Farklı kodlarda mavi ekran hataları

İşletim sistemi
Windows 10

Karaduman12

Femtopat
Katılım
18 Şubat 2021
Mesajlar
9
Daha fazla  
Cinsiyet
Erkek
Merhabalar. Bilgisayarımı günlük işler için kullanırken genellikle bir sorun ile karşılaşmıyorum. Ancak oyuna girdiğimde bazen kendiliğinden, bazen de hareket ettirdiğim an öncelikle görüntü titriyor, sonrasında da farklı farklı kodlar ile mavi ekran hataları alıyorum. Bu olay yaklaşık 6 aydır yaşanıyor, aklıma gelen her çözümü denedim. Format attım, sürücüleri temizledim ve tekrar kurdum. Yapamayınca tamire verdim, sorun tespit edemediler. Küçük bir şehirde yaşadığımdan dolayı gidebileceğim çok tamir dükkanı da yok. Dün de son bir deneme amaçlı her şeyi temizleyerek yeniden formatladım, ancak hatalar devam ediyor. Minidump klasörü silindiğinden dolayı sadece bugünkü hataları paylaşabiliyorum.

Zamanında Driver Booster kullanmıştım, belki ondan kaynaklanıyor olabilir diye düşündüm ancak ben bu işlerden pek anlamadığım için pek bir ilerleme kaydedemedim.

Görsele ekranın nasıl titrediğini gösterme amaçlı bir fotoğraf koydum, düşük görüntü kalitesi için özür dilerim. Umarım yeteri kadar bilgi verebilmişimdir, talep edildiği takdirde daha çok bilgi de paylaşabilirim. Şimdiden teşekkürler, saygılarımla.

Minidump Klasörü.
 

Dosya Ekleri

  • d90bee5f-4175-4d6d-9df9-8e788bdd1edb.jpg
    d90bee5f-4175-4d6d-9df9-8e788bdd1edb.jpg
    28,8 KB · Görüntüleme: 37
Ben sorunun GPU kaynaklı olduğunu düşünüyorum.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000036, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8061edfcd26, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6561

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 132462

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 36

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8061edfcd26

READ_ADDRESS: fffff8061f6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061f60f330: Unable to get Flags value from nt!KdVersionBlock
fffff8061f60f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000036

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MsMpEng.exe

TRAP_FRAME:  ffffd502fd61ea60 -- (.trap 0xffffd502fd61ea60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061edfcd26 rsp=ffffd502fd61ebf0 rbp=000fa4efb59bbfff
 r8=ffffb181f20ab180  r9=0000000000000000 r10=000000000000000e
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!SwapContext+0x246:
fffff806`1edfcd26 498b4e28        mov     rcx,qword ptr [r14+28h] ds:00000000`00000028=????????????????
Resetting default scope

STACK_TEXT: 
ffffd502`fd61e918 fffff806`1ee07a69     : 00000000`0000000a 00000000`00000036 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd502`fd61e920 fffff806`1ee03d69     : 00000000`00000000 00000000`00000005 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd502`fd61ea60 fffff806`1edfcd26     : 000fa4ef`b59bbfff fffff806`00000001 00000000`00000000 fffff806`233e1f71 : nt!KiPageFault+0x469
ffffd502`fd61ebf0 fffff806`1edfc806     : 7fffc30b`6fe8a9f0 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!SwapContext+0x246
ffffd502`fd61ec30 fffff806`1ec65850     : ffffd502`fffffffe ffffc30b`ffffffff ffffd502`00000000 00000000`f20ab180 : nt!KiSwapContext+0x76
ffffd502`fd61ed70 fffff806`1ec64d7f     : ffffc30b`00000001 ffffc30b`00000000 ffffd502`fd61ef30 00000000`00000000 : nt!KiSwapThread+0x500
ffffd502`fd61ee20 fffff806`1ec64623     : ffffd68d`00000075 ffffd502`00000000 ffffc30b`666b8000 ffffc30b`6d3f51c0 : nt!KiCommitThreadWait+0x14f
ffffd502`fd61eec0 fffff806`233dfa1a     : ffffd502`fd61f3d8 ffffd68d`00000000 ffffc30b`72bc8d00 00000000`00861000 : nt!KeWaitForSingleObject+0x233
ffffd502`fd61efb0 fffff806`233decff     : 00000000`00000001 ffffd502`fd61f4a0 ffffc30b`666c9180 ffffc30b`666c9180 : Ntfs!NtfsNonCachedIo+0x4ea
ffffd502`fd61f270 fffff806`233dcc2c     : ffffc30b`72bc8d78 ffffc30b`7109f010 ffffc30b`00000001 ffffc30b`00000001 : Ntfs!NtfsCommonRead+0x1e9f
ffffd502`fd61f470 fffff806`1ec52f55     : ffffc30b`727ec2c0 ffffc30b`7109f010 ffffc30b`7109f010 ffffc30b`66690da0 : Ntfs!NtfsFsdRead+0x1fc
ffffd502`fd61f540 fffff806`1d376ccf     : ffffd502`fd61fa00 fffff806`00000006 c30b7347`b9c004d0 00000000`00000000 : nt!IofCallDriver+0x55
ffffd502`fd61f580 fffff806`1d3748d3     : ffffd502`fd61f610 ffffc30b`66690da0 00000000`00000001 ffffd68d`6d0e2b30 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffd502`fd61f5f0 fffff806`1ec52f55     : ffffc30b`7109f010 fffff806`1eced1b7 00000001`00000000 00000000`00000005 : FLTMGR!FltpDispatch+0xa3
ffffd502`fd61f650 fffff806`1ec80d77     : 00000000`00000005 ffffc30b`7109f010 ffffc30b`6fe8aa40 ffffc30b`6f79de60 : nt!IofCallDriver+0x55
ffffd502`fd61f690 fffff806`1ecb6f0a     : 00000000`00000001 ffffd502`fd61f920 ffffc30b`6fe8aa50 ffffc30b`6fe8aa10 : nt!IoPageReadEx+0x1d7
ffffd502`fd61f700 fffff806`1ecb4a0d     : 00000000`00000002 ffffd502`fd61f7e0 ffffd502`fd61f958 fffff806`1ecb4eb0 : nt!MiIssueHardFaultIo+0xb6
ffffd502`fd61f750 fffff806`1ec0c9c8     : 00000000`c0033333 00000000`00000001 00000199`b53864f8 ffffd68d`6d0e2b30 : nt!MiIssueHardFault+0x29d
ffffd502`fd61f860 fffff806`1ee03c5e     : 00000008`00000000 00000008`00000001 00000008`9ce7b840 ffffd502`fd61fa80 : nt!MmAccessFault+0x468
ffffd502`fd61fa00 00007ffc`2388a2cf     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000008`9ce7b730 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2388a2cf


SYMBOL_NAME:  nt!SwapContext+246

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  246

FAILURE_BUCKET_ID:  AV_nt!SwapContext

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {47b746a3-60bf-1f5a-5fa5-88903b6a3204}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000004c00, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000004c00, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4015

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 125811

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 4c00

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: 4c00

READ_ADDRESS: fffff8004a6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8004a60f330: Unable to get Flags value from nt!KdVersionBlock
fffff8004a60f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000004c00

PROCESS_NAME:  hng.exe

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DPC_STACK_BASE:  FFFFF48BC6057FB0

TRAP_FRAME:  fffff48bc60579a0 -- (.trap 0xfffff48bc60579a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe4848d3f6160
rdx=ffffe484918813c0 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000004c00 rsp=fffff48bc6057b30 rbp=fffff48bc6057bf9
 r8=000000001cb772a0  r9=0000000000000001 r10=fffff8004a631c48
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
00000000`00004c00 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00004c00 ??              ???

STACK_TEXT: 
fffff48b`c6057858 fffff800`49e07a69     : 00000000`0000000a 00000000`00004c00 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff48b`c6057860 fffff800`49e03d69     : 00000000`0000000f ffffd000`64165180 ffffe484`93325080 fffff800`49d36bbc : nt!KiBugCheckDispatch+0x69
fffff48b`c60579a0 00000000`00004c00     : fffff48b`c6057bf9 ffffe484`8d3f6130 ffffe484`8d3f6100 fffff800`49c434b0 : nt!KiPageFault+0x469
fffff48b`c6057b30 fffff48b`c6057bf9     : ffffe484`8d3f6130 ffffe484`8d3f6100 fffff800`49c434b0 ffffe484`8d3f6130 : 0x4c00
fffff48b`c6057b38 ffffe484`8d3f6130     : ffffe484`8d3f6100 fffff800`49c434b0 ffffe484`8d3f6130 fffff48b`c6057e60 : 0xfffff48b`c6057bf9
fffff48b`c6057b40 ffffe484`8d3f6100     : fffff800`49c434b0 ffffe484`8d3f6130 fffff48b`c6057e60 fffff48b`c6057bf9 : 0xffffe484`8d3f6130
fffff48b`c6057b48 fffff800`49c434b0     : ffffe484`8d3f6130 fffff48b`c6057e60 fffff48b`c6057bf9 fffff48b`c6057e00 : 0xffffe484`8d3f6100
fffff48b`c6057b50 fffff800`49c42fc5     : fffff48b`c6057c98 00000000`00000001 00000000`00000003 ffffe484`8d3f6148 : nt!KiExpireTimer2+0x150
fffff48b`c6057c60 fffff800`49c07184     : ffffd000`641df180 6a5cef58`00000000 00000000`00000008 00000000`00004ce3 : nt!KiTimer2Expiration+0x165
fffff48b`c6057d20 fffff800`49dfcac5     : 00000000`00000000 ffffd000`641df180 ffffe484`87103e60 00000000`8a9e2ee0 : nt!KiRetireDpcList+0x874
fffff48b`c6057fb0 fffff800`49dfc8b0     : 00000000`00000000 fffff800`49cec5ca 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff48b`ca4979c0 fffff800`49dfc165     : 00000000`8a9e2ee0 fffff800`49df7b11 00000000`07e8e2f0 00000000`00000001 : nt!KiDispatchInterruptContinue
fffff48b`ca4979f0 fffff800`49df7b11     : 00000000`07e8e2f0 00000000`00000001 00000000`00000001 ffffe484`00000000 : nt!KiDpcInterruptBypass+0x25
fffff48b`ca497a00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup:     MachineOwner
---------

Formatta sonra Driver Booster kullandınız mı? Kullandıysanız yeniden format atın ve sürücüleri Driver Booster gibi yazılımlarla değil, el ile kendiniz güncelleyin.

Ayrıca sisteminizin tam modelini bulamadım. Tam modelini belirtirseniz uygun BIOS güncellemesi varsa bulalım.
 
Son düzenleme:
Ben sorunun GPU kaynaklı olduğunu düşünüyorum.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000036, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8061edfcd26, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6561

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 132462

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 36

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8061edfcd26

READ_ADDRESS: fffff8061f6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061f60f330: Unable to get Flags value from nt!KdVersionBlock
fffff8061f60f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000036

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MsMpEng.exe

TRAP_FRAME:  ffffd502fd61ea60 -- (.trap 0xffffd502fd61ea60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061edfcd26 rsp=ffffd502fd61ebf0 rbp=000fa4efb59bbfff
r8=ffffb181f20ab180  r9=0000000000000000 r10=000000000000000e
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!SwapContext+0x246:
fffff806`1edfcd26 498b4e28        mov     rcx,qword ptr [r14+28h] ds:00000000`00000028=????????????????
Resetting default scope

STACK_TEXT:
ffffd502`fd61e918 fffff806`1ee07a69     : 00000000`0000000a 00000000`00000036 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd502`fd61e920 fffff806`1ee03d69     : 00000000`00000000 00000000`00000005 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd502`fd61ea60 fffff806`1edfcd26     : 000fa4ef`b59bbfff fffff806`00000001 00000000`00000000 fffff806`233e1f71 : nt!KiPageFault+0x469
ffffd502`fd61ebf0 fffff806`1edfc806     : 7fffc30b`6fe8a9f0 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!SwapContext+0x246
ffffd502`fd61ec30 fffff806`1ec65850     : ffffd502`fffffffe ffffc30b`ffffffff ffffd502`00000000 00000000`f20ab180 : nt!KiSwapContext+0x76
ffffd502`fd61ed70 fffff806`1ec64d7f     : ffffc30b`00000001 ffffc30b`00000000 ffffd502`fd61ef30 00000000`00000000 : nt!KiSwapThread+0x500
ffffd502`fd61ee20 fffff806`1ec64623     : ffffd68d`00000075 ffffd502`00000000 ffffc30b`666b8000 ffffc30b`6d3f51c0 : nt!KiCommitThreadWait+0x14f
ffffd502`fd61eec0 fffff806`233dfa1a     : ffffd502`fd61f3d8 ffffd68d`00000000 ffffc30b`72bc8d00 00000000`00861000 : nt!KeWaitForSingleObject+0x233
ffffd502`fd61efb0 fffff806`233decff     : 00000000`00000001 ffffd502`fd61f4a0 ffffc30b`666c9180 ffffc30b`666c9180 : Ntfs!NtfsNonCachedIo+0x4ea
ffffd502`fd61f270 fffff806`233dcc2c     : ffffc30b`72bc8d78 ffffc30b`7109f010 ffffc30b`00000001 ffffc30b`00000001 : Ntfs!NtfsCommonRead+0x1e9f
ffffd502`fd61f470 fffff806`1ec52f55     : ffffc30b`727ec2c0 ffffc30b`7109f010 ffffc30b`7109f010 ffffc30b`66690da0 : Ntfs!NtfsFsdRead+0x1fc
ffffd502`fd61f540 fffff806`1d376ccf     : ffffd502`fd61fa00 fffff806`00000006 c30b7347`b9c004d0 00000000`00000000 : nt!IofCallDriver+0x55
ffffd502`fd61f580 fffff806`1d3748d3     : ffffd502`fd61f610 ffffc30b`66690da0 00000000`00000001 ffffd68d`6d0e2b30 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffd502`fd61f5f0 fffff806`1ec52f55     : ffffc30b`7109f010 fffff806`1eced1b7 00000001`00000000 00000000`00000005 : FLTMGR!FltpDispatch+0xa3
ffffd502`fd61f650 fffff806`1ec80d77     : 00000000`00000005 ffffc30b`7109f010 ffffc30b`6fe8aa40 ffffc30b`6f79de60 : nt!IofCallDriver+0x55
ffffd502`fd61f690 fffff806`1ecb6f0a     : 00000000`00000001 ffffd502`fd61f920 ffffc30b`6fe8aa50 ffffc30b`6fe8aa10 : nt!IoPageReadEx+0x1d7
ffffd502`fd61f700 fffff806`1ecb4a0d     : 00000000`00000002 ffffd502`fd61f7e0 ffffd502`fd61f958 fffff806`1ecb4eb0 : nt!MiIssueHardFaultIo+0xb6
ffffd502`fd61f750 fffff806`1ec0c9c8     : 00000000`c0033333 00000000`00000001 00000199`b53864f8 ffffd68d`6d0e2b30 : nt!MiIssueHardFault+0x29d
ffffd502`fd61f860 fffff806`1ee03c5e     : 00000008`00000000 00000008`00000001 00000008`9ce7b840 ffffd502`fd61fa80 : nt!MmAccessFault+0x468
ffffd502`fd61fa00 00007ffc`2388a2cf     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000008`9ce7b730 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2388a2cf


SYMBOL_NAME:  nt!SwapContext+246

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  246

FAILURE_BUCKET_ID:  AV_nt!SwapContext

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {47b746a3-60bf-1f5a-5fa5-88903b6a3204}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000004c00, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000004c00, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4015

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 125811

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 4c00

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: 4c00

READ_ADDRESS: fffff8004a6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8004a60f330: Unable to get Flags value from nt!KdVersionBlock
fffff8004a60f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000004c00

PROCESS_NAME:  hng.exe

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DPC_STACK_BASE:  FFFFF48BC6057FB0

TRAP_FRAME:  fffff48bc60579a0 -- (.trap 0xfffff48bc60579a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe4848d3f6160
rdx=ffffe484918813c0 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000004c00 rsp=fffff48bc6057b30 rbp=fffff48bc6057bf9
r8=000000001cb772a0  r9=0000000000000001 r10=fffff8004a631c48
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
00000000`00004c00 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00004c00 ??              ???

STACK_TEXT:
fffff48b`c6057858 fffff800`49e07a69     : 00000000`0000000a 00000000`00004c00 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff48b`c6057860 fffff800`49e03d69     : 00000000`0000000f ffffd000`64165180 ffffe484`93325080 fffff800`49d36bbc : nt!KiBugCheckDispatch+0x69
fffff48b`c60579a0 00000000`00004c00     : fffff48b`c6057bf9 ffffe484`8d3f6130 ffffe484`8d3f6100 fffff800`49c434b0 : nt!KiPageFault+0x469
fffff48b`c6057b30 fffff48b`c6057bf9     : ffffe484`8d3f6130 ffffe484`8d3f6100 fffff800`49c434b0 ffffe484`8d3f6130 : 0x4c00
fffff48b`c6057b38 ffffe484`8d3f6130     : ffffe484`8d3f6100 fffff800`49c434b0 ffffe484`8d3f6130 fffff48b`c6057e60 : 0xfffff48b`c6057bf9
fffff48b`c6057b40 ffffe484`8d3f6100     : fffff800`49c434b0 ffffe484`8d3f6130 fffff48b`c6057e60 fffff48b`c6057bf9 : 0xffffe484`8d3f6130
fffff48b`c6057b48 fffff800`49c434b0     : ffffe484`8d3f6130 fffff48b`c6057e60 fffff48b`c6057bf9 fffff48b`c6057e00 : 0xffffe484`8d3f6100
fffff48b`c6057b50 fffff800`49c42fc5     : fffff48b`c6057c98 00000000`00000001 00000000`00000003 ffffe484`8d3f6148 : nt!KiExpireTimer2+0x150
fffff48b`c6057c60 fffff800`49c07184     : ffffd000`641df180 6a5cef58`00000000 00000000`00000008 00000000`00004ce3 : nt!KiTimer2Expiration+0x165
fffff48b`c6057d20 fffff800`49dfcac5     : 00000000`00000000 ffffd000`641df180 ffffe484`87103e60 00000000`8a9e2ee0 : nt!KiRetireDpcList+0x874
fffff48b`c6057fb0 fffff800`49dfc8b0     : 00000000`00000000 fffff800`49cec5ca 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff48b`ca4979c0 fffff800`49dfc165     : 00000000`8a9e2ee0 fffff800`49df7b11 00000000`07e8e2f0 00000000`00000001 : nt!KiDispatchInterruptContinue
fffff48b`ca4979f0 fffff800`49df7b11     : 00000000`07e8e2f0 00000000`00000001 00000000`00000001 ffffe484`00000000 : nt!KiDpcInterruptBypass+0x25
fffff48b`ca497a00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup:     MachineOwner
---------

Formatta sonra Driver Booster kullandınız mı? Kullandıysanız yeniden format atın ve sürücüleri Driver Booster gibi yazılımlarla değil, el ile kendiniz güncelleyin.

Ayrıca sisteminizin tam modelini bulamadım. Tam modelini belirtirseniz uygun BIOS güncellemesi varsa bulalım.
Hayır, formattan sonra hiç Driver Booster kullanmadım. Sistemin tam modeli
Ben sorunun GPU kaynaklı olduğunu düşünüyorum.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000036, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8061edfcd26, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6561

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 132462

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 36

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8061edfcd26

READ_ADDRESS: fffff8061f6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061f60f330: Unable to get Flags value from nt!KdVersionBlock
fffff8061f60f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000036

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MsMpEng.exe

TRAP_FRAME:  ffffd502fd61ea60 -- (.trap 0xffffd502fd61ea60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061edfcd26 rsp=ffffd502fd61ebf0 rbp=000fa4efb59bbfff
r8=ffffb181f20ab180  r9=0000000000000000 r10=000000000000000e
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!SwapContext+0x246:
fffff806`1edfcd26 498b4e28        mov     rcx,qword ptr [r14+28h] ds:00000000`00000028=????????????????
Resetting default scope

STACK_TEXT:
ffffd502`fd61e918 fffff806`1ee07a69     : 00000000`0000000a 00000000`00000036 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd502`fd61e920 fffff806`1ee03d69     : 00000000`00000000 00000000`00000005 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd502`fd61ea60 fffff806`1edfcd26     : 000fa4ef`b59bbfff fffff806`00000001 00000000`00000000 fffff806`233e1f71 : nt!KiPageFault+0x469
ffffd502`fd61ebf0 fffff806`1edfc806     : 7fffc30b`6fe8a9f0 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!SwapContext+0x246
ffffd502`fd61ec30 fffff806`1ec65850     : ffffd502`fffffffe ffffc30b`ffffffff ffffd502`00000000 00000000`f20ab180 : nt!KiSwapContext+0x76
ffffd502`fd61ed70 fffff806`1ec64d7f     : ffffc30b`00000001 ffffc30b`00000000 ffffd502`fd61ef30 00000000`00000000 : nt!KiSwapThread+0x500
ffffd502`fd61ee20 fffff806`1ec64623     : ffffd68d`00000075 ffffd502`00000000 ffffc30b`666b8000 ffffc30b`6d3f51c0 : nt!KiCommitThreadWait+0x14f
ffffd502`fd61eec0 fffff806`233dfa1a     : ffffd502`fd61f3d8 ffffd68d`00000000 ffffc30b`72bc8d00 00000000`00861000 : nt!KeWaitForSingleObject+0x233
ffffd502`fd61efb0 fffff806`233decff     : 00000000`00000001 ffffd502`fd61f4a0 ffffc30b`666c9180 ffffc30b`666c9180 : Ntfs!NtfsNonCachedIo+0x4ea
ffffd502`fd61f270 fffff806`233dcc2c     : ffffc30b`72bc8d78 ffffc30b`7109f010 ffffc30b`00000001 ffffc30b`00000001 : Ntfs!NtfsCommonRead+0x1e9f
ffffd502`fd61f470 fffff806`1ec52f55     : ffffc30b`727ec2c0 ffffc30b`7109f010 ffffc30b`7109f010 ffffc30b`66690da0 : Ntfs!NtfsFsdRead+0x1fc
ffffd502`fd61f540 fffff806`1d376ccf     : ffffd502`fd61fa00 fffff806`00000006 c30b7347`b9c004d0 00000000`00000000 : nt!IofCallDriver+0x55
ffffd502`fd61f580 fffff806`1d3748d3     : ffffd502`fd61f610 ffffc30b`66690da0 00000000`00000001 ffffd68d`6d0e2b30 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffd502`fd61f5f0 fffff806`1ec52f55     : ffffc30b`7109f010 fffff806`1eced1b7 00000001`00000000 00000000`00000005 : FLTMGR!FltpDispatch+0xa3
ffffd502`fd61f650 fffff806`1ec80d77     : 00000000`00000005 ffffc30b`7109f010 ffffc30b`6fe8aa40 ffffc30b`6f79de60 : nt!IofCallDriver+0x55
ffffd502`fd61f690 fffff806`1ecb6f0a     : 00000000`00000001 ffffd502`fd61f920 ffffc30b`6fe8aa50 ffffc30b`6fe8aa10 : nt!IoPageReadEx+0x1d7
ffffd502`fd61f700 fffff806`1ecb4a0d     : 00000000`00000002 ffffd502`fd61f7e0 ffffd502`fd61f958 fffff806`1ecb4eb0 : nt!MiIssueHardFaultIo+0xb6
ffffd502`fd61f750 fffff806`1ec0c9c8     : 00000000`c0033333 00000000`00000001 00000199`b53864f8 ffffd68d`6d0e2b30 : nt!MiIssueHardFault+0x29d
ffffd502`fd61f860 fffff806`1ee03c5e     : 00000008`00000000 00000008`00000001 00000008`9ce7b840 ffffd502`fd61fa80 : nt!MmAccessFault+0x468
ffffd502`fd61fa00 00007ffc`2388a2cf     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000008`9ce7b730 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2388a2cf


SYMBOL_NAME:  nt!SwapContext+246

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  246

FAILURE_BUCKET_ID:  AV_nt!SwapContext

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {47b746a3-60bf-1f5a-5fa5-88903b6a3204}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000004c00, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000004c00, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4015

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 125811

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 4c00

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: 4c00

READ_ADDRESS: fffff8004a6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8004a60f330: Unable to get Flags value from nt!KdVersionBlock
fffff8004a60f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000004c00

PROCESS_NAME:  hng.exe

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DPC_STACK_BASE:  FFFFF48BC6057FB0

TRAP_FRAME:  fffff48bc60579a0 -- (.trap 0xfffff48bc60579a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe4848d3f6160
rdx=ffffe484918813c0 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000004c00 rsp=fffff48bc6057b30 rbp=fffff48bc6057bf9
r8=000000001cb772a0  r9=0000000000000001 r10=fffff8004a631c48
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
00000000`00004c00 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00004c00 ??              ???

STACK_TEXT:
fffff48b`c6057858 fffff800`49e07a69     : 00000000`0000000a 00000000`00004c00 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff48b`c6057860 fffff800`49e03d69     : 00000000`0000000f ffffd000`64165180 ffffe484`93325080 fffff800`49d36bbc : nt!KiBugCheckDispatch+0x69
fffff48b`c60579a0 00000000`00004c00     : fffff48b`c6057bf9 ffffe484`8d3f6130 ffffe484`8d3f6100 fffff800`49c434b0 : nt!KiPageFault+0x469
fffff48b`c6057b30 fffff48b`c6057bf9     : ffffe484`8d3f6130 ffffe484`8d3f6100 fffff800`49c434b0 ffffe484`8d3f6130 : 0x4c00
fffff48b`c6057b38 ffffe484`8d3f6130     : ffffe484`8d3f6100 fffff800`49c434b0 ffffe484`8d3f6130 fffff48b`c6057e60 : 0xfffff48b`c6057bf9
fffff48b`c6057b40 ffffe484`8d3f6100     : fffff800`49c434b0 ffffe484`8d3f6130 fffff48b`c6057e60 fffff48b`c6057bf9 : 0xffffe484`8d3f6130
fffff48b`c6057b48 fffff800`49c434b0     : ffffe484`8d3f6130 fffff48b`c6057e60 fffff48b`c6057bf9 fffff48b`c6057e00 : 0xffffe484`8d3f6100
fffff48b`c6057b50 fffff800`49c42fc5     : fffff48b`c6057c98 00000000`00000001 00000000`00000003 ffffe484`8d3f6148 : nt!KiExpireTimer2+0x150
fffff48b`c6057c60 fffff800`49c07184     : ffffd000`641df180 6a5cef58`00000000 00000000`00000008 00000000`00004ce3 : nt!KiTimer2Expiration+0x165
fffff48b`c6057d20 fffff800`49dfcac5     : 00000000`00000000 ffffd000`641df180 ffffe484`87103e60 00000000`8a9e2ee0 : nt!KiRetireDpcList+0x874
fffff48b`c6057fb0 fffff800`49dfc8b0     : 00000000`00000000 fffff800`49cec5ca 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff48b`ca4979c0 fffff800`49dfc165     : 00000000`8a9e2ee0 fffff800`49df7b11 00000000`07e8e2f0 00000000`00000001 : nt!KiDispatchInterruptContinue
fffff48b`ca4979f0 fffff800`49df7b11     : 00000000`07e8e2f0 00000000`00000001 00000000`00000001 ffffe484`00000000 : nt!KiDpcInterruptBypass+0x25
fffff48b`ca497a00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup:     MachineOwner
---------

Formatta sonra Driver Booster kullandınız mı? Kullandıysanız yeniden format atın ve sürücüleri Driver Booster gibi yazılımlarla değil, el ile kendiniz güncelleyin.

Ayrıca sisteminizin tam modelini bulamadım. Tam modelini belirtirseniz uygun BIOS güncellemesi varsa bulalım.
Hayır, formattan sonra hiç Driver Booster veya türevleri bir program kullanmadım.

Sistemin tam modeli bildiğim kadarıyla şu:

HP Pavilion 15-an001na Core i5-6200U 6GB 1TB GTX 940M​


Test programları ile test ettiğimde hiçbir sorun çıkmıyor ancak oyun oynarken oluyor. GPU'da olsa normalde de sorun yaratması gerekmez miydi? Yanlış anlamayın, bilmediğimden soruyorum. Çok teşekkür ederim.
 
BIOS'unuz güncelmiş. Driver Booster kullanmadıysanız format atmanıza gerek yok.

Sentetik testlerde sorun olmayıp günlük kullanımda sorun çıktığı durumlar da olabiliyor. GPU kaynaklı olmasını düşünmemin en güçlü sebebi de paylaştığınız fotoğraf.
 
BIOS'unuz güncelmiş. Driver Booster kullanmadıysanız format atmanıza gerek yok.

Sentetik testlerde sorun olmayıp günlük kullanımda sorun çıktığı durumlar da olabiliyor. GPU kaynaklı olmasını düşünmemin en güçlü sebebi de paylaştığınız fotoğraf.

Peki ne yapmam gerekir? Bu sorunu nasıl çözerim? Minidump klasörünü güncelliyorum, bunu paylaştıktan sonra bir hata daha aldım çünkü.

Minidump
 
Son düzenleme:

Yeni konular

Geri
Yukarı