Mavi ekran hatası Kişisel bilgisayarınız bir sorunla karşılaştı ve yeniden başlatılması gerekiyor

ARMY

Hectopat
Katılım
15 Temmuz 2020
Mesajlar
74
Yer
YALOVA
Daha fazla  
Sistem Özellikleri
İşlemci: Ryzen5 3600
Ekran Kartı: Gigabyte RTX 2060 Windforce
Anakart: Gigabyte B450m-S2H
RAM: Corsair Vengeance 3600MHz CL16 (2x8)
Cinsiyet
Erkek
Meslek
Öğrenci
"Kişisel bilgisayarınız bir sorunla karşılaştı ve yeniden başlatılması gerekiyor" böyle bir hata alıyorum ve %100 olunca bile bilgisayarı yeniden başlatmıyor. Mavi ekranda kalıyor. Restart düğmesi ile yeniden başlatmam gerekiyor. Bilgisi olan var mı yardım edebilir mi?
 
 
Minidumb dosyalarım
 
Herkese açık olarak atmalısınız, ayarları aşağıdaki gibi yapın.

Ek Açıklama 2020-08-16 103509.png
 
BattlEye'ı kaldırın ve Kaspersky'yi güncelleyin. Ekran kartınızın sürücülerini DDU ile kaldırıp güncelleyin.
Belleklere test yapın.
Ayrıca CPU-Z ile işiniz bittiyse kaldırın.
 
BattlEye'ı kaldırın ve Kaspersky'yi güncelleyin. Ekran kartınızın sürücülerini DDU ile kaldırıp güncelleyin.
Belleklere test yapın.
Ayrıca CPU-Z ile işiniz bittiyse kaldırın.
Teşekkür ederim yardımınız için BattlEye dediğiniz pubg herhalde pubgyi kaldıramam oynuyorum :D
 
@Bora Dere 'nin dediklerine ek olarak;

Windows sürümünüzü 1904'ten 2004'e yükseltin. Son 3-4 gündür gelen mavi ekran sorunlarında BattleEye var. Ve bu hatanın olduğu sürüm dikkat ettiğim üzere genelde 1904. 2004'e güncelleyin sistemi öyle gözlemleyin.
Nasıl güncelleyeceğim? Windows update da herahngi bi güncelleştirme gözükmüyor.
 
Sorun RAM kaynaklı gibi görünüyor. Çünkü Minidump dosyalarında ağırlıklı olarak hem MEMORY_MANAGEMENT hataları görünüyor, hem de bu hatalarda IMAGE_NAME olarak "memory_corruption" yazıyor.

Belleklerinizi test edin;

Ayrıca DDU ile NVIDIA ekran kartı sürücünüzü silin;
Sonra ise tekrardan en güncel sürücüyü yükleyin.

Kod:
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffde8a76e70240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4046

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RED-PC

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8222

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffde8a76e70240

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

ERROR_CODE: (NTSTATUS) 0x78b93040 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT:
ffffd70a`981ee938 fffff800`557177f2     : 00000000`000000ef ffffde8a`76e70240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffd70a`981ee940 fffff800`5560b673     : 00000000`00000000 fffff800`55073ed1 00000000`00000002 fffff800`5507426b : nt!PspCatchCriticalBreak+0x10e
ffffd70a`981ee9e0 fffff800`5544faa0     : ffffde8a`00000000 00000000`00000000 ffffde8a`76e70240 ffffde8a`76e70678 : nt!PspTerminateAllThreads+0x1bb7c3
ffffd70a`981eea50 fffff800`5544f89c     : ffffde8a`76e70240 00000000`00000000 000000ff`737ff8bc fffff800`553eab9a : nt!PspTerminateProcess+0xe0
ffffd70a`981eea90 fffff800`551ef878     : ffffde8a`76e70240 ffffde8a`78b93040 ffffd70a`981eeb80 ffffde8a`76e70240 : nt!NtTerminateProcess+0x9c
ffffd70a`981eeb00 00007ffd`70fec344     : 00007ffd`710624f3 00007ffd`71091014 000000ff`737ff880 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ff`737fe2e8 00007ffd`710624f3     : 00007ffd`71091014 000000ff`737ff880 00000000`00000000 00007ffd`70f50000 : 0x00007ffd`70fec344
000000ff`737fe2f0 00007ffd`71091014     : 000000ff`737ff880 00000000`00000000 00007ffd`70f50000 00000000`00000004 : 0x00007ffd`710624f3
000000ff`737fe2f8 000000ff`737ff880     : 00000000`00000000 00007ffd`70f50000 00000000`00000004 00007ffd`70ff335d : 0x00007ffd`71091014
000000ff`737fe300 00000000`00000000     : 00007ffd`70f50000 00000000`00000004 00007ffd`70ff335d 00007ffd`71091014 : 0x000000ff`737ff880


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_78b93040_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {aa99ec4e-8466-33fb-562a-0960823c6a0b}

Followup:     MachineOwner
---------


PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff948c26663cb0, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80467c8d7c6, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys

Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6905

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RED-PC

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 67494

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff948c26663cb0

BUGCHECK_P2: 2

BUGCHECK_P3: fffff80467c8d7c6

BUGCHECK_P4: 0

READ_ADDRESS: fffff80457cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80457c0f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff80457c0f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff948c26663cb0

MM_INTERNAL_CODE:  0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  ffffa506e7b0e8b0 -- (.trap 0xffffa506e7b0e8b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff948c265e3f40 rbx=0000000000000000 rcx=ffffa506e7b0eac0
rdx=ffffd98da09df000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80467c8d7c6 rsp=ffffa506e7b0ea40 rbp=ffffa506e7b0eb40
r8=0000000000000080  r9=ffffa506e7b0ea78 r10=ffff948c265e3f40
r11=0000000000001001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nvlddmkm+0xabd7c6:
fffff804`67c8d7c6 0f1187e0010800  movups  xmmword ptr [rdi+801E0h],xmm0 ds:00000000`000801e0=????????????????????????????????
Resetting default scope

STACK_TEXT:
ffffa506`e7b0e608 fffff804`57436099     : 00000000`00000050 ffff948c`26663cb0 00000000`00000002 ffffa506`e7b0e8b0 : nt!KeBugCheckEx
ffffa506`e7b0e610 fffff804`57212d00     : ffffd98d`9dac5e60 00000000`00000002 ffffa506`e7b0e930 00000000`00000000 : nt!MiSystemFault+0x1ae399
ffffa506`e7b0e710 fffff804`573ec01e     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`6799f04f : nt!MmAccessFault+0x400
ffffa506`e7b0e8b0 fffff804`67c8d7c6     : 00000000`00000000 ffff948c`1b200290 ffffd98d`a0a23010 00000000`00000500 : nt!KiPageFault+0x35e
ffffa506`e7b0ea40 00000000`00000000     : ffff948c`1b200290 ffffd98d`a0a23010 00000000`00000500 00000000`00000000 : nvlddmkm+0xabd7c6


SYMBOL_NAME:  nvlddmkm+abd7c6

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  abd7c6

FAILURE_BUCKET_ID:  AV_INVALID_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {df018c6e-47ce-6234-d97b-e5d8699ade66}

Followup:     MachineOwner
---------


MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff8d3ffdd21eb0
Arg3: 0000000800000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3140

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RED-PC

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 37419

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff8d3ffdd21eb0

BUGCHECK_P3: 800000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  SearchApp.exe

STACK_TEXT:
ffffd101`2c413108 fffff807`35d2abba     : 00000000`0000001a 00000000`00041792 ffff8d3f`fdd21eb0 00000008`00000000 : nt!KeBugCheckEx
ffffd101`2c413110 fffff807`35cedc06     : 00000000`00000000 00000000`00000000 00000000`00000145 ffff8d3f`fdd21eb0 : nt!MiDeleteVa+0x153a
ffffd101`2c413210 fffff807`35cedd1b     : ffff8d46`00000000 ffffc00c`451c2700 ffffd101`00000000 ffffd101`2c413680 : nt!MiWalkPageTablesRecursively+0x776
ffffd101`2c4132b0 fffff807`35cedd1b     : ffff8d46`a34fff70 ffffc00c`451c2700 ffffd101`00000001 ffffd101`2c413690 : nt!MiWalkPageTablesRecursively+0x88b
ffffd101`2c413350 fffff807`35cedd1b     : ffff8d46`a34ff000 ffffc00c`451c2700 ffffd101`00000002 ffffd101`2c4136a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffd101`2c4133f0 fffff807`35cdcbfb     : 00000000`00000000 ffffc00c`451c2700 00000000`00000003 ffffd101`2c4136b0 : nt!MiWalkPageTablesRecursively+0x88b
ffffd101`2c413490 fffff807`35d29451     : ffffd101`2c413630 ffffc00c`00000000 ffff8d3f`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffd101`2c413590 fffff807`35d01670     : 00000000`00000001 ffffd101`00000000 ffffc00c`451c2550 ffffc00c`451a1080 : nt!MiDeletePagablePteRange+0x4f1
ffffd101`2c4138a0 fffff807`360999e9     : ffffc00c`528be5a0 00000000`00000000 ffffc00c`00000000 ffffc00c`00000000 : nt!MiDeleteVad+0x360
ffffd101`2c4139b0 fffff807`3609938c     : ffffc00c`528be5a0 ffffc00c`3eeac010 ffffc00c`451a1080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffd101`2c4139e0 fffff807`360e4dd3     : ffffc00c`459c7da0 ffffc00c`459c7da0 ffffc00c`528be5a0 ffffc00c`451c2080 : nt!MiCleanVad+0x30
ffffd101`2c413a10 fffff807`36081f5f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffc00c`451c2080 : nt!MmCleanProcessAddressSpace+0x137
ffffd101`2c413a90 fffff807`3609ea8a     : ffffc00c`451c2080 ffffe584`ddfe8060 ffffd101`2c413cd0 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffd101`2c413b10 fffff807`35ff4558     : 00000000`00000001 fffff807`00000001 ffffd101`2c413be0 00000038`3f352000 : nt!PspExitThread+0x5f6
ffffd101`2c413c10 fffff807`35ce6ca7     : ffffd101`2c413d00 ffffd101`2c413e40 ffff6f9a`0185179c ffffd101`2c413c70 : nt!KiSchedulerApcTerminate+0x38
ffffd101`2c413c50 fffff807`35df8440     : 00000000`00000000 ffffd101`2c413d00 00000000`0c25bcb0 00007ffb`00000000 : nt!KiDeliverApc+0x487
ffffd101`2c413d00 fffff807`35e0595f     : ffffc00c`451a1080 00000000`00000000 00000000`00000000 ffffc00c`00000000 : nt!KiInitiateUserApc+0x70
ffffd101`2c413e40 00007ffb`b7a0fbd0     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`41d0fa00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b7a0fbd0


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------


MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffa00002e83a8
Arg3: 0000000200000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3062

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RED-PC

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15609

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffffa00002e83a8

BUGCHECK_P3: 200000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVDi

STACK_TEXT:
ffffdf82`f6b5d0c8 fffff801`2b32abba     : 00000000`0000001a 00000000`00041792 fffffa00`002e83a8 00000002`00000000 : nt!KeBugCheckEx
ffffdf82`f6b5d0d0 fffff801`2b2edc06     : 00000000`00000000 00000000`00000000 00000000`000000f6 fffffa00`002e83a8 : nt!MiDeleteVa+0x153a
ffffdf82`f6b5d1d0 fffff801`2b2edd1b     : fffffa7d`00000000 ffffaa88`93ed8740 ffffdf82`00000000 ffffdf82`f6b5d640 : nt!MiWalkPageTablesRecursively+0x776
ffffdf82`f6b5d270 fffff801`2b2edd1b     : fffffa7d`3e800008 ffffaa88`93ed8740 ffffdf82`00000001 ffffdf82`f6b5d650 : nt!MiWalkPageTablesRecursively+0x88b
ffffdf82`f6b5d310 fffff801`2b2edd1b     : fffffa7d`3e800000 ffffaa88`93ed8740 ffffdf82`00000002 ffffdf82`f6b5d660 : nt!MiWalkPageTablesRecursively+0x88b
ffffdf82`f6b5d3b0 fffff801`2b2dcbfb     : ffff6786`41f9890b ffffaa88`93ed8740 ffffdf82`00000003 ffffdf82`f6b5d670 : nt!MiWalkPageTablesRecursively+0x88b
ffffdf82`f6b5d450 fffff801`2b329451     : ffffdf82`f6b5d5f0 ffffaa88`00000000 fffffa7d`00000002 ffffffff`00000000 : nt!MiWalkPageTables+0x36b
ffffdf82`f6b5d550 fffff801`2b301670     : 00000000`00000001 ffffdf82`00000000 ffffaa88`93ed8590 ffffaa88`929e1080 : nt!MiDeletePagablePteRange+0x4f1
ffffdf82`f6b5d860 fffff801`2b6999e9     : ffffaa88`931880b0 00000000`00000000 00000000`00000000 ffffaa88`00000000 : nt!MiDeleteVad+0x360
ffffdf82`f6b5d970 fffff801`2b6997c2     : ffffaa88`98e03020 00000000`5cf60000 ffffaa88`93ed80c0 00000000`00000000 : nt!MiUnmapVad+0x49
ffffdf82`f6b5d9a0 fffff801`2b699639     : ffffaa88`929e1080 fffff801`2b4058b8 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffdf82`f6b5da80 fffff801`2b69928c     : ffffaa88`929e1080 000002ad`43f74ff0 00000000`00000001 ffffaa88`93ed80c0 : nt!NtUnmapViewOfSectionEx+0x99
ffffdf82`f6b5dad0 fffff801`2b4058b8     : 00000000`00000000 ffffdf82`f6b5db80 000002ad`43f74ff0 ffffaa88`00000000 : nt!NtUnmapViewOfSection+0xc
ffffdf82`f6b5db00 00007ffa`2b8ec304     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f4`15aff688 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`2b8ec304


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------


ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffcc802073c888, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffff930c2118da20, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3233

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RED-PC

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25250

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: ffffcc802073c888

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: ffff930c2118da20

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  ffff930c2118da20 -- (.trap 0xffff930c2118da20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000100000 rbx=0000000000000000 rcx=0000000000300000
rdx=3fffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037f952aa7 rsp=ffff930c2118dbb0 rbp=ffff930c2118dc99
r8=ffffda8245c8a580  r9=fffff80380050b80 r10=fffff28000000000
r11=ffff930c2118de40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiBuildForkPte+0x5db:
fffff803`7f952aa7 f0490fba6d183f  lock bts qword ptr [r13+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope

STACK_TEXT:
ffff930c`2118d828 fffff803`7f82f11a     : 00000000`000000be ffffcc80`2073c888 8a000000`00200121 ffff930c`2118da20 : nt!KeBugCheckEx
ffff930c`2118d830 fffff803`7f6eec6f     : 8a000000`00200121 00000000`00000003 ffff930c`2118daa0 00000000`00000000 : nt!MiRaisedIrqlFault+0x1e28fe
ffff930c`2118d880 fffff803`7f80205e     : 00000000`00000003 ffff930c`2118dbc0 00000000`00000000 ffff930c`2118da58 : nt!MmAccessFault+0x4ef
ffff930c`2118da20 fffff803`7f952aa7     : 8100000a`d142d867 ffff930c`00000000 00000000`00000000 ffffcc80`0600c820 : nt!KiPageFault+0x35e
ffff930c`2118dbb0 fffff803`7f9539b7     : ffffda82`408f5080 ffffda82`461c5300 fffff280`b15df830 ffffcc80`0c07d670 : nt!MiBuildForkPte+0x5db
ffff930c`2118dce0 fffff803`7fcd6191     : ffffda82`408f5080 ffff930c`2118dfe9 ffffda82`461c5300 ffffda82`461c5300 : nt!MiCloneVads+0x4ab
ffff930c`2118df70 fffff803`7fc3d21d     : 00000000`00000000 ffff930c`00000000 00000000`00000000 00000000`00000000 : nt!MiCloneProcessAddressSpace+0x261
ffff930c`2118e050 fffff803`7fbe2c09     : 00000000`00002ab1 ffff930c`2118eb80 00000000`00000000 00000000`00000000 : nt!MmInitializeProcessAddressSpace+0x15021d
ffff930c`2118e240 fffff803`7fbb0232     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0x1f23dd
ffff930c`2118e760 fffff803`7fd02cd5     : ffff6971`22f0ba2a ffff6971`22f0bb8a 00000000`00000000 00000000`00000000 : nt!PspCreateProcess+0x242
ffff930c`2118ea30 fffff803`7f8058b8     : 00000000`00000000 00000000`00000000 00000000`77566d4d ffff930c`2118eae8 : nt!NtCreateProcessEx+0x85
ffff930c`2118ea90 00007ffb`1ce2c764     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000015`ed75f428 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1ce2c764


SYMBOL_NAME:  nt!MiRaisedIrqlFault+1e28fe

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1e28fe

FAILURE_BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup:     MachineOwner
---------
@Bora Dere 'nin dediklerine ek olarak;

Windows sürümünüzü 1904'ten 2004'e yükseltin. Son 3-4 gündür gelen mavi ekran sorunlarında BattleEye var. Ve bu hatanın olduğu sürüm dikkat ettiğim üzere genelde 1904. 2004'e güncelleyin sistemi öyle gözlemleyin.
Zaten 2004 kullanıyor arkadaş. Build 19041, 2004 sürümüne ait. 1904 diye bir sürüm yok, 1903 sürümünün derlemesi ise 18362 olarak geçiyor.
 
Son düzenleme:

Geri
Yukarı