GT 720M sistemde mavi ekran hatası

İşletim sistemi
Windows 10

cemoleos

Centipat
Katılım
8 Aralık 2020
Mesajlar
221
Çözümler
1
Daha fazla  
Cinsiyet
Diğer
RAM
8gb 1600MHz DDR3
Ekran kartı
gt 720m
İşlemci
i5 3230m
Merhaba, son zamanlarda (2 gündür) bilgisayar 1 kere kapandıktan sonra açılırken bir anda ekrana görüntü gelmedi ve silindir işaret yanıp sönmeye başladı ve hala öyle ayrıca belli bir süre sonra ekran karıncalanıp mavi ekran verdi (bazen karıncalanma olmadan mavi ekran oluyor) ve hala öyle

Ayrıca minidump dosyalarını buldum: minidump dosyaları.rar
 
Son düzenleme:

EgeN7

Kilopat
Katılım
24 Kasım 2017
Mesajlar
3.089
Çözümler
85
Yer
Bursa
Daha fazla  
Sistem Özellikleri
GTX 1660 Ti Armor OC
AMD Ryzen 5 5600
MSI B450 Tomahawk MAX
ID-Cooling SE-224-XT
Crucial 16GB (2x8) Ballistix Sport
HP1-J750GD-F12S
Cooler Master MB511
Crucial BX500 480GB
Samsung 870 EVO 250GB
AOC 24G2U
Masterkeys Pro L RGB
HyperX Pulsefire Haste
MH650
Cinsiyet
Erkek
Meslek
Elektrik Elektronik Mühendisi
Merhaba @cemoleos. Biraz uzun olacak ancak adım adım uygularsanız çözebilme ihtimalimiz var.

Öncelikle CMD'yi yönetici olarak çalıştırıp sırayla şu üç komutu girin, biri bitsin diğerini girin. Sonuçlarını paylaşın.

SFC /scannow DISM /Online /Cleanup-Image /RestoreHealth chkdsk /f /r

Windows'u Windows Update yardımıyla son sürüme güncelleyin.

Siz laptop kullanıyorsunuz ancak bu hatayı masaüstü kullananlar alıyorsa diye ekstra bir adım daha ekledim.

SATA veri aktarım kablosunun tam olarak oturup oturmadığına bakın, gevşemiş olabilir. (Bir ucu anakarta, diğer ucu HDD'ye bağlı) Ek olarak, elinizde başka bir SATA kablosu varsa eskisinin yerine onu takabilirsiniz, belki de kabloda bir sorun vardır.

1664644624523.png


Ayrıca SATA güç kablosunun da bağlantısını kontrol edebilirsiniz.


igdkmd64.sys yani Intel Graphics Driver ile ilgili de bir hata var. Sürücü eski kalmış. Ama bu hata HDD'deki veya RAM'deki bir arızadan da kaynaklanmış olabilir. Siz yine de DDU yardımıyla tüm Intel sürücülerini kaldırıp en güncel sürücüyü yükleyin. i5-3230M işlemcinizin grafik sürücüleri için Intel'in kendi sitesine girdiğimde Ekim 2020 tarihli bir sürücü var. DDU adımlarını paylaşıyorum.

- Güncel sürücüyü indirin: i5-3230M - 23 Ekim 2020 - Grafik Sürücüsü [15.33]
- İndirdikten sonra başlattaki arama yerine Aygıt yükleme ayarlarını değiştir yazın.
- Çıkan pencereyi Hayır olarak seçin ve kapatın.
- Daha sonra DDU ile Sürücü Kaldırma rehberini takip edin.
- Sürücüyü kaldırdıktan sonra bilgisayar yeniden başlayacak.
- Bilgisayar açılınca indirdiğiniz yeni sürücüyü kurun.
- Kurduktan sonra tekrar Aygıt yükleme ayarlarını değiştir yazıp o kısmı "Evet" seçebilirsiniz.

Şu an sizde yüklü olan Intel sürücü tarihi:
Rich (BB code):
igdkmd64.sys
Timestamp:        Saturday    July 11 2015    03:37:09  (55A06535)

Detaylar: Intel® Core™ i5-3230M İşlemci


Üstteki çözümler işe yaramazsa:

HD Tune indirip HDD'nize "Quick scan" kapalı olacak şekilde tarama yapın ve onun da sonucunu paylaşın. Bad sector veya herhangi bir arıza varsa onu öğrenelim.


HD Tune ile HDD tarama sonrasında herhangi bir arızaya rastlanmazsa; MemTest86 rehberini takip ederek RAM testi yapın. Anakartınız UEFI desteklemiyorsa rehberdeki "UEFI desteği olmayan eski sistemler" adımında paylaşılan MemTest'i indirmeyi unutmayın.


Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8011f3becab, The address that the exception occurred at
Arg3: ffffc10000460258, Exception Record Address
Arg4: ffffc1000045fa90, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1468

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1869

    Key  : Analysis.Init.CPU.mSec
    Value: 46

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8778

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 150

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1000007e

    Key  : Bugcheck.Code.Register
    Value: 0xb26283f2

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  092522-36921-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8011f3becab

BUGCHECK_P3: ffffc10000460258

BUGCHECK_P4: ffffc1000045fa90

EXCEPTION_RECORD:  ffffc10000460258 -- (.exr 0xffffc10000460258)
ExceptionAddress: fffff8011f3becab (Ntfs!NtfsFindPrefixHashEntry+0x000000000000033b)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000

CONTEXT:  ffffc1000045fa90 -- (.cxr 0xffffc1000045fa90)
rax=0000000000000000 rbx=ffff9881c88f1180 rcx=ffffc308b26283f2
rdx=000000000000001a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011f3becab rsp=ffffc10000460490 rbp=0000000000000008
 r8=0000000000000000  r9=0000000000000002 r10=ffff9881cf153a28
r11=ffffc10000460460 r12=0000000000000009 r13=00000000000025ac
r14=ffffc10000460a30 r15=00000000000001ac
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
Ntfs!NtfsFindPrefixHashEntry+0x33b:
fffff801`1f3becab c88b4424        enter   448Bh,24h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WerFault.exe

READ_ADDRESS: fffff8011aefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000000

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffffc100`00460490 fffff801`1f3bf55c     : ffff9881`cf153a28 ffff9881`c88f24f0 ffffc308`a6c03800 00000000`00000001 : Ntfs!NtfsFindPrefixHashEntry+0x33b
ffffc100`00460550 fffff801`1f3c0600     : ffff9881`cf153a28 ffff9881`cf1ac010 ffff9881`ce3be750 ffffc100`004607f0 : Ntfs!NtfsFindStartingNode+0x25c
ffffc100`00460640 fffff801`1f3bbe9b     : ffff9881`cf1ac010 ffffc100`00460a30 ffff9881`cf1ac010 00000000`00000000 : Ntfs!NtfsCommonCreate+0x580
ffffc100`00460920 fffff801`1a42a6b5     : ffff9881`c88f1030 ffff9881`cf1ac010 ffffc100`00460c00 ffff9881`cf856e80 : Ntfs!NtfsFsdCreate+0x1db
ffffc100`00460ba0 fffff801`1e8170cf     : 00000000`00000001 ffffc100`00460c90 ffffc100`00460c99 fffff801`1e815f3a : nt!IofCallDriver+0x55
ffffc100`00460be0 fffff801`1e849f54     : ffffc100`00460c90 ffff9881`cf856ed8 ffff9881`c88d6a00 ffff9881`c88d6a00 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffc100`00460c50 fffff801`1a42a6b5     : 00000000`00000001 ffff9881`c88b3060 00000000`00000060 ffff9881`d024bde8 : FLTMGR!FltpCreate+0x324
ffffc100`00460d00 fffff801`1a42bcb4     : 00000000`00000003 ffff9881`cf1ac010 ffff9881`6d4e6f49 fffff801`1a5487c2 : nt!IofCallDriver+0x55
ffffc100`00460d40 fffff801`1a815f5d     : ffffc100`00461000 ffff9881`c88b3060 ffff9881`cf856f18 fffff801`00000000 : nt!IoCallDriverWithTracing+0x34
ffffc100`00460d90 fffff801`1a8f1257     : ffff9881`c88d6a00 ffffc308`a5e01440 ffff9881`cfab2520 00000000`00120000 : nt!IopParseDevice+0x117d
ffffc100`00460f00 fffff801`1a7ff2fe     : fffff801`1a8f1190 ffffc100`00461070 ffff9881`cfab2520 ffff9881`cf85a9b0 : nt!IopParseFile+0xc7
ffffc100`00460f70 fffff801`1a828b2a     : ffff9881`cfab2500 ffffc100`004611d8 00000000`00000240 ffff9881`c6cff560 : nt!ObpLookupObjectName+0x3fe
ffffc100`00461140 fffff801`1a872d5f     : 00000000`00000000 ffffc100`004617c0 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1fa
ffffc100`00461270 fffff801`1a87281d     : ffffc100`00461688 00000000`00000000 ffffc100`004617c0 ffffc100`004616e0 : nt!IopCreateFile+0x40f
ffffc100`00461310 fffff801`1e84b7d3     : 00000000`00000000 ffffc100`00461469 ffff9881`d024bde8 00000000`00000000 : nt!IoCreateFileEx+0x11d
ffffc100`004613b0 fffff801`1e84ba37     : 00000000`00000000 ffffc100`004616f0 ffffc100`004617c0 fffff801`1a498fdf : FLTMGR!FltpCreateFile+0x16f
ffffc100`004614a0 fffff801`1f26ecc3     : ffff9881`c8682750 00000000`00000000 ffffc100`00461688 ffffc100`00461668 : FLTMGR!FltCreateFileEx2+0xe7
ffffc100`004615d0 fffff801`1a7dd894     : 00000000`00000000 ffff9881`d035c440 ffffc308`ae260c30 ffffc100`004618d8 : fileinfo!FIPfInterfaceOpen+0x3e3
ffffc100`00461790 fffff801`1a7dbe0d     : ffffc100`00461950 ffffffff`fffdb610 ffffc100`004619b0 ffffffff`80002a60 : nt!PfpOpenHandleCreate+0xdc
ffffc100`00461860 fffff801`1a7dbd1b     : 00000000`00000000 ffffc100`00461a80 ffffc308`af40a338 00000000`00000000 : nt!PfpPrefetchEntireDirectory+0x85
ffffc100`00461920 fffff801`1a8f58bf     : ffffc308`00000000 00000000`00000003 00000000`00000000 ffffffff`80002cd0 : nt!PfSnPrefetchMetadata+0x27b
ffffc100`00461a10 fffff801`1a83393d     : 00000000`00000001 00000000`00000002 00000000`000000e6 ffffc308`af40a2f8 : nt!PfSnAsyncPrefetchStep+0x23
ffffc100`00461a50 fffff801`1a452b65     : ffff9881`ce3be040 ffff9881`ce3be040 ffff9881`c6ca1010 ffff9881`cb56f550 : nt!PfSnAsyncPrefetchWorker+0x1cd
ffffc100`00461b70 fffff801`1a471d25     : ffff9881`ce3be040 00000000`00000080 ffff9881`c6c9d180 00078405`bd9bbfff : nt!ExpWorkerThread+0x105
ffffc100`00461c10 fffff801`1a600628     : fffff801`183c1180 ffff9881`ce3be040 fffff801`1a471cd0 ffffd647`4f83fb6e : nt!PspSystemThreadStartup+0x55
ffffc100`00461c60 00000000`00000000     : ffffc100`00462000 ffffc100`0045c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !Ntfs
    fffff8011f3becab - Ntfs!NtfsFindPrefixHashEntry+33b
    [ 48:c8 ]
1 error : !Ntfs (fffff8011f3becab)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xffffc1000045fa90 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8077ee8bdb3, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1203

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3978

    Key  : Analysis.Init.CPU.mSec
    Value: 109

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10371

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 138

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  092622-42890-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: 8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8077ee8bdb3

READ_ADDRESS: fffff8076e8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000008

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffffc0970b8dba0 -- (.trap 0xfffffc0970b8dba0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffc0970b8e000
rdx=0000000000000014 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077ee8bdb3 rsp=fffffc0970b8dd30 rbp=fffffc0970b8de30
 r8=0000000000000000  r9=0000000000000000 r10=ffffa983c55d4000
r11=fffffc0970b8dd10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
igdkmd64+0x8bdb3:
fffff807`7ee8bdb3 ff5008          call    qword ptr [rax+8] ds:00000000`00000008=????????????????
Resetting default scope

STACK_TEXT:
fffffc09`70b8da58 fffff807`6e00af69     : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffc09`70b8da60 fffff807`6e007269     : 00000001`61010008 00000001`00000001 00000000`00000000 00001f80`00000200 : nt!KiBugCheckDispatch+0x69
fffffc09`70b8dba0 fffff807`7ee8bdb3     : ffffa983`c55d4000 00000000`00000000 fffffc09`70b8de30 00000000`00000000 : nt!KiPageFault+0x469
fffffc09`70b8dd30 ffffa983`c55d4000     : 00000000`00000000 fffffc09`70b8de30 00000000`00000000 fffff807`00000000 : igdkmd64+0x8bdb3
fffffc09`70b8dd38 00000000`00000000     : fffffc09`70b8de30 00000000`00000000 fffff807`00000000 fffff807`7f0b9380 : 0xffffa983`c55d4000


SYMBOL_NAME:  igdkmd64+8bdb3

MODULE_NAME: igdkmd64

IMAGE_NAME:  igdkmd64.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  8bdb3

FAILURE_BUCKET_ID:  AV_igdkmd64!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ae6ed5da-86a4-a1ba-84df-0618cafaf7fa}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd88c5f5de628, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff805484d5420, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1678

    Key  : Analysis.Init.CPU.mSec
    Value: 46

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11856

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 144

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  092522-30578-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffd88c5f5de628

BUGCHECK_P2: 0

BUGCHECK_P3: fffff805484d5420

BUGCHECK_P4: 2

READ_ADDRESS: fffff80543afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffd88c5f5de628

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  AndroidEmulato

TRAP_FRAME:  ffffeb07a5747d70 -- (.trap 0xffffeb07a5747d70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffeb07a57484d0 rbx=0000000000000000 rcx=ffffc50e6f77f058
rdx=ffffc50e6df03e08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805484d5420 rsp=ffffeb07a5747f00 rbp=ffffc50e6df03a20
 r8=ffffd88c5f5de570  r9=0000000000013400 r10=000000000000000c
r11=0000000000000400 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
Ntfs!NtfsSetupSubrequest+0x90:
fffff805`484d5420 418b8db8000000  mov     ecx,dword ptr [r13+0B8h] ds:00000000`000000b8=????????
Resetting default scope

STACK_TEXT:
ffffeb07`a5747ac8 fffff805`43231a9d     : 00000000`00000050 ffffd88c`5f5de628 00000000`00000000 ffffeb07`a5747d70 : nt!KeBugCheckEx
ffffeb07`a5747ad0 fffff805`430399e0     : ffffc50e`6f23d080 00000000`00000000 ffffeb07`a5747df0 00000000`00000000 : nt!MiSystemFault+0x1da08d
ffffeb07`a5747bd0 fffff805`4320715e     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`43014934 : nt!MmAccessFault+0x400
ffffeb07`a5747d70 fffff805`484d5420     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffeb07`a5747f00 fffff805`484d390e     : ffffc50e`6df03e08 ffffd884`53542170 ffffeb07`a5748110 00000000`00013400 : Ntfs!NtfsSetupSubrequest+0x90
ffffeb07`a5747f80 fffff805`484d3335     : ffffc50e`6f77f003 ffffc50e`6df03a20 ffffc50e`6f77f000 00000000`00013400 : Ntfs!NtfsPrepareSimpleBuffers+0x26e
ffffeb07`a5748060 fffff805`484dcb9e     : ffffc50e`6f77f058 ffffeb07`a57481d0 00000000`00008000 00000000`00013400 : Ntfs!NtfsPrepareBuffers+0xc5
ffffeb07`a57480d0 fffff805`484d88d0     : 00000000`00000001 ffffeb07`a57485a0 ffffc50e`65ae9115 ffffd884`53542170 : Ntfs!NtfsNonCachedIo+0x72e
ffffeb07`a5748360 fffff805`484d926c     : ffffc50e`6f77f058 ffffc50e`6df03a20 00000000`00079000 00000000`00000030 : Ntfs!NtfsCommonRead+0x1eb0
ffffeb07`a5748570 fffff805`4302a6b5     : ffffc50e`700aca20 ffffc50e`6df03a20 ffffc50e`6df03a20 ffffc50e`65ad7790 : Ntfs!NtfsFsdRead+0x1fc
ffffeb07`a5748640 fffff805`47a170cf     : ffffeb07`a5748b00 00000000`00000000 c50e693c`f0c80470 00000000`00000000 : nt!IofCallDriver+0x55
ffffeb07`a5748680 fffff805`47a14a03     : ffffeb07`a5748710 ffffc50e`65ad7790 00000000`00000003 ffffd884`50ac5940 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffeb07`a57486f0 fffff805`4302a6b5     : ffffc50e`6df03a20 fffff805`43097ac3 00000001`00000000 00000000`00000005 : FLTMGR!FltpDispatch+0xa3
ffffeb07`a5748750 fffff805`430e4b27     : 00000000`00000005 ffffc50e`6df03a20 ffffc50e`696fbe60 ffffc50e`69cf0a20 : nt!IofCallDriver+0x55
ffffeb07`a5748790 fffff805`430f1d4a     : 00000000`00000001 ffffeb07`a5748a20 ffffc50e`696fbe70 ffffc50e`696fbe30 : nt!IoPageReadEx+0x1d7
ffffeb07`a5748800 fffff805`430ef3cd     : 00000000`00000003 ffffeb07`a57488e0 ffffeb07`a5748a58 fffff805`430ef870 : nt!MiIssueHardFaultIo+0xb6
ffffeb07`a5748850 fffff805`43039a48     : 00000000`c0033333 00000000`00000001 00000000`76754000 ffffd884`50ac5940 : nt!MiIssueHardFault+0x29d
ffffeb07`a5748960 fffff805`4320715e     : ffffc50e`6f23d000 00007ffb`aa417f01 ffffeb07`a5748b80 ffffc50e`6ca35080 : nt!MmAccessFault+0x468
ffffeb07`a5748b00 00000000`7190d75e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`187cc5d4 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7190d75e


SYMBOL_NAME:  Ntfs!NtfsSetupSubrequest+90

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  90

FAILURE_BUCKET_ID:  AV_R_(null)_Ntfs!NtfsSetupSubrequest

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {95309bf7-1d9e-1f3b-1416-b6571fae4577}

Followup:     MachineOwner
---------
 
Son düzenleme:

Yeni konular

Yukarı