ffffb18fead0e1a8  r9=000000000000003e r10=000000ff00000000
r11=ffffa77c57400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
WdFilter+0x4b202:
fffff800`1473b202 32affcffe8f5    xor     ch,byte ptr [rdi-0A170004h] ds:ffffffff`f5e8fffc=??
Resetting default scope

STACK_TEXT: 
ffffb18f`ead0dcd8 fffff800`1182dd34 : 00000000`00000050 ffffb18f`e0b9e1c4 00000000`00000000 ffffb18f`ead0df80 : nt!KeBugCheckEx
ffffb18f`ead0dce0 fffff800`116c91af : 00000000`00000000 00000000`00000000 00000000`00000000 ffffb18f`e0b9e1c4 : nt!MiSystemFault+0x195c94
ffffb18f`ead0dde0 fffff800`117d041e : ffffcd86`fa0072f8 00000000`00000000 00000000`10000004 00000000`000000c0 : nt!MmAccessFault+0x34f
ffffb18f`ead0df80 fffff800`1473b202 : 00000000`00000000 ffffdd86`12c1ac40 ffffcd86`e6974bc0 ffffb18f`ead0e1e9 : nt!KiPageFault+0x35e
ffffb18f`ead0e110 00000000`00000000 : ffffdd86`12c1ac40 ffffcd86`e6974bc0 ffffb18f`ead0e1e9 ffffb18f`ead0e1e9 : WdFilter+0x4b202


SYMBOL_NAME:  WdFilter+4b202

MODULE_NAME: WdFilter

IMAGE_NAME:  WdFilter.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b202

FAILURE_BUCKET_ID:  AV_R_INVALID_WdFilter!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {90a95f8f-f779-a86f-19f1-7c77e04a9e0a}

Followup:     MachineOwner
---------
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8004d121183, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8004d121183

WRITE_ADDRESS: fffff8003a7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8003a62a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8003a62a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80040267550 -- (.trap 0xfffff80040267550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000113e4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8004d121183 rsp=fffff800402676e0 rbp=fffff80040267750
 r8=00000000001b7df1  r9=0000000000000064 r10=0000fffff8004d12
r11=ffff9a7c28a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
amdppm+0x1183:
fffff800`4d121183 f02000          lock and byte ptr [rax],al ds:00000000`00000000=??
Resetting default scope

STACK_TEXT: 
fffff800`40267408 fffff800`3a3d41e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`40267410 fffff800`3a3d0529 : fffff800`38579180 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`40267550 fffff800`4d121183 : fffff800`40267889 fffff800`3a29db07 fffff800`3a638c00 00000000`00000000 : nt!KiPageFault+0x469
fffff800`402676e0 fffff800`3a22c7f2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : amdppm+0x1183
fffff800`40267780 fffff800`3a243bc0 : fffff800`3857bf80 fffff800`3a63b500 fffff800`38579180 fffff800`3a30a929 : nt!PpmCheckComputeEnergy+0x1a2
fffff800`40267860 fffff800`3a2c115a : fffff800`3857bf80 00000000`00000001 fffff800`3857ef90 fffff800`38579180 : nt!PpmCheckRun+0x40
fffff800`402678f0 fffff800`3a2c07af : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x30a
fffff800`40267a30 fffff800`3a3c5ebe : 00000000`00000000 fffff800`38579180 fffff800`3a791400 ffffcf02`f309b0c0 : nt!KiRetireDpcList+0x1ef
fffff800`40267c60 00000000`00000000 : fffff800`40268000 fffff800`40262000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e


CHKIMG_EXTENSION: !chkimg -lo 50 -db !amdppm
13 errors : !amdppm (fffff8004d121181-fffff8004d1211f1)
fffff8004d121180  c0 *e7  45  f0  20  00  00  00  21  45  f4  45  33  e4  4c  21 ..E. ...!E.E3.L!
fffff8004d121190  65 *48  44  8b  e9  48  89  45  c0 *88  89  45  c8  48  89  45 eHD..H.E...E.H.E
fffff8004d1211a0  d0 *d8  8d  05  80  22  01  00  48 *09  45  d8  48  89  45  e0 ....."..H.E.H.E.
fffff8004d1211b0  e9 *f6  00  00  00  48  8b  5d  b8 *ff  b6  83  70  01  00  00 .....H.]....p...
fffff8004d1211c0  41 *8b  c5  0f  85  c2  00  00  00 *08  8d  b3  b0  04  00  00 A...............
fffff8004d1211d0  48 *bb  ce  4c  8b  15  ae  9e  01  00  e8  61  50  14  ed  89 H..L.......aP...
fffff8004d1211e0  45 *30  3b  43  38  0f  85  a0  00 *40  00  33  db  48  8d  4d E0;C8....@.3.H.M
fffff8004d1211f0  c0 *c3  ff  45  33  f6  45  33  ff  48  8b  d6  4c  8b  15  b5 ...E3.E3.H..L...

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffffa081a5d85ff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa081a5d85f48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 7

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  139

BUGCHECK_P1: 4

BUGCHECK_P2: ffffa081a5d85ff0

BUGCHECK_P3: ffffa081a5d85f48

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa081a5d85ff0 -- (.trap 0xffffa081a5d85ff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff5873f312000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffff5873f318000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8030f2002f1 rsp=ffffa081a5d86180 rbp=ffffa081a5d866f0
 r8=fffff5873f318000  r9=ffffa081a5d86710 r10=ffffb78f53202500
r11=fffff58742db0460 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlpGetStackLimitsEx+0x19e355:
fffff803`0f2002f1 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa081a5d85f48 -- (.exr 0xffffa081a5d85f48)
ExceptionAddress: fffff8030f2002f1 (nt!RtlpGetStackLimitsEx+0x000000000019e355)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

EXCEPTION_STR:  0xc0000409

BAD_STACK_POINTER:  ffffa081a5d85cc8

STACK_TEXT: 
ffffa081`a5d85cc8 fffff803`0f1d41e9 : 00000000`00000139 00000000`00000004 ffffa081`a5d85ff0 ffffa081`a5d85f48 : nt!KeBugCheckEx
ffffa081`a5d85cd0 fffff803`0f1d4610 : 00000028`000000b0 00040000`00180400 00000020`00000008 00300033`00490024 : nt!KiBugCheckDispatch+0x69
ffffa081`a5d85e10 fffff803`0f1d29a3 : fffff803`0f069038 fffff803`0f40e844 ffffa081`a5d867d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffa081`a5d85ff0 fffff803`0f2002f1 : 00000000`00000000 00000000`0000002e 0005e338`00ab7000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x323
ffffa081`a5d86180 fffff803`0f25982a : 00000000`00000000 00000000`00000000 ffffa081`a5d866f0 00007fff`00000002 : nt!RtlpGetStackLimitsEx+0x19e355
ffffa081`a5d861b0 fffff803`0f0fe85e : fffff587`3f316d18 ffffa081`a5d86e30 fffff587`3f316d18 00000000`00000002 : nt!RtlDispatchException+0x15fa0a
ffffa081`a5d86900 fffff803`0f1c3202 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffa081`a5d86fb0 fffff803`0f1c31d0 : fffff803`0f1d4316 00000000`00000000 00000000`00000000 ffffb78f`4dacec10 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff587`3f316bd8 fffff803`0f1d4316 : 00000000`00000000 00000000`00000000 ffffb78f`4dacec10 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff587`3f316be0 fffff803`0f1d00a0 : ffffb78f`459dac10 00000000`00000002 fffff803`0f000000 fffff803`0f10c316 : nt!KiExceptionDispatch+0x116
fffff587`3f316dc0 fffff803`14acafa6 : ffffb78f`45a11c00 fffff587`3f317050 00000000`00000020 ffffb78f`4797ec30 : nt!KiGeneralProtectionFault+0x320
fffff587`3f316f50 fffff803`14ad1a4d : 00000000`88e74ec1 ffffb78f`470f10d0 ffffb78f`51479c64 fffff587`3f317490 : tcpip+0x5afa6
fffff587`3f317260 fffff803`14abe293 : ffffb78f`50817400 ffffb78f`508174c8 ffffb78f`4b32cd40 fffff803`1481dbf3 : tcpip+0x61a4d
fffff587`3f3173f0 fffff803`14abd050 : ffffb78f`47e5f000 fffff587`3f317700 ffffb78f`4b32cd40 ffffb78f`47c82b40 : tcpip+0x4e293
fffff587`3f317640 fffff803`14abadcc : 00000000`00000001 fffff587`3f317991 ffffb78f`51503d06 00000000`00000000 : tcpip+0x4d050
fffff587`3f3178f0 fffff803`14ab74e2 : ffffb78f`47ebd0d9 fffff803`14ab5000 00000000`00000003 ffffb78f`4f8b5001 : tcpip+0x4adcc
fffff587`3f3179f0 fffff803`14a84642 : ffffb78f`00000014 ffffb78f`47e5f140 ffffb78f`589ec1f0 ffffb78f`589f4d80 : tcpip+0x474e2
fffff587`3f317a30 fffff803`14abb998 : 00000000`00000000 00000000`00000000 fffff587`3f317bb9 fffff587`3f317b80 : tcpip+0x14642
fffff587`3f317b20 fffff803`14a806df : fffff803`14c6e2e0 ffffb78f`47c798a0 ffffb78f`47e5f000 00000000`00000000 : tcpip+0x4b998
fffff587`3f317c20 fffff803`14a8037c : ffffb78f`4fd7b110 00000000`00000001 00000000`00000001 00000000`00000000 : tcpip+0x106df
fffff587`3f317d30 fffff803`14aa24ce : ffffb78f`589ec1f0 00000000`00000000 00000000`00000000 fffff587`3f317db4 : tcpip+0x1037c
fffff587`3f317d60 fffff803`14aa19a2 : fffff587`3f317f01 ffffb78f`4dc36800 fffff803`14a91210 fffff587`42db06a8 : tcpip+0x324ce
fffff587`3f317e50 fffff803`0f1c5c4e : 00000000`00000000 00000000`00000000 fffff587`3f317fd0 ffffb78f`53202500 : tcpip+0x319a2
fffff587`3f317f80 fffff803`0f1c5c0c : fffff587`3f317fd0 ffffb78f`53202500 fffff587`3f318000 fffff803`0f0c042e : nt!KxSwitchKernelStackCallout+0x2e
fffff587`42db0460 fffff803`0f0c042e : fffff587`3f317fd0 fffff587`3f318000 00000000`00000000 fffff803`00000000 : nt!KiSwitchKernelStackContinue
fffff587`42db0480 fffff803`0f0c022c : fffff803`14aa18d0 fffff587`42db06c8 00000001`00000002 fffffff6`00000002 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x18e
fffff587`42db0520 fffff803`0f0c00a3 : fffff587`42db0740 ffffb78f`47eb9d80 00000000`00000002 00000000`00000000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xdc
fffff587`42db0590 fffff803`0f0c005d : fffff803`14aa18d0 fffff587`42db06c8 ffffb78f`478fe170 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x33
fffff587`42db0600 fffff803`14a91741 : 00000000`00000000 ffffb78f`53c44010 00000000`00000000 fffff803`0ef5f37a : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff587`42db0640 fffff803`1481b530 : ffffb78f`4db9d601 ffffb78f`57c33ec1 00000000`00000020 00000000`00000000 : tcpip+0x21741
fffff587`42db08e0 fffff803`1481b027 : ffffb78f`4f8f7c10 fffff803`14d60001 fffff587`00000000 ffffb78f`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff587`42db09c0 fffff803`14830ffe : ffffb78f`4ee201a0 ffffb78f`00000000 ffffb78f`589f4d80 ffffb78f`51503cd2 : ndis!ndisMTopReceiveNetBufferLists+0x227
fffff587`42db0ac0 fffff803`14820cfb : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`1f2b7777 : ndis!ndisInvokeNextReceiveHandler+0x4e
fffff587`42db0b90 fffff803`148212fd : ffffb78f`5d26ee00 ffffb78f`53f436f0 ffffb78f`00000000 00000000`00000002 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x2db
fffff587`42db0c50 fffff803`1f27d7ec : ffffb78f`51b75010 00000000`00000001 ffffb78f`589f4d80 ffffb78f`51b760e8 : ndis!NdisFIndicateReceiveNetBufferLists+0x6d
fffff587`42db0c90 fffff803`14820eb0 : ffffb78f`53b359e0 fffff803`1f27d520 ffffb78f`59e574f0 00000000`00000018 : nwifi!Pt6Receive+0x2cc
fffff587`42db0cf0 fffff803`1482a33d : ffffb78f`53202500 fffff587`42db0ec1 fffff587`42db0ea0 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff587`42db0d40 fffff803`0f0c00e8 : fffff587`42db0ec1 ffffb78f`53b359e0 00000000`00000000 00001f80`00310080 : ndis!ndisDataPathExpandStackCallback+0x3d
fffff587`42db0d90 fffff803`0f0c005d : fffff803`1482a300 fffff587`42db0ea0 ffffb78f`53f436f0 fffff803`0f1c884e : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff587`42db0e00 fffff803`14851773 : 00000000`00000000 00001f80`00000000 fffff803`0ef60d70 fffff803`0ef5dd76 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff587`42db0e40 fffff803`14820cfb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0x207c3
fffff587`42db0f10 fffff803`148212fd : ffffb78f`548dd200 ffffb78f`548dd278 fffff803`00000000 ffffb78f`00000002 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x2db
fffff587`42db0fd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!NdisFIndicateReceiveNetBufferLists+0x6d


SYMBOL_NAME:  tcpip+5afa6

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

IMAGE_VERSION:  10.0.18362.836

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5afa6

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_tcpip!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a0f03170-1de3-9a48-5b54-d03d97eeb010}

Followup:     MachineOwner
---------
 
Sürücü yükleme programı kullandıysanız format atın bir daha da öyle programlar kullanmayın. Ayrıca Memtest86 ile USB üzerinden bellek testi yapın. Adaptör modelini de söyleyin sürücüsünü biz bulalım. Diğer arkadaşın attıkları hatanızla alakasız.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffda26326ddb84, Address of the instruction which caused the bugcheck
Arg3: ffff838f467a15f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffda26326ddb84

BUGCHECK_P3: ffff838f467a15f0

BUGCHECK_P4: 0

CONTEXT:  ffff838f467a15f0 -- (.cxr 0xffff838f467a15f0)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffda47846d6010
rdx=0000000008424000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffda26326ddb84 rsp=ffff838f467a1fe0 rbp=ffff838f467a2b80
r8=ffffda478068a8a0  r9=0000000000000000 r10=fffff8078124eb90
r11=ffff7df9da600000 r12=0000000000000000 r13=0000000000000001
r14=ffffda47846d6010 r15=ffffda478068a8a0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
win32kfull!xxxScanSysQueue+0x3e24:
ffffda26`326ddb84 0000            add     byte ptr [rax],al ds:002b:00000000`00000000=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

STACK_TEXT:
ffff838f`467a1fe0 ffffda26`326a4aab : ffffda47`846d6010 ffff838f`467a2b80 00000000`00000000 ffff7df9`da600000 : win32kfull!xxxScanSysQueue+0x3e24
ffff838f`467a2800 ffffda26`326a40a7 : ffff838f`467a2a20 00000000`00000000 0000003a`00000000 0000003a`4c5feb30 : win32kfull!xxxRealInternalGetMessage+0x98b
ffff838f`467a29e0 fffff807`813d3c18 : 0000003a`4c5feb30 ffffb488`540b4080 ffff838f`467a2aa8 00000000`00000000 : win32kfull!NtUserPeekMessage+0x157
ffff838f`467a2a90 00007ffb`1ca010c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003a`4c5fea18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1ca010c4


CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32kfull
29 errors : !win32kfull (ffffda26326dd911-ffffda26326ddbf9)
ffffda26326dd910  24 *00  04  00  00  0f  11  40  18 *3f  10  8c  24  20  04  00 $......@.?..$ ..
ffffda26326dd920  00  0f  11  48  28  0f  10  84  24 *00  04  00  00  0f  11  40 ...H(...$......@
ffffda26326dd930  38 *ff  10  8c  24  40  04  00  00 *ff  11  48  48  0f  10  84 8...$@.....HH...
...
ffffda26326ddb00  8b *8e  e8  19  5c  f4  ff  83  bc *74  88  00  00  00  00  74 ....\....t.....t
ffffda26326ddb10  6b *03  bc  24  98  00  00  00  00 *84  61  49  8b  86  c8  01 k..$......aI....
ffffda26326ddb20  00 *f0  48  8b  08  8b  41  10  41 *2b  8e  a0  02  00  00  0b ..H...A.A+......
ffffda26326ddb30  c8 *a6  c1  40  74  46  48  8d  8c *84  80  00  00  00  4c  8b ...@tFH.......L.
...
ffffda26326ddb60  8d *89  01  e8  38  ea  fc  ff  48 *3d  8c  24  80  00  00  00 ....8...H=.$....
...
ffffda26326ddb80  89 *14  24  98  00  00  00  0f  b7 *0c  24  ac  00  00  00  c1 ..$.......$.....
ffffda26326ddb90  e1 *20  0f  b7  84  24  a8  00  00 *80  0b  c1  48  98  48  89 . ...$......H.H.
ffffda26326ddba0  84 *74  b8  00  00  00  81  bc  24 *04  00  00  00  00  02  00 .t......$.......
ffffda26326ddbb0  00 *02  16  49  8b  8e  a8  01  00  00  e8  19  e5  fa  ff  8b ...I............
ffffda26326ddbc0  c0 *88  89  84  24  b0  00  00  00 *7b  8c  24  84  00  00  00 ....$....{.$....
ffffda26326ddbd0  8d  81  55  ff  ff  ff  83  f8  02 *16  0b  8d  81  f5  fd  ff ..U.............
ffffda26326ddbe0  ff *03  f8  02  77  14  85  f6  75 *00  48  8b  84  24  30  01 ....w...u.H..$0.
ffffda26326ddbf0  00 *f0  48  09  84  24  b0  00  00 *f0  49  8b  9e  58  02  00 ..H..$....I..X..

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .cxr 0xffff838f467a15f0 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb18fe0b9e1c4, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8001473b202, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for WdFilter.sys

Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 2

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 7

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffb18fe0b9e1c4

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8001473b202

BUGCHECK_P4: 2

READ_ADDRESS: fffff80011b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80011a2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80011a2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb18fe0b9e1c4

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  TWCU.exe

TRAP_FRAME:  ffffb18fead0df80 -- (.trap 0xffffb18fead0df80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcd86f8fa5660 rbx=0000000000000000 rcx=ffffcd86f2f38380
rdx=ffffb18fead0e1c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001473b202 rsp=ffffb18fead0e110 rbp=ffffb18fead0e130
r8=ffffb18fead0e1a8  r9=000000000000003e r10=000000ff00000000
r11=ffffa77c57400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
WdFilter+0x4b202:
fffff800`1473b202 32affcffe8f5    xor     ch,byte ptr [rdi-0A170004h] ds:ffffffff`f5e8fffc=??
Resetting default scope

STACK_TEXT:
ffffb18f`ead0dcd8 fffff800`1182dd34 : 00000000`00000050 ffffb18f`e0b9e1c4 00000000`00000000 ffffb18f`ead0df80 : nt!KeBugCheckEx
ffffb18f`ead0dce0 fffff800`116c91af : 00000000`00000000 00000000`00000000 00000000`00000000 ffffb18f`e0b9e1c4 : nt!MiSystemFault+0x195c94
ffffb18f`ead0dde0 fffff800`117d041e : ffffcd86`fa0072f8 00000000`00000000 00000000`10000004 00000000`000000c0 : nt!MmAccessFault+0x34f
ffffb18f`ead0df80 fffff800`1473b202 : 00000000`00000000 ffffdd86`12c1ac40 ffffcd86`e6974bc0 ffffb18f`ead0e1e9 : nt!KiPageFault+0x35e
ffffb18f`ead0e110 00000000`00000000 : ffffdd86`12c1ac40 ffffcd86`e6974bc0 ffffb18f`ead0e1e9 ffffb18f`ead0e1e9 : WdFilter+0x4b202


SYMBOL_NAME:  WdFilter+4b202

MODULE_NAME: WdFilter

IMAGE_NAME:  WdFilter.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b202

FAILURE_BUCKET_ID:  AV_R_INVALID_WdFilter!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {90a95f8f-f779-a86f-19f1-7c77e04a9e0a}

Followup:     MachineOwner
---------
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8004d121183, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8004d121183

WRITE_ADDRESS: fffff8003a7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8003a62a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8003a62a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80040267550 -- (.trap 0xfffff80040267550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000113e4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8004d121183 rsp=fffff800402676e0 rbp=fffff80040267750
r8=00000000001b7df1  r9=0000000000000064 r10=0000fffff8004d12
r11=ffff9a7c28a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
amdppm+0x1183:
fffff800`4d121183 f02000          lock and byte ptr [rax],al ds:00000000`00000000=??
Resetting default scope

STACK_TEXT:
fffff800`40267408 fffff800`3a3d41e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`40267410 fffff800`3a3d0529 : fffff800`38579180 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`40267550 fffff800`4d121183 : fffff800`40267889 fffff800`3a29db07 fffff800`3a638c00 00000000`00000000 : nt!KiPageFault+0x469
fffff800`402676e0 fffff800`3a22c7f2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : amdppm+0x1183
fffff800`40267780 fffff800`3a243bc0 : fffff800`3857bf80 fffff800`3a63b500 fffff800`38579180 fffff800`3a30a929 : nt!PpmCheckComputeEnergy+0x1a2
fffff800`40267860 fffff800`3a2c115a : fffff800`3857bf80 00000000`00000001 fffff800`3857ef90 fffff800`38579180 : nt!PpmCheckRun+0x40
fffff800`402678f0 fffff800`3a2c07af : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x30a
fffff800`40267a30 fffff800`3a3c5ebe : 00000000`00000000 fffff800`38579180 fffff800`3a791400 ffffcf02`f309b0c0 : nt!KiRetireDpcList+0x1ef
fffff800`40267c60 00000000`00000000 : fffff800`40268000 fffff800`40262000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e


CHKIMG_EXTENSION: !chkimg -lo 50 -db !amdppm
13 errors : !amdppm (fffff8004d121181-fffff8004d1211f1)
fffff8004d121180  c0 *e7  45  f0  20  00  00  00  21  45  f4  45  33  e4  4c  21 ..E. ...!E.E3.L!
fffff8004d121190  65 *48  44  8b  e9  48  89  45  c0 *88  89  45  c8  48  89  45 eHD..H.E...E.H.E
fffff8004d1211a0  d0 *d8  8d  05  80  22  01  00  48 *09  45  d8  48  89  45  e0 ....."..H.E.H.E.
fffff8004d1211b0  e9 *f6  00  00  00  48  8b  5d  b8 *ff  b6  83  70  01  00  00 .....H.]....p...
fffff8004d1211c0  41 *8b  c5  0f  85  c2  00  00  00 *08  8d  b3  b0  04  00  00 A...............
fffff8004d1211d0  48 *bb  ce  4c  8b  15  ae  9e  01  00  e8  61  50  14  ed  89 H..L.......aP...
fffff8004d1211e0  45 *30  3b  43  38  0f  85  a0  00 *40  00  33  db  48  8d  4d E0;C8....@.3.H.M
fffff8004d1211f0  c0 *c3  ff  45  33  f6  45  33  ff  48  8b  d6  4c  8b  15  b5 ...E3.E3.H..L...

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffffa081a5d85ff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa081a5d85f48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 7

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  139

BUGCHECK_P1: 4

BUGCHECK_P2: ffffa081a5d85ff0

BUGCHECK_P3: ffffa081a5d85f48

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa081a5d85ff0 -- (.trap 0xffffa081a5d85ff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff5873f312000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffff5873f318000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8030f2002f1 rsp=ffffa081a5d86180 rbp=ffffa081a5d866f0
r8=fffff5873f318000  r9=ffffa081a5d86710 r10=ffffb78f53202500
r11=fffff58742db0460 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlpGetStackLimitsEx+0x19e355:
fffff803`0f2002f1 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa081a5d85f48 -- (.exr 0xffffa081a5d85f48)
ExceptionAddress: fffff8030f2002f1 (nt!RtlpGetStackLimitsEx+0x000000000019e355)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

EXCEPTION_STR:  0xc0000409

BAD_STACK_POINTER:  ffffa081a5d85cc8

STACK_TEXT:
ffffa081`a5d85cc8 fffff803`0f1d41e9 : 00000000`00000139 00000000`00000004 ffffa081`a5d85ff0 ffffa081`a5d85f48 : nt!KeBugCheckEx
ffffa081`a5d85cd0 fffff803`0f1d4610 : 00000028`000000b0 00040000`00180400 00000020`00000008 00300033`00490024 : nt!KiBugCheckDispatch+0x69
ffffa081`a5d85e10 fffff803`0f1d29a3 : fffff803`0f069038 fffff803`0f40e844 ffffa081`a5d867d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffa081`a5d85ff0 fffff803`0f2002f1 : 00000000`00000000 00000000`0000002e 0005e338`00ab7000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x323
ffffa081`a5d86180 fffff803`0f25982a : 00000000`00000000 00000000`00000000 ffffa081`a5d866f0 00007fff`00000002 : nt!RtlpGetStackLimitsEx+0x19e355
ffffa081`a5d861b0 fffff803`0f0fe85e : fffff587`3f316d18 ffffa081`a5d86e30 fffff587`3f316d18 00000000`00000002 : nt!RtlDispatchException+0x15fa0a
ffffa081`a5d86900 fffff803`0f1c3202 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffa081`a5d86fb0 fffff803`0f1c31d0 : fffff803`0f1d4316 00000000`00000000 00000000`00000000 ffffb78f`4dacec10 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff587`3f316bd8 fffff803`0f1d4316 : 00000000`00000000 00000000`00000000 ffffb78f`4dacec10 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff587`3f316be0 fffff803`0f1d00a0 : ffffb78f`459dac10 00000000`00000002 fffff803`0f000000 fffff803`0f10c316 : nt!KiExceptionDispatch+0x116
fffff587`3f316dc0 fffff803`14acafa6 : ffffb78f`45a11c00 fffff587`3f317050 00000000`00000020 ffffb78f`4797ec30 : nt!KiGeneralProtectionFault+0x320
fffff587`3f316f50 fffff803`14ad1a4d : 00000000`88e74ec1 ffffb78f`470f10d0 ffffb78f`51479c64 fffff587`3f317490 : tcpip+0x5afa6
fffff587`3f317260 fffff803`14abe293 : ffffb78f`50817400 ffffb78f`508174c8 ffffb78f`4b32cd40 fffff803`1481dbf3 : tcpip+0x61a4d
fffff587`3f3173f0 fffff803`14abd050 : ffffb78f`47e5f000 fffff587`3f317700 ffffb78f`4b32cd40 ffffb78f`47c82b40 : tcpip+0x4e293
fffff587`3f317640 fffff803`14abadcc : 00000000`00000001 fffff587`3f317991 ffffb78f`51503d06 00000000`00000000 : tcpip+0x4d050
fffff587`3f3178f0 fffff803`14ab74e2 : ffffb78f`47ebd0d9 fffff803`14ab5000 00000000`00000003 ffffb78f`4f8b5001 : tcpip+0x4adcc
fffff587`3f3179f0 fffff803`14a84642 : ffffb78f`00000014 ffffb78f`47e5f140 ffffb78f`589ec1f0 ffffb78f`589f4d80 : tcpip+0x474e2
fffff587`3f317a30 fffff803`14abb998 : 00000000`00000000 00000000`00000000 fffff587`3f317bb9 fffff587`3f317b80 : tcpip+0x14642
fffff587`3f317b20 fffff803`14a806df : fffff803`14c6e2e0 ffffb78f`47c798a0 ffffb78f`47e5f000 00000000`00000000 : tcpip+0x4b998
fffff587`3f317c20 fffff803`14a8037c : ffffb78f`4fd7b110 00000000`00000001 00000000`00000001 00000000`00000000 : tcpip+0x106df
fffff587`3f317d30 fffff803`14aa24ce : ffffb78f`589ec1f0 00000000`00000000 00000000`00000000 fffff587`3f317db4 : tcpip+0x1037c
fffff587`3f317d60 fffff803`14aa19a2 : fffff587`3f317f01 ffffb78f`4dc36800 fffff803`14a91210 fffff587`42db06a8 : tcpip+0x324ce
fffff587`3f317e50 fffff803`0f1c5c4e : 00000000`00000000 00000000`00000000 fffff587`3f317fd0 ffffb78f`53202500 : tcpip+0x319a2
fffff587`3f317f80 fffff803`0f1c5c0c : fffff587`3f317fd0 ffffb78f`53202500 fffff587`3f318000 fffff803`0f0c042e : nt!KxSwitchKernelStackCallout+0x2e
fffff587`42db0460 fffff803`0f0c042e : fffff587`3f317fd0 fffff587`3f318000 00000000`00000000 fffff803`00000000 : nt!KiSwitchKernelStackContinue
fffff587`42db0480 fffff803`0f0c022c : fffff803`14aa18d0 fffff587`42db06c8 00000001`00000002 fffffff6`00000002 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x18e
fffff587`42db0520 fffff803`0f0c00a3 : fffff587`42db0740 ffffb78f`47eb9d80 00000000`00000002 00000000`00000000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xdc
fffff587`42db0590 fffff803`0f0c005d : fffff803`14aa18d0 fffff587`42db06c8 ffffb78f`478fe170 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x33
fffff587`42db0600 fffff803`14a91741 : 00000000`00000000 ffffb78f`53c44010 00000000`00000000 fffff803`0ef5f37a : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff587`42db0640 fffff803`1481b530 : ffffb78f`4db9d601 ffffb78f`57c33ec1 00000000`00000020 00000000`00000000 : tcpip+0x21741
fffff587`42db08e0 fffff803`1481b027 : ffffb78f`4f8f7c10 fffff803`14d60001 fffff587`00000000 ffffb78f`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff587`42db09c0 fffff803`14830ffe : ffffb78f`4ee201a0 ffffb78f`00000000 ffffb78f`589f4d80 ffffb78f`51503cd2 : ndis!ndisMTopReceiveNetBufferLists+0x227
fffff587`42db0ac0 fffff803`14820cfb : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`1f2b7777 : ndis!ndisInvokeNextReceiveHandler+0x4e
fffff587`42db0b90 fffff803`148212fd : ffffb78f`5d26ee00 ffffb78f`53f436f0 ffffb78f`00000000 00000000`00000002 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x2db
fffff587`42db0c50 fffff803`1f27d7ec : ffffb78f`51b75010 00000000`00000001 ffffb78f`589f4d80 ffffb78f`51b760e8 : ndis!NdisFIndicateReceiveNetBufferLists+0x6d
fffff587`42db0c90 fffff803`14820eb0 : ffffb78f`53b359e0 fffff803`1f27d520 ffffb78f`59e574f0 00000000`00000018 : nwifi!Pt6Receive+0x2cc
fffff587`42db0cf0 fffff803`1482a33d : ffffb78f`53202500 fffff587`42db0ec1 fffff587`42db0ea0 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff587`42db0d40 fffff803`0f0c00e8 : fffff587`42db0ec1 ffffb78f`53b359e0 00000000`00000000 00001f80`00310080 : ndis!ndisDataPathExpandStackCallback+0x3d
fffff587`42db0d90 fffff803`0f0c005d : fffff803`1482a300 fffff587`42db0ea0 ffffb78f`53f436f0 fffff803`0f1c884e : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff587`42db0e00 fffff803`14851773 : 00000000`00000000 00001f80`00000000 fffff803`0ef60d70 fffff803`0ef5dd76 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff587`42db0e40 fffff803`14820cfb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0x207c3
fffff587`42db0f10 fffff803`148212fd : ffffb78f`548dd200 ffffb78f`548dd278 fffff803`00000000 ffffb78f`00000002 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x2db
fffff587`42db0fd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!NdisFIndicateReceiveNetBufferLists+0x6d


SYMBOL_NAME:  tcpip+5afa6

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

IMAGE_VERSION:  10.0.18362.836

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5afa6

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_tcpip!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a0f03170-1de3-9a48-5b54-d03d97eeb010}

Followup:     MachineOwner
---------
TP-LINK TL-WN822N V5
 
Lütfen DriverBooster, DriverEasy gibi programları kullanmayın. kullanacaksanız da geri yükleme noktası oluşturun. Başıma geldi ekran kartı driver'ı dahil bütün driverlar'ım gitti. Allahtan geri yükleme noktası oluşturmuştum.
 
Bugün de
Sürücü yükleme programı kullandıysanız format atın bir daha da öyle programlar kullanmayın. Ayrıca Memtest86 ile USB üzerinden bellek testi yapın. Adaptör modelini de söyleyin sürücüsünü biz bulalım. Diğer arkadaşın attıkları hatanızla alakasız.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffda26326ddb84, Address of the instruction which caused the bugcheck
Arg3: ffff838f467a15f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffda26326ddb84

BUGCHECK_P3: ffff838f467a15f0

BUGCHECK_P4: 0

CONTEXT:  ffff838f467a15f0 -- (.cxr 0xffff838f467a15f0)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffda47846d6010
rdx=0000000008424000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffda26326ddb84 rsp=ffff838f467a1fe0 rbp=ffff838f467a2b80
r8=ffffda478068a8a0  r9=0000000000000000 r10=fffff8078124eb90
r11=ffff7df9da600000 r12=0000000000000000 r13=0000000000000001
r14=ffffda47846d6010 r15=ffffda478068a8a0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
win32kfull!xxxScanSysQueue+0x3e24:
ffffda26`326ddb84 0000            add     byte ptr [rax],al ds:002b:00000000`00000000=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

STACK_TEXT:
ffff838f`467a1fe0 ffffda26`326a4aab : ffffda47`846d6010 ffff838f`467a2b80 00000000`00000000 ffff7df9`da600000 : win32kfull!xxxScanSysQueue+0x3e24
ffff838f`467a2800 ffffda26`326a40a7 : ffff838f`467a2a20 00000000`00000000 0000003a`00000000 0000003a`4c5feb30 : win32kfull!xxxRealInternalGetMessage+0x98b
ffff838f`467a29e0 fffff807`813d3c18 : 0000003a`4c5feb30 ffffb488`540b4080 ffff838f`467a2aa8 00000000`00000000 : win32kfull!NtUserPeekMessage+0x157
ffff838f`467a2a90 00007ffb`1ca010c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003a`4c5fea18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1ca010c4


CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32kfull
29 errors : !win32kfull (ffffda26326dd911-ffffda26326ddbf9)
ffffda26326dd910  24 *00  04  00  00  0f  11  40  18 *3f  10  8c  24  20  04  00 $......@.?..$ ..
ffffda26326dd920  00  0f  11  48  28  0f  10  84  24 *00  04  00  00  0f  11  40 ...H(...$......@
ffffda26326dd930  38 *ff  10  8c  24  40  04  00  00 *ff  11  48  48  0f  10  84 8...$@.....HH...
...
ffffda26326ddb00  8b *8e  e8  19  5c  f4  ff  83  bc *74  88  00  00  00  00  74 ....\....t.....t
ffffda26326ddb10  6b *03  bc  24  98  00  00  00  00 *84  61  49  8b  86  c8  01 k..$......aI....
ffffda26326ddb20  00 *f0  48  8b  08  8b  41  10  41 *2b  8e  a0  02  00  00  0b ..H...A.A+......
ffffda26326ddb30  c8 *a6  c1  40  74  46  48  8d  8c *84  80  00  00  00  4c  8b ...@tFH.......L.
...
ffffda26326ddb60  8d *89  01  e8  38  ea  fc  ff  48 *3d  8c  24  80  00  00  00 ....8...H=.$....
...
ffffda26326ddb80  89 *14  24  98  00  00  00  0f  b7 *0c  24  ac  00  00  00  c1 ..$.......$.....
ffffda26326ddb90  e1 *20  0f  b7  84  24  a8  00  00 *80  0b  c1  48  98  48  89 . ...$......H.H.
ffffda26326ddba0  84 *74  b8  00  00  00  81  bc  24 *04  00  00  00  00  02  00 .t......$.......
ffffda26326ddbb0  00 *02  16  49  8b  8e  a8  01  00  00  e8  19  e5  fa  ff  8b ...I............
ffffda26326ddbc0  c0 *88  89  84  24  b0  00  00  00 *7b  8c  24  84  00  00  00 ....$....{.$....
ffffda26326ddbd0  8d  81  55  ff  ff  ff  83  f8  02 *16  0b  8d  81  f5  fd  ff ..U.............
ffffda26326ddbe0  ff *03  f8  02  77  14  85  f6  75 *00  48  8b  84  24  30  01 ....w...u.H..$0.
ffffda26326ddbf0  00 *f0  48  09  84  24  b0  00  00 *f0  49  8b  9e  58  02  00 ..H..$....I..X..

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .cxr 0xffff838f467a15f0 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb18fe0b9e1c4, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8001473b202, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for WdFilter.sys

Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 2

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 7

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffb18fe0b9e1c4

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8001473b202

BUGCHECK_P4: 2

READ_ADDRESS: fffff80011b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80011a2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80011a2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb18fe0b9e1c4

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  TWCU.exe

TRAP_FRAME:  ffffb18fead0df80 -- (.trap 0xffffb18fead0df80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcd86f8fa5660 rbx=0000000000000000 rcx=ffffcd86f2f38380
rdx=ffffb18fead0e1c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001473b202 rsp=ffffb18fead0e110 rbp=ffffb18fead0e130
r8=ffffb18fead0e1a8  r9=000000000000003e r10=000000ff00000000
r11=ffffa77c57400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
WdFilter+0x4b202:
fffff800`1473b202 32affcffe8f5    xor     ch,byte ptr [rdi-0A170004h] ds:ffffffff`f5e8fffc=??
Resetting default scope

STACK_TEXT:
ffffb18f`ead0dcd8 fffff800`1182dd34 : 00000000`00000050 ffffb18f`e0b9e1c4 00000000`00000000 ffffb18f`ead0df80 : nt!KeBugCheckEx
ffffb18f`ead0dce0 fffff800`116c91af : 00000000`00000000 00000000`00000000 00000000`00000000 ffffb18f`e0b9e1c4 : nt!MiSystemFault+0x195c94
ffffb18f`ead0dde0 fffff800`117d041e : ffffcd86`fa0072f8 00000000`00000000 00000000`10000004 00000000`000000c0 : nt!MmAccessFault+0x34f
ffffb18f`ead0df80 fffff800`1473b202 : 00000000`00000000 ffffdd86`12c1ac40 ffffcd86`e6974bc0 ffffb18f`ead0e1e9 : nt!KiPageFault+0x35e
ffffb18f`ead0e110 00000000`00000000 : ffffdd86`12c1ac40 ffffcd86`e6974bc0 ffffb18f`ead0e1e9 ffffb18f`ead0e1e9 : WdFilter+0x4b202


SYMBOL_NAME:  WdFilter+4b202

MODULE_NAME: WdFilter

IMAGE_NAME:  WdFilter.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b202

FAILURE_BUCKET_ID:  AV_R_INVALID_WdFilter!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {90a95f8f-f779-a86f-19f1-7c77e04a9e0a}

Followup:     MachineOwner
---------
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8004d121183, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8004d121183

WRITE_ADDRESS: fffff8003a7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8003a62a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8003a62a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80040267550 -- (.trap 0xfffff80040267550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000113e4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8004d121183 rsp=fffff800402676e0 rbp=fffff80040267750
r8=00000000001b7df1  r9=0000000000000064 r10=0000fffff8004d12
r11=ffff9a7c28a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
amdppm+0x1183:
fffff800`4d121183 f02000          lock and byte ptr [rax],al ds:00000000`00000000=??
Resetting default scope

STACK_TEXT:
fffff800`40267408 fffff800`3a3d41e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`40267410 fffff800`3a3d0529 : fffff800`38579180 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`40267550 fffff800`4d121183 : fffff800`40267889 fffff800`3a29db07 fffff800`3a638c00 00000000`00000000 : nt!KiPageFault+0x469
fffff800`402676e0 fffff800`3a22c7f2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : amdppm+0x1183
fffff800`40267780 fffff800`3a243bc0 : fffff800`3857bf80 fffff800`3a63b500 fffff800`38579180 fffff800`3a30a929 : nt!PpmCheckComputeEnergy+0x1a2
fffff800`40267860 fffff800`3a2c115a : fffff800`3857bf80 00000000`00000001 fffff800`3857ef90 fffff800`38579180 : nt!PpmCheckRun+0x40
fffff800`402678f0 fffff800`3a2c07af : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x30a
fffff800`40267a30 fffff800`3a3c5ebe : 00000000`00000000 fffff800`38579180 fffff800`3a791400 ffffcf02`f309b0c0 : nt!KiRetireDpcList+0x1ef
fffff800`40267c60 00000000`00000000 : fffff800`40268000 fffff800`40262000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e


CHKIMG_EXTENSION: !chkimg -lo 50 -db !amdppm
13 errors : !amdppm (fffff8004d121181-fffff8004d1211f1)
fffff8004d121180  c0 *e7  45  f0  20  00  00  00  21  45  f4  45  33  e4  4c  21 ..E. ...!E.E3.L!
fffff8004d121190  65 *48  44  8b  e9  48  89  45  c0 *88  89  45  c8  48  89  45 eHD..H.E...E.H.E
fffff8004d1211a0  d0 *d8  8d  05  80  22  01  00  48 *09  45  d8  48  89  45  e0 ....."..H.E.H.E.
fffff8004d1211b0  e9 *f6  00  00  00  48  8b  5d  b8 *ff  b6  83  70  01  00  00 .....H.]....p...
fffff8004d1211c0  41 *8b  c5  0f  85  c2  00  00  00 *08  8d  b3  b0  04  00  00 A...............
fffff8004d1211d0  48 *bb  ce  4c  8b  15  ae  9e  01  00  e8  61  50  14  ed  89 H..L.......aP...
fffff8004d1211e0  45 *30  3b  43  38  0f  85  a0  00 *40  00  33  db  48  8d  4d E0;C8....@.3.H.M
fffff8004d1211f0  c0 *c3  ff  45  33  f6  45  33  ff  48  8b  d6  4c  8b  15  b5 ...E3.E3.H..L...

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffffa081a5d85ff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa081a5d85f48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 7

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  139

BUGCHECK_P1: 4

BUGCHECK_P2: ffffa081a5d85ff0

BUGCHECK_P3: ffffa081a5d85f48

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa081a5d85ff0 -- (.trap 0xffffa081a5d85ff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff5873f312000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffff5873f318000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8030f2002f1 rsp=ffffa081a5d86180 rbp=ffffa081a5d866f0
r8=fffff5873f318000  r9=ffffa081a5d86710 r10=ffffb78f53202500
r11=fffff58742db0460 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlpGetStackLimitsEx+0x19e355:
fffff803`0f2002f1 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa081a5d85f48 -- (.exr 0xffffa081a5d85f48)
ExceptionAddress: fffff8030f2002f1 (nt!RtlpGetStackLimitsEx+0x000000000019e355)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

EXCEPTION_STR:  0xc0000409

BAD_STACK_POINTER:  ffffa081a5d85cc8

STACK_TEXT:
ffffa081`a5d85cc8 fffff803`0f1d41e9 : 00000000`00000139 00000000`00000004 ffffa081`a5d85ff0 ffffa081`a5d85f48 : nt!KeBugCheckEx
ffffa081`a5d85cd0 fffff803`0f1d4610 : 00000028`000000b0 00040000`00180400 00000020`00000008 00300033`00490024 : nt!KiBugCheckDispatch+0x69
ffffa081`a5d85e10 fffff803`0f1d29a3 : fffff803`0f069038 fffff803`0f40e844 ffffa081`a5d867d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffa081`a5d85ff0 fffff803`0f2002f1 : 00000000`00000000 00000000`0000002e 0005e338`00ab7000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x323
ffffa081`a5d86180 fffff803`0f25982a : 00000000`00000000 00000000`00000000 ffffa081`a5d866f0 00007fff`00000002 : nt!RtlpGetStackLimitsEx+0x19e355
ffffa081`a5d861b0 fffff803`0f0fe85e : fffff587`3f316d18 ffffa081`a5d86e30 fffff587`3f316d18 00000000`00000002 : nt!RtlDispatchException+0x15fa0a
ffffa081`a5d86900 fffff803`0f1c3202 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffa081`a5d86fb0 fffff803`0f1c31d0 : fffff803`0f1d4316 00000000`00000000 00000000`00000000 ffffb78f`4dacec10 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff587`3f316bd8 fffff803`0f1d4316 : 00000000`00000000 00000000`00000000 ffffb78f`4dacec10 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff587`3f316be0 fffff803`0f1d00a0 : ffffb78f`459dac10 00000000`00000002 fffff803`0f000000 fffff803`0f10c316 : nt!KiExceptionDispatch+0x116
fffff587`3f316dc0 fffff803`14acafa6 : ffffb78f`45a11c00 fffff587`3f317050 00000000`00000020 ffffb78f`4797ec30 : nt!KiGeneralProtectionFault+0x320
fffff587`3f316f50 fffff803`14ad1a4d : 00000000`88e74ec1 ffffb78f`470f10d0 ffffb78f`51479c64 fffff587`3f317490 : tcpip+0x5afa6
fffff587`3f317260 fffff803`14abe293 : ffffb78f`50817400 ffffb78f`508174c8 ffffb78f`4b32cd40 fffff803`1481dbf3 : tcpip+0x61a4d
fffff587`3f3173f0 fffff803`14abd050 : ffffb78f`47e5f000 fffff587`3f317700 ffffb78f`4b32cd40 ffffb78f`47c82b40 : tcpip+0x4e293
fffff587`3f317640 fffff803`14abadcc : 00000000`00000001 fffff587`3f317991 ffffb78f`51503d06 00000000`00000000 : tcpip+0x4d050
fffff587`3f3178f0 fffff803`14ab74e2 : ffffb78f`47ebd0d9 fffff803`14ab5000 00000000`00000003 ffffb78f`4f8b5001 : tcpip+0x4adcc
fffff587`3f3179f0 fffff803`14a84642 : ffffb78f`00000014 ffffb78f`47e5f140 ffffb78f`589ec1f0 ffffb78f`589f4d80 : tcpip+0x474e2
fffff587`3f317a30 fffff803`14abb998 : 00000000`00000000 00000000`00000000 fffff587`3f317bb9 fffff587`3f317b80 : tcpip+0x14642
fffff587`3f317b20 fffff803`14a806df : fffff803`14c6e2e0 ffffb78f`47c798a0 ffffb78f`47e5f000 00000000`00000000 : tcpip+0x4b998
fffff587`3f317c20 fffff803`14a8037c : ffffb78f`4fd7b110 00000000`00000001 00000000`00000001 00000000`00000000 : tcpip+0x106df
fffff587`3f317d30 fffff803`14aa24ce : ffffb78f`589ec1f0 00000000`00000000 00000000`00000000 fffff587`3f317db4 : tcpip+0x1037c
fffff587`3f317d60 fffff803`14aa19a2 : fffff587`3f317f01 ffffb78f`4dc36800 fffff803`14a91210 fffff587`42db06a8 : tcpip+0x324ce
fffff587`3f317e50 fffff803`0f1c5c4e : 00000000`00000000 00000000`00000000 fffff587`3f317fd0 ffffb78f`53202500 : tcpip+0x319a2
fffff587`3f317f80 fffff803`0f1c5c0c : fffff587`3f317fd0 ffffb78f`53202500 fffff587`3f318000 fffff803`0f0c042e : nt!KxSwitchKernelStackCallout+0x2e
fffff587`42db0460 fffff803`0f0c042e : fffff587`3f317fd0 fffff587`3f318000 00000000`00000000 fffff803`00000000 : nt!KiSwitchKernelStackContinue
fffff587`42db0480 fffff803`0f0c022c : fffff803`14aa18d0 fffff587`42db06c8 00000001`00000002 fffffff6`00000002 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x18e
fffff587`42db0520 fffff803`0f0c00a3 : fffff587`42db0740 ffffb78f`47eb9d80 00000000`00000002 00000000`00000000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xdc
fffff587`42db0590 fffff803`0f0c005d : fffff803`14aa18d0 fffff587`42db06c8 ffffb78f`478fe170 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x33
fffff587`42db0600 fffff803`14a91741 : 00000000`00000000 ffffb78f`53c44010 00000000`00000000 fffff803`0ef5f37a : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff587`42db0640 fffff803`1481b530 : ffffb78f`4db9d601 ffffb78f`57c33ec1 00000000`00000020 00000000`00000000 : tcpip+0x21741
fffff587`42db08e0 fffff803`1481b027 : ffffb78f`4f8f7c10 fffff803`14d60001 fffff587`00000000 ffffb78f`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff587`42db09c0 fffff803`14830ffe : ffffb78f`4ee201a0 ffffb78f`00000000 ffffb78f`589f4d80 ffffb78f`51503cd2 : ndis!ndisMTopReceiveNetBufferLists+0x227
fffff587`42db0ac0 fffff803`14820cfb : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`1f2b7777 : ndis!ndisInvokeNextReceiveHandler+0x4e
fffff587`42db0b90 fffff803`148212fd : ffffb78f`5d26ee00 ffffb78f`53f436f0 ffffb78f`00000000 00000000`00000002 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x2db
fffff587`42db0c50 fffff803`1f27d7ec : ffffb78f`51b75010 00000000`00000001 ffffb78f`589f4d80 ffffb78f`51b760e8 : ndis!NdisFIndicateReceiveNetBufferLists+0x6d
fffff587`42db0c90 fffff803`14820eb0 : ffffb78f`53b359e0 fffff803`1f27d520 ffffb78f`59e574f0 00000000`00000018 : nwifi!Pt6Receive+0x2cc
fffff587`42db0cf0 fffff803`1482a33d : ffffb78f`53202500 fffff587`42db0ec1 fffff587`42db0ea0 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff587`42db0d40 fffff803`0f0c00e8 : fffff587`42db0ec1 ffffb78f`53b359e0 00000000`00000000 00001f80`00310080 : ndis!ndisDataPathExpandStackCallback+0x3d
fffff587`42db0d90 fffff803`0f0c005d : fffff803`1482a300 fffff587`42db0ea0 ffffb78f`53f436f0 fffff803`0f1c884e : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff587`42db0e00 fffff803`14851773 : 00000000`00000000 00001f80`00000000 fffff803`0ef60d70 fffff803`0ef5dd76 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff587`42db0e40 fffff803`14820cfb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0x207c3
fffff587`42db0f10 fffff803`148212fd : ffffb78f`548dd200 ffffb78f`548dd278 fffff803`00000000 ffffb78f`00000002 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x2db
fffff587`42db0fd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!NdisFIndicateReceiveNetBufferLists+0x6d


SYMBOL_NAME:  tcpip+5afa6

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

IMAGE_VERSION:  10.0.18362.836

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5afa6

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_tcpip!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a0f03170-1de3-9a48-5b54-d03d97eeb010}

Followup:     MachineOwner
---------
Memtest86 testi yaptım hiç hata bulunmadı. Bugün KMODE EXCEPTION NOT HANDLED hatası aldım. Artık çok sıkıldım bu durumdan bilgisayarı aldığımdan beri bu şekilde çöküyor. Sürücüleri nasıl güncelleyeceğim ve hangisinin outdate olduğunu nasıl anlayacağım.
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı