SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff806c1e32863, The address that the exception occurred at
Arg3: ffffb303580f6e68, Exception Record Address
Arg4: ffffb303580f6680, Context Record Address
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x123f4f, File: 0x11abe7 - C:\ProgramData\Dbg\sym\dxgmms2.sys\AD686AA1117000\dxgmms2.sys
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 1171
Key : Analysis.Elapsed.mSec
Value: 6354
Key : Analysis.IO.Other.Mb
Value: 2
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 2
Key : Analysis.Init.CPU.mSec
Value: 562
Key : Analysis.Init.Elapsed.mSec
Value: 12165
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.Version.DbgEng
Value: 10.0.27829.1001
Key : Analysis.Version.Description
Value: 10.2503.24.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2503.24.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e
Key : Bugcheck.Code.TargetModel
Value: 0x1000007e
Key : Dump.Attributes.AsUlong
Value: 0x1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocation
Key : Failure.Exception.Code
Value: 0xc0000005
Key : Failure.Exception.IP.Address
Value: 0xfffff806c1e32863
Key : Failure.Exception.IP.Module
Value: dxgmms2
Key : Failure.Exception.IP.Offset
Value: 0xe2863
Key : Failure.Exception.Record
Value: 0xffffb303580f6e68
Key : Failure.Hash
Value: {8dc7ebf6-5a97-85b1-c87b-1565a4977229}
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff806c1e32863
BUGCHECK_P3: ffffb303580f6e68
BUGCHECK_P4: ffffb303580f6680
FILE_IN_CAB: 050525-54453-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
FAULTING_THREAD: ffffa10eea3993c0
EXCEPTION_RECORD: ffffb303580f6e68 -- (.exr 0xffffb303580f6e68)
ExceptionAddress: fffff806c1e32863 (dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocation+0x000000000000002b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000008
Attempt to read from address 0000000000000008
CONTEXT: ffffb303580f6680 -- (.cxr 0xffffb303580f6680)
rax=ffffc587374a3e30 rbx=ffffc587374a3d60 rcx=0000000000000092
rdx=0000000000000000 rsi=ffffa10eedc75000 rdi=ffffc587374a3f18
rip=fffff806c1e32863 rsp=ffffb303580f70a0 rbp=ffffb303580f71d0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=00000000001224bd r12=ffffc587374a3d60 r13=ffffb303580f7460
r14=ffffa10ef9e3a010 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocation+0x2b:
fffff806`c1e32863 48394208 cmp qword ptr [rdx+8],rax ds:002b:00000000`00000008=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff80641b1c470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000008
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000008
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffb303`580f70a0 fffff806`c1e26e54 : ffffc587`00000000 ffffb303`00000000 ffffc587`01250910 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocation+0x2b
ffffb303`580f70d0 fffff806`c1e06f2d : ffffa10e`edc75000 ffffc586`e34aa100 ffffc586`e34aa100 ffffa10e`f9e3a010 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x2b004
ffffb303`580f72e0 fffff806`c1e05719 : ffffc586`e34aa100 ffffa10e`d6839000 ffffa10e`ea399300 ffffa10e`00000000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x17fd
ffffb303`580f7540 fffff806`410ded97 : ffffa10e`ea3993c0 fffff806`c1e05710 ffffc586`e34aa100 005fe07f`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffb303`580f7570 fffff806`41219a24 : ffff8001`3c251180 ffffa10e`ea3993c0 fffff806`410ded40 110f205a`8d411041 : nt!PspSystemThreadStartup+0x57
ffffb303`580f75c0 00000000`00000000 : ffffb303`580f8000 ffffb303`580f1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocation+2b
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.22621.5192
STACK_COMMAND: .cxr 0xffffb303580f6680 ; kb
BUCKET_ID_FUNC_OFFSET: 2b
FAILURE_BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocation
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8dc7ebf6-5a97-85b1-c87b-1565a4977229}
Followup: MachineOwner
Hocam OCCT üzerinden ne kadar süreyle test yapmamı önerirsiniz? Varsayılan olarak bir saat gösteriyor ama artırmama gerek var mı?Hocam MEMORY_MANAGEMENT ile SYSTEM_THREAD_EXCEPTION_NOT_HANDLED hataları vardı. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED hatasını atayım buraya.
Kod:SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff806c1e32863, The address that the exception occurred at Arg3: ffffb303580f6e68, Exception Record Address Arg4: ffffb303580f6680, Context Record Address Debugging Details: ------------------ *** WARNING: Check Image - Checksum mismatch - Dump: 0x123f4f, File: 0x11abe7 - C:\ProgramData\Dbg\sym\dxgmms2.sys\AD686AA1117000\dxgmms2.sys KEY_VALUES_STRING: 1 Key : AV.Type Value: Read Key : Analysis.CPU.mSec Value: 1171 Key : Analysis.Elapsed.mSec Value: 6354 Key : Analysis.IO.Other.Mb Value: 2 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 2 Key : Analysis.Init.CPU.mSec Value: 562 Key : Analysis.Init.Elapsed.mSec Value: 12165 Key : Analysis.Memory.CommitPeak.Mb Value: 90 Key : Analysis.Version.DbgEng Value: 10.0.27829.1001 Key : Analysis.Version.Description Value: 10.2503.24.01 amd64fre Key : Analysis.Version.Ext Value: 1.2503.24.1 Key : Bugcheck.Code.LegacyAPI Value: 0x1000007e Key : Bugcheck.Code.TargetModel Value: 0x1000007e Key : Dump.Attributes.AsUlong Value: 0x1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocation Key : Failure.Exception.Code Value: 0xc0000005 Key : Failure.Exception.IP.Address Value: 0xfffff806c1e32863 Key : Failure.Exception.IP.Module Value: dxgmms2 Key : Failure.Exception.IP.Offset Value: 0xe2863 Key : Failure.Exception.Record Value: 0xffffb303580f6e68 Key : Failure.Hash Value: {8dc7ebf6-5a97-85b1-c87b-1565a4977229} BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff806c1e32863 BUGCHECK_P3: ffffb303580f6e68 BUGCHECK_P4: ffffb303580f6680 FILE_IN_CAB: 050525-54453-01.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump FAULTING_THREAD: ffffa10eea3993c0 EXCEPTION_RECORD: ffffb303580f6e68 -- (.exr 0xffffb303580f6e68) ExceptionAddress: fffff806c1e32863 (dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocation+0x000000000000002b) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000008 Attempt to read from address 0000000000000008 CONTEXT: ffffb303580f6680 -- (.cxr 0xffffb303580f6680) rax=ffffc587374a3e30 rbx=ffffc587374a3d60 rcx=0000000000000092 rdx=0000000000000000 rsi=ffffa10eedc75000 rdi=ffffc587374a3f18 rip=fffff806c1e32863 rsp=ffffb303580f70a0 rbp=ffffb303580f71d0 r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=00000000001224bd r12=ffffc587374a3d60 r13=ffffb303580f7460 r14=ffffa10ef9e3a010 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocation+0x2b: fffff806`c1e32863 48394208 cmp qword ptr [rdx+8],rax ds:002b:00000000`00000008=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System READ_ADDRESS: fffff80641b1c470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000008 ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000008 EXCEPTION_STR: 0xc0000005 STACK_TEXT: ffffb303`580f70a0 fffff806`c1e26e54 : ffffc587`00000000 ffffb303`00000000 ffffc587`01250910 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocation+0x2b ffffb303`580f70d0 fffff806`c1e06f2d : ffffa10e`edc75000 ffffc586`e34aa100 ffffc586`e34aa100 ffffa10e`f9e3a010 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x2b004 ffffb303`580f72e0 fffff806`c1e05719 : ffffc586`e34aa100 ffffa10e`d6839000 ffffa10e`ea399300 ffffa10e`00000000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x17fd ffffb303`580f7540 fffff806`410ded97 : ffffa10e`ea3993c0 fffff806`c1e05710 ffffc586`e34aa100 005fe07f`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9 ffffb303`580f7570 fffff806`41219a24 : ffff8001`3c251180 ffffa10e`ea3993c0 fffff806`410ded40 110f205a`8d411041 : nt!PspSystemThreadStartup+0x57 ffffb303`580f75c0 00000000`00000000 : ffffb303`580f8000 ffffb303`580f1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34 SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocation+2b MODULE_NAME: dxgmms2 IMAGE_NAME: dxgmms2.sys IMAGE_VERSION: 10.0.22621.5192 STACK_COMMAND: .cxr 0xffffb303580f6680 ; kb BUCKET_ID_FUNC_OFFSET: 2b FAILURE_BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocation OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {8dc7ebf6-5a97-85b1-c87b-1565a4977229} Followup: MachineOwner
Hocam öncelikle OCCT ile VRAM'lerinizi kontrol edin. Ayrıca BIOS güncelleyin anakartın sitesinden. Yeni sürüm çıkmış.
Anakartınız rev. 1.0 ise buradan, rev. 1.1 ise buradan, rev. 1.2 ise buradan, rev. 1.3 ise buradan indirebilirsiniz.
Yeni gördüm mesajı. 30 dakika olarak olsun.Hocam OCCT üzerinden ne kadar süreyle test yapmamı önerirsiniz? Varsayılan olarak bir saat gösteriyor ama artırmama gerek var mı?
Hocam yarım saat boyunca çalıştırdım OCCT'yi VRAM olarak ve hiçbir hata vermedi. BIOS'umu güncelledim tekrardan yeni çıkan sürüme. Başka bir öneriniz, başka bir yol var mıdır? minidump dosyalarında neden crash verdiği görüntülenebiliyor mu?Yeni gördüm mesajı. 30 dakika olarak olsun.
plugin-nm-serv
işlemi sırasında gerçekleşmiş.MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffd97ad6400650
Arg3: 0002000000020000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1171
Key : Analysis.Elapsed.mSec
Value: 4418
Key : Analysis.IO.Other.Mb
Value: 16
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 1453
Key : Analysis.Init.Elapsed.mSec
Value: 39589
Key : Analysis.Memory.CommitPeak.Mb
Value: 102
Key : Analysis.Version.DbgEng
Value: 10.0.27829.1001
Key : Analysis.Version.Description
Value: 10.2503.24.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2503.24.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Bugcheck.Code.TargetModel
Value: 0x1a
Key : Dump.Attributes.AsUlong
Value: 0x1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0x1a_41792_nt!MiDeleteVa
Key : Failure.Hash
Value: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Key : MemoryManagement.PFN
Value: 0x20
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffd97ad6400650
BUGCHECK_P3: 2000000020000
BUGCHECK_P4: 0
FILE_IN_CAB: 051925-15406-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
FAULTING_THREAD: ffff8003163ab540
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: plugin-nm-serv
STACK_TEXT:
fffff309`a345e8c8 fffff804`4f683a68 : 00000000`0000001a 00000000`00041792 ffffd97a`d6400650 00020000`00020000 : nt!KeBugCheckEx
fffff309`a345e8d0 fffff804`4f4451b6 : fffff309`a345eda0 ffffd97a`d6400ff8 00000000`00000000 ffff8003`14fc2740 : nt!MiDeleteVa+0x21bc58
fffff309`a345e9c0 fffff804`4f44557a : fffff309`a345eda0 ffff8003`14fc2740 ffffd96c`00000000 fffff309`a345edf0 : nt!MiWalkPageTablesRecursively+0x266
fffff309`a345ea50 fffff804`4f44557a : fffff309`a345eda0 ffff8003`14fc2740 ffffd96c`00000000 fffff309`a345ee00 : nt!MiWalkPageTablesRecursively+0x62a
fffff309`a345eae0 fffff804`4f44557a : fffff309`a345eda0 ffff8003`14fc2740 ffffd96c`00000000 fffff309`a345ee10 : nt!MiWalkPageTablesRecursively+0x62a
fffff309`a345eb70 fffff804`4f444e51 : 00000000`00000000 ffff8003`14fc2740 00000000`00000000 fffff309`a345ee20 : nt!MiWalkPageTablesRecursively+0x62a
fffff309`a345ec00 fffff804`4f467d72 : fffff309`a345eda0 ffffd96c`00000001 00000000`00000002 fffff804`00000000 : nt!MiWalkPageTables+0x371
fffff309`a345ed00 fffff804`4f93364d : 00000000`00000000 ffff8003`14fc2508 ffff8003`14fc20c0 fffff309`a345f118 : nt!MiDeletePagablePteRange+0x3c2
fffff309`a345f010 fffff804`4f4fb44f : ffff8003`14fc20c0 fffff309`a345f119 00000000`7ffef000 00000000`00000000 : nt!MiDeleteVadBitmap+0x9d
fffff309`a345f0b0 fffff804`4f932e04 : ffff8003`14fc20c0 ffff8003`14fc2800 ffff8003`14fc2508 ffff8003`14fc2740 : nt!MiDeleteFinalPageTables+0xcb
fffff309`a345f180 fffff804`4f90be7e : ffff8003`14fc20c0 00000000`ffffffff ffff8003`14fc2508 ffff8003`163ab540 : nt!MmDeleteProcessAddressSpace+0x64
fffff309`a345f1d0 fffff804`4f8a11ae : ffff8003`1b02a700 ffff8003`14fc2090 fffff309`a345f3c9 ffff8003`14fc2090 : nt!PspProcessDelete+0x15e
fffff309`a345f270 fffff804`4f41de27 : 00000000`00000000 00000000`00000000 fffff309`a345f3c9 ffff8003`14fc20c0 : nt!ObpRemoveObjectRoutine+0x7e
fffff309`a345f2d0 fffff804`4f89fe54 : 00000000`00000001 00000000`00000001 00000000`00000001 ffff8002`f49604e0 : nt!ObfDereferenceObjectWithTag+0xc7
fffff309`a345f310 fffff804`4f89d7c9 : 00000000`02dd7000 00000000`0e7346b8 00000000`00001768 00000000`00000000 : nt!ObpCloseHandle+0x2a4
fffff309`a345f430 fffff804`4f62d208 : ffff8003`163ab540 fffff309`a345f4e0 00000000`673da904 00007ffe`00000000 : nt!NtClose+0x39
fffff309`a345f460 00000000`77b31cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0392ec88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b31cf3
SYMBOL_NAME: nt!MiDeleteVa+21bc58
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22621.5331
STACK_COMMAND: .process /r /p 0xffff80031b02a080; .thread 0xffff8003163ab540 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 21bc58
FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Followup: MachineOwner
Hocam Kaspersky'ın Password Manager'ı var, antivirüs yazılımı yok. Kaspersky Password Manager'ı kaldırayım mı?@funndark hocam minidump dosyasında Process Name dikkatimi çekti.plugin-nm-serv
işlemi sırasında gerçekleşmiş.
Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: ffffd97ad6400650 Arg3: 0002000000020000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1171 Key : Analysis.Elapsed.mSec Value: 4418 Key : Analysis.IO.Other.Mb Value: 16 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 24 Key : Analysis.Init.CPU.mSec Value: 1453 Key : Analysis.Init.Elapsed.mSec Value: 39589 Key : Analysis.Memory.CommitPeak.Mb Value: 102 Key : Analysis.Version.DbgEng Value: 10.0.27829.1001 Key : Analysis.Version.Description Value: 10.2503.24.01 amd64fre Key : Analysis.Version.Ext Value: 1.2503.24.1 Key : Bugcheck.Code.LegacyAPI Value: 0x1a Key : Bugcheck.Code.TargetModel Value: 0x1a Key : Dump.Attributes.AsUlong Value: 0x1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: 0x1a_41792_nt!MiDeleteVa Key : Failure.Hash Value: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5} Key : MemoryManagement.PFN Value: 0x20 BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: ffffd97ad6400650 BUGCHECK_P3: 2000000020000 BUGCHECK_P4: 0 FILE_IN_CAB: 051925-15406-01.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump FAULTING_THREAD: ffff8003163ab540 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: plugin-nm-serv STACK_TEXT: fffff309`a345e8c8 fffff804`4f683a68 : 00000000`0000001a 00000000`00041792 ffffd97a`d6400650 00020000`00020000 : nt!KeBugCheckEx fffff309`a345e8d0 fffff804`4f4451b6 : fffff309`a345eda0 ffffd97a`d6400ff8 00000000`00000000 ffff8003`14fc2740 : nt!MiDeleteVa+0x21bc58 fffff309`a345e9c0 fffff804`4f44557a : fffff309`a345eda0 ffff8003`14fc2740 ffffd96c`00000000 fffff309`a345edf0 : nt!MiWalkPageTablesRecursively+0x266 fffff309`a345ea50 fffff804`4f44557a : fffff309`a345eda0 ffff8003`14fc2740 ffffd96c`00000000 fffff309`a345ee00 : nt!MiWalkPageTablesRecursively+0x62a fffff309`a345eae0 fffff804`4f44557a : fffff309`a345eda0 ffff8003`14fc2740 ffffd96c`00000000 fffff309`a345ee10 : nt!MiWalkPageTablesRecursively+0x62a fffff309`a345eb70 fffff804`4f444e51 : 00000000`00000000 ffff8003`14fc2740 00000000`00000000 fffff309`a345ee20 : nt!MiWalkPageTablesRecursively+0x62a fffff309`a345ec00 fffff804`4f467d72 : fffff309`a345eda0 ffffd96c`00000001 00000000`00000002 fffff804`00000000 : nt!MiWalkPageTables+0x371 fffff309`a345ed00 fffff804`4f93364d : 00000000`00000000 ffff8003`14fc2508 ffff8003`14fc20c0 fffff309`a345f118 : nt!MiDeletePagablePteRange+0x3c2 fffff309`a345f010 fffff804`4f4fb44f : ffff8003`14fc20c0 fffff309`a345f119 00000000`7ffef000 00000000`00000000 : nt!MiDeleteVadBitmap+0x9d fffff309`a345f0b0 fffff804`4f932e04 : ffff8003`14fc20c0 ffff8003`14fc2800 ffff8003`14fc2508 ffff8003`14fc2740 : nt!MiDeleteFinalPageTables+0xcb fffff309`a345f180 fffff804`4f90be7e : ffff8003`14fc20c0 00000000`ffffffff ffff8003`14fc2508 ffff8003`163ab540 : nt!MmDeleteProcessAddressSpace+0x64 fffff309`a345f1d0 fffff804`4f8a11ae : ffff8003`1b02a700 ffff8003`14fc2090 fffff309`a345f3c9 ffff8003`14fc2090 : nt!PspProcessDelete+0x15e fffff309`a345f270 fffff804`4f41de27 : 00000000`00000000 00000000`00000000 fffff309`a345f3c9 ffff8003`14fc20c0 : nt!ObpRemoveObjectRoutine+0x7e fffff309`a345f2d0 fffff804`4f89fe54 : 00000000`00000001 00000000`00000001 00000000`00000001 ffff8002`f49604e0 : nt!ObfDereferenceObjectWithTag+0xc7 fffff309`a345f310 fffff804`4f89d7c9 : 00000000`02dd7000 00000000`0e7346b8 00000000`00001768 00000000`00000000 : nt!ObpCloseHandle+0x2a4 fffff309`a345f430 fffff804`4f62d208 : ffff8003`163ab540 fffff309`a345f4e0 00000000`673da904 00007ffe`00000000 : nt!NtClose+0x39 fffff309`a345f460 00000000`77b31cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`0392ec88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b31cf3 SYMBOL_NAME: nt!MiDeleteVa+21bc58 MODULE_NAME: nt IMAGE_VERSION: 10.0.22621.5331 STACK_COMMAND: .process /r /p 0xffff80031b02a080; .thread 0xffff8003163ab540 ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 21bc58 FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5} Followup: MachineOwner
Hocam Kaspersky kullanıyorsanız bir virüs taraması yapın, virüs çıkmazsa kaldırın. Biraz araştırdım. Kaspersky ile ilgili bir şeymiş bu plugin-nm-serv.
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa50012613f78, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8048374688f, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1406
Key : Analysis.Elapsed.mSec
Value: 5038
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 484
Key : Analysis.Init.Elapsed.mSec
Value: 4331
Key : Analysis.Memory.CommitPeak.Mb
Value: 110
Key : Analysis.Version.DbgEng
Value: 10.0.27829.1001
Key : Analysis.Version.Description
Value: 10.2503.24.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2503.24.1
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Bugcheck.Code.TargetModel
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 0x1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!MiGetWorkingSetInfoList
Key : Failure.Exception.IP.Address
Value: 0xfffff8048374688f
Key : Failure.Exception.IP.Module
Value: nt
Key : Failure.Exception.IP.Offset
Value: 0x34688f
Key : Failure.Hash
Value: {946b3808-a5b5-634d-f7e5-1f78ceb7eb76}
BUGCHECK_CODE: a
BUGCHECK_P1: ffffa50012613f78
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8048374688f
FILE_IN_CAB: 052125-16453-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
FAULTING_THREAD: ffffd40b4f078080
READ_ADDRESS: fffff8048411d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa50012613f78
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffff9884`d382ed28 fffff804`8382db29 : 00000000`0000000a ffffa500`12613f78 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9884`d382ed30 fffff804`83828f89 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9884`d382ee70 fffff804`8374688f : ffffd40b`61bcc740 ffff9884`d382f4e0 ffff8680`00000000 ffffd40b`00000000 : nt!KiPageFault+0x489
ffff9884`d382f000 fffff804`83aa56f2 : ffffbe81`00400000 00000000`40000002 00000000`00000001 fffff804`83647101 : nt!MiGetWorkingSetInfoList+0x42f
ffff9884`d382f200 fffff804`83aa4a45 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`83aa6dbc : nt!MmQueryVirtualMemory+0xc92
ffff9884`d382f3a0 fffff804`8382d208 : 00000000`00000000 ffff888a`5ecaa780 00000000`00000000 ffffd40b`5ab930e0 : nt!NtQueryVirtualMemory+0x25
ffff9884`d382f3f0 00007ffa`b9c111e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000067`b6ffeda8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`b9c111e4
SYMBOL_NAME: nt!MiGetWorkingSetInfoList+42f
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22621.5331
STACK_COMMAND: .process /r /p 0xffffd40b61bcc0c0; .thread 0xffffd40b4f078080 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 42f
FAILURE_BUCKET_ID: AV_nt!MiGetWorkingSetInfoList
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {946b3808-a5b5-634d-f7e5-1f78ceb7eb76}
Followup: MachineOwner
Hocam bütün testler tertemiz, bırakıyorum görselleri. Yalnız şu şey dikkatimi çekti; OSNAME'de Windows 10 yazıyor fakat benim bilgisayarım Windows 11, bir ay önce Windows'un kendi updaterını kullanarak Win 11 yapmıştım. Yine bir mavi ekran aldım bu arada boşta onu da bırakıyorum size zahmet incelerseniz.@funndark karşılaştığım hatayı paylaşayım. IRQL_NOT_LESS_OR_EQUAL hatası.
Kod:IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: ffffa50012613f78, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8048374688f, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1406 Key : Analysis.Elapsed.mSec Value: 5038 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 1 Key : Analysis.Init.CPU.mSec Value: 484 Key : Analysis.Init.Elapsed.mSec Value: 4331 Key : Analysis.Memory.CommitPeak.Mb Value: 110 Key : Analysis.Version.DbgEng Value: 10.0.27829.1001 Key : Analysis.Version.Description Value: 10.2503.24.01 amd64fre Key : Analysis.Version.Ext Value: 1.2503.24.1 Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Bugcheck.Code.TargetModel Value: 0xa Key : Dump.Attributes.AsUlong Value: 0x1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_nt!MiGetWorkingSetInfoList Key : Failure.Exception.IP.Address Value: 0xfffff8048374688f Key : Failure.Exception.IP.Module Value: nt Key : Failure.Exception.IP.Offset Value: 0x34688f Key : Failure.Hash Value: {946b3808-a5b5-634d-f7e5-1f78ceb7eb76} BUGCHECK_CODE: a BUGCHECK_P1: ffffa50012613f78 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8048374688f FILE_IN_CAB: 052125-16453-01.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump FAULTING_THREAD: ffffd40b4f078080 READ_ADDRESS: fffff8048411d470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse ffffa50012613f78 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: opera.exe STACK_TEXT: ffff9884`d382ed28 fffff804`8382db29 : 00000000`0000000a ffffa500`12613f78 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffff9884`d382ed30 fffff804`83828f89 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffff9884`d382ee70 fffff804`8374688f : ffffd40b`61bcc740 ffff9884`d382f4e0 ffff8680`00000000 ffffd40b`00000000 : nt!KiPageFault+0x489 ffff9884`d382f000 fffff804`83aa56f2 : ffffbe81`00400000 00000000`40000002 00000000`00000001 fffff804`83647101 : nt!MiGetWorkingSetInfoList+0x42f ffff9884`d382f200 fffff804`83aa4a45 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`83aa6dbc : nt!MmQueryVirtualMemory+0xc92 ffff9884`d382f3a0 fffff804`8382d208 : 00000000`00000000 ffff888a`5ecaa780 00000000`00000000 ffffd40b`5ab930e0 : nt!NtQueryVirtualMemory+0x25 ffff9884`d382f3f0 00007ffa`b9c111e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000067`b6ffeda8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`b9c111e4 SYMBOL_NAME: nt!MiGetWorkingSetInfoList+42f MODULE_NAME: nt IMAGE_VERSION: 10.0.22621.5331 STACK_COMMAND: .process /r /p 0xffffd40b61bcc0c0; .thread 0xffffd40b4f078080 ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 42f FAILURE_BUCKET_ID: AV_nt!MiGetWorkingSetInfoList OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {946b3808-a5b5-634d-f7e5-1f78ceb7eb76} Followup: MachineOwner
Hocam ben diskten şüphelenmeye başladım. SSD ve HDD'lerinizi verdiğim linkteki rehbere göre test edip sonucu paylaşır mısınız? Bu arada rehberdekilerin aynısını yapın.
HDD'niz için rehberdeki gibi HD Tune kullanın ancak Quick Scan tikini kapatın.Disk testi yapmak
Sizden disk testi istediğim zaman bu rehbere göre disk testi yapıp sonucu gönderebilirsiniz. SSD için aşağıdaki 2 aracı kullanın. https://www.hdsentinel.com/ > Sağlık durumunu gönderin. https://www.guru3d.com/files-details/as-ssd-benchmark.html > Okuma yazma hızını gönderin. HDD için ise health...www.technopat.net