GT 620M mavi ekran veriyor

Katılım
10 Mart 2022
Mesajlar
50
Daha fazla  
Cinsiyet
Erkek
NVIDIA GT 620M (ekran kartı dün değişti), 8 GB RAM, i5 3230M laptopum var. Bilgisayarcı 1.500 TL istedi, verdik. Sonra GT 620M taktı. Sonra bu ekran kartını kullanmak istediğimde mavi ekran alıyorum. Şu anlık Intel HD 4000 kullanıyorum.
 
Son düzenleyen: Moderatör:
Minidump dosyası paylaşınız.

O zaman bilgisayarcıya söyle o taktığı ekran kartını çıkartsın. Sana da paranı geri versin. Ek olarak belki başka şeyden kaynaklanıyor olabilir o yüzden dump paylaşırsan iyi olur.
Paylaşıyım.

Minidump dosyası paylaşınız.

O zaman bilgisayarcıya söyle o taktığı ekran kartını çıkartsın. Sana da paranı geri versin. Ek olarak belki başka şeyden kaynaklanıyor olabilir o yüzden dump paylaşırsan iyi olur.

@ahmetGalatasaray @Umut Nas
 
Son düzenleme:
Dökümlerinize baktım. Adam sizi 1500 TL kazıklayıp üstüne de çalışmayan bir ekran kartı ile bırakmış. Hakınızı aramak için yemeniz gereken kazığın boyutu nedir?

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000009350, memory referenced
Arg2: 000000000000000a, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8009ff27e80, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff801cf1d6308

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1781

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11741

    Key  : Analysis.Init.CPU.mSec
    Value: 483

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13507

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: winblue_ltsb

    Key  : WER.OS.Timestamp
    Value: 2021-04-05T17:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.20012


FILE_IN_CAB:  081822-7265-01.dmp

BUGCHECK_CODE:  d1

BUGCHECK_P1: 9350

BUGCHECK_P2: a

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8009ff27e80

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff801cf1d62a8
GetUlongPtrFromAddress: unable to read from fffff801cf1d6530
 0000000000009350

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff801d089eac0 -- (.trap 0xfffff801d089eac0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe0011290e3a8
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8009ff27e80 rsp=fffff801d089ec50 rbp=fffff801d089ed50
 r8=000000000026a7cb  r9=0000000000000000 r10=0000000000800002
r11=0000000000000007 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nvlddmkm+0xf3e80:
fffff800`9ff27e80 4d8bb750930000  mov     r14,qword ptr [r15+9350h] ds:00000000`00009350=????????????????
Resetting default scope

STACK_TEXT: 
fffff801`d089e978 fffff801`cefd7769     : 00000000`0000000a 00000000`00009350 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx
fffff801`d089e980 fffff801`cefd4ca8     : 00000000`80000103 fffff800`9fefa9e5 fffff801`d089ed00 00000000`0026a7cb : nt!KiBugCheckDispatch+0x69
fffff801`d089eac0 fffff800`9ff27e80     : 00000000`00000000 00000000`00000005 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x428
fffff801`d089ec50 00000000`00000000     : 00000000`00000005 00000000`00000000 00000000`00000002 fffff800`9ff27f60 : nvlddmkm+0xf3e80


SYMBOL_NAME:  nvlddmkm+f3e80

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  f3e80

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.1.9600.20012

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff801867deef0, Address of the instruction which caused the BugCheck
Arg3: ffffd000fe894340, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff80362f57308

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1577

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6795

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11239

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: winblue_ltsb

    Key  : WER.OS.Timestamp
    Value: 2021-04-05T17:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.20012


FILE_IN_CAB:  081622-4562-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff801867deef0

BUGCHECK_P3: ffffd000fe894340

BUGCHECK_P4: 0

CONTEXT:  ffffd000fe894340 -- (.cxr 0xffffd000fe894340)
rax=ffffd000fe894e40 rbx=ffffe001ede80800 rcx=0000000000000000
rdx=ffffe001ed5bc3d0 rsi=0000000000000009 rdi=ffffe001ed5bc3d0
rip=fffff801867deef0 rsp=ffffd000fe894d60 rbp=0000000000000000
 r8=0000000000000003  r9=0000000000000000 r10=ffffd000fe894d60
r11=ffffd000fe894d50 r12=0000000000000000 r13=0000000000000000
r14=ffffe001ec9b6000 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nvlddmkm+0x2fbef0:
fffff801`867deef0 448b4968        mov     r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
ffffd000`fe894d60 ffffe001`ede80800     : ffffe001`ede80800 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 : nvlddmkm+0x2fbef0
ffffd000`fe894d68 ffffe001`ede80800     : 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 : 0xffffe001`ede80800
ffffd000`fe894d70 00000000`00000009     : ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 : 0xffffe001`ede80800
ffffd000`fe894d78 ffffe001`ede80d98     : ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 : 0x9
ffffd000`fe894d80 ffffe001`00000000     : fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 : 0xffffe001`ede80d98
ffffd000`fe894d88 fffff801`00000001     : ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 : 0xffffe001`00000000
ffffd000`fe894d90 ffffe001`ede80d98     : ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 : 0xfffff801`00000001
ffffd000`fe894d98 ffffe001`ede83e48     : 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 : 0xffffe001`ede80d98
ffffd000`fe894da0 00000000`00000000     : ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 00000000`00781dc9 : 0xffffe001`ede83e48


SYMBOL_NAME:  nvlddmkm+2fbef0

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffffd000fe894340 ; kb

BUCKET_ID_FUNC_OFFSET:  2fbef0

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.1.9600.20012

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff800d993aef0, Address of the instruction which caused the BugCheck
Arg3: ffffd000795e2430, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff801c05d7308

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1359

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10246

    Key  : Analysis.Init.CPU.mSec
    Value: 421

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11867

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: winblue_ltsb

    Key  : WER.OS.Timestamp
    Value: 2021-04-05T17:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.20012


FILE_IN_CAB:  081622-4390-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff800d993aef0

BUGCHECK_P3: ffffd000795e2430

BUGCHECK_P4: 0

CONTEXT:  ffffd000795e2430 -- (.cxr 0xffffd000795e2430)
rax=ffffd000795e2f30 rbx=ffffe0014a67d3f0 rcx=0000000000000000
rdx=ffffe0014a1dc3d0 rsi=0000000000000011 rdi=ffffe0014a1dc3d0
rip=fffff800d993aef0 rsp=ffffd000795e2e50 rbp=0000000000000000
 r8=0000000000000003  r9=0000000000000000 r10=ffffd000795e2e50
r11=ffffd000795e2e40 r12=0000000000000000 r13=0000000000000000
r14=ffffe001495f1000 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nvlddmkm+0x2fbef0:
fffff800`d993aef0 448b4968        mov     r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
ffffd000`795e2e50 ffffe001`4a67d3f0     : ffffe001`4a67d3f0 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 : nvlddmkm+0x2fbef0
ffffd000`795e2e58 ffffe001`4a67d3f0     : 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 : 0xffffe001`4a67d3f0
ffffd000`795e2e60 00000000`00000011     : ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 : 0xffffe001`4a67d3f0
ffffd000`795e2e68 ffffe001`4a67d988     : ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 : 0x11
ffffd000`795e2e70 ffffe001`00000000     : fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 : 0xffffe001`4a67d988
ffffd000`795e2e78 fffff800`00000001     : ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 : 0xffffe001`00000000
ffffd000`795e2e80 ffffe001`4a67d988     : ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 : 0xfffff800`00000001
ffffd000`795e2e88 ffffe001`4a67fe48     : 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 : 0xffffe001`4a67d988
ffffd000`795e2e90 00000000`00000000     : ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 00000000`00781dc9 : 0xffffe001`4a67fe48


SYMBOL_NAME:  nvlddmkm+2fbef0

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffffd000795e2430 ; kb

BUCKET_ID_FUNC_OFFSET:  2fbef0

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.1.9600.20012

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8007f5beef0, Address of the instruction which caused the BugCheck
Arg3: ffffd0005c16e340, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff80079d69308

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1296

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5868

    Key  : Analysis.Init.CPU.mSec
    Value: 390

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11881

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: winblue_ltsb

    Key  : WER.OS.Timestamp
    Value: 2021-04-05T17:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.20012


FILE_IN_CAB:  081722-7468-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8007f5beef0

BUGCHECK_P3: ffffd0005c16e340

BUGCHECK_P4: 0

CONTEXT:  ffffd0005c16e340 -- (.cxr 0xffffd0005c16e340)
rax=ffffd0005c16ee40 rbx=ffffe00067aaa9a0 rcx=0000000000000000
rdx=ffffe00068356010 rsi=0000000000000009 rdi=ffffe00068356010
rip=fffff8007f5beef0 rsp=ffffd0005c16ed60 rbp=0000000000000000
 r8=0000000000000003  r9=0000000000000000 r10=ffffd0005c16ed60
r11=ffffd0005c16ed50 r12=0000000000000000 r13=0000000000000000
r14=ffffe00067915000 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nvlddmkm+0x2fbef0:
fffff800`7f5beef0 448b4968        mov     r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
ffffd000`5c16ed60 ffffe000`67aaa9a0     : ffffe000`67aaa9a0 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 : nvlddmkm+0x2fbef0
ffffd000`5c16ed68 ffffe000`67aaa9a0     : 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 : 0xffffe000`67aaa9a0
ffffd000`5c16ed70 00000000`00000009     : ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 : 0xffffe000`67aaa9a0
ffffd000`5c16ed78 ffffe000`67aaaf38     : ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 : 0x9
ffffd000`5c16ed80 ffffe000`00000000     : fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 : 0xffffe000`67aaaf38
ffffd000`5c16ed88 fffff800`00000001     : ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 : 0xffffe000`00000000
ffffd000`5c16ed90 ffffe000`67aaaf38     : ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 : 0xfffff800`00000001
ffffd000`5c16ed98 ffffe000`67aa7e48     : 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 : 0xffffe000`67aaaf38
ffffd000`5c16eda0 00000000`00000000     : ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 00000000`00781dc9 : 0xffffe000`67aa7e48


SYMBOL_NAME:  nvlddmkm+2fbef0

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffffd0005c16e340 ; kb

BUCKET_ID_FUNC_OFFSET:  2fbef0

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.1.9600.20012

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
 
Dökümlerinize baktım. Adam sizi 1500 TL kazıklayıp üstüne de çalışmayan bir ekran kartı ile bırakmış. Hakınızı aramak için yemeniz gereken kazığın boyutu nedir?

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000009350, memory referenced
Arg2: 000000000000000a, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8009ff27e80, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff801cf1d6308

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1781

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11741

    Key  : Analysis.Init.CPU.mSec
    Value: 483

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13507

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: winblue_ltsb

    Key  : WER.OS.Timestamp
    Value: 2021-04-05T17:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.20012


FILE_IN_CAB:  081822-7265-01.dmp

BUGCHECK_CODE:  d1

BUGCHECK_P1: 9350

BUGCHECK_P2: a

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8009ff27e80

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff801cf1d62a8
GetUlongPtrFromAddress: unable to read from fffff801cf1d6530
 0000000000009350

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff801d089eac0 -- (.trap 0xfffff801d089eac0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe0011290e3a8
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8009ff27e80 rsp=fffff801d089ec50 rbp=fffff801d089ed50
 r8=000000000026a7cb  r9=0000000000000000 r10=0000000000800002
r11=0000000000000007 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nvlddmkm+0xf3e80:
fffff800`9ff27e80 4d8bb750930000  mov     r14,qword ptr [r15+9350h] ds:00000000`00009350=????????????????
Resetting default scope

STACK_TEXT:
fffff801`d089e978 fffff801`cefd7769     : 00000000`0000000a 00000000`00009350 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx
fffff801`d089e980 fffff801`cefd4ca8     : 00000000`80000103 fffff800`9fefa9e5 fffff801`d089ed00 00000000`0026a7cb : nt!KiBugCheckDispatch+0x69
fffff801`d089eac0 fffff800`9ff27e80     : 00000000`00000000 00000000`00000005 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x428
fffff801`d089ec50 00000000`00000000     : 00000000`00000005 00000000`00000000 00000000`00000002 fffff800`9ff27f60 : nvlddmkm+0xf3e80


SYMBOL_NAME:  nvlddmkm+f3e80

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  f3e80

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.1.9600.20012

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff801867deef0, Address of the instruction which caused the BugCheck
Arg3: ffffd000fe894340, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff80362f57308

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1577

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6795

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11239

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: winblue_ltsb

    Key  : WER.OS.Timestamp
    Value: 2021-04-05T17:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.20012


FILE_IN_CAB:  081622-4562-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff801867deef0

BUGCHECK_P3: ffffd000fe894340

BUGCHECK_P4: 0

CONTEXT:  ffffd000fe894340 -- (.cxr 0xffffd000fe894340)
rax=ffffd000fe894e40 rbx=ffffe001ede80800 rcx=0000000000000000
rdx=ffffe001ed5bc3d0 rsi=0000000000000009 rdi=ffffe001ed5bc3d0
rip=fffff801867deef0 rsp=ffffd000fe894d60 rbp=0000000000000000
 r8=0000000000000003  r9=0000000000000000 r10=ffffd000fe894d60
r11=ffffd000fe894d50 r12=0000000000000000 r13=0000000000000000
r14=ffffe001ec9b6000 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nvlddmkm+0x2fbef0:
fffff801`867deef0 448b4968        mov     r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
ffffd000`fe894d60 ffffe001`ede80800     : ffffe001`ede80800 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 : nvlddmkm+0x2fbef0
ffffd000`fe894d68 ffffe001`ede80800     : 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 : 0xffffe001`ede80800
ffffd000`fe894d70 00000000`00000009     : ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 : 0xffffe001`ede80800
ffffd000`fe894d78 ffffe001`ede80d98     : ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 : 0x9
ffffd000`fe894d80 ffffe001`00000000     : fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 : 0xffffe001`ede80d98
ffffd000`fe894d88 fffff801`00000001     : ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 : 0xffffe001`00000000
ffffd000`fe894d90 ffffe001`ede80d98     : ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 : 0xfffff801`00000001
ffffd000`fe894d98 ffffe001`ede83e48     : 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 : 0xffffe001`ede80d98
ffffd000`fe894da0 00000000`00000000     : ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 00000000`00781dc9 : 0xffffe001`ede83e48


SYMBOL_NAME:  nvlddmkm+2fbef0

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffffd000fe894340 ; kb

BUCKET_ID_FUNC_OFFSET:  2fbef0

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.1.9600.20012

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff800d993aef0, Address of the instruction which caused the BugCheck
Arg3: ffffd000795e2430, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff801c05d7308

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1359

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10246

    Key  : Analysis.Init.CPU.mSec
    Value: 421

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11867

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: winblue_ltsb

    Key  : WER.OS.Timestamp
    Value: 2021-04-05T17:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.20012


FILE_IN_CAB:  081622-4390-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff800d993aef0

BUGCHECK_P3: ffffd000795e2430

BUGCHECK_P4: 0

CONTEXT:  ffffd000795e2430 -- (.cxr 0xffffd000795e2430)
rax=ffffd000795e2f30 rbx=ffffe0014a67d3f0 rcx=0000000000000000
rdx=ffffe0014a1dc3d0 rsi=0000000000000011 rdi=ffffe0014a1dc3d0
rip=fffff800d993aef0 rsp=ffffd000795e2e50 rbp=0000000000000000
 r8=0000000000000003  r9=0000000000000000 r10=ffffd000795e2e50
r11=ffffd000795e2e40 r12=0000000000000000 r13=0000000000000000
r14=ffffe001495f1000 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nvlddmkm+0x2fbef0:
fffff800`d993aef0 448b4968        mov     r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
ffffd000`795e2e50 ffffe001`4a67d3f0     : ffffe001`4a67d3f0 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 : nvlddmkm+0x2fbef0
ffffd000`795e2e58 ffffe001`4a67d3f0     : 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 : 0xffffe001`4a67d3f0
ffffd000`795e2e60 00000000`00000011     : ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 : 0xffffe001`4a67d3f0
ffffd000`795e2e68 ffffe001`4a67d988     : ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 : 0x11
ffffd000`795e2e70 ffffe001`00000000     : fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 : 0xffffe001`4a67d988
ffffd000`795e2e78 fffff800`00000001     : ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 : 0xffffe001`00000000
ffffd000`795e2e80 ffffe001`4a67d988     : ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 : 0xfffff800`00000001
ffffd000`795e2e88 ffffe001`4a67fe48     : 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 : 0xffffe001`4a67d988
ffffd000`795e2e90 00000000`00000000     : ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 00000000`00781dc9 : 0xffffe001`4a67fe48


SYMBOL_NAME:  nvlddmkm+2fbef0

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffffd000795e2430 ; kb

BUCKET_ID_FUNC_OFFSET:  2fbef0

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.1.9600.20012

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8007f5beef0, Address of the instruction which caused the BugCheck
Arg3: ffffd0005c16e340, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff80079d69308

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1296

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5868

    Key  : Analysis.Init.CPU.mSec
    Value: 390

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11881

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: winblue_ltsb

    Key  : WER.OS.Timestamp
    Value: 2021-04-05T17:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.20012


FILE_IN_CAB:  081722-7468-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8007f5beef0

BUGCHECK_P3: ffffd0005c16e340

BUGCHECK_P4: 0

CONTEXT:  ffffd0005c16e340 -- (.cxr 0xffffd0005c16e340)
rax=ffffd0005c16ee40 rbx=ffffe00067aaa9a0 rcx=0000000000000000
rdx=ffffe00068356010 rsi=0000000000000009 rdi=ffffe00068356010
rip=fffff8007f5beef0 rsp=ffffd0005c16ed60 rbp=0000000000000000
 r8=0000000000000003  r9=0000000000000000 r10=ffffd0005c16ed60
r11=ffffd0005c16ed50 r12=0000000000000000 r13=0000000000000000
r14=ffffe00067915000 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nvlddmkm+0x2fbef0:
fffff800`7f5beef0 448b4968        mov     r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
ffffd000`5c16ed60 ffffe000`67aaa9a0     : ffffe000`67aaa9a0 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 : nvlddmkm+0x2fbef0
ffffd000`5c16ed68 ffffe000`67aaa9a0     : 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 : 0xffffe000`67aaa9a0
ffffd000`5c16ed70 00000000`00000009     : ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 : 0xffffe000`67aaa9a0
ffffd000`5c16ed78 ffffe000`67aaaf38     : ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 : 0x9
ffffd000`5c16ed80 ffffe000`00000000     : fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 : 0xffffe000`67aaaf38
ffffd000`5c16ed88 fffff800`00000001     : ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 : 0xffffe000`00000000
ffffd000`5c16ed90 ffffe000`67aaaf38     : ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 : 0xfffff800`00000001
ffffd000`5c16ed98 ffffe000`67aa7e48     : 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 : 0xffffe000`67aaaf38
ffffd000`5c16eda0 00000000`00000000     : ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 00000000`00781dc9 : 0xffffe000`67aa7e48


SYMBOL_NAME:  nvlddmkm+2fbef0

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffffd0005c16e340 ; kb

BUCKET_ID_FUNC_OFFSET:  2fbef0

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.1.9600.20012

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

Raporunuzu okudum hocam, Windows 8.1 cihaz kullanıyor arkadaş, oluşum sırası ve rapora göre NVIDIA kaynaklı bir hata ve yazmaçlar varlık kabul etmediği için "unknown" yani bilinmeyen durum atıyor.

Dediğiniz gibi kartın bozuk olduğunu ispatlar.

Son olarak IRQL hatası içinde ekran kartı okunmaya çalışmış fakat bozuk olduğundan bellek yazım hatası ile beraber sistem mavi ekrana düşmüş.
 
Raporunuzu okudum hocam, Windows 8.1 cihaz kullanıyor arkadaş, oluşum sırası ve rapora göre NVIDIA kaynaklı bir hata ve yazmaçlar varlık kabul etmediği için "unknown" yani bilinmeyen durum atıyor.

Dediğiniz gibi kartın bozuk olduğunu ispatlar.

Son olarak IRQL hatası içinde ekran kartı okunmaya çalışmış fakat bozuk olduğundan bellek yazım hatası ile beraber sistem mavi ekrana düşmüş.
Tamamdır teşekürler.

Dökümlerinize baktım. Adam sizi 1500 TL kazıklayıp üstüne de çalışmayan bir ekran kartı ile bırakmış. Hakınızı aramak için yemeniz gereken kazığın boyutu nedir?

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000009350, memory referenced
Arg2: 000000000000000a, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8009ff27e80, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff801cf1d6308

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1781

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11741

    Key  : Analysis.Init.CPU.mSec
    Value: 483

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13507

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: winblue_ltsb

    Key  : WER.OS.Timestamp
    Value: 2021-04-05T17:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.20012


FILE_IN_CAB:  081822-7265-01.dmp

BUGCHECK_CODE:  d1

BUGCHECK_P1: 9350

BUGCHECK_P2: a

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8009ff27e80

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff801cf1d62a8
GetUlongPtrFromAddress: unable to read from fffff801cf1d6530
 0000000000009350

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff801d089eac0 -- (.trap 0xfffff801d089eac0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe0011290e3a8
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8009ff27e80 rsp=fffff801d089ec50 rbp=fffff801d089ed50
 r8=000000000026a7cb  r9=0000000000000000 r10=0000000000800002
r11=0000000000000007 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nvlddmkm+0xf3e80:
fffff800`9ff27e80 4d8bb750930000  mov     r14,qword ptr [r15+9350h] ds:00000000`00009350=????????????????
Resetting default scope

STACK_TEXT:
fffff801`d089e978 fffff801`cefd7769     : 00000000`0000000a 00000000`00009350 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx
fffff801`d089e980 fffff801`cefd4ca8     : 00000000`80000103 fffff800`9fefa9e5 fffff801`d089ed00 00000000`0026a7cb : nt!KiBugCheckDispatch+0x69
fffff801`d089eac0 fffff800`9ff27e80     : 00000000`00000000 00000000`00000005 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x428
fffff801`d089ec50 00000000`00000000     : 00000000`00000005 00000000`00000000 00000000`00000002 fffff800`9ff27f60 : nvlddmkm+0xf3e80


SYMBOL_NAME:  nvlddmkm+f3e80

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  f3e80

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.1.9600.20012

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff801867deef0, Address of the instruction which caused the BugCheck
Arg3: ffffd000fe894340, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff80362f57308

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1577

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6795

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11239

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: winblue_ltsb

    Key  : WER.OS.Timestamp
    Value: 2021-04-05T17:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.20012


FILE_IN_CAB:  081622-4562-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff801867deef0

BUGCHECK_P3: ffffd000fe894340

BUGCHECK_P4: 0

CONTEXT:  ffffd000fe894340 -- (.cxr 0xffffd000fe894340)
rax=ffffd000fe894e40 rbx=ffffe001ede80800 rcx=0000000000000000
rdx=ffffe001ed5bc3d0 rsi=0000000000000009 rdi=ffffe001ed5bc3d0
rip=fffff801867deef0 rsp=ffffd000fe894d60 rbp=0000000000000000
 r8=0000000000000003  r9=0000000000000000 r10=ffffd000fe894d60
r11=ffffd000fe894d50 r12=0000000000000000 r13=0000000000000000
r14=ffffe001ec9b6000 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nvlddmkm+0x2fbef0:
fffff801`867deef0 448b4968        mov     r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
ffffd000`fe894d60 ffffe001`ede80800     : ffffe001`ede80800 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 : nvlddmkm+0x2fbef0
ffffd000`fe894d68 ffffe001`ede80800     : 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 : 0xffffe001`ede80800
ffffd000`fe894d70 00000000`00000009     : ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 : 0xffffe001`ede80800
ffffd000`fe894d78 ffffe001`ede80d98     : ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 : 0x9
ffffd000`fe894d80 ffffe001`00000000     : fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 : 0xffffe001`ede80d98
ffffd000`fe894d88 fffff801`00000001     : ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 : 0xffffe001`00000000
ffffd000`fe894d90 ffffe001`ede80d98     : ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 : 0xfffff801`00000001
ffffd000`fe894d98 ffffe001`ede83e48     : 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 : 0xffffe001`ede80d98
ffffd000`fe894da0 00000000`00000000     : ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 00000000`00781dc9 : 0xffffe001`ede83e48


SYMBOL_NAME:  nvlddmkm+2fbef0

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffffd000fe894340 ; kb

BUCKET_ID_FUNC_OFFSET:  2fbef0

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.1.9600.20012

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff800d993aef0, Address of the instruction which caused the BugCheck
Arg3: ffffd000795e2430, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff801c05d7308

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1359

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10246

    Key  : Analysis.Init.CPU.mSec
    Value: 421

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11867

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: winblue_ltsb

    Key  : WER.OS.Timestamp
    Value: 2021-04-05T17:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.20012


FILE_IN_CAB:  081622-4390-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff800d993aef0

BUGCHECK_P3: ffffd000795e2430

BUGCHECK_P4: 0

CONTEXT:  ffffd000795e2430 -- (.cxr 0xffffd000795e2430)
rax=ffffd000795e2f30 rbx=ffffe0014a67d3f0 rcx=0000000000000000
rdx=ffffe0014a1dc3d0 rsi=0000000000000011 rdi=ffffe0014a1dc3d0
rip=fffff800d993aef0 rsp=ffffd000795e2e50 rbp=0000000000000000
 r8=0000000000000003  r9=0000000000000000 r10=ffffd000795e2e50
r11=ffffd000795e2e40 r12=0000000000000000 r13=0000000000000000
r14=ffffe001495f1000 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nvlddmkm+0x2fbef0:
fffff800`d993aef0 448b4968        mov     r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
ffffd000`795e2e50 ffffe001`4a67d3f0     : ffffe001`4a67d3f0 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 : nvlddmkm+0x2fbef0
ffffd000`795e2e58 ffffe001`4a67d3f0     : 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 : 0xffffe001`4a67d3f0
ffffd000`795e2e60 00000000`00000011     : ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 : 0xffffe001`4a67d3f0
ffffd000`795e2e68 ffffe001`4a67d988     : ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 : 0x11
ffffd000`795e2e70 ffffe001`00000000     : fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 : 0xffffe001`4a67d988
ffffd000`795e2e78 fffff800`00000001     : ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 : 0xffffe001`00000000
ffffd000`795e2e80 ffffe001`4a67d988     : ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 : 0xfffff800`00000001
ffffd000`795e2e88 ffffe001`4a67fe48     : 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 : 0xffffe001`4a67d988
ffffd000`795e2e90 00000000`00000000     : ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 00000000`00781dc9 : 0xffffe001`4a67fe48


SYMBOL_NAME:  nvlddmkm+2fbef0

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffffd000795e2430 ; kb

BUCKET_ID_FUNC_OFFSET:  2fbef0

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.1.9600.20012

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8007f5beef0, Address of the instruction which caused the BugCheck
Arg3: ffffd0005c16e340, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff80079d69308

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1296

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5868

    Key  : Analysis.Init.CPU.mSec
    Value: 390

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11881

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: winblue_ltsb

    Key  : WER.OS.Timestamp
    Value: 2021-04-05T17:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.20012


FILE_IN_CAB:  081722-7468-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8007f5beef0

BUGCHECK_P3: ffffd0005c16e340

BUGCHECK_P4: 0

CONTEXT:  ffffd0005c16e340 -- (.cxr 0xffffd0005c16e340)
rax=ffffd0005c16ee40 rbx=ffffe00067aaa9a0 rcx=0000000000000000
rdx=ffffe00068356010 rsi=0000000000000009 rdi=ffffe00068356010
rip=fffff8007f5beef0 rsp=ffffd0005c16ed60 rbp=0000000000000000
 r8=0000000000000003  r9=0000000000000000 r10=ffffd0005c16ed60
r11=ffffd0005c16ed50 r12=0000000000000000 r13=0000000000000000
r14=ffffe00067915000 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nvlddmkm+0x2fbef0:
fffff800`7f5beef0 448b4968        mov     r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
ffffd000`5c16ed60 ffffe000`67aaa9a0     : ffffe000`67aaa9a0 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 : nvlddmkm+0x2fbef0
ffffd000`5c16ed68 ffffe000`67aaa9a0     : 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 : 0xffffe000`67aaa9a0
ffffd000`5c16ed70 00000000`00000009     : ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 : 0xffffe000`67aaa9a0
ffffd000`5c16ed78 ffffe000`67aaaf38     : ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 : 0x9
ffffd000`5c16ed80 ffffe000`00000000     : fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 : 0xffffe000`67aaaf38
ffffd000`5c16ed88 fffff800`00000001     : ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 : 0xffffe000`00000000
ffffd000`5c16ed90 ffffe000`67aaaf38     : ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 : 0xfffff800`00000001
ffffd000`5c16ed98 ffffe000`67aa7e48     : 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 : 0xffffe000`67aaaf38
ffffd000`5c16eda0 00000000`00000000     : ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 00000000`00781dc9 : 0xffffe000`67aa7e48


SYMBOL_NAME:  nvlddmkm+2fbef0

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffffd0005c16e340 ; kb

BUCKET_ID_FUNC_OFFSET:  2fbef0

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  8.1.9600.20012

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
Recep abi yardımcı olduğun için sağol şimdi götürcem bu nasıl olmuş diye söyleyeceğim eğer yapmazsa size danışırım.
 

Yeni konular

Geri
Yukarı