Dump dökümünü inceledim. Genel olarak erkran kartından dolayı mavi ekran hatası almışsın.
Öncelikle ekran kartı sürücüsünü DDU ile kaldırın.
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...
www.technopat.net
En güncel WHQL ekran kartı sürücüsünü NVIDIA sitesinden indirip yükleyin.
Tüm sürücüleri güncelleyin. (Örneğin; ses sürücüsü bayağı eski kalmış)
M.2 desteği, HDMI/DVI-D/D-Sub, SATA 6 Gbps, 1 Gb Ethernet, USB 3.2 Gen 1 Type-A ve BIOS FlashBack™ özelliklerine sahip AMD B450 (Ryzen AM4) micro ATX anakart
www.asus.com
Bir de bellek arızası olabilir. Memtest86 ile RAM testi yapın.
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hataları
www.technopat.net
Güncel Memtest86 uygulaması;
Download your free copy of MemTest86 here for USB.
www.memtest86.com
Memtest86 sonuçlarını burada paylaşın.
Kod:Panoya kopyala
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8078e0adaaa, Address of the instruction which caused the BugCheck
Arg3: fffffd809d016190, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3155
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 35038
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 343
Key : Analysis.Init.Elapsed.mSec
Value: 5498
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051723-11875-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8078e0adaaa
BUGCHECK_P3: fffffd809d016190
BUGCHECK_P4: 0
CONTEXT: fffffd809d016190 -- (.cxr 0xfffffd809d016190)
rax=ffffad8e94df1ea0 rbx=ffffad8e94df1000 rcx=ffffad8e94df1000
rdx=8000000000000000 rsi=ffffad8e94df1e10 rdi=fffffd809d016bf8
rip=fffff8078e0adaaa rsp=fffffd809d016b90 rbp=fffffd809d016c69
r8=fffff8078e0c7680 r9=0000000000000000 r10=0000000000000000
r11=fffffd809d016d70 r12=0000000000000001 r13=ffffad8e8b1ae7e0
r14=0000000000000015 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050286
nvlddmkm+0xfddaaa:
fffff807`8e0adaaa 448b02 mov r8d,dword ptr [rdx] ds:002b:80000000`00000000=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffffd80`9d016b90 00000000`00000020 : 00000000`0000018f 00000000`00000003 ffffd08c`2a9fc320 fffffd80`9d016bf8 : nvlddmkm+0xfddaaa
fffffd80`9d016b98 00000000`0000018f : 00000000`00000003 ffffd08c`2a9fc320 fffffd80`9d016bf8 fffff807`8e1274cf : 0x20
fffffd80`9d016ba0 00000000`00000003 : ffffd08c`2a9fc320 fffffd80`9d016bf8 fffff807`8e1274cf ffffad8e`94df1000 : 0x18f
fffffd80`9d016ba8 ffffd08c`2a9fc320 : fffffd80`9d016bf8 fffff807`8e1274cf ffffad8e`94df1000 fffff807`75817a42 : 0x3
fffffd80`9d016bb0 fffffd80`9d016bf8 : fffff807`8e1274cf ffffad8e`94df1000 fffff807`75817a42 ffffd08c`17400340 : 0xffffd08c`2a9fc320
fffffd80`9d016bb8 fffff807`8e1274cf : ffffad8e`94df1000 fffff807`75817a42 ffffd08c`17400340 ffffad8e`911c50ff : 0xfffffd80`9d016bf8
fffffd80`9d016bc0 ffffad8e`94df1000 : fffff807`75817a42 ffffd08c`17400340 ffffad8e`911c50ff ffffad8e`94df16a0 : nvlddmkm+0x10574cf
fffffd80`9d016bc8 fffff807`75817a42 : ffffd08c`17400340 ffffad8e`911c50ff ffffad8e`94df16a0 ffffad8e`94df16a8 : 0xffffad8e`94df1000
fffffd80`9d016bd0 fffff807`75fb70b9 : 00000000`0000001f 00000000`00000003 00000000`00000000 fffff807`8e136bdf : nt!ExFreeHeapPool+0x362
fffffd80`9d016cb0 ffffad8e`94df1000 : ffffad8e`88666000 fffffd80`9d016d60 ffffad8e`94df1000 fffff807`8e136a0f : nt!ExFreePool+0x9
fffffd80`9d016ce0 ffffad8e`88666000 : fffffd80`9d016d60 ffffad8e`94df1000 fffff807`8e136a0f ffffad8e`94df1000 : 0xffffad8e`94df1000
fffffd80`9d016ce8 fffffd80`9d016d60 : ffffad8e`94df1000 fffff807`8e136a0f ffffad8e`94df1000 ffffad8e`8cfe9a20 : 0xffffad8e`88666000
fffffd80`9d016cf0 ffffad8e`94df1000 : fffff807`8e136a0f ffffad8e`94df1000 ffffad8e`8cfe9a20 ffffad8e`88679650 : 0xfffffd80`9d016d60
fffffd80`9d016cf8 fffff807`8e136a0f : ffffad8e`94df1000 ffffad8e`8cfe9a20 ffffad8e`88679650 fffff807`8da2d750 : 0xffffad8e`94df1000
fffffd80`9d016d00 ffffad8e`94df1000 : ffffad8e`8cfe9a20 ffffad8e`88679650 fffff807`8da2d750 00000000`00000003 : nvlddmkm+0x1066a0f
fffffd80`9d016d08 ffffad8e`8cfe9a20 : ffffad8e`88679650 fffff807`8da2d750 00000000`00000003 fffff807`8da257a0 : 0xffffad8e`94df1000
fffffd80`9d016d10 ffffad8e`88679650 : fffff807`8da2d750 00000000`00000003 fffff807`8da257a0 ffffad8e`94df1000 : 0xffffad8e`8cfe9a20
fffffd80`9d016d18 fffff807`8da2d750 : 00000000`00000003 fffff807`8da257a0 ffffad8e`94df1000 ffffad8e`88666000 : 0xffffad8e`88679650
fffffd80`9d016d20 00000000`00000003 : fffff807`8da257a0 ffffad8e`94df1000 ffffad8e`88666000 ffffad8e`94df1000 : nvlddmkm+0x95d750
fffffd80`9d016d28 fffff807`8da257a0 : ffffad8e`94df1000 ffffad8e`88666000 ffffad8e`94df1000 00000000`0000001f : 0x3
fffffd80`9d016d30 ffffad8e`94df1000 : ffffad8e`88666000 ffffad8e`94df1000 00000000`0000001f 00000000`00000001 : nvlddmkm+0x9557a0
fffffd80`9d016d38 ffffad8e`88666000 : ffffad8e`94df1000 00000000`0000001f 00000000`00000001 fffff807`8e0ad62e : 0xffffad8e`94df1000
fffffd80`9d016d40 ffffad8e`94df1000 : 00000000`0000001f 00000000`00000001 fffff807`8e0ad62e 00000000`00000000 : 0xffffad8e`88666000
fffffd80`9d016d48 00000000`0000001f : 00000000`00000001 fffff807`8e0ad62e 00000000`00000000 ffffad8e`94df1000 : 0xffffad8e`94df1000
fffffd80`9d016d50 00000000`00000001 : fffff807`8e0ad62e 00000000`00000000 ffffad8e`94df1000 00000000`00000000 : 0x1f
fffffd80`9d016d58 fffff807`8e0ad62e : 00000000`00000000 ffffad8e`94df1000 00000000`00000000 00000000`00000000 : 0x1
fffffd80`9d016d60 00000000`00000000 : ffffad8e`94df1000 00000000`00000000 00000000`00000000 ffffad8e`8cfe9a20 : nvlddmkm+0xfdd62e
SYMBOL_NAME: nvlddmkm+fddaaa
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xfffffd809d016190 ; kb
BUCKET_ID_FUNC_OFFSET: fddaaa
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffff3ffe839f10
Arg3: 8000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2671
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3298
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 3606
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.DumpHeader
Value: 0x1a
Key : Bugcheck.Code.Register
Value: 0x1a
Key : MemoryManagement.PFN
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 060123-8015-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffff3ffe839f10
BUGCHECK_P3: 8000000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: BF2042.exe
STACK_TEXT:
fffffd0c`5180ed08 fffff805`274bc49a : 00000000`0000001a 00000000`00041792 ffffff3f`fe839f10 80000000`00000000 : nt!KeBugCheckEx
fffffd0c`5180ed10 fffff805`2746d836 : 00000000`00000000 00000000`00000000 00000000`00000e0f ffffff3f`fe839f10 : nt!MiDeleteVa+0x153a
fffffd0c`5180ee10 fffff805`2746d94b : ffffff7f`00000000 ffffb488`2d8b3700 fffffd0c`00000000 fffffd0c`5180f280 : nt!MiWalkPageTablesRecursively+0x776
fffffd0c`5180eeb0 fffff805`2746d94b : ffffff7f`bfcfffa0 ffffb488`2d8b3700 fffffd0c`00000001 fffffd0c`5180f290 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0c`5180ef50 fffff805`2746d94b : ffffff7f`bfcff000 ffffb488`2d8b3700 fffffd0c`00000002 fffffd0c`5180f2a0 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0c`5180eff0 fffff805`2746a94b : 00000000`00000000 ffffb488`2d8b3700 00000000`00000003 fffffd0c`5180f2b0 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0c`5180f090 fffff805`274bad31 : fffffd0c`5180f230 ffffb488`00000000 ffffff3f`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffffd0c`5180f190 fffff805`2747e830 : 00000000`00000001 fffffd0c`00000000 ffffb488`2d8b3550 ffffb488`3a6f4080 : nt!MiDeletePagablePteRange+0x4f1
fffffd0c`5180f4a0 fffff805`27885ba9 : ffffb488`3c104600 00000000`00000000 ffffb488`00000000 ffffb488`00000000 : nt!MiDeleteVad+0x360
fffffd0c`5180f5b0 fffff805`2788554c : ffffb488`3c104600 ffffb488`39a62c20 ffffb488`3a6f4080 00000000`00000000 : nt!MiUnmapVad+0x49
fffffd0c`5180f5e0 fffff805`2782441f : ffffb488`3ab4c060 ffffb488`3ab4c060 ffffb488`3c104600 ffffb488`2d8b3080 : nt!MiCleanVad+0x30
fffffd0c`5180f610 fffff805`27831550 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffb488`2d8b3080 : nt!MmCleanProcessAddressSpace+0x137
fffffd0c`5180f690 fffff805`27883f02 : ffffb488`2d8b3080 ffff8105`70a28060 fffffd0c`5180f8e0 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
fffffd0c`5180f720 fffff805`278c8578 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`0022e000 : nt!PspExitThread+0x5f6
fffffd0c`5180f820 fffff805`274ddf37 : 00000000`00000000 00000000`00000000 fffffd0c`00000000 00000000`d6c9b040 : nt!KiSchedulerApcTerminate+0x38
fffffd0c`5180f860 fffff805`276010f0 : 00000000`00000978 fffffd0c`5180f910 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
fffffd0c`5180f910 fffff805`2760f59f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffffd0c`5180fa50 00007ffd`1fe0d124 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0229fa98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`1fe0d124
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------