KERNEL_SECURITY_CHECK_FAILURE Mavi ekran hatası

cardepare

Centipat
Katılım
5 Mayıs 2020
Mesajlar
19
PC ben yeni topladım.

  • B450M-A PRO Max
  • 1050 Ti ekran kartı
  • G.Skill Sniper X DDR4 3000MHz CL16 2x8GB
  • 3600X işlemci aldım

3-4 gün geçiyor sonra ara ara mavi ekran hatası alıyorum ve bunun nedenini anlamıyorum. PC'den de anlamam. Oturduğum bölgede de doğru düzgün PC yok ve bunları toplama aldığım için ne yapacağımı da bilemiyorum. Bana yardımcı olabilecek biri var mı acaba? İnternette dolaşırken bir anda mavi ekran hatası alıyorum. CoD'u okutuyorum telefona ama bir şey açıklamıyor.

 
Son düzenleyen: Moderatör:

Bellekleri test edin.

Komut satırını (CMD) yönetici olarak başlatın ve komutları yazın;
  1. sfc /scannow
  2. DISM.exe /Online /Cleanup-image /Scanhealth
  3. DISM.exe /Online /Cleanup-image /Restorehealth
Bunları uyguladıktan sonra bilgisayarı yeniden başlatın.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffd90ee19dab22, Address of the instruction which caused the bugcheck
Arg3: ffffd18d63e98920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 6

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 13

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffd90ee19dab22

BUGCHECK_P3: ffffd18d63e98920

BUGCHECK_P4: 0

CONTEXT:  ffffd18d63e98920 -- (.cxr 0xffffd18d63e98920)
rax=ffffd95640a12168 rbx=00000000110a0c0f rcx=000000000000184d
rdx=ffffd95640a12168 rsi=ffffd95641a12168 rdi=0000000000000000
rip=ffffd90ee19dab22 rsp=ffffd18d63e99310 rbp=000000000000000a
 r8=ffffd18d63e99288  r9=0000000000000000 r10=fffff80148312460
r11=ffffd18d63e992e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
win32kbase!HmgShareLock+0x62:
ffffd90e`e19dab22 40386e0e        cmp     byte ptr [rsi+0Eh],bpl ds:002b:ffffd956`41a12176=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  ts3client_win64.exe

STACK_TEXT: 
ffffd18d`63e99310 ffffd90e`e16d9e8d : 00000000`110a0c0f ffffd18d`63e99618 ffffdd8f`5ecb2c60 ffffd18d`63e99418 : win32kbase!HmgShareLock+0x62
ffffd18d`63e99380 ffffd90e`e16be38f : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000228 : win32kfull!NtGdiGetRealizationInfo+0x48d
ffffd18d`63e995e0 ffffd90e`e16be26d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!NtGdiGetCharABCWidthsW+0x1ff
ffffd18d`63e99a00 fffff801`483d3c18 : ffffffff`a4010be9 ffffd90e`0000001d ffffdd8f`00000001 00000000`00000000 : win32kfull!NtGdiGetCharABCWidthsW+0xdd
ffffd18d`63e99a90 00007ffe`7ae36564 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e7`d84f6818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7ae36564


SYMBOL_NAME:  win32kbase!HmgShareLock+62

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .cxr 0xffffd18d63e98920 ; kb

BUCKET_ID_FUNC_OFFSET:  62

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kbase!HmgShareLock

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f8d7532b-024c-73a1-ea86-fe13f10138bd}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80710455a1c, Address of the instruction which caused the bugcheck
Arg3: fffff10e236c2d40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 8

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80710455a1c

BUGCHECK_P3: fffff10e236c2d40

BUGCHECK_P4: 0

CONTEXT:  fffff10e236c2d40 -- (.cxr 0xfffff10e236c2d40)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc00010bb9180
rdx=0000000000000000 rsi=0000000001000000 rdi=0000000001000000
rip=fffff80710455a1c rsp=fffff10e236c3730 rbp=ffffd48d7c09f7a0
 r8=0000000001000000  r9=00000000ffffffff r10=7ffffffffffffffc
r11=fffff10e236c3710 r12=ffffd48d7c09f7d8 r13=0000000001000000
r14=ffffd48d7bb5d840 r15=ffffffffffffffff
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!MiFinishVadDeletion+0x16484c:
fffff807`10455a1c 488b1f          mov     rbx,qword ptr [rdi] ds:002b:00000000`01000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
fffff10e`236c3730 fffff807`102f1059 : ffffffff`00000000 00000000`00000001 ffffd48d`00000000 00000000`00000000 : nt!MiFinishVadDeletion+0x16484c
fffff10e`236c37e0 fffff807`1087979d : 00000000`00000000 ffffd48d`7ba5eb70 ffffd48d`7ba5eb70 00000000`00000000 : nt!MiDeleteVad+0x19a9
fffff10e`236c39a0 fffff807`10879593 : ffffd48d`7c09f7a0 00000000`00000000 000001bc`9cad0000 00000000`00000000 : nt!MiUnmapVad+0x49
fffff10e`236c39d0 fffff807`10879429 : ffffd48d`7bb5d340 000001bc`00000008 ffffd48d`712a64e0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
fffff10e`236c3ab0 fffff807`103d3c18 : ffffd48d`79793080 000001bc`9cad0000 00000000`0000fefb ffffd48d`7bb5d340 : nt!NtUnmapViewOfSectionEx+0x99
fffff10e`236c3b00 00007ffb`93fdf924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000079`2387d488 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`93fdf924


SYMBOL_NAME:  nt!MiFinishVadDeletion+16484c

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .cxr 0xfffff10e236c2d40 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  16484c

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!MiFinishVadDeletion

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2657f179-9eb8-9bfb-ae5c-b5b05e603b62}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff930d6f3dab22, Address of the instruction which caused the bugcheck
Arg3: fffff98b3381a920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 27

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff930d6f3dab22

BUGCHECK_P3: fffff98b3381a920

BUGCHECK_P4: 0

CONTEXT:  fffff98b3381a920 -- (.cxr 0xfffff98b3381a920)
rax=ffff934a00a1b1b0 rbx=00000000220a1212 rcx=00000000000028c9
rdx=ffff934a00a1b1b0 rsi=ffff934a01a1b1b0 rdi=0000000000000000
rip=ffff930d6f3dab22 rsp=fffff98b3381b310 rbp=000000000000000a
 r8=fffff98b3381b288  r9=0000000000000000 r10=fffff80029112460
r11=fffff98b3381b2e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
win32kbase!HmgShareLock+0x62:
ffff930d`6f3dab22 40386e0e        cmp     byte ptr [rsi+0Eh],bpl ds:002b:ffff934a`01a1b1be=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  ts3client_win64.exe

STACK_TEXT: 
fffff98b`3381b310 ffff930d`6f0d9e8d : 00000000`220a1212 fffff98b`3381b618 ffffbd07`79aae680 fffff98b`3381b418 : win32kbase!HmgShareLock+0x62
fffff98b`3381b380 00000000`220a1212 : fffff98b`3381b618 ffffbd07`79aae680 fffff98b`3381b418 fffff98b`00000000 : win32kfull+0xd9e8d
fffff98b`3381b388 fffff98b`3381b618 : ffffbd07`79aae680 fffff98b`3381b418 fffff98b`00000000 fffff98b`3381b418 : 0x220a1212
fffff98b`3381b390 ffffbd07`79aae680 : fffff98b`3381b418 fffff98b`00000000 fffff98b`3381b418 00000000`00000000 : 0xfffff98b`3381b618
fffff98b`3381b398 fffff98b`3381b418 : fffff98b`00000000 fffff98b`3381b418 00000000`00000000 00000000`00000000 : 0xffffbd07`79aae680
fffff98b`3381b3a0 fffff98b`00000000 : fffff98b`3381b418 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff98b`3381b418
fffff98b`3381b3a8 fffff98b`3381b418 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff98b`00000000
fffff98b`3381b3b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000001 : 0xfffff98b`3381b418


SYMBOL_NAME:  win32kbase!HmgShareLock+62

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .cxr 0xfffff98b3381a920 ; kb

BUCKET_ID_FUNC_OFFSET:  62

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kbase!HmgShareLock

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f8d7532b-024c-73a1-ea86-fe13f10138bd}

Followup:     MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffac8aeabf3300, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 5

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffac8aeabf3300

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

ERROR_CODE: (NTSTATUS) 0xf05c4080 - <Unable to get error code text>

CRITICAL_PROCESS_REPORTGUID:  {45119e30-277b-48e3-a025-83d2e8dc2ad8}

IMAGE_NAME:  unknown

MODULE_NAME: unknown

FAULTING_MODULE: 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
fffffd86`04026938 fffff804`676cb8a9 : 00000000`000000ef ffffac8a`eabf3300 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffd86`04026940 fffff804`675ecbdf : ffffac8a`eabf3300 fffff804`66e88065 ffffac8a`eabf3300 fffff804`66e880e0 : nt!PspCatchCriticalBreak+0x115
fffffd86`040269e0 fffff804`674700c0 : ffffac8a`00000000 00000000`00000000 ffffac8a`eabf3300 ffffac8a`eabf3300 : nt!PspTerminateAllThreads+0x17b193
fffffd86`04026a50 fffff804`6746fce9 : ffffffff`ffffffff fffffd86`04026b80 ffffac8a`eabf3300 fffff804`67479401 : nt!PspTerminateProcess+0xe0
fffffd86`04026a90 fffff804`66fd3c18 : ffffac8a`000003ec ffffac8a`f05c4080 ffffac8a`eabf3300 00000090`c17ff8cc : nt!NtTerminateProcess+0xa9
fffffd86`04026b00 00007ffd`78d3c5f4 : 00007ffd`78dafc1f 00007ffd`78ddf980 00000090`c17ff890 00000000`00002970 : nt!KiSystemServiceCopyEnd+0x28
00000090`c17fda28 00007ffd`78dafc1f : 00007ffd`78ddf980 00000090`c17ff890 00000000`00002970 00000000`00002e00 : 0x00007ffd`78d3c5f4
00000090`c17fda30 00007ffd`78ddf980 : 00000090`c17ff890 00000000`00002970 00000000`00002e00 00000000`00000004 : 0x00007ffd`78dafc1f
00000090`c17fda38 00000090`c17ff890 : 00000000`00002970 00000000`00002e00 00000000`00000004 00007ffd`78d43c9d : 0x00007ffd`78ddf980
00000090`c17fda40 00000000`00002970 : 00000000`00002e00 00000000`00000004 00007ffd`78d43c9d 00007ffd`78ddf980 : 0x00000090`c17ff890
00000090`c17fda48 00000000`00002e00 : 00000000`00000004 00007ffd`78d43c9d 00007ffd`78ddf980 00000000`00000008 : 0x2970
00000090`c17fda50 00000000`00000004 : 00007ffd`78d43c9d 00007ffd`78ddf980 00000000`00000008 00000000`00000ea0 : 0x2e00
00000090`c17fda58 00007ffd`78d43c9d : 00007ffd`78ddf980 00000000`00000008 00000000`00000ea0 00000000`00f800f6 : 0x4
00000090`c17fda60 00007ffd`78ddf980 : 00000000`00000008 00000000`00000ea0 00000000`00f800f6 000001fc`7c720790 : 0x00007ffd`78d43c9d
00000090`c17fda68 00000000`00000008 : 00000000`00000ea0 00000000`00f800f6 000001fc`7c720790 00000000`010000fe : 0x00007ffd`78ddf980
00000090`c17fda70 00000000`00000ea0 : 00000000`00f800f6 000001fc`7c720790 00000000`010000fe 00000000`00034142 : 0x8
00000090`c17fda78 00000000`00f800f6 : 000001fc`7c720790 00000000`010000fe 00000000`00034142 00007ffd`78d2c656 : 0xea0
00000090`c17fda80 000001fc`7c720790 : 00000000`010000fe 00000000`00034142 00007ffd`78d2c656 00000000`00000000 : 0xf800f6
00000090`c17fda88 00000000`010000fe : 00000000`00034142 00007ffd`78d2c656 00000000`00000000 00000000`00000000 : 0x000001fc`7c720790
00000090`c17fda90 00000000`00034142 : 00007ffd`78d2c656 00000000`00000000 00000000`00000000 00000000`00000000 : 0x10000fe
00000090`c17fda98 00007ffd`78d2c656 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x34142
00000090`c17fdaa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000548c8 : 0x00007ffd`78d2c656


STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_f05c4080_unknown!_IMAGE_unknown

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {35ebf339-bc0d-079a-7e9c-e93c394acd32}

Followup:     MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffc08f65de3340, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 12

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffc08f65de3340

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

ERROR_CODE: (NTSTATUS) 0x65f95080 - <Unable to get error code text>

CRITICAL_PROCESS_REPORTGUID:  {4ebc216d-9ff9-425c-8715-b9c0839cbe1c}

IMAGE_NAME:  RPCRT4.dll

MODULE_NAME: RPCRT4

FAULTING_MODULE: 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffff8400`41364938 fffff806`154cb8a9 : 00000000`000000ef ffffc08f`65de3340 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8400`41364940 fffff806`153ecbdf : ffffc08f`65de3340 fffff806`14c88065 ffffc08f`65de3340 fffff806`14c880e0 : nt!PspCatchCriticalBreak+0x115
ffff8400`413649e0 fffff806`152700c0 : ffffc08f`00000000 00000000`00000000 ffffc08f`65de3340 ffffc08f`65de3340 : nt!PspTerminateAllThreads+0x17b193
ffff8400`41364a50 fffff806`1526fce9 : ffffffff`ffffffff ffff8400`41364b80 ffffc08f`65de3340 fffff806`15279401 : nt!PspTerminateProcess+0xe0
ffff8400`41364a90 fffff806`14dd3c18 : ffffc08f`000003dc ffffc08f`65f95080 ffffc08f`65de3340 0000007b`4287fb9c : nt!NtTerminateProcess+0xa9
ffff8400`41364b00 00007ffe`98dbc5f4 : 00007ffe`98e2fc1f 00007ffe`98e5f980 0000007b`4287fb60 0000007b`4287dce8 : nt!KiSystemServiceCopyEnd+0x28
0000007b`4287dc68 00007ffe`98e2fc1f : 00007ffe`98e5f980 0000007b`4287fb60 0000007b`4287dce8 00007ffe`96277751 : 0x00007ffe`98dbc5f4
0000007b`4287dc70 00007ffe`98e5f980 : 0000007b`4287fb60 0000007b`4287dce8 00007ffe`96277751 00000000`00000004 : 0x00007ffe`98e2fc1f
0000007b`4287dc78 0000007b`4287fb60 : 0000007b`4287dce8 00007ffe`96277751 00000000`00000004 00007ffe`98dc3c9d : 0x00007ffe`98e5f980
0000007b`4287dc80 0000007b`4287dce8 : 00007ffe`96277751 00000000`00000004 00007ffe`98dc3c9d 00007ffe`98e5f980 : 0x0000007b`4287fb60
0000007b`4287dc88 00007ffe`96277751 : 00000000`00000004 00007ffe`98dc3c9d 00007ffe`98e5f980 00000000`00000008 : 0x0000007b`4287dce8
0000007b`4287dc90 00000000`00000004 : 00007ffe`98dc3c9d 00007ffe`98e5f980 00000000`00000008 00000000`00000000 : 0x00007ffe`96277751
0000007b`4287dc98 00007ffe`98dc3c9d : 00007ffe`98e5f980 00000000`00000008 00000000`00000000 00000000`00000000 : 0x4
0000007b`4287dca0 00007ffe`98e5f980 : 00000000`00000008 00000000`00000000 00000000`00000000 00000002`01500128 : 0x00007ffe`98dc3c9d
0000007b`4287dca8 00000000`00000008 : 00000000`00000000 00000000`00000000 00000002`01500128 00000000`0000024c : 0x00007ffe`98e5f980
0000007b`4287dcb0 00000000`00000000 : 00000000`00000000 00000002`01500128 00000000`0000024c 00000000`00034142 : 0x8


STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_65f95080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c9b07d51-52b3-8e99-79df-e09c154c955b}

Followup:     MachineOwner
---------
 
Tamamdır yaptım.
RAM'leri test ettim videodaki gibi hiçbir şey çıkmadı :/


Bellekleri test edin.

Komut satırını (CMD) yönetici olarak başlatın ve komutları yazın;
  1. Sfc /scannow.
  2. DISM.exe /Online /cleanup-image /scanhealth.
  3. DISM.exe /Online /cleanup-image /restorehealth.
Bunları uyguladıktan sonra bilgisayarı yeniden başlatın.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: ffffd90ee19dab22, Address of the instruction which caused the bugcheck.
Arg3: ffffd18d63e98920, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 6.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 13.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: ffffd90ee19dab22.

BUGCHECK_P3: ffffd18d63e98920.

BUGCHECK_P4: 0.

CONTEXT: ffffd18d63e98920 -- (.cxr 0xffffd18d63e98920)
rax=ffffd95640a12168 rbx=00000000110a0c0f rcx=000000000000184d.
rdx=ffffd95640a12168 rsi=ffffd95641a12168 rdi=0000000000000000.
rip=ffffd90ee19dab22 rsp=ffffd18d63e99310 rbp=000000000000000a.
r8=ffffd18d63e99288 r9=0000000000000000 r10=fffff80148312460.
r11=ffffd18d63e992e0 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000001.
iopl=0 nv up ei pl nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202.
win32kbase!HmgShareLock+0x62:
ffffd90e`e19dab22 40386e0e cmp byte ptr [rsi+0Eh],bpl ds:002b:ffffd956`41a12176=??
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: ts3client_win64.exe.

STACK_TEXT:
ffffd18d`63e99310 ffffd90e`e16d9e8d : 00000000`110a0c0f ffffd18d`63e99618 ffffdd8f`5ecb2c60 ffffd18d`63e99418 : win32kbase!HmgShareLock+0x62.
ffffd18d`63e99380 ffffd90e`e16be38f : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000228 : win32kfull!NtGdiGetRealizationInfo+0x48d.
ffffd18d`63e995e0 ffffd90e`e16be26d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!NtGdiGetCharABCWidthsW+0x1ff.
ffffd18d`63e99a00 fffff801`483d3c18 : ffffffff`a4010be9 ffffd90e`0000001d ffffdd8f`00000001 00000000`00000000 : win32kfull!NtGdiGetCharABCWidthsW+0xdd.
ffffd18d`63e99a90 00007ffe`7ae36564 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
000000e7`d84f6818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7ae36564.

SYMBOL_NAME: win32kbase!HmgShareLock+62.

MODULE_NAME: win32kbase.

IMAGE_NAME: win32kbase.sys.

IMAGE_VERSION: 10.0.18362.778.

STACK_COMMAND: .cxr 0xffffd18d63e98920 ; kb.

BUCKET_ID_FUNC_OFFSET: 62.

FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!HmgShareLock.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {f8d7532b-024c-73a1-ea86-fe13f10138bd}

Followup: MachineOwner.
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff80710455a1c, Address of the instruction which caused the bugcheck.
Arg3: fffff10e236c2d40, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 4.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 8.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 69.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80710455a1c.

BUGCHECK_P3: fffff10e236c2d40.

BUGCHECK_P4: 0.

CONTEXT: fffff10e236c2d40 -- (.cxr 0xfffff10e236c2d40)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc00010bb9180.
rdx=0000000000000000 rsi=0000000001000000 rdi=0000000001000000.
rip=fffff80710455a1c rsp=fffff10e236c3730 rbp=ffffd48d7c09f7a0.
r8=0000000001000000 r9=00000000ffffffff r10=7ffffffffffffffc.
r11=fffff10e236c3710 r12=ffffd48d7c09f7d8 r13=0000000001000000.
r14=ffffd48d7bb5d840 r15=ffffffffffffffff.
iopl=0 nv up ei pl nz na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206.
nt!MiFinishVadDeletion+0x16484c:
fffff807`10455a1c 488b1f mov rbx,qword ptr [rdi] ds:002b:00000000`01000000=????????????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: svchost.exe.

STACK_TEXT:
fffff10e`236c3730 fffff807`102f1059 : ffffffff`00000000 00000000`00000001 ffffd48d`00000000 00000000`00000000 : nt!MiFinishVadDeletion+0x16484c.
fffff10e`236c37e0 fffff807`1087979d : 00000000`00000000 ffffd48d`7ba5eb70 ffffd48d`7ba5eb70 00000000`00000000 : nt!MiDeleteVad+0x19a9.
fffff10e`236c39a0 fffff807`10879593 : ffffd48d`7c09f7a0 00000000`00000000 000001bc`9cad0000 00000000`00000000 : nt!MiUnmapVad+0x49.
fffff10e`236c39d0 fffff807`10879429 : ffffd48d`7bb5d340 000001bc`00000008 ffffd48d`712a64e0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133.
fffff10e`236c3ab0 fffff807`103d3c18 : ffffd48d`79793080 000001bc`9cad0000 00000000`0000fefb ffffd48d`7bb5d340 : nt!NtUnmapViewOfSectionEx+0x99.
fffff10e`236c3b00 00007ffb`93fdf924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000079`2387d488 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`93fdf924.

SYMBOL_NAME: nt!MiFinishVadDeletion+16484c.

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.18362.778.

STACK_COMMAND: .cxr 0xfffff10e236c2d40 ; kb.

IMAGE_NAME: memory_corruption.

BUCKET_ID_FUNC_OFFSET: 16484c.

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!MiFinishVadDeletion.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {2657f179-9eb8-9bfb-ae5c-b5b05e603b62}

Followup: MachineOwner.
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: ffff930d6f3dab22, Address of the instruction which caused the bugcheck.
Arg3: fffff98b3381a920, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys.
*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 4.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 27.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: ffff930d6f3dab22.

BUGCHECK_P3: fffff98b3381a920.

BUGCHECK_P4: 0.

CONTEXT: fffff98b3381a920 -- (.cxr 0xfffff98b3381a920)
rax=ffff934a00a1b1b0 rbx=00000000220a1212 rcx=00000000000028c9.
rdx=ffff934a00a1b1b0 rsi=ffff934a01a1b1b0 rdi=0000000000000000.
rip=ffff930d6f3dab22 rsp=fffff98b3381b310 rbp=000000000000000a.
r8=fffff98b3381b288 r9=0000000000000000 r10=fffff80029112460.
r11=fffff98b3381b2e0 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000001.
iopl=0 nv up ei pl nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202.
win32kbase!HmgShareLock+0x62:
ffff930d`6f3dab22 40386e0e cmp byte ptr [rsi+0Eh],bpl ds:002b:ffff934a`01a1b1be=??
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: ts3client_win64.exe.

STACK_TEXT:
fffff98b`3381b310 ffff930d`6f0d9e8d : 00000000`220a1212 fffff98b`3381b618 ffffbd07`79aae680 fffff98b`3381b418 : win32kbase!HmgShareLock+0x62.
fffff98b`3381b380 00000000`220a1212 : fffff98b`3381b618 ffffbd07`79aae680 fffff98b`3381b418 fffff98b`00000000 : win32kfull+0xd9e8d.
fffff98b`3381b388 fffff98b`3381b618 : ffffbd07`79aae680 fffff98b`3381b418 fffff98b`00000000 fffff98b`3381b418 : 0x220a1212.
fffff98b`3381b390 ffffbd07`79aae680 : fffff98b`3381b418 fffff98b`00000000 fffff98b`3381b418 00000000`00000000 : 0xfffff98b`3381b618.
fffff98b`3381b398 fffff98b`3381b418 : fffff98b`00000000 fffff98b`3381b418 00000000`00000000 00000000`00000000 : 0xffffbd07`79aae680.
fffff98b`3381b3a0 fffff98b`00000000 : fffff98b`3381b418 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff98b`3381b418.
fffff98b`3381b3a8 fffff98b`3381b418 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff98b`00000000.
fffff98b`3381b3b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000001 : 0xfffff98b`3381b418.

SYMBOL_NAME: win32kbase!HmgShareLock+62.

MODULE_NAME: win32kbase.

IMAGE_NAME: win32kbase.sys.

IMAGE_VERSION: 10.0.18362.778.

STACK_COMMAND: .cxr 0xfffff98b3381a920 ; kb.

BUCKET_ID_FUNC_OFFSET: 62.

FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!HmgShareLock.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {f8d7532b-024c-73a1-ea86-fe13f10138bd}

Followup: MachineOwner.
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died.
Arguments:
Arg1: ffffac8aeabf3300, Process object or thread object.
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 4.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 5.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 71.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: ef.

BUGCHECK_P1: ffffac8aeabf3300.

BUGCHECK_P2: 0.

BUGCHECK_P3: 0.

BUGCHECK_P4: 0.

PROCESS_NAME: svchost.exe.

CRITICAL_PROCESS: svchost.exe.

ERROR_CODE: (NTSTATUS) 0xf05c4080 - <Unable to get error code text>

CRITICAL_PROCESS_REPORTGUID: {45119e30-277b-48e3-a025-83d2e8dc2ad8}

IMAGE_NAME: unknown.

MODULE_NAME: unknown.

FAULTING_MODULE: 0000000000000000.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

STACK_TEXT:
fffffd86`04026938 fffff804`676cb8a9 : 00000000`000000ef ffffac8a`eabf3300 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx.
fffffd86`04026940 fffff804`675ecbdf : ffffac8a`eabf3300 fffff804`66e88065 ffffac8a`eabf3300 fffff804`66e880e0 : nt!PspCatchCriticalBreak+0x115.
fffffd86`040269e0 fffff804`674700c0 : ffffac8a`00000000 00000000`00000000 ffffac8a`eabf3300 ffffac8a`eabf3300 : nt!PspTerminateAllThreads+0x17b193.
fffffd86`04026a50 fffff804`6746fce9 : ffffffff`ffffffff fffffd86`04026b80 ffffac8a`eabf3300 fffff804`67479401 : nt!PspTerminateProcess+0xe0.
fffffd86`04026a90 fffff804`66fd3c18 : ffffac8a`000003ec ffffac8a`f05c4080 ffffac8a`eabf3300 00000090`c17ff8cc : nt!NtTerminateProcess+0xa9.
fffffd86`04026b00 00007ffd`78d3c5f4 : 00007ffd`78dafc1f 00007ffd`78ddf980 00000090`c17ff890 00000000`00002970 : nt!KiSystemServiceCopyEnd+0x28.
00000090`c17fda28 00007ffd`78dafc1f : 00007ffd`78ddf980 00000090`c17ff890 00000000`00002970 00000000`00002e00 : 0x00007ffd`78d3c5f4.
00000090`c17fda30 00007ffd`78ddf980 : 00000090`c17ff890 00000000`00002970 00000000`00002e00 00000000`00000004 : 0x00007ffd`78dafc1f.
00000090`c17fda38 00000090`c17ff890 : 00000000`00002970 00000000`00002e00 00000000`00000004 00007ffd`78d43c9d : 0x00007ffd`78ddf980.
00000090`c17fda40 00000000`00002970 : 00000000`00002e00 00000000`00000004 00007ffd`78d43c9d 00007ffd`78ddf980 : 0x00000090`c17ff890.
00000090`c17fda48 00000000`00002e00 : 00000000`00000004 00007ffd`78d43c9d 00007ffd`78ddf980 00000000`00000008 : 0x2970.
00000090`c17fda50 00000000`00000004 : 00007ffd`78d43c9d 00007ffd`78ddf980 00000000`00000008 00000000`00000ea0 : 0x2e00.
00000090`c17fda58 00007ffd`78d43c9d : 00007ffd`78ddf980 00000000`00000008 00000000`00000ea0 00000000`00f800f6 : 0x4.
00000090`c17fda60 00007ffd`78ddf980 : 00000000`00000008 00000000`00000ea0 00000000`00f800f6 000001fc`7c720790 : 0x00007ffd`78d43c9d.
00000090`c17fda68 00000000`00000008 : 00000000`00000ea0 00000000`00f800f6 000001fc`7c720790 00000000`010000fe : 0x00007ffd`78ddf980.
00000090`c17fda70 00000000`00000ea0 : 00000000`00f800f6 000001fc`7c720790 00000000`010000fe 00000000`00034142 : 0x8.
00000090`c17fda78 00000000`00f800f6 : 000001fc`7c720790 00000000`010000fe 00000000`00034142 00007ffd`78d2c656 : 0xea0.
00000090`c17fda80 000001fc`7c720790 : 00000000`010000fe 00000000`00034142 00007ffd`78d2c656 00000000`00000000 : 0xf800f6.
00000090`c17fda88 00000000`010000fe : 00000000`00034142 00007ffd`78d2c656 00000000`00000000 00000000`00000000 : 0x000001fc`7c720790.
00000090`c17fda90 00000000`00034142 : 00007ffd`78d2c656 00000000`00000000 00000000`00000000 00000000`00000000 : 0x10000fe.
00000090`c17fda98 00007ffd`78d2c656 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x34142.
00000090`c17fdaa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000548c8 : 0x00007ffd`78d2c656.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_f05c4080_unknown!_IMAGE_unknown.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {35ebf339-bc0d-079a-7e9c-e93c394acd32}

Followup: MachineOwner.
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died.
Arguments:
Arg1: ffffc08f65de3340, Process object or thread object.
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 3.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 12.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 72.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: ef.

BUGCHECK_P1: ffffc08f65de3340.

BUGCHECK_P2: 0.

BUGCHECK_P3: 0.

BUGCHECK_P4: 0.

PROCESS_NAME: svchost.exe.

CRITICAL_PROCESS: svchost.exe.

ERROR_CODE: (NTSTATUS) 0x65f95080 - <Unable to get error code text>

CRITICAL_PROCESS_REPORTGUID: {4ebc216d-9ff9-425c-8715-b9c0839cbe1c}

IMAGE_NAME: RPCRT4.dll.

MODULE_NAME: RPCRT4.

FAULTING_MODULE: 0000000000000000.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

STACK_TEXT:
ffff8400`41364938 fffff806`154cb8a9 : 00000000`000000ef ffffc08f`65de3340 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx.
ffff8400`41364940 fffff806`153ecbdf : ffffc08f`65de3340 fffff806`14c88065 ffffc08f`65de3340 fffff806`14c880e0 : nt!PspCatchCriticalBreak+0x115.
ffff8400`413649e0 fffff806`152700c0 : ffffc08f`00000000 00000000`00000000 ffffc08f`65de3340 ffffc08f`65de3340 : nt!PspTerminateAllThreads+0x17b193.
ffff8400`41364a50 fffff806`1526fce9 : ffffffff`ffffffff ffff8400`41364b80 ffffc08f`65de3340 fffff806`15279401 : nt!PspTerminateProcess+0xe0.
ffff8400`41364a90 fffff806`14dd3c18 : ffffc08f`000003dc ffffc08f`65f95080 ffffc08f`65de3340 0000007b`4287fb9c : nt!NtTerminateProcess+0xa9.
ffff8400`41364b00 00007ffe`98dbc5f4 : 00007ffe`98e2fc1f 00007ffe`98e5f980 0000007b`4287fb60 0000007b`4287dce8 : nt!KiSystemServiceCopyEnd+0x28.
0000007b`4287dc68 00007ffe`98e2fc1f : 00007ffe`98e5f980 0000007b`4287fb60 0000007b`4287dce8 00007ffe`96277751 : 0x00007ffe`98dbc5f4.
0000007b`4287dc70 00007ffe`98e5f980 : 0000007b`4287fb60 0000007b`4287dce8 00007ffe`96277751 00000000`00000004 : 0x00007ffe`98e2fc1f.
0000007b`4287dc78 0000007b`4287fb60 : 0000007b`4287dce8 00007ffe`96277751 00000000`00000004 00007ffe`98dc3c9d : 0x00007ffe`98e5f980.
0000007b`4287dc80 0000007b`4287dce8 : 00007ffe`96277751 00000000`00000004 00007ffe`98dc3c9d 00007ffe`98e5f980 : 0x0000007b`4287fb60.
0000007b`4287dc88 00007ffe`96277751 : 00000000`00000004 00007ffe`98dc3c9d 00007ffe`98e5f980 00000000`00000008 : 0x0000007b`4287dce8.
0000007b`4287dc90 00000000`00000004 : 00007ffe`98dc3c9d 00007ffe`98e5f980 00000000`00000008 00000000`00000000 : 0x00007ffe`96277751.
0000007b`4287dc98 00007ffe`98dc3c9d : 00007ffe`98e5f980 00000000`00000008 00000000`00000000 00000000`00000000 : 0x4.
0000007b`4287dca0 00007ffe`98e5f980 : 00000000`00000008 00000000`00000000 00000000`00000000 00000002`01500128 : 0x00007ffe`98dc3c9d.
0000007b`4287dca8 00000000`00000008 : 00000000`00000000 00000000`00000000 00000002`01500128 00000000`0000024c : 0x00007ffe`98e5f980.
0000007b`4287dcb0 00000000`00000000 : 00000000`00000000 00000002`01500128 00000000`0000024c 00000000`00034142 : 0x8.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_65f95080_RPCRT4.dll!?NdrpSimpleTypeHyperMarshall@@YAXPEAU_MIDL_STUB_MESSAGE@@PEAE@Z_IMAGE_RPCRT4.dll.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {c9b07d51-52b3-8e99-79df-e09c154c955b}

Followup: MachineOwner.
---------

Screenshot_10.png
 
Son düzenleyen: Moderatör:
Tekrar mavi ekran aldınız mı? Alırsanız yeni dump dosyalarını paylaşın.

Şu anlık hayır ama RAM ile anakart uyumsuz olabilir diyorlar. Bu nedır 3000 MHz degılde 2933 MHz'de calıstıyorum şu an bakalım ne fayda olacak eğer mavı ekran alırsam sizlere bilgilendireceğim zaten 3, 4 günde bir alıyorum. İlginiz için teşekkür ederim.
Orada mısınız acaba?

Tekrar mavi ekran hatası aldım :/
 
Son düzenleyen: Moderatör:
Bana uyumlu dediler ona göre aldım ben RAM'i ama bilmiyorum 1.5 ay geçti geri de almazlar yanı :(

Defult halde kullanınca 3000MHz alacağım RAM 2133'de kullanıyorum.

RAM'lerime Memtest yaptım ve birinde sıkıntı çıktı diğerinde sıknıtı yoktu. 1 haftadır hiçbir şekilde mavi ekran almadım ama 1 hafta sonra tekrar mavi ekran aldım. Bu durum beni 1.5 aydır bayağı zorladı. Her şeyi yaptım denedim. İşlemci, anakart ve RAM'lari yeni almıştım ama tekrardan mavi ekran yedim. Bu durum beynimden kaynar sular döküyor şunun çözümüne yardım edin lütfen.

B450M-A PRO Max 1050 Ti ekran kartı G.Skill Sniper X DDR4 3000MHz CL16 2x8GB 3600X
Memtest b ve minimump attım yardım edin lütfen
 
Son düzenleyen: Moderatör:
Hangi RAM'de sıkıntı var 1 slottaki ramdemi 2 slottaki RAM'de mi Memtest test yaptıysan hangi slotdaki RAM'de arıza çıktığsa o RAM'ı çıkar sorun düzelecektir aynı bellek modülünde yeni bir RAM alıp tak.
 
Son düzenleyen: Moderatör:

Geri
Yukarı