Kasa ufak bir sarsıntıda MEMORY_MANAGEMENT mavi ekran veriyor ya da reset atıyor

emreycly

Decapat
Katılım
24 Temmuz 2018
Mesajlar
22
Daha fazla  
Cinsiyet
Erkek
Meslek
Öğrenci
Bilgisayar oynarken masaya olan ufak bir sallantı da bilgisayar mavi ekran veriyor veya reset atıyor.
 
 
Technopat Minidump.rar
@MayCrasH @SerdarAksu CanYamanOyunda
 
Son düzenleme:
İki tane bellek takıyorsan bir tanesi bozulmuş galiba, BIOS altında gözükmüyor.

Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


HD Tune programı ile sisteme takılı tüm depolama birimlerinin Error Scan ve Health sonuçlarını fotoğraf şeklinde paylaş.

Error Scan testinde Quick Scan yapma.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000411, The subtype of the bugcheck.
Arg2: fffffe015c97bf80
Arg3: 000000006d153820
Arg4: fffffe37f2850fe0

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.B0

BIOS_DATE:  12/08/2017

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 411

BUGCHECK_P2: fffffe015c97bf80

BUGCHECK_P3: 6d153820

BUGCHECK_P4: fffffe37f2850fe0

BUGCHECK_STR:  0x1a_411

CPU_COUNT: c

CPU_MHZ: c80

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-20-2020 19:42:38.0792

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80109ad17e2 to fffff80109bc2390

STACK_TEXT: 
fffffb84`a43cd748 fffff801`09ad17e2 : 00000000`0000001a 00000000`00000411 fffffe01`5c97bf80 00000000`6d153820 : nt!KeBugCheckEx
fffffb84`a43cd750 fffff801`09acaebd : fffffb84`a43cd880 ffffbc0d`ef93b4c0 00000000`00000000 00000000`00000000 : nt!MiResolveTransitionFault+0xd52
fffffb84`a43cd810 fffff801`09ac8fc9 : 00000000`00000000 00000000`00000001 00000000`c0000016 00000000`00000000 : nt!MiDispatchFault+0x83d
fffffb84`a43cd960 fffff801`09bd041e : 000000d0`49ff6378 fffffb84`a43cdb80 00000000`00000000 ffffbc0d`ef0dd5e0 : nt!MmAccessFault+0x169
fffffb84`a43cdb00 00007ff8`117784d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000d0`49ffa710 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`117784d4


THREAD_SHA1_HASH_MOD_FUNC:  d4fd8ae7f3a13d344d4e90e8263298e0f208c440

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e5730408f3abdcbaf759a6e8dee2e07643521d99

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!MiResolveTransitionFault+d52
fffff801`09ad17e2 cc              int     3

FAULT_INSTR_CODE:  cc8b49cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiResolveTransitionFault+d52

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5629d63a

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  d52

FAILURE_BUCKET_ID:  0x1a_411_nt!MiResolveTransitionFault

BUCKET_ID:  0x1a_411_nt!MiResolveTransitionFault

PRIMARY_PROBLEM_CLASS:  0x1a_411_nt!MiResolveTransitionFault

TARGET_TIME:  2020-04-20T12:29:10.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  cac

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_411_nt!miresolvetransitionfault

FAILURE_ID_HASH:  {e9f91d46-cc91-a17c-1d9b-79d82709eb8b}

Followup:     MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff8681581cb1b0
Arg3: ffffc68664cfcf20
Arg4: fffff80669fd00d0

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.B0

BIOS_DATE:  12/08/2017

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: ffff8681581cb1b0

BUGCHECK_P3: ffffc68664cfcf20

BUGCHECK_P4: fffff80669fd00d0

BUGCHECK_STR:  0x7f_8

TRAP_FRAME:  ffff8681581cb1b0 -- (.trap 0xffff8681581cb1b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000500 rbx=0000000000000000 rcx=00000000000004e8
rdx=ffffc68664cfd0b8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80669fd00d0 rsp=ffffc68664cfcf20 rbp=ffffc68664cfcfa0
 r8=00000000000004f7  r9=00000000000004d0 r10=ffffc68664cfc000
r11=ffffc68664cfc000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na pe nc
nt!KiPageFault+0x10:
fffff806`69fd00d0 c645ab01        mov     byte ptr [rbp-55h],1 ss:0018:ffffc686`64cfcf4b=??
Resetting default scope

CPU_COUNT: c

CPU_MHZ: c80

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  spoolsv.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-20-2020 19:42:42.0317

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80669fd41e9 to fffff80669fc2390

STACK_OVERFLOW: Stack Limit: ffffc68664cfd000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xfffff80669efe7f4 was blamed for the stack overflow. It is using 13696 bytes of stack total in 8 instances (likely recursion).

FOLLOWUP_IP:
nt!KiDispatchException+104
fffff806`69efe7f4 4c8bc6          mov     r8,rsi

STACK_TEXT: 
ffffc686`64cfcf20 fffff806`69fcad86 : 00000000`00000000 00000000`0010001f fffff806`69efe7d0 00000001`00000000 : nt!KiPageFault+0x10
ffffc686`64cfd0b8 fffff806`69efe7d0 : 00000001`00000000 ffffffff`00000001 00000000`00000001 00000000`0000096d : nt!_chkstk+0x36
ffffc686`64cfd0d0 fffff806`69fd431d : 20000010`00000021 ffffffff`ffffffff 00000000`00000000 00000000`1af1d2c8 : nt!KiDispatchException+0xe0
ffffc686`64cfd280 fffff806`69fd00a0 : 00000000`00000000 00000000`1af1d398 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffffc686`64cfd460 fffff806`69efe29a : 00000000`00000000 050e0000`00000d05 8020000d`00000008 ffffffff`ffffffff : nt!KiGeneralProtectionFault+0x320
ffffc686`64cfd5f0 fffff806`69efe0b0 : ffffc686`64cfd6a0 ffffc686`64cfdba0 ffffc686`64cfd6a0 000007eb`000007eb : nt!RtlInitializeExtendedContext2+0x9e
ffffc686`64cfd640 fffff806`69efe7f4 : 00000000`1af1d5f8 00000000`00000000 00000003`00000227 00000000`00000001 : nt!RtlInitializeExtendedContext+0x38
ffffc686`64cfd670 fffff806`69fd431d : 00000000`00000010 00000000`00000d6d 00200000`00000021 00000223`00000223 : nt!KiDispatchException+0x104
ffffc686`64cfdd20 fffff806`69fd00a0 : 00000000`00000000 04010000`0000090b 08000040`00000021 00000104`00000104 : nt!KiExceptionDispatch+0x11d
ffffc686`64cfdf00 fffff806`69efe29a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffffc686`64cfe090 fffff806`69efe0b0 : ffffc686`64cfe140 ffffc686`64cfe640 ffffc686`64cfe140 00000000`00000000 : nt!RtlInitializeExtendedContext2+0x9e
ffffc686`64cfe0e0 fffff806`69efe7f4 : 00560074`00730069 00330077`00650069 00000000`00000032 00000000`00000001 : nt!RtlInitializeExtendedContext+0x38
ffffc686`64cfe110 fffff806`69fd431d : 00000000`00000000 00000000`00000000 00000006`25002e4f 00000000`00000104 : nt!KiDispatchException+0x104
ffffc686`64cfe7c0 fffff806`69fd00a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffffc686`64cfe9a0 fffff806`69efe29a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffffc686`64cfeb30 fffff806`69efe0b0 : ffffc686`64cfebe0 ffffc686`64cff0e0 ffffc686`64cfebe0 00000000`00000000 : nt!RtlInitializeExtendedContext2+0x9e
ffffc686`64cfeb80 fffff806`69efe7f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!RtlInitializeExtendedContext+0x38
ffffc686`64cfebb0 fffff806`69fd431d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x104
ffffc686`64cff260 fffff806`69fd00a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffffc686`64cff440 fffff806`69efe29a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffffc686`64cff5d0 fffff806`69efe0b0 : ffffc686`64cff680 ffffc686`64cffb80 ffffc686`64cff680 00000000`00000000 : nt!RtlInitializeExtendedContext2+0x9e
ffffc686`64cff620 fffff806`69efe7f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!RtlInitializeExtendedContext+0x38
ffffc686`64cff650 fffff806`69fd431d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x104
ffffc686`64cffd00 fffff806`69fd00a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffffc686`64cffee0 fffff806`69efe29a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffffc686`64d00070 fffff806`69efe0b0 : ffffc686`64d00120 ffffc686`64d00620 ffffc686`64d00120 00000000`00000000 : nt!RtlInitializeExtendedContext2+0x9e
ffffc686`64d000c0 fffff806`69efe7f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!RtlInitializeExtendedContext+0x38
ffffc686`64d000f0 fffff806`69fd431d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x104
ffffc686`64d007a0 fffff806`69fd00a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffffc686`64d00980 fffff806`69efe29a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffffc686`64d00b10 fffff806`69efe0b0 : ffffc686`64d00bc0 ffffc686`64d010c0 ffffc686`64d00bc0 00000000`00000000 : nt!RtlInitializeExtendedContext2+0x9e
ffffc686`64d00b60 fffff806`69efe7f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!RtlInitializeExtendedContext+0x38
ffffc686`64d00b90 fffff806`69fd431d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x104
ffffc686`64d01240 fffff806`69fd00a0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`6a4955ae : nt!KiExceptionDispatch+0x11d
ffffc686`64d01420 fffff806`69efe29a : 00000000`001aa113 ffffc686`64d018d0 fffff500`00010b78 ffff9980`04fe3390 : nt!KiGeneralProtectionFault+0x320
ffffc686`64d015b0 fffff806`69efe0b0 : ffffc686`64d01660 ffffc686`64d01b60 ffffc686`64d01660 00000000`00000000 : nt!RtlInitializeExtendedContext2+0x9e
ffffc686`64d01600 fffff806`69efe7f4 : 00000000`00000000 00000000`00000000 00000001`00000010 00000000`00000001 : nt!RtlInitializeExtendedContext+0x38
ffffc686`64d01630 fffff806`69fd431d : ffffdd82`77daa474 ffffdd82`77daa480 fffff806`6a7493e0 ffffc686`00000001 : nt!KiDispatchException+0x104
ffffc686`64d01ce0 fffff806`69fd00a0 : ffff8681`58299000 00000000`00000003 ffffb689`bb590dd0 ffffb689`bb590dd0 : nt!KiExceptionDispatch+0x11d
ffffc686`64d01ec0 fffff806`69efe29a : ffffb689`bb8143a0 fffff806`69f1254d ffffb689`bb814080 ffffb689`b045ded0 : nt!KiGeneralProtectionFault+0x320
ffffc686`64d02050 fffff806`69efe0b0 : ffffc686`64d02100 ffffc686`64d02600 ffffc686`64d02100 ffffb689`b04d8c30 : nt!RtlInitializeExtendedContext2+0x9e
ffffc686`64d020a0 fffff806`69efe7f4 : ffffc686`64d02170 fffff806`69f1ff67 ffffb689`00000000 ffffdd82`00000001 : nt!RtlInitializeExtendedContext+0x38
ffffc686`64d020d0 fffff806`69fd431d : ffff8681`00000001 00000000`00000001 ffffb689`bcbc0de0 fffff806`69f0a077 : nt!KiDispatchException+0x104
ffffc686`64d02780 fffff806`69fce8a9 : ffffb689`bb71af10 00000000`00000001 00000000`00000001 ffffb689`b01d1b60 : nt!KiExceptionDispatch+0x11d
ffffc686`64d02960 fffff806`6a4ac7c4 : fffff806`69fd3c15 00000000`0135d5e0 ffffc686`64d02b80 ffffffff`fff0bdc0 : nt!KiInvalidOpcodeFault+0x329
ffffc686`64d02af8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpQuerySystemInformation+0x1b14


STACK_COMMAND:  .trap 0xffff8681581cb1b0 ; kb

THREAD_SHA1_HASH_MOD_FUNC:  78b7b82947c84b0ee6c55141dce14b11de5880dc

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e2fe16522326a1da560e23c118621fb953efe2fe

THREAD_SHA1_HASH_MOD:  9a6264f3cb0ce02171c65d2eacec10c5969142c8

FAULT_INSTR_CODE:  48c68b4c

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  nt!KiDispatchException+104

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5629d63a

IMAGE_VERSION:  10.0.18362.778

BUCKET_ID_FUNC_OFFSET:  104

FAILURE_BUCKET_ID:  0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException

BUCKET_ID:  0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException

PRIMARY_PROBLEM_CLASS:  0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException

TARGET_TIME:  2020-04-20T12:31:00.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3593

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x7f_8_stack_usage_recursion_nt!kidispatchexception

FAILURE_ID_HASH:  {cbb9a1ac-821c-b542-365f-2dd5602e6100}

Followup:     MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffc0af5032be0, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffffc0af5032be0, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.B0

BIOS_DATE:  12/08/2017

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffffc0af5032be0

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffffc0af5032be0

READ_ADDRESS: fffff806123733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 fffffc0af5032be0

CURRENT_IRQL:  0

FAULTING_IP:
+0
fffffc0a`f5032be0 ??              ???

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BUGCHECK_STR:  DISABLED_INTERRUPT_FAULT

CPU_COUNT: c

CPU_MHZ: c80

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-20-2020 19:42:33.0580

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffff918d66099640 -- (.trap 0xffff918d66099640)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffc0af5032be0 rbx=0000000000000000 rcx=ffff800f3e7c9390
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffffc0af5032be0 rsp=ffff918d660997d8 rbp=ffff800f3ec5b010
 r8=00000000ffffffff  r9=0000000000000000 r10=fffffc0af5032be0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
fffffc0a`f5032be0 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80611fd41e9 to fffff80611fc2390

FAILED_INSTRUCTION_ADDRESS:
+0
fffffc0a`f5032be0 ??              ???

STACK_TEXT: 
ffff918d`660994f8 fffff806`11fd41e9 : 00000000`0000000a fffffc0a`f5032be0 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff918d`66099500 fffff806`11fd0529 : 00000000`00000000 00000000`00000004 00000000`00140001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff918d`66099640 fffffc0a`f5032be0 : fffff806`11ebb8e1 000004b9`bbeb9c29 000004b9`bbeb9c29 ffff800f`3ec5b010 : nt!KiPageFault+0x469
ffff918d`660997d8 fffff806`11ebb8e1 : 000004b9`bbeb9c29 000004b9`bbeb9c29 ffff800f`3ec5b010 00000000`00000000 : 0xfffffc0a`f5032be0
ffff918d`660997e0 fffff806`11ebadde : 00000000`00000003 00000000`00000002 ffff800f`3ec5b100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x961
ffff918d`66099b00 fffff806`11fc5e84 : ffffffff`00000000 ffffb001`8a720180 ffff800f`44899080 00000000`000004a0 : nt!PoIdle+0x36e
ffff918d`66099c60 00000000`00000000 : ffff918d`6609a000 ffff918d`66094000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x44


THREAD_SHA1_HASH_MOD_FUNC:  fbc86847fe4eb6c3c1fac4537ef130091fd9343a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  7c1aedcbc7efe9a4b0c4e61c7bb8e5425674b949

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!KiPageFault+469
fffff806`11fd0529 33c0            xor     eax,eax

FAULT_INSTR_CODE:  ffb0c033

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+469

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5629d63a

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

PRIMARY_PROBLEM_CLASS:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

TARGET_TIME:  2020-04-18T14:39:46.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5b1

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:disabled_interrupt_fault_code_av_bad_ip_nt!kipagefault

FAILURE_ID_HASH:  {f2ab72c5-099d-9077-bfcf-ba12aa825b36}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801500214a7, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 000000c800000002, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7A39

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.B0

BIOS_DATE:  12/08/2017

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B350M GAMING PRO (MS-7A39)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff801500214a7

BUGCHECK_P3: 0

BUGCHECK_P4: c800000002

READ_ADDRESS: fffff801505733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 000000c800000002

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!IoReuseIrp+77
fffff801`500214a7 0fb64002        movzx   eax,byte ptr [rax+2]

EXCEPTION_PARAMETER2:  000000c800000002

BUGCHECK_STR:  0x1E_c0000005_R

CPU_COUNT: c

CPU_MHZ: c80

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  software_reporter_tool.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-20-2020 19:42:29.0761

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

EXCEPTION_RECORD:  ffff90c864321000 -- (.exr 0xffff90c864321000)
ExceptionAddress: 0000000000000000
   ExceptionCode: 7c243867
  ExceptionFlags: 0a000000
NumberParameters: 0

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

LAST_CONTROL_TRANSFER:  from fffff8015025ad71 to fffff801501c2390

STACK_TEXT: 
ffffe38e`b42d7af8 fffff801`5025ad71 : 00000000`0000001e ffffffff`c0000005 fffff801`500214a7 00000000`00000000 : nt!KeBugCheckEx
ffffe38e`b42d7b00 fffff801`501d431d : ffff90c8`64321000 ffffe38e`b42d8390 ffff8000`00000000 000000c8`00000002 : nt!KiDispatchException+0x15c681
ffffe38e`b42d81b0 fffff801`501d0503 : 00000000`00000028 00000000`40200342 00000000`00000000 fffff801`00000001 : nt!KiExceptionDispatch+0x11d
ffffe38e`b42d8390 fffff801`500214a7 : ffff9806`3df68050 fffff801`54461000 ffff9806`405df870 fffff801`54407cea : nt!KiPageFault+0x443
ffffe38e`b42d8520 fffff801`550390c0 : 00000000`00000001 ffff9806`405df870 ffff9806`3df68050 00000000`00002000 : nt!IoReuseIrp+0x77
ffffe38e`b42d85c0 fffff801`55038677 : 00000000`00000000 ffffc289`d35f1000 00000000`00000000 00000000`00002000 : CLASSPNP!SubmitTransferPacket+0x40
ffffe38e`b42d8600 fffff801`5503840a : ffff9806`405df870 ffff9806`402d3000 ffffe38e`00000000 ffff9806`00020000 : CLASSPNP!ServiceTransferRequest+0x207
ffffe38e`b42d8690 fffff801`550317c4 : 00000001`00000001 00000000`a52256a0 00000000`00000000 fffff801`5001f10f : CLASSPNP!ClassReadWrite+0x90a
ffffe38e`b42d87c0 fffff801`5010a929 : fffff780`00000008 fffff801`5001d846 ffff9806`402de850 ffff9806`4c5f7ab0 : CLASSPNP!ClassGlobalDispatch+0x24
ffffe38e`b42d87f0 fffff801`541a1c37 : 00000000`00000000 00000000`00000000 ffff9806`4c5f7ca0 ffff9806`40099a20 : nt!IofCallDriver+0x59
ffffe38e`b42d8830 fffff801`541a1ef0 : 00000000`00000001 00000000`a52ea031 00000000`00000000 ffff9806`400d38f0 : partmgr!PmIo+0xd7
ffffe38e`b42d88b0 fffff801`5010a929 : 00000000`00000200 ffff9806`4cbd1a90 ffffe38e`b42d8aa9 fffff801`5001f10f : partmgr!PmGlobalDispatch+0x20
ffffe38e`b42d88e0 fffff801`541a1748 : ffff9806`402d7010 ffff9806`4031c180 00000000`00000000 fffff801`5010a929 : nt!IofCallDriver+0x59
ffffe38e`b42d8920 fffff801`541a1ef0 : 00000000`00002000 ffff9806`4c5f7ce8 ffffe38e`b42d8b69 ffff9806`4031c180 : partmgr!PartitionIo+0x1d8
ffffe38e`b42d89d0 fffff801`5010a929 : ffff9806`4c5f7d48 fffff801`541a1f6c 00000000`00000000 ffff9806`40309820 : partmgr!PmGlobalDispatch+0x20
ffffe38e`b42d8a00 fffff801`54291104 : ffff9806`400d3a40 00000000`00000001 00000000`a52ea00d 00000000`00002000 : nt!IofCallDriver+0x59
ffffe38e`b42d8a40 fffff801`5010a929 : ffffe38e`b42d8b69 fffff801`54e21d88 ffff9806`4c5f7ab0 00000000`00000000 : volmgr!VmReadWrite+0xf4
ffffe38e`b42d8a80 fffff801`54e139eb : 00000000`00000002 ffffe38e`b42d8b69 ffff9806`4c5f7ab0 fffff801`54fd4d6e : nt!IofCallDriver+0x59
ffffe38e`b42d8ac0 fffff801`54e130b7 : ffffffff`ffffffd2 fffff801`5010a929 ffff3463`9f82262c 00000000`00000002 : fvevol!FveFilterRundownReadWrite+0x91b
ffffe38e`b42d8bd0 fffff801`5010a929 : 00000000`00000000 00000000`00000000 ffff9806`00000000 00000000`00000000 : fvevol!FveFilterRundownRead+0x27
ffffe38e`b42d8c00 fffff801`54fd3c9e : 00000000`00000000 ffff9806`4031db20 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x59
ffffe38e`b42d8c40 fffff801`54fd4f2d : 00000000`00000002 ffffe38e`b42d8d80 00000000`00000000 00000000`00000000 : iorate!IoRateIssueAndRecordIo+0x7a
ffffe38e`b42d8c80 fffff801`54fd5120 : ffff9806`4dea4620 ffff9806`4031e180 ffff9806`4bdb4080 ffff9806`4d7f3a04 : iorate!IoRateProcessIrpWrapper+0x19d
ffffe38e`b42d8dc0 fffff801`5010a929 : ffff9806`4dea4620 00000000`00000000 ffff9806`451de9b0 fffff801`5010a929 : iorate!IoRateDispatchReadWrite+0x80
ffffe38e`b42d8e00 fffff801`54ed102e : 00000001`00060000 ffffe38e`b42d8e48 ffffe38e`b42d8e48 fffff801`54ee1278 : nt!IofCallDriver+0x59
ffffe38e`b42d8e40 fffff801`5010a929 : fffff801`53b09060 00000000`00000000 00000000`00000000 00000000`00000000 : volume!VolumePassThrough+0x1e
ffffe38e`b42d8e70 fffff801`54ee134b : 00000000`00000000 ffffe38e`b02901f0 ffffe38e`b028ffe0 ffff9806`4f120080 : nt!IofCallDriver+0x59
ffffe38e`b42d8eb0 fffff801`54ee12c9 : ffffe38e`b22675b8 00000000`00000000 ffffe38e`b0290000 fffff801`53b1e430 : volsnap!VolSnapReadFilter+0x6b
ffffe38e`b42d8ee0 fffff801`5010a929 : ffff9806`4efb7080 ffffe38e`b12d7100 00000000`00000000 00000000`00000000 : volsnap!VolSnapRead+0x19
ffffe38e`b42d8f10 fffff801`54543277 : ffffe38e`b12d6fd0 00000000`00000000 ffffe38e`b12d6e00 ffff9806`4efb7080 : nt!IofCallDriver+0x59
ffffe38e`b42d8f50 fffff801`501c5c4e : ffffe38e`b12d6fd0 ffffe38e`b42d8fd0 00000000`00000000 00000000`00000001 : Ntfs!NtfsStorageDriverCallout+0x17
ffffe38e`b42d8f80 fffff801`501c5c0c : ffffe38e`b42d8fd0 ffff9806`4bdb4080 ffffe38e`b42d9000 fffff801`500c042e : nt!KxSwitchKernelStackCallout+0x2e
ffffe38e`b22673a0 fffff801`500c042e : ffffe38e`b42d8fd0 ffffe38e`b42d9000 00000000`00000001 00000000`00000000 : nt!KiSwitchKernelStackContinue
ffffe38e`b22673c0 fffff801`500c022c : fffff801`54543260 ffffe38e`b22675b8 00002000`00000002 00000100`00000002 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x18e
ffffe38e`b2267460 fffff801`500c00a3 : ffffe38e`b22676f0 ffffe38e`b22677c0 00000000`00000001 ffff9806`417bb8a8 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xdc
ffffe38e`b22674d0 fffff801`500c005d : fffff801`54543260 ffffe38e`b22675b8 00000000`00000001 ffff9806`417bb8a8 : nt!KeExpandKernelStackAndCalloutInternal+0x33
ffffe38e`b2267540 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d


THREAD_SHA1_HASH_MOD_FUNC:  98dc7917fb8689ec8ef7c405f78783d3b6101549

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d0e3f9f0d48bf4762d0d9f45cda66dbad5cb3f91

THREAD_SHA1_HASH_MOD:  c35e10b72760f60cba1d211c137ef2807af30934

FOLLOWUP_IP:
partmgr!PmIo+d7
fffff801`541a1c37 0f1f440000      nop     dword ptr [rax+rax]

FAULT_INSTR_CODE:  441f0f

SYMBOL_STACK_INDEX:  a

SYMBOL_NAME:  partmgr!PmIo+d7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: partmgr

IMAGE_NAME:  partmgr.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.752

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d7

FAILURE_BUCKET_ID:  0x1E_c0000005_R_partmgr!PmIo

BUCKET_ID:  0x1E_c0000005_R_partmgr!PmIo

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_R_partmgr!PmIo

TARGET_TIME:  2020-04-18T13:19:08.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  29f2

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_r_partmgr!pmio

FAILURE_ID_HASH:  {ab1c70d2-a87c-dcd7-d247-c223a804db8e}

Followup:     MachineOwner
---------
 

Bir tane RAM'iniz gözükmemekte. Memtest86 testini yaparsan daha iyi bir şekilde yardımcı olabilirim.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
 
Bir tane RAM'iniz gözükmemekte. Memtest86 testini yaparsan daha iyi bir şekilde yardımcı olabilirim.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Maalesef boş USB belleğim yok.
Bunlar SSD ve sabit diskin health fotoğrafları birazdan error scan testini atacağım.
Bu SSD error scan ekran görünütüsü birazdan sabit diskinin error scan görüntüsünü atacağım.
 

Dosya Ekleri

  • Screenshot_23.png
    Screenshot_23.png
    9,3 KB · Görüntüleme: 30
  • Screenshot_24.png
    Screenshot_24.png
    8 KB · Görüntüleme: 23
  • Screenshot_26.png
    Screenshot_26.png
    44 KB · Görüntüleme: 20
Son düzenleyen: Moderatör:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı