Birçok farklı mavi ekran hatası

ert99

Centipat
Katılım
14 Mayıs 2023
Mesajlar
3
Daha fazla  
Cinsiyet
Erkek
Selam iyi sosyaller dilerim arkadaşlar, bayağıdır bir süre sıklıkla farklı farklı mavi ekran hataları alıyorum, bazen art arda bilgisayarım kapanıyor, bazen hiç gelmiyor, anlamıyorum neden böyle oluyor, araştırıyorum pek de bir şey anlamıyorum minidump dosyasını yükleyin falan diyorlardı, şimdi sizlere hem aldığım hataları hem de minidump dosyalarımı yükleyeceğim, bana yardımcı olur musunuz kurtarın beni illetten arkadaşlar.

https://www.dosya.tc/server42/46vo28/Minidump.rar.html
Buyurun bu da minidump dosyam Allah için bir çözüm yolu bulun.
 

Dosya Ekleri

  • image.png
    67,3 KB · Görüntüleme: 33
Öncelikle BIOS'u güncellemekle başlayın. 2 yıllık süreç içerisinde birçok performans ve stabilite güncellemesi gelmiş.

Yüklü BIOS bilgileriniz:
Rich (BB code):
BiosVersion = 2409
BiosReleaseDate = 12/02/2020
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = B450M-DRAGON
BaseBoardVersion = Rev X.0x

Anakartınızın BIOS indirme sayfası: B450M-DRAGON

Güncel BIOS'u direk indirmek için: B450M-DRAGON BIOS 4002


Hatalarınız çok çeşitli, o yüzden BIOS güncellemesinden sonra hala mavi ekran alırsanız aldığınız hataları minidump olarak tekrar paylaşın, öyle bir bakalım.

Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: ffff965877240cf1, Address of the instruction which caused the BugCheck
Arg3: ffffbd08476dee50, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3917

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 155

    Key  : Analysis.Init.Elapsed.mSec
    Value: 14389

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 153

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051423-14312-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff965877240cf1

BUGCHECK_P3: ffffbd08476dee50

BUGCHECK_P4: 0

CONTEXT:  ffffbd08476dee50 -- (.cxr 0xffffbd08476dee50)
rax=0000000000000000 rbx=ffff960b406028a0 rcx=ffff960b406028e0
rdx=0000000000000ef3 rsi=ffffbd08476df908 rdi=0000000000000ef3
rip=ffff965877240cf1 rsp=ffffbd08476df850 rbp=0000000000005700
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000ef3
r11=ffff960b406028e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050287
win32kbase!GdiHandleManager::AcquireEntryIndex+0xe1:
ffff9658`77240cf1 41fe410d        inc     byte ptr [r9+0Dh] ds:002b:00000000`0000000d=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT:
ffffbd08`476df850 ffff9658`7723dcc9     : 00000000`00000ef3 00000000`000004c4 00000000`00005704 00000000`00000000 : win32kbase!GdiHandleManager::AcquireEntryIndex+0xe1
ffffbd08`476df890 ffff9658`7725c9c9     : ffff960b`44325f50 00000000`00000000 00000000`00005780 00000000`00000000 : win32kbase!HmgInsertObjectInternal+0x89
ffffbd08`476df900 ffff9658`7725c965     : ffff9805`38bc7080 ffffce80`fae4cca8 00000000`00000000 fffff802`487c6434 : win32kbase!RGNOBJ::hrgnAssociate+0x19
ffffbd08`476df930 fffff802`487c0ffe     : ffff960b`44325f50 ffffce80`fae4cc98 00000000`00000000 fffff802`487c0cfc : win32kbase!CRegion::GetRegionHandleAndReset+0x45
ffffbd08`476df960 fffff802`487c0500     : ffffce80`f48a3ca0 ffffce81`02473820 00000000`00000000 00000000`00000000 : dxgkrnl!CCompositionSurface::GetSurfaceUpdate+0xee
ffffbd08`476df9b0 ffff9658`77261c31     : ffffce81`02473820 ffffbd08`476dfb80 00000000`00005780 ffffbd08`476dfad0 : dxgkrnl!CCompositionFrame::GetSurfaceUpdates+0x430
ffffbd08`476dfa40 ffff9658`7754eda6     : 00000000`00000000 000000bc`6ec7f4f8 000000bc`6ec7f504 00000000`00000000 : win32kbase!NtDCompositionGetFrameSurfaceUpdates+0x171
ffffbd08`476dfad0 fffff802`3860f4f5     : ffff9805`38bc7080 00000000`00000000 00000000`00000000 ffff9805`00000000 : win32k!NtDCompositionGetFrameSurfaceUpdates+0x16
ffffbd08`476dfb00 00007ff9`112636e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000bc`6ec7f4a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`112636e4


SYMBOL_NAME:  win32kbase!GdiHandleManager::AcquireEntryIndex+e1

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr 0xffffbd08476dee50 ; kb

BUCKET_ID_FUNC_OFFSET:  e1

FAILURE_BUCKET_ID:  AV_win32kbase!GdiHandleManager::AcquireEntryIndex

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4b7cd9a2-f1e7-2f43-33bc-5facf1aaa2a3}

Followup:     MachineOwner
---------



Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ExceptionRecord                               ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ContextRecord                                 ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2343

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 73451

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 124

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9911

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 135

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1e

    Key  : Bugcheck.Code.Register
    Value: 0x1e

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051323-16656-01.dmp

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: 0

BUGCHECK_P3: 8

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
ffff8109`065c60c8 fffff803`3fc60cd3     : 00000000`0000001e ffffffff`c0000005 00000000`00000000 00000000`00000008 : nt!KeBugCheckEx
ffff8109`065c60d0 fffff803`3fc0fe6c     : 00000000`00001000 ffff8109`065c6970 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1795c3
ffff8109`065c6790 fffff803`3fc0b8bd     : ffffb50e`8f287180 ffffb50e`90d1d5e0 00000000`00000000 ffffb50e`90c6f6b0 : nt!KiExceptionDispatch+0x12c
ffff8109`065c6970 00000000`00000000     : ffff8109`065c6b00 ffff8109`065c6b00 ffffb50e`90c6f001 00000000`00000000 : nt!KiPageFault+0x43d


SYMBOL_NAME:  nt!KiDispatchException+1795c3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1795c3

FAILURE_BUCKET_ID:  AV_nt!KiDispatchException

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {00781d15-b897-afab-75cd-f83221cbf387}

Followup:     MachineOwner
---------



Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd60a20adf5f0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffd60a20adf548, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1921

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3394

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 155

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2057

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 134

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x139

    Key  : Bugcheck.Code.Register
    Value: 0x139

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051423-13125-01.dmp

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd60a20adf5f0

BUGCHECK_P3: ffffd60a20adf548

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd60a20adf5f0 -- (.trap 0xffffd60a20adf5f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800e93192de0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff800e93019760 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80441482a34 rsp=ffffd60a20adf780 rbp=ffffe70020000180
 r8=ffff800e93192d20  r9=0000000000000001 r10=ffff800e83b1edd0
r11=ffffd60a20adf840 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!IopQueueIrpToFileObject+0x142674:
fffff804`41482a34 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd60a20adf548 -- (.exr 0xffffd60a20adf548)
ExceptionAddress: fffff80441482a34 (nt!IopQueueIrpToFileObject+0x0000000000142674)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffd60a`20adf2c8 fffff804`4140fd29     : 00000000`00000139 00000000`00000003 ffffd60a`20adf5f0 ffffd60a`20adf548 : nt!KeBugCheckEx
ffffd60a`20adf2d0 fffff804`41410290     : 00000000`00000002 ffffe700`1ff36180 00000000`00000000 fffff804`4121a106 : nt!KiBugCheckDispatch+0x69
ffffd60a`20adf410 fffff804`4140e25d     : 00000000`00000000 fffff804`3d073180 ffff800e`8fe323c0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd60a`20adf5f0 fffff804`41482a34     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x31d
ffffd60a`20adf780 fffff804`41610868     : 00000000`00000001 000021f8`01631a78 00000000`00000000 ffff800e`93192d20 : nt!IopQueueIrpToFileObject+0x142674
ffffd60a`20adf7d0 fffff804`415cccb9     : ffffd60a`20adf8d0 ffffd60a`20adf980 ffff800e`9301b850 00000000`00000000 : nt!IopSynchronousServiceTail+0x98
ffffd60a`20adf870 fffff804`415f8e56     : ffff800e`93192d20 000021f8`01631a78 ffff800e`9301b850 000021f8`01631a78 : nt!IopWriteFile+0x23d
ffffd60a`20adf970 fffff804`4140f4f5     : 00000000`00000000 00000000`00000000 00000000`00000000 000021f8`01631a78 : nt!NtWriteFile+0x996
ffffd60a`20adfa90 00007ffb`2a4ed164     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000008d`e8ffdb88 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`2a4ed164


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------



Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffcee28dbb4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffbc02bc38eb80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1593

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4927

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11950

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 145

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1

    Key  : Bugcheck.Code.Register
    Value: 0x1

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051323-18171-01.dmp

BUGCHECK_CODE:  1

BUGCHECK_P1: 7ffcee28dbb4

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: ffffbc02bc38eb80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  audiodg.exe

STACK_TEXT:
ffffbc02`bc38e948 fffff806`62a0fd29     : 00000000`00000001 00007ffc`ee28dbb4 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffbc02`bc38e950 fffff806`62a0fbdf     : 00000000`00000000 ffffbc02`bc38eb80 ffffc30f`efdf0080 ffffc30f`efdf11f0 : nt!KiBugCheckDispatch+0x69
ffffbc02`bc38ea90 00007ffc`ee28dbb4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x334
000000f0`2ef7f4b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`ee28dbb4


SYMBOL_NAME:  nt!KiSystemServiceExitPico+334

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  334

FAILURE_BUCKET_ID:  0x1_SysCallNum_5b_nt!KiSystemServiceExitPico

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {be677231-5295-87f7-b1f8-864a27d439ad}

Followup:     MachineOwner
---------



Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ExceptionRecord                               ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ContextRecord                                 ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2389

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 47675

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 92

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12887

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 145

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1e

    Key  : Bugcheck.Code.Register
    Value: 0x1e

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051423-11906-01.dmp

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: 0

BUGCHECK_P3: 8

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
ffffd28a`05859a18 fffff802`46460cd3     : 00000000`0000001e ffffffff`c0000005 00000000`00000000 00000000`00000008 : nt!KeBugCheckEx
ffffd28a`05859a20 fffff802`4640fe6c     : 00000000`00001000 ffffd28a`0585a2c0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1795c3
ffffd28a`0585a0e0 fffff802`4640b8bd     : 0000007f`fffffff8 00000000`00000000 00000000`00000000 ffff8e0a`ac5f5080 : nt!KiExceptionDispatch+0x12c
ffffd28a`0585a2c0 00000000`00000000     : 00000000`00000000 ffff8e0a`aa73a290 ffffffff`ffffffff 00000000`00000001 : nt!KiPageFault+0x43d


SYMBOL_NAME:  nt!KiDispatchException+1795c3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1795c3

FAILURE_BUCKET_ID:  AV_nt!KiDispatchException

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {00781d15-b897-afab-75cd-f83221cbf387}

Followup:     MachineOwner
---------



Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffd0, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80425c21236, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Write

    Key  : Analysis.CPU.mSec
    Value: 1718

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5293

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 61

    Key  : Analysis.Init.Elapsed.mSec
    Value: 15757

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 145

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051423-14859-01.dmp

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffffffffd0

BUGCHECK_P2: 2

BUGCHECK_P3: fffff80425c21236

BUGCHECK_P4: 2

READ_ADDRESS: fffff804266fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffd0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  ffff8a06da8ae750 -- (.trap 0xffff8a06da8ae750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000102 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000746c6644 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80425c21236 rsp=ffff8a06da8ae8e0 rbp=ffff8a06da8aeb80
 r8=0000000000000001  r9=0000000000000001 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ObfDereferenceObjectWithTag+0x26:
fffff804`25c21236 f0480fc15ed0    lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
Resetting default scope

STACK_TEXT:
ffff8a06`da8ae4a8 fffff804`25e4ac53     : 00000000`00000050 ffffffff`ffffffd0 00000000`00000002 ffff8a06`da8ae750 : nt!KeBugCheckEx
ffff8a06`da8ae4b0 fffff804`25c6e7b0     : ffff930c`e2fbabe0 00000000`00000002 ffff8a06`da8ae7d0 00000000`00000000 : nt!MiSystemFault+0x1b2273
ffff8a06`da8ae5b0 fffff804`25e0b7d8     : ffffca88`b5404140 00000000`000000d0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff8a06`da8ae750 fffff804`25c21236     : 00000000`00000001 00000000`00000001 00000000`00000460 fffff804`260118ee : nt!KiPageFault+0x358
ffff8a06`da8ae8e0 fffff804`25c211fe     : 00000000`00000102 00000000`00000001 00000000`00000001 00000000`00000001 : nt!ObfDereferenceObjectWithTag+0x26
ffff8a06`da8ae920 fffff804`25feb84a     : 00000000`00000004 00000000`00000000 00000000`00000000 ffff930c`eb868270 : nt!HalPutDmaAdapter+0xe
ffff8a06`da8ae950 fffff804`25e0f4f5     : 0000c100`00000000 00000000`0015477d 00000144`d539eb88 00000000`00000001 : nt!NtRemoveIoCompletionEx+0x10a
ffff8a06`da8aea90 00007ffc`a5f6fe74     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000001b`9621f318 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`a5f6fe74


SYMBOL_NAME:  nt!ObfDereferenceObjectWithTag+26

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  26

FAILURE_BUCKET_ID:  AV_W_(null)_nt!ObfDereferenceObjectWithTag

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7fa2d22a-7fd5-fefb-a919-bf62d60b9d91}

Followup:     MachineOwner
---------
 
Bu illetten kurtulamıyorum. Yarım saatte bir farklı farklı mavi ekran hataları alıyorum. Bir türlü çözemedim.



 
@ert99
Konuda ilk attığınız minidumplarda B450 bir anakartınız olduğu görünüyordu, şimdi ise B550M-A PRO görünüyor.

Hangisi sizin minidump dosyanız anlamadım.
Sistem özellikleriniz nedir?
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…