Mavi ekran hatası

İşletim sistemi
Windows 10

uzunkege

Decapat
Katılım
24 Kasım 2020
Mesajlar
20
Daha fazla  
Cinsiyet
Erkek
Bilgisayarımı alalı daha 1, 1.5 ay oldu ve çok sık olmasa da şu ana kadar 3 kez mavi ekran olup bilgisayar kendini yeniden başlattı. Bu durum oyun oynarken veya bilgisayarı yoğun çalıştıracak uygulamalarda da olmuyor EBA canlı dersteyken yaşadım 3'ünü de. Sorunu çözebilecek varsa yardım isterim şimdiden teşekkürler. Minidump.
Dosyalarım:
 
1-Battleye launcher'i kaldırın.

2-Ne olur ne olmas ekran kartı sürücülerini,zi DDU ile kaldırın ve en güncelini yükleyin.


3-Rehberi uygulayın.

 
@PanzerTR 'nin dediklerine ek olarak,
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa68c77602750, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: ffffa68c77602750, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4515

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13351

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffa68c77602750

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: ffffa68c77602750

READ_ADDRESS: fffff8074c0fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8074c00f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8074c00f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa68c77602750

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffd70aab645240 -- (.trap 0xffffd70aab645240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa68c77602750 rbx=0000000000000000 rcx=0000000010000000
rdx=000000000000082f rsi=0000000000000000 rdi=0000000000000000
rip=ffffa68c77602750 rsp=ffffd70aab6453d8 rbp=ffffd70aab6454d0
r8=ffffd70aab6454e0  r9=000000000000002f r10=0000ffffa68c7760
r11=ffff6ffdd0600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
ffffa68c`77602750 8826            mov     byte ptr [rsi],ah ds:00000000`00000000=??
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
ffffa68c`77602750 8826            mov     byte ptr [rsi],ah

STACK_TEXT:
ffffd70a`ab6450f8 fffff807`4b805e69     : 00000000`0000000a ffffa68c`77602750 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffd70a`ab645100 fffff807`4b802169     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd70a`ab645240 ffffa68c`77602750     : fffff807`4b63b310 fffff807`4c124440 00000000`0000003f ffffa68c`79542080 : nt!KiPageFault+0x469
ffffd70a`ab6453d8 fffff807`4b63b310     : fffff807`4c124440 00000000`0000003f ffffa68c`79542080 ffff8000`0bb40180 : 0xffffa68c`77602750
ffffd70a`ab6453e0 fffff807`4b703d9d     : 00000000`00000000 ffffd70a`ab645510 ffffd70a`ab645758 00000000`00000003 : nt!HalpApicRequestInterrupt+0x90
ffffd70a`ab645450 fffff807`4b6ca3d4     : ffff8000`00000000 fffff807`00000000 ffffa68c`798a9080 ffffd70a`ab6456fc : nt!HalpInterruptSendIpi+0xfd
ffffd70a`ab6456c0 fffff807`4b6c3c1d     : 00000000`00dee5c6 ffffd70a`ab645b10 00000000`00000080 ffff8000`0bbea180 : nt!KiDeferredReadySingleThread+0x8b4
ffffd70a`ab6458b0 fffff807`4b6c4000     : ffff8000`0bbea180 00000000`00000000 ffffa68c`78d8b220 00000000`00000000 : nt!KiReadyThread+0x4d
ffffd70a`ab6458e0 fffff807`4b6e910d     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00dee5c6 : nt!KiProcessExpiredTimerList+0x290
ffffd70a`ab6459d0 fffff807`4b7f7a0e     : ffffffff`00000000 ffff8000`0bbea180 ffff8000`0bbf51c0 ffffa68c`776650c0 : nt!KiRetireDpcList+0x5dd
ffffd70a`ab645c60 00000000`00000000     : ffffd70a`ab646000 ffffd70a`ab640000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff30a9f3173e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff30a9f317338, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5655

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15728

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff30a9f3173e0

BUGCHECK_P3: fffff30a9f317338

BUGCHECK_P4: 0

TRAP_FRAME:  fffff30a9f3173e0 -- (.trap 0xfffff30a9f3173e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe08e8511d040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061327e8af rsp=fffff30a9f317570 rbp=fffff30a9f317639
r8=0000000000000000  r9=0000000000000000 r10=ffffcc0050ea4180
r11=ffffe08e81e29800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
nt!KeWaitForMultipleObjects+0x43f:
fffff806`1327e8af cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff30a9f317338 -- (.exr 0xfffff30a9f317338)
ExceptionAddress: fffff8061327e8af (nt!KeWaitForMultipleObjects+0x000000000000043f)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffff30a`9f3170b8 fffff806`13405e69     : 00000000`00000139 00000000`00000003 fffff30a`9f3173e0 fffff30a`9f317338 : nt!KeBugCheckEx
fffff30a`9f3170c0 fffff806`13406290     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff30a`9f317200 fffff806`13404623     : ffffcc00`50ea4180 00000000`00000000 00000000`00000000 00000000`0000003f : nt!KiFastFailDispatch+0xd0
fffff30a`9f3173e0 fffff806`1327e8af     : ffffe08e`80848080 00000000`00000000 00000000`00040246 fffff806`132c9861 : nt!KiRaiseSecurityCheckFailure+0x323
fffff30a`9f317570 fffff612`1815da08     : fffff612`183ab1d0 fffff30a`9f795240 00000000`00000003 fffff640`c62fc900 : nt!KeWaitForMultipleObjects+0x43f
fffff30a`9f317680 fffff612`178b930f     : 00000000`0000000f 00000000`00000003 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x88
fffff30a`9f3177b0 fffff612`181d1eb3     : ffffe08e`88c07080 ffffe08e`88c07080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
fffff30a`9f317970 fffff612`17858960     : ffffe08e`88c07080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
fffff30a`9f317aa0 fffff612`175d474d     : ffffe08e`88c07080 ffffe08e`88c07080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
fffff30a`9f317ad0 fffff806`134058b8     : ffffe08e`00000005 00000000`00000005 0000026f`078041b0 00000000`000016a0 : win32k!NtUserCallNoParam+0x15
fffff30a`9f317b00 00007ffe`d68e10e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`65a3f888 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d68e10e4


SYMBOL_NAME:  win32kbase!LegacyInputDispatcher::WaitAndDispatch+88

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  88

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_win32kbase!LegacyInputDispatcher::WaitAndDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ec713815-b628-d3b4-9812-1937faa1c4d7}

Followup:     MachineOwner
---------
 
@PanzerTR 'nin dediklerine ek olarak,
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa68c77602750, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: ffffa68c77602750, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4515

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13351

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffa68c77602750

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: ffffa68c77602750

READ_ADDRESS: fffff8074c0fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8074c00f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8074c00f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa68c77602750

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffd70aab645240 -- (.trap 0xffffd70aab645240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa68c77602750 rbx=0000000000000000 rcx=0000000010000000
rdx=000000000000082f rsi=0000000000000000 rdi=0000000000000000
rip=ffffa68c77602750 rsp=ffffd70aab6453d8 rbp=ffffd70aab6454d0
r8=ffffd70aab6454e0  r9=000000000000002f r10=0000ffffa68c7760
r11=ffff6ffdd0600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
ffffa68c`77602750 8826            mov     byte ptr [rsi],ah ds:00000000`00000000=??
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
ffffa68c`77602750 8826            mov     byte ptr [rsi],ah

STACK_TEXT:
ffffd70a`ab6450f8 fffff807`4b805e69     : 00000000`0000000a ffffa68c`77602750 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffd70a`ab645100 fffff807`4b802169     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd70a`ab645240 ffffa68c`77602750     : fffff807`4b63b310 fffff807`4c124440 00000000`0000003f ffffa68c`79542080 : nt!KiPageFault+0x469
ffffd70a`ab6453d8 fffff807`4b63b310     : fffff807`4c124440 00000000`0000003f ffffa68c`79542080 ffff8000`0bb40180 : 0xffffa68c`77602750
ffffd70a`ab6453e0 fffff807`4b703d9d     : 00000000`00000000 ffffd70a`ab645510 ffffd70a`ab645758 00000000`00000003 : nt!HalpApicRequestInterrupt+0x90
ffffd70a`ab645450 fffff807`4b6ca3d4     : ffff8000`00000000 fffff807`00000000 ffffa68c`798a9080 ffffd70a`ab6456fc : nt!HalpInterruptSendIpi+0xfd
ffffd70a`ab6456c0 fffff807`4b6c3c1d     : 00000000`00dee5c6 ffffd70a`ab645b10 00000000`00000080 ffff8000`0bbea180 : nt!KiDeferredReadySingleThread+0x8b4
ffffd70a`ab6458b0 fffff807`4b6c4000     : ffff8000`0bbea180 00000000`00000000 ffffa68c`78d8b220 00000000`00000000 : nt!KiReadyThread+0x4d
ffffd70a`ab6458e0 fffff807`4b6e910d     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00dee5c6 : nt!KiProcessExpiredTimerList+0x290
ffffd70a`ab6459d0 fffff807`4b7f7a0e     : ffffffff`00000000 ffff8000`0bbea180 ffff8000`0bbf51c0 ffffa68c`776650c0 : nt!KiRetireDpcList+0x5dd
ffffd70a`ab645c60 00000000`00000000     : ffffd70a`ab646000 ffffd70a`ab640000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff30a9f3173e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff30a9f317338, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5655

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15728

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff30a9f3173e0

BUGCHECK_P3: fffff30a9f317338

BUGCHECK_P4: 0

TRAP_FRAME:  fffff30a9f3173e0 -- (.trap 0xfffff30a9f3173e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe08e8511d040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061327e8af rsp=fffff30a9f317570 rbp=fffff30a9f317639
r8=0000000000000000  r9=0000000000000000 r10=ffffcc0050ea4180
r11=ffffe08e81e29800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
nt!KeWaitForMultipleObjects+0x43f:
fffff806`1327e8af cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff30a9f317338 -- (.exr 0xfffff30a9f317338)
ExceptionAddress: fffff8061327e8af (nt!KeWaitForMultipleObjects+0x000000000000043f)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffff30a`9f3170b8 fffff806`13405e69     : 00000000`00000139 00000000`00000003 fffff30a`9f3173e0 fffff30a`9f317338 : nt!KeBugCheckEx
fffff30a`9f3170c0 fffff806`13406290     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff30a`9f317200 fffff806`13404623     : ffffcc00`50ea4180 00000000`00000000 00000000`00000000 00000000`0000003f : nt!KiFastFailDispatch+0xd0
fffff30a`9f3173e0 fffff806`1327e8af     : ffffe08e`80848080 00000000`00000000 00000000`00040246 fffff806`132c9861 : nt!KiRaiseSecurityCheckFailure+0x323
fffff30a`9f317570 fffff612`1815da08     : fffff612`183ab1d0 fffff30a`9f795240 00000000`00000003 fffff640`c62fc900 : nt!KeWaitForMultipleObjects+0x43f
fffff30a`9f317680 fffff612`178b930f     : 00000000`0000000f 00000000`00000003 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x88
fffff30a`9f3177b0 fffff612`181d1eb3     : ffffe08e`88c07080 ffffe08e`88c07080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
fffff30a`9f317970 fffff612`17858960     : ffffe08e`88c07080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
fffff30a`9f317aa0 fffff612`175d474d     : ffffe08e`88c07080 ffffe08e`88c07080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
fffff30a`9f317ad0 fffff806`134058b8     : ffffe08e`00000005 00000000`00000005 0000026f`078041b0 00000000`000016a0 : win32k!NtUserCallNoParam+0x15
fffff30a`9f317b00 00007ffe`d68e10e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`65a3f888 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d68e10e4


SYMBOL_NAME:  win32kbase!LegacyInputDispatcher::WaitAndDispatch+88

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  88

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_win32kbase!LegacyInputDispatcher::WaitAndDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ec713815-b628-d3b4-9812-1937faa1c4d7}

Followup:     MachineOwner
---------
Ekleme yapacaktım kalmış öyle. :D

Siz tamamlamışsınız teşekkürler. :)
@uzunkege sorun ne durumda?
 
Memtest86 hariç hepsini yaptım ama sorun hala devam ediyor. Memtest86 biraz gözümü korkuttu şahsen yapabilir miyim bilmem.
Ekleme yapacaktım kalmış öyle. :D.

Siz tamamlamışsınız teşekkürler. :)
@uzunkege sorun ne durumda?

Bütün maddeleri yaptım.
Memtest86 yapmadım ama Windows'un kendi RAM testini yaptım:
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
RAM'lerde bir sorun çıkmadı ama daha bugün mavi ekran verdi hata ise "kmode_exception_not_handled" diye bir sorundu.umarım çözümü bilen vardır, olup olmadık mavi ekran veriyor.
 
BIOS güncel değil güncelleyin:

ASUS, RGB yazılımlarını, Vanguard, ryzenmaster kaldır.

DDU rehberini uygulayıp güncel GPU sürücünü yükle. Ses sürücünü güncelle.
USB girişlerinde sadece klavye ve fare takılı olacak şekilde diğer USB cihazlarını çıkartın.

Bilgisayara format attım ve BIOS'u güncelledim.
ASUS'un al Suite3 programını kurdum çünkü program fan hızını ayarlama ve daha birçok şey yapmamı sağlıyor.
USB girişlerinde ise klavye mouse ve kulaklıım var başka hiçbir şey yok.
Bilgisayarı formatladığımdan en güncel sürücüyü kurdum, ses sürücülerim güncel.
BIOS'u güncellemek sanırım sorunu çözdü eğer sorunu tekrar yaşarsam güncel minidump dosyalarıyla yazacağım tekrardan. Teşekkürler.
 

Yeni konular

Geri
Yukarı