Çözüldü Mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10

Muhammed Akif

Hectopat
Katılım
8 Aralık 2019
Mesajlar
271
Çözümler
10
Yer
Hatay
Daha fazla  
Sistem Özellikleri
RAM: 16GB DDR4-3200 SO-DIMM
SSD veya HDD modeli: Samsung 990 PRO M.2 NVMe SSD (MZ-V9P2T0BW), 2 TB
Ekran Kartı: NVIDIA® GeForce RTX™ 3050 Laptop GPU 4GB
Anakart: ASUSTeK COMPUTER INC. G513IC PCI-Express 3.0
İşlemci: AMD Ryzen™ 7 4800H (8C/16T, 12MB Cache, 4.2 GHz)
Cinsiyet
Erkek
Merhaba. Twitch yayın sırasında mavi ekran hatası aldım. Oyun sırasında bilgisayar dondu ve mavi ekran verdi. Bilgisayar yeniden başlamadı veya kapanmadı. Birkaç dakika takılmadan sonra tekrar normale döndü. mavi ekran analizi yapıp bana hatanın bir yazılımdan mı yoksa donanım kaynaklı mı olduğunu ve nasıl çözebileceğimi belirtirseniz sevinirim. Şimdiden teşekkürler.

Dosya : 022421-15140-01.dmp
 
Çözüm
1) DDU ile ses sürücünüzü kaldırın ve sonrasında aşağıdan indireceğiniz ses sürücüsünü kurun.


2) BIOS sürümünüzü yükseltin. Ona da aşağıdan erişebilirsiniz.


Şimdilik bunlar yeter. Olur da farklı sürücüleri indirmek isterseniz linki de aşağıya bırakıyorum.


[CODE title="Dökümler"]Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\Downloads\022421-15140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff807`70e00000 PsLoadedModuleList = 0xfffff807`71a2a390
Debug session time: Wed Feb 24 20:51:49.052 2021 (UTC + 3:00)
System Uptime: 8 days 17:27:41.086
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
*** WARNING: Unable to verify timestamp for rt640x64.sys
rt640x64+0x24e26:
fffff808`03cf4e26 4d8b27 mov r12,qword ptr [r15] ds:002b:00060080`01000000=????????????????
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80803cf4e26, The address that the exception occurred at
Arg3: ffff970703a4ef88, Exception Record Address
Arg4: fffff80776073920, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 6358

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5QPUIS0

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 10774

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject

Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1

Key : Dump.Attributes.RequiredDumpfileSize
Value: 0x6425b41d


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80803cf4e26

BUGCHECK_P3: ffff970703a4ef88

BUGCHECK_P4: fffff80776073920

EXCEPTION_RECORD: ffff970703a4ef88 -- (.exr 0xffff970703a4ef88)
ExceptionAddress: fffff80803cf4e26 (rt640x64+0x0000000000024e26)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: fffff80776073920 -- (.cxr 0xfffff80776073920)
rax=ffffcf08f7e3ad48 rbx=ffffcf08f8047000 rcx=ffffcf08f7e3add0
rdx=0000000000000000 rsi=ffffcf090fc5a780 rdi=ffffcf08f7e3ad48
rip=fffff80803cf4e26 rsp=ffff970703a4f1c0 rbp=ffff970703a4f220
r8=0000000000000001 r9=ffffcf08ddede0a8 r10=fffff80803dddac0
r11=ffffcf08ddede09a r12=0000000000000000 r13=fffff80803ddc000
r14=0000000000000000 r15=0006008001000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
rt640x64+0x24e26:
fffff808`03cf4e26 4d8b27 mov r12,qword ptr [r15] ds:002b:00060080`01000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff80771afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80771a0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80771a0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffff9707`03a4f1c0 ffffcf08`f8047000 : ffffcf08`f2afbf10 ffffcf09`0fc5a780 ffff9707`03a4f220 ffffcf08`f8277bc0 : rt640x64+0x24e26
ffff9707`03a4f1c8 ffffcf08`f2afbf10 : ffffcf09`0fc5a780 ffff9707`03a4f220 ffffcf08`f8277bc0 ffffcf08`00000328 : 0xffffcf08`f8047000
ffff9707`03a4f1d0 ffffcf09`0fc5a780 : ffff9707`03a4f220 ffffcf08`f8277bc0 ffffcf08`00000328 00000000`00000000 : 0xffffcf08`f2afbf10
ffff9707`03a4f1d8 ffff9707`03a4f220 : ffffcf08`f8277bc0 ffffcf08`00000328 00000000`00000000 00000103`a0000000 : 0xffffcf09`0fc5a780
ffff9707`03a4f1e0 ffffcf08`f8277bc0 : ffffcf08`00000328 00000000`00000000 00000103`a0000000 00000014`00000001 : 0xffff9707`03a4f220
ffff9707`03a4f1e8 ffffcf08`00000328 : 00000000`00000000 00000103`a0000000 00000014`00000001 00000000`00000000 : 0xffffcf08`f8277bc0
ffff9707`03a4f1f0 00000000`00000000 : 00000103`a0000000 00000014`00000001 00000000`00000000 00000000`00000019 : 0xffffcf08`00000328


SYMBOL_NAME: rt640x64+24e26

MODULE_NAME: rt640x64

IMAGE_NAME: rt640x64.sys

STACK_COMMAND: .cxr 0xfffff80776073920 ; kb

BUCKET_ID_FUNC_OFFSET: 24e26

FAILURE_BUCKET_ID: AV_rt640x64!unknown_function

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2e96e72d-48ac-dceb-22bd-11e71513e43e}

Followup: MachineOwner
---------[/CODE]
1) DDU ile ses sürücünüzü kaldırın ve sonrasında aşağıdan indireceğiniz ses sürücüsünü kurun.


2) BIOS sürümünüzü yükseltin. Ona da aşağıdan erişebilirsiniz.


Şimdilik bunlar yeter. Olur da farklı sürücüleri indirmek isterseniz linki de aşağıya bırakıyorum.


[CODE title="Dökümler"]Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\Downloads\022421-15140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff807`70e00000 PsLoadedModuleList = 0xfffff807`71a2a390
Debug session time: Wed Feb 24 20:51:49.052 2021 (UTC + 3:00)
System Uptime: 8 days 17:27:41.086
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
*** WARNING: Unable to verify timestamp for rt640x64.sys
rt640x64+0x24e26:
fffff808`03cf4e26 4d8b27 mov r12,qword ptr [r15] ds:002b:00060080`01000000=????????????????
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80803cf4e26, The address that the exception occurred at
Arg3: ffff970703a4ef88, Exception Record Address
Arg4: fffff80776073920, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 6358

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5QPUIS0

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 10774

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject

Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1

Key : Dump.Attributes.RequiredDumpfileSize
Value: 0x6425b41d


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80803cf4e26

BUGCHECK_P3: ffff970703a4ef88

BUGCHECK_P4: fffff80776073920

EXCEPTION_RECORD: ffff970703a4ef88 -- (.exr 0xffff970703a4ef88)
ExceptionAddress: fffff80803cf4e26 (rt640x64+0x0000000000024e26)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: fffff80776073920 -- (.cxr 0xfffff80776073920)
rax=ffffcf08f7e3ad48 rbx=ffffcf08f8047000 rcx=ffffcf08f7e3add0
rdx=0000000000000000 rsi=ffffcf090fc5a780 rdi=ffffcf08f7e3ad48
rip=fffff80803cf4e26 rsp=ffff970703a4f1c0 rbp=ffff970703a4f220
r8=0000000000000001 r9=ffffcf08ddede0a8 r10=fffff80803dddac0
r11=ffffcf08ddede09a r12=0000000000000000 r13=fffff80803ddc000
r14=0000000000000000 r15=0006008001000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
rt640x64+0x24e26:
fffff808`03cf4e26 4d8b27 mov r12,qword ptr [r15] ds:002b:00060080`01000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff80771afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80771a0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80771a0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffff9707`03a4f1c0 ffffcf08`f8047000 : ffffcf08`f2afbf10 ffffcf09`0fc5a780 ffff9707`03a4f220 ffffcf08`f8277bc0 : rt640x64+0x24e26
ffff9707`03a4f1c8 ffffcf08`f2afbf10 : ffffcf09`0fc5a780 ffff9707`03a4f220 ffffcf08`f8277bc0 ffffcf08`00000328 : 0xffffcf08`f8047000
ffff9707`03a4f1d0 ffffcf09`0fc5a780 : ffff9707`03a4f220 ffffcf08`f8277bc0 ffffcf08`00000328 00000000`00000000 : 0xffffcf08`f2afbf10
ffff9707`03a4f1d8 ffff9707`03a4f220 : ffffcf08`f8277bc0 ffffcf08`00000328 00000000`00000000 00000103`a0000000 : 0xffffcf09`0fc5a780
ffff9707`03a4f1e0 ffffcf08`f8277bc0 : ffffcf08`00000328 00000000`00000000 00000103`a0000000 00000014`00000001 : 0xffff9707`03a4f220
ffff9707`03a4f1e8 ffffcf08`00000328 : 00000000`00000000 00000103`a0000000 00000014`00000001 00000000`00000000 : 0xffffcf08`f8277bc0
ffff9707`03a4f1f0 00000000`00000000 : 00000103`a0000000 00000014`00000001 00000000`00000000 00000000`00000019 : 0xffffcf08`00000328


SYMBOL_NAME: rt640x64+24e26

MODULE_NAME: rt640x64

IMAGE_NAME: rt640x64.sys

STACK_COMMAND: .cxr 0xfffff80776073920 ; kb

BUCKET_ID_FUNC_OFFSET: 24e26

FAILURE_BUCKET_ID: AV_rt640x64!unknown_function

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2e96e72d-48ac-dceb-22bd-11e71513e43e}

Followup: MachineOwner
---------[/CODE]
 
Çözüm
1) DDU ile ses sürücünüzü kaldırın ve sonrasında aşağıdan indireceğiniz ses sürücüsünü kurun.


2) BIOS sürümünüzü yükseltin. Ona da aşağıdan erişebilirsiniz.


Şimdilik bunlar yeter. Olur da farklı sürücüleri indirmek isterseniz linki de aşağıya bırakıyorum.


[CODE title="Dökümler"]Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\Downloads\022421-15140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff807`70e00000 PsLoadedModuleList = 0xfffff807`71a2a390
Debug session time: Wed Feb 24 20:51:49.052 2021 (UTC + 3:00)
System Uptime: 8 days 17:27:41.086
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
*** WARNING: Unable to verify timestamp for rt640x64.sys
rt640x64+0x24e26:
fffff808`03cf4e26 4d8b27 mov r12,qword ptr [r15] ds:002b:00060080`01000000=????????????????
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80803cf4e26, The address that the exception occurred at
Arg3: ffff970703a4ef88, Exception Record Address
Arg4: fffff80776073920, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 6358

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5QPUIS0

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 10774

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject

Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1

Key : Dump.Attributes.RequiredDumpfileSize
Value: 0x6425b41d


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80803cf4e26

BUGCHECK_P3: ffff970703a4ef88

BUGCHECK_P4: fffff80776073920

EXCEPTION_RECORD: ffff970703a4ef88 -- (.exr 0xffff970703a4ef88)
ExceptionAddress: fffff80803cf4e26 (rt640x64+0x0000000000024e26)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: fffff80776073920 -- (.cxr 0xfffff80776073920)
rax=ffffcf08f7e3ad48 rbx=ffffcf08f8047000 rcx=ffffcf08f7e3add0
rdx=0000000000000000 rsi=ffffcf090fc5a780 rdi=ffffcf08f7e3ad48
rip=fffff80803cf4e26 rsp=ffff970703a4f1c0 rbp=ffff970703a4f220
r8=0000000000000001 r9=ffffcf08ddede0a8 r10=fffff80803dddac0
r11=ffffcf08ddede09a r12=0000000000000000 r13=fffff80803ddc000
r14=0000000000000000 r15=0006008001000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
rt640x64+0x24e26:
fffff808`03cf4e26 4d8b27 mov r12,qword ptr [r15] ds:002b:00060080`01000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff80771afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80771a0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80771a0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffff9707`03a4f1c0 ffffcf08`f8047000 : ffffcf08`f2afbf10 ffffcf09`0fc5a780 ffff9707`03a4f220 ffffcf08`f8277bc0 : rt640x64+0x24e26
ffff9707`03a4f1c8 ffffcf08`f2afbf10 : ffffcf09`0fc5a780 ffff9707`03a4f220 ffffcf08`f8277bc0 ffffcf08`00000328 : 0xffffcf08`f8047000
ffff9707`03a4f1d0 ffffcf09`0fc5a780 : ffff9707`03a4f220 ffffcf08`f8277bc0 ffffcf08`00000328 00000000`00000000 : 0xffffcf08`f2afbf10
ffff9707`03a4f1d8 ffff9707`03a4f220 : ffffcf08`f8277bc0 ffffcf08`00000328 00000000`00000000 00000103`a0000000 : 0xffffcf09`0fc5a780
ffff9707`03a4f1e0 ffffcf08`f8277bc0 : ffffcf08`00000328 00000000`00000000 00000103`a0000000 00000014`00000001 : 0xffff9707`03a4f220
ffff9707`03a4f1e8 ffffcf08`00000328 : 00000000`00000000 00000103`a0000000 00000014`00000001 00000000`00000000 : 0xffffcf08`f8277bc0
ffff9707`03a4f1f0 00000000`00000000 : 00000103`a0000000 00000014`00000001 00000000`00000000 00000000`00000019 : 0xffffcf08`00000328


SYMBOL_NAME: rt640x64+24e26

MODULE_NAME: rt640x64

IMAGE_NAME: rt640x64.sys

STACK_COMMAND: .cxr 0xfffff80776073920 ; kb

BUCKET_ID_FUNC_OFFSET: 24e26

FAILURE_BUCKET_ID: AV_rt640x64!unknown_function

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2e96e72d-48ac-dceb-22bd-11e71513e43e}

Followup: MachineOwner
---------[/CODE]
Verdiğin linkler herhangi bir önizleme göstermeden direkt inmeye başlıyor. Herhangi bir tehdit var mı linklerde?
 
Fark ettiyseniz HP'nin sayfasından. İsterseniz en altta verdiğim linkteki dosya linkleri ile karşılaştırın yine aynı olduklarını göreceksiniz. :)
 
Fark ettiyseniz HP'nin sayfasından. İsterseniz en altta verdiğim linkteki dosya linkleri ile karşılaştırın yine aynı olduklarını göreceksiniz. :)

Hmm görmedim onu :D Programı indirip deneyeceğim. BIOS güncel mi bilmiyorum. Kontrol edip güncel değilse onu da güncellerim. Daha sonra konuyu çözüldü olarak işaretlerim sorun çıkmazsa. Sağ ol yardımların için.
 

Geri
Yukarı