Fakat ben bundan önce bilgisayarı yolladığımda tek bir tanesini değiştirmişlerdi.RAM'ler Kit olduğundan arıza varsa genelde ikisi birden değişir.
Manuel ayar nasıl yapılıyor.O zaman güç ayarıda işe yaramadı tek çare sizin manuel WattMan ayarı yapmanız birkaç kişi böyle çözmüş yine olmazsa garanti veya iade talep edin.
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80378d6e350, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 9
Key : Analysis.Elapsed.Sec
Value: 19
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7B84
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 4.00
BIOS_DATE: 12/20/2018
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M PRO-M2 V2 (MS-7B84)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 2
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80378d6e350
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: ctfmon.exe
CURRENT_IRQL: d
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 07-26-2019 14:17:33.0313
ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
LAST_CONTROL_TRANSFER: from fffff803789ebdb3 to fffff803789bc900
STACK_TEXT:
ffffd100`0f598af8 fffff803`789ebdb3 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`78d6e350 : nt!KeBugCheckEx
ffffd100`0f598b00 fffff803`7881f16f : 00000074`67f88624 ffffd100`0f540180 00000000`00000286 00000000`00002182 : nt!KeAccumulateTicks+0x1c94f3
ffffd100`0f598b60 fffff803`792b51e1 : 00000000`00000000 ffffe108`8caa1f00 ffff910b`1cd4f160 ffffe108`8caa1fb0 : nt!KeClockInterruptNotify+0xcf
ffffd100`0f598f30 fffff803`78802e15 : ffffe108`8caa1f00 00000000`00000000 00000000`00000000 ffff1e4c`6de8b28c : hal!HalpTimerClockIpiRoutine+0x21
ffffd100`0f598f60 fffff803`789be36a : ffff910b`1cd4f160 ffffe108`8caa1f00 00000000`00000040 ffffe108`8caa1f00 : nt!KiCallInterruptServiceRoutine+0xa5
ffffd100`0f598fb0 fffff803`789be8b7 : 00000000`1d722351 ffff910b`1cd4f160 ffffe108`8caa1f00 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff910b`1cd4f0e0 fffff803`78840dd4 : ffff8105`dc4b5880 ffff8105`dc0c3e20 ffffe108`9136c180 ffffe108`94c1dc28 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff910b`1cd4f270 fffff803`788eefbd : ffffffff`ffffffff ffffe108`956b5000 ffff910b`1cd4f3d0 00000000`00000000 : nt!ExAcquireSpinLockExclusive+0xa4
ffff910b`1cd4f2a0 fffff803`78833f4a : ffffffff`ffffffff ffff910b`1cd4f3d0 ffffe108`956b5000 00000001`00000001 : nt!RtlpHpAcquireLockExclusive+0xd
ffff910b`1cd4f2d0 fffff803`78832710 : ffffe108`8c402340 ffffe108`8c403100 ffffe108`8c4032c0 fffff803`00000190 : nt!RtlpHpLfhSlotAllocate+0xeda
ffff910b`1cd4f430 fffff803`78b6a06d : 00000000`00000000 00000000`00000000 fffff803`656c6946 ffffe108`920078b0 : nt!ExAllocateHeapPool+0x2c0
ffff910b`1cd4f570 fffff803`78debb30 : ffffe108`8cbf1640 00000000`00000000 00000000`00000010 fffff803`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffff910b`1cd4f5c0 fffff803`78de7179 : ffffe108`0000004c ffffe108`8cbf1601 ffffe108`00000010 ffff910b`1cd4f688 : nt!ObpAllocateObject+0x1a0
ffff910b`1cd4f640 fffff803`78de8798 : fffff803`78de7e45 ffffe108`9113fd90 ffffe108`9112a8f0 ffff910b`00000001 : nt!IopAllocRealFileObject+0x119
ffff910b`1cd4f710 fffff803`78def29f : ffffe108`9112a8f0 ffffe108`9112a845 ffffe108`91e0ba20 00000000`00000001 : nt!IopParseDevice+0x968
ffff910b`1cd4f880 fffff803`78ded701 : ffffe108`91e0ba00 ffff910b`1cd4fac8 ffffac80`00000040 ffffe108`8cbf1640 : nt!ObpLookupObjectName+0x78f
ffff910b`1cd4fa40 fffff803`78eaf234 : ffffbfbf`00000001 00000000`00000028 000001eb`197bf670 000000e7`eba7d080 : nt!ObOpenObjectByNameEx+0x201
ffff910b`1cd4fb80 fffff803`789ce118 : ffffe108`95947080 ffffe108`957e8be0 ffffe108`95947080 000000e7`eba7d080 : nt!NtQueryAttributesFile+0x1b4
ffff910b`1cd4fe40 00007ff8`8633c804 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e7`eba7cef8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`8633c804
THREAD_SHA1_HASH_MOD_FUNC: d06cd42f757a9be451bb2961c6e9ce7ed687659e
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1055ccc12e3de9f1ef0a1a90a1706521f5ab813d
THREAD_SHA1_HASH_MOD: 351d6799213c6635f947e528ad70424d64a900fd
FOLLOWUP_IP:
nt!KeAccumulateTicks+1c94f3
fffff803`789ebdb3 cc int 3
FAULT_INSTR_CODE: ab3944cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KeAccumulateTicks+1c94f3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42
IMAGE_VERSION: 10.0.18362.239
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c94f3
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
PRIMARY_PROBLEM_CLASS: 0x133_ISR_nt!KeAccumulateTicks
TARGET_TIME: 2019-07-21T19:25:23.000Z
OSBUILD: 18362
OSSERVICEPACK: 239
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-02-02 11:33:06
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4d7a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x133_isr_nt!keaccumulateticks
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000023, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80052ae2245, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 12
Key : Analysis.Elapsed.Sec
Value: 18
Key : Analysis.Memory.CommitPeak.Mb
Value: 65
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 23
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80052ae2245
READ_ADDRESS: fffff80052f6e3b0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000023
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiStealPage+1e1
fffff800`52ae2245 440fb66622 movzx r12d,byte ptr [rsi+22h]
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 07-26-2019 14:17:35.0938
ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
TRAP_FRAME: ffffc08ea731d880 -- (.trap 0xffffc08ea731d880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc08ea731df40 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80052ae2245 rsp=ffffc08ea731da10 rbp=ffffc08ea731db10
r8=0000000000000002 r9=0000000000000001 r10=0000000000000008
r11=ffff9dcec0000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiStealPage+0x1e1:
fffff800`52ae2245 440fb66622 movzx r12d,byte ptr [rsi+22h] ds:00000000`00000022=??
Resetting default scope
LOCK_ADDRESS: fffff80052e5d6e0 -- (!locks fffff80052e5d6e0)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80052e5d6e0) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80052e5d6e0
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80052bce6e9 to fffff80052bbc900
STACK_TEXT:
ffffc08e`a731d738 fffff800`52bce6e9 : 00000000`0000000a 00000000`00000023 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc08e`a731d740 fffff800`52bcaa2b : ffff9dce`fe0014e8 00000000`00000000 ffffaf8c`f37e4000 fffff800`52a7b8c4 : nt!KiBugCheckDispatch+0x69
ffffc08e`a731d880 fffff800`52ae2245 : ffffc08e`a731db10 ffffc600`0c5da170 ffff9dfc`0029d160 00000000`00000000 : nt!KiPageFault+0x46b
ffffc08e`a731da10 fffff800`52a896fe : ffffc600`0c5da170 ffffc600`0c5da170 00000000`00000000 ffffc08e`a731dda0 : nt!MiStealPage+0x1e1
ffffc08e`a731dcd0 fffff800`52a892b3 : ffffc08e`ffffffff fffff800`52a8ac2e 00200000`00000000 fffff800`00000001 : nt!MiTradePage+0x34e
ffffc08e`a731dd80 fffff800`52a8a31a : 00000000`00000000 00000000`0041f35d 00000000`ffffffff 00000000`0041f35d : nt!MiClaimPhysicalRun+0xbb
ffffc08e`a731de20 fffff800`53000022 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiFindContiguousPages+0x34a
ffffc08e`a731dfd0 fffff800`52a55bef : fffff800`52e63900 ffff9dfc`002b17c8 fffff800`562f9000 ffffffff`ffffffff : nt!MiAllocateDriverPage+0x7e
ffffc08e`a731e060 fffff800`530fc15d : ffff6c0a`66c5a81e 00000000`00000000 00000000`00000000 fffff800`530f74f4 : nt!MiLockCode+0x7af
ffffc08e`a731e200 fffff800`530f9b94 : ffff9dfc`002b1700 ffff9dfc`002b1c08 00000000`00000000 ffffd00d`eea6a060 : nt!MiDisablePagingOfDriver+0x71
ffffc08e`a731e250 fffff800`530f92d7 : 00000000`00000000 00000000`00000000 ffffaf8c`f8087c00 00000000`00000000 : nt!MiHandleDriverNonPagedSections+0x64
ffffc08e`a731e2c0 fffff800`53108ea6 : ffffc08e`a731e508 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmLoadSystemImageEx+0x47b
ffffc08e`a731e470 fffff800`53108988 : ffffc08e`a731e5b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImage+0x26
ffffc08e`a731e4b0 fffff800`53127797 : 00000000`00000000 00000000`00000000 00000000`00000004 ffffc08e`00000004 : nt!IopLoadDriver+0x224
ffffc08e`a731e690 fffff800`530f1a56 : 00000000`00000001 00000000`00000000 ffffaf8c`f6b938d0 ffffffff`8000015c : nt!PipCallDriverAddDeviceQueryRoutine+0x1c3
ffffc08e`a731e730 fffff800`530f145d : 00000000`00000000 ffffc08e`a731e840 00000000`6e657050 00000000`00000012 : nt!PnpCallDriverQueryServiceHelper+0xda
ffffc08e`a731e7e0 fffff800`530f0b11 : ffffaf8c`f6bb94e0 ffffc08e`a731ea18 ffffaf8c`f6bb94e0 00000000`00000000 : nt!PipCallDriverAddDevice+0x409
ffffc08e`a731e9a0 fffff800`5317cb88 : ffffaf8c`f6accf00 ffffc08e`a731eb01 ffffc08e`a731eab0 fffff800`00000000 : nt!PipProcessDevNodeTree+0x1b9
ffffc08e`a731ea60 fffff800`52b5901e : 00000001`00000003 ffffaf8c`f6accf10 ffff8d81`00000000 ffffaf8c`f6accf10 : nt!PiProcessStartSystemDevices+0x60
ffffc08e`a731eab0 fffff800`52ac4855 : ffffaf8c`f8177080 ffffaf8c`f3667ae0 fffff800`52e5bf80 ffffaf8c`f3667ae0 : nt!PnpDeviceActionWorker+0x45e
ffffc08e`a731eb70 fffff800`52b2f725 : ffffaf8c`f8177080 00000000`00000080 ffffaf8c`f36a7040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffc08e`a731ec10 fffff800`52bc3e6a : ffff8d81`0df22180 ffffaf8c`f8177080 fffff800`52b2f6d0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc08e`a731ec60 00000000`00000000 : ffffc08e`a731f000 ffffc08e`a7319000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: ac2e4d0c77d8381f0a27ee4cbe7e5510a815351b
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d4ce872e3d2f999c574b89727a9db5e999a4eef6
THREAD_SHA1_HASH_MOD: cbd6d858ece2492ed52a5625660f550734be73dc
FOLLOWUP_IP:
nt!MiStealPage+1e1
fffff800`52ae2245 440fb66622 movzx r12d,byte ptr [rsi+22h]
FAULT_INSTR_CODE: 66b60f44
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiStealPage+1e1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42
IMAGE_VERSION: 10.0.18362.239
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1e1
FAILURE_BUCKET_ID: AV_nt!MiStealPage
BUCKET_ID: AV_nt!MiStealPage
PRIMARY_PROBLEM_CLASS: AV_nt!MiStealPage
TARGET_TIME: 2019-07-22T09:26:15.000Z
OSBUILD: 18362
OSSERVICEPACK: 239
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-02-02 11:33:06
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4737
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!mistealpage
FAILURE_ID_HASH: {17576dda-297d-ae8d-ee16-7d36ac48a792}
Followup: MachineOwner
---------
FAST_ERESOURCE_PRECONDITION_VIOLATION (1c6)
The current thread is performing an invalid call to a fast resource routine.
Arguments:
Arg1: 000000000000000f, The caller passed a fast resource to a legacy routine that
supports fast resources, but the fast resource was not
initialized with EX_FAST_RESOURCE_ENABLE_LEGACY_APIS.
Arg2: ffffc188289a4cb0, Pointer to the resource.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 9
Key : Analysis.Elapsed.Sec
Value: 22
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7B84
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 4.00
BIOS_DATE: 12/20/2018
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M PRO-M2 V2 (MS-7B84)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 2
BUGCHECK_P1: f
BUGCHECK_P2: ffffc188289a4cb0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x1C6
PROCESS_NAME: schtasks.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 07-26-2019 14:17:30.0437
ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
LAST_CONTROL_TRANSFER: from fffff8050fafe31f to fffff8050fbbc900
STACK_TEXT:
fffff107`3d24c188 fffff805`0fafe31f : 00000000`000001c6 00000000`0000000f ffffc188`289a4cb0 00000000`00000000 : nt!KeBugCheckEx
fffff107`3d24c190 fffff805`11bd9968 : ffffc188`2dfc3748 00000000`00000000 ffffab0a`00000000 fffff107`3d24c1f0 : nt!ExIsResourceAcquiredExclusiveLite+0x6f
fffff107`3d24c1d0 fffff805`0fa917d8 : fffff107`3d24c620 ffffab0a`5636a030 00000000`00000000 fffff107`3d24c620 : Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x1e8
fffff107`3d24c570 fffff805`1001dccc : 00000000`00000000 00000000`00000000 ffffab0a`5614ed60 fffff805`11bd9780 : nt!FsFilterPerformCallbacks+0xd8
fffff107`3d24c5d0 fffff805`1001d9c1 : 00000000`00336754 00000002`00008080 ffffc188`333b6e70 00000000`00000000 : nt!FsRtlAcquireFileExclusiveCommon+0x10c
fffff107`3d24c8c0 fffff805`0fa915a9 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff107`3d24cb00 : nt!FsRtlAcquireFileExclusive+0x11
fffff107`3d24c8f0 fffff805`0ffdc3d2 : ffffab0a`591f1ab0 00000000`08000000 ffffc188`333b6e70 00000000`00000002 : nt!CcZeroEndOfLastPage+0x49
fffff107`3d24c940 fffff805`0ffdc110 : 0000005a`f7a7e990 00000000`000f0005 00000000`00000000 fffff9bf`fc5474e0 : nt!MiCreateSectionCommon+0x252
fffff107`3d24ca20 fffff805`0fbce118 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x60
fffff107`3d24ca90 00007ff8`abdbc9a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000005a`f7a7e938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`abdbc9a4
THREAD_SHA1_HASH_MOD_FUNC: bc05d70fdcb4cafc04b8e0400349987b5ffebe5b
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 71d585167d4976f63b12e7b97c4987bdd3f67836
THREAD_SHA1_HASH_MOD: f2b06249f80abeea5caef5dda430ced33dad5ec1
FOLLOWUP_IP:
nt!ExIsResourceAcquiredExclusiveLite+6f
fffff805`0fafe31f cc int 3
FAULT_INSTR_CODE: cccccccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExIsResourceAcquiredExclusiveLite+6f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42
IMAGE_VERSION: 10.0.18362.239
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 6f
FAILURE_BUCKET_ID: 0x1C6_nt!ExIsResourceAcquiredExclusiveLite
BUCKET_ID: 0x1C6_nt!ExIsResourceAcquiredExclusiveLite
PRIMARY_PROBLEM_CLASS: 0x1C6_nt!ExIsResourceAcquiredExclusiveLite
TARGET_TIME: 2019-07-22T08:31:54.000Z
OSBUILD: 18362
OSSERVICEPACK: 239
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-02-02 11:33:06
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 56a6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1c6_nt!exisresourceacquiredexclusivelite
FAILURE_ID_HASH: {cd7154ab-ddce-4ffc-05fb-4408c0625f12}
Followup: MachineOwner
---------
Bu bilgisayar Dadg2 donanım arşivi önerisi itopya sitesinden aldım.Sistemin hem ekran kartı hem de RAM'i sorunlu gibi. Bu PC'yi nereden aldınız? Sapphire ekran kartı kesinlikle tavsiye etmiyorum!
BIOS'u güncelleyin, BIOS sürümünüz eski:
Sonrasında RAM testi yapın:
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Kod:DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff80378d6e350, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 9 Key : Analysis.Elapsed.Sec Value: 19 Key : Analysis.Memory.CommitPeak.Mb Value: 68 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7B84 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 2.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 4.00 BIOS_DATE: 12/20/2018 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B450M PRO-M2 V2 (MS-7B84) BASEBOARD_VERSION: 2.0 DUMP_TYPE: 2 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff80378d6e350 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x133 PROCESS_NAME: ctfmon.exe CURRENT_IRQL: d ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D ANALYSIS_SESSION_TIME: 07-26-2019 14:17:33.0313 ANALYSIS_VERSION: 10.0.18914.1001 amd64fre LAST_CONTROL_TRANSFER: from fffff803789ebdb3 to fffff803789bc900 STACK_TEXT: ffffd100`0f598af8 fffff803`789ebdb3 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`78d6e350 : nt!KeBugCheckEx ffffd100`0f598b00 fffff803`7881f16f : 00000074`67f88624 ffffd100`0f540180 00000000`00000286 00000000`00002182 : nt!KeAccumulateTicks+0x1c94f3 ffffd100`0f598b60 fffff803`792b51e1 : 00000000`00000000 ffffe108`8caa1f00 ffff910b`1cd4f160 ffffe108`8caa1fb0 : nt!KeClockInterruptNotify+0xcf ffffd100`0f598f30 fffff803`78802e15 : ffffe108`8caa1f00 00000000`00000000 00000000`00000000 ffff1e4c`6de8b28c : hal!HalpTimerClockIpiRoutine+0x21 ffffd100`0f598f60 fffff803`789be36a : ffff910b`1cd4f160 ffffe108`8caa1f00 00000000`00000040 ffffe108`8caa1f00 : nt!KiCallInterruptServiceRoutine+0xa5 ffffd100`0f598fb0 fffff803`789be8b7 : 00000000`1d722351 ffff910b`1cd4f160 ffffe108`8caa1f00 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa ffff910b`1cd4f0e0 fffff803`78840dd4 : ffff8105`dc4b5880 ffff8105`dc0c3e20 ffffe108`9136c180 ffffe108`94c1dc28 : nt!KiInterruptDispatchNoLockNoEtw+0x37 ffff910b`1cd4f270 fffff803`788eefbd : ffffffff`ffffffff ffffe108`956b5000 ffff910b`1cd4f3d0 00000000`00000000 : nt!ExAcquireSpinLockExclusive+0xa4 ffff910b`1cd4f2a0 fffff803`78833f4a : ffffffff`ffffffff ffff910b`1cd4f3d0 ffffe108`956b5000 00000001`00000001 : nt!RtlpHpAcquireLockExclusive+0xd ffff910b`1cd4f2d0 fffff803`78832710 : ffffe108`8c402340 ffffe108`8c403100 ffffe108`8c4032c0 fffff803`00000190 : nt!RtlpHpLfhSlotAllocate+0xeda ffff910b`1cd4f430 fffff803`78b6a06d : 00000000`00000000 00000000`00000000 fffff803`656c6946 ffffe108`920078b0 : nt!ExAllocateHeapPool+0x2c0 ffff910b`1cd4f570 fffff803`78debb30 : ffffe108`8cbf1640 00000000`00000000 00000000`00000010 fffff803`00000000 : nt!ExAllocatePoolWithTag+0x5d ffff910b`1cd4f5c0 fffff803`78de7179 : ffffe108`0000004c ffffe108`8cbf1601 ffffe108`00000010 ffff910b`1cd4f688 : nt!ObpAllocateObject+0x1a0 ffff910b`1cd4f640 fffff803`78de8798 : fffff803`78de7e45 ffffe108`9113fd90 ffffe108`9112a8f0 ffff910b`00000001 : nt!IopAllocRealFileObject+0x119 ffff910b`1cd4f710 fffff803`78def29f : ffffe108`9112a8f0 ffffe108`9112a845 ffffe108`91e0ba20 00000000`00000001 : nt!IopParseDevice+0x968 ffff910b`1cd4f880 fffff803`78ded701 : ffffe108`91e0ba00 ffff910b`1cd4fac8 ffffac80`00000040 ffffe108`8cbf1640 : nt!ObpLookupObjectName+0x78f ffff910b`1cd4fa40 fffff803`78eaf234 : ffffbfbf`00000001 00000000`00000028 000001eb`197bf670 000000e7`eba7d080 : nt!ObOpenObjectByNameEx+0x201 ffff910b`1cd4fb80 fffff803`789ce118 : ffffe108`95947080 ffffe108`957e8be0 ffffe108`95947080 000000e7`eba7d080 : nt!NtQueryAttributesFile+0x1b4 ffff910b`1cd4fe40 00007ff8`8633c804 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000e7`eba7cef8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`8633c804 THREAD_SHA1_HASH_MOD_FUNC: d06cd42f757a9be451bb2961c6e9ce7ed687659e THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1055ccc12e3de9f1ef0a1a90a1706521f5ab813d THREAD_SHA1_HASH_MOD: 351d6799213c6635f947e528ad70424d64a900fd FOLLOWUP_IP: nt!KeAccumulateTicks+1c94f3 fffff803`789ebdb3 cc int 3 FAULT_INSTR_CODE: ab3944cc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KeAccumulateTicks+1c94f3 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42 IMAGE_VERSION: 10.0.18362.239 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 1c94f3 FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks PRIMARY_PROBLEM_CLASS: 0x133_ISR_nt!KeAccumulateTicks TARGET_TIME: 2019-07-21T19:25:23.000Z OSBUILD: 18362 OSSERVICEPACK: 239 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-02-02 11:33:06 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 4d7a ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x133_isr_nt!keaccumulateticks FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000023, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80052ae2245, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 12 Key : Analysis.Elapsed.Sec Value: 18 Key : Analysis.Memory.CommitPeak.Mb Value: 65 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 23 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80052ae2245 READ_ADDRESS: fffff80052f6e3b0: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000023 CURRENT_IRQL: 2 FAULTING_IP: nt!MiStealPage+1e1 fffff800`52ae2245 440fb66622 movzx r12d,byte ptr [rsi+22h] CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXNTFS: 1 (!blackboxntfs) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D ANALYSIS_SESSION_TIME: 07-26-2019 14:17:35.0938 ANALYSIS_VERSION: 10.0.18914.1001 amd64fre TRAP_FRAME: ffffc08ea731d880 -- (.trap 0xffffc08ea731d880) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffc08ea731df40 rbx=0000000000000000 rcx=0000000000000001 rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80052ae2245 rsp=ffffc08ea731da10 rbp=ffffc08ea731db10 r8=0000000000000002 r9=0000000000000001 r10=0000000000000008 r11=ffff9dcec0000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc nt!MiStealPage+0x1e1: fffff800`52ae2245 440fb66622 movzx r12d,byte ptr [rsi+22h] ds:00000000`00000022=?? Resetting default scope LOCK_ADDRESS: fffff80052e5d6e0 -- (!locks fffff80052e5d6e0) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80052e5d6e0) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80052e5d6e0 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80052bce6e9 to fffff80052bbc900 STACK_TEXT: ffffc08e`a731d738 fffff800`52bce6e9 : 00000000`0000000a 00000000`00000023 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffc08e`a731d740 fffff800`52bcaa2b : ffff9dce`fe0014e8 00000000`00000000 ffffaf8c`f37e4000 fffff800`52a7b8c4 : nt!KiBugCheckDispatch+0x69 ffffc08e`a731d880 fffff800`52ae2245 : ffffc08e`a731db10 ffffc600`0c5da170 ffff9dfc`0029d160 00000000`00000000 : nt!KiPageFault+0x46b ffffc08e`a731da10 fffff800`52a896fe : ffffc600`0c5da170 ffffc600`0c5da170 00000000`00000000 ffffc08e`a731dda0 : nt!MiStealPage+0x1e1 ffffc08e`a731dcd0 fffff800`52a892b3 : ffffc08e`ffffffff fffff800`52a8ac2e 00200000`00000000 fffff800`00000001 : nt!MiTradePage+0x34e ffffc08e`a731dd80 fffff800`52a8a31a : 00000000`00000000 00000000`0041f35d 00000000`ffffffff 00000000`0041f35d : nt!MiClaimPhysicalRun+0xbb ffffc08e`a731de20 fffff800`53000022 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiFindContiguousPages+0x34a ffffc08e`a731dfd0 fffff800`52a55bef : fffff800`52e63900 ffff9dfc`002b17c8 fffff800`562f9000 ffffffff`ffffffff : nt!MiAllocateDriverPage+0x7e ffffc08e`a731e060 fffff800`530fc15d : ffff6c0a`66c5a81e 00000000`00000000 00000000`00000000 fffff800`530f74f4 : nt!MiLockCode+0x7af ffffc08e`a731e200 fffff800`530f9b94 : ffff9dfc`002b1700 ffff9dfc`002b1c08 00000000`00000000 ffffd00d`eea6a060 : nt!MiDisablePagingOfDriver+0x71 ffffc08e`a731e250 fffff800`530f92d7 : 00000000`00000000 00000000`00000000 ffffaf8c`f8087c00 00000000`00000000 : nt!MiHandleDriverNonPagedSections+0x64 ffffc08e`a731e2c0 fffff800`53108ea6 : ffffc08e`a731e508 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmLoadSystemImageEx+0x47b ffffc08e`a731e470 fffff800`53108988 : ffffc08e`a731e5b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImage+0x26 ffffc08e`a731e4b0 fffff800`53127797 : 00000000`00000000 00000000`00000000 00000000`00000004 ffffc08e`00000004 : nt!IopLoadDriver+0x224 ffffc08e`a731e690 fffff800`530f1a56 : 00000000`00000001 00000000`00000000 ffffaf8c`f6b938d0 ffffffff`8000015c : nt!PipCallDriverAddDeviceQueryRoutine+0x1c3 ffffc08e`a731e730 fffff800`530f145d : 00000000`00000000 ffffc08e`a731e840 00000000`6e657050 00000000`00000012 : nt!PnpCallDriverQueryServiceHelper+0xda ffffc08e`a731e7e0 fffff800`530f0b11 : ffffaf8c`f6bb94e0 ffffc08e`a731ea18 ffffaf8c`f6bb94e0 00000000`00000000 : nt!PipCallDriverAddDevice+0x409 ffffc08e`a731e9a0 fffff800`5317cb88 : ffffaf8c`f6accf00 ffffc08e`a731eb01 ffffc08e`a731eab0 fffff800`00000000 : nt!PipProcessDevNodeTree+0x1b9 ffffc08e`a731ea60 fffff800`52b5901e : 00000001`00000003 ffffaf8c`f6accf10 ffff8d81`00000000 ffffaf8c`f6accf10 : nt!PiProcessStartSystemDevices+0x60 ffffc08e`a731eab0 fffff800`52ac4855 : ffffaf8c`f8177080 ffffaf8c`f3667ae0 fffff800`52e5bf80 ffffaf8c`f3667ae0 : nt!PnpDeviceActionWorker+0x45e ffffc08e`a731eb70 fffff800`52b2f725 : ffffaf8c`f8177080 00000000`00000080 ffffaf8c`f36a7040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105 ffffc08e`a731ec10 fffff800`52bc3e6a : ffff8d81`0df22180 ffffaf8c`f8177080 fffff800`52b2f6d0 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffffc08e`a731ec60 00000000`00000000 : ffffc08e`a731f000 ffffc08e`a7319000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a THREAD_SHA1_HASH_MOD_FUNC: ac2e4d0c77d8381f0a27ee4cbe7e5510a815351b THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d4ce872e3d2f999c574b89727a9db5e999a4eef6 THREAD_SHA1_HASH_MOD: cbd6d858ece2492ed52a5625660f550734be73dc FOLLOWUP_IP: nt!MiStealPage+1e1 fffff800`52ae2245 440fb66622 movzx r12d,byte ptr [rsi+22h] FAULT_INSTR_CODE: 66b60f44 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiStealPage+1e1 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42 IMAGE_VERSION: 10.0.18362.239 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 1e1 FAILURE_BUCKET_ID: AV_nt!MiStealPage BUCKET_ID: AV_nt!MiStealPage PRIMARY_PROBLEM_CLASS: AV_nt!MiStealPage TARGET_TIME: 2019-07-22T09:26:15.000Z OSBUILD: 18362 OSSERVICEPACK: 239 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-02-02 11:33:06 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 4737 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_nt!mistealpage FAILURE_ID_HASH: {17576dda-297d-ae8d-ee16-7d36ac48a792} Followup: MachineOwner --------- FAST_ERESOURCE_PRECONDITION_VIOLATION (1c6) The current thread is performing an invalid call to a fast resource routine. Arguments: Arg1: 000000000000000f, The caller passed a fast resource to a legacy routine that supports fast resources, but the fast resource was not initialized with EX_FAST_RESOURCE_ENABLE_LEGACY_APIS. Arg2: ffffc188289a4cb0, Pointer to the resource. Arg3: 0000000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 9 Key : Analysis.Elapsed.Sec Value: 22 Key : Analysis.Memory.CommitPeak.Mb Value: 73 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7B84 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 2.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 4.00 BIOS_DATE: 12/20/2018 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B450M PRO-M2 V2 (MS-7B84) BASEBOARD_VERSION: 2.0 DUMP_TYPE: 2 BUGCHECK_P1: f BUGCHECK_P2: ffffc188289a4cb0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x1C6 PROCESS_NAME: schtasks.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D ANALYSIS_SESSION_TIME: 07-26-2019 14:17:30.0437 ANALYSIS_VERSION: 10.0.18914.1001 amd64fre LAST_CONTROL_TRANSFER: from fffff8050fafe31f to fffff8050fbbc900 STACK_TEXT: fffff107`3d24c188 fffff805`0fafe31f : 00000000`000001c6 00000000`0000000f ffffc188`289a4cb0 00000000`00000000 : nt!KeBugCheckEx fffff107`3d24c190 fffff805`11bd9968 : ffffc188`2dfc3748 00000000`00000000 ffffab0a`00000000 fffff107`3d24c1f0 : nt!ExIsResourceAcquiredExclusiveLite+0x6f fffff107`3d24c1d0 fffff805`0fa917d8 : fffff107`3d24c620 ffffab0a`5636a030 00000000`00000000 fffff107`3d24c620 : Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x1e8 fffff107`3d24c570 fffff805`1001dccc : 00000000`00000000 00000000`00000000 ffffab0a`5614ed60 fffff805`11bd9780 : nt!FsFilterPerformCallbacks+0xd8 fffff107`3d24c5d0 fffff805`1001d9c1 : 00000000`00336754 00000002`00008080 ffffc188`333b6e70 00000000`00000000 : nt!FsRtlAcquireFileExclusiveCommon+0x10c fffff107`3d24c8c0 fffff805`0fa915a9 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff107`3d24cb00 : nt!FsRtlAcquireFileExclusive+0x11 fffff107`3d24c8f0 fffff805`0ffdc3d2 : ffffab0a`591f1ab0 00000000`08000000 ffffc188`333b6e70 00000000`00000002 : nt!CcZeroEndOfLastPage+0x49 fffff107`3d24c940 fffff805`0ffdc110 : 0000005a`f7a7e990 00000000`000f0005 00000000`00000000 fffff9bf`fc5474e0 : nt!MiCreateSectionCommon+0x252 fffff107`3d24ca20 fffff805`0fbce118 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x60 fffff107`3d24ca90 00007ff8`abdbc9a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 0000005a`f7a7e938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`abdbc9a4 THREAD_SHA1_HASH_MOD_FUNC: bc05d70fdcb4cafc04b8e0400349987b5ffebe5b THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 71d585167d4976f63b12e7b97c4987bdd3f67836 THREAD_SHA1_HASH_MOD: f2b06249f80abeea5caef5dda430ced33dad5ec1 FOLLOWUP_IP: nt!ExIsResourceAcquiredExclusiveLite+6f fffff805`0fafe31f cc int 3 FAULT_INSTR_CODE: cccccccc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!ExIsResourceAcquiredExclusiveLite+6f FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42 IMAGE_VERSION: 10.0.18362.239 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 6f FAILURE_BUCKET_ID: 0x1C6_nt!ExIsResourceAcquiredExclusiveLite BUCKET_ID: 0x1C6_nt!ExIsResourceAcquiredExclusiveLite PRIMARY_PROBLEM_CLASS: 0x1C6_nt!ExIsResourceAcquiredExclusiveLite TARGET_TIME: 2019-07-22T08:31:54.000Z OSBUILD: 18362 OSSERVICEPACK: 239 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-02-02 11:33:06 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 56a6 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1c6_nt!exisresourceacquiredexclusivelite FAILURE_ID_HASH: {cd7154ab-ddce-4ffc-05fb-4408c0625f12} Followup: MachineOwner ---------
Şimdi ben BIOS güncellerken mavi ekran verir mi? O zaman anakart zarar görür ondan korkuyorum bilgilendirir misiniz?Sistemin hem ekran kartı hem de RAM'i sorunlu gibi. Bu PC'yi nereden aldınız? Sapphire ekran kartı kesinlikle tavsiye etmiyorum!
BIOS'u güncelleyin, BIOS sürümünüz eski:
Sonrasında RAM testi yapın:
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Kod:DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff80378d6e350, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 9 Key : Analysis.Elapsed.Sec Value: 19 Key : Analysis.Memory.CommitPeak.Mb Value: 68 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7B84 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 2.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 4.00 BIOS_DATE: 12/20/2018 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B450M PRO-M2 V2 (MS-7B84) BASEBOARD_VERSION: 2.0 DUMP_TYPE: 2 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff80378d6e350 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x133 PROCESS_NAME: ctfmon.exe CURRENT_IRQL: d ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D ANALYSIS_SESSION_TIME: 07-26-2019 14:17:33.0313 ANALYSIS_VERSION: 10.0.18914.1001 amd64fre LAST_CONTROL_TRANSFER: from fffff803789ebdb3 to fffff803789bc900 STACK_TEXT: ffffd100`0f598af8 fffff803`789ebdb3 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`78d6e350 : nt!KeBugCheckEx ffffd100`0f598b00 fffff803`7881f16f : 00000074`67f88624 ffffd100`0f540180 00000000`00000286 00000000`00002182 : nt!KeAccumulateTicks+0x1c94f3 ffffd100`0f598b60 fffff803`792b51e1 : 00000000`00000000 ffffe108`8caa1f00 ffff910b`1cd4f160 ffffe108`8caa1fb0 : nt!KeClockInterruptNotify+0xcf ffffd100`0f598f30 fffff803`78802e15 : ffffe108`8caa1f00 00000000`00000000 00000000`00000000 ffff1e4c`6de8b28c : hal!HalpTimerClockIpiRoutine+0x21 ffffd100`0f598f60 fffff803`789be36a : ffff910b`1cd4f160 ffffe108`8caa1f00 00000000`00000040 ffffe108`8caa1f00 : nt!KiCallInterruptServiceRoutine+0xa5 ffffd100`0f598fb0 fffff803`789be8b7 : 00000000`1d722351 ffff910b`1cd4f160 ffffe108`8caa1f00 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa ffff910b`1cd4f0e0 fffff803`78840dd4 : ffff8105`dc4b5880 ffff8105`dc0c3e20 ffffe108`9136c180 ffffe108`94c1dc28 : nt!KiInterruptDispatchNoLockNoEtw+0x37 ffff910b`1cd4f270 fffff803`788eefbd : ffffffff`ffffffff ffffe108`956b5000 ffff910b`1cd4f3d0 00000000`00000000 : nt!ExAcquireSpinLockExclusive+0xa4 ffff910b`1cd4f2a0 fffff803`78833f4a : ffffffff`ffffffff ffff910b`1cd4f3d0 ffffe108`956b5000 00000001`00000001 : nt!RtlpHpAcquireLockExclusive+0xd ffff910b`1cd4f2d0 fffff803`78832710 : ffffe108`8c402340 ffffe108`8c403100 ffffe108`8c4032c0 fffff803`00000190 : nt!RtlpHpLfhSlotAllocate+0xeda ffff910b`1cd4f430 fffff803`78b6a06d : 00000000`00000000 00000000`00000000 fffff803`656c6946 ffffe108`920078b0 : nt!ExAllocateHeapPool+0x2c0 ffff910b`1cd4f570 fffff803`78debb30 : ffffe108`8cbf1640 00000000`00000000 00000000`00000010 fffff803`00000000 : nt!ExAllocatePoolWithTag+0x5d ffff910b`1cd4f5c0 fffff803`78de7179 : ffffe108`0000004c ffffe108`8cbf1601 ffffe108`00000010 ffff910b`1cd4f688 : nt!ObpAllocateObject+0x1a0 ffff910b`1cd4f640 fffff803`78de8798 : fffff803`78de7e45 ffffe108`9113fd90 ffffe108`9112a8f0 ffff910b`00000001 : nt!IopAllocRealFileObject+0x119 ffff910b`1cd4f710 fffff803`78def29f : ffffe108`9112a8f0 ffffe108`9112a845 ffffe108`91e0ba20 00000000`00000001 : nt!IopParseDevice+0x968 ffff910b`1cd4f880 fffff803`78ded701 : ffffe108`91e0ba00 ffff910b`1cd4fac8 ffffac80`00000040 ffffe108`8cbf1640 : nt!ObpLookupObjectName+0x78f ffff910b`1cd4fa40 fffff803`78eaf234 : ffffbfbf`00000001 00000000`00000028 000001eb`197bf670 000000e7`eba7d080 : nt!ObOpenObjectByNameEx+0x201 ffff910b`1cd4fb80 fffff803`789ce118 : ffffe108`95947080 ffffe108`957e8be0 ffffe108`95947080 000000e7`eba7d080 : nt!NtQueryAttributesFile+0x1b4 ffff910b`1cd4fe40 00007ff8`8633c804 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000e7`eba7cef8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`8633c804 THREAD_SHA1_HASH_MOD_FUNC: d06cd42f757a9be451bb2961c6e9ce7ed687659e THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1055ccc12e3de9f1ef0a1a90a1706521f5ab813d THREAD_SHA1_HASH_MOD: 351d6799213c6635f947e528ad70424d64a900fd FOLLOWUP_IP: nt!KeAccumulateTicks+1c94f3 fffff803`789ebdb3 cc int 3 FAULT_INSTR_CODE: ab3944cc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KeAccumulateTicks+1c94f3 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42 IMAGE_VERSION: 10.0.18362.239 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 1c94f3 FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks PRIMARY_PROBLEM_CLASS: 0x133_ISR_nt!KeAccumulateTicks TARGET_TIME: 2019-07-21T19:25:23.000Z OSBUILD: 18362 OSSERVICEPACK: 239 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-02-02 11:33:06 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 4d7a ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x133_isr_nt!keaccumulateticks FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000023, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80052ae2245, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 12 Key : Analysis.Elapsed.Sec Value: 18 Key : Analysis.Memory.CommitPeak.Mb Value: 65 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 23 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80052ae2245 READ_ADDRESS: fffff80052f6e3b0: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000023 CURRENT_IRQL: 2 FAULTING_IP: nt!MiStealPage+1e1 fffff800`52ae2245 440fb66622 movzx r12d,byte ptr [rsi+22h] CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXNTFS: 1 (!blackboxntfs) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D ANALYSIS_SESSION_TIME: 07-26-2019 14:17:35.0938 ANALYSIS_VERSION: 10.0.18914.1001 amd64fre TRAP_FRAME: ffffc08ea731d880 -- (.trap 0xffffc08ea731d880) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffc08ea731df40 rbx=0000000000000000 rcx=0000000000000001 rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80052ae2245 rsp=ffffc08ea731da10 rbp=ffffc08ea731db10 r8=0000000000000002 r9=0000000000000001 r10=0000000000000008 r11=ffff9dcec0000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc nt!MiStealPage+0x1e1: fffff800`52ae2245 440fb66622 movzx r12d,byte ptr [rsi+22h] ds:00000000`00000022=?? Resetting default scope LOCK_ADDRESS: fffff80052e5d6e0 -- (!locks fffff80052e5d6e0) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80052e5d6e0) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80052e5d6e0 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80052bce6e9 to fffff80052bbc900 STACK_TEXT: ffffc08e`a731d738 fffff800`52bce6e9 : 00000000`0000000a 00000000`00000023 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffc08e`a731d740 fffff800`52bcaa2b : ffff9dce`fe0014e8 00000000`00000000 ffffaf8c`f37e4000 fffff800`52a7b8c4 : nt!KiBugCheckDispatch+0x69 ffffc08e`a731d880 fffff800`52ae2245 : ffffc08e`a731db10 ffffc600`0c5da170 ffff9dfc`0029d160 00000000`00000000 : nt!KiPageFault+0x46b ffffc08e`a731da10 fffff800`52a896fe : ffffc600`0c5da170 ffffc600`0c5da170 00000000`00000000 ffffc08e`a731dda0 : nt!MiStealPage+0x1e1 ffffc08e`a731dcd0 fffff800`52a892b3 : ffffc08e`ffffffff fffff800`52a8ac2e 00200000`00000000 fffff800`00000001 : nt!MiTradePage+0x34e ffffc08e`a731dd80 fffff800`52a8a31a : 00000000`00000000 00000000`0041f35d 00000000`ffffffff 00000000`0041f35d : nt!MiClaimPhysicalRun+0xbb ffffc08e`a731de20 fffff800`53000022 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiFindContiguousPages+0x34a ffffc08e`a731dfd0 fffff800`52a55bef : fffff800`52e63900 ffff9dfc`002b17c8 fffff800`562f9000 ffffffff`ffffffff : nt!MiAllocateDriverPage+0x7e ffffc08e`a731e060 fffff800`530fc15d : ffff6c0a`66c5a81e 00000000`00000000 00000000`00000000 fffff800`530f74f4 : nt!MiLockCode+0x7af ffffc08e`a731e200 fffff800`530f9b94 : ffff9dfc`002b1700 ffff9dfc`002b1c08 00000000`00000000 ffffd00d`eea6a060 : nt!MiDisablePagingOfDriver+0x71 ffffc08e`a731e250 fffff800`530f92d7 : 00000000`00000000 00000000`00000000 ffffaf8c`f8087c00 00000000`00000000 : nt!MiHandleDriverNonPagedSections+0x64 ffffc08e`a731e2c0 fffff800`53108ea6 : ffffc08e`a731e508 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmLoadSystemImageEx+0x47b ffffc08e`a731e470 fffff800`53108988 : ffffc08e`a731e5b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImage+0x26 ffffc08e`a731e4b0 fffff800`53127797 : 00000000`00000000 00000000`00000000 00000000`00000004 ffffc08e`00000004 : nt!IopLoadDriver+0x224 ffffc08e`a731e690 fffff800`530f1a56 : 00000000`00000001 00000000`00000000 ffffaf8c`f6b938d0 ffffffff`8000015c : nt!PipCallDriverAddDeviceQueryRoutine+0x1c3 ffffc08e`a731e730 fffff800`530f145d : 00000000`00000000 ffffc08e`a731e840 00000000`6e657050 00000000`00000012 : nt!PnpCallDriverQueryServiceHelper+0xda ffffc08e`a731e7e0 fffff800`530f0b11 : ffffaf8c`f6bb94e0 ffffc08e`a731ea18 ffffaf8c`f6bb94e0 00000000`00000000 : nt!PipCallDriverAddDevice+0x409 ffffc08e`a731e9a0 fffff800`5317cb88 : ffffaf8c`f6accf00 ffffc08e`a731eb01 ffffc08e`a731eab0 fffff800`00000000 : nt!PipProcessDevNodeTree+0x1b9 ffffc08e`a731ea60 fffff800`52b5901e : 00000001`00000003 ffffaf8c`f6accf10 ffff8d81`00000000 ffffaf8c`f6accf10 : nt!PiProcessStartSystemDevices+0x60 ffffc08e`a731eab0 fffff800`52ac4855 : ffffaf8c`f8177080 ffffaf8c`f3667ae0 fffff800`52e5bf80 ffffaf8c`f3667ae0 : nt!PnpDeviceActionWorker+0x45e ffffc08e`a731eb70 fffff800`52b2f725 : ffffaf8c`f8177080 00000000`00000080 ffffaf8c`f36a7040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105 ffffc08e`a731ec10 fffff800`52bc3e6a : ffff8d81`0df22180 ffffaf8c`f8177080 fffff800`52b2f6d0 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffffc08e`a731ec60 00000000`00000000 : ffffc08e`a731f000 ffffc08e`a7319000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a THREAD_SHA1_HASH_MOD_FUNC: ac2e4d0c77d8381f0a27ee4cbe7e5510a815351b THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d4ce872e3d2f999c574b89727a9db5e999a4eef6 THREAD_SHA1_HASH_MOD: cbd6d858ece2492ed52a5625660f550734be73dc FOLLOWUP_IP: nt!MiStealPage+1e1 fffff800`52ae2245 440fb66622 movzx r12d,byte ptr [rsi+22h] FAULT_INSTR_CODE: 66b60f44 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiStealPage+1e1 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42 IMAGE_VERSION: 10.0.18362.239 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 1e1 FAILURE_BUCKET_ID: AV_nt!MiStealPage BUCKET_ID: AV_nt!MiStealPage PRIMARY_PROBLEM_CLASS: AV_nt!MiStealPage TARGET_TIME: 2019-07-22T09:26:15.000Z OSBUILD: 18362 OSSERVICEPACK: 239 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-02-02 11:33:06 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 4737 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_nt!mistealpage FAILURE_ID_HASH: {17576dda-297d-ae8d-ee16-7d36ac48a792} Followup: MachineOwner --------- FAST_ERESOURCE_PRECONDITION_VIOLATION (1c6) The current thread is performing an invalid call to a fast resource routine. Arguments: Arg1: 000000000000000f, The caller passed a fast resource to a legacy routine that supports fast resources, but the fast resource was not initialized with EX_FAST_RESOURCE_ENABLE_LEGACY_APIS. Arg2: ffffc188289a4cb0, Pointer to the resource. Arg3: 0000000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 9 Key : Analysis.Elapsed.Sec Value: 22 Key : Analysis.Memory.CommitPeak.Mb Value: 73 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd. SYSTEM_PRODUCT_NAME: MS-7B84 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 2.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 4.00 BIOS_DATE: 12/20/2018 BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd. BASEBOARD_PRODUCT: B450M PRO-M2 V2 (MS-7B84) BASEBOARD_VERSION: 2.0 DUMP_TYPE: 2 BUGCHECK_P1: f BUGCHECK_P2: ffffc188289a4cb0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x1C6 PROCESS_NAME: schtasks.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D ANALYSIS_SESSION_TIME: 07-26-2019 14:17:30.0437 ANALYSIS_VERSION: 10.0.18914.1001 amd64fre LAST_CONTROL_TRANSFER: from fffff8050fafe31f to fffff8050fbbc900 STACK_TEXT: fffff107`3d24c188 fffff805`0fafe31f : 00000000`000001c6 00000000`0000000f ffffc188`289a4cb0 00000000`00000000 : nt!KeBugCheckEx fffff107`3d24c190 fffff805`11bd9968 : ffffc188`2dfc3748 00000000`00000000 ffffab0a`00000000 fffff107`3d24c1f0 : nt!ExIsResourceAcquiredExclusiveLite+0x6f fffff107`3d24c1d0 fffff805`0fa917d8 : fffff107`3d24c620 ffffab0a`5636a030 00000000`00000000 fffff107`3d24c620 : Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x1e8 fffff107`3d24c570 fffff805`1001dccc : 00000000`00000000 00000000`00000000 ffffab0a`5614ed60 fffff805`11bd9780 : nt!FsFilterPerformCallbacks+0xd8 fffff107`3d24c5d0 fffff805`1001d9c1 : 00000000`00336754 00000002`00008080 ffffc188`333b6e70 00000000`00000000 : nt!FsRtlAcquireFileExclusiveCommon+0x10c fffff107`3d24c8c0 fffff805`0fa915a9 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff107`3d24cb00 : nt!FsRtlAcquireFileExclusive+0x11 fffff107`3d24c8f0 fffff805`0ffdc3d2 : ffffab0a`591f1ab0 00000000`08000000 ffffc188`333b6e70 00000000`00000002 : nt!CcZeroEndOfLastPage+0x49 fffff107`3d24c940 fffff805`0ffdc110 : 0000005a`f7a7e990 00000000`000f0005 00000000`00000000 fffff9bf`fc5474e0 : nt!MiCreateSectionCommon+0x252 fffff107`3d24ca20 fffff805`0fbce118 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x60 fffff107`3d24ca90 00007ff8`abdbc9a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 0000005a`f7a7e938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`abdbc9a4 THREAD_SHA1_HASH_MOD_FUNC: bc05d70fdcb4cafc04b8e0400349987b5ffebe5b THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 71d585167d4976f63b12e7b97c4987bdd3f67836 THREAD_SHA1_HASH_MOD: f2b06249f80abeea5caef5dda430ced33dad5ec1 FOLLOWUP_IP: nt!ExIsResourceAcquiredExclusiveLite+6f fffff805`0fafe31f cc int 3 FAULT_INSTR_CODE: cccccccc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!ExIsResourceAcquiredExclusiveLite+6f FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42 IMAGE_VERSION: 10.0.18362.239 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 6f FAILURE_BUCKET_ID: 0x1C6_nt!ExIsResourceAcquiredExclusiveLite BUCKET_ID: 0x1C6_nt!ExIsResourceAcquiredExclusiveLite PRIMARY_PROBLEM_CLASS: 0x1C6_nt!ExIsResourceAcquiredExclusiveLite TARGET_TIME: 2019-07-22T08:31:54.000Z OSBUILD: 18362 OSSERVICEPACK: 239 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-02-02 11:33:06 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 56a6 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1c6_nt!exisresourceacquiredexclusivelite FAILURE_ID_HASH: {cd7154ab-ddce-4ffc-05fb-4408c0625f12} Followup: MachineOwner ---------
BIOS güncelleme esnasında çok az RAM kullanıldığından hata olma oranı çok düşüktür. Eğer dilersen BIOS güncelleme yapmadan da bellek testi yapabilirsin.
O ekranda kalması gerekmiyor. O ekranda bile kalıyorsa belleklerinde ciddi bir sorun var diyebilirim. RAM'leri iadeye gönder direk.
Peki gelince arıza verirse RAM'leri tek tek deneyip arıza vereni yollasam değiştirirler mi?O ekranda kalması gerekmiyor. O ekranda bile kalıyorsa belleklerinde ciddi bir sorun var diyebilirim. RAM'leri iadeye gönder direk.