DDU ile ekran kartı süücünüzü kaldırın ve WHQL sürümünü kurun.
Memtest86 ile RAM testi yapın.
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...
www.technopat.net
AMD ekran kartı için:
https://www.amd.com/en/support
NVIDIA :
Sürücüleri Yükle | NVIDIA
İntel:
Intel® Driver & Support Assistant
[CODE title="Hata Kodları"]
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Emir\Desktop\Minidump\050221-10218-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`7fa00000 PsLoadedModuleList = 0xfffff804`8062a3d0
Debug session time: Sun May 2 20:14:58.141 2021 (UTC + 3:00)
System Uptime: 1 days 0:32:47.978
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
..........
Loading User Symbols.
Loading unloaded module list.
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`7fdf5e40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffdc82`0b8b9940=00000000000000ef
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died.
Arguments:
Arg1: ffffca0718859080, Process object or thread object.
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000.
Arg4: 0000000000000000.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7234.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 22614.
Key : Analysis.Init.CPU.mSec
Value: 405.
Key : Analysis.Init.Elapsed.mSec
Value: 7461.
Key : Analysis.Memory.CommitPeak.Mb
Value: 78.
Key : CriticalProcessDied.ExceptionCode
Value: 1a0ea080.
Key : CriticalProcessDied.Process
Value: svchost.exe
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: ef.
BUGCHECK_P1: ffffca0718859080.
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x1a0ea080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffdc82`0b8b9938 fffff804`80306972 : 00000000`000000ef ffffca07`18859080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffdc82`0b8b9940 fffff804`80249fa1 : 00000000`00000000 fffff804`7fd597ad 00000000`00000002 fffff804`7fd58dc7 : nt!PspCatchCriticalBreak+0x10e
ffffdc82`0b8b99e0 fffff804`80109c24 : ffffca07`00000000 00000000`00000000 ffffca07`18859080 ffffca07`188594b8 : nt!PspTerminateAllThreads+0x140ab5
ffffdc82`0b8b9a50 fffff804`80109f4c : ffffca07`18859080 00000000`00000000 000000a0`9ac7f7dc 000001a4`2c120000 : nt!PspTerminateProcess+0xe0
ffffdc82`0b8b9a90 fffff804`7fe077b8 : ffffca07`18859080 ffffca07`1a0ea080 ffffdc82`0b8b9b80 ffffca07`18859080 : nt!NtTerminateProcess+0x9c
ffffdc82`0b8b9b00 00007ffb`a6b4d2a4 : 00007ffb`a6bc2a73 00007ffb`a6bf66f8 000000a0`9ac7f7a0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a0`9ac7c468 00007ffb`a6bc2a73 : 00007ffb`a6bf66f8 000000a0`9ac7f7a0 00000000`00000000 00007ffb`a6ab0000 : 0x00007ffb`a6b4d2a4
000000a0`9ac7c470 00007ffb`a6bf66f8 : 000000a0`9ac7f7a0 00000000`00000000 00007ffb`a6ab0000 00000000`00000004 : 0x00007ffb`a6bc2a73
000000a0`9ac7c478 000000a0`9ac7f7a0 : 00000000`00000000 00007ffb`a6ab0000 00000000`00000004 00007ffb`a6b552ad : 0x00007ffb`a6bf66f8
000000a0`9ac7c480 00000000`00000000 : 00007ffb`a6ab0000 00000000`00000004 00007ffb`a6b552ad 00007ffb`a6bf66f8 : 0x000000a0`9ac7f7a0
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 10e.
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_1a0ea080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {713b1c99-7a81-9b95-1969-82d126676f1e}
Followup: MachineOwner.
---------
1: kd> lmvm nt.
Browse full module list.
start end module name.
fffff804`7fa00000 fffff804`80a46000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\769C521E4833ECF72E21F02BF33691A51\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\0EA0877A1046000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data.
Image was built with /Brepro flag.
Timestamp: 0EA0877A (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A5B486.
ImageSize: 01046000.
File version: 10.0.19041.928
Product version: 10.0.19041.928
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32.
File type: 1.0 App.
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation.
ProductName: Microsoft® Windows® Operating System.
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.19041.928
FileVersion: 10.0.19041.928 (WinBuild.160101.0800)
FileDescription: NT Kernel & System.
LegalCopyright: © Microsoft Corporation. All rights reserved.
[/CODE]