HP OMEN 103C_5335KV laptopta KMODE_EXCEPTION_NOT_HANDLED hatası

İşletim sistemi
Windows 10

Windows 7

Megapat
Katılım
1 Eylül 2017
Mesajlar
5.908
Makaleler
4
Çözümler
15
Daha fazla  
Cinsiyet
Erkek
Meslek
İşletim Sistemi
Açıkçası format attığımdan beri yani yaklaşık 4-5 aydır hiç hata almamıştım bugün üst üste 4 kere hata aldım. 1-2 gün önce virüs şüphem vardı Malwarebytes ardından Kaspersky kurdum, Malwarebytes 1 zararlı buldu onu karantinaya aldım sonra Kaspersky'ı kurdum ve şu an aktif. Sanırım sistem özelliklerini paylaşmama gerek yok, dosyalar içeriyor ama gerekirse eklerim. Şimdiden teşekkürler.

Minidump Dosyalarım
 
Selamlar, aşağıdaki ağ sürücülerinizi indirip kurun. Görünüşe göre onlar sorun yaratmış. Sonra da sonucu belirtirseniz sevinirim.



Not: Bilgisayar özellikleriniz yerine modelini yazmanız da yeterdi. Tabii ben sistem detaylarını bulup başlığı düzenledim o ayrı konu 😎

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8043757b38b, The address that the exception occurred at
Arg3: fffff80437e6dcb8, Parameter 0 of the exception
Arg4: fffff80437e85920, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9530

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 21543

Key : Analysis.Init.CPU.mSec
Value: 1015

Key : Analysis.Init.Elapsed.mSec
Value: 5241

Key : Analysis.Memory.CommitPeak.Mb
Value: 85

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021622-15562-01.dmp

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8043757b38b

BUGCHECK_P3: fffff80437e6dcb8

BUGCHECK_P4: fffff80437e85920

WRITE_ADDRESS: fffff80434efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80437e85920

EXCEPTION_PARAMETER1: fffff80437e6dcb8

EXCEPTION_PARAMETER2: fffff80437e85920

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffff80437e6dd60 -- (.trap 0xfffff80437e6dd60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc0000000028 rbx=0000000000000000 rcx=00000000017a2d42
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043757b38b rsp=fffff80437e6def0 rbp=0000000000003728
r8=0000000000000008 r9=0000000000000800 r10=ffffbc0000000028
r11=0000007ffffffff8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
tcpip+0x4b38b:
fffff804`3757b38b 8b4308 mov eax,dword ptr [rbx+8] ds:00000000`00000008=????????
Resetting default scope

STACK_TEXT:
fffff804`37e850a8 fffff804`3470f86f : 00000000`0000001e ffffffff`c0000005 fffff804`3757b38b fffff804`37e6dcb8 : nt!KeBugCheckEx
fffff804`37e850b0 fffff804`34610ca6 : fffff804`37e85920 fffff804`34540745 fffff804`37e6def0 fffff804`3757b38b : nt!KiFatalFilter+0x1f
fffff804`37e850f0 fffff804`345cd112 : fffff804`00000002 fffff804`342d3d10 fffff804`37e69000 fffff804`37e70000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
fffff804`37e85130 fffff804`34600272 : fffff804`342d3d10 fffff804`37e85710 fffff804`345cd070 00000000`00000000 : nt!_C_specific_handler+0xa2
fffff804`37e851a0 fffff804`344e6f87 : fffff804`37e85710 00000000`00000000 fffff804`37e6ee30 fffff804`344f8608 : nt!RtlpExecuteHandlerForException+0x12
fffff804`37e851d0 fffff804`344e5b86 : fffff804`37e6dcb8 fffff804`37e85e20 fffff804`37e6dcb8 00000000`00002118 : nt!RtlDispatchException+0x297
fffff804`37e858f0 fffff804`345f8242 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff804`37e85fb0 fffff804`345f8210 : fffff804`346094a5 ffff838b`64de86c8 fffff804`37e6dc80 00000000`00000002 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff804`37e6db78 fffff804`346094a5 : ffff838b`64de86c8 fffff804`37e6dc80 00000000`00000002 fffff804`371b5ffc : nt!KiExceptionDispatchOnExceptionStackContinue
fffff804`37e6db80 fffff804`34605643 : 00000000`00000000 00000000`00011353 00000000`00000001 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff804`37e6dd60 fffff804`3757b38b : 00000000`00000000 8a000003`f06009e3 00000000`00000000 fffff9c1`c6328c60 : nt!KiPageFault+0x443
fffff804`37e6def0 fffff804`3757bc54 : ffff838c`64f43750 00000000`00003728 ffff838c`64a81530 00000000`00000000 : tcpip+0x4b38b
fffff804`37e6df30 fffff804`3758db17 : ffff838c`00000000 ffff838c`400dac20 fffff804`37e6e080 fffff804`1825fc61 : tcpip+0x4bc54
fffff804`37e6dfb0 fffff804`37584c0e : 00000000`00000000 fffff804`3756d3f4 00000000`00000000 00000000`00000014 : tcpip+0x5db17
fffff804`37e6e420 fffff804`37583e2f : 00000000`00000028 fffff804`37e6e700 ffff838c`4dbc29f0 ffff838c`42120008 : tcpip+0x54c0e
fffff804`37e6e670 fffff804`37582ffd : ffff838c`00000000 00000000`00000001 ffffa800`b205fb22 ffff838c`56af4800 : tcpip+0x53e2f
fffff804`37e6e920 fffff804`375812d5 : 00000000`00000000 00000000`00000001 ffff838c`00000000 00000000`00000000 : tcpip+0x52ffd
fffff804`37e6ea10 fffff804`3755d169 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip+0x512d5
fffff804`37e6ea50 fffff804`375b325e : ffff838c`4a8ee5a0 ffff838c`4e1ce010 00000000`00000006 00000000`00000f00 : tcpip+0x2d169
fffff804`37e6ece0 fffff804`344f8608 : ffff838c`420ff240 00000000`00000002 fffff804`34f27a00 fffff804`37e6efd8 : tcpip+0x8325e
fffff804`37e6ee30 fffff804`344f857d : fffff804`375b3130 fffff804`37e6efd8 ffff838c`4007e370 fffff804`371623af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff804`37e6eea0 fffff804`3758f66d : 00000000`00000010 00000000`00000282 ffff838c`630fd760 fffff804`3782142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff804`37e6eee0 fffff804`3758ed4d : 00000000`00000001 fffff804`37e6f040 ffff838c`4e1ce010 fffff804`37e6f050 : tcpip+0x5f66d
fffff804`37e6ef40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip+0x5ed4d


SYMBOL_NAME: tcpip+4b38b

MODULE_NAME: tcpip

IMAGE_NAME: tcpip.sys

IMAGE_VERSION: 10.0.19041.1503

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 4b38b

FAILURE_BUCKET_ID: 0x1E_c0000005_tcpip!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f0660295-dca0-87ec-e8bb-9e7ef82578b0}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80155185230, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: ffff88872c4edcc0, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for NETIO.SYS

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6999

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 14612

Key : Analysis.Init.CPU.mSec
Value: 1109

Key : Analysis.Init.Elapsed.mSec
Value: 7349

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021522-14859-01.dmp

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80155185230

BUGCHECK_P3: 1

BUGCHECK_P4: ffff88872c4edcc0

WRITE_ADDRESS: fffff80141efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff88872c4edcc0

EXCEPTION_PARAMETER1: 0000000000000001

EXCEPTION_PARAMETER2: ffff88872c4edcc0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

TRAP_FRAME: 35b1d2f215b2dca3 -- (.trap 0x35b1d2f215b2dca3)
Unable to read trap frame at 35b1d2f2`15b2dca3

STACK_TEXT:
ffffd200`313f8158 fffff801`416f5aae : 00000000`0000001e ffffffff`c0000005 fffff801`55185230 00000000`00000001 : nt!KeBugCheckEx
ffffd200`313f8160 fffff801`41600272 : fffff801`416f5a8c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffd200`313f81a0 fffff801`414e6f87 : ffffd200`313f8710 00000000`00000000 ffffea05`a70b7fb0 fffff801`415fe3f5 : nt!RtlpExecuteHandlerForException+0x12
ffffd200`313f81d0 fffff801`414e5b86 : ffffea05`a70b76e8 ffffd200`313f8e20 ffffea05`a70b76e8 ffff8888`2f5ea070 : nt!RtlDispatchException+0x297
ffffd200`313f88f0 fffff801`415f8242 : 606dcdde`adc1ccfa 33357deb`4cfd1c6e 35b1d2f2`15b2dca3 ce213466`a3e2ba69 : nt!KiDispatchException+0x186
ffffd200`313f8fb0 fffff801`415f8210 : fffff801`416094a5 ffff8887`2c4edcc0 ffffea05`a70b76b0 ffffd200`313d8180 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffea05`a70b75a8 fffff801`416094a5 : ffff8887`2c4edcc0 ffffea05`a70b76b0 ffffd200`313d8180 fffff801`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffea05`a70b75b0 fffff801`41605643 : 00000000`00000000 fffff801`55185002 00000000`00000002 ffff8888`3129d080 : nt!KiExceptionDispatch+0x125
ffffea05`a70b7790 fffff801`55185230 : fffff801`5518511e ffff8888`3e770040 ffff8888`3c9c9460 ffffea05`00000000 : nt!KiPageFault+0x443
ffffea05`a70b7928 fffff801`5518511e : ffff8888`3e770040 ffff8888`3c9c9460 ffffea05`00000000 ffff8888`13ff4ae0 : Ndu!CarDisableCacheAwareReference+0x30
ffffea05`a70b7930 fffff801`4436ff9c : ffff8888`160c88a0 fffff801`551850a0 ffff8888`3e770040 00000000`00000000 : Ndu!NduFlowDelete+0x7e
ffffea05`a70b7960 ffff8888`160c88a0 : fffff801`551850a0 ffff8888`3e770040 00000000`00000000 ffff8888`38ff1cb0 : NETIO+0xff9c
ffffea05`a70b7968 fffff801`5518509f : ffff8888`3e770040 00000000`00000000 ffff8888`38ff1cb0 ffff8888`3e770010 : 0xffff8888`160c88a0
ffffea05`a70b7970 ffff8888`3e770040 : 00000000`00000000 ffff8888`38ff1cb0 ffff8888`3e770010 ffff8888`342f2bf8 : Ndu!NduWfpObjectCountDecrease+0x2b
ffffea05`a70b7978 00000000`00000000 : ffff8888`38ff1cb0 ffff8888`3e770010 ffff8888`342f2bf8 fffff801`4436fc2e : 0xffff8888`3e770040


SYMBOL_NAME: Ndu!CarDisableCacheAwareReference+30

MODULE_NAME: Ndu

IMAGE_NAME: Ndu.sys

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 30

FAILURE_BUCKET_ID: 0x1E_c0000005_W_Ndu!CarDisableCacheAwareReference

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4ec3ac88-3c37-93ea-f9d4-a2db387bdcac}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8037f896c44, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: ffffc608436f3d90, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7108

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 16827

Key : Analysis.Init.CPU.mSec
Value: 953

Key : Analysis.Init.Elapsed.mSec
Value: 3359

Key : Analysis.Memory.CommitPeak.Mb
Value: 87

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021622-14203-01.dmp

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8037f896c44

BUGCHECK_P3: 1

BUGCHECK_P4: ffffc608436f3d90

WRITE_ADDRESS: fffff803802fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc608436f3d90

EXCEPTION_PARAMETER1: 0000000000000001

EXCEPTION_PARAMETER2: ffffc608436f3d90

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: audiodg.exe

TRAP_FRAME: ffffeb8273c47400 -- (.trap 0xffffeb8273c47400)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffeb8273c475f8 rbx=0000000000000000 rcx=ffffc608436f3dc0
rdx=0000000070436f49 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037f896c44 rsp=ffffeb8273c47590 rbp=ffffc609638934e0
r8=ffffc609659a1be0 r9=0000000000000010 r10=0000fffff8037f95
r11=ffffa0fad4600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfReferenceObjectWithTag+0x24:
fffff803`7f896c44 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
Resetting default scope

STACK_TEXT:
ffffb101`0b335158 fffff803`7faf5aae : 00000000`0000001e ffffffff`c0000005 fffff803`7f896c44 00000000`00000001 : nt!KeBugCheckEx
ffffb101`0b335160 fffff803`7fa00272 : fffff803`7faf5a8c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffb101`0b3351a0 fffff803`7f8e6f87 : ffffb101`0b335710 00000000`00000000 ffffeb82`73c47fb0 fffff803`7f9fe3f5 : nt!RtlpExecuteHandlerForException+0x12
ffffb101`0b3351d0 fffff803`7f8e5b86 : ffffeb82`73c47358 ffffb101`0b335e20 ffffeb82`73c47358 00000000`00000000 : nt!RtlDispatchException+0x297
ffffb101`0b3358f0 fffff803`7f9f8242 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffb101`0b335fb0 fffff803`7f9f8210 : fffff803`7fa094a5 ffffc608`436f3d90 ffffeb82`73c47320 fffff803`9790aaa0 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffeb82`73c47218 fffff803`7fa094a5 : ffffc608`436f3d90 ffffeb82`73c47320 fffff803`9790aaa0 fffff803`9790aaa0 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffeb82`73c47220 fffff803`7fa05643 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
ffffeb82`73c47400 fffff803`7f896c44 : ffffc609`43c37ad0 fffff803`7ffb1149 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
ffffeb82`73c47590 fffff803`7f954b23 : ffffc608`436f3dc0 ffffc609`659a1be0 ffffc609`43c37ad0 00000000`00000001 : nt!ObfReferenceObjectWithTag+0x24
ffffeb82`73c475d0 fffff803`7f884ffe : ffffc609`638934e0 ffffeb82`73c47689 ffffc609`436f3dc0 ffffc609`63893ac3 : nt!IopUnloadSafeCompletion+0x43
ffffeb82`73c47600 fffff803`7f884ec7 : 00000000`00000001 00000000`00000000 ffffc609`5a314020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
ffffeb82`73c476f0 fffff803`841b811a : 00000000`00000000 ffffc609`43b82af0 ffffc609`638934e0 ffffc609`5b4eaa20 : nt!IofCompleteRequest+0x17
ffffeb82`73c47720 fffff803`841b5bbf : 00000000`00000002 ffffeb82`73c47858 ffffc609`638934e0 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
ffffeb82`73c477b0 fffff803`a1c0265e : ffffc609`53d73690 ffffc609`53d734f0 00000000`00000002 ffffc609`5a314400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
ffffeb82`73c47810 fffff803`a1c020e6 : ffffeb82`73c47ab8 ffffc609`5a314400 ffffeb82`00000060 ffffc609`4c36e401 : USBXHCI!Isoch_Stage_CompleteTD+0x47e
ffffeb82`73c478d0 fffff803`a1c01ef0 : ffffeb82`73c47a00 ffffeb82`73c47a00 00000000`00000000 ffffeb82`00000000 : USBXHCI!Isoch_ProcessTransferEventWithED1+0x1d6
ffffeb82`73c479b0 fffff803`a1c071c0 : 00000000`00000004 ffffeb82`73c47a88 00000000`00000008 ffffeb82`73c47a90 : USBXHCI!Isoch_EP_TransferEventHandler+0x10
ffffeb82`73c479e0 fffff803`a1c06cf5 : 00000000`00000780 000039f6`bc395300 ffffc609`4c27fa50 ffffc609`536a00d0 : USBXHCI!Endpoint_TransferEventHandler+0xb0
ffffeb82`73c47a40 fffff803`a1c069cc : ffffc609`3d0ebd70 ffffc609`3d0e0040 000039f6`bc37c748 ffffc609`3d0eb000 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
ffffeb82`73c47b40 fffff803`841b38f5 : 00000000`00000f44 00000000`00400a02 00000000`00000000 00000695`f00f15b6 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
ffffeb82`73c47b70 fffff803`7f89a3fe : ffffb101`0b318240 ffffc609`3d0c7000 ffffeb82`73c47e70 ffffb101`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
ffffeb82`73c47bb0 fffff803`7f8996e4 : ffffb101`0b315180 00000000`00000000 00000000`00000008 00000000`000145cc : nt!KiExecuteAllDpcs+0x30e
ffffeb82`73c47d20 fffff803`7f9fe3f5 : 00000000`00000000 ffffb101`0b315180 ffffb101`0c1958c0 000001f9`b0cdce38 : nt!KiRetireDpcList+0x1f4
ffffeb82`73c47fb0 fffff803`7f9fe1e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffeb82`7985fa80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


SYMBOL_NAME: USBXHCI!Isoch_Stage_CompleteTD+47e

MODULE_NAME: USBXHCI

IMAGE_NAME: USBXHCI.SYS

IMAGE_VERSION: 10.0.19041.1173

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 47e

FAILURE_BUCKET_ID: 0x1E_c0000005_W_USBXHCI!Isoch_Stage_CompleteTD

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ae77101c-bed7-4150-e20a-4680ac78c2f1}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff802cec45230, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: ffffca88352a8c80, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for NETIO.SYS

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7390

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 12186

Key : Analysis.Init.CPU.mSec
Value: 1093

Key : Analysis.Init.Elapsed.mSec
Value: 6206

Key : Analysis.Memory.CommitPeak.Mb
Value: 78

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021622-14937-01.dmp

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff802cec45230

BUGCHECK_P3: 1

BUGCHECK_P4: ffffca88352a8c80

WRITE_ADDRESS: fffff802716fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffca88352a8c80

EXCEPTION_PARAMETER1: 0000000000000001

EXCEPTION_PARAMETER2: ffffca88352a8c80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: lsass.exe

TRAP_FRAME: ffff8986ae667790 -- (.trap 0xffff8986ae667790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffca88352a8c80
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802cec45230 rsp=ffff8986ae667928 rbp=fffff802cec45002
r8=0000000000000001 r9=000000000000000c r10=ffffca893d55a6f0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
Ndu!CarDisableCacheAwareReference+0x30:
fffff802`cec45230 488701 xchg rax,qword ptr [rcx] ds:ffffca88`352a8c80=????????????????
Resetting default scope

STACK_TEXT:
ffffda80`9b8a9158 fffff802`70ef5aae : 00000000`0000001e ffffffff`c0000005 fffff802`cec45230 00000000`00000001 : nt!KeBugCheckEx
ffffda80`9b8a9160 fffff802`70e00272 : fffff802`70ef5a8c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffda80`9b8a91a0 fffff802`70ce6f87 : ffffda80`9b8a9710 00000000`00000000 ffff8986`ae667fb0 fffff802`70dfe3f5 : nt!RtlpExecuteHandlerForException+0x12
ffffda80`9b8a91d0 fffff802`70ce5b86 : ffff8986`ae6676e8 ffffda80`9b8a9e20 ffff8986`ae6676e8 ffffca89`286f72b0 : nt!RtlDispatchException+0x297
ffffda80`9b8a98f0 fffff802`70df8242 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffda80`9b8a9fb0 fffff802`70df8210 : fffff802`70e094a5 ffffca88`352a8c80 ffff8986`ae6676b0 ffffda80`9b889180 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8986`ae6675a8 fffff802`70e094a5 : ffffca88`352a8c80 ffff8986`ae6676b0 ffffda80`9b889180 ffffca89`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8986`ae6675b0 fffff802`70e05643 : 00000000`00000000 fffff802`cec45002 00000000`00000002 ffffca89`27ba0080 : nt!KiExceptionDispatch+0x125
ffff8986`ae667790 fffff802`cec45230 : fffff802`cec4511e ffffca89`2d189d60 ffffca89`2c407f90 ffff8986`00000000 : nt!KiPageFault+0x443
ffff8986`ae667928 fffff802`cec4511e : ffffca89`2d189d60 ffffca89`2c407f90 ffff8986`00000000 ffffca89`0e9573e0 : Ndu!CarDisableCacheAwareReference+0x30
ffff8986`ae667930 fffff802`7516ff9c : ffffca89`0d2b3010 fffff802`cec450a0 ffffca89`2d189d60 00000000`00000000 : Ndu!NduFlowDelete+0x7e
ffff8986`ae667960 ffffca89`0d2b3010 : fffff802`cec450a0 ffffca89`2d189d60 00000000`00000000 ffffca89`2fc19990 : NETIO+0xff9c
ffff8986`ae667968 fffff802`cec4509f : ffffca89`2d189d60 00000000`00000000 ffffca89`2fc19990 ffffca89`2d189d30 : 0xffffca89`0d2b3010
ffff8986`ae667970 ffffca89`2d189d60 : 00000000`00000000 ffffca89`2fc19990 ffffca89`2d189d30 ffffca89`3566aba8 : Ndu!NduWfpObjectCountDecrease+0x2b
ffff8986`ae667978 00000000`00000000 : ffffca89`2fc19990 ffffca89`2d189d30 ffffca89`3566aba8 fffff802`7516fc2e : 0xffffca89`2d189d60


SYMBOL_NAME: Ndu!CarDisableCacheAwareReference+30

MODULE_NAME: Ndu

IMAGE_NAME: Ndu.sys

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 30

FAILURE_BUCKET_ID: 0x1E_c0000005_W_Ndu!CarDisableCacheAwareReference

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4ec3ac88-3c37-93ea-f9d4-a2db387bdcac}

Followup: MachineOwner
---------[/CODE]
 
@Enes3078 hocam dediğinizi yaptım, bilgisayarı indirmeye bırakmıştım gece kapanmış gene mavi ekran yemiş gözüküyor, foruma girerken de yaptı. Foruma girerken Driver Irql Not Less Or Equal hatası verdi yanlışım yoksa. Rica versem onlara da bakabilir misiniz, belki gene ağ sürücü kaynaklıdır.
 
Evet, yine aynı. Ek olarak Bitdefender'ı kaldırın. Hâlihazırda Kaspersky kuruluyken farklı bir anti-virüs yazılımına ihtiyacınız yok. Birinden birini kaldırmanızı öneririm. Sonuçları bekliyor olacağım. :)

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff803721bbe10, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8047219eb62, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bddci.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8905

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 27465

Key : Analysis.Init.CPU.mSec
Value: 1000

Key : Analysis.Init.Elapsed.mSec
Value: 5308

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021622-15031-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: fffff803721bbe10

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8047219eb62

READ_ADDRESS: fffff80415afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff803721bbe10

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: avp.exe

TRAP_FRAME: ffff848a9bba6790 -- (.trap 0xffff848a9bba6790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff803721bbe00 rbx=0000000000000000 rcx=3457e677f3be0000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8047219eb62 rsp=ffff848a9bba6920 rbp=ffff848a9bba69a1
r8=0000000000002c4c r9=0000000000000000 r10=0000000000000000
r11=ffff848a9bba6820 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
bddci+0x2eb62:
fffff804`7219eb62 488b5810 mov rbx,qword ptr [rax+10h] ds:fffff803`721bbe10=????????????????
Resetting default scope

STACK_TEXT:
ffff848a`9bba6648 fffff804`15209369 : 00000000`0000000a fffff803`721bbe10 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff848a`9bba6650 fffff804`15205669 : 00000000`00000000 ffff848a`9bba6b30 ffff848a`9bba68d8 ffff848a`9bba6890 : nt!KiBugCheckDispatch+0x69
ffff848a`9bba6790 fffff804`7219eb62 : 00000000`000000a0 00000000`00000000 ffff848a`9bba6a21 fffff804`1508cab1 : nt!KiPageFault+0x469
ffff848a`9bba6920 00000000`000000a0 : 00000000`00000000 ffff848a`9bba6a21 fffff804`1508cab1 ffff848a`9bba6b30 : bddci+0x2eb62
ffff848a`9bba6928 00000000`00000000 : ffff848a`9bba6a21 fffff804`1508cab1 ffff848a`9bba6b30 ffff8a0f`8a204780 : 0xa0


SYMBOL_NAME: bddci+2eb62

MODULE_NAME: bddci

IMAGE_NAME: bddci.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 2eb62

FAILURE_BUCKET_ID: AV_bddci!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {26543f81-49dd-6bd2-b0fe-b3443123a4f7}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8001b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for rt640x64.sys
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 12875

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 32900

Key : Analysis.Init.CPU.mSec
Value: 1092

Key : Analysis.Init.Elapsed.mSec
Value: 3374

Key : Analysis.Memory.CommitPeak.Mb
Value: 98

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021622-13765-01.dmp

BUGCHECK_CODE: 133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff8001b4fb320

DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8002046d9a0 -- (.trap 0xfffff8002046d9a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000005e51060008 rbx=0000000000000000 rcx=ffffe007df1f8dc0
rdx=ffffe00701f1c9e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001abff2e7 rsp=fffff8002046db30 rbp=fffff8001faba000
r8=ffffe00701f1c9e0 r9=ffffe007df1f8f40 r10=ffffe007df1f8dc0
r11=ffffaa7ede800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!ExpInterlockedPopEntrySListFault:
fffff800`1abff2e7 498b08 mov rcx,qword ptr [r8] ds:ffffe007`01f1c9e0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffff800`2047ec88 fffff800`1ac1f6fa : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff800`2047ec90 fffff800`1aa1c3cd : 0000141b`9eeb8ff5 fffff800`18030180 00000000`00000246 00000000`00068c7d : nt!KeAccumulateTicks+0x20654a
fffff800`2047ecf0 fffff800`1aa1c971 : 00000000`00068700 00000000`0003e743 fffff800`18030180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff800`2047ed40 fffff800`1aa167e3 : fffff800`18030180 00000000`00000000 fffff800`1b4316a8 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff800`2047ee80 fffff800`1aa1f1a2 : fffff800`2046d810 fffff800`2046d890 fffff800`2046d800 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff800`2047ef30 fffff800`1aade205 : 0000000f`9d30b9a4 fffff800`1b4f3aa0 fffff800`1b4f3b50 ffff3f83`4222f301 : nt!HalpTimerClockInterrupt+0xe2
fffff800`2047ef60 fffff800`1abf8e5a : fffff800`2046d890 fffff800`1b4f3aa0 fffff800`2046dcb0 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff800`2047efb0 fffff800`1abf93c7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff800`2046d810 fffff800`1ac05515 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff800`2046d9a0 fffff800`1abff2e7 : ffffe007`df1f8dc0 fffff800`1fa5b1fc 00000000`00000001 fffff800`2046e100 : nt!KiPageFault+0x315
fffff800`2046db30 fffff800`1fa5b1fc : 00000000`00000001 fffff800`2046e100 00000000`00000002 fffff800`2046e110 : nt!ExpInterlockedPopEntrySListFault
fffff800`2046db40 fffff800`1fa45634 : ffffe007`fbf283d0 fffff800`1fa67ce6 00000000`00000002 fffff800`1fa95ffc : NETIO!PplGenericAllocateFunction+0x1c
fffff800`2046db80 fffff800`1fa96842 : ffffe007`fb3cfbe0 00000000`00000001 ffffe008`011e7c50 00000000`00000000 : NETIO!WfpAllocateFromPerProcessorLookasideList+0x70
fffff800`2046dbc0 fffff800`1fa6d1e5 : ffffe007`fd285450 ffffe007`fb3cfbe0 fffff800`2046dd40 ffffe008`011e7c20 : NETIO!StreamPendInspection+0x1ba
fffff800`2046dc40 fffff800`1fa474ba : 00000000`00000000 00000000`00000000 fffff800`20460000 ffffe007`f9a60010 : NETIO!StreamClassify+0x25bd5
fffff800`2046dde0 fffff800`1fa46dcd : 00000000`00000000 ffffe007`f84be680 fffff800`1fa426d0 00000000`00000000 : NETIO!StreamCommonInspect+0x282
fffff800`2046e1c0 fffff800`1fb85b3f : ffffe007`e75ba200 ffffe007`faee2400 ffffe007`faee2668 ffffe007`faee24b0 : NETIO!WfpStreamInspectReceive+0x18d
fffff800`2046e250 fffff800`1fb84a8f : 00000000`00000000 fffff800`1fb6d3f4 00000000`00000000 00000000`00000014 : tcpip!TcpTcbFastDatagram+0xe1f
fffff800`2046e420 fffff800`1fb83e2f : 00000000`00000028 fffff800`2046e700 ffffe007`e75b8780 ffffe007`df30f008 : tcpip!TcpTcbReceive+0x18f
fffff800`2046e670 fffff800`1fb82ffd : ffffe007`00000000 00000000`00000001 ffffba81`2e81ba22 ffffe007`f3d95c40 : tcpip!TcpMatchReceive+0x51f
fffff800`2046e920 fffff800`1fb812d5 : 00000000`00000000 00000000`00000001 ffffe008`00000000 00000000`00000000 : tcpip!TcpReceive+0x44d
fffff800`2046ea10 fffff800`1fb5d169 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x25
fffff800`2046ea50 fffff800`1fbb325e : ffffe007`eaffee60 ffffe007`ef491660 00000000`00000006 fffff800`1aa87900 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff800`2046ece0 fffff800`1aaf8608 : ffffe007`df3e33c0 00000000`00000002 fffff800`1b527a00 fffff800`2046efd8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff800`2046ee30 fffff800`1aaf857d : fffff800`1fbb3130 fffff800`2046efd8 ffffe007`da47e370 fffff800`1fa423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff800`2046eea0 fffff800`1fb8f66d : 00000000`00000246 00000000`1aa87181 ffffe007`f45f6770 fffff800`1fe2142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff800`2046eee0 fffff800`1fb8ed4d : 00000000`00000001 fffff800`2046f040 ffffe007`ef491660 fffff800`2046f050 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff800`2046ef40 fffff800`1f8d1eb0 : ffffe007`efd9fbb0 fffff800`31bfc43b 00000000`00000001 fffff800`2046f350 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff800`2046f1f0 fffff800`1f8d1ccb : ffffe007`eb30c8b0 00000000`00000001 ffffe007`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff800`2046f2d0 fffff800`1f8d7ef0 : ffffe007`dfde81a0 ffffe007`ef622801 ffffe007`dfde81a0 fffff800`1b527a01 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff800`2046f350 fffff800`1f90dfef : ffffe007`e75ba2a0 fffff800`2046f421 00000000`00000000 fffff800`1aa934fc : ndis!ndisCallReceiveHandler+0x60
fffff800`2046f3a0 fffff800`1f8d4a94 : 00000000`0006877c 00000000`00000001 ffffe007`dfde81a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff800`2046f470 fffff800`38286ae8 : ffffe007`e7513000 ffffe007`e7513000 00000000`00000000 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff800`2046f500 ffffe007`e7513000 : ffffe007`e7513000 00000000`00000000 00000000`00000000 00000000`00000001 : rt640x64+0x26ae8
fffff800`2046f508 ffffe007`e7513000 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff800`2046f670 : 0xffffe007`e7513000
fffff800`2046f510 00000000`00000000 : 00000000`00000000 00000000`00000001 fffff800`2046f670 00000000`00000001 : 0xffffe007`e7513000


SYMBOL_NAME: NETIO!PplGenericAllocateFunction+1c

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

IMAGE_VERSION: 10.0.19041.1526

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 1c

FAILURE_BUCKET_ID: 0x133_DPC_NETIO!PplGenericAllocateFunction

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {34812c13-3484-8100-3f56-b8a48cf6380b}

Followup: MachineOwner
---------[/CODE]
 
Evet, yine aynı. Ek olarak Bitdefender'ı kaldırın. Hâlihazırda Kaspersky kuruluyken farklı bir anti-virüs yazılımına ihtiyacınız yok. Birinden birini kaldırmanızı öneririm. Sonuçları bekliyor olacağım. :)

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff803721bbe10, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8047219eb62, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bddci.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8905

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 27465

Key : Analysis.Init.CPU.mSec
Value: 1000

Key : Analysis.Init.Elapsed.mSec
Value: 5308

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021622-15031-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: fffff803721bbe10

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8047219eb62

READ_ADDRESS: fffff80415afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff803721bbe10

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: avp.exe

TRAP_FRAME: ffff848a9bba6790 -- (.trap 0xffff848a9bba6790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff803721bbe00 rbx=0000000000000000 rcx=3457e677f3be0000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8047219eb62 rsp=ffff848a9bba6920 rbp=ffff848a9bba69a1
r8=0000000000002c4c r9=0000000000000000 r10=0000000000000000
r11=ffff848a9bba6820 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
bddci+0x2eb62:
fffff804`7219eb62 488b5810 mov rbx,qword ptr [rax+10h] ds:fffff803`721bbe10=????????????????
Resetting default scope

STACK_TEXT:
ffff848a`9bba6648 fffff804`15209369 : 00000000`0000000a fffff803`721bbe10 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff848a`9bba6650 fffff804`15205669 : 00000000`00000000 ffff848a`9bba6b30 ffff848a`9bba68d8 ffff848a`9bba6890 : nt!KiBugCheckDispatch+0x69
ffff848a`9bba6790 fffff804`7219eb62 : 00000000`000000a0 00000000`00000000 ffff848a`9bba6a21 fffff804`1508cab1 : nt!KiPageFault+0x469
ffff848a`9bba6920 00000000`000000a0 : 00000000`00000000 ffff848a`9bba6a21 fffff804`1508cab1 ffff848a`9bba6b30 : bddci+0x2eb62
ffff848a`9bba6928 00000000`00000000 : ffff848a`9bba6a21 fffff804`1508cab1 ffff848a`9bba6b30 ffff8a0f`8a204780 : 0xa0


SYMBOL_NAME: bddci+2eb62

MODULE_NAME: bddci

IMAGE_NAME: bddci.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 2eb62

FAILURE_BUCKET_ID: AV_bddci!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {26543f81-49dd-6bd2-b0fe-b3443123a4f7}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8001b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for rt640x64.sys
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 12875

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 32900

Key : Analysis.Init.CPU.mSec
Value: 1092

Key : Analysis.Init.Elapsed.mSec
Value: 3374

Key : Analysis.Memory.CommitPeak.Mb
Value: 98

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021622-13765-01.dmp

BUGCHECK_CODE: 133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff8001b4fb320

DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8002046d9a0 -- (.trap 0xfffff8002046d9a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000005e51060008 rbx=0000000000000000 rcx=ffffe007df1f8dc0
rdx=ffffe00701f1c9e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001abff2e7 rsp=fffff8002046db30 rbp=fffff8001faba000
r8=ffffe00701f1c9e0 r9=ffffe007df1f8f40 r10=ffffe007df1f8dc0
r11=ffffaa7ede800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!ExpInterlockedPopEntrySListFault:
fffff800`1abff2e7 498b08 mov rcx,qword ptr [r8] ds:ffffe007`01f1c9e0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffff800`2047ec88 fffff800`1ac1f6fa : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff800`2047ec90 fffff800`1aa1c3cd : 0000141b`9eeb8ff5 fffff800`18030180 00000000`00000246 00000000`00068c7d : nt!KeAccumulateTicks+0x20654a
fffff800`2047ecf0 fffff800`1aa1c971 : 00000000`00068700 00000000`0003e743 fffff800`18030180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff800`2047ed40 fffff800`1aa167e3 : fffff800`18030180 00000000`00000000 fffff800`1b4316a8 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff800`2047ee80 fffff800`1aa1f1a2 : fffff800`2046d810 fffff800`2046d890 fffff800`2046d800 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff800`2047ef30 fffff800`1aade205 : 0000000f`9d30b9a4 fffff800`1b4f3aa0 fffff800`1b4f3b50 ffff3f83`4222f301 : nt!HalpTimerClockInterrupt+0xe2
fffff800`2047ef60 fffff800`1abf8e5a : fffff800`2046d890 fffff800`1b4f3aa0 fffff800`2046dcb0 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff800`2047efb0 fffff800`1abf93c7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff800`2046d810 fffff800`1ac05515 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff800`2046d9a0 fffff800`1abff2e7 : ffffe007`df1f8dc0 fffff800`1fa5b1fc 00000000`00000001 fffff800`2046e100 : nt!KiPageFault+0x315
fffff800`2046db30 fffff800`1fa5b1fc : 00000000`00000001 fffff800`2046e100 00000000`00000002 fffff800`2046e110 : nt!ExpInterlockedPopEntrySListFault
fffff800`2046db40 fffff800`1fa45634 : ffffe007`fbf283d0 fffff800`1fa67ce6 00000000`00000002 fffff800`1fa95ffc : NETIO!PplGenericAllocateFunction+0x1c
fffff800`2046db80 fffff800`1fa96842 : ffffe007`fb3cfbe0 00000000`00000001 ffffe008`011e7c50 00000000`00000000 : NETIO!WfpAllocateFromPerProcessorLookasideList+0x70
fffff800`2046dbc0 fffff800`1fa6d1e5 : ffffe007`fd285450 ffffe007`fb3cfbe0 fffff800`2046dd40 ffffe008`011e7c20 : NETIO!StreamPendInspection+0x1ba
fffff800`2046dc40 fffff800`1fa474ba : 00000000`00000000 00000000`00000000 fffff800`20460000 ffffe007`f9a60010 : NETIO!StreamClassify+0x25bd5
fffff800`2046dde0 fffff800`1fa46dcd : 00000000`00000000 ffffe007`f84be680 fffff800`1fa426d0 00000000`00000000 : NETIO!StreamCommonInspect+0x282
fffff800`2046e1c0 fffff800`1fb85b3f : ffffe007`e75ba200 ffffe007`faee2400 ffffe007`faee2668 ffffe007`faee24b0 : NETIO!WfpStreamInspectReceive+0x18d
fffff800`2046e250 fffff800`1fb84a8f : 00000000`00000000 fffff800`1fb6d3f4 00000000`00000000 00000000`00000014 : tcpip!TcpTcbFastDatagram+0xe1f
fffff800`2046e420 fffff800`1fb83e2f : 00000000`00000028 fffff800`2046e700 ffffe007`e75b8780 ffffe007`df30f008 : tcpip!TcpTcbReceive+0x18f
fffff800`2046e670 fffff800`1fb82ffd : ffffe007`00000000 00000000`00000001 ffffba81`2e81ba22 ffffe007`f3d95c40 : tcpip!TcpMatchReceive+0x51f
fffff800`2046e920 fffff800`1fb812d5 : 00000000`00000000 00000000`00000001 ffffe008`00000000 00000000`00000000 : tcpip!TcpReceive+0x44d
fffff800`2046ea10 fffff800`1fb5d169 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x25
fffff800`2046ea50 fffff800`1fbb325e : ffffe007`eaffee60 ffffe007`ef491660 00000000`00000006 fffff800`1aa87900 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff800`2046ece0 fffff800`1aaf8608 : ffffe007`df3e33c0 00000000`00000002 fffff800`1b527a00 fffff800`2046efd8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff800`2046ee30 fffff800`1aaf857d : fffff800`1fbb3130 fffff800`2046efd8 ffffe007`da47e370 fffff800`1fa423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff800`2046eea0 fffff800`1fb8f66d : 00000000`00000246 00000000`1aa87181 ffffe007`f45f6770 fffff800`1fe2142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff800`2046eee0 fffff800`1fb8ed4d : 00000000`00000001 fffff800`2046f040 ffffe007`ef491660 fffff800`2046f050 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff800`2046ef40 fffff800`1f8d1eb0 : ffffe007`efd9fbb0 fffff800`31bfc43b 00000000`00000001 fffff800`2046f350 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff800`2046f1f0 fffff800`1f8d1ccb : ffffe007`eb30c8b0 00000000`00000001 ffffe007`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff800`2046f2d0 fffff800`1f8d7ef0 : ffffe007`dfde81a0 ffffe007`ef622801 ffffe007`dfde81a0 fffff800`1b527a01 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff800`2046f350 fffff800`1f90dfef : ffffe007`e75ba2a0 fffff800`2046f421 00000000`00000000 fffff800`1aa934fc : ndis!ndisCallReceiveHandler+0x60
fffff800`2046f3a0 fffff800`1f8d4a94 : 00000000`0006877c 00000000`00000001 ffffe007`dfde81a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff800`2046f470 fffff800`38286ae8 : ffffe007`e7513000 ffffe007`e7513000 00000000`00000000 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff800`2046f500 ffffe007`e7513000 : ffffe007`e7513000 00000000`00000000 00000000`00000000 00000000`00000001 : rt640x64+0x26ae8
fffff800`2046f508 ffffe007`e7513000 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff800`2046f670 : 0xffffe007`e7513000
fffff800`2046f510 00000000`00000000 : 00000000`00000000 00000000`00000001 fffff800`2046f670 00000000`00000001 : 0xffffe007`e7513000


SYMBOL_NAME: NETIO!PplGenericAllocateFunction+1c

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

IMAGE_VERSION: 10.0.19041.1526

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 1c

FAILURE_BUCKET_ID: 0x133_DPC_NETIO!PplGenericAllocateFunction

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {34812c13-3484-8100-3f56-b8a48cf6380b}

Followup: MachineOwner
---------[/CODE]
Bitdefender'i Kaspersky'i kurarken kaldırdım zaten eklemeyi unutmuşum, gün içinde herhangi bir sorun olmadı çözüldü galiba. Teşekkürler :)

@Enes3078 hocam sabah açtıktan hemen sonra bir mavi ekran daha yedim. Sanırım format şart gibi. Şu adı sanı duyulmayan antivirüslerin birinin reklamı çıktı saatin orada. "Program ekle veya kaldır"da da yeni bir şey gözükmüyor.
 
Son düzenleme:
Adı sanı duyulmayan derken? En iyisi aşağıdaki toollardan sizin önceki kurmuş olduğunuz ürünün aracını seçip kaldırmayı deneyin. Yine olmazsa güvenli moda girip bddci.sys dosyasını kaldırın.

Ek olarak sürücü güncelleyici yazılım kullanıyor musunuz? Son olarak attığım iki sürücüyü de kurmuştunuz, değil mi?


[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff802df675230, The address that the exception occurred at
Arg3: fffff181e850f3d8, Exception Record Address
Arg4: ffff9780b4e86920, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bddci.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Write

Key : Analysis.CPU.mSec
Value: 10656

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 21936

Key : Analysis.Init.CPU.mSec
Value: 1124

Key : Analysis.Init.Elapsed.mSec
Value: 5425

Key : Analysis.Memory.CommitPeak.Mb
Value: 99

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021722-15640-01.dmp

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff802df675230

BUGCHECK_P3: fffff181e850f3d8

BUGCHECK_P4: ffff9780b4e86920

EXCEPTION_RECORD: fffff181e850f3d8 -- (.exr 0xfffff181e850f3d8)
ExceptionAddress: fffff802df675230 (Ndu!CarDisableCacheAwareReference+0x0000000000000030)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: ffffc60551d9a9c0
Attempt to write to address ffffc60551d9a9c0

CONTEXT: ffff9780b4e86920 -- (.cxr 0xffff9780b4e86920)
rax=0000000000000001 rbx=ffffc60654784d10 rcx=ffffc60551d9a9c0
rdx=0000000000000000 rsi=ffffc6064dfe3d00 rdi=ffffc60649c6ce00
rip=fffff802df675230 rsp=fffff181e850f618 rbp=fffff802df675002
r8=0000000000000001 r9=000000000000000c r10=ffffc6063504fed0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000800
r14=ffffc6064dfe3d00 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
Ndu!CarDisableCacheAwareReference+0x30:
fffff802`df675230 488701 xchg rax,qword ptr [rcx] ds:002b:ffffc605`51d9a9c0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

WRITE_ADDRESS: fffff80282efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc60551d9a9c0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000001

EXCEPTION_PARAMETER2: ffffc60551d9a9c0

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
fffff181`e850f618 fffff802`df67511e : ffffc606`4dfe3d00 ffffc606`54784d10 fffff181`00000000 ffffc606`2fd7e260 : Ndu!CarDisableCacheAwareReference+0x30
fffff181`e850f620 fffff802`8556ff9c : ffffc606`2fd3f8a0 fffff802`df6750a0 ffffc606`4dfe3d00 00000000`00000000 : Ndu!NduFlowDelete+0x7e
fffff181`e850f650 fffff802`8556fc2e : 00000000`0000ff02 ffffc606`4dfe3d00 fffff181`e850f7f0 ffffc606`2fd6fc80 : NETIO!WfpProcessFlowDeleteFast+0xe4
fffff181`e850f690 fffff802`85993969 : 00007fff`0000ff00 badbadfa`badbadfa fffff181`e850f7f0 ffffc606`4dfe3cd0 : NETIO!KfdAleNotifyFlowDeletion+0x14e
fffff181`e850f6f0 fffff802`859917a3 : 00000000`00000103 fffff181`e850fa78 00000000`00000000 ffffc606`5efc5f50 : tcpip!TcpCleanupTcbWorkQueueRoutine+0x149
fffff181`e850f850 fffff802`8593aa1b : 00000000`00000000 00000000`696f7777 00000000`00000000 fffff802`855af103 : tcpip!TcpCleanupTcb+0x47
fffff181`e850f880 fffff802`85a2069a : 00000000`00000000 ffffc606`4b45ed90 fffff802`855af0f0 fffff802`855af18b : tcpip!TcpDereferenceTcb+0x2b
fffff181`e850f8b0 fffff802`85a610b4 : ffffc606`4e85b738 00000000`00000000 fffff181`e850fa70 fffff802`855aeeb7 : tcpip!InetInspectDereferenceEndpoint+0x1a
fffff181`e850f8e0 fffff802`85a60313 : ffffc606`5e37f430 ffffc606`611862a0 ffffc606`5efc5f50 ffffc606`611862a0 : tcpip!AleReleseDeactivateNotifyContext+0x74
fffff181`e850f930 fffff802`855ae8ba : 0000c6a5`0000aabf 00000000`00000001 e2f18450`09958f11 fffff181`e850fa78 : tcpip!AleNotifyEndpointDeactivateComplete+0x23
fffff181`e850f960 fffff802`85c37965 : ffffc606`611862a0 ffffc606`4b45ee30 fffff181`e850fa70 ffffc606`611862a0 : NETIO!FeCompleteClassify+0x12a
fffff181`e850f9b0 fffff802`df63298b : fffff802`df605730 fffff802`82bb1149 ffffc606`00000000 fffff802`df63558a : fwpkclnt!FwpsCompleteClassify0+0x15
fffff181`e850f9e0 fffff802`df605730 : fffff802`82bb1149 ffffc606`00000000 fffff802`df63558a fffff802`df634b90 : bddci+0x3298b
fffff181`e850f9e8 fffff802`82bb1149 : ffffc606`00000000 fffff802`df63558a fffff802`df634b90 fffff802`df632920 : bddci+0x5730
fffff181`e850f9f0 fffff802`df635799 : 00000001`00000001 fffff802`df6515f8 fffff802`df6515f8 ffffc606`49fe1e00 : nt!ExFreePool+0x9
fffff181`e850fa20 00000001`00000001 : fffff802`df6515f8 fffff802`df6515f8 ffffc606`49fe1e00 ffffc606`49fe1f88 : bddci+0x35799
fffff181`e850fa28 fffff802`df6515f8 : fffff802`df6515f8 ffffc606`49fe1e00 ffffc606`49fe1f88 fffff802`df633a2c : 0x00000001`00000001
fffff181`e850fa30 fffff802`df6515f8 : ffffc606`49fe1e00 ffffc606`49fe1f88 fffff802`df633a2c fffff802`df605730 : bddci+0x515f8
fffff181`e850fa38 ffffc606`49fe1e00 : ffffc606`49fe1f88 fffff802`df633a2c fffff802`df605730 ffffc606`49fe1f88 : bddci+0x515f8
fffff181`e850fa40 ffffc606`49fe1f88 : fffff802`df633a2c fffff802`df605730 ffffc606`49fe1f88 fffff181`e850fac9 : 0xffffc606`49fe1e00
fffff181`e850fa48 fffff802`df633a2c : fffff802`df605730 ffffc606`49fe1f88 fffff181`e850fac9 ffffc606`49fe1e00 : 0xffffc606`49fe1f88
fffff181`e850fa50 fffff802`df605730 : ffffc606`49fe1f88 fffff181`e850fac9 ffffc606`49fe1e00 ffff9780`b4ee5101 : bddci+0x33a2c
fffff181`e850fa58 ffffc606`49fe1f88 : fffff181`e850fac9 ffffc606`49fe1e00 ffff9780`b4ee5101 00000000`00000001 : bddci+0x5730
fffff181`e850fa60 fffff181`e850fac9 : ffffc606`49fe1e00 ffff9780`b4ee5101 00000000`00000001 ffffc606`4b45f010 : 0xffffc606`49fe1f88
fffff181`e850fa68 ffffc606`49fe1e00 : ffff9780`b4ee5101 00000000`00000001 ffffc606`4b45f010 ffffc606`4b45ee30 : 0xfffff181`e850fac9
fffff181`e850fa70 ffff9780`b4ee5101 : 00000000`00000001 ffffc606`4b45f010 ffffc606`4b45ee30 00000000`00000003 : 0xffffc606`49fe1e00
fffff181`e850fa78 00000000`00000001 : ffffc606`4b45f010 ffffc606`4b45ee30 00000000`00000003 00000001`00000001 : 0xffff9780`b4ee5101
fffff181`e850fa80 ffffc606`4b45f010 : ffffc606`4b45ee30 00000000`00000003 00000001`00000001 fffff802`df6515f8 : 0x1
fffff181`e850fa88 ffffc606`4b45ee30 : 00000000`00000003 00000001`00000001 fffff802`df6515f8 01d823e6`00000000 : 0xffffc606`4b45f010
fffff181`e850fa90 00000000`00000003 : 00000001`00000001 fffff802`df6515f8 01d823e6`00000000 ffffc606`49fe1e00 : 0xffffc606`4b45ee30
fffff181`e850fa98 00000001`00000001 : fffff802`df6515f8 01d823e6`00000000 ffffc606`49fe1e00 fffff181`e850fad8 : 0x3
fffff181`e850faa0 fffff802`df6515f8 : 01d823e6`00000000 ffffc606`49fe1e00 fffff181`e850fad8 00000000`00000000 : 0x00000001`00000001
fffff181`e850faa8 01d823e6`00000000 : ffffc606`49fe1e00 fffff181`e850fad8 00000000`00000000 ffffc606`49fe1e00 : bddci+0x515f8
fffff181`e850fab0 ffffc606`49fe1e00 : fffff181`e850fad8 00000000`00000000 ffffc606`49fe1e00 fffff181`e850fad8 : 0x01d823e6`00000000
fffff181`e850fab8 fffff181`e850fad8 : 00000000`00000000 ffffc606`49fe1e00 fffff181`e850fad8 00000000`00000001 : 0xffffc606`49fe1e00
fffff181`e850fac0 00000000`00000000 : ffffc606`49fe1e00 fffff181`e850fad8 00000000`00000001 00000000`00000001 : 0xfffff181`e850fad8


SYMBOL_NAME: Ndu!CarDisableCacheAwareReference+30

MODULE_NAME: Ndu

IMAGE_NAME: Ndu.sys

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .cxr 0xffff9780b4e86920 ; kb

BUCKET_ID_FUNC_OFFSET: 30

FAILURE_BUCKET_ID: AV_Ndu!CarDisableCacheAwareReference

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {424de282-dcea-0ebb-3180-99b4fea5051c}

Followup: MachineOwner
---------[/CODE]
 
Adı sanı duyulmayan derken? En iyisi aşağıdaki toollardan sizin önceki kurmuş olduğunuz ürünün aracını seçip kaldırmayı deneyin. Yine olmazsa güvenli moda girip bddci.sys dosyasını kaldırın.

Ek olarak sürücü güncelleyici yazılım kullanıyor musunuz? Son olarak attığım iki sürücüyü de kurmuştunuz, değil mi?

Adı cidden tanıdık değildi reklam çıktığı an kapattım. Bitdefender işini çözmüştüm 2 gün önce falan. Sürücü güncelleme yazılımı kullanmıyorum ve evet attığınız sürücüleri kurdum. Sanırım geri yüklemem de yok, temizinden format yolu gözüküyor bana.
 

Yeni konular

Geri
Yukarı