*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000b900ff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8036720041c, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1890
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13478
Key : Analysis.Init.CPU.mSec
Value: 46
Key : Analysis.Init.Elapsed.mSec
Value: 8898
Key : Analysis.Memory.CommitPeak.Mb
Value: 151
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 092522-7484-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: b900ff
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8036720041c
WRITE_ADDRESS: fffff80367afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000b900ff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
TRAP_FRAME: ffffe789dcdb1860 -- (.trap 0xffffe789dcdb1860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000b900ff rbx=0000000000000000 rcx=00000000c0000100
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036720041c rsp=ffffe789dcdb19f0 rbp=000fe47fbd9bbfff
r8=ffffd183cf9e0340 r9=00000001000005f8 r10=00000000041002f7
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!SwapContext+0x3ec:
fffff803`6720041c 0100 add dword ptr [rax],eax ds:00000000`00b900ff=????????
Resetting default scope
MISALIGNED_IP:
nt!SwapContext+3ec
fffff803`6720041c 0100 add dword ptr [rax],eax
STACK_TEXT:
ffffe789`dcdb1718 fffff803`6720af69 : 00000000`0000000a 00000000`00b900ff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffe789`dcdb1720 fffff803`67207269 : 00000000`00000000 fffff803`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffe789`dcdb1860 fffff803`6720041c : ffffbf80`1b7d7180 00000000`00000000 00000000`00000000 fffff803`67014934 : nt!KiPageFault+0x469
ffffe789`dcdb19f0 fffff803`671ffd56 : 00000000`4b80b5f7 00000000`00000000 00000000`40a00001 00000000`00000000 : nt!SwapContext+0x3ec
ffffe789`dcdb1a30 fffff803`670130b0 : ffffbf80`1b7d7180 00000000`ffffffff ffffe789`dcdb1c80 00000000`00000fff : nt!KiSwapContext+0x76
ffffe789`dcdb1b70 fffff803`670125df : ffffd183`00000005 00000000`00000004 ffffe789`dcdb1d30 ffffbf80`00000000 : nt!KiSwapThread+0x500
ffffe789`dcdb1c20 fffff803`67011e83 : 00000000`00000004 fffff803`00000000 00000001`ffffff00 ffffd183`ba80c740 : nt!KiCommitThreadWait+0x14f
ffffe789`dcdb1cc0 fffff803`67014d5d : ffffe789`dcdb1ea8 00000000`0000001b 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffffe789`dcdb1db0 fffff803`670106d0 : ffffd183`ca11b290 ffffe789`dcdb1e90 ffffe789`00010224 fffff803`67161cf0 : nt!ExpWaitForResource+0x6d
ffffe789`dcdb1e30 fffff803`6700f8dc : ffffe789`002e1e67 00000000`00000001 ffffe789`d804ede0 ffffd183`ce01b0c0 : nt!ExpAcquireResourceExclusiveLite+0x320
ffffe789`dcdb1f00 fffffa1f`e5048e95 : 00000000`00000000 00000000`00989680 00000000`00000001 ffffd183`cb3027d0 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3c
ffffe789`dcdb1f40 fffffa1f`e4c4e9b3 : 00000155`00000001 00000155`a13cfde0 00000053`f20cf078 00000000`00000001 : win32kbase!EnterCrit+0x85
ffffe789`dcdb2060 fffffa1f`e4af6fd0 : ffffd183`d5385018 00000155`a13cfde0 00000001`00000000 00000000`000014bf : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x43
ffffe789`dcdb2990 fffff803`6720a9b5 : 00000000`00000020 fffffa1f`e4cd6e25 00000265`0000023a 00000265`0000023a : win32k!NtUserMsgWaitForMultipleObjectsEx+0x20
ffffe789`dcdb29d0 00007ff9`a3e1a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000053`f20cf058 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a3e1a104
SYMBOL_NAME: win32kbase!EnterCrit+85
MODULE_NAME: GenuineIntel
IMAGE_VERSION: 10.0.19041.1949
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: GenuineIntel.sys
FAILURE_BUCKET_ID: IP_MISALIGNED_GenuineIntel.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e930d917-b247-3f7f-23cb-88a0c9f1b274}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80785bd066b, Address of the instruction which caused the BugCheck
Arg3: ffff870b5215e560, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2187
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 37640
Key : Analysis.Init.CPU.mSec
Value: 46
Key : Analysis.Init.Elapsed.mSec
Value: 7039
Key : Analysis.Memory.CommitPeak.Mb
Value: 135
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 092522-6796-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80785bd066b
BUGCHECK_P3: ffff870b5215e560
BUGCHECK_P4: 0
CONTEXT: ffff870b5215e560 -- (.cxr 0xffff870b5215e560)
rax=ffffa505f7410c70 rbx=ffff8c020a9627a0 rcx=ffffa505fc4d6918
rdx=ffffa505f7410ce8 rsi=ffff8c020a9627c0 rdi=ffffa505fc4d6918
rip=fffff80785bd066b rsp=ffff870b5215ef60 rbp=ffff870b5215ef90
r8=0000000000000000 r9=ffffa505f7410cc0 r10=fffff8076d321a10
r11=0000000000001001 r12=ffffa505fc4d68b0 r13=0000000000000001
r14=ffffa505fc4d6970 r15=ffffffffffffffff
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
klif+0x7066b:
fffff807`85bd066b 110401 adc dword ptr [rcx+rax],eax ds:002b:ffff4a0b`f38e7588=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: avp.exe
MISALIGNED_IP:
klif+7066b
fffff807`85bd066b 110401 adc dword ptr [rcx+rax],eax
STACK_TEXT:
ffff870b`5215ef60 ffff8c02`0a9627a0 : ffffa505`fc4d6918 ffffa505`fc4d6970 fffff807`85c0e06a ffff870b`5215efb0 : klif+0x7066b
ffff870b`5215ef68 ffffa505`fc4d6918 : ffffa505`fc4d6970 fffff807`85c0e06a ffff870b`5215efb0 fffff807`85c0b869 : 0xffff8c02`0a9627a0
ffff870b`5215ef70 ffffa505`fc4d6970 : fffff807`85c0e06a ffff870b`5215efb0 fffff807`85c0b869 ffff870b`5215f0e0 : 0xffffa505`fc4d6918
ffff870b`5215ef78 fffff807`85c0e06a : ffff870b`5215efb0 fffff807`85c0b869 ffff870b`5215f0e0 ffffa505`fc4d6918 : 0xffffa505`fc4d6970
ffff870b`5215ef80 ffff870b`5215efb0 : fffff807`85c0b869 ffff870b`5215f0e0 ffffa505`fc4d6918 ffff870b`5215f129 : klif+0xae06a
ffff870b`5215ef88 fffff807`85c0b869 : ffff870b`5215f0e0 ffffa505`fc4d6918 ffff870b`5215f129 fffff807`85c0ec9d : 0xffff870b`5215efb0
ffff870b`5215ef90 ffff870b`5215f0e0 : ffffa505`fc4d6918 ffff870b`5215f129 fffff807`85c0ec9d ffffa505`f7410c70 : klif+0xab869
ffff870b`5215ef98 ffffa505`fc4d6918 : ffff870b`5215f129 fffff807`85c0ec9d ffffa505`f7410c70 ffff8c02`0a9627a0 : 0xffff870b`5215f0e0
ffff870b`5215efa0 ffff870b`5215f129 : fffff807`85c0ec9d ffffa505`f7410c70 ffff8c02`0a9627a0 fffff807`85be4000 : 0xffffa505`fc4d6918
ffff870b`5215efa8 fffff807`85c0ec9d : ffffa505`f7410c70 ffff8c02`0a9627a0 fffff807`85be4000 ffff8c02`0a9627c0 : 0xffff870b`5215f129
ffff870b`5215efb0 ffffa505`f7410c70 : ffff8c02`0a9627a0 fffff807`85be4000 ffff8c02`0a9627c0 ffff870b`5215f108 : klif+0xaec9d
ffff870b`5215efb8 ffff8c02`0a9627a0 : fffff807`85be4000 ffff8c02`0a9627c0 ffff870b`5215f108 fffff807`85c0dc47 : 0xffffa505`f7410c70
ffff870b`5215efc0 fffff807`85be4000 : ffff8c02`0a9627c0 ffff870b`5215f108 fffff807`85c0dc47 ffff8c02`0a9627a0 : 0xffff8c02`0a9627a0
ffff870b`5215efc8 ffff8c02`0a9627c0 : ffff870b`5215f108 fffff807`85c0dc47 ffff8c02`0a9627a0 ffff870b`5215f129 : klif+0x84000
ffff870b`5215efd0 ffff870b`5215f108 : fffff807`85c0dc47 ffff8c02`0a9627a0 ffff870b`5215f129 ffff8c02`0a9627a0 : 0xffff8c02`0a9627c0
ffff870b`5215efd8 fffff807`85c0dc47 : ffff8c02`0a9627a0 ffff870b`5215f129 ffff8c02`0a9627a0 fffff807`85be4000 : 0xffff870b`5215f108
ffff870b`5215efe0 ffff8c02`0a9627a0 : ffff870b`5215f129 ffff8c02`0a9627a0 fffff807`85be4000 00000000`00001001 : klif+0xadc47
ffff870b`5215efe8 ffff870b`5215f129 : ffff8c02`0a9627a0 fffff807`85be4000 00000000`00001001 00000000`00000fff : 0xffff8c02`0a9627a0
ffff870b`5215eff0 ffff8c02`0a9627a0 : fffff807`85be4000 00000000`00001001 00000000`00000fff 00000000`00000000 : 0xffff870b`5215f129
ffff870b`5215eff8 fffff807`85be4000 : 00000000`00001001 00000000`00000fff 00000000`00000000 fffff807`00000001 : 0xffff8c02`0a9627a0
ffff870b`5215f000 00000000`00001001 : 00000000`00000fff 00000000`00000000 fffff807`00000001 ffff8c02`0a9627a0 : klif+0x84000
ffff870b`5215f008 00000000`00000fff : 00000000`00000000 fffff807`00000001 ffff8c02`0a9627a0 00000000`00000000 : 0x1001
ffff870b`5215f010 00000000`00000000 : fffff807`00000001 ffff8c02`0a9627a0 00000000`00000000 00000000`00000000 : 0xfff
SYMBOL_NAME: klif+7066b
IMAGE_NAME: hardware
STACK_COMMAND: .cxr 0xffff870b5215e560 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED_klif.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {75ab104f-3442-3ba9-03ba-0d3de19498c0}
Followup: MachineOwner
---------
Hocam zaman ayırıp cevap verdiğiniz için teşekkür ederim.Hocam 29 Ağustos'tan beri yani neredeyse 1 aydır bu hatalarla uğraşıyormuşsunuz. Bu zamana kadar hiç Memtest86 ile bellek testi yapmayı denediniz mi?
Hem XMP kapalı, hem de açık şekilde. İlk başta 2 RAM'i de birlikte; daha sonra gerekirse birini çıkarıp diğerini yani iki RAM'i de ayrı ayrı, tek başlarına olacak şekilde teste tabi tutabilirsiniz.
Kaspersky'ı daha önce silmiş miydiniz? En azından bu hataları çözene kadar silip bir süre bekleyebilirsiniz.
Samsung Magician ile alakalı bir durum da var ama onun etkisinin olduğunu sanmıyorum.
Bugün aldığınız iki mavi ekran:
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000b900ff, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8036720041c, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1890 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 13478 Key : Analysis.Init.CPU.mSec Value: 46 Key : Analysis.Init.Elapsed.mSec Value: 8898 Key : Analysis.Memory.CommitPeak.Mb Value: 151 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 092522-7484-01.dmp BUGCHECK_CODE: a BUGCHECK_P1: b900ff BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff8036720041c WRITE_ADDRESS: fffff80367afb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000b900ff BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: EpicGamesLauncher.exe TRAP_FRAME: ffffe789dcdb1860 -- (.trap 0xffffe789dcdb1860) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000b900ff rbx=0000000000000000 rcx=00000000c0000100 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8036720041c rsp=ffffe789dcdb19f0 rbp=000fe47fbd9bbfff r8=ffffd183cf9e0340 r9=00000001000005f8 r10=00000000041002f7 r11=0000000000000004 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!SwapContext+0x3ec: fffff803`6720041c 0100 add dword ptr [rax],eax ds:00000000`00b900ff=???????? Resetting default scope MISALIGNED_IP: nt!SwapContext+3ec fffff803`6720041c 0100 add dword ptr [rax],eax STACK_TEXT: ffffe789`dcdb1718 fffff803`6720af69 : 00000000`0000000a 00000000`00b900ff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx ffffe789`dcdb1720 fffff803`67207269 : 00000000`00000000 fffff803`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffe789`dcdb1860 fffff803`6720041c : ffffbf80`1b7d7180 00000000`00000000 00000000`00000000 fffff803`67014934 : nt!KiPageFault+0x469 ffffe789`dcdb19f0 fffff803`671ffd56 : 00000000`4b80b5f7 00000000`00000000 00000000`40a00001 00000000`00000000 : nt!SwapContext+0x3ec ffffe789`dcdb1a30 fffff803`670130b0 : ffffbf80`1b7d7180 00000000`ffffffff ffffe789`dcdb1c80 00000000`00000fff : nt!KiSwapContext+0x76 ffffe789`dcdb1b70 fffff803`670125df : ffffd183`00000005 00000000`00000004 ffffe789`dcdb1d30 ffffbf80`00000000 : nt!KiSwapThread+0x500 ffffe789`dcdb1c20 fffff803`67011e83 : 00000000`00000004 fffff803`00000000 00000001`ffffff00 ffffd183`ba80c740 : nt!KiCommitThreadWait+0x14f ffffe789`dcdb1cc0 fffff803`67014d5d : ffffe789`dcdb1ea8 00000000`0000001b 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x233 ffffe789`dcdb1db0 fffff803`670106d0 : ffffd183`ca11b290 ffffe789`dcdb1e90 ffffe789`00010224 fffff803`67161cf0 : nt!ExpWaitForResource+0x6d ffffe789`dcdb1e30 fffff803`6700f8dc : ffffe789`002e1e67 00000000`00000001 ffffe789`d804ede0 ffffd183`ce01b0c0 : nt!ExpAcquireResourceExclusiveLite+0x320 ffffe789`dcdb1f00 fffffa1f`e5048e95 : 00000000`00000000 00000000`00989680 00000000`00000001 ffffd183`cb3027d0 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3c ffffe789`dcdb1f40 fffffa1f`e4c4e9b3 : 00000155`00000001 00000155`a13cfde0 00000053`f20cf078 00000000`00000001 : win32kbase!EnterCrit+0x85 ffffe789`dcdb2060 fffffa1f`e4af6fd0 : ffffd183`d5385018 00000155`a13cfde0 00000001`00000000 00000000`000014bf : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x43 ffffe789`dcdb2990 fffff803`6720a9b5 : 00000000`00000020 fffffa1f`e4cd6e25 00000265`0000023a 00000265`0000023a : win32k!NtUserMsgWaitForMultipleObjectsEx+0x20 ffffe789`dcdb29d0 00007ff9`a3e1a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000053`f20cf058 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a3e1a104 SYMBOL_NAME: win32kbase!EnterCrit+85 MODULE_NAME: GenuineIntel IMAGE_VERSION: 10.0.19041.1949 STACK_COMMAND: .cxr; .ecxr ; kb IMAGE_NAME: GenuineIntel.sys FAILURE_BUCKET_ID: IP_MISALIGNED_GenuineIntel.sys OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e930d917-b247-3f7f-23cb-88a0c9f1b274} Followup: MachineOwner ---------
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff80785bd066b, Address of the instruction which caused the BugCheck Arg3: ffff870b5215e560, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2187 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 37640 Key : Analysis.Init.CPU.mSec Value: 46 Key : Analysis.Init.Elapsed.mSec Value: 7039 Key : Analysis.Memory.CommitPeak.Mb Value: 135 Key : Bugcheck.Code.DumpHeader Value: 0x3b Key : Bugcheck.Code.Register Value: 0x3b Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 092522-6796-01.dmp BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80785bd066b BUGCHECK_P3: ffff870b5215e560 BUGCHECK_P4: 0 CONTEXT: ffff870b5215e560 -- (.cxr 0xffff870b5215e560) rax=ffffa505f7410c70 rbx=ffff8c020a9627a0 rcx=ffffa505fc4d6918 rdx=ffffa505f7410ce8 rsi=ffff8c020a9627c0 rdi=ffffa505fc4d6918 rip=fffff80785bd066b rsp=ffff870b5215ef60 rbp=ffff870b5215ef90 r8=0000000000000000 r9=ffffa505f7410cc0 r10=fffff8076d321a10 r11=0000000000001001 r12=ffffa505fc4d68b0 r13=0000000000000001 r14=ffffa505fc4d6970 r15=ffffffffffffffff iopl=0 nv up ei ng nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286 klif+0x7066b: fffff807`85bd066b 110401 adc dword ptr [rcx+rax],eax ds:002b:ffff4a0b`f38e7588=???????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: avp.exe MISALIGNED_IP: klif+7066b fffff807`85bd066b 110401 adc dword ptr [rcx+rax],eax STACK_TEXT: ffff870b`5215ef60 ffff8c02`0a9627a0 : ffffa505`fc4d6918 ffffa505`fc4d6970 fffff807`85c0e06a ffff870b`5215efb0 : klif+0x7066b ffff870b`5215ef68 ffffa505`fc4d6918 : ffffa505`fc4d6970 fffff807`85c0e06a ffff870b`5215efb0 fffff807`85c0b869 : 0xffff8c02`0a9627a0 ffff870b`5215ef70 ffffa505`fc4d6970 : fffff807`85c0e06a ffff870b`5215efb0 fffff807`85c0b869 ffff870b`5215f0e0 : 0xffffa505`fc4d6918 ffff870b`5215ef78 fffff807`85c0e06a : ffff870b`5215efb0 fffff807`85c0b869 ffff870b`5215f0e0 ffffa505`fc4d6918 : 0xffffa505`fc4d6970 ffff870b`5215ef80 ffff870b`5215efb0 : fffff807`85c0b869 ffff870b`5215f0e0 ffffa505`fc4d6918 ffff870b`5215f129 : klif+0xae06a ffff870b`5215ef88 fffff807`85c0b869 : ffff870b`5215f0e0 ffffa505`fc4d6918 ffff870b`5215f129 fffff807`85c0ec9d : 0xffff870b`5215efb0 ffff870b`5215ef90 ffff870b`5215f0e0 : ffffa505`fc4d6918 ffff870b`5215f129 fffff807`85c0ec9d ffffa505`f7410c70 : klif+0xab869 ffff870b`5215ef98 ffffa505`fc4d6918 : ffff870b`5215f129 fffff807`85c0ec9d ffffa505`f7410c70 ffff8c02`0a9627a0 : 0xffff870b`5215f0e0 ffff870b`5215efa0 ffff870b`5215f129 : fffff807`85c0ec9d ffffa505`f7410c70 ffff8c02`0a9627a0 fffff807`85be4000 : 0xffffa505`fc4d6918 ffff870b`5215efa8 fffff807`85c0ec9d : ffffa505`f7410c70 ffff8c02`0a9627a0 fffff807`85be4000 ffff8c02`0a9627c0 : 0xffff870b`5215f129 ffff870b`5215efb0 ffffa505`f7410c70 : ffff8c02`0a9627a0 fffff807`85be4000 ffff8c02`0a9627c0 ffff870b`5215f108 : klif+0xaec9d ffff870b`5215efb8 ffff8c02`0a9627a0 : fffff807`85be4000 ffff8c02`0a9627c0 ffff870b`5215f108 fffff807`85c0dc47 : 0xffffa505`f7410c70 ffff870b`5215efc0 fffff807`85be4000 : ffff8c02`0a9627c0 ffff870b`5215f108 fffff807`85c0dc47 ffff8c02`0a9627a0 : 0xffff8c02`0a9627a0 ffff870b`5215efc8 ffff8c02`0a9627c0 : ffff870b`5215f108 fffff807`85c0dc47 ffff8c02`0a9627a0 ffff870b`5215f129 : klif+0x84000 ffff870b`5215efd0 ffff870b`5215f108 : fffff807`85c0dc47 ffff8c02`0a9627a0 ffff870b`5215f129 ffff8c02`0a9627a0 : 0xffff8c02`0a9627c0 ffff870b`5215efd8 fffff807`85c0dc47 : ffff8c02`0a9627a0 ffff870b`5215f129 ffff8c02`0a9627a0 fffff807`85be4000 : 0xffff870b`5215f108 ffff870b`5215efe0 ffff8c02`0a9627a0 : ffff870b`5215f129 ffff8c02`0a9627a0 fffff807`85be4000 00000000`00001001 : klif+0xadc47 ffff870b`5215efe8 ffff870b`5215f129 : ffff8c02`0a9627a0 fffff807`85be4000 00000000`00001001 00000000`00000fff : 0xffff8c02`0a9627a0 ffff870b`5215eff0 ffff8c02`0a9627a0 : fffff807`85be4000 00000000`00001001 00000000`00000fff 00000000`00000000 : 0xffff870b`5215f129 ffff870b`5215eff8 fffff807`85be4000 : 00000000`00001001 00000000`00000fff 00000000`00000000 fffff807`00000001 : 0xffff8c02`0a9627a0 ffff870b`5215f000 00000000`00001001 : 00000000`00000fff 00000000`00000000 fffff807`00000001 ffff8c02`0a9627a0 : klif+0x84000 ffff870b`5215f008 00000000`00000fff : 00000000`00000000 fffff807`00000001 ffff8c02`0a9627a0 00000000`00000000 : 0x1001 ffff870b`5215f010 00000000`00000000 : fffff807`00000001 ffff8c02`0a9627a0 00000000`00000000 00000000`00000000 : 0xfff SYMBOL_NAME: klif+7066b IMAGE_NAME: hardware STACK_COMMAND: .cxr 0xffff870b5215e560 ; kb MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED_klif.sys OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {75ab104f-3442-3ba9-03ba-0d3de19498c0} Followup: MachineOwner ---------
O zaman Memtest86 ile mutlaka RAM testi yapın.-Memtest ile hiç yapmadım, Windows ile yapmıştım temiz çıkmıştı.
Tamam hocam teşekkür ederimO zaman Memtest86 ile mutlaka RAM testi yapın.
Memtest86, Windows bellek tanılama aracından daha güçlü bir test aracı. Bir problem varsa yüksek ihtimalle bulacaktır.
Hocam bir şey geldi aklıma, ben sisteme farklı bir ram ve ekran kartı da takmıştım yine aynı sorunu yaşadım.O zaman Memtest86 ile mutlaka RAM testi yapın.
Memtest86, Windows bellek tanılama aracından daha güçlü bir test aracı. Bir problem varsa yüksek ihtimalle bulacaktır.
mavi ekran olayı sadece ram ile alakalı olmuyor.mesela çok basit bir durumdan dolayı da mavi ekran alabilirsiniz.örnek;usb portundan taktığınız klavyeden bile.ekipmanınızı farklı usb lere takın hatta yok sayın sıfırdan tanıtın.ekipman aygıt driverını düzgün tanımaz ise mavi ekran verir.
Ramler sıkıntı çıkarmadı hocamO zaman Memtest86 ile mutlaka RAM testi yapın.
Memtest86, Windows bellek tanılama aracından daha güçlü bir test aracı. Bir problem varsa yüksek ihtimalle bulacaktır.