Çözüldü Farklı mavi ekran hataları alıyorum

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10
Çözüm
  1. Bluestacks uygulamasını kaldırın.
  2. Riot Vanguard'ı kaldırın.
  3. Z390 D | Anakart | GIGABYTE Anakartınızı doğrulayıp attığım ürün olduğuna emin olduktan sonra F3c sürümünden F3g sürümüne yükseltin.
  4. Chiptset sürücünüzü indirip güncelleyin.
  5. Intel Serial I/O driver'ı indirip kurun.
  6. Intel Management Engine Firmware'ı kurun.


    Kod:
    Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.22350\102620-7750-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response Time (ms) Location
    Deferred srv*
    Symbol search path is: srv*
    Executable search path is:
    Windows 10 Kernel Version 19041 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
    Machine Name:
    Kernel base = 0xfffff807`1d800000 PsLoadedModuleList = 0xfffff807`1e42a310
    Debug session time: Mon Oct 26 21:03:00.410 2020 (UTC + 3:00)
    System Uptime: 0 days 19:49:23.832
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    .
    Loading User Symbols
    Loading unloaded module list
    ..........
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff807`1dbf45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffad07`687df840=00000000000000ef
    0: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************
    
    CRITICAL_PROCESS_DIED (ef)
    A critical system process died
    Arguments:
    Arg1: ffff9c0256f54080, Process object or thread object
    Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
    Arg3: 0000000000000000
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    Key : Analysis.CPU.mSec
    Value: 4936
    
    Key : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25
    
    Key : Analysis.DebugData
    Value: CreateObject
    
    Key : Analysis.DebugModel
    Value: CreateObject
    
    Key : Analysis.Elapsed.mSec
    Value: 8053
    
    Key : Analysis.Memory.CommitPeak.Mb
    Value: 78
    
    Key : Analysis.System
    Value: CreateObject
    
    Key : WER.OS.Branch
    Value: vb_release
    
    Key : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    
    Key : WER.OS.Version
    Value: 10.0.19041.1
    
    
    ADDITIONAL_XML: 1
    
    OS_BUILD_LAYERS: 1
    
    BUGCHECK_CODE: ef
    
    BUGCHECK_P1: ffff9c0256f54080
    
    BUGCHECK_P2: 0
    
    BUGCHECK_P3: 0
    
    BUGCHECK_P4: 0
    
    PROCESS_NAME: svchost.exe
    
    CRITICAL_PROCESS: svchost.exe
    
    ERROR_CODE: (NTSTATUS) 0x39faa080 - <Unable to get error code text>
    
    CRITICAL_PROCESS_REPORTGUID: {c6459651-82b2-4317-8b01-9e01130e27b0}
    
    IMAGE_NAME: unknown
    
    MODULE_NAME: unknown
    
    FAULTING_MODULE: 0000000000000000
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    
    BLACKBOXWINLOGON: 1
    
    CUSTOMER_CRASH_COUNT: 1
    
    STACK_TEXT:
    ffffad07`687df838 fffff807`1e106fe2 : 00000000`000000ef ffff9c02`56f54080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
    ffffad07`687df840 fffff807`1dfd7d83 : 00000000`00000000 fffff807`1da60ea5 00000000`00000002 fffff807`1da60dcf : nt!PspCatchCriticalBreak+0x10e
    ffffad07`687df8e0 fffff807`1de4a9b0 : ffff9c02`00000000 00000000`00000000 ffff9c02`56f54080 ffff9c02`56f544b8 : nt!PspTerminateAllThreads+0x1ee377
    ffffad07`687df950 fffff807`1de4a7ac : ffff9c02`56e16080 00000000`00000000 00007ffd`4a0afd08 00000000`00001764 : nt!PspTerminateProcess+0xe0
    ffffad07`687df990 fffff807`1dc05fb5 : ffff9c02`56f54080 ffff9c02`39faa080 ffffad07`687dfa80 ffff9c02`00000000 : nt!NtTerminateProcess+0x9c
    ffffad07`687dfa00 00007ffd`5856c314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
    00000011`4d57f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`5856c314
    
    
    STACK_COMMAND: .thread ; .cxr ; kb
    
    FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_39faa080_unknown!_IMAGE_unknown
    
    OS_VERSION: 10.0.19041.1
    
    BUILDLAB_STR: vb_release
    
    OSPLATFORM_TYPE: x64
    
    OSNAME: Windows 10
    
    FAILURE_ID_HASH: {a8d9167c-8ee7-8e66-77dc-3f4e8cfbd536}
    
    Followup: MachineOwner
    ---------
    
    
    [*]
    Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.19252\102620-10234-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response Time (ms) Location
    Deferred srv*
    Symbol search path is: srv*
    Executable search path is:
    Windows 10 Kernel Version 19041 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
    Machine Name:
    Kernel base = 0xfffff800`41200000 PsLoadedModuleList = 0xfffff800`41e2a310
    Debug session time: Mon Oct 26 01:13:07.129 2020 (UTC + 3:00)
    System Uptime: 2 days 8:15:58.105
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    .
    Loading User Symbols
    Loading unloaded module list
    ..........................
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff800`415f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaa04`952a0620=000000000000003b
    1: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff8004569965f, Address of the instruction which caused the bugcheck
    Arg3: ffffaa04952a0f20, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    Key : Analysis.CPU.mSec
    Value: 5983
    
    Key : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25
    
    Key : Analysis.DebugData
    Value: CreateObject
    
    Key : Analysis.DebugModel
    Value: CreateObject
    
    Key : Analysis.Elapsed.mSec
    Value: 14420
    
    Key : Analysis.Memory.CommitPeak.Mb
    Value: 77
    
    Key : Analysis.System
    Value: CreateObject
    
    Key : WER.OS.Branch
    Value: vb_release
    
    Key : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    
    Key : WER.OS.Version
    Value: 10.0.19041.1
    
    
    ADDITIONAL_XML: 1
    
    OS_BUILD_LAYERS: 1
    
    BUGCHECK_CODE: 3b
    
    BUGCHECK_P1: c0000005
    
    BUGCHECK_P2: fffff8004569965f
    
    BUGCHECK_P3: ffffaa04952a0f20
    
    BUGCHECK_P4: 0
    
    CONTEXT: ffffaa04952a0f20 -- (.cxr 0xffffaa04952a0f20)
    rax=ffffaa04952a1920 rbx=0000000000000000 rcx=00000000000001f9
    rdx=0000000000000008 rsi=0000000000000000 rdi=ffffab00d4fc6990
    rip=fffff8004569965f rsp=ffffaa04952a1920 rbp=ffffaa04952a19e9
    r8=ffffab00dcbf40b2 r9=0000000000000002 r10=00000000ffffffff
    r11=000000000000005a r12=ffffce07be26cd80 r13=ffffce07c0df9570
    r14=ffffab00d4fe2950 r15=ffffce07c0df94a0
    iopl=0 nv up ei ng nz na po nc
    cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
    mountmgr!MountMgrQueryDosVolumePath+0x48f:
    fffff800`4569965f 48d1e8 shr rax,1
    Resetting default scope
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    BLACKBOXWINLOGON: 1
    
    CUSTOMER_CRASH_COUNT: 1
    
    PROCESS_NAME: nvcontainer.exe
    
    STACK_TEXT:
    ffffaa04`952a1920 fffff800`456990c3 : ffffce07`a17241f0 ffffce07`c0df94a0 00000000`00000000 ffffab00`d4fc6990 : mountmgr!MountMgrQueryDosVolumePath+0x48f
    ffffaa04`952a1a50 fffff800`414cd805 : ffffaa04`952a1bf0 ffffab00`e536a0f0 ffffab00`dcbf4b50 ffffaa04`952a1b48 : mountmgr!MountMgrDeviceControl+0xb3
    ffffaa04`952a1ab0 fffff800`418a99f2 : 00000000`00000010 ffffaa04`952a1bf0 ffffab00`e536a0f0 00000000`00000000 : nt!IofCallDriver+0x55
    ffffaa04`952a1af0 fffff800`418a9217 : ce07c2d1`c310fffe 00000000`000000c0 ffffab00`e536a0f0 ffffab00`e536a0f0 : nt!IoVolumeDeviceToDosName+0x232
    ffffaa04`952a1dc0 fffff800`418a912e : ffffce07`c44b3190 ffffce07`00000000 ffffaa04`952a1f01 ffffab00`e536a0f0 : nt!IopQueryNameInternal+0xa3
    ffffaa04`952a1e70 fffff800`418aa608 : ffffce07`c44b3190 ffffaa04`952a2a80 00000000`000000d0 00000280`d6a61110 : nt!IoQueryFileDosDeviceName+0x5e
    ffffaa04`952a1ec0 fffff800`41605fb5 : 00000000`00000001 00000000`00000002 00000000`00000000 00000280`d6d61c4c : nt!NtQueryInformationProcess+0x968
    ffffaa04`952a2990 00007ffc`8950c0b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
    000000f8`847ff1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`8950c0b4
    
    
    SYMBOL_NAME: mountmgr!MountMgrQueryDosVolumePath+48f
    
    MODULE_NAME: mountmgr
    
    IMAGE_NAME: mountmgr.sys
    
    IMAGE_VERSION: 10.0.19041.1030
    
    STACK_COMMAND: .cxr 0xffffaa04952a0f20 ; kb
    
    BUCKET_ID_FUNC_OFFSET: 48f
    
    FAILURE_BUCKET_ID: 0x3B_c0000005_mountmgr!MountMgrQueryDosVolumePath
    
    OS_VERSION: 10.0.19041.1
    
    BUILDLAB_STR: vb_release
    
    OSPLATFORM_TYPE: x64
    
    OSNAME: Windows 10
    
    FAILURE_ID_HASH: {80080096-09f3-1592-4db4-e3e98f2b9ae8}
    
    Followup: MachineOwner
    ---------
    [*]
  1. Bluestacks uygulamasını kaldırın.
  2. Riot Vanguard'ı kaldırın.
  3. Z390 D | Anakart | GIGABYTE Anakartınızı doğrulayıp attığım ürün olduğuna emin olduktan sonra F3c sürümünden F3g sürümüne yükseltin.
  4. Chiptset sürücünüzü indirip güncelleyin.
  5. Intel Serial I/O driver'ı indirip kurun.
  6. Intel Management Engine Firmware'ı kurun.


    Kod:
    Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.22350\102620-7750-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response Time (ms) Location
    Deferred srv*
    Symbol search path is: srv*
    Executable search path is:
    Windows 10 Kernel Version 19041 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
    Machine Name:
    Kernel base = 0xfffff807`1d800000 PsLoadedModuleList = 0xfffff807`1e42a310
    Debug session time: Mon Oct 26 21:03:00.410 2020 (UTC + 3:00)
    System Uptime: 0 days 19:49:23.832
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    .
    Loading User Symbols
    Loading unloaded module list
    ..........
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff807`1dbf45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffad07`687df840=00000000000000ef
    0: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************
    
    CRITICAL_PROCESS_DIED (ef)
    A critical system process died
    Arguments:
    Arg1: ffff9c0256f54080, Process object or thread object
    Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
    Arg3: 0000000000000000
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    Key : Analysis.CPU.mSec
    Value: 4936
    
    Key : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25
    
    Key : Analysis.DebugData
    Value: CreateObject
    
    Key : Analysis.DebugModel
    Value: CreateObject
    
    Key : Analysis.Elapsed.mSec
    Value: 8053
    
    Key : Analysis.Memory.CommitPeak.Mb
    Value: 78
    
    Key : Analysis.System
    Value: CreateObject
    
    Key : WER.OS.Branch
    Value: vb_release
    
    Key : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    
    Key : WER.OS.Version
    Value: 10.0.19041.1
    
    
    ADDITIONAL_XML: 1
    
    OS_BUILD_LAYERS: 1
    
    BUGCHECK_CODE: ef
    
    BUGCHECK_P1: ffff9c0256f54080
    
    BUGCHECK_P2: 0
    
    BUGCHECK_P3: 0
    
    BUGCHECK_P4: 0
    
    PROCESS_NAME: svchost.exe
    
    CRITICAL_PROCESS: svchost.exe
    
    ERROR_CODE: (NTSTATUS) 0x39faa080 - <Unable to get error code text>
    
    CRITICAL_PROCESS_REPORTGUID: {c6459651-82b2-4317-8b01-9e01130e27b0}
    
    IMAGE_NAME: unknown
    
    MODULE_NAME: unknown
    
    FAULTING_MODULE: 0000000000000000
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    
    BLACKBOXWINLOGON: 1
    
    CUSTOMER_CRASH_COUNT: 1
    
    STACK_TEXT:
    ffffad07`687df838 fffff807`1e106fe2 : 00000000`000000ef ffff9c02`56f54080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
    ffffad07`687df840 fffff807`1dfd7d83 : 00000000`00000000 fffff807`1da60ea5 00000000`00000002 fffff807`1da60dcf : nt!PspCatchCriticalBreak+0x10e
    ffffad07`687df8e0 fffff807`1de4a9b0 : ffff9c02`00000000 00000000`00000000 ffff9c02`56f54080 ffff9c02`56f544b8 : nt!PspTerminateAllThreads+0x1ee377
    ffffad07`687df950 fffff807`1de4a7ac : ffff9c02`56e16080 00000000`00000000 00007ffd`4a0afd08 00000000`00001764 : nt!PspTerminateProcess+0xe0
    ffffad07`687df990 fffff807`1dc05fb5 : ffff9c02`56f54080 ffff9c02`39faa080 ffffad07`687dfa80 ffff9c02`00000000 : nt!NtTerminateProcess+0x9c
    ffffad07`687dfa00 00007ffd`5856c314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
    00000011`4d57f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`5856c314
    
    
    STACK_COMMAND: .thread ; .cxr ; kb
    
    FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_39faa080_unknown!_IMAGE_unknown
    
    OS_VERSION: 10.0.19041.1
    
    BUILDLAB_STR: vb_release
    
    OSPLATFORM_TYPE: x64
    
    OSNAME: Windows 10
    
    FAILURE_ID_HASH: {a8d9167c-8ee7-8e66-77dc-3f4e8cfbd536}
    
    Followup: MachineOwner
    ---------
    
    
    [*]
    Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.19252\102620-10234-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response Time (ms) Location
    Deferred srv*
    Symbol search path is: srv*
    Executable search path is:
    Windows 10 Kernel Version 19041 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
    Machine Name:
    Kernel base = 0xfffff800`41200000 PsLoadedModuleList = 0xfffff800`41e2a310
    Debug session time: Mon Oct 26 01:13:07.129 2020 (UTC + 3:00)
    System Uptime: 2 days 8:15:58.105
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    .
    Loading User Symbols
    Loading unloaded module list
    ..........................
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff800`415f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaa04`952a0620=000000000000003b
    1: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff8004569965f, Address of the instruction which caused the bugcheck
    Arg3: ffffaa04952a0f20, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    Key : Analysis.CPU.mSec
    Value: 5983
    
    Key : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25
    
    Key : Analysis.DebugData
    Value: CreateObject
    
    Key : Analysis.DebugModel
    Value: CreateObject
    
    Key : Analysis.Elapsed.mSec
    Value: 14420
    
    Key : Analysis.Memory.CommitPeak.Mb
    Value: 77
    
    Key : Analysis.System
    Value: CreateObject
    
    Key : WER.OS.Branch
    Value: vb_release
    
    Key : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    
    Key : WER.OS.Version
    Value: 10.0.19041.1
    
    
    ADDITIONAL_XML: 1
    
    OS_BUILD_LAYERS: 1
    
    BUGCHECK_CODE: 3b
    
    BUGCHECK_P1: c0000005
    
    BUGCHECK_P2: fffff8004569965f
    
    BUGCHECK_P3: ffffaa04952a0f20
    
    BUGCHECK_P4: 0
    
    CONTEXT: ffffaa04952a0f20 -- (.cxr 0xffffaa04952a0f20)
    rax=ffffaa04952a1920 rbx=0000000000000000 rcx=00000000000001f9
    rdx=0000000000000008 rsi=0000000000000000 rdi=ffffab00d4fc6990
    rip=fffff8004569965f rsp=ffffaa04952a1920 rbp=ffffaa04952a19e9
    r8=ffffab00dcbf40b2 r9=0000000000000002 r10=00000000ffffffff
    r11=000000000000005a r12=ffffce07be26cd80 r13=ffffce07c0df9570
    r14=ffffab00d4fe2950 r15=ffffce07c0df94a0
    iopl=0 nv up ei ng nz na po nc
    cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
    mountmgr!MountMgrQueryDosVolumePath+0x48f:
    fffff800`4569965f 48d1e8 shr rax,1
    Resetting default scope
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    BLACKBOXWINLOGON: 1
    
    CUSTOMER_CRASH_COUNT: 1
    
    PROCESS_NAME: nvcontainer.exe
    
    STACK_TEXT:
    ffffaa04`952a1920 fffff800`456990c3 : ffffce07`a17241f0 ffffce07`c0df94a0 00000000`00000000 ffffab00`d4fc6990 : mountmgr!MountMgrQueryDosVolumePath+0x48f
    ffffaa04`952a1a50 fffff800`414cd805 : ffffaa04`952a1bf0 ffffab00`e536a0f0 ffffab00`dcbf4b50 ffffaa04`952a1b48 : mountmgr!MountMgrDeviceControl+0xb3
    ffffaa04`952a1ab0 fffff800`418a99f2 : 00000000`00000010 ffffaa04`952a1bf0 ffffab00`e536a0f0 00000000`00000000 : nt!IofCallDriver+0x55
    ffffaa04`952a1af0 fffff800`418a9217 : ce07c2d1`c310fffe 00000000`000000c0 ffffab00`e536a0f0 ffffab00`e536a0f0 : nt!IoVolumeDeviceToDosName+0x232
    ffffaa04`952a1dc0 fffff800`418a912e : ffffce07`c44b3190 ffffce07`00000000 ffffaa04`952a1f01 ffffab00`e536a0f0 : nt!IopQueryNameInternal+0xa3
    ffffaa04`952a1e70 fffff800`418aa608 : ffffce07`c44b3190 ffffaa04`952a2a80 00000000`000000d0 00000280`d6a61110 : nt!IoQueryFileDosDeviceName+0x5e
    ffffaa04`952a1ec0 fffff800`41605fb5 : 00000000`00000001 00000000`00000002 00000000`00000000 00000280`d6d61c4c : nt!NtQueryInformationProcess+0x968
    ffffaa04`952a2990 00007ffc`8950c0b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
    000000f8`847ff1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`8950c0b4
    
    
    SYMBOL_NAME: mountmgr!MountMgrQueryDosVolumePath+48f
    
    MODULE_NAME: mountmgr
    
    IMAGE_NAME: mountmgr.sys
    
    IMAGE_VERSION: 10.0.19041.1030
    
    STACK_COMMAND: .cxr 0xffffaa04952a0f20 ; kb
    
    BUCKET_ID_FUNC_OFFSET: 48f
    
    FAILURE_BUCKET_ID: 0x3B_c0000005_mountmgr!MountMgrQueryDosVolumePath
    
    OS_VERSION: 10.0.19041.1
    
    BUILDLAB_STR: vb_release
    
    OSPLATFORM_TYPE: x64
    
    OSNAME: Windows 10
    
    FAILURE_ID_HASH: {80080096-09f3-1592-4db4-e3e98f2b9ae8}
    
    Followup: MachineOwner
    ---------
    [*]
 
Son düzenleme:
Çözüm
Anakart BİOS güncel değilse buradan indirebilirsiniz.

http://www.gigabyte.com.tr/products/page/mb/z390_d#support- dl

Bunu rehber olarak görebilirsiniz.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Memtest86 RAM testi yapar mısınız?

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


"sfc /scannow" rehberini uygulayın.


@ViooYa Hocamın dediklerini yapınız.
 
Son düzenleme:
  1. BlueStacks uygulamasını kaldırın.
  2. Riot Vanguard'ı kaldırın.
  3. Z390 D | Anakart | GIGABYTE anakartınızı doğrulayıp attığım ürün olduğuna emin olduktan sonra F3C sürümünden F3G sürümüne yükseltin.
  4. Chiptset sürücünüzü indirip güncelleyin.
  5. Intel Serial I/O driver'ı indirip kurun.
  6. Intel Management Engine Firmware'ı kurun.

    Kod:
    Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.22350\102620-7750-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available.
    
    ************* Path validation summary **************
    Response Time (ms) Location.
    Deferred srv*
    Symbol search path is: srv*
    Executable search path is:
    Windows 10 Kernel Version 19041 MP (8 procs) Free x64.
    Product: WinNt, suite: TerminalServer SingleUserTS.
    Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
    Machine Name:
    Kernel base = 0xfffff807`1d800000 PsLoadedModuleList = 0xfffff807`1e42a310.
    Debug session time: Mon Oct 26 21:03:00.410 2020 (UTC + 3:00)
    System Uptime: 0 days 19:49:23.832.
    Loading Kernel Symbols.
    ...............................................................
    ................................................................
    ................................................................
    .
    Loading User Symbols.
    Loading unloaded module list.
    ..........
    For analysis of this file, run !analyze -v.
    nt!KeBugCheckEx:
    fffff807`1dbf45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffad07`687df840=00000000000000ef.
    0: kd> !analyze -v.
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************
    
    CRITICAL_PROCESS_DIED (ef)
    A critical system process died.
    Arguments:
    Arg1: ffff9c0256f54080, Process object or thread object.
    Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
    Arg3: 0000000000000000.
    Arg4: 0000000000000000.
    
    Debugging Details:
    ------------------
    
    KEY_VALUES_STRING: 1.
    
    Key : Analysis.CPU.mSec.
    Value: 4936.
    
    Key : Analysis.DebugAnalysisProvider.CPP.
    Value: Create: 8007007e on DESKTOP-IPC9T25.
    
    Key : Analysis.DebugData.
    Value: CreateObject.
    
    Key : Analysis.DebugModel.
    Value: CreateObject.
    
    Key : Analysis.Elapsed.mSec.
    Value: 8053.
    
    Key : Analysis.Memory.CommitPeak.Mb.
    Value: 78.
    
    Key : Analysis.System.
    Value: CreateObject.
    
    Key : WER.OS.Branch.
    Value: vb_release.
    
    Key : WER.OS.Timestamp.
    Value: 2019-12-06T14:06:00Z.
    
    Key : WER.OS.Version.
    Value: 10.0.19041.1.
    
    ADDITIONAL_XML: 1.
    
    OS_BUILD_LAYERS: 1.
    
    BUGCHECK_CODE: ef.
    
    BUGCHECK_P1: ffff9c0256f54080.
    
    BUGCHECK_P2: 0.
    
    BUGCHECK_P3: 0.
    
    BUGCHECK_P4: 0.
    
    PROCESS_NAME: svchost.exe.
    
    CRITICAL_PROCESS: svchost.exe.
    
    ERROR_CODE: (NTSTATUS) 0x39faa080 - <Unable to get error code text>
    
    CRITICAL_PROCESS_REPORTGUID: {c6459651-82b2-4317-8b01-9e01130e27b0}
    
    IMAGE_NAME: unknown.
    
    MODULE_NAME: unknown.
    
    FAULTING_MODULE: 0000000000000000.
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    BLACKBOXWINLOGON: 1.
    
    CUSTOMER_CRASH_COUNT: 1.
    
    STACK_TEXT:
    ffffad07`687df838 fffff807`1e106fe2 : 00000000`000000ef ffff9c02`56f54080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx.
    ffffad07`687df840 fffff807`1dfd7d83 : 00000000`00000000 fffff807`1da60ea5 00000000`00000002 fffff807`1da60dcf : nt!PspCatchCriticalBreak+0x10e.
    ffffad07`687df8e0 fffff807`1de4a9b0 : ffff9c02`00000000 00000000`00000000 ffff9c02`56f54080 ffff9c02`56f544b8 : nt!PspTerminateAllThreads+0x1ee377.
    ffffad07`687df950 fffff807`1de4a7ac : ffff9c02`56e16080 00000000`00000000 00007ffd`4a0afd08 00000000`00001764 : nt!PspTerminateProcess+0xe0.
    ffffad07`687df990 fffff807`1dc05fb5 : ffff9c02`56f54080 ffff9c02`39faa080 ffffad07`687dfa80 ffff9c02`00000000 : nt!NtTerminateProcess+0x9c.
    ffffad07`687dfa00 00007ffd`5856c314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
    00000011`4d57f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`5856c314.
    
    STACK_COMMAND: .thread ; .cxr ; kb.
    
    FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_39faa080_unknown!_IMAGE_unknown.
    
    OS_VERSION: 10.0.19041.1.
    
    BUILDLAB_STR: vb_release.
    
    OSPLATFORM_TYPE: x64.
    
    OSNAME: Windows 10.
    
    FAILURE_ID_HASH: {a8d9167c-8ee7-8e66-77dc-3f4e8cfbd536}
    
    Followup: MachineOwner.
    ---------
    [*]
    Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.19252\102620-10234-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available.
    
    ************* Path validation summary **************
    Response Time (ms) Location.
    Deferred srv*
    Symbol search path is: srv*
    Executable search path is:
    Windows 10 Kernel Version 19041 MP (8 procs) Free x64.
    Product: WinNt, suite: TerminalServer SingleUserTS.
    Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
    Machine Name:
    Kernel base = 0xfffff800`41200000 PsLoadedModuleList = 0xfffff800`41e2a310.
    Debug session time: Mon Oct 26 01:13:07.129 2020 (UTC + 3:00)
    System Uptime: 2 days 8:15:58.105.
    Loading Kernel Symbols.
    ...............................................................
    ................................................................
    ................................................................
    .
    Loading User Symbols.
    Loading unloaded module list.
    ..........................
    For analysis of this file, run !analyze -v.
    nt!KeBugCheckEx:
    fffff800`415f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaa04`952a0620=000000000000003b.
    1: kd> !analyze -v.
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck.
    Arg2: fffff8004569965f, Address of the instruction which caused the bugcheck.
    Arg3: ffffaa04952a0f20, Address of the context record for the exception that caused the bugcheck.
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    KEY_VALUES_STRING: 1.
    
    Key : Analysis.CPU.mSec.
    Value: 5983.
    
    Key : Analysis.DebugAnalysisProvider.CPP.
    Value: Create: 8007007e on DESKTOP-IPC9T25.
    
    Key : Analysis.DebugData.
    Value: CreateObject.
    
    Key : Analysis.DebugModel.
    Value: CreateObject.
    
    Key : Analysis.Elapsed.mSec.
    Value: 14420.
    
    Key : Analysis.Memory.CommitPeak.Mb.
    Value: 77.
    
    Key : Analysis.System.
    Value: CreateObject.
    
    Key : WER.OS.Branch.
    Value: vb_release.
    
    Key : WER.OS.Timestamp.
    Value: 2019-12-06T14:06:00Z.
    
    Key : WER.OS.Version.
    Value: 10.0.19041.1.
    
    ADDITIONAL_XML: 1.
    
    OS_BUILD_LAYERS: 1.
    
    BUGCHECK_CODE: 3b.
    
    BUGCHECK_P1: c0000005.
    
    BUGCHECK_P2: fffff8004569965f.
    
    BUGCHECK_P3: ffffaa04952a0f20.
    
    BUGCHECK_P4: 0.
    
    CONTEXT: ffffaa04952a0f20 -- (.cxr 0xffffaa04952a0f20)
    rax=ffffaa04952a1920 rbx=0000000000000000 rcx=00000000000001f9.
    rdx=0000000000000008 rsi=0000000000000000 rdi=ffffab00d4fc6990.
    rip=fffff8004569965f rsp=ffffaa04952a1920 rbp=ffffaa04952a19e9.
    r8=ffffab00dcbf40b2 r9=0000000000000002 r10=00000000ffffffff.
    r11=000000000000005a r12=ffffce07be26cd80 r13=ffffce07c0df9570.
    r14=ffffab00d4fe2950 r15=ffffce07c0df94a0.
    iopl=0 nv up ei ng nz na po nc.
    cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286.
    mountmgr!MountMgrQueryDosVolumePath+0x48f:
    fffff800`4569965f 48d1e8 shr rax,1.
    Resetting default scope.
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    BLACKBOXWINLOGON: 1.
    
    CUSTOMER_CRASH_COUNT: 1.
    
    PROCESS_NAME: nvcontainer.exe.
    
    STACK_TEXT:
    ffffaa04`952a1920 fffff800`456990c3 : ffffce07`a17241f0 ffffce07`c0df94a0 00000000`00000000 ffffab00`d4fc6990 : mountmgr!MountMgrQueryDosVolumePath+0x48f.
    ffffaa04`952a1a50 fffff800`414cd805 : ffffaa04`952a1bf0 ffffab00`e536a0f0 ffffab00`dcbf4b50 ffffaa04`952a1b48 : mountmgr!MountMgrDeviceControl+0xb3.
    ffffaa04`952a1ab0 fffff800`418a99f2 : 00000000`00000010 ffffaa04`952a1bf0 ffffab00`e536a0f0 00000000`00000000 : nt!IofCallDriver+0x55.
    ffffaa04`952a1af0 fffff800`418a9217 : ce07c2d1`c310fffe 00000000`000000c0 ffffab00`e536a0f0 ffffab00`e536a0f0 : nt!IoVolumeDeviceToDosName+0x232.
    ffffaa04`952a1dc0 fffff800`418a912e : ffffce07`c44b3190 ffffce07`00000000 ffffaa04`952a1f01 ffffab00`e536a0f0 : nt!IopQueryNameInternal+0xa3.
    ffffaa04`952a1e70 fffff800`418aa608 : ffffce07`c44b3190 ffffaa04`952a2a80 00000000`000000d0 00000280`d6a61110 : nt!IoQueryFileDosDeviceName+0x5e.
    ffffaa04`952a1ec0 fffff800`41605fb5 : 00000000`00000001 00000000`00000002 00000000`00000000 00000280`d6d61c4c : nt!NtQueryInformationProcess+0x968.
    ffffaa04`952a2990 00007ffc`8950c0b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
    000000f8`847ff1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`8950c0b4.
    
    SYMBOL_NAME: mountmgr!MountMgrQueryDosVolumePath+48f.
    
    MODULE_NAME: mountmgr.
    
    IMAGE_NAME: mountmgr.sys.
    
    IMAGE_VERSION: 10.0.19041.1030.
    
    STACK_COMMAND: .cxr 0xffffaa04952a0f20 ; kb.
    
    BUCKET_ID_FUNC_OFFSET: 48f.
    
    FAILURE_BUCKET_ID: 0x3B_c0000005_mountmgr!MountMgrQueryDosVolumePath.
    
    OS_VERSION: 10.0.19041.1.
    
    BUILDLAB_STR: vb_release.
    
    OSPLATFORM_TYPE: x64.
    
    OSNAME: Windows 10.
    
    FAILURE_ID_HASH: {80080096-09f3-1592-4db4-e3e98f2b9ae8}
    
    Followup: MachineOwner.
    ---------
    [*]

Hocam dediğiniz gibi BIOS F3C imiş. F3G yaptım. 2 uygulamayı kaldırdım. 3 güncellemeyi de yaptım. MemTest'te yeni bitti, sorun görünmedi. Teşekkür ederim bilginiz, desteğiniz için. Umarım bir daha gelmez mavi ekran.
 
Son düzenleyen: Moderatör:

Geri
Yukarı