Mavi ekran

Wedad301

Femtopat
Katılım
25 Haziran 2020
Mesajlar
24
Uzun süredir mavi ekran yiyorum ve bu bilgisayarı normal işler için kullandığımda gerçekleşmiyor, oyun oynarken gerçekleşiyor. Çoğu oyunda düzenli mavi ekran yediğimden ötürü warframe adlı oyunu tekrar indirdim belli bir süre sorunsuz oynadım sonra tekrar aynı sorunlar başladı. Windows 10 temiz kurulumu yakın tarihte yapmıştım. Kullandığım Windows 10 Pro 64 Bit.

Sistem özellikleri:
Windows 10 Pro 64 Bit.
Intel Core 2 Quad CPU Q8300.
4 GB RAM.
GeForce GT 1030 ekran kartı.
Gigabyte P43T-ES3g anakart.

 
Kaspersky kaldır, Memtest86 ile RAM testi yap.

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd20f00eff978, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8001577193f, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffd20f00eff978

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8001577193f

READ_ADDRESS: fffff80012b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffd20f00eff978

CURRENT_IRQL:  2

FAULTING_IP:
iorate!IoRateDeviceExtensionSoftCapProcess+c3
fffff800`1577193f 48391b          cmp     qword ptr [rbx],rbx

CPU_COUNT: 4

CPU_MHZ: 9c4

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 17

CPU_STEPPING: a

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  PAGE_NOT_ZERO_AV

BUGCHECK_STR:  AV

PROCESS_NAME:  makecab.exe

BAD_PAGES_DETECTED: 1

ANALYSIS_SESSION_HOST:  DESKTOP-JC78BRD

ANALYSIS_SESSION_TIME:  06-25-2020 20:50:13.0060

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

DPC_STACK_BASE:  FFFFF80015A6EFB0

TRAP_FRAME:  fffff80015a6e1d0 -- (.trap 0xfffff80015a6e1d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80015a6e3a8 rbx=0000000000000000 rcx=ffffd20fd6f0eb20
rdx=fffff80015a6e3d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001577193f rsp=fffff80015a6e360 rbp=ffffd20fd6f0eb20
 r8=0000000000000000  r9=00000000ffffc000 r10=ffffd20fdb261080
r11=fffff80015a6e350 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
iorate!IoRateDeviceExtensionSoftCapProcess+0xc3:
fffff800`1577193f 48391b          cmp     qword ptr [rbx],rbx ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800127d41e9 to fffff800127c2390

STACK_TEXT: 
fffff800`15a6e088 fffff800`127d41e9 : 00000000`0000000a ffffd20f`00eff978 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`15a6e090 fffff800`127d0529 : 00000000`00000003 00000000`28673ca2 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`15a6e1d0 fffff800`1577193f : 00000000`00000000 00000000`00000000 fffff800`15a6e410 fffff800`126c1725 : nt!KiPageFault+0x469
fffff800`15a6e360 fffff800`1577434c : ffffd20f`df04d2a0 fffff800`15a6e4e9 ffffd20f`d6f0e9d0 00000000`00000001 : iorate!IoRateDeviceExtensionSoftCapProcess+0xc3
fffff800`15a6e3b0 fffff800`15775160 : fffff800`15a6f000 fffff800`15a69000 ffffd20f`d6f0eb20 ffffd20f`d6f3d030 : iorate!IoRateOutstandingCountDecrement+0xa8
fffff800`15a6e410 fffff800`12720099 : ffffd20f`df04d2a0 ffffd20f`df04d2a0 ffffd20f`df04d2a0 00000001`af929ac5 : iorate!IoRateReadWriteCompletion+0x30
fffff800`15a6e440 fffff800`1271ff67 : ffffd20f`d6f09060 ffffd20f`d6f09101 ffffd20f`df04d2a0 ffffd20f`df04d490 : nt!IopfCompleteRequest+0x119
fffff800`15a6e550 fffff800`157d6e40 : 00000000`00000000 ffffd20f`dcbae350 fffff800`15a6e680 ffffd20f`dcbae350 : nt!IofCompleteRequest+0x17
fffff800`15a6e580 fffff800`12720099 : ffffd20f`e08f3423 fffff800`130dbc8d ffffd20f`d6c48ca0 ffffd20f`e1618ed0 : CLASSPNP!TransferPktComplete+0x640
fffff800`15a6e780 fffff800`1271ff67 : 00000000`00000000 ffffd20f`d6c68601 ffffd20f`db1a2500 ffffd20f`d6c461a0 : nt!IopfCompleteRequest+0x119
fffff800`15a6e890 fffff800`14bf169e : ffffd20f`db1a2500 ffffd20f`d6c68680 ffffd20f`d6c461a0 ffffd20f`d6f89060 : nt!IofCompleteRequest+0x17
fffff800`15a6e8c0 fffff800`14bf4265 : ffffd20f`db1a2500 fffff800`15a6ea50 00000000`00000000 ffffd20f`d6c68680 : ataport!IdeCommonCrbCompletion+0xae
fffff800`15a6e8f0 fffff800`14bf3df9 : ffffd20f`d6c461a0 fffff800`14bf5390 ffffd20f`d6c461a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x425
fffff800`15a6eb30 fffff800`126c115a : ffffd20f`d6c46118 ffffd20f`d6c461a0 fffff800`0ef17180 00000000`00000000 : ataport!IdePortCompletionDpc+0x289
fffff800`15a6ec40 fffff800`126c07af : 00000000`00000014 00000000`00989680 00000000`00006bde 00000000`000000f6 : nt!KiExecuteAllDpcs+0x30a
fffff800`15a6ed80 fffff800`127c9395 : 00000000`00000000 fffff800`0ef17180 ffffc080`103b6b40 00000000`00008000 : nt!KiRetireDpcList+0x1ef
fffff800`15a6efb0 fffff800`127c9180 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffb203`f9de9bc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


THREAD_SHA1_HASH_MOD_FUNC:  3d24de82c0150b4bde2fde06327ad9c741db5e2a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d7d28d5a975e185d5cd83ff3571bb2f4f67d3ffd

THREAD_SHA1_HASH_MOD:  3370a3bc988bb1e947c9c60a9e4ff15e789e6de3

SYMBOL_NAME:  PAGE_NOT_ZERO

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  PAGE_NOT_ZERO_AV

PRIMARY_PROBLEM_CLASS:  PAGE_NOT_ZERO_AV

FAILURE_BUCKET_ID:  PAGE_NOT_ZERO_AV

TARGET_TIME:  2020-06-09T15:19:51.000Z

OSBUILD:  18362

OSSERVICEPACK:  836

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2331

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:page_not_zero_av

FAILURE_ID_HASH:  {91fefd05-7a2b-5d37-e27f-7af624353ffc}

Followup:     MachineOwner
---------
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff48086b09780, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff48086b096d8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: fffff48086b09780

BUGCHECK_P3: fffff48086b096d8

BUGCHECK_P4: 0

TRAP_FRAME:  fffff48086b09780 -- (.trap 0xfffff48086b09780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb40f1da941a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff9f8100c40180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80046863ada rsp=fffff48086b09910 rbp=000000073f6d49d7
 r8=0000000000000000  r9=fffff8004625a800 r10=ffff9f8100c40180
r11=fffff80046600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiInsertTimerTable+0x14d78a:
fffff800`46863ada cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff48086b096d8 -- (.exr 0xfffff48086b096d8)
ExceptionAddress: fffff80046863ada (nt!KiInsertTimerTable+0x000000000014d78a)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: 9c4

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 17

CPU_STEPPING: a

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-JC78BRD

ANALYSIS_SESSION_TIME:  06-25-2020 20:50:10.0836

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff800467d41e9 to fffff800467c2390

STACK_TEXT: 
fffff480`86b09458 fffff800`467d41e9 : 00000000`00000139 00000000`00000003 fffff480`86b09780 fffff480`86b096d8 : nt!KeBugCheckEx
fffff480`86b09460 fffff800`467d4610 : ffffb40f`19303000 fffff800`46680048 fffff480`86b09828 ffffffff`fffffed8 : nt!KiBugCheckDispatch+0x69
fffff480`86b095a0 fffff800`467d29a3 : 00000000`00000000 00000000`00000001 00000000`00010008 fffff802`647ca134 : nt!KiFastFailDispatch+0xd0
fffff480`86b09780 fffff800`46863ada : 00000000`00000105 00000000`00000000 ffffb40f`00a000d0 fffff800`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff480`86b09910 fffff800`466a1b07 : 00000000`00000000 00000000`00000000 00000000`00000103 00000000`00000000 : nt!KiInsertTimerTable+0x14d78a
fffff480`86b09990 fffff800`466a1663 : 00000007`3c8950f4 fffff480`86b09ba0 00000000`00000000 00000000`000003e8 : nt!ExpSetTimerObject+0x3d7
fffff480`86b09b30 fffff800`467d3c15 : 00000000`00000200 ffffb40f`19e60080 00000000`000003e8 00000000`00000000 : nt!NtSetTimerEx+0x1b3
fffff480`86b09c00 00007ffc`cee3f584 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000f1`38a7f2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`cee3f584


THREAD_SHA1_HASH_MOD_FUNC:  f5ea004d9d77e345b061e535bc6f3794776a8a15

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  f1b31cca6318091f49763f06a6ae0780e44a857c

THREAD_SHA1_HASH_MOD:  cb5f414824c2521bcc505eaa03e92fa10922dad8

FOLLOWUP_IP:
nt!KiInsertTimerTable+14d78a
fffff800`46863ada cd29            int     29h

FAULT_INSTR_CODE:  b34129cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!KiInsertTimerTable+14d78a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.836

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  14d78a

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

TARGET_TIME:  2020-06-09T12:26:41.000Z

OSBUILD:  18362

OSSERVICEPACK:  836

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  38f6

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiinserttimertable

FAILURE_ID_HASH:  {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

Followup:     MachineOwner
---------
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8077e76488a, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 1

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8077e76488a

WORKER_ROUTINE:
+0
00000000`00000001 ??              ???

WORK_ITEM:  fffff8077e76488a

CURRENT_IRQL:  2

CPU_COUNT: 4

CPU_MHZ: 9c4

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 17

CPU_STEPPING: a

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-JC78BRD

ANALYSIS_SESSION_TIME:  06-25-2020 20:50:08.0545

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff8077f6674b0 -- (.trap 0xfffff8077f6674b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffff8077e77e080
rdx=ffffa0028207b408 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077e76488a rsp=fffff8077f667640 rbp=0000000000000000
 r8=ffffa00282918510  r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ataport!PortAvioSchedulerTransferBatch+0x12a:
fffff807`7e76488a 01470c          add     dword ptr [rdi+0Ch],eax ds:00000000`0000000c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8077afd41e9 to fffff8077afc2390

STACK_TEXT: 
fffff807`7f667368 fffff807`7afd41e9 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff807`7f667370 fffff807`7afd0529 : ffffa002`82060ca0 fffff807`7b926180 ffffa002`7f6a5f30 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`7f6674b0 fffff807`7e76488a : 00000000`00000000 ffffa002`8205e1a0 fffff807`7f667800 ffffa002`82918010 : nt!KiPageFault+0x469
fffff807`7f667640 fffff807`7e764451 : ffffa002`8207b3d0 fffff807`7f667800 00000000`00000000 ffffa002`8207b1b0 : ataport!PortAvioSchedulerTransferBatch+0x12a
fffff807`7f6676a0 fffff807`7e763df9 : ffffa002`8205e1a0 fffff807`7e765390 ffffa002`8205e1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x611
fffff807`7f6678e0 fffff807`7aec115a : ffffa002`8205e118 ffffa002`8205e1a0 fffff807`78a77180 00000000`00000000 : ataport!IdePortCompletionDpc+0x289
fffff807`7f6679f0 fffff807`7aec07af : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x30a
fffff807`7f667b30 fffff807`7afc5ebe : 00000000`00000000 fffff807`78a77180 fffff807`7b391400 ffffa002`82ba7080 : nt!KiRetireDpcList+0x1ef
fffff807`7f667d60 00000000`00000000 : fffff807`7f668000 fffff807`7f662000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e


THREAD_SHA1_HASH_MOD_FUNC:  e766aeb5752d36b878358165f7d518bfe3b5e288

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  44c9c87aad11c4ae562ae187cc729b62c27b2266

THREAD_SHA1_HASH_MOD:  392d43557a93e9b74fe107a55959285095ea24cf

FOLLOWUP_IP:
ataport!PortAvioSchedulerTransferBatch+12a
fffff807`7e76488a 01470c          add     dword ptr [rdi+0Ch],eax

FAULT_INSTR_CODE:  2b0c4701

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  ataport!PortAvioSchedulerTransferBatch+12a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4b09873d

IMAGE_VERSION:  10.0.18362.693

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  12a

FAILURE_BUCKET_ID:  AV_ataport!PortAvioSchedulerTransferBatch

BUCKET_ID:  AV_ataport!PortAvioSchedulerTransferBatch

PRIMARY_PROBLEM_CLASS:  AV_ataport!PortAvioSchedulerTransferBatch

TARGET_TIME:  2020-06-02T12:03:06.000Z

OSBUILD:  18362

OSSERVICEPACK:  836

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2e66

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_ataport!portavioschedulertransferbatch

FAILURE_ID_HASH:  {c662dd93-73bc-f08c-00fe-58f3aec1b900}

Followup:     MachineOwner
---------
 
Beni biraz yönlendirirseniz sevinirim.
Şöyle ki, ekranın en alt sol tarafında windows penceresinin yanında arama çubuğu olur, Başlat menüsü varya orası işte, ona tıkla "Olay Görüntüleyicisi" yaz. Çıkacaktır saten, tıkla yada Enetr yap. karşına çıkan ekranda "Yönetim Olaylarının Özeti" yazan kısımın altında olay kodu ve sorunun nereden kaynaklandığını belirten bir kod mevcuttur.
 
Kaspersky kaldır, Memtest86 ile RAM testi yap.

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd20f00eff978, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8001577193f, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE: 2

BUGCHECK_P1: ffffd20f00eff978

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8001577193f

READ_ADDRESS: fffff80012b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffd20f00eff978

CURRENT_IRQL: 2

FAULTING_IP:
iorate!IoRateDeviceExtensionSoftCapProcess+c3
fffff800`1577193f 48391b cmp qword ptr [rbx],rbx

CPU_COUNT: 4

CPU_MHZ: 9c4

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 17

CPU_STEPPING: a

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: PAGE_NOT_ZERO_AV

BUGCHECK_STR: AV

PROCESS_NAME: makecab.exe

BAD_PAGES_DETECTED: 1

ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD

ANALYSIS_SESSION_TIME: 06-25-2020 20:50:13.0060

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

DPC_STACK_BASE: FFFFF80015A6EFB0

TRAP_FRAME: fffff80015a6e1d0 -- (.trap 0xfffff80015a6e1d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80015a6e3a8 rbx=0000000000000000 rcx=ffffd20fd6f0eb20
rdx=fffff80015a6e3d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001577193f rsp=fffff80015a6e360 rbp=ffffd20fd6f0eb20
r8=0000000000000000 r9=00000000ffffc000 r10=ffffd20fdb261080
r11=fffff80015a6e350 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
iorate!IoRateDeviceExtensionSoftCapProcess+0xc3:
fffff800`1577193f 48391b cmp qword ptr [rbx],rbx ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800127d41e9 to fffff800127c2390

STACK_TEXT:
fffff800`15a6e088 fffff800`127d41e9 : 00000000`0000000a ffffd20f`00eff978 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`15a6e090 fffff800`127d0529 : 00000000`00000003 00000000`28673ca2 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`15a6e1d0 fffff800`1577193f : 00000000`00000000 00000000`00000000 fffff800`15a6e410 fffff800`126c1725 : nt!KiPageFault+0x469
fffff800`15a6e360 fffff800`1577434c : ffffd20f`df04d2a0 fffff800`15a6e4e9 ffffd20f`d6f0e9d0 00000000`00000001 : iorate!IoRateDeviceExtensionSoftCapProcess+0xc3
fffff800`15a6e3b0 fffff800`15775160 : fffff800`15a6f000 fffff800`15a69000 ffffd20f`d6f0eb20 ffffd20f`d6f3d030 : iorate!IoRateOutstandingCountDecrement+0xa8
fffff800`15a6e410 fffff800`12720099 : ffffd20f`df04d2a0 ffffd20f`df04d2a0 ffffd20f`df04d2a0 00000001`af929ac5 : iorate!IoRateReadWriteCompletion+0x30
fffff800`15a6e440 fffff800`1271ff67 : ffffd20f`d6f09060 ffffd20f`d6f09101 ffffd20f`df04d2a0 ffffd20f`df04d490 : nt!IopfCompleteRequest+0x119
fffff800`15a6e550 fffff800`157d6e40 : 00000000`00000000 ffffd20f`dcbae350 fffff800`15a6e680 ffffd20f`dcbae350 : nt!IofCompleteRequest+0x17
fffff800`15a6e580 fffff800`12720099 : ffffd20f`e08f3423 fffff800`130dbc8d ffffd20f`d6c48ca0 ffffd20f`e1618ed0 : CLASSPNP!TransferPktComplete+0x640
fffff800`15a6e780 fffff800`1271ff67 : 00000000`00000000 ffffd20f`d6c68601 ffffd20f`db1a2500 ffffd20f`d6c461a0 : nt!IopfCompleteRequest+0x119
fffff800`15a6e890 fffff800`14bf169e : ffffd20f`db1a2500 ffffd20f`d6c68680 ffffd20f`d6c461a0 ffffd20f`d6f89060 : nt!IofCompleteRequest+0x17
fffff800`15a6e8c0 fffff800`14bf4265 : ffffd20f`db1a2500 fffff800`15a6ea50 00000000`00000000 ffffd20f`d6c68680 : ataport!IdeCommonCrbCompletion+0xae
fffff800`15a6e8f0 fffff800`14bf3df9 : ffffd20f`d6c461a0 fffff800`14bf5390 ffffd20f`d6c461a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x425
fffff800`15a6eb30 fffff800`126c115a : ffffd20f`d6c46118 ffffd20f`d6c461a0 fffff800`0ef17180 00000000`00000000 : ataport!IdePortCompletionDpc+0x289
fffff800`15a6ec40 fffff800`126c07af : 00000000`00000014 00000000`00989680 00000000`00006bde 00000000`000000f6 : nt!KiExecuteAllDpcs+0x30a
fffff800`15a6ed80 fffff800`127c9395 : 00000000`00000000 fffff800`0ef17180 ffffc080`103b6b40 00000000`00008000 : nt!KiRetireDpcList+0x1ef
fffff800`15a6efb0 fffff800`127c9180 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffb203`f9de9bc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue

THREAD_SHA1_HASH_MOD_FUNC: 3d24de82c0150b4bde2fde06327ad9c741db5e2a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d7d28d5a975e185d5cd83ff3571bb2f4f67d3ffd

THREAD_SHA1_HASH_MOD: 3370a3bc988bb1e947c9c60a9e4ff15e789e6de3

SYMBOL_NAME: PAGE_NOT_ZERO

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME: Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP: 0

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID: PAGE_NOT_ZERO_AV

PRIMARY_PROBLEM_CLASS: PAGE_NOT_ZERO_AV

FAILURE_BUCKET_ID: PAGE_NOT_ZERO_AV

TARGET_TIME: 2020-06-09T15:19:51.000Z

OSBUILD: 18362

OSSERVICEPACK: 836

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 2331

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:page_not_zero_av

FAILURE_ID_HASH: {91fefd05-7a2b-5d37-e27f-7af624353ffc}

Followup: MachineOwner
---------
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff48086b09780, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff48086b096d8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE: 2

BUGCHECK_P1: 3

BUGCHECK_P2: fffff48086b09780

BUGCHECK_P3: fffff48086b096d8

BUGCHECK_P4: 0

TRAP_FRAME: fffff48086b09780 -- (.trap 0xfffff48086b09780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb40f1da941a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff9f8100c40180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80046863ada rsp=fffff48086b09910 rbp=000000073f6d49d7
r8=0000000000000000 r9=fffff8004625a800 r10=ffff9f8100c40180
r11=fffff80046600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiInsertTimerTable+0x14d78a:
fffff800`46863ada cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffff48086b096d8 -- (.exr 0xfffff48086b096d8)
ExceptionAddress: fffff80046863ada (nt!KiInsertTimerTable+0x000000000014d78a)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: 9c4

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 17

CPU_STEPPING: a

CUSTOMER_CRASH_COUNT: 1

BUGCHECK_STR: 0x139

PROCESS_NAME: dwm.exe

CURRENT_IRQL: 2

DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD

ANALYSIS_SESSION_TIME: 06-25-2020 20:50:10.0836

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER: from fffff800467d41e9 to fffff800467c2390

STACK_TEXT:
fffff480`86b09458 fffff800`467d41e9 : 00000000`00000139 00000000`00000003 fffff480`86b09780 fffff480`86b096d8 : nt!KeBugCheckEx
fffff480`86b09460 fffff800`467d4610 : ffffb40f`19303000 fffff800`46680048 fffff480`86b09828 ffffffff`fffffed8 : nt!KiBugCheckDispatch+0x69
fffff480`86b095a0 fffff800`467d29a3 : 00000000`00000000 00000000`00000001 00000000`00010008 fffff802`647ca134 : nt!KiFastFailDispatch+0xd0
fffff480`86b09780 fffff800`46863ada : 00000000`00000105 00000000`00000000 ffffb40f`00a000d0 fffff800`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff480`86b09910 fffff800`466a1b07 : 00000000`00000000 00000000`00000000 00000000`00000103 00000000`00000000 : nt!KiInsertTimerTable+0x14d78a
fffff480`86b09990 fffff800`466a1663 : 00000007`3c8950f4 fffff480`86b09ba0 00000000`00000000 00000000`000003e8 : nt!ExpSetTimerObject+0x3d7
fffff480`86b09b30 fffff800`467d3c15 : 00000000`00000200 ffffb40f`19e60080 00000000`000003e8 00000000`00000000 : nt!NtSetTimerEx+0x1b3
fffff480`86b09c00 00007ffc`cee3f584 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000f1`38a7f2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`cee3f584

THREAD_SHA1_HASH_MOD_FUNC: f5ea004d9d77e345b061e535bc6f3794776a8a15

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f1b31cca6318091f49763f06a6ae0780e44a857c

THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8

FOLLOWUP_IP:
nt!KiInsertTimerTable+14d78a
fffff800`46863ada cd29 int 29h

FAULT_INSTR_CODE: b34129cd

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: nt!KiInsertTimerTable+14d78a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.18362.836

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 14d78a

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

TARGET_TIME: 2020-06-09T12:26:41.000Z

OSBUILD: 18362

OSSERVICEPACK: 836

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 38f6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiinserttimertable

FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

Followup: MachineOwner
---------
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8077e76488a, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE: 2

BUGCHECK_P1: 1

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8077e76488a

WORKER_ROUTINE:
+0
00000000`00000001 ?? ???

WORK_ITEM: fffff8077e76488a

CURRENT_IRQL: 2

CPU_COUNT: 4

CPU_MHZ: 9c4

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 17

CPU_STEPPING: a

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD

ANALYSIS_SESSION_TIME: 06-25-2020 20:50:08.0545

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME: fffff8077f6674b0 -- (.trap 0xfffff8077f6674b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffff8077e77e080
rdx=ffffa0028207b408 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077e76488a rsp=fffff8077f667640 rbp=0000000000000000
r8=ffffa00282918510 r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ataport!PortAvioSchedulerTransferBatch+0x12a:
fffff807`7e76488a 01470c add dword ptr [rdi+0Ch],eax ds:00000000`0000000c=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff8077afd41e9 to fffff8077afc2390

STACK_TEXT:
fffff807`7f667368 fffff807`7afd41e9 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff807`7f667370 fffff807`7afd0529 : ffffa002`82060ca0 fffff807`7b926180 ffffa002`7f6a5f30 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`7f6674b0 fffff807`7e76488a : 00000000`00000000 ffffa002`8205e1a0 fffff807`7f667800 ffffa002`82918010 : nt!KiPageFault+0x469
fffff807`7f667640 fffff807`7e764451 : ffffa002`8207b3d0 fffff807`7f667800 00000000`00000000 ffffa002`8207b1b0 : ataport!PortAvioSchedulerTransferBatch+0x12a
fffff807`7f6676a0 fffff807`7e763df9 : ffffa002`8205e1a0 fffff807`7e765390 ffffa002`8205e1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x611
fffff807`7f6678e0 fffff807`7aec115a : ffffa002`8205e118 ffffa002`8205e1a0 fffff807`78a77180 00000000`00000000 : ataport!IdePortCompletionDpc+0x289
fffff807`7f6679f0 fffff807`7aec07af : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x30a
fffff807`7f667b30 fffff807`7afc5ebe : 00000000`00000000 fffff807`78a77180 fffff807`7b391400 ffffa002`82ba7080 : nt!KiRetireDpcList+0x1ef
fffff807`7f667d60 00000000`00000000 : fffff807`7f668000 fffff807`7f662000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e

THREAD_SHA1_HASH_MOD_FUNC: e766aeb5752d36b878358165f7d518bfe3b5e288

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 44c9c87aad11c4ae562ae187cc729b62c27b2266

THREAD_SHA1_HASH_MOD: 392d43557a93e9b74fe107a55959285095ea24cf

FOLLOWUP_IP:
ataport!PortAvioSchedulerTransferBatch+12a
fffff807`7e76488a 01470c add dword ptr [rdi+0Ch],eax

FAULT_INSTR_CODE: 2b0c4701

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: ataport!PortAvioSchedulerTransferBatch+12a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: ataport

IMAGE_NAME: ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4b09873d

IMAGE_VERSION: 10.0.18362.693

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 12a

FAILURE_BUCKET_ID: AV_ataport!PortAvioSchedulerTransferBatch

BUCKET_ID: AV_ataport!PortAvioSchedulerTransferBatch

PRIMARY_PROBLEM_CLASS: AV_ataport!PortAvioSchedulerTransferBatch

TARGET_TIME: 2020-06-02T12:03:06.000Z

OSBUILD: 18362

OSSERVICEPACK: 836

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 2e66

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_ataport!portavioschedulertransferbatch

FAILURE_ID_HASH: {c662dd93-73bc-f08c-00fe-58f3aec1b900}

Followup: MachineOwner
---------

Kaspersky zaten yok, test edip detayları paylaşmaya çalışacağım.
Şöyle ki, ekranın en alt sol tarafında windows penceresinin yanında arama çubuğu olur, Başlat menüsü varya orası işte, ona tıkla "Olay Görüntüleyicisi" yaz. Çıkacaktır saten, tıkla yada Enetr yap. karşına çıkan ekranda "Yönetim Olaylarının Özeti" yazan kısımın altında olay kodu ve sorunun nereden kaynaklandığını belirten bir kod mevcuttur.
 

Dosya Ekleri

  • Ek Açıklama 2020-06-25 205854.png
    Ek Açıklama 2020-06-25 205854.png
    7,2 KB · Görüntüleme: 60
Kaspersky zaten yok, test edip detayları paylaşmaya çalışacağım.
Memtest86'yi tavsiye etmem Proğram güzel ama paralı hiç değmez kolayı var saten, Windows kendi için ram test yapabiliyorsun, Link Technopat'ın kendi linki böyle yapabilirsin;
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Yeni mesajlar

Geri
Yukarı