IRQL_NOT_LESS_OR_EQUAL mavi ekran hatası

Kaspersky, Logitech, Daemon Tools, SoftEther VPN, MSI yazılımları ve araçları, Ryzen Master kaldır.

Ekran kartı sürücüsünü DDU ile kaldır tekrar yükle.

Emin olmak için XMP açık Memtest86 testi yap.

Neden Beta BIOS kurdun?

Evet yazılımları kaldırmak zorundasın.
Evet sürücüyü DDU ile kaldırıp tekrar kurmak zorundasın.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffdd8d07ceebc0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8004887a1f5, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.NQ

BIOS_DATE:  12/02/2019

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffdd8d07ceebc0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8004887a1f5

READ_ADDRESS: fffff80048d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffdd8d07ceebc0

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiResolveProtoPteFault+845
fffff800`4887a1f5 498b0b          mov     rcx,qword ptr [r11]

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  chrome.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-06-2020 18:45:09.0963

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd6852b348390 -- (.trap 0xffffd6852b348390)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd6852b3487c0
rdx=0000a97a36b28b0c rsi=0000000000000000 rdi=0000000000000000
rip=fffff800489d4400 rsp=ffffd6852b348528 rbp=ffffd6852b348b80
r8=0000000000000040  r9=0000000000000008 r10=00007fff61e7128c
r11=ffffd6852b348780 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
nt!memcpy+0x1c0:
fffff800`489d4400 488b4411f8      mov     rax,qword ptr [rcx+rdx-8] ds:00007fff`61e712c4=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800489d32e9 to fffff800489c14e0

STACK_TEXT:
ffffd685`2b347cc8 fffff800`489d32e9 : 00000000`0000000a ffffdd8d`07ceebc0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd685`2b347cd0 fffff800`489cf62b : ffffc68d`0be37080 ffff9480`09c2d750 00000000`00000000 ffffc68d`053e72e0 : nt!KiBugCheckDispatch+0x69
ffffd685`2b347e10 fffff800`4887a1f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
ffffd685`2b347fa0 fffff800`48874bcc : ffffd685`2b348110 00000000`00000000 ffffd685`2b3480e8 ffffe00f`eeeb4908 : nt!MiResolveProtoPteFault+0x845
ffffd685`2b3480a0 fffff800`48872d09 : 00000000`00000100 00000000`00000100 00000000`c0000016 00000000`00000000 : nt!MiDispatchFault+0x80c
ffffd685`2b3481f0 fffff800`489cf520 : 00000000`00000000 00000000`00000028 00000000`00000040 ffff9480`0bfba550 : nt!MmAccessFault+0x169
ffffd685`2b348390 fffff800`489d4400 : fffff800`48e230a3 ffffd685`2b348b80 00000000`00000000 ffffd685`2b3486a0 : nt!KiPageFault+0x360
ffffd685`2b348528 fffff800`48e230a3 : ffffd685`2b348b80 00000000`00000000 ffffd685`2b3486a0 00000000`00000000 : nt!memcpy+0x1c0
ffffd685`2b348530 fffff800`48e22c07 : ffffc68d`09e4b080 00000000`00000010 ffffc68c`fbe84bc0 00000000`00000001 : nt!MmCopyVirtualMemory+0x3f3
ffffd685`2b3489d0 fffff800`48e22a9b : ffffc68d`07388040 00000057`a53fe898 ffffd685`2b348aa8 00007fff`61e7128c : nt!MiReadWriteVirtualMemory+0x157
ffffd685`2b348a50 fffff800`489d2d18 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd685`2b348a00 : nt!NtReadVirtualMemory+0x1b
ffffd685`2b348a90 00007fff`9f37c8a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000057`a53fe878 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`9f37c8a4


THREAD_SHA1_HASH_MOD_FUNC:  3bdd2471c07b4c075d899411ef24acaf674f0cb5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d8da5cc39aa3e29d8e1385505789dc248de51423

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!MiResolveProtoPteFault+845
fffff800`4887a1f5 498b0b          mov     rcx,qword ptr [r11]

FAULT_INSTR_CODE:  8b0b8b49

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiResolveProtoPteFault+845

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  29371fe3

IMAGE_VERSION:  10.0.18362.628

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  845

FAILURE_BUCKET_ID:  AV_nt!MiResolveProtoPteFault

BUCKET_ID:  AV_nt!MiResolveProtoPteFault

PRIMARY_PROBLEM_CLASS:  AV_nt!MiResolveProtoPteFault

TARGET_TIME:  2020-02-04T15:54:39.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1b2f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!miresolveprotoptefault

FAILURE_ID_HASH:  {2f2238e9-4751-e3c3-543c-b0cdf930b219}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80360a50ea9, The address that the exception occurred at
Arg3: fffffa81c584b968, Parameter 0 of the exception
Arg4: ffffb98007de6930, Parameter 1 of the exception

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80360a50ea9

BUGCHECK_P3: fffffa81c584b968

BUGCHECK_P4: ffffb98007de6930

WRITE_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
ffffb98007de6930

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
+0
fffff803`60a50ea9 ??              ???

EXCEPTION_PARAMETER1:  fffffa81c584b968

EXCEPTION_PARAMETER2:  ffffb98007de6930

BUGCHECK_STR:  0x1E_c0000005

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-06-2020 18:45:15.0092

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80360ca6567 to fffff80360bc14e0

STACK_TEXT:
ffffb980`07de6088 fffff803`60ca6567 : 00000000`0000001e ffffffff`c0000005 fffff803`60a50ea9 fffffa81`c584b968 : 0xfffff803`60bc14e0
ffffb980`07de6090 00000000`0000001e : ffffffff`c0000005 fffff803`60a50ea9 fffffa81`c584b968 ffffb980`07de6930 : 0xfffff803`60ca6567
ffffb980`07de6098 ffffffff`c0000005 : fffff803`60a50ea9 fffffa81`c584b968 ffffb980`07de6930 fffffa81`c5847000 : 0x1e
ffffb980`07de60a0 fffff803`60a50ea9 : fffffa81`c584b968 ffffb980`07de6930 fffffa81`c5847000 00000000`00000000 : 0xffffffff`c0000005
ffffb980`07de60a8 fffffa81`c584b968 : ffffb980`07de6930 fffffa81`c5847000 00000000`00000000 fffff803`60bd9136 : 0xfffff803`60a50ea9
ffffb980`07de60b0 ffffb980`07de6930 : fffffa81`c5847000 00000000`00000000 fffff803`60bd9136 fffff803`60a50ea9 : 0xfffffa81`c584b968
ffffb980`07de60b8 fffffa81`c5847000 : 00000000`00000000 fffff803`60bd9136 fffff803`60a50ea9 fffff803`60b1654b : 0xffffb980`07de6930
ffffb980`07de60c0 00000000`00000000 : fffff803`60bd9136 fffff803`60a50ea9 fffff803`60b1654b fffffa81`c584bba0 : 0xfffffa81`c5847000


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  CORRUPT_MODULELIST_0x1E_c0000005

DEFAULT_BUCKET_ID:  CORRUPT_MODULELIST_0x1E_c0000005

PRIMARY_PROBLEM_CLASS:  CORRUPT_MODULELIST_0x1E_c0000005

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_0x1E_c0000005

TARGET_TIME:  2020-02-04T15:56:23.000Z

OSBUILD:  18362

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

ANALYSIS_SESSION_ELAPSED_TIME:  1f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:corrupt_modulelist_0x1e_c0000005

FAILURE_ID_HASH:  {d4fc79f3-5019-f05a-ada0-b6374f50a560}

Followup:     MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff800feacfc30, memory referenced
Arg2: 0000000000000007, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff800feacfc30, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.NQ

BIOS_DATE:  12/02/2019

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffff800feacfc30

BUGCHECK_P2: 7

BUGCHECK_P3: 8

BUGCHECK_P4: fffff800feacfc30

READ_ADDRESS: fffff8010d9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff800feacfc30

CURRENT_IRQL:  7

FAULTING_IP:
+0
fffff800`feacfc30 ??              ???

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-06-2020 18:45:19.0120

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff801134a8e70 -- (.trap 0xfffff801134a8e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000b rbx=0000000000000000 rcx=ffffe5849589d1d0
rdx=000000000000000b rsi=0000000000000000 rdi=0000000000000000
rip=fffff800feacfc30 rsp=fffff801134a9008 rbp=ffffe584971f5120
r8=ffffe58497ffabb0  r9=ffffe584971f5120 r10=fffff801134a97f0
r11=fffff801134a9010 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po nc
fffff800`feacfc30 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8010d5d32e9 to fffff8010d5c14e0

FAILED_INSTRUCTION_ADDRESS:
+0
fffff800`feacfc30 ??              ???

STACK_TEXT:
fffff801`134a8d28 fffff801`0d5d32e9 : 00000000`0000000a fffff800`feacfc30 00000000`00000007 00000000`00000008 : nt!KeBugCheckEx
fffff801`134a8d30 fffff801`0d5cf62b : 00000000`00000001 00000000`00000000 00000780`00000000 00000000`00000438 : nt!KiBugCheckDispatch+0x69
fffff801`134a8e70 fffff800`feacfc30 : fffff801`21acfc10 00000000`00002000 fffff801`21acb8df ffffe584`988b6900 : nt!KiPageFault+0x46b
fffff801`134a9008 fffff801`21acfc10 : 00000000`00002000 fffff801`21acb8df ffffe584`988b6900 fffff801`219afc33 : 0xfffff800`feacfc30
fffff801`134a9010 00000000`00002000 : fffff801`21acb8df ffffe584`988b6900 fffff801`219afc33 fffff801`00000000 : atikmdag+0x1dfc10
fffff801`134a9018 fffff801`21acb8df : ffffe584`988b6900 fffff801`219afc33 fffff801`00000000 ffffe584`971f5050 : 0x2000
fffff801`134a9020 ffffe584`988b6900 : fffff801`219afc33 fffff801`00000000 ffffe584`971f5050 ffffe584`971f5000 : atikmdag+0x1db8df
fffff801`134a9028 fffff801`219afc33 : fffff801`00000000 ffffe584`971f5050 ffffe584`971f5000 fffff801`21a5ecda : 0xffffe584`988b6900
fffff801`134a9030 fffff801`00000000 : ffffe584`971f5050 ffffe584`971f5000 fffff801`21a5ecda ffffe584`988b6e58 : atikmdag+0xbfc33
fffff801`134a9038 ffffe584`971f5050 : ffffe584`971f5000 fffff801`21a5ecda ffffe584`988b6e58 ffffe584`971f50f0 : 0xfffff801`00000000
fffff801`134a9040 ffffe584`971f5000 : fffff801`21a5ecda ffffe584`988b6e58 ffffe584`971f50f0 ffffe584`987d6000 : 0xffffe584`971f5050
fffff801`134a9048 fffff801`21a5ecda : ffffe584`988b6e58 ffffe584`971f50f0 ffffe584`987d6000 fffff801`21acecbb : 0xffffe584`971f5000
fffff801`134a9050 ffffe584`988b6e58 : ffffe584`971f50f0 ffffe584`987d6000 fffff801`21acecbb ffffe584`9589d1d0 : atikmdag+0x16ecda
fffff801`134a9058 ffffe584`971f50f0 : ffffe584`987d6000 fffff801`21acecbb ffffe584`9589d1d0 ffffe584`9589d1d0 : 0xffffe584`988b6e58
fffff801`134a9060 ffffe584`987d6000 : fffff801`21acecbb ffffe584`9589d1d0 ffffe584`9589d1d0 00000000`00000001 : 0xffffe584`971f50f0
fffff801`134a9068 fffff801`21acecbb : ffffe584`9589d1d0 ffffe584`9589d1d0 00000000`00000001 fffff801`00603483 : 0xffffe584`987d6000
fffff801`134a9070 ffffe584`9589d1d0 : ffffe584`9589d1d0 00000000`00000001 fffff801`00603483 ffffe584`971f5058 : atikmdag+0x1decbb
fffff801`134a9078 ffffe584`9589d1d0 : 00000000`00000001 fffff801`00603483 ffffe584`971f5058 fffff801`21acdf4e : 0xffffe584`9589d1d0
fffff801`134a9080 00000000`00000001 : fffff801`00603483 ffffe584`971f5058 fffff801`21acdf4e 00000000`00000000 : 0xffffe584`9589d1d0
fffff801`134a9088 fffff801`00603483 : ffffe584`971f5058 fffff801`21acdf4e 00000000`00000000 ffffe584`9589d1f0 : 0x1
fffff801`134a9090 ffffe584`971f5058 : fffff801`21acdf4e 00000000`00000000 ffffe584`9589d1f0 ffffe584`988b6da0 : 0xfffff801`00603483
fffff801`134a9098 fffff801`21acdf4e : 00000000`00000000 ffffe584`9589d1f0 ffffe584`988b6da0 fffff801`21a42726 : 0xffffe584`971f5058
fffff801`134a90a0 00000000`00000000 : ffffe584`9589d1f0 ffffe584`988b6da0 fffff801`21a42726 ffffe584`971b0000 : atikmdag+0x1ddf4e


THREAD_SHA1_HASH_MOD_FUNC:  10d6c72a2ad13fdd6f9667b3b2afc1613c590bed

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  100a13d1d0dc963267dbb1b25d2b873e262529ed

THREAD_SHA1_HASH_MOD:  359c0e46a62c2fbd7148ff06f2b269b55882461c

FOLLOWUP_IP:
atikmdag+1dfc10
fffff801`21acfc10 488b5c2468      mov     rbx,qword ptr [rsp+68h]

FAULT_INSTR_CODE:  245c8b48

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  atikmdag+1dfc10

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: atikmdag

IMAGE_NAME:  atikmdag.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5e2b480a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1dfc10

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_atikmdag!unknown_function

BUCKET_ID:  AV_CODE_AV_BAD_IP_atikmdag!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_CODE_AV_BAD_IP_atikmdag!unknown_function

TARGET_TIME:  2020-02-06T04:21:12.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2c35

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_code_av_bad_ip_atikmdag!unknown_function

FAILURE_ID_HASH:  {4c7957f7-71c5-84a3-8399-d6094df9c54a}

Followup:     MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff890de80788d6, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8074343e487, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klbackupdisk.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.NQ

BIOS_DATE:  12/02/2019

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffff890de80788d6

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8074343e487

WRITE_ADDRESS: fffff8073e9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff890de80788d6

CURRENT_IRQL:  2

FAULTING_IP:
storport!StorEtwMiniportEventProxy+f7
fffff807`4343e487 448bce          mov     r9d,esi

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  avp.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-06-2020 18:45:23.0166

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffee028190b860 -- (.trap 0xffffee028190b860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffee028190ba50 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffee028190bcc0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8074343e487 rsp=ffffee028190b9f0 rbp=fffff807434121c0
r8=0000000000000008  r9=0000000000000057 r10=0000000000000000
r11=ffff890da375f1a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
storport!StorEtwMiniportEventProxy+0xf7:
fffff807`4343e487 448bce          mov     r9d,esi
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8073e5d32e9 to fffff8073e5c14e0

STACK_TEXT:
ffffee02`8190b718 fffff807`3e5d32e9 : 00000000`0000000a ffff890d`e80788d6 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffee02`8190b720 fffff807`3e5cf62b : ffffe2fb`305fa6d2 fffff807`3e4fb4b6 ffffee02`8190bb81 fffff807`3e4defad : nt!KiBugCheckDispatch+0x69
ffffee02`8190b860 fffff807`4343e487 : 00000000`00000003 fffff807`4343eac1 ffff890d`a375ece0 fffff807`4342555a : nt!KiPageFault+0x46b
ffffee02`8190b9f0 fffff807`4342ea84 : 00000000`00000003 00000000`00000057 00000000`00000000 00000000`00000002 : storport!StorEtwMiniportEventProxy+0xf7
ffffee02`8190bb20 fffff807`433f4908 : 00000000`00710690 ffff890d`a375ece0 ffff890d`a37e4008 00000000`00000000 : storport!StorPortExtendedFunction+0xf4
ffffee02`8190bbf0 fffff807`433f4532 : ffffba81`23c9c180 00000000`00000000 00000000`00000000 ffffba81`247afef0 : storahci!SrbConvertToATACommand+0x248
ffffee02`8190bdb0 fffff807`4342479e : ffff890d`a375ece0 ffffee02`0000000a ffffee02`8190bf19 ffff890d`a375f1a0 : storahci!AhciHwBuildIo+0x472
ffffee02`8190be60 fffff807`43424622 : ffffba81`00002000 00000000`00000000 ffffba81`247ad100 fffff807`40200182 : storport!RaidAdapterPostScatterGatherExecute+0x14e
ffffee02`8190bf80 fffff807`3e368bf0 : fffff807`434245e0 ffffba81`247ad148 00000000`00000000 ffff890d`00000000 : storport!RaidpAdapterContinueScatterGather+0x42
ffffee02`8190bfb0 fffff807`3e368993 : ffff890d`a37191a0 00000000`00000000 00000000`00000000 00000000`00002000 : hal!HalpBuildScatterGatherList+0x240
ffffee02`8190c070 fffff807`434238b1 : ffff890d`adc1f808 ffff890d`adc1f790 00000000`00000000 00000000`00000000 : hal!HalBuildScatterGatherListV3+0x73
ffffee02`8190c100 fffff807`43428efc : 00000000`0000002a fffff807`40200182 ffffee02`8190c248 ffff890d`00000001 : storport!RaUnitStartIo+0x301
ffffee02`8190c1c0 fffff807`43427f57 : 00000000`00000601 ffff890d`adc1f790 00000000`00000000 ffff890d`aba8d302 : storport!RaidStartIoPacket+0xd3c
ffffee02`8190c2d0 fffff807`43427cea : ffff890d`00000000 ffffee02`8190c630 00000000`00000000 00000000`0006c9e8 : storport!RaUnitScsiIrp+0x227
ffffee02`8190c370 fffff807`3e431f79 : ffff890d`ac950de0 ffff890d`a3719050 00000000`00002000 00000000`00000000 : storport!RaDriverScsiIrp+0x5a
ffffee02`8190c3b0 fffff807`44099308 : ffff890d`afc37440 ffff890d`ac950de0 ffff890d`a3719050 00000000`00002000 : nt!IofCallDriver+0x59
ffffee02`8190c3f0 fffff807`44098677 : 00000000`00000000 ffff890d`ab55c000 00000000`00000000 00000000`00002000 : CLASSPNP!SubmitTransferPacket+0x288
ffffee02`8190c430 fffff807`4409842e : ffff890d`ac950de0 ffffee02`8190c500 ffff890d`a3d0e000 ffff890d`00020000 : CLASSPNP!ServiceTransferRequest+0x207
ffffee02`8190c4c0 fffff807`440917c3 : ffff890d`af67b310 00000000`00000000 ffff890d`a3772110 fffff807`3e4cf744 : CLASSPNP!ClassReadWrite+0x92e
ffffee02`8190c5f0 fffff807`3e431f79 : fffff780`00000008 fffff807`3e49c9a6 ffff890d`a3aab860 ffff890d`a3b33a20 : CLASSPNP!ClassGlobalDispatch+0x23
ffffee02`8190c620 fffff807`432318c8 : 00000000`00000000 ffff890d`a3b33a20 ffff890d`afc37010 ffff890d`afc37200 : nt!IofCallDriver+0x59
ffffee02`8190c660 fffff807`43231eef : 00000000`002104bc 00000000`34c87679 ffff890d`afc37010 ffff890d`ae695018 : partmgr!PmWrite+0xf8
ffffee02`8190c6e0 fffff807`3e431f79 : ffff890d`00000000 ffffd404`b1e3b910 00000000`00000000 ffff890d`ae05f9c0 : partmgr!PmGlobalDispatch+0x1f
ffffee02`8190c710 fffff807`4323174d : 00000000`00000000 ffffd404`b33216d8 00000000`00000000 ffff890d`afc373b0 : nt!IofCallDriver+0x59
ffffee02`8190c750 fffff807`4323155e : 00000000`00002000 ffff890d`afc37248 ffffee02`8190c9c9 fffff807`3e4cf744 : partmgr!PartitionIo+0x1dd
ffffee02`8190c800 fffff807`43231eef : fffff780`00000008 00000000`34a30596 ffff890d`a3d61010 ffff890d`a3deb180 : partmgr!PartitionWrite+0x1e
ffffee02`8190c830 fffff807`3e431f79 : ffff890d`afc372a8 fffff807`43231f71 00000000`00000000 ffff890d`a3e42090 : partmgr!PmGlobalDispatch+0x1f
ffffee02`8190c860 fffff807`43321109 : ffff890d`a3b2ba40 00000000`00000001 00000000`34c87673 00000000`00000000 : nt!IofCallDriver+0x59
ffffee02`8190c8a0 fffff807`3e431f79 : ffffee02`8190c9c9 fffff807`43e71d78 ffff890d`afc37010 ffff890d`aea41080 : volmgr!VmReadWrite+0xf9
ffffee02`8190c8e0 fffff807`43e639f0 : ffff890d`a3deb180 ffffee02`8190c9c9 ffff890d`afc37010 ffffee02`8190c960 : nt!IofCallDriver+0x59
ffffee02`8190c920 fffff807`43e6305c : 00000000`00000000 00002000`00000000 ffffee02`00000000 ffff890d`a3deb180 : fvevol!FveFilterRundownReadWrite+0x920
ffffee02`8190ca30 fffff807`3e431f79 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fvevol!FveFilterRundownWrite+0x4c
ffffee02`8190cad0 fffff807`44043ca3 : 00000000`00000000 ffff890d`a3de8b60 ffff890d`a3ea0e60 00000000`00000000 : nt!IofCallDriver+0x59
ffffee02`8190cb10 fffff807`44044f2d : 00000000`00000002 ffffee02`8190cc50 00000000`00000000 00000000`00000000 : iorate!IoRateIssueAndRecordIo+0x7f
ffffee02`8190cb50 fffff807`44045120 : ffff890d`ae695018 ffff890d`afc37010 ffff890d`a3d89b20 fffff807`435696cf : iorate!IoRateProcessIrpWrapper+0x19d
ffffee02`8190cc90 fffff807`3e431f79 : 00000000`00000000 fffff807`433b5718 00000000`00000000 ffff890d`ab395080 : iorate!IoRateDispatchReadWrite+0x80
ffffee02`8190ccd0 fffff807`43f21033 : ffffee02`7e7da200 fffff807`43667039 00000000`00000000 ffff890d`ae695018 : nt!IofCallDriver+0x59
ffffee02`8190cd10 fffff807`3e431f79 : ffff890d`a3d899d0 ffff890d`a3d89b20 ffff890d`a3ea0e60 ffff890d`a3ea0998 : volume!VolumePassThrough+0x23
ffffee02`8190cd40 fffff807`433b57c3 : ffff890d`a3d899d0 ffff890d`afc37010 ffff890d`a3d899d0 ffff890d`a3d89b20 : nt!IofCallDriver+0x59
ffffee02`8190cd80 ffff890d`a3d899d0 : ffff890d`afc37010 ffff890d`a3d899d0 ffff890d`a3d89b20 00000000`00000000 : klbackupdisk+0x57c3
ffffee02`8190cd88 ffff890d`afc37010 : ffff890d`a3d899d0 ffff890d`a3d89b20 00000000`00000000 fffff807`433b3d2f : 0xffff890d`a3d899d0
ffffee02`8190cd90 ffff890d`a3d899d0 : ffff890d`a3d89b20 00000000`00000000 fffff807`433b3d2f ffff890d`afc37010 : 0xffff890d`afc37010
ffffee02`8190cd98 ffff890d`a3d89b20 : 00000000`00000000 fffff807`433b3d2f ffff890d`afc37010 00000000`bb8d4001 : 0xffff890d`a3d899d0
ffffee02`8190cda0 00000000`00000000 : fffff807`433b3d2f ffff890d`afc37010 00000000`bb8d4001 00000000`bb8d4000 : 0xffff890d`a3d89b20


THREAD_SHA1_HASH_MOD_FUNC:  8a915e4e48020da2b3e922017b68cfcde7591cd8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c90957a553f3dac2d90e328c2f117ae14fb75224

THREAD_SHA1_HASH_MOD:  ccc78800219fdba98480288798287bcbda34146d

FOLLOWUP_IP:
storahci!SrbConvertToATACommand+248
fffff807`433f4908 488b9c24d8010000 mov     rbx,qword ptr [rsp+1D8h]

FAULT_INSTR_CODE:  249c8b48

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  storahci!SrbConvertToATACommand+248

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: storahci

IMAGE_NAME:  storahci.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  381e77bb

IMAGE_VERSION:  10.0.18362.1216

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  248

FAILURE_BUCKET_ID:  AV_storahci!SrbConvertToATACommand

BUCKET_ID:  AV_storahci!SrbConvertToATACommand

PRIMARY_PROBLEM_CLASS:  AV_storahci!SrbConvertToATACommand

TARGET_TIME:  2020-02-06T04:23:58.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  a2f0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_storahci!srbconverttoatacommand

FAILURE_ID_HASH:  {1da05e06-427b-66ef-d6c8-bfafea49d818}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffcb11fb652420, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: ffffcb11fb652420, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.NQ

BIOS_DATE:  12/02/2019

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffcb11fb652420

BUGCHECK_P2: 10

BUGCHECK_P3: ffffcb11fb652420

BUGCHECK_P4: 2

READ_ADDRESS: fffff8066cb733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffcb11fb652420

FAULTING_IP:
+0
ffffcb11`fb652420 ??              ???

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  avpui.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-06-2020 18:45:27.0545

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffffe0710044c70 -- (.trap 0xfffffe0710044c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcb11fa2626de rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=ffffcb11fb652420 rsp=fffffe0710044e08 rbp=fffffe0710044ec0
r8=0000000000000206  r9=0000000077d11e4c r10=ffffcb11fa423f40
r11=ffffd6f9c8000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
ffffcb11`fb652420 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8066c7e35d6 to fffff8066c7c14e0

FAILED_INSTRUCTION_ADDRESS:
+0
ffffcb11`fb652420 ??              ???

STACK_TEXT:
fffffe07`100449c8 fffff806`6c7e35d6 : 00000000`00000050 ffffcb11`fb652420 00000000`00000010 fffffe07`10044c70 : nt!KeBugCheckEx
fffffe07`100449d0 fffff806`6c672eef : 00000000`00000000 00000000`00000010 00000000`00000000 ffffcb11`fb652420 : nt!MiSystemFault+0x1d6866
fffffe07`10044ad0 fffff806`6c7cf520 : ffffb48f`c08ef150 00000000`00000000 00000000`00218000 fffff806`6cbec465 : nt!MmAccessFault+0x34f
fffffe07`10044c70 ffffcb11`fb652420 : ffffcb11`fa872f89 00000000`77c93620 00000000`0391fda0 ffffcb11`fa2626de : nt!KiPageFault+0x360
fffffe07`10044e08 ffffcb11`fa872f89 : 00000000`77c93620 00000000`0391fda0 ffffcb11`fa2626de ffffd6f9`c8000000 : 0xffffcb11`fb652420
fffffe07`10044e10 fffff806`6c7d2d18 : ffff9f0a`71a51080 00007ffd`83a25930 fffffe07`10044ec0 ffff9f0a`716ba960 : win32kfull!NtUserGetForegroundWindow+0x19
fffffe07`10044e40 00000000`77c91cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0391d8b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c91cbc


THREAD_SHA1_HASH_MOD_FUNC:  4e1a30d891c32130982a63e8e55dabf036bb6497

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  8b593ea1dda5f7d47915cfb54dc3c15dd77c6663

THREAD_SHA1_HASH_MOD:  ae4bd38e9ba92a6f2c429b420c473de0b218cf72

FOLLOWUP_IP:
win32kfull!NtUserGetForegroundWindow+19
ffffcb11`fa872f89 488b05c03f2400  mov     rax,qword ptr [win32kfull!_imp_gpqForeground (ffffcb11`faab6f50)]

FAULT_INSTR_CODE:  c0058b48

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  win32kfull!NtUserGetForegroundWindow+19

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.628

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  19

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_win32kfull!NtUserGetForegroundWindow

BUCKET_ID:  AV_INVALID_BAD_IP_win32kfull!NtUserGetForegroundWindow

PRIMARY_PROBLEM_CLASS:  AV_INVALID_BAD_IP_win32kfull!NtUserGetForegroundWindow

TARGET_TIME:  2020-02-06T04:59:56.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3e50

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_invalid_bad_ip_win32kfull!ntusergetforegroundwindow

FAILURE_ID_HASH:  {a3999bb5-77ad-f967-dcff-63d20745dd5d}

Followup:     MachineOwner
---------
 
Kaspersky, Logitech, Daemon Tools, SoftEther VPN, MSI yazılımları ve araçları, Ryzen Master kaldır.

Ekran kartı sürücüsünü DDU ile kaldır tekrar yükle.

Emin olmak için XMP açık Memtest86 testi yap.

Neden Beta BIOS kurdun?

Evet yazılımları kaldırmak zorundasın.
Evet sürücüyü DDU ile kaldırıp tekrar kurmak zorundasın.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffdd8d07ceebc0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8004887a1f5, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.NQ

BIOS_DATE:  12/02/2019

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffdd8d07ceebc0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8004887a1f5

READ_ADDRESS: fffff80048d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffdd8d07ceebc0

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiResolveProtoPteFault+845
fffff800`4887a1f5 498b0b          mov     rcx,qword ptr [r11]

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  chrome.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-06-2020 18:45:09.0963

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd6852b348390 -- (.trap 0xffffd6852b348390)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd6852b3487c0
rdx=0000a97a36b28b0c rsi=0000000000000000 rdi=0000000000000000
rip=fffff800489d4400 rsp=ffffd6852b348528 rbp=ffffd6852b348b80
r8=0000000000000040  r9=0000000000000008 r10=00007fff61e7128c
r11=ffffd6852b348780 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
nt!memcpy+0x1c0:
fffff800`489d4400 488b4411f8      mov     rax,qword ptr [rcx+rdx-8] ds:00007fff`61e712c4=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800489d32e9 to fffff800489c14e0

STACK_TEXT:
ffffd685`2b347cc8 fffff800`489d32e9 : 00000000`0000000a ffffdd8d`07ceebc0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd685`2b347cd0 fffff800`489cf62b : ffffc68d`0be37080 ffff9480`09c2d750 00000000`00000000 ffffc68d`053e72e0 : nt!KiBugCheckDispatch+0x69
ffffd685`2b347e10 fffff800`4887a1f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
ffffd685`2b347fa0 fffff800`48874bcc : ffffd685`2b348110 00000000`00000000 ffffd685`2b3480e8 ffffe00f`eeeb4908 : nt!MiResolveProtoPteFault+0x845
ffffd685`2b3480a0 fffff800`48872d09 : 00000000`00000100 00000000`00000100 00000000`c0000016 00000000`00000000 : nt!MiDispatchFault+0x80c
ffffd685`2b3481f0 fffff800`489cf520 : 00000000`00000000 00000000`00000028 00000000`00000040 ffff9480`0bfba550 : nt!MmAccessFault+0x169
ffffd685`2b348390 fffff800`489d4400 : fffff800`48e230a3 ffffd685`2b348b80 00000000`00000000 ffffd685`2b3486a0 : nt!KiPageFault+0x360
ffffd685`2b348528 fffff800`48e230a3 : ffffd685`2b348b80 00000000`00000000 ffffd685`2b3486a0 00000000`00000000 : nt!memcpy+0x1c0
ffffd685`2b348530 fffff800`48e22c07 : ffffc68d`09e4b080 00000000`00000010 ffffc68c`fbe84bc0 00000000`00000001 : nt!MmCopyVirtualMemory+0x3f3
ffffd685`2b3489d0 fffff800`48e22a9b : ffffc68d`07388040 00000057`a53fe898 ffffd685`2b348aa8 00007fff`61e7128c : nt!MiReadWriteVirtualMemory+0x157
ffffd685`2b348a50 fffff800`489d2d18 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd685`2b348a00 : nt!NtReadVirtualMemory+0x1b
ffffd685`2b348a90 00007fff`9f37c8a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000057`a53fe878 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`9f37c8a4


THREAD_SHA1_HASH_MOD_FUNC:  3bdd2471c07b4c075d899411ef24acaf674f0cb5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d8da5cc39aa3e29d8e1385505789dc248de51423

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!MiResolveProtoPteFault+845
fffff800`4887a1f5 498b0b          mov     rcx,qword ptr [r11]

FAULT_INSTR_CODE:  8b0b8b49

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiResolveProtoPteFault+845

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  29371fe3

IMAGE_VERSION:  10.0.18362.628

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  845

FAILURE_BUCKET_ID:  AV_nt!MiResolveProtoPteFault

BUCKET_ID:  AV_nt!MiResolveProtoPteFault

PRIMARY_PROBLEM_CLASS:  AV_nt!MiResolveProtoPteFault

TARGET_TIME:  2020-02-04T15:54:39.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1b2f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!miresolveprotoptefault

FAILURE_ID_HASH:  {2f2238e9-4751-e3c3-543c-b0cdf930b219}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80360a50ea9, The address that the exception occurred at
Arg3: fffffa81c584b968, Parameter 0 of the exception
Arg4: ffffb98007de6930, Parameter 1 of the exception

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80360a50ea9

BUGCHECK_P3: fffffa81c584b968

BUGCHECK_P4: ffffb98007de6930

WRITE_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
ffffb98007de6930

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
+0
fffff803`60a50ea9 ??              ???

EXCEPTION_PARAMETER1:  fffffa81c584b968

EXCEPTION_PARAMETER2:  ffffb98007de6930

BUGCHECK_STR:  0x1E_c0000005

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-06-2020 18:45:15.0092

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80360ca6567 to fffff80360bc14e0

STACK_TEXT:
ffffb980`07de6088 fffff803`60ca6567 : 00000000`0000001e ffffffff`c0000005 fffff803`60a50ea9 fffffa81`c584b968 : 0xfffff803`60bc14e0
ffffb980`07de6090 00000000`0000001e : ffffffff`c0000005 fffff803`60a50ea9 fffffa81`c584b968 ffffb980`07de6930 : 0xfffff803`60ca6567
ffffb980`07de6098 ffffffff`c0000005 : fffff803`60a50ea9 fffffa81`c584b968 ffffb980`07de6930 fffffa81`c5847000 : 0x1e
ffffb980`07de60a0 fffff803`60a50ea9 : fffffa81`c584b968 ffffb980`07de6930 fffffa81`c5847000 00000000`00000000 : 0xffffffff`c0000005
ffffb980`07de60a8 fffffa81`c584b968 : ffffb980`07de6930 fffffa81`c5847000 00000000`00000000 fffff803`60bd9136 : 0xfffff803`60a50ea9
ffffb980`07de60b0 ffffb980`07de6930 : fffffa81`c5847000 00000000`00000000 fffff803`60bd9136 fffff803`60a50ea9 : 0xfffffa81`c584b968
ffffb980`07de60b8 fffffa81`c5847000 : 00000000`00000000 fffff803`60bd9136 fffff803`60a50ea9 fffff803`60b1654b : 0xffffb980`07de6930
ffffb980`07de60c0 00000000`00000000 : fffff803`60bd9136 fffff803`60a50ea9 fffff803`60b1654b fffffa81`c584bba0 : 0xfffffa81`c5847000


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  CORRUPT_MODULELIST_0x1E_c0000005

DEFAULT_BUCKET_ID:  CORRUPT_MODULELIST_0x1E_c0000005

PRIMARY_PROBLEM_CLASS:  CORRUPT_MODULELIST_0x1E_c0000005

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_0x1E_c0000005

TARGET_TIME:  2020-02-04T15:56:23.000Z

OSBUILD:  18362

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

ANALYSIS_SESSION_ELAPSED_TIME:  1f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:corrupt_modulelist_0x1e_c0000005

FAILURE_ID_HASH:  {d4fc79f3-5019-f05a-ada0-b6374f50a560}

Followup:     MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff800feacfc30, memory referenced
Arg2: 0000000000000007, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff800feacfc30, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.NQ

BIOS_DATE:  12/02/2019

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffff800feacfc30

BUGCHECK_P2: 7

BUGCHECK_P3: 8

BUGCHECK_P4: fffff800feacfc30

READ_ADDRESS: fffff8010d9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff800feacfc30

CURRENT_IRQL:  7

FAULTING_IP:
+0
fffff800`feacfc30 ??              ???

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-06-2020 18:45:19.0120

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff801134a8e70 -- (.trap 0xfffff801134a8e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000b rbx=0000000000000000 rcx=ffffe5849589d1d0
rdx=000000000000000b rsi=0000000000000000 rdi=0000000000000000
rip=fffff800feacfc30 rsp=fffff801134a9008 rbp=ffffe584971f5120
r8=ffffe58497ffabb0  r9=ffffe584971f5120 r10=fffff801134a97f0
r11=fffff801134a9010 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po nc
fffff800`feacfc30 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8010d5d32e9 to fffff8010d5c14e0

FAILED_INSTRUCTION_ADDRESS:
+0
fffff800`feacfc30 ??              ???

STACK_TEXT:
fffff801`134a8d28 fffff801`0d5d32e9 : 00000000`0000000a fffff800`feacfc30 00000000`00000007 00000000`00000008 : nt!KeBugCheckEx
fffff801`134a8d30 fffff801`0d5cf62b : 00000000`00000001 00000000`00000000 00000780`00000000 00000000`00000438 : nt!KiBugCheckDispatch+0x69
fffff801`134a8e70 fffff800`feacfc30 : fffff801`21acfc10 00000000`00002000 fffff801`21acb8df ffffe584`988b6900 : nt!KiPageFault+0x46b
fffff801`134a9008 fffff801`21acfc10 : 00000000`00002000 fffff801`21acb8df ffffe584`988b6900 fffff801`219afc33 : 0xfffff800`feacfc30
fffff801`134a9010 00000000`00002000 : fffff801`21acb8df ffffe584`988b6900 fffff801`219afc33 fffff801`00000000 : atikmdag+0x1dfc10
fffff801`134a9018 fffff801`21acb8df : ffffe584`988b6900 fffff801`219afc33 fffff801`00000000 ffffe584`971f5050 : 0x2000
fffff801`134a9020 ffffe584`988b6900 : fffff801`219afc33 fffff801`00000000 ffffe584`971f5050 ffffe584`971f5000 : atikmdag+0x1db8df
fffff801`134a9028 fffff801`219afc33 : fffff801`00000000 ffffe584`971f5050 ffffe584`971f5000 fffff801`21a5ecda : 0xffffe584`988b6900
fffff801`134a9030 fffff801`00000000 : ffffe584`971f5050 ffffe584`971f5000 fffff801`21a5ecda ffffe584`988b6e58 : atikmdag+0xbfc33
fffff801`134a9038 ffffe584`971f5050 : ffffe584`971f5000 fffff801`21a5ecda ffffe584`988b6e58 ffffe584`971f50f0 : 0xfffff801`00000000
fffff801`134a9040 ffffe584`971f5000 : fffff801`21a5ecda ffffe584`988b6e58 ffffe584`971f50f0 ffffe584`987d6000 : 0xffffe584`971f5050
fffff801`134a9048 fffff801`21a5ecda : ffffe584`988b6e58 ffffe584`971f50f0 ffffe584`987d6000 fffff801`21acecbb : 0xffffe584`971f5000
fffff801`134a9050 ffffe584`988b6e58 : ffffe584`971f50f0 ffffe584`987d6000 fffff801`21acecbb ffffe584`9589d1d0 : atikmdag+0x16ecda
fffff801`134a9058 ffffe584`971f50f0 : ffffe584`987d6000 fffff801`21acecbb ffffe584`9589d1d0 ffffe584`9589d1d0 : 0xffffe584`988b6e58
fffff801`134a9060 ffffe584`987d6000 : fffff801`21acecbb ffffe584`9589d1d0 ffffe584`9589d1d0 00000000`00000001 : 0xffffe584`971f50f0
fffff801`134a9068 fffff801`21acecbb : ffffe584`9589d1d0 ffffe584`9589d1d0 00000000`00000001 fffff801`00603483 : 0xffffe584`987d6000
fffff801`134a9070 ffffe584`9589d1d0 : ffffe584`9589d1d0 00000000`00000001 fffff801`00603483 ffffe584`971f5058 : atikmdag+0x1decbb
fffff801`134a9078 ffffe584`9589d1d0 : 00000000`00000001 fffff801`00603483 ffffe584`971f5058 fffff801`21acdf4e : 0xffffe584`9589d1d0
fffff801`134a9080 00000000`00000001 : fffff801`00603483 ffffe584`971f5058 fffff801`21acdf4e 00000000`00000000 : 0xffffe584`9589d1d0
fffff801`134a9088 fffff801`00603483 : ffffe584`971f5058 fffff801`21acdf4e 00000000`00000000 ffffe584`9589d1f0 : 0x1
fffff801`134a9090 ffffe584`971f5058 : fffff801`21acdf4e 00000000`00000000 ffffe584`9589d1f0 ffffe584`988b6da0 : 0xfffff801`00603483
fffff801`134a9098 fffff801`21acdf4e : 00000000`00000000 ffffe584`9589d1f0 ffffe584`988b6da0 fffff801`21a42726 : 0xffffe584`971f5058
fffff801`134a90a0 00000000`00000000 : ffffe584`9589d1f0 ffffe584`988b6da0 fffff801`21a42726 ffffe584`971b0000 : atikmdag+0x1ddf4e


THREAD_SHA1_HASH_MOD_FUNC:  10d6c72a2ad13fdd6f9667b3b2afc1613c590bed

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  100a13d1d0dc963267dbb1b25d2b873e262529ed

THREAD_SHA1_HASH_MOD:  359c0e46a62c2fbd7148ff06f2b269b55882461c

FOLLOWUP_IP:
atikmdag+1dfc10
fffff801`21acfc10 488b5c2468      mov     rbx,qword ptr [rsp+68h]

FAULT_INSTR_CODE:  245c8b48

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  atikmdag+1dfc10

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: atikmdag

IMAGE_NAME:  atikmdag.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5e2b480a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1dfc10

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_atikmdag!unknown_function

BUCKET_ID:  AV_CODE_AV_BAD_IP_atikmdag!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_CODE_AV_BAD_IP_atikmdag!unknown_function

TARGET_TIME:  2020-02-06T04:21:12.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2c35

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_code_av_bad_ip_atikmdag!unknown_function

FAILURE_ID_HASH:  {4c7957f7-71c5-84a3-8399-d6094df9c54a}

Followup:     MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff890de80788d6, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8074343e487, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klbackupdisk.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.NQ

BIOS_DATE:  12/02/2019

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffff890de80788d6

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8074343e487

WRITE_ADDRESS: fffff8073e9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff890de80788d6

CURRENT_IRQL:  2

FAULTING_IP:
storport!StorEtwMiniportEventProxy+f7
fffff807`4343e487 448bce          mov     r9d,esi

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  avp.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-06-2020 18:45:23.0166

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffee028190b860 -- (.trap 0xffffee028190b860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffee028190ba50 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffee028190bcc0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8074343e487 rsp=ffffee028190b9f0 rbp=fffff807434121c0
r8=0000000000000008  r9=0000000000000057 r10=0000000000000000
r11=ffff890da375f1a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
storport!StorEtwMiniportEventProxy+0xf7:
fffff807`4343e487 448bce          mov     r9d,esi
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8073e5d32e9 to fffff8073e5c14e0

STACK_TEXT:
ffffee02`8190b718 fffff807`3e5d32e9 : 00000000`0000000a ffff890d`e80788d6 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffee02`8190b720 fffff807`3e5cf62b : ffffe2fb`305fa6d2 fffff807`3e4fb4b6 ffffee02`8190bb81 fffff807`3e4defad : nt!KiBugCheckDispatch+0x69
ffffee02`8190b860 fffff807`4343e487 : 00000000`00000003 fffff807`4343eac1 ffff890d`a375ece0 fffff807`4342555a : nt!KiPageFault+0x46b
ffffee02`8190b9f0 fffff807`4342ea84 : 00000000`00000003 00000000`00000057 00000000`00000000 00000000`00000002 : storport!StorEtwMiniportEventProxy+0xf7
ffffee02`8190bb20 fffff807`433f4908 : 00000000`00710690 ffff890d`a375ece0 ffff890d`a37e4008 00000000`00000000 : storport!StorPortExtendedFunction+0xf4
ffffee02`8190bbf0 fffff807`433f4532 : ffffba81`23c9c180 00000000`00000000 00000000`00000000 ffffba81`247afef0 : storahci!SrbConvertToATACommand+0x248
ffffee02`8190bdb0 fffff807`4342479e : ffff890d`a375ece0 ffffee02`0000000a ffffee02`8190bf19 ffff890d`a375f1a0 : storahci!AhciHwBuildIo+0x472
ffffee02`8190be60 fffff807`43424622 : ffffba81`00002000 00000000`00000000 ffffba81`247ad100 fffff807`40200182 : storport!RaidAdapterPostScatterGatherExecute+0x14e
ffffee02`8190bf80 fffff807`3e368bf0 : fffff807`434245e0 ffffba81`247ad148 00000000`00000000 ffff890d`00000000 : storport!RaidpAdapterContinueScatterGather+0x42
ffffee02`8190bfb0 fffff807`3e368993 : ffff890d`a37191a0 00000000`00000000 00000000`00000000 00000000`00002000 : hal!HalpBuildScatterGatherList+0x240
ffffee02`8190c070 fffff807`434238b1 : ffff890d`adc1f808 ffff890d`adc1f790 00000000`00000000 00000000`00000000 : hal!HalBuildScatterGatherListV3+0x73
ffffee02`8190c100 fffff807`43428efc : 00000000`0000002a fffff807`40200182 ffffee02`8190c248 ffff890d`00000001 : storport!RaUnitStartIo+0x301
ffffee02`8190c1c0 fffff807`43427f57 : 00000000`00000601 ffff890d`adc1f790 00000000`00000000 ffff890d`aba8d302 : storport!RaidStartIoPacket+0xd3c
ffffee02`8190c2d0 fffff807`43427cea : ffff890d`00000000 ffffee02`8190c630 00000000`00000000 00000000`0006c9e8 : storport!RaUnitScsiIrp+0x227
ffffee02`8190c370 fffff807`3e431f79 : ffff890d`ac950de0 ffff890d`a3719050 00000000`00002000 00000000`00000000 : storport!RaDriverScsiIrp+0x5a
ffffee02`8190c3b0 fffff807`44099308 : ffff890d`afc37440 ffff890d`ac950de0 ffff890d`a3719050 00000000`00002000 : nt!IofCallDriver+0x59
ffffee02`8190c3f0 fffff807`44098677 : 00000000`00000000 ffff890d`ab55c000 00000000`00000000 00000000`00002000 : CLASSPNP!SubmitTransferPacket+0x288
ffffee02`8190c430 fffff807`4409842e : ffff890d`ac950de0 ffffee02`8190c500 ffff890d`a3d0e000 ffff890d`00020000 : CLASSPNP!ServiceTransferRequest+0x207
ffffee02`8190c4c0 fffff807`440917c3 : ffff890d`af67b310 00000000`00000000 ffff890d`a3772110 fffff807`3e4cf744 : CLASSPNP!ClassReadWrite+0x92e
ffffee02`8190c5f0 fffff807`3e431f79 : fffff780`00000008 fffff807`3e49c9a6 ffff890d`a3aab860 ffff890d`a3b33a20 : CLASSPNP!ClassGlobalDispatch+0x23
ffffee02`8190c620 fffff807`432318c8 : 00000000`00000000 ffff890d`a3b33a20 ffff890d`afc37010 ffff890d`afc37200 : nt!IofCallDriver+0x59
ffffee02`8190c660 fffff807`43231eef : 00000000`002104bc 00000000`34c87679 ffff890d`afc37010 ffff890d`ae695018 : partmgr!PmWrite+0xf8
ffffee02`8190c6e0 fffff807`3e431f79 : ffff890d`00000000 ffffd404`b1e3b910 00000000`00000000 ffff890d`ae05f9c0 : partmgr!PmGlobalDispatch+0x1f
ffffee02`8190c710 fffff807`4323174d : 00000000`00000000 ffffd404`b33216d8 00000000`00000000 ffff890d`afc373b0 : nt!IofCallDriver+0x59
ffffee02`8190c750 fffff807`4323155e : 00000000`00002000 ffff890d`afc37248 ffffee02`8190c9c9 fffff807`3e4cf744 : partmgr!PartitionIo+0x1dd
ffffee02`8190c800 fffff807`43231eef : fffff780`00000008 00000000`34a30596 ffff890d`a3d61010 ffff890d`a3deb180 : partmgr!PartitionWrite+0x1e
ffffee02`8190c830 fffff807`3e431f79 : ffff890d`afc372a8 fffff807`43231f71 00000000`00000000 ffff890d`a3e42090 : partmgr!PmGlobalDispatch+0x1f
ffffee02`8190c860 fffff807`43321109 : ffff890d`a3b2ba40 00000000`00000001 00000000`34c87673 00000000`00000000 : nt!IofCallDriver+0x59
ffffee02`8190c8a0 fffff807`3e431f79 : ffffee02`8190c9c9 fffff807`43e71d78 ffff890d`afc37010 ffff890d`aea41080 : volmgr!VmReadWrite+0xf9
ffffee02`8190c8e0 fffff807`43e639f0 : ffff890d`a3deb180 ffffee02`8190c9c9 ffff890d`afc37010 ffffee02`8190c960 : nt!IofCallDriver+0x59
ffffee02`8190c920 fffff807`43e6305c : 00000000`00000000 00002000`00000000 ffffee02`00000000 ffff890d`a3deb180 : fvevol!FveFilterRundownReadWrite+0x920
ffffee02`8190ca30 fffff807`3e431f79 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fvevol!FveFilterRundownWrite+0x4c
ffffee02`8190cad0 fffff807`44043ca3 : 00000000`00000000 ffff890d`a3de8b60 ffff890d`a3ea0e60 00000000`00000000 : nt!IofCallDriver+0x59
ffffee02`8190cb10 fffff807`44044f2d : 00000000`00000002 ffffee02`8190cc50 00000000`00000000 00000000`00000000 : iorate!IoRateIssueAndRecordIo+0x7f
ffffee02`8190cb50 fffff807`44045120 : ffff890d`ae695018 ffff890d`afc37010 ffff890d`a3d89b20 fffff807`435696cf : iorate!IoRateProcessIrpWrapper+0x19d
ffffee02`8190cc90 fffff807`3e431f79 : 00000000`00000000 fffff807`433b5718 00000000`00000000 ffff890d`ab395080 : iorate!IoRateDispatchReadWrite+0x80
ffffee02`8190ccd0 fffff807`43f21033 : ffffee02`7e7da200 fffff807`43667039 00000000`00000000 ffff890d`ae695018 : nt!IofCallDriver+0x59
ffffee02`8190cd10 fffff807`3e431f79 : ffff890d`a3d899d0 ffff890d`a3d89b20 ffff890d`a3ea0e60 ffff890d`a3ea0998 : volume!VolumePassThrough+0x23
ffffee02`8190cd40 fffff807`433b57c3 : ffff890d`a3d899d0 ffff890d`afc37010 ffff890d`a3d899d0 ffff890d`a3d89b20 : nt!IofCallDriver+0x59
ffffee02`8190cd80 ffff890d`a3d899d0 : ffff890d`afc37010 ffff890d`a3d899d0 ffff890d`a3d89b20 00000000`00000000 : klbackupdisk+0x57c3
ffffee02`8190cd88 ffff890d`afc37010 : ffff890d`a3d899d0 ffff890d`a3d89b20 00000000`00000000 fffff807`433b3d2f : 0xffff890d`a3d899d0
ffffee02`8190cd90 ffff890d`a3d899d0 : ffff890d`a3d89b20 00000000`00000000 fffff807`433b3d2f ffff890d`afc37010 : 0xffff890d`afc37010
ffffee02`8190cd98 ffff890d`a3d89b20 : 00000000`00000000 fffff807`433b3d2f ffff890d`afc37010 00000000`bb8d4001 : 0xffff890d`a3d899d0
ffffee02`8190cda0 00000000`00000000 : fffff807`433b3d2f ffff890d`afc37010 00000000`bb8d4001 00000000`bb8d4000 : 0xffff890d`a3d89b20


THREAD_SHA1_HASH_MOD_FUNC:  8a915e4e48020da2b3e922017b68cfcde7591cd8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c90957a553f3dac2d90e328c2f117ae14fb75224

THREAD_SHA1_HASH_MOD:  ccc78800219fdba98480288798287bcbda34146d

FOLLOWUP_IP:
storahci!SrbConvertToATACommand+248
fffff807`433f4908 488b9c24d8010000 mov     rbx,qword ptr [rsp+1D8h]

FAULT_INSTR_CODE:  249c8b48

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  storahci!SrbConvertToATACommand+248

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: storahci

IMAGE_NAME:  storahci.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  381e77bb

IMAGE_VERSION:  10.0.18362.1216

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  248

FAILURE_BUCKET_ID:  AV_storahci!SrbConvertToATACommand

BUCKET_ID:  AV_storahci!SrbConvertToATACommand

PRIMARY_PROBLEM_CLASS:  AV_storahci!SrbConvertToATACommand

TARGET_TIME:  2020-02-06T04:23:58.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  a2f0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_storahci!srbconverttoatacommand

FAILURE_ID_HASH:  {1da05e06-427b-66ef-d6c8-bfafea49d818}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffcb11fb652420, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: ffffcb11fb652420, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.NQ

BIOS_DATE:  12/02/2019

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffcb11fb652420

BUGCHECK_P2: 10

BUGCHECK_P3: ffffcb11fb652420

BUGCHECK_P4: 2

READ_ADDRESS: fffff8066cb733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffcb11fb652420

FAULTING_IP:
+0
ffffcb11`fb652420 ??              ???

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  avpui.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-06-2020 18:45:27.0545

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffffe0710044c70 -- (.trap 0xfffffe0710044c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcb11fa2626de rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=ffffcb11fb652420 rsp=fffffe0710044e08 rbp=fffffe0710044ec0
r8=0000000000000206  r9=0000000077d11e4c r10=ffffcb11fa423f40
r11=ffffd6f9c8000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
ffffcb11`fb652420 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8066c7e35d6 to fffff8066c7c14e0

FAILED_INSTRUCTION_ADDRESS:
+0
ffffcb11`fb652420 ??              ???

STACK_TEXT:
fffffe07`100449c8 fffff806`6c7e35d6 : 00000000`00000050 ffffcb11`fb652420 00000000`00000010 fffffe07`10044c70 : nt!KeBugCheckEx
fffffe07`100449d0 fffff806`6c672eef : 00000000`00000000 00000000`00000010 00000000`00000000 ffffcb11`fb652420 : nt!MiSystemFault+0x1d6866
fffffe07`10044ad0 fffff806`6c7cf520 : ffffb48f`c08ef150 00000000`00000000 00000000`00218000 fffff806`6cbec465 : nt!MmAccessFault+0x34f
fffffe07`10044c70 ffffcb11`fb652420 : ffffcb11`fa872f89 00000000`77c93620 00000000`0391fda0 ffffcb11`fa2626de : nt!KiPageFault+0x360
fffffe07`10044e08 ffffcb11`fa872f89 : 00000000`77c93620 00000000`0391fda0 ffffcb11`fa2626de ffffd6f9`c8000000 : 0xffffcb11`fb652420
fffffe07`10044e10 fffff806`6c7d2d18 : ffff9f0a`71a51080 00007ffd`83a25930 fffffe07`10044ec0 ffff9f0a`716ba960 : win32kfull!NtUserGetForegroundWindow+0x19
fffffe07`10044e40 00000000`77c91cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0391d8b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c91cbc


THREAD_SHA1_HASH_MOD_FUNC:  4e1a30d891c32130982a63e8e55dabf036bb6497

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  8b593ea1dda5f7d47915cfb54dc3c15dd77c6663

THREAD_SHA1_HASH_MOD:  ae4bd38e9ba92a6f2c429b420c473de0b218cf72

FOLLOWUP_IP:
win32kfull!NtUserGetForegroundWindow+19
ffffcb11`fa872f89 488b05c03f2400  mov     rax,qword ptr [win32kfull!_imp_gpqForeground (ffffcb11`faab6f50)]

FAULT_INSTR_CODE:  c0058b48

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  win32kfull!NtUserGetForegroundWindow+19

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.628

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  19

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_win32kfull!NtUserGetForegroundWindow

BUCKET_ID:  AV_INVALID_BAD_IP_win32kfull!NtUserGetForegroundWindow

PRIMARY_PROBLEM_CLASS:  AV_INVALID_BAD_IP_win32kfull!NtUserGetForegroundWindow

TARGET_TIME:  2020-02-06T04:59:56.000Z

OSBUILD:  18362

OSSERVICEPACK:  628

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1991-11-30 08:21:39

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3e50

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_invalid_bad_ip_win32kfull!ntusergetforegroundwindow

FAILURE_ID_HASH:  {a3999bb5-77ad-f967-dcff-63d20745dd5d}

Followup:     MachineOwner
---------

Öncelikle teşekkür ediyorum.
BIOS'un beta olduğunu sonradan fark etmiştim, gözden kaçmıştı.
Memtest86 testini bu hataları almadan 1 hafta önce falan yaptım her şey temiz çıktı. 3-4 saat falan sürmüştü test.
Dosyaları kaldırıp tekrar kuracağım fakat, bilgisayarı açıp temizledikten sonra bu hataları almam normal değil sanırım :/
 
İlk mesajında söylemediğin bilgisayarını açıp temizlediğini söylememen dosyalardan çıkardığım sonuçları değiştirmiyor, dediklerimi uyguladıktan sonra dosya alırsan paylaş.
Anlatmak istediğim şey, uzun süredir bu programlar ile kullanıyorum bilgisayarı ve sorun yaşamıyordum. Temiz kurulum yapacağım, sorun olursa tekrar rahatsız edeyim
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı