Mavi ekran hataları

İşletim sistemi
Windows 10

umutcum

Hectopat
Katılım
28 Kasım 2020
Mesajlar
53
Daha fazla  
Cinsiyet
Erkek
Öncelikle selamlar,
Geçen gün bilgisayarıma format attığımdan beri almakta olduğum mavi ekran hataları var. Yardımcı olursanız sevinirim.
Minidump klasörünü paylaşıyorum;
 
İki tane bellek kullanıyordum. Bir tanesi testi yaptığımda arıza çıkardı, diğerinde ise sorun çıkmadı.
Sorun çıkaran belleği çıkardım, diğeri duruyor. Acaba temiz kurulum yapsam sorun düzelir mi?
Bellek bozulması sistem dosyalarına zarar vermiş olabilir. Aşağıdaki rehberi uygulayın.
Bu rehberi uyguladıktan sonra tekrar gözlemleyin.
 
Bilgisayara format attım( SSD'yi başka bilgisayara takıp biçimlendirdim ve Windows'un en güncel versiyonunu yükledim) sonrasında hiçbir sıkıntıyla karşılaşmadım.
 
Bilgisayara format attım( SSD'yi başka bilgisayara takıp biçimlendirdim ve Windows'un en güncel versiyonunu yükledim) sonrasında hiçbir sıkıntıyla karşılaşmadım.

Büyük ihtimal arkadaşın dediği gibi sürekli mavi ekran hatası alınca işletim sisteminde bozukluklar meydana geldi. Umarım sorunun kalıcı şekilde çözülmüştür.
 
1) Ekran kartı sürücünüzü DDU ile kaldırın ve WHQL sürüm bir sürücü kurun. DDU kullanım rehberi aşağıda yer alıyor.

2) Sisteme takılı gamepad var. Onu çıkartın ve yüklü sürücüsünü kaldırın.

3) BIOS sürümünüz eski. Aşağıdan güncel BIOS'u da indirip BIOS sürümünüzü yükseltin.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80600000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8063b66566b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6999

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 62533

    Key  : Analysis.Init.CPU.mSec
    Value: 921

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8570

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: fffff80600000000

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8063b66566b

WRITE_ADDRESS: fffff8063c0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff80600000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8f87edfbd600 -- (.trap 0xffff8f87edfbd600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80600000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8063b66566b rsp=ffff8f87edfbd790 rbp=0000000000000000
 r8=00000000ffffffff  r9=000000000000003f r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiSwapThread+0x31b:
fffff806`3b66566b 8808            mov     byte ptr [rax],cl ds:fffff806`00000000=??
Resetting default scope

STACK_TEXT: 
ffff8f87`edfbd4b8 fffff806`3b807d69     : 00000000`0000000a fffff806`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff8f87`edfbd4c0 fffff806`3b804069     : ffffc580`69280180 fffff806`3b7fd052 000f8067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffff8f87`edfbd600 fffff806`3b66566b     : ffffc580`fffffffe 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff8f87`edfbd790 fffff806`3b664d7f     : ffffe602`00000005 ffffe602`00000000 ffff8f87`edfbd980 fffff806`00000000 : nt!KiSwapThread+0x31b
ffff8f87`edfbd840 fffff806`3b643d5e     : 00000000`00000000 ffff8f87`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffff8f87`edfbd8e0 fffff806`47fdf0ed     : ffff8f87`edfbda00 00000000`00989680 00000001`b0888fa6 00000000`00000002 : nt!KeWaitForMultipleObjects+0x2be
ffff8f87`edfbd9f0 fffff806`47f6a8ea     : 00000000`00000000 ffffe602`ae227000 ffff8f87`edfbdb19 ffffe602`ae227000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffff8f87`edfbdac0 fffff806`47fed2e5     : ffffe602`b1229200 ffffe602`ae227000 ffffe602`b1229220 ffffe602`b190a010 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffff8f87`edfbdb80 fffff806`47fed29a     : ffffe602`ae227400 fffff806`47fed1d0 ffffe602`ae227000 ffffc580`69280100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffff8f87`edfbdbd0 fffff806`3b717e85     : ffffe602`ae232380 fffff806`00000001 ffffe602`ae227000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffff8f87`edfbdc10 fffff806`3b7fd498     : ffffc580`69280180 ffffe602`ae232380 fffff806`3b717e30 48b60f41`425089ca : nt!PspSystemThreadStartup+0x55
ffff8f87`edfbdc60 00000000`00000000     : ffff8f87`edfbe000 ffff8f87`edfb8000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VidSchiWaitForSchedulerEvents+25d

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.906

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25d

FAILURE_BUCKET_ID:  AV_dxgmms2!VidSchiWaitForSchedulerEvents

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {bc4e47cb-ae8f-ff68-f36c-4e9884412115}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000c8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021d66585c, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7375

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16551

    Key  : Analysis.Init.CPU.mSec
    Value: 1046

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9073

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: c8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8021d66585c

READ_ADDRESS: fffff8021e0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 00000000000000c8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

TRAP_FRAME:  ffffd1885d5a8760 -- (.trap 0xffffd1885d5a8760)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000001cd7ed4000 rbx=0000000000000000 rcx=ffffd1885d5a88b0
rdx=000000000000001c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021d66585c rsp=ffffd1885d5a88f0 rbp=0000000000000000
 r8=0000000100000037  r9=ffffe4812f600180 r10=ffff908923abe340
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiSwapThread+0x50c:
fffff802`1d66585c 488b9ec8000000  mov     rbx,qword ptr [rsi+0C8h] ds:00000000`000000c8=????????????????
Resetting default scope

STACK_TEXT: 
ffffd188`5d5a8618 fffff802`1d807d69     : 00000000`0000000a 00000000`000000c8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd188`5d5a8620 fffff802`1d804069     : ffffe481`2f600180 fffff802`1d7fd052 000f8067`b4bbbdff 000f8067`00000001 : nt!KiBugCheckDispatch+0x69
ffffd188`5d5a8760 fffff802`1d66585c     : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffd188`5d5a88f0 fffff802`1d664d7f     : ffff9089`2206f080 fffff802`1d678387 00000000`00000000 00000000`00989600 : nt!KiSwapThread+0x50c
ffffd188`5d5a89a0 fffff802`1d6296d2     : 00000000`0000007a 00000000`00000000 ffff9089`00000001 0000001c`e1abf450 : nt!KiCommitThreadWait+0x14f
ffffd188`5d5a8a40 fffff802`1d9edeef     : 00000000`00000320 00000000`00000320 00000000`00000000 0000018b`00000002 : nt!KeDelayExecutionThread+0x122
ffffd188`5d5a8ad0 fffff802`1d8077b8     : 00000000`00000000 00000000`00000000 ffffffff`fffe7960 0000018b`f57e8ab0 : nt!NtDelayExecution+0x5f
ffffd188`5d5a8b00 00007ffc`ca20d3a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001c`e1abedc8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`ca20d3a4


SYMBOL_NAME:  nt!KiSwapThread+50c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.928

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  50c

FAILURE_BUCKET_ID:  AV_nt!KiSwapThread

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8043433223f, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5359

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11572

    Key  : Analysis.Init.CPU.mSec
    Value: 764

    Key  : Analysis.Init.Elapsed.mSec
    Value: 6326

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: c0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8043433223f

READ_ADDRESS: fffff80434cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 00000000000000c0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffffd209c4cd8560 -- (.trap 0xffffd209c4cd8560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000016
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043433223f rsp=ffffd209c4cd86f0 rbp=ffffd209c4cd8730
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000037
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiCheckPreferredHeteroProcessor+0x4f:
fffff804`3433223f 4c8bbfc0000000  mov     r15,qword ptr [rdi+0C0h] ds:00000000`000000c0=????????????????
Resetting default scope

STACK_TEXT: 
ffffd209`c4cd8418 fffff804`34407d69     : 00000000`0000000a 00000000`000000c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd209`c4cd8420 fffff804`34404069     : ffff8301`00000000 ffffa986`959840c0 00000000`0000000b ffffd209`c4cd859c : nt!KiBugCheckDispatch+0x69
ffffd209`c4cd8560 fffff804`3433223f     : ffff4923`65744c6a 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x469
ffffd209`c4cd86f0 fffff804`3451a646     : ffffa986`95747c88 ffffa986`956ad080 00000000`00000000 00000000`00000000 : nt!KiCheckPreferredHeteroProcessor+0x4f
ffffd209`c4cd8760 fffff804`3451a4a4     : 00000000`00000005 ffffd209`c4cd8828 ffffd209`c4cd8820 ffff8301`4a280180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x156
ffffd209`c4cd87f0 fffff804`34435634     : ffff8301`ffffffff 00000000`00000000 ffffa986`97a9c560 ffffa986`97a9c560 : nt!KiSendHeteroRescheduleIntRequest+0x74
ffffd209`c4cd8820 fffff804`34264d7f     : 00000000`00000001 00000000`00000005 ffffd209`c4cd89e0 fffff804`00000000 : nt!KiSwapThread+0x1d02e4
ffffd209`c4cd88d0 fffff804`34264623     : ffffa986`00000000 fffff804`00000000 00000000`00000000 ffffa986`956af1c0 : nt!KiCommitThreadWait+0x14f
ffffd209`c4cd8970 fffff804`3462cb91     : ffffa986`954aae60 000000ff`00000006 00000000`00000001 fffff804`34261100 : nt!KeWaitForSingleObject+0x233
ffffd209`c4cd8a60 fffff804`3462cc3a     : ffffa986`956af080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffffd209`c4cd8ac0 fffff804`344077b8     : ffffa986`956af080 ffffa986`954aae60 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x6a
ffffd209`c4cd8b00 00007ff8`bb78cda4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ff`683ff6f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`bb78cda4


SYMBOL_NAME:  nt!KiCheckPreferredHeteroProcessor+4f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.928

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4f

FAILURE_BUCKET_ID:  AV_nt!KiCheckPreferredHeteroProcessor

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {068240a0-d6bc-90c5-8c43-0941c938c453}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffbc80000000c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8031613223f, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6233

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 30933

    Key  : Analysis.Init.CPU.mSec
    Value: 889

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5979

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: ffffbc80000000c0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8031613223f

READ_ADDRESS: fffff80316afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffbc80000000c0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff800fee4996e0 -- (.trap 0xffff800fee4996e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=000000000000000a
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031613223f rsp=ffff800fee499870 rbp=ffff800fee4998b0
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000037
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KiCheckPreferredHeteroProcessor+0x4f:
fffff803`1613223f 4c8bbfc0000000  mov     r15,qword ptr [rdi+0C0h] ds:00000000`000000c0=????????????????
Resetting default scope

STACK_TEXT: 
ffff800f`ee499598 fffff803`16207d69     : 00000000`0000000a ffffbc80`000000c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff800f`ee4995a0 fffff803`16204069     : ffff8884`942d1040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff800f`ee4996e0 fffff803`1613223f     : 00000000`00000000 ffff8884`00000000 ffff8884`91f8bfe0 fffff803`1604e58c : nt!KiPageFault+0x469
ffff800f`ee499870 fffff803`1631a646     : 00000000`00000000 ffff8884`9457e080 00000000`00000000 00000000`00000000 : nt!KiCheckPreferredHeteroProcessor+0x4f
ffff800f`ee4998e0 fffff803`1631a4a4     : 00000000`00000005 ffff800f`ee4999a8 ffff800f`ee4999a0 ffffbc80`6ba80180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x156
ffff800f`ee499970 fffff803`16235634     : ffffbc80`ffffffff 00000000`00000000 00000000`00000103 00000000`00000000 : nt!KiSendHeteroRescheduleIntRequest+0x74
ffff800f`ee4999a0 fffff803`16064d7f     : ffff8884`00000001 fffff803`00000005 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0x1d02e4
ffff800f`ee499a50 fffff803`16025d67     : ffff8884`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffff800f`ee499af0 fffff803`16025910     : ffff8884`942d1040 fffff803`264bb370 ffff8884`8a8a4a20 ffff8884`00000000 : nt!KeRemovePriQueue+0x1a7
ffff800f`ee499b70 fffff803`16117e85     : ffff8884`942d1040 00000000`00000080 ffff8884`8a895040 2c303978`3032325f : nt!ExpWorkerThread+0xa0
ffff800f`ee499c10 fffff803`161fd498     : ffffbc80`6ba80180 ffff8884`942d1040 fffff803`16117e30 73646123`202c3039 : nt!PspSystemThreadStartup+0x55
ffff800f`ee499c60 00000000`00000000     : ffff800f`ee49a000 ffff800f`ee494000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!KiCheckPreferredHeteroProcessor+4f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.928

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4f

FAILURE_BUCKET_ID:  AV_nt!KiCheckPreferredHeteroProcessor

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {068240a0-d6bc-90c5-8c43-0941c938c453}

Followup:     MachineOwner
---------

[CODE title="Hataya sebep olan gamepad aygıtın donanım kimliği"]USB\VID_0079&PID_0006\6[/CODE]
 

Yeni konular

Geri
Yukarı