Mavi ekran hata kodu: 0x000000D1

Ensar1999

Centipat
Katılım
2 Haziran 2020
Mesajlar
7
Merhabalar 1 hafta önce bilgisayarımı sıfırladım. Birkaç gün sonra bilgisayarım durup dururken mavi ekran vermeye başladı. Art arda açıyorum 5 dakika sonra yine BlueScreenView'deki hata kodlar bunlar lütfen yardımcı olur musunuz?
 

Dosya Ekleri

  • B25F90B6-E5C1-4ED3-923B-1FC6E04DBFA0.jpeg
    B25F90B6-E5C1-4ED3-923B-1FC6E04DBFA0.jpeg
    2,5 MB · Görüntüleme: 43
  • BCDDDAA1-C1ED-48C2-8EF4-658F11D1387A.jpeg
    BCDDDAA1-C1ED-48C2-8EF4-658F11D1387A.jpeg
    2,7 MB · Görüntüleme: 30
Son düzenleyen: Moderatör:
Kopyalayıp masaüstüne atın oradan da dosya servisine yükleyin. Dosyayı okumamız lazım.

Buyurun hepsi bu kadar yardımlarınızı bekliyorum.
Minidump dosyalarını bu upload servislerinden birine yükler misiniz?
 
Son düzenleme:
Memtest ile RAM testi yapar mısınız? Ayrıca ExpressVPN programı varsa kaldırın. Bir de BIOS güncelleyin.


Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff8043095d166, The address that the exception occurred at
Arg3: fffff80430f91400, Parameter 0 of the exception
Arg4: 0000fffff8043095, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 5

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc000001d

BUGCHECK_P2: fffff8043095d166

BUGCHECK_P3: fffff80430f91400

BUGCHECK_P4: fffff8043095

EXCEPTION_PARAMETER1:  fffff80430f91400

EXCEPTION_PARAMETER2:  0000fffff8043095

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

BAD_STACK_POINTER:  fffff80433ce2138

FAILED_INSTRUCTION_ADDRESS:
hal!HalpTimerClockStop+6
fffff804`3095d166 65              ???

STACK_TEXT:
fffff804`33ce2138 fffff804`30ca695e : 00000000`0000001e ffffffff`c000001d fffff804`3095d166 fffff804`30f91400 : nt!KeBugCheckEx
fffff804`33ce2140 fffff804`30bcb182 : fffff804`30f11000 fffff804`30a00000 0005e338`00ab7000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
fffff804`33ce2180 fffff804`30afa2c5 : 00000000`00000000 00000000`00000000 fffff804`33ce26f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
fffff804`33ce21b0 fffff804`30afe85e : fffff804`33ccd4d8 fffff804`33ce2e30 fffff804`33ccd4d8 00000000`00000003 : nt!RtlDispatchException+0x4a5
fffff804`33ce2900 fffff804`30bc3202 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
fffff804`33ce2fb0 fffff804`30bc31d0 : fffff804`30bd4316 ffffb78c`c88202c8 fffff804`3dc0c3dc ffffb78c`c881f000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff804`33ccd398 fffff804`30bd4316 : ffffb78c`c88202c8 fffff804`3dc0c3dc ffffb78c`c881f000 ffffb78c`c881f000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff804`33ccd3a0 fffff804`30bce8a9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116
fffff804`33ccd580 fffff804`3095d166 : 00000000`00000000 00000000`00989680 fffff804`30a00000 ffff8efd`e177feab : nt!KiInvalidOpcodeFault+0x329
fffff804`33ccd710 fffff804`30abcc04 : fffff804`2be73180 00000001`1745c63a 00000000`00000000 fffff804`30e4f840 : hal!HalpTimerClockStop+0x6
fffff804`33ccd740 fffff804`30abb838 : 00000166`75a1e1a0 00000166`75a1e1a0 ffffb78c`c6eb2010 00000000`00000000 : nt!KeResumeClockTimerFromIdle+0x2f4
fffff804`33ccd7e0 fffff804`30abadde : 00000000`00000003 00000000`00000002 00000000`00000001 01d638cc`d989e340 : nt!PpmIdleExecuteTransition+0x8b8
fffff804`33ccdb00 fffff804`30bc5e84 : 00000000`00000000 fffff804`2be73180 ffffb78c`ccde7080 00000000`00001320 : nt!PoIdle+0x36e
fffff804`33ccdc60 00000000`00000000 : fffff804`33cce000 fffff804`33cc8000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x44


CHKIMG_EXTENSION: !chkimg -lo 50 -db !hal
6 errors : !hal (fffff8043095d140-fffff8043095d178)
fffff8043095d140 *29  34  8b  d3  4c  8b  15  2d  8e  07  00  e8  60  13  16  00 )4..L..-....`...
fffff8043095d150 *ee  d4  cc  cc  cc  cc  cc  cc *c5  cc  cc  cc  cc  cc  cc  cc ................
fffff8043095d160  41  53  48  83  ec  20  65  48 *82  1c  25  20  00  00  00  f6 ASH.. eH..% ....
fffff8043095d170 *49  22  02  0f  85  0d  91  01 *09  48  8b  15  c8  c0  06  00 I".......H......

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80f2a3c51be, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80f2a3c51be, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 2

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 2

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff80f2a3c51be

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80f2a3c51be

READ_ADDRESS: fffff8012a7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8012a62a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8012a62a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff80f2a3c51be

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc58617a6faa0 -- (.trap 0xffffc58617a6faa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000003 rbx=0000000000000000 rcx=0000000000000002
rdx=ffff94862509a100 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80f2a3c51be rsp=ffffc58617a6fc38 rbp=0000000000000000
r8=0000000000000008  r9=0000000000000000 r10=0000fffff8013756
r11=ffffc7ff77000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na po nc
fffff80f`2a3c51be ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
fffff80f`2a3c51be ??              ???

STACK_TEXT:
ffffc586`17a6f958 fffff801`2a3d41e9 : 00000000`0000000a fffff80f`2a3c51be 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffc586`17a6f960 fffff801`2a3d0529 : ffff610d`a454f498 ffffd800`d9323340 ffff9486`2509a010 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc586`17a6faa0 fffff80f`2a3c51be : fffff801`2a3c5e8a 00000000`00000010 00000000`00040286 ffffc586`17a6fc60 : nt!KiPageFault+0x469
ffffc586`17a6fc38 fffff801`2a3c5e8a : 00000000`00000010 00000000`00040286 ffffc586`17a6fc60 00000000`00000018 : 0xfffff80f`2a3c51be
ffffc586`17a6fc40 ffffd800`d9312180 : ffff9486`28d0c080 00000000`000011c0 ffffc586`17a6fc90 00000000`00000000 : nt!KiIdleLoop+0x4a
ffffc586`17a6fc70 ffff9486`28d0c080 : 00000000`000011c0 ffffc586`17a6fc90 00000000`00000000 ffffc586`17a70000 : 0xffffd800`d9312180
ffffc586`17a6fc78 00000000`000011c0 : ffffc586`17a6fc90 00000000`00000000 ffffc586`17a70000 ffffc586`17a6a000 : 0xffff9486`28d0c080
ffffc586`17a6fc80 ffffc586`17a6fc90 : 00000000`00000000 ffffc586`17a70000 ffffc586`17a6a000 00000000`00000000 : 0x11c0
ffffc586`17a6fc88 00000000`00000000 : ffffc586`17a70000 ffffc586`17a6a000 00000000`00000000 00000000`00000000 : 0xffffc586`17a6fc90


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.836

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f2ab72c5-099d-9077-bfcf-ba12aa825b36}

Followup:     MachineOwner
---------
 
Memtest ile RAM testi yapar mısınız? Ayrıca expressvpn programı varsa kaldırın. Bir de BIOS güncelleyin.


Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled.
Arg2: fffff8043095d166, The address that the exception occurred at.
Arg3: fffff80430f91400, Parameter 0 of the exception.
Arg4: 0000fffff8043095, Parameter 1 of the exception.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 3.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-JC78BRD.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 5.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 70.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: 1e.

BUGCHECK_P1: ffffffffc000001d.

BUGCHECK_P2: fffff8043095d166.

BUGCHECK_P3: fffff80430f91400.

BUGCHECK_P4: fffff8043095.

EXCEPTION_PARAMETER1: fffff80430f91400.

EXCEPTION_PARAMETER2: 0000fffff8043095.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

BAD_STACK_POINTER: fffff80433ce2138.

FAILED_INSTRUCTION_ADDRESS:
hal!HalpTimerClockStop+6.
fffff804`3095d166 65 ???

STACK_TEXT:
fffff804`33ce2138 fffff804`30ca695e : 00000000`0000001e ffffffff`c000001d fffff804`3095d166 fffff804`30f91400 : nt!KeBugCheckEx.
fffff804`33ce2140 fffff804`30bcb182 : fffff804`30f11000 fffff804`30a00000 0005e338`00ab7000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22.
fffff804`33ce2180 fffff804`30afa2c5 : 00000000`00000000 00000000`00000000 fffff804`33ce26f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12.
fffff804`33ce21b0 fffff804`30afe85e : fffff804`33ccd4d8 fffff804`33ce2e30 fffff804`33ccd4d8 00000000`00000003 : nt!RtlDispatchException+0x4a5.
fffff804`33ce2900 fffff804`30bc3202 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e.
fffff804`33ce2fb0 fffff804`30bc31d0 : fffff804`30bd4316 ffffb78c`c88202c8 fffff804`3dc0c3dc ffffb78c`c881f000 : nt!KxExceptionDispatchOnExceptionStack+0x12.
fffff804`33ccd398 fffff804`30bd4316 : ffffb78c`c88202c8 fffff804`3dc0c3dc ffffb78c`c881f000 ffffb78c`c881f000 : nt!KiExceptionDispatchOnExceptionStackContinue.
fffff804`33ccd3a0 fffff804`30bce8a9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116.
fffff804`33ccd580 fffff804`3095d166 : 00000000`00000000 00000000`00989680 fffff804`30a00000 ffff8efd`e177feab : nt!KiInvalidOpcodeFault+0x329.
fffff804`33ccd710 fffff804`30abcc04 : fffff804`2be73180 00000001`1745c63a 00000000`00000000 fffff804`30e4f840 : hal!HalpTimerClockStop+0x6.
fffff804`33ccd740 fffff804`30abb838 : 00000166`75a1e1a0 00000166`75a1e1a0 ffffb78c`c6eb2010 00000000`00000000 : nt!KeResumeClockTimerFromIdle+0x2f4.
fffff804`33ccd7e0 fffff804`30abadde : 00000000`00000003 00000000`00000002 00000000`00000001 01d638cc`d989e340 : nt!PpmIdleExecuteTransition+0x8b8.
fffff804`33ccdb00 fffff804`30bc5e84 : 00000000`00000000 fffff804`2be73180 ffffb78c`ccde7080 00000000`00001320 : nt!PoIdle+0x36e.
fffff804`33ccdc60 00000000`00000000 : fffff804`33cce000 fffff804`33cc8000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x44.

CHKIMG_EXTENSION: !chkimg -lo 50 -db !hal.
6 errors : !hal (fffff8043095d140-fffff8043095d178)
fffff8043095d140 *29 34 8b d3 4c 8b 15 2d 8e 07 00 e8 60 13 16 00 )4..L..-....`...
fffff8043095d150 *ee d4 cc cc cc cc cc cc *c5 cc cc cc cc cc cc cc ................
fffff8043095d160 41 53 48 83 ec 20 65 48 *82 1c 25 20 00 00 00 f6 ASH.. eH..% ....
fffff8043095d170 *49 22 02 0f 85 0d 91 01 *09 48 8b 15 c8 c0 06 00 I".......H......

MODULE_NAME: memory_corruption.

IMAGE_NAME: memory_corruption.

MEMORY_CORRUPTOR: STRIDE.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup: memory_corruption.
---------
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80f2a3c51be, memory referenced.
Arg2: 00000000000000ff, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff80f2a3c51be, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 2.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-JC78BRD.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 2.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 69.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: d1.

BUGCHECK_P1: fffff80f2a3c51be.

BUGCHECK_P2: ff.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff80f2a3c51be.

READ_ADDRESS: fffff8012a7733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8012a62a3d8: Unable to get Flags value from nt!KdVersionBlock.
fffff8012a62a3d8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
fffff80f2a3c51be.

ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

TRAP_FRAME: ffffc58617a6faa0 -- (.trap 0xffffc58617a6faa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000003 rbx=0000000000000000 rcx=0000000000000002.
rdx=ffff94862509a100 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80f2a3c51be rsp=ffffc58617a6fc38 rbp=0000000000000000.
r8=0000000000000008 r9=0000000000000000 r10=0000fffff8013756.
r11=ffffc7ff77000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up di ng nz na po nc.
fffff80f`2a3c51be ?? ???
Resetting default scope.

FAILED_INSTRUCTION_ADDRESS:
+0.
fffff80f`2a3c51be ?? ???

STACK_TEXT:
ffffc586`17a6f958 fffff801`2a3d41e9 : 00000000`0000000a fffff80f`2a3c51be 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx.
ffffc586`17a6f960 fffff801`2a3d0529 : ffff610d`a454f498 ffffd800`d9323340 ffff9486`2509a010 00000000`00000000 : nt!KiBugCheckDispatch+0x69.
ffffc586`17a6faa0 fffff80f`2a3c51be : fffff801`2a3c5e8a 00000000`00000010 00000000`00040286 ffffc586`17a6fc60 : nt!KiPageFault+0x469.
ffffc586`17a6fc38 fffff801`2a3c5e8a : 00000000`00000010 00000000`00040286 ffffc586`17a6fc60 00000000`00000018 : 0xfffff80f`2a3c51be.
ffffc586`17a6fc40 ffffd800`d9312180 : ffff9486`28d0c080 00000000`000011c0 ffffc586`17a6fc90 00000000`00000000 : nt!KiIdleLoop+0x4a.
ffffc586`17a6fc70 ffff9486`28d0c080 : 00000000`000011c0 ffffc586`17a6fc90 00000000`00000000 ffffc586`17a70000 : 0xffffd800`d9312180.
ffffc586`17a6fc78 00000000`000011c0 : ffffc586`17a6fc90 00000000`00000000 ffffc586`17a70000 ffffc586`17a6a000 : 0xffff9486`28d0c080.
ffffc586`17a6fc80 ffffc586`17a6fc90 : 00000000`00000000 ffffc586`17a70000 ffffc586`17a6a000 00000000`00000000 : 0x11c0.
ffffc586`17a6fc88 00000000`00000000 : ffffc586`17a70000 ffffc586`17a6a000 00000000`00000000 00000000`00000000 : 0xffffc586`17a6fc90.

SYMBOL_NAME: nt!KiPageFault+469.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.18362.836.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 469.

FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36}

Followup: MachineOwner.
---------

Evet Driver bosteri yüklerken yanında VPN'yi de kurmuştu şimdi.
Kaldırdım öbür aşamaları da şimdi yapıyorum.
 

Yeni konular

Geri
Yukarı