Mavi ekran hataları

warped

Centipat
Katılım
5 Nisan 2021
Mesajlar
15
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Selamlar, bilgisayarım sık sık farklı mavi ekran hataları veriyordu. Yeni format atmama rağmen ve tüm sürücülerimin güncel olmasına rağmen hala mavi ekran alıyorum.
Son olarak ırql_not_less hatasını aldım. Format atmadan önce System exception, kernel Security, kmode exception gibi hatalar alıyordum.

Mavi ekranlardan önce, Google Chrome'da rastgele sayfalar çökmeye başlamıştı (status_access_vıolatıon hatası)

Minidump
Minidumpta çöken .exe uzantısı rastgele yazıyor. Steam, Chrome.exe, vs. uygulama kaynaklı olduğunu düşünmüyorum.
Memtest86'da herhangi bir sorun çıkmadı.
Son olarak anakartta sorun olduğunu düşünmeye başladım ama bilgisayar daha yeni, yol gösterirseniz sevinirim.

Ekleme: XMP açıktı fakat kapattım, BIOS default settingse çevridim. Mavi ekranlar devam ediyor. Sistemde SSD var ve testlerde bir sorun çıkmadı, bir adet de harddisk var onda HD Tune programında kırmızı blok çıkmıyor fakat, taşınmış (reallocated) sektörler mevcut. Sistem harddiske değil, SSD'ye kurulu. Özellikle ağır oyunlar oynarken hiçbir şekilde mavi ekran almamamı da belirtmek isterim. FurMark gibi testleri de geçti.
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED ntoskrnl.exe+24393F
Yeni bir hata daha aldım.
 
Son düzenleme:
HDD diskinizin S.M.A.R.T. Verilerini paylaşın ve Samsung Magician'ı kaldırın. Ek olarak MSI yazılımlarını kaldırın.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000014, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000f7, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80743a70d7d, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5187

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 17320

    Key  : Analysis.Init.CPU.mSec
    Value: 1093

    Key  : Analysis.Init.Elapsed.mSec
    Value: 19819

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 14

BUGCHECK_P2: ff

BUGCHECK_P3: f7

BUGCHECK_P4: fffff80743a70d7d

WRITE_ADDRESS: fffff807444fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000014

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff608b2853560 -- (.trap 0xfffff608b2853560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80743a70d7d rsp=fffff608b28536f0 rbp=0000000000000000
 r8=0000000000000001  r9=0000000000000005 r10=0000fffff80743ae
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!PpmIdleExecuteTransition+0xaad:
fffff807`43a70d7d 897e14          mov     dword ptr [rsi+14h],edi ds:00000000`00000014=????????
Resetting default scope

STACK_TEXT: 
fffff608`b2853418 fffff807`43c07b69     : 00000000`0000000a 00000000`00000014 00000000`000000ff 00000000`000000f7 : nt!KeBugCheckEx
fffff608`b2853420 fffff807`43c03e69     : 00000000`00000000 fffff807`46c499f3 fffff608`b2853740 fffff807`43b9f74d : nt!KiBugCheckDispatch+0x69
fffff608`b2853560 fffff807`43a70d7d     : ffffc782`a1f1d1e0 00000000`00000000 00000000`00000000 ffffb781`723a4440 : nt!KiPageFault+0x469
fffff608`b28536f0 fffff807`43a70154     : 00000000`00000000 00001f80`00b3009b 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xaad
fffff608`b2853af0 fffff807`43bf9774     : ffffffff`00000000 ffffb781`718f0240 ffffc782`f5856080 00000000`00000654 : nt!PoIdle+0x374
fffff608`b2853c60 00000000`00000000     : fffff608`b2854000 fffff608`b284e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!PpmIdleExecuteTransition+aad

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  aad

FAILURE_BUCKET_ID:  AV_CODE_AV_nt!PpmIdleExecuteTransition

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3d77750b-80a6-c195-659c-ebcffecd3d05}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000000c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804534089bd, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 10452

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 19000

    Key  : Analysis.Init.CPU.mSec
    Value: 890

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4846

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: c

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff804534089bd

WRITE_ADDRESS: fffff80453efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 000000000000000c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LightKeeperService.exe

DPC_STACK_BASE:  FFFFF20062A5AFB0

TRAP_FRAME:  fffff20062a5a970 -- (.trap 0xfffff20062a5a970)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd68f319e900e rbx=0000000000000000 rcx=ffffd68f319e900e
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804534089bd rsp=fffff20062a5ab00 rbp=fffff20062a5ab70
 r8=0000000000000008  r9=0000000000001000 r10=0000000000000000
r11=fffff8045346e680 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po nc
nt!EtwpLogKernelEvent+0x40d:
fffff804`534089bd f0ff4a0c        lock dec dword ptr [rdx+0Ch] ds:00000000`0000000c=????????
Resetting default scope

STACK_TEXT: 
fffff200`62a5a828 fffff804`53607b69     : 00000000`0000000a 00000000`0000000c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff200`62a5a830 fffff804`53603e69     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff200`62a5a970 fffff804`534089bd     : fffff200`62a5aa00 ffff9a01`322e8200 fffff200`62a5ab70 00000000`00000002 : nt!KiPageFault+0x469
fffff200`62a5ab00 fffff804`5340792d     : ffff9a01`322e8240 ffffd68f`31ae2000 fffff200`62a5ae90 ffffd68f`00000002 : nt!EtwpLogKernelEvent+0x40d
fffff200`62a5abb0 fffff804`53406b04     : ffff9a01`322e5180 89480000`00000000 00000000`00000008 00000000`000309d3 : nt!KiExecuteAllDpcs+0x41d
fffff200`62a5ad20 fffff804`535fcc95     : 00155a74`850fc985 ffff9a01`322e5180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1f4
fffff200`62a5afb0 fffff804`535fca80     : 00000000`008f3000 00000000`008f3000 00000000`03fefd00 00000000`00000002 : nt!KxRetireDpcList+0x5
fffff200`64e61ad0 fffff804`535fc14e     : 00000000`00000064 00000000`00000000 ffffffff`fff0bdc0 ffffd68f`3b942080 : nt!KiDispatchInterruptContinue
fffff200`64e61b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2ee


SYMBOL_NAME:  nt!EtwpLogKernelEvent+40d

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  40d

FAILURE_BUCKET_ID:  AV_nt!EtwpLogKernelEvent

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2dd8433c-c071-e8df-14a1-7a8aa408eedb}

Followup:     MachineOwner
---------
 
HDD diskinizin S.M.A.R.T. Verilerini paylaşın ve Samsung Magician'ı kaldırın. Ek olarak MSI yazılımlarını kaldırın.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000014, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000f7, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80743a70d7d, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5187

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 17320

    Key  : Analysis.Init.CPU.mSec
    Value: 1093

    Key  : Analysis.Init.Elapsed.mSec
    Value: 19819

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 14

BUGCHECK_P2: ff

BUGCHECK_P3: f7

BUGCHECK_P4: fffff80743a70d7d

WRITE_ADDRESS: fffff807444fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000014

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff608b2853560 -- (.trap 0xfffff608b2853560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80743a70d7d rsp=fffff608b28536f0 rbp=0000000000000000
r8=0000000000000001  r9=0000000000000005 r10=0000fffff80743ae
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!PpmIdleExecuteTransition+0xaad:
fffff807`43a70d7d 897e14          mov     dword ptr [rsi+14h],edi ds:00000000`00000014=????????
Resetting default scope

STACK_TEXT:
fffff608`b2853418 fffff807`43c07b69     : 00000000`0000000a 00000000`00000014 00000000`000000ff 00000000`000000f7 : nt!KeBugCheckEx
fffff608`b2853420 fffff807`43c03e69     : 00000000`00000000 fffff807`46c499f3 fffff608`b2853740 fffff807`43b9f74d : nt!KiBugCheckDispatch+0x69
fffff608`b2853560 fffff807`43a70d7d     : ffffc782`a1f1d1e0 00000000`00000000 00000000`00000000 ffffb781`723a4440 : nt!KiPageFault+0x469
fffff608`b28536f0 fffff807`43a70154     : 00000000`00000000 00001f80`00b3009b 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xaad
fffff608`b2853af0 fffff807`43bf9774     : ffffffff`00000000 ffffb781`718f0240 ffffc782`f5856080 00000000`00000654 : nt!PoIdle+0x374
fffff608`b2853c60 00000000`00000000     : fffff608`b2854000 fffff608`b284e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!PpmIdleExecuteTransition+aad

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  aad

FAILURE_BUCKET_ID:  AV_CODE_AV_nt!PpmIdleExecuteTransition

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3d77750b-80a6-c195-659c-ebcffecd3d05}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000000c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804534089bd, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 10452

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 19000

    Key  : Analysis.Init.CPU.mSec
    Value: 890

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4846

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: c

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff804534089bd

WRITE_ADDRESS: fffff80453efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000000000c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LightKeeperService.exe

DPC_STACK_BASE:  FFFFF20062A5AFB0

TRAP_FRAME:  fffff20062a5a970 -- (.trap 0xfffff20062a5a970)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd68f319e900e rbx=0000000000000000 rcx=ffffd68f319e900e
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804534089bd rsp=fffff20062a5ab00 rbp=fffff20062a5ab70
r8=0000000000000008  r9=0000000000001000 r10=0000000000000000
r11=fffff8045346e680 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po nc
nt!EtwpLogKernelEvent+0x40d:
fffff804`534089bd f0ff4a0c        lock dec dword ptr [rdx+0Ch] ds:00000000`0000000c=????????
Resetting default scope

STACK_TEXT:
fffff200`62a5a828 fffff804`53607b69     : 00000000`0000000a 00000000`0000000c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff200`62a5a830 fffff804`53603e69     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff200`62a5a970 fffff804`534089bd     : fffff200`62a5aa00 ffff9a01`322e8200 fffff200`62a5ab70 00000000`00000002 : nt!KiPageFault+0x469
fffff200`62a5ab00 fffff804`5340792d     : ffff9a01`322e8240 ffffd68f`31ae2000 fffff200`62a5ae90 ffffd68f`00000002 : nt!EtwpLogKernelEvent+0x40d
fffff200`62a5abb0 fffff804`53406b04     : ffff9a01`322e5180 89480000`00000000 00000000`00000008 00000000`000309d3 : nt!KiExecuteAllDpcs+0x41d
fffff200`62a5ad20 fffff804`535fcc95     : 00155a74`850fc985 ffff9a01`322e5180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1f4
fffff200`62a5afb0 fffff804`535fca80     : 00000000`008f3000 00000000`008f3000 00000000`03fefd00 00000000`00000002 : nt!KxRetireDpcList+0x5
fffff200`64e61ad0 fffff804`535fc14e     : 00000000`00000064 00000000`00000000 ffffffff`fff0bdc0 ffffd68f`3b942080 : nt!KiDispatchInterruptContinue
fffff200`64e61b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2ee


SYMBOL_NAME:  nt!EtwpLogKernelEvent+40d

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  40d

FAILURE_BUCKET_ID:  AV_nt!EtwpLogKernelEvent

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2dd8433c-c071-e8df-14a1-7a8aa408eedb}

Followup:     MachineOwner
---------

Bugüne kadar hiç sorunla karşılaşmamıştım MSI ile fan kontrolü, Samsung Magician ile de overprovisioning yapıyorum. Bunlarla ilgisi nedir?
 

Dosya Ekleri

  • Adsız.png
    Adsız.png
    102,7 KB · Görüntüleme: 40
Toshiba diskinizi sistemden sökün ve o dediğim uygulamaları kaldırın yeterli olacaktır. Döküme göre bu uygulamaları kaldırmanızı belirtmiştim zaten. :)

Bu arada sorun çözülürse belirtmeyi unutmayın.
 
Diski sistemden sökmemde bir sakınca yok ki hasarlı zaten :) MSI uygulamasının böyle bir şey yapması mantıksız değil mi, sonuçta anakarta özel yazılmış bir yazılım. Bunu kaldırırsam fan kontrolünü yine BIOS'tan yapabilirim, sorun değil. Ama SSD yazılımını kaldırırsam overprovision, Rapid gibi özellikleri kaybedeğim.
Toshiba diskinizi sistemden sökün ve o dediğim uygulamaları kaldırın yeterli olacaktır. Döküme göre bu uygulamaları kaldırmanızı belirtmiştim zaten. :)

Bu arada sorun çözülürse belirtmeyi unutmayın.
 
O halde sorun devam ettiği durumda kaldırın Magician ve MSI uygulamalarını. Ana hata kaynağı disk olarak görünüyor zaten. Ama dediğim gibi sorun bende değil, ben de minidump'ın yalancısıyım. :D
 
Diski söküp, dediğiniz yazılımları kaldırıyorum şimdi. Sorun devam ederse tekrardan buraya yazacağım. Benim anlamadığım, HDD'nin içi boş. Bu durumda, yine de mavi ekrana sebep oluyor mu?
 
Windows o diski boot ederse sorun ortaya çıkabilir. Ek olarak bu uygulamaları sonradan geri yükleyebilirsiniz. Sorun çözülürse belirtmeniz yeterli olacaktır.
 
Windows o diski boot ederse sorun ortaya çıkabilir. Ek olarak bu uygulamaları sonradan geri yükleyebilirsiniz. Sorun çözülürse belirtmeniz yeterli olacaktır.

Sorun hala devam ediyor. İlk önce Chrome'da hata kodu: Status_access_vıolatıon hatasını aldım ve ardından yine mavi ekran.

PAGE_FAULT_IN_NONPAGED_AREA
Unable to verify checksum for win32k.sys

Bios güncel bu arada

@Enes3078
DRIVER_OVERRAN_STACK_BUFFER hatası aldım
 
Son düzenleme:

Yeni konular

Geri
Yukarı