Bu sorun genelde ekran kartı kaynaklı, her ne kadar kartının bozulmuş olduğu gerçeğini kabullenmek istemeyip ses kartı diye düşünsen de...
Minidump Dosyalarını Paylaşın
23.06.2025 tarihinde yapılan güncel rehbere aşağıdaki linkten erişebilirsiniz: https://www.technopat.net/sosyal/konu/minidump-nedir-nasil-paylasilir.3817531/ Minidump dosyaları, bilgisayarınız mavi ekran verdiğinde belleğin ufak bir dökümünü barındıran dosyalardır. Bunları analiz ederek mavi...www.technopat.net
Hatta muhtemelen VIDEO TDR ya da SCHEDULER hatası alıyorsun... Ya da DPC. Dosyaları paylaş, bakalım.
Merhabalar! Bu sorun benim gibi Laptop kullananlarda olan bir sorun genelde. Bunun için Unlost adlı kanalın yapmış olduğu " CS:GO FPS ARTTIRMA " adlı videoyu izleyip dediklerini yaptım. Ardından bu daha az oldu. Ayrıca size şöyle bir şey söyleyebilirim. CS:GO oynarken Oyuna girerken, Maça girerken, Parlaklığınızı kısın. Böyle yaparsanız daha iyi olabileceğine inanıyorum
Benim 2 GB Ekran kartı 4 GB RAM var. Umarım işe yaramıştır.
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008886, The subtype of the bugcheck.
Arg2: ffff91000482c220
Arg3: ffff91000a82c1f0
Arg4: 0000000000000400
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6014
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7269
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 8886
BUGCHECK_P2: ffff91000482c220
BUGCHECK_P3: ffff91000a82c1f0
BUGCHECK_P4: 400
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SearchApp.exe
STACK_TEXT:
ffffe308`4cfb8548 fffff800`15ef5b70 : 00000000`0000001a 00000000`00008886 ffff9100`0482c220 ffff9100`0a82c1f0 : nt!KeBugCheckEx
ffffe308`4cfb8550 fffff800`15ef4be0 : ffffe308`00000002 fffff800`00000000 00000000`00180eb6 ffffe308`4cfb8b80 : nt!MiUnlinkPageFromList+0xcb0
ffffe308`4cfb85e0 fffff800`15ef41c4 : ffffe308`4cfb8880 ffffe308`4cfb8920 0000000f`ffffffff 00000001`80eb6820 : nt!MiHandleTransitionFault+0x180
ffffe308`4cfb8660 fffff800`15ef3c16 : ffffe308`4cfb8880 00000000`00000000 ffff9100`03e22d50 00000000`00000000 : nt!MiResolveTransitionFault+0x424
ffffe308`4cfb8720 fffff800`15eec425 : ffffe308`4cfb8880 00000000`00000000 ffffe308`4cfb8860 ffffe308`4cfb8a20 : nt!MiResolveProtoPteFault+0x1236
ffffe308`4cfb8820 fffff800`15eea369 : 00000000`00000000 00000000`00000100 00000000`c0000016 ffffd28f`4d80e058 : nt!MiDispatchFault+0x3d5
ffffe308`4cfb8960 fffff800`1600275e : ffff8003`6f3a8000 ffff8003`6f3a8080 00000258`c815c8a0 00000000`00000000 : nt!MmAccessFault+0x189
ffffe308`4cfb8b00 00007ff9`4ceb7d66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000b7`729ed6e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`4ceb7d66
SYMBOL_NAME: nt!MiUnlinkPageFromList+cb0
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: cb0
FAILURE_BUCKET_ID: 0x1a_8886_nt!MiUnlinkPageFromList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000000e, Type of memory safety violation
Arg2: fffff30db6a8b170, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff30db6a8b0c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6437
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9919
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: e
BUGCHECK_P2: fffff30db6a8b170
BUGCHECK_P3: fffff30db6a8b0c8
BUGCHECK_P4: 0
TRAP_FRAME: fffff30db6a8b170 -- (.trap 0xfffff30db6a8b170)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8608270b1848 rbx=0000000000000000 rcx=000000000000000e
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8030883a184 rsp=fffff30db6a8b300 rbp=fffff30db6a8b420
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=ffff8608270b14e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ObpCreateHandle+0x149f44:
fffff803`0883a184 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff30db6a8b0c8 -- (.exr 0xfffff30db6a8b0c8)
ExceptionAddress: fffff8030883a184 (nt!ObpCreateHandle+0x0000000000149f44)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000000e
Subcode: 0xe FAST_FAIL_INVALID_REFERENCE_COUNT
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MRT.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000000e
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff30d`b6a8ae48 fffff803`08406569 : 00000000`00000139 00000000`0000000e fffff30d`b6a8b170 fffff30d`b6a8b0c8 : nt!KeBugCheckEx
fffff30d`b6a8ae50 fffff803`08406990 : 00000000`79517350 fffff30d`b6a8b000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff30d`b6a8af90 fffff803`08404d23 : 00000000`00000000 fffff30d`b6a8b408 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff30d`b6a8b170 fffff803`0883a184 : ffff8608`270b14e0 00000000`00000001 00000000`00000000 ffff8608`270b14e0 : nt!KiRaiseSecurityCheckFailure+0x323
fffff30d`b6a8b300 fffff803`086afbf9 : fffff30d`b6a8b820 ffffdb81`02964040 ffffdb81`0e4fa2d8 fffff803`082d8c7a : nt!ObpCreateHandle+0x149f44
fffff30d`b6a8b4f0 fffff803`086ad0d3 : 00000000`00000000 00000000`00000000 00000000`00000000 00007fff`b963b4e0 : nt!ObOpenObjectByPointer+0x1b9
fffff30d`b6a8b770 fffff803`086aceb3 : 00000000`00000066 00000000`00000040 00000000`00000000 00000009`5607db10 : nt!PsOpenThread+0x213
fffff30d`b6a8bac0 fffff803`08405fb8 : 00000000`00000300 000001e5`a50e6160 fffff30d`b6a8bb80 000001e5`a5392300 : nt!NtOpenThread+0x23
fffff30d`b6a8bb00 00007fff`b956e344 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000009`5607d798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b956e344
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_e_INVALID_REFERENCE_COUNT_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e78067c0-c86e-2475-7d94-d283b49f461b}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8013f73430b, Address of the instruction which caused the bugcheck
Arg3: ffffb7016e3860e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9858
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18682
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8013f73430b
BUGCHECK_P3: ffffb7016e3860e0
BUGCHECK_P4: 0
CONTEXT: ffffb7016e3860e0 -- (.cxr 0xffffb7016e3860e0)
rax=fffff8014001af88 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000100c rsi=ffffe58f4dc72000 rdi=ffffbf08b5fd2cb0
rip=fffff8013f73430b rsp=ffffb7016e386ae0 rbp=ffffb7016e386c10
r8=0000000000000001 r9=0000000000000000 r10=0000000000000004
r11=fffff8014001bc6c r12=ffffe58f4dc72000 r13=ffffe58f5ac5d030
r14=ffffbf08b5fd2cb0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nvlddmkm+0xf430b:
fffff801`3f73430b 488b8b18040000 mov rcx,qword ptr [rbx+418h] ds:002b:00000000`00000418=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csgo.exe
STACK_TEXT:
ffffb701`6e386ae0 ffffe58f`5add7010 : ffffe58f`4dc72000 ffffb701`6e386e08 ffffe509`c6f41f70 ffffb701`6e387288 : nvlddmkm+0xf430b
ffffb701`6e386ae8 ffffe58f`4dc72000 : ffffb701`6e386e08 ffffe509`c6f41f70 ffffb701`6e387288 fffff801`401ea5d3 : 0xffffe58f`5add7010
ffffb701`6e386af0 ffffb701`6e386e08 : ffffe509`c6f41f70 ffffb701`6e387288 fffff801`401ea5d3 00000000`00000001 : 0xffffe58f`4dc72000
ffffb701`6e386af8 ffffe509`c6f41f70 : ffffb701`6e387288 fffff801`401ea5d3 00000000`00000001 ffffb701`6e387200 : 0xffffb701`6e386e08
ffffb701`6e386b00 ffffb701`6e387288 : fffff801`401ea5d3 00000000`00000001 ffffb701`6e387200 00000000`00000000 : 0xffffe509`c6f41f70
ffffb701`6e386b08 fffff801`401ea5d3 : 00000000`00000001 ffffb701`6e387200 00000000`00000000 00000000`00000000 : 0xffffb701`6e387288
ffffb701`6e386b10 00000000`00000001 : ffffb701`6e387200 00000000`00000000 00000000`00000000 ffffe58f`52829000 : nvlddmkm+0xbaa5d3
ffffb701`6e386b18 ffffb701`6e387200 : 00000000`00000000 00000000`00000000 ffffe58f`52829000 00000000`00000000 : 0x1
ffffb701`6e386b20 00000000`00000000 : 00000000`00000000 ffffe58f`52829000 00000000`00000000 00000000`000000c0 : 0xffffb701`6e387200
SYMBOL_NAME: nvlddmkm+f430b
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffffb7016e3860e0 ; kb
BUCKET_ID_FUNC_OFFSET: f430b
FAILURE_BUCKET_ID: 0x3B_c0000005_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {63c41bff-3ea4-15a0-a72c-26a548d17abe}
Followup: MachineOwner
---------
Daha dün format attım kardeşim bugün de bu ayki sürücüyü kurdum ekran kartına.Evet, ekran kartınızda sorun görünüyor. Sürücüsünü DDU ile kaldırıp güncellemeyi deneyin.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net
Bir de bellek testi yapsanız iyi olacak.
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000008886, The subtype of the bugcheck. Arg2: ffff91000482c220 Arg3: ffff91000a82c1f0 Arg4: 0000000000000400 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6014 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 7269 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 8886 BUGCHECK_P2: ffff91000482c220 BUGCHECK_P3: ffff91000a82c1f0 BUGCHECK_P4: 400 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: SearchApp.exe STACK_TEXT: ffffe308`4cfb8548 fffff800`15ef5b70 : 00000000`0000001a 00000000`00008886 ffff9100`0482c220 ffff9100`0a82c1f0 : nt!KeBugCheckEx ffffe308`4cfb8550 fffff800`15ef4be0 : ffffe308`00000002 fffff800`00000000 00000000`00180eb6 ffffe308`4cfb8b80 : nt!MiUnlinkPageFromList+0xcb0 ffffe308`4cfb85e0 fffff800`15ef41c4 : ffffe308`4cfb8880 ffffe308`4cfb8920 0000000f`ffffffff 00000001`80eb6820 : nt!MiHandleTransitionFault+0x180 ffffe308`4cfb8660 fffff800`15ef3c16 : ffffe308`4cfb8880 00000000`00000000 ffff9100`03e22d50 00000000`00000000 : nt!MiResolveTransitionFault+0x424 ffffe308`4cfb8720 fffff800`15eec425 : ffffe308`4cfb8880 00000000`00000000 ffffe308`4cfb8860 ffffe308`4cfb8a20 : nt!MiResolveProtoPteFault+0x1236 ffffe308`4cfb8820 fffff800`15eea369 : 00000000`00000000 00000000`00000100 00000000`c0000016 ffffd28f`4d80e058 : nt!MiDispatchFault+0x3d5 ffffe308`4cfb8960 fffff800`1600275e : ffff8003`6f3a8000 ffff8003`6f3a8080 00000258`c815c8a0 00000000`00000000 : nt!MmAccessFault+0x189 ffffe308`4cfb8b00 00007ff9`4ceb7d66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e 000000b7`729ed6e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`4ceb7d66 SYMBOL_NAME: nt!MiUnlinkPageFromList+cb0 MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: cb0 FAILURE_BUCKET_ID: 0x1a_8886_nt!MiUnlinkPageFromList OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf} Followup: MachineOwner --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 000000000000000e, Type of memory safety violation Arg2: fffff30db6a8b170, Address of the trap frame for the exception that caused the bugcheck Arg3: fffff30db6a8b0c8, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6437 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 9919 Key : Analysis.Memory.CommitPeak.Mb Value: 77 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 139 BUGCHECK_P1: e BUGCHECK_P2: fffff30db6a8b170 BUGCHECK_P3: fffff30db6a8b0c8 BUGCHECK_P4: 0 TRAP_FRAME: fffff30db6a8b170 -- (.trap 0xfffff30db6a8b170) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffff8608270b1848 rbx=0000000000000000 rcx=000000000000000e rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8030883a184 rsp=fffff30db6a8b300 rbp=fffff30db6a8b420 r8=0000000000000001 r9=0000000000000000 r10=0000000000000000 r11=ffff8608270b14e0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!ObpCreateHandle+0x149f44: fffff803`0883a184 cd29 int 29h Resetting default scope EXCEPTION_RECORD: fffff30db6a8b0c8 -- (.exr 0xfffff30db6a8b0c8) ExceptionAddress: fffff8030883a184 (nt!ObpCreateHandle+0x0000000000149f44) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 000000000000000e Subcode: 0xe FAST_FAIL_INVALID_REFERENCE_COUNT CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: MRT.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 000000000000000e EXCEPTION_STR: 0xc0000409 STACK_TEXT: fffff30d`b6a8ae48 fffff803`08406569 : 00000000`00000139 00000000`0000000e fffff30d`b6a8b170 fffff30d`b6a8b0c8 : nt!KeBugCheckEx fffff30d`b6a8ae50 fffff803`08406990 : 00000000`79517350 fffff30d`b6a8b000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff30d`b6a8af90 fffff803`08404d23 : 00000000`00000000 fffff30d`b6a8b408 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0 fffff30d`b6a8b170 fffff803`0883a184 : ffff8608`270b14e0 00000000`00000001 00000000`00000000 ffff8608`270b14e0 : nt!KiRaiseSecurityCheckFailure+0x323 fffff30d`b6a8b300 fffff803`086afbf9 : fffff30d`b6a8b820 ffffdb81`02964040 ffffdb81`0e4fa2d8 fffff803`082d8c7a : nt!ObpCreateHandle+0x149f44 fffff30d`b6a8b4f0 fffff803`086ad0d3 : 00000000`00000000 00000000`00000000 00000000`00000000 00007fff`b963b4e0 : nt!ObOpenObjectByPointer+0x1b9 fffff30d`b6a8b770 fffff803`086aceb3 : 00000000`00000066 00000000`00000040 00000000`00000000 00000009`5607db10 : nt!PsOpenThread+0x213 fffff30d`b6a8bac0 fffff803`08405fb8 : 00000000`00000300 000001e5`a50e6160 fffff30d`b6a8bb80 000001e5`a5392300 : nt!NtOpenThread+0x23 fffff30d`b6a8bb00 00007fff`b956e344 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000009`5607d798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b956e344 SYMBOL_NAME: nt!KiFastFailDispatch+d0 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: d0 FAILURE_BUCKET_ID: 0x139_e_INVALID_REFERENCE_COUNT_nt!KiFastFailDispatch OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e78067c0-c86e-2475-7d94-d283b49f461b} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8013f73430b, Address of the instruction which caused the bugcheck Arg3: ffffb7016e3860e0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 9858 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 18682 Key : Analysis.Memory.CommitPeak.Mb Value: 77 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8013f73430b BUGCHECK_P3: ffffb7016e3860e0 BUGCHECK_P4: 0 CONTEXT: ffffb7016e3860e0 -- (.cxr 0xffffb7016e3860e0) rax=fffff8014001af88 rbx=0000000000000000 rcx=0000000000000000 rdx=000000000000100c rsi=ffffe58f4dc72000 rdi=ffffbf08b5fd2cb0 rip=fffff8013f73430b rsp=ffffb7016e386ae0 rbp=ffffb7016e386c10 r8=0000000000000001 r9=0000000000000000 r10=0000000000000004 r11=fffff8014001bc6c r12=ffffe58f4dc72000 r13=ffffe58f5ac5d030 r14=ffffbf08b5fd2cb0 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nvlddmkm+0xf430b: fffff801`3f73430b 488b8b18040000 mov rcx,qword ptr [rbx+418h] ds:002b:00000000`00000418=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: csgo.exe STACK_TEXT: ffffb701`6e386ae0 ffffe58f`5add7010 : ffffe58f`4dc72000 ffffb701`6e386e08 ffffe509`c6f41f70 ffffb701`6e387288 : nvlddmkm+0xf430b ffffb701`6e386ae8 ffffe58f`4dc72000 : ffffb701`6e386e08 ffffe509`c6f41f70 ffffb701`6e387288 fffff801`401ea5d3 : 0xffffe58f`5add7010 ffffb701`6e386af0 ffffb701`6e386e08 : ffffe509`c6f41f70 ffffb701`6e387288 fffff801`401ea5d3 00000000`00000001 : 0xffffe58f`4dc72000 ffffb701`6e386af8 ffffe509`c6f41f70 : ffffb701`6e387288 fffff801`401ea5d3 00000000`00000001 ffffb701`6e387200 : 0xffffb701`6e386e08 ffffb701`6e386b00 ffffb701`6e387288 : fffff801`401ea5d3 00000000`00000001 ffffb701`6e387200 00000000`00000000 : 0xffffe509`c6f41f70 ffffb701`6e386b08 fffff801`401ea5d3 : 00000000`00000001 ffffb701`6e387200 00000000`00000000 00000000`00000000 : 0xffffb701`6e387288 ffffb701`6e386b10 00000000`00000001 : ffffb701`6e387200 00000000`00000000 00000000`00000000 ffffe58f`52829000 : nvlddmkm+0xbaa5d3 ffffb701`6e386b18 ffffb701`6e387200 : 00000000`00000000 00000000`00000000 ffffe58f`52829000 00000000`00000000 : 0x1 ffffb701`6e386b20 00000000`00000000 : 00000000`00000000 ffffe58f`52829000 00000000`00000000 00000000`000000c0 : 0xffffb701`6e387200 SYMBOL_NAME: nvlddmkm+f430b MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .cxr 0xffffb7016e3860e0 ; kb BUCKET_ID_FUNC_OFFSET: f430b FAILURE_BUCKET_ID: 0x3B_c0000005_nvlddmkm!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {63c41bff-3ea4-15a0-a72c-26a548d17abe} Followup: MachineOwner ---------
Daha dün format attım kardeşim bugün de bu ayki sürücüyü kurdum ekran kartına. Dün de aynı sorun yaşadım o yüzden format attım o zaman güncel değildi ekran kartı şimdi güncel ama yani sürümü ile alakalı bir sorun olduğunu düşünmüyorum.
Pekala. Mademki sürücü sorunu olmadığından eminsiniz, OCCT ile test yapın. Donanımsal bir sorun var mı, bakalım.
Ekran Kartınızın Stabilitesini Test Edin: OCCT 3D Testi
Bu test kart stabilitesi hakkında net sonuç verir. Ekran kartına Furmark'a göre daha fazla yük bindirir. Haliyle kart, kapasitesinin üzerinde yük çekeceği için donanımsal zarar verme olasılığı vardır. Bu sebeple başta belirteyim. Bu testi kullanmak kendi sorumluluğunuz altındadır. Teste...www.technopat.net
Fotoğraf çekmek yerine ekran görüntüsü atabilirsiniz. Bakacağım dosyalarınıza.
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8013f73430b, Address of the instruction which caused the bugcheck
Arg3: ffffb7016e3860e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5281
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14108
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8013f73430b
BUGCHECK_P3: ffffb7016e3860e0
BUGCHECK_P4: 0
CONTEXT: ffffb7016e3860e0 -- (.cxr 0xffffb7016e3860e0)
rax=fffff8014001af88 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000100c rsi=ffffe58f4dc72000 rdi=ffffbf08b5fd2cb0
rip=fffff8013f73430b rsp=ffffb7016e386ae0 rbp=ffffb7016e386c10
r8=0000000000000001 r9=0000000000000000 r10=0000000000000004
r11=fffff8014001bc6c r12=ffffe58f4dc72000 r13=ffffe58f5ac5d030
r14=ffffbf08b5fd2cb0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nvlddmkm+0xf430b:
fffff801`3f73430b 488b8b18040000 mov rcx,qword ptr [rbx+418h] ds:002b:00000000`00000418=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csgo.exe
STACK_TEXT:
ffffb701`6e386ae0 ffffe58f`5add7010 : ffffe58f`4dc72000 ffffb701`6e386e08 ffffe509`c6f41f70 ffffb701`6e387288 : nvlddmkm+0xf430b
ffffb701`6e386ae8 ffffe58f`4dc72000 : ffffb701`6e386e08 ffffe509`c6f41f70 ffffb701`6e387288 fffff801`401ea5d3 : 0xffffe58f`5add7010
ffffb701`6e386af0 ffffb701`6e386e08 : ffffe509`c6f41f70 ffffb701`6e387288 fffff801`401ea5d3 00000000`00000001 : 0xffffe58f`4dc72000
ffffb701`6e386af8 ffffe509`c6f41f70 : ffffb701`6e387288 fffff801`401ea5d3 00000000`00000001 ffffb701`6e387200 : 0xffffb701`6e386e08
ffffb701`6e386b00 ffffb701`6e387288 : fffff801`401ea5d3 00000000`00000001 ffffb701`6e387200 00000000`00000000 : 0xffffe509`c6f41f70
ffffb701`6e386b08 fffff801`401ea5d3 : 00000000`00000001 ffffb701`6e387200 00000000`00000000 00000000`00000000 : 0xffffb701`6e387288
ffffb701`6e386b10 00000000`00000001 : ffffb701`6e387200 00000000`00000000 00000000`00000000 ffffe58f`52829000 : nvlddmkm+0xbaa5d3
ffffb701`6e386b18 ffffb701`6e387200 : 00000000`00000000 00000000`00000000 ffffe58f`52829000 00000000`00000000 : 0x1
ffffb701`6e386b20 00000000`00000000 : 00000000`00000000 ffffe58f`52829000 00000000`00000000 00000000`000000c0 : 0xffffb701`6e387200
SYMBOL_NAME: nvlddmkm+f430b
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffffb7016e3860e0 ; kb
BUCKET_ID_FUNC_OFFSET: f430b
FAILURE_BUCKET_ID: 0x3B_c0000005_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {63c41bff-3ea4-15a0-a72c-26a548d17abe}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000000e, Type of memory safety violation
Arg2: fffff30db6a8b170, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff30db6a8b0c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4156
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5991
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: e
BUGCHECK_P2: fffff30db6a8b170
BUGCHECK_P3: fffff30db6a8b0c8
BUGCHECK_P4: 0
TRAP_FRAME: fffff30db6a8b170 -- (.trap 0xfffff30db6a8b170)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8608270b1848 rbx=0000000000000000 rcx=000000000000000e
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8030883a184 rsp=fffff30db6a8b300 rbp=fffff30db6a8b420
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=ffff8608270b14e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ObpCreateHandle+0x149f44:
fffff803`0883a184 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff30db6a8b0c8 -- (.exr 0xfffff30db6a8b0c8)
ExceptionAddress: fffff8030883a184 (nt!ObpCreateHandle+0x0000000000149f44)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000000e
Subcode: 0xe FAST_FAIL_INVALID_REFERENCE_COUNT
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MRT.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000000e
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff30d`b6a8ae48 fffff803`08406569 : 00000000`00000139 00000000`0000000e fffff30d`b6a8b170 fffff30d`b6a8b0c8 : nt!KeBugCheckEx
fffff30d`b6a8ae50 fffff803`08406990 : 00000000`79517350 fffff30d`b6a8b000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff30d`b6a8af90 fffff803`08404d23 : 00000000`00000000 fffff30d`b6a8b408 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff30d`b6a8b170 fffff803`0883a184 : ffff8608`270b14e0 00000000`00000001 00000000`00000000 ffff8608`270b14e0 : nt!KiRaiseSecurityCheckFailure+0x323
fffff30d`b6a8b300 fffff803`086afbf9 : fffff30d`b6a8b820 ffffdb81`02964040 ffffdb81`0e4fa2d8 fffff803`082d8c7a : nt!ObpCreateHandle+0x149f44
fffff30d`b6a8b4f0 fffff803`086ad0d3 : 00000000`00000000 00000000`00000000 00000000`00000000 00007fff`b963b4e0 : nt!ObOpenObjectByPointer+0x1b9
fffff30d`b6a8b770 fffff803`086aceb3 : 00000000`00000066 00000000`00000040 00000000`00000000 00000009`5607db10 : nt!PsOpenThread+0x213
fffff30d`b6a8bac0 fffff803`08405fb8 : 00000000`00000300 000001e5`a50e6160 fffff30d`b6a8bb80 000001e5`a5392300 : nt!NtOpenThread+0x23
fffff30d`b6a8bb00 00007fff`b956e344 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000009`5607d798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b956e344
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_e_INVALID_REFERENCE_COUNT_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e78067c0-c86e-2475-7d94-d283b49f461b}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008886, The subtype of the bugcheck.
Arg2: ffff91000482c220
Arg3: ffff91000a82c1f0
Arg4: 0000000000000400
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3078
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3811
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 8886
BUGCHECK_P2: ffff91000482c220
BUGCHECK_P3: ffff91000a82c1f0
BUGCHECK_P4: 400
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SearchApp.exe
STACK_TEXT:
ffffe308`4cfb8548 fffff800`15ef5b70 : 00000000`0000001a 00000000`00008886 ffff9100`0482c220 ffff9100`0a82c1f0 : nt!KeBugCheckEx
ffffe308`4cfb8550 fffff800`15ef4be0 : ffffe308`00000002 fffff800`00000000 00000000`00180eb6 ffffe308`4cfb8b80 : nt!MiUnlinkPageFromList+0xcb0
ffffe308`4cfb85e0 fffff800`15ef41c4 : ffffe308`4cfb8880 ffffe308`4cfb8920 0000000f`ffffffff 00000001`80eb6820 : nt!MiHandleTransitionFault+0x180
ffffe308`4cfb8660 fffff800`15ef3c16 : ffffe308`4cfb8880 00000000`00000000 ffff9100`03e22d50 00000000`00000000 : nt!MiResolveTransitionFault+0x424
ffffe308`4cfb8720 fffff800`15eec425 : ffffe308`4cfb8880 00000000`00000000 ffffe308`4cfb8860 ffffe308`4cfb8a20 : nt!MiResolveProtoPteFault+0x1236
ffffe308`4cfb8820 fffff800`15eea369 : 00000000`00000000 00000000`00000100 00000000`c0000016 ffffd28f`4d80e058 : nt!MiDispatchFault+0x3d5
ffffe308`4cfb8960 fffff800`1600275e : ffff8003`6f3a8000 ffff8003`6f3a8080 00000258`c815c8a0 00000000`00000000 : nt!MmAccessFault+0x189
ffffe308`4cfb8b00 00007ff9`4ceb7d66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000b7`729ed6e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`4ceb7d66
SYMBOL_NAME: nt!MiUnlinkPageFromList+cb0
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: cb0
FAILURE_BUCKET_ID: 0x1a_8886_nt!MiUnlinkPageFromList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf}
Followup: MachineOwner
---------