Bilgisayarın Olay Görüntüleyicisini aç, orada sorunun kodu yazıyordur, paylaşırmısın?
Ekran kartı Driver'i sorunlu olabilir ya da güvenli moddan açmayı dene açıldıktan sonra normal açmayı dene.
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd20f00eff978, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8001577193f, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffd20f00eff978
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8001577193f
READ_ADDRESS: fffff80012b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffd20f00eff978
CURRENT_IRQL: 2
FAULTING_IP:
iorate!IoRateDeviceExtensionSoftCapProcess+c3
fffff800`1577193f 48391b cmp qword ptr [rbx],rbx
CPU_COUNT: 4
CPU_MHZ: 9c4
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 17
CPU_STEPPING: a
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: PAGE_NOT_ZERO_AV
BUGCHECK_STR: AV
PROCESS_NAME: makecab.exe
BAD_PAGES_DETECTED: 1
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 06-25-2020 20:50:13.0060
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
DPC_STACK_BASE: FFFFF80015A6EFB0
TRAP_FRAME: fffff80015a6e1d0 -- (.trap 0xfffff80015a6e1d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80015a6e3a8 rbx=0000000000000000 rcx=ffffd20fd6f0eb20
rdx=fffff80015a6e3d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001577193f rsp=fffff80015a6e360 rbp=ffffd20fd6f0eb20
r8=0000000000000000 r9=00000000ffffc000 r10=ffffd20fdb261080
r11=fffff80015a6e350 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
iorate!IoRateDeviceExtensionSoftCapProcess+0xc3:
fffff800`1577193f 48391b cmp qword ptr [rbx],rbx ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800127d41e9 to fffff800127c2390
STACK_TEXT:
fffff800`15a6e088 fffff800`127d41e9 : 00000000`0000000a ffffd20f`00eff978 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`15a6e090 fffff800`127d0529 : 00000000`00000003 00000000`28673ca2 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`15a6e1d0 fffff800`1577193f : 00000000`00000000 00000000`00000000 fffff800`15a6e410 fffff800`126c1725 : nt!KiPageFault+0x469
fffff800`15a6e360 fffff800`1577434c : ffffd20f`df04d2a0 fffff800`15a6e4e9 ffffd20f`d6f0e9d0 00000000`00000001 : iorate!IoRateDeviceExtensionSoftCapProcess+0xc3
fffff800`15a6e3b0 fffff800`15775160 : fffff800`15a6f000 fffff800`15a69000 ffffd20f`d6f0eb20 ffffd20f`d6f3d030 : iorate!IoRateOutstandingCountDecrement+0xa8
fffff800`15a6e410 fffff800`12720099 : ffffd20f`df04d2a0 ffffd20f`df04d2a0 ffffd20f`df04d2a0 00000001`af929ac5 : iorate!IoRateReadWriteCompletion+0x30
fffff800`15a6e440 fffff800`1271ff67 : ffffd20f`d6f09060 ffffd20f`d6f09101 ffffd20f`df04d2a0 ffffd20f`df04d490 : nt!IopfCompleteRequest+0x119
fffff800`15a6e550 fffff800`157d6e40 : 00000000`00000000 ffffd20f`dcbae350 fffff800`15a6e680 ffffd20f`dcbae350 : nt!IofCompleteRequest+0x17
fffff800`15a6e580 fffff800`12720099 : ffffd20f`e08f3423 fffff800`130dbc8d ffffd20f`d6c48ca0 ffffd20f`e1618ed0 : CLASSPNP!TransferPktComplete+0x640
fffff800`15a6e780 fffff800`1271ff67 : 00000000`00000000 ffffd20f`d6c68601 ffffd20f`db1a2500 ffffd20f`d6c461a0 : nt!IopfCompleteRequest+0x119
fffff800`15a6e890 fffff800`14bf169e : ffffd20f`db1a2500 ffffd20f`d6c68680 ffffd20f`d6c461a0 ffffd20f`d6f89060 : nt!IofCompleteRequest+0x17
fffff800`15a6e8c0 fffff800`14bf4265 : ffffd20f`db1a2500 fffff800`15a6ea50 00000000`00000000 ffffd20f`d6c68680 : ataport!IdeCommonCrbCompletion+0xae
fffff800`15a6e8f0 fffff800`14bf3df9 : ffffd20f`d6c461a0 fffff800`14bf5390 ffffd20f`d6c461a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x425
fffff800`15a6eb30 fffff800`126c115a : ffffd20f`d6c46118 ffffd20f`d6c461a0 fffff800`0ef17180 00000000`00000000 : ataport!IdePortCompletionDpc+0x289
fffff800`15a6ec40 fffff800`126c07af : 00000000`00000014 00000000`00989680 00000000`00006bde 00000000`000000f6 : nt!KiExecuteAllDpcs+0x30a
fffff800`15a6ed80 fffff800`127c9395 : 00000000`00000000 fffff800`0ef17180 ffffc080`103b6b40 00000000`00008000 : nt!KiRetireDpcList+0x1ef
fffff800`15a6efb0 fffff800`127c9180 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffb203`f9de9bc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
THREAD_SHA1_HASH_MOD_FUNC: 3d24de82c0150b4bde2fde06327ad9c741db5e2a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d7d28d5a975e185d5cd83ff3571bb2f4f67d3ffd
THREAD_SHA1_HASH_MOD: 3370a3bc988bb1e947c9c60a9e4ff15e789e6de3
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID: PAGE_NOT_ZERO_AV
PRIMARY_PROBLEM_CLASS: PAGE_NOT_ZERO_AV
FAILURE_BUCKET_ID: PAGE_NOT_ZERO_AV
TARGET_TIME: 2020-06-09T15:19:51.000Z
OSBUILD: 18362
OSSERVICEPACK: 836
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2331
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:page_not_zero_av
FAILURE_ID_HASH: {91fefd05-7a2b-5d37-e27f-7af624353ffc}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff48086b09780, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff48086b096d8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: fffff48086b09780
BUGCHECK_P3: fffff48086b096d8
BUGCHECK_P4: 0
TRAP_FRAME: fffff48086b09780 -- (.trap 0xfffff48086b09780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb40f1da941a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff9f8100c40180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80046863ada rsp=fffff48086b09910 rbp=000000073f6d49d7
r8=0000000000000000 r9=fffff8004625a800 r10=ffff9f8100c40180
r11=fffff80046600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiInsertTimerTable+0x14d78a:
fffff800`46863ada cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff48086b096d8 -- (.exr 0xfffff48086b096d8)
ExceptionAddress: fffff80046863ada (nt!KiInsertTimerTable+0x000000000014d78a)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 4
CPU_MHZ: 9c4
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 17
CPU_STEPPING: a
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 06-25-2020 20:50:10.0836
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff800467d41e9 to fffff800467c2390
STACK_TEXT:
fffff480`86b09458 fffff800`467d41e9 : 00000000`00000139 00000000`00000003 fffff480`86b09780 fffff480`86b096d8 : nt!KeBugCheckEx
fffff480`86b09460 fffff800`467d4610 : ffffb40f`19303000 fffff800`46680048 fffff480`86b09828 ffffffff`fffffed8 : nt!KiBugCheckDispatch+0x69
fffff480`86b095a0 fffff800`467d29a3 : 00000000`00000000 00000000`00000001 00000000`00010008 fffff802`647ca134 : nt!KiFastFailDispatch+0xd0
fffff480`86b09780 fffff800`46863ada : 00000000`00000105 00000000`00000000 ffffb40f`00a000d0 fffff800`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff480`86b09910 fffff800`466a1b07 : 00000000`00000000 00000000`00000000 00000000`00000103 00000000`00000000 : nt!KiInsertTimerTable+0x14d78a
fffff480`86b09990 fffff800`466a1663 : 00000007`3c8950f4 fffff480`86b09ba0 00000000`00000000 00000000`000003e8 : nt!ExpSetTimerObject+0x3d7
fffff480`86b09b30 fffff800`467d3c15 : 00000000`00000200 ffffb40f`19e60080 00000000`000003e8 00000000`00000000 : nt!NtSetTimerEx+0x1b3
fffff480`86b09c00 00007ffc`cee3f584 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000f1`38a7f2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`cee3f584
THREAD_SHA1_HASH_MOD_FUNC: f5ea004d9d77e345b061e535bc6f3794776a8a15
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f1b31cca6318091f49763f06a6ae0780e44a857c
THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8
FOLLOWUP_IP:
nt!KiInsertTimerTable+14d78a
fffff800`46863ada cd29 int 29h
FAULT_INSTR_CODE: b34129cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!KiInsertTimerTable+14d78a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.836
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14d78a
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable
TARGET_TIME: 2020-06-09T12:26:41.000Z
OSBUILD: 18362
OSSERVICEPACK: 836
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 38f6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiinserttimertable
FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8077e76488a, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 1
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8077e76488a
WORKER_ROUTINE:
+0
00000000`00000001 ?? ???
WORK_ITEM: fffff8077e76488a
CURRENT_IRQL: 2
CPU_COUNT: 4
CPU_MHZ: 9c4
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 17
CPU_STEPPING: a
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 06-25-2020 20:50:08.0545
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffff8077f6674b0 -- (.trap 0xfffff8077f6674b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffff8077e77e080
rdx=ffffa0028207b408 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077e76488a rsp=fffff8077f667640 rbp=0000000000000000
r8=ffffa00282918510 r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ataport!PortAvioSchedulerTransferBatch+0x12a:
fffff807`7e76488a 01470c add dword ptr [rdi+0Ch],eax ds:00000000`0000000c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8077afd41e9 to fffff8077afc2390
STACK_TEXT:
fffff807`7f667368 fffff807`7afd41e9 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff807`7f667370 fffff807`7afd0529 : ffffa002`82060ca0 fffff807`7b926180 ffffa002`7f6a5f30 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`7f6674b0 fffff807`7e76488a : 00000000`00000000 ffffa002`8205e1a0 fffff807`7f667800 ffffa002`82918010 : nt!KiPageFault+0x469
fffff807`7f667640 fffff807`7e764451 : ffffa002`8207b3d0 fffff807`7f667800 00000000`00000000 ffffa002`8207b1b0 : ataport!PortAvioSchedulerTransferBatch+0x12a
fffff807`7f6676a0 fffff807`7e763df9 : ffffa002`8205e1a0 fffff807`7e765390 ffffa002`8205e1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x611
fffff807`7f6678e0 fffff807`7aec115a : ffffa002`8205e118 ffffa002`8205e1a0 fffff807`78a77180 00000000`00000000 : ataport!IdePortCompletionDpc+0x289
fffff807`7f6679f0 fffff807`7aec07af : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x30a
fffff807`7f667b30 fffff807`7afc5ebe : 00000000`00000000 fffff807`78a77180 fffff807`7b391400 ffffa002`82ba7080 : nt!KiRetireDpcList+0x1ef
fffff807`7f667d60 00000000`00000000 : fffff807`7f668000 fffff807`7f662000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e
THREAD_SHA1_HASH_MOD_FUNC: e766aeb5752d36b878358165f7d518bfe3b5e288
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 44c9c87aad11c4ae562ae187cc729b62c27b2266
THREAD_SHA1_HASH_MOD: 392d43557a93e9b74fe107a55959285095ea24cf
FOLLOWUP_IP:
ataport!PortAvioSchedulerTransferBatch+12a
fffff807`7e76488a 01470c add dword ptr [rdi+0Ch],eax
FAULT_INSTR_CODE: 2b0c4701
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ataport!PortAvioSchedulerTransferBatch+12a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4b09873d
IMAGE_VERSION: 10.0.18362.693
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12a
FAILURE_BUCKET_ID: AV_ataport!PortAvioSchedulerTransferBatch
BUCKET_ID: AV_ataport!PortAvioSchedulerTransferBatch
PRIMARY_PROBLEM_CLASS: AV_ataport!PortAvioSchedulerTransferBatch
TARGET_TIME: 2020-06-02T12:03:06.000Z
OSBUILD: 18362
OSSERVICEPACK: 836
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2e66
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_ataport!portavioschedulertransferbatch
FAILURE_ID_HASH: {c662dd93-73bc-f08c-00fe-58f3aec1b900}
Followup: MachineOwner
---------
Şöyle ki, ekranın en alt sol tarafında windows penceresinin yanında arama çubuğu olur, Başlat menüsü varya orası işte, ona tıkla "Olay Görüntüleyicisi" yaz. Çıkacaktır saten, tıkla yada Enetr yap. karşına çıkan ekranda "Yönetim Olaylarının Özeti" yazan kısımın altında olay kodu ve sorunun nereden kaynaklandığını belirten bir kod mevcuttur.Beni biraz yönlendirirseniz sevinirim.
Kaspersky kaldır, Memtest86 ile RAM testi yap.
Kod:DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffd20f00eff978, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8001577193f, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffffd20f00eff978 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8001577193f READ_ADDRESS: fffff80012b733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffffd20f00eff978 CURRENT_IRQL: 2 FAULTING_IP: iorate!IoRateDeviceExtensionSoftCapProcess+c3 fffff800`1577193f 48391b cmp qword ptr [rbx],rbx CPU_COUNT: 4 CPU_MHZ: 9c4 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 17 CPU_STEPPING: a CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: PAGE_NOT_ZERO_AV BUGCHECK_STR: AV PROCESS_NAME: makecab.exe BAD_PAGES_DETECTED: 1 ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD ANALYSIS_SESSION_TIME: 06-25-2020 20:50:13.0060 ANALYSIS_VERSION: 10.0.18362.1 amd64fre DPC_STACK_BASE: FFFFF80015A6EFB0 TRAP_FRAME: fffff80015a6e1d0 -- (.trap 0xfffff80015a6e1d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff80015a6e3a8 rbx=0000000000000000 rcx=ffffd20fd6f0eb20 rdx=fffff80015a6e3d0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8001577193f rsp=fffff80015a6e360 rbp=ffffd20fd6f0eb20 r8=0000000000000000 r9=00000000ffffc000 r10=ffffd20fdb261080 r11=fffff80015a6e350 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc iorate!IoRateDeviceExtensionSoftCapProcess+0xc3: fffff800`1577193f 48391b cmp qword ptr [rbx],rbx ds:00000000`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800127d41e9 to fffff800127c2390 STACK_TEXT: fffff800`15a6e088 fffff800`127d41e9 : 00000000`0000000a ffffd20f`00eff978 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`15a6e090 fffff800`127d0529 : 00000000`00000003 00000000`28673ca2 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff800`15a6e1d0 fffff800`1577193f : 00000000`00000000 00000000`00000000 fffff800`15a6e410 fffff800`126c1725 : nt!KiPageFault+0x469 fffff800`15a6e360 fffff800`1577434c : ffffd20f`df04d2a0 fffff800`15a6e4e9 ffffd20f`d6f0e9d0 00000000`00000001 : iorate!IoRateDeviceExtensionSoftCapProcess+0xc3 fffff800`15a6e3b0 fffff800`15775160 : fffff800`15a6f000 fffff800`15a69000 ffffd20f`d6f0eb20 ffffd20f`d6f3d030 : iorate!IoRateOutstandingCountDecrement+0xa8 fffff800`15a6e410 fffff800`12720099 : ffffd20f`df04d2a0 ffffd20f`df04d2a0 ffffd20f`df04d2a0 00000001`af929ac5 : iorate!IoRateReadWriteCompletion+0x30 fffff800`15a6e440 fffff800`1271ff67 : ffffd20f`d6f09060 ffffd20f`d6f09101 ffffd20f`df04d2a0 ffffd20f`df04d490 : nt!IopfCompleteRequest+0x119 fffff800`15a6e550 fffff800`157d6e40 : 00000000`00000000 ffffd20f`dcbae350 fffff800`15a6e680 ffffd20f`dcbae350 : nt!IofCompleteRequest+0x17 fffff800`15a6e580 fffff800`12720099 : ffffd20f`e08f3423 fffff800`130dbc8d ffffd20f`d6c48ca0 ffffd20f`e1618ed0 : CLASSPNP!TransferPktComplete+0x640 fffff800`15a6e780 fffff800`1271ff67 : 00000000`00000000 ffffd20f`d6c68601 ffffd20f`db1a2500 ffffd20f`d6c461a0 : nt!IopfCompleteRequest+0x119 fffff800`15a6e890 fffff800`14bf169e : ffffd20f`db1a2500 ffffd20f`d6c68680 ffffd20f`d6c461a0 ffffd20f`d6f89060 : nt!IofCompleteRequest+0x17 fffff800`15a6e8c0 fffff800`14bf4265 : ffffd20f`db1a2500 fffff800`15a6ea50 00000000`00000000 ffffd20f`d6c68680 : ataport!IdeCommonCrbCompletion+0xae fffff800`15a6e8f0 fffff800`14bf3df9 : ffffd20f`d6c461a0 fffff800`14bf5390 ffffd20f`d6c461a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x425 fffff800`15a6eb30 fffff800`126c115a : ffffd20f`d6c46118 ffffd20f`d6c461a0 fffff800`0ef17180 00000000`00000000 : ataport!IdePortCompletionDpc+0x289 fffff800`15a6ec40 fffff800`126c07af : 00000000`00000014 00000000`00989680 00000000`00006bde 00000000`000000f6 : nt!KiExecuteAllDpcs+0x30a fffff800`15a6ed80 fffff800`127c9395 : 00000000`00000000 fffff800`0ef17180 ffffc080`103b6b40 00000000`00008000 : nt!KiRetireDpcList+0x1ef fffff800`15a6efb0 fffff800`127c9180 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5 ffffb203`f9de9bc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue THREAD_SHA1_HASH_MOD_FUNC: 3d24de82c0150b4bde2fde06327ad9c741db5e2a THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d7d28d5a975e185d5cd83ff3571bb2f4f67d3ffd THREAD_SHA1_HASH_MOD: 3370a3bc988bb1e947c9c60a9e4ff15e789e6de3 SYMBOL_NAME: PAGE_NOT_ZERO FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID: PAGE_NOT_ZERO_AV PRIMARY_PROBLEM_CLASS: PAGE_NOT_ZERO_AV FAILURE_BUCKET_ID: PAGE_NOT_ZERO_AV TARGET_TIME: 2020-06-09T15:19:51.000Z OSBUILD: 18362 OSSERVICEPACK: 836 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 2331 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:page_not_zero_av FAILURE_ID_HASH: {91fefd05-7a2b-5d37-e27f-7af624353ffc} Followup: MachineOwner ---------Kod:KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: fffff48086b09780, Address of the trap frame for the exception that caused the bugcheck Arg3: fffff48086b096d8, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 3 BUGCHECK_P2: fffff48086b09780 BUGCHECK_P3: fffff48086b096d8 BUGCHECK_P4: 0 TRAP_FRAME: fffff48086b09780 -- (.trap 0xfffff48086b09780) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffb40f1da941a0 rbx=0000000000000000 rcx=0000000000000003 rdx=ffff9f8100c40180 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80046863ada rsp=fffff48086b09910 rbp=000000073f6d49d7 r8=0000000000000000 r9=fffff8004625a800 r10=ffff9f8100c40180 r11=fffff80046600000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po cy nt!KiInsertTimerTable+0x14d78a: fffff800`46863ada cd29 int 29h Resetting default scope EXCEPTION_RECORD: fffff48086b096d8 -- (.exr 0xfffff48086b096d8) ExceptionAddress: fffff80046863ada (nt!KiInsertTimerTable+0x000000000014d78a) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000003 Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY CPU_COUNT: 4 CPU_MHZ: 9c4 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 17 CPU_STEPPING: a CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x139 PROCESS_NAME: dwm.exe CURRENT_IRQL: 2 DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000003 ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD ANALYSIS_SESSION_TIME: 06-25-2020 20:50:10.0836 ANALYSIS_VERSION: 10.0.18362.1 amd64fre LAST_CONTROL_TRANSFER: from fffff800467d41e9 to fffff800467c2390 STACK_TEXT: fffff480`86b09458 fffff800`467d41e9 : 00000000`00000139 00000000`00000003 fffff480`86b09780 fffff480`86b096d8 : nt!KeBugCheckEx fffff480`86b09460 fffff800`467d4610 : ffffb40f`19303000 fffff800`46680048 fffff480`86b09828 ffffffff`fffffed8 : nt!KiBugCheckDispatch+0x69 fffff480`86b095a0 fffff800`467d29a3 : 00000000`00000000 00000000`00000001 00000000`00010008 fffff802`647ca134 : nt!KiFastFailDispatch+0xd0 fffff480`86b09780 fffff800`46863ada : 00000000`00000105 00000000`00000000 ffffb40f`00a000d0 fffff800`00000000 : nt!KiRaiseSecurityCheckFailure+0x323 fffff480`86b09910 fffff800`466a1b07 : 00000000`00000000 00000000`00000000 00000000`00000103 00000000`00000000 : nt!KiInsertTimerTable+0x14d78a fffff480`86b09990 fffff800`466a1663 : 00000007`3c8950f4 fffff480`86b09ba0 00000000`00000000 00000000`000003e8 : nt!ExpSetTimerObject+0x3d7 fffff480`86b09b30 fffff800`467d3c15 : 00000000`00000200 ffffb40f`19e60080 00000000`000003e8 00000000`00000000 : nt!NtSetTimerEx+0x1b3 fffff480`86b09c00 00007ffc`cee3f584 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 000000f1`38a7f2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`cee3f584 THREAD_SHA1_HASH_MOD_FUNC: f5ea004d9d77e345b061e535bc6f3794776a8a15 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f1b31cca6318091f49763f06a6ae0780e44a857c THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8 FOLLOWUP_IP: nt!KiInsertTimerTable+14d78a fffff800`46863ada cd29 int 29h FAULT_INSTR_CODE: b34129cd SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: nt!KiInsertTimerTable+14d78a FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.836 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 14d78a FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable TARGET_TIME: 2020-06-09T12:26:41.000Z OSBUILD: 18362 OSSERVICEPACK: 836 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 38f6 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiinserttimertable FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850} Followup: MachineOwner ---------Kod:DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000001, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff8077e76488a, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 1 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff8077e76488a WORKER_ROUTINE: +0 00000000`00000001 ?? ??? WORK_ITEM: fffff8077e76488a CURRENT_IRQL: 2 CPU_COUNT: 4 CPU_MHZ: 9c4 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 17 CPU_STEPPING: a CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD ANALYSIS_SESSION_TIME: 06-25-2020 20:50:08.0545 ANALYSIS_VERSION: 10.0.18362.1 amd64fre TRAP_FRAME: fffff8077f6674b0 -- (.trap 0xfffff8077f6674b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=fffff8077e77e080 rdx=ffffa0028207b408 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8077e76488a rsp=fffff8077f667640 rbp=0000000000000000 r8=ffffa00282918510 r9=0000000000000000 r10=0000000000000001 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc ataport!PortAvioSchedulerTransferBatch+0x12a: fffff807`7e76488a 01470c add dword ptr [rdi+0Ch],eax ds:00000000`0000000c=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8077afd41e9 to fffff8077afc2390 STACK_TEXT: fffff807`7f667368 fffff807`7afd41e9 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff807`7f667370 fffff807`7afd0529 : ffffa002`82060ca0 fffff807`7b926180 ffffa002`7f6a5f30 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff807`7f6674b0 fffff807`7e76488a : 00000000`00000000 ffffa002`8205e1a0 fffff807`7f667800 ffffa002`82918010 : nt!KiPageFault+0x469 fffff807`7f667640 fffff807`7e764451 : ffffa002`8207b3d0 fffff807`7f667800 00000000`00000000 ffffa002`8207b1b0 : ataport!PortAvioSchedulerTransferBatch+0x12a fffff807`7f6676a0 fffff807`7e763df9 : ffffa002`8205e1a0 fffff807`7e765390 ffffa002`8205e1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x611 fffff807`7f6678e0 fffff807`7aec115a : ffffa002`8205e118 ffffa002`8205e1a0 fffff807`78a77180 00000000`00000000 : ataport!IdePortCompletionDpc+0x289 fffff807`7f6679f0 fffff807`7aec07af : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x30a fffff807`7f667b30 fffff807`7afc5ebe : 00000000`00000000 fffff807`78a77180 fffff807`7b391400 ffffa002`82ba7080 : nt!KiRetireDpcList+0x1ef fffff807`7f667d60 00000000`00000000 : fffff807`7f668000 fffff807`7f662000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e THREAD_SHA1_HASH_MOD_FUNC: e766aeb5752d36b878358165f7d518bfe3b5e288 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 44c9c87aad11c4ae562ae187cc729b62c27b2266 THREAD_SHA1_HASH_MOD: 392d43557a93e9b74fe107a55959285095ea24cf FOLLOWUP_IP: ataport!PortAvioSchedulerTransferBatch+12a fffff807`7e76488a 01470c add dword ptr [rdi+0Ch],eax FAULT_INSTR_CODE: 2b0c4701 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: ataport!PortAvioSchedulerTransferBatch+12a FOLLOWUP_NAME: MachineOwner MODULE_NAME: ataport IMAGE_NAME: ataport.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 4b09873d IMAGE_VERSION: 10.0.18362.693 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 12a FAILURE_BUCKET_ID: AV_ataport!PortAvioSchedulerTransferBatch BUCKET_ID: AV_ataport!PortAvioSchedulerTransferBatch PRIMARY_PROBLEM_CLASS: AV_ataport!PortAvioSchedulerTransferBatch TARGET_TIME: 2020-06-02T12:03:06.000Z OSBUILD: 18362 OSSERVICEPACK: 836 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 2e66 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_ataport!portavioschedulertransferbatch FAILURE_ID_HASH: {c662dd93-73bc-f08c-00fe-58f3aec1b900} Followup: MachineOwner ---------
Şöyle ki, ekranın en alt sol tarafında windows penceresinin yanında arama çubuğu olur, Başlat menüsü varya orası işte, ona tıkla "Olay Görüntüleyicisi" yaz. Çıkacaktır saten, tıkla yada Enetr yap. karşına çıkan ekranda "Yönetim Olaylarının Özeti" yazan kısımın altında olay kodu ve sorunun nereden kaynaklandığını belirten bir kod mevcuttur.
Memtest86'yi tavsiye etmem Proğram güzel ama paralı hiç değmez kolayı var saten, Windows kendi için ram test yapabiliyorsun, Link Technopat'ın kendi linki böyle yapabilirsin;Kaspersky zaten yok, test edip detayları paylaşmaya çalışacağım.