Çözüldü MSI B450-A PRO Max Windows 10'da mavi ekran hataları

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

DipperPines

Hectopat
Katılım
12 Aralık 2019
Mesajlar
12
Yeni bilgisayarımda 2 hafta içinde 8 defa mavi ekran hatası aldım.
Bu hatalar;
Page Fault In Nonpaged Area
System Service Exeption
No More Irp Stack Locations
Attemped Execute Of Noexecute Memory
Bu dört hatayı aldıktan sonra bellek tanımlama yaptım ve hata aldım. Bilgisayarı aldığım yere götürdüm, test ettiler ancak hatanın işletim sisteminden olduğunu söylediler. ( Bilgisayarcım BIOS'u güncellemeden işletim sistemi yüklediği için hata verdi diye düşünüyordum. )
Her şey güncel şekilde tekrar yüklettim işletim sistemimi ancak bu sefer de şu hataları aldım;
Kernel Security Check Failure
System Service Exeption (Sol altta Başarısız: System32kfull.sys yazıyor)

Minidump dosyaları: Yeni klasör.rar

Bilgisayar Bileşenlerim;
Anakart: MSI B450-A PRO Max
Ekran Kartı: Sapphire RX590 Nitro+SE
RAM: G.Skill Trident Z Neo 2x8 (16 GB) 3600 MHz
İşlemci: Ryzen 7 2700MAX 3.2GHz (OC 4.1GHz) 8 çekirdek
SSD: Samsung 250GB 860 Evo SATA 3.0 (Okuma 550 MB / Yazma 520 MB)
Harddisk: Seagate 3.5' 7200RPM 1TB

Hata tam olarak nedir? Ne yapmam gerekir? Yardımcı olursanız sevinirim.
 
Son düzenleyen: Moderatör:
Çözüm
BIOS güncelle, güncelleme sonrası XMP açık Memtest86 testi yap.

Test bittikten sonra veya test sırasında hata alıyorsan fotoğraf çekmeyi unutma!
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff909426870081, Address of the instruction which caused the bugcheck
Arg3: ffffbd887a1cf520, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7B86

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  4.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  M.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450-A PRO MAX (MS-7B86)

BASEBOARD_VERSION:  4.0

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff909426870081

BUGCHECK_P3: ffffbd887a1cf520

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
win32kfull!xxxGetNextSysMsg+45
ffff9094`26870081 4183781000      cmp     dword ptr [r8+10h],0

CONTEXT:  ffffbd887a1cf520 -- (.cxr 0xffffbd887a1cf520)
rax=ffff90b846029830 rbx=ffffbd887a1d0060 rcx=3d7bff3533640000
rdx=0000004000000000 rsi=0000000000000000 rdi=ffff90b844f7f010
rip=ffff909426870081 rsp=ffffbd887a1cff10 rbp=ffffbd887a1d0b80
r8=3d7bff3533640018  r9=ffff90b846923d40 r10=ffff909426bc7aa0
r11=ffffbd887a1cfda0 r12=ffff909426ad9fe8 r13=0000000000000000
r14=0000000000000000 r15=ffff909426b21000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
win32kfull!xxxGetNextSysMsg+0x45:
ffff9094`26870081 4183781000      cmp     dword ptr [r8+10h],0 ds:002b:3d7bff35`33640028=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 10

CPU_MHZ: c80

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  League of Legends.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-15-2019 16:52:03.0669

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from ffff90942686d442 to ffff909426870081

STACK_TEXT:
ffffbd88`7a1cff10 ffff9094`2686d442 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000001 : win32kfull!xxxGetNextSysMsg+0x45
ffffbd88`7a1cff50 ffff9094`26859efb : ffff90b8`44f7f010 ffffbd88`7a1d0b80 00000000`00000001 ffffae79`ca200000 : win32kfull!xxxScanSysQueue+0x422
ffffbd88`7a1d0800 ffff9094`268594f7 : ffffbd88`7a1d0a20 00000000`00000000 00000000`00000000 00000000`0383e0a0 : win32kfull!xxxRealInternalGetMessage+0x98b
ffffbd88`7a1d09e0 fffff805`6cdd2d18 : 00000000`0383e0a0 ffff9a8b`ce970080 ffffbd88`7a1d0aa8 00000000`036e2000 : win32kfull!NtUserPeekMessage+0x157
ffffbd88`7a1d0a90 00007ffc`caa6fcd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0383e068 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`caa6fcd4


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kfull
    ffff90942687018a - win32kfull!xxxGetNextSysMsg+14e
    [ 8f:87 ]
1 error : !win32kfull (ffff90942687018a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xffffbd887a1cf520 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2019-12-15T01:48:06.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  22b0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7B86

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  4.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  M.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450-A PRO MAX (MS-7B86)

BASEBOARD_VERSION:  4.0

ADDITIONAL_DEBUG_TEXT:
You can run '.symfix; .reload' to try to fix the symbol path and load symbols.

WRONG_SYMBOLS_TIMESTAMP: eadcd02b

WRONG_SYMBOLS_SIZE: ab2000

FAULTING_MODULE: fffff80773800000 nt

DEBUG_FLR_IMAGE_TIMESTAMP:  eadcd02b

DUMP_TYPE:  2

BUGCHECK_P1: c0000096

BUGCHECK_P2: fffff80777ca08dd

BUGCHECK_P3: fffffa07c085c050

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xeadcd02b - <Unable to get error code text>

FAULTING_IP:
dxgkrnl!DxgkCheckMonitorPowerState+16d
fffff807`77ca08dd f049ff4618      lock inc qword ptr [r14+18h]

CONTEXT:  fffffa07c085c050 -- (.cxr 0xfffffa07c085c050)
rax=0000000000000001 rbx=0000000040001080 rcx=0000000000040010
rdx=0000000000040010 rsi=ffffba8f9d841760 rdi=ffffffffffffffff
rip=fffff80777ca08dd rsp=fffffa07c085ca40 rbp=fffffa07c085cb80
r8=00000000ffffffff  r9=7fffba8f9d841818 r10=fffff80773906e50
r11=ffffc87e4a000000 r12=0000000000000000 r13=000001a9e9fb8980
r14=ffffa6038c570000 r15=00000003f936f638
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
dxgkrnl!DxgkCheckMonitorPowerState+0x16d:
fffff807`77ca08dd f049ff4618      lock inc qword ptr [r14+18h] ds:002b:ffffa603`8c570018=00000000000026d7
Resetting default scope

BUGCHECK_STR:  EADCD02B

CPU_COUNT: 10

CPU_MHZ: c80

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-15-2019 16:52:16.0878

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff807739cdf98 to fffff80777ca08dd

STACK_TEXT:
fffffa07`c085ca40 fffff807`739cdf98 : 00000000`000304ba ffffa603`8d1a1080 ffffa603`8c570000 00000000`40001080 : dxgkrnl!DxgkCheckMonitorPowerState+0x16d
fffffa07`c085cb00 00000000`000304ba : ffffa603`8d1a1080 ffffa603`8c570000 00000000`40001080 00000003`00000000 : nt+0x1cdf98
fffffa07`c085cb08 ffffa603`8d1a1080 : ffffa603`8c570000 00000000`40001080 00000003`00000000 00001fbf`02010000 : 0x304ba
fffffa07`c085cb10 ffffa603`8c570000 : 00000000`40001080 00000003`00000000 00001fbf`02010000 00000000`000011ab : 0xffffa603`8d1a1080
fffffa07`c085cb18 00000000`40001080 : 00000003`00000000 00001fbf`02010000 00000000`000011ab 00000003`f936ec20 : 0xffffa603`8c570000
fffffa07`c085cb20 00000003`00000000 : 00001fbf`02010000 00000000`000011ab 00000003`f936ec20 000001a9`e9f36400 : 0x40001080
fffffa07`c085cb28 00001fbf`02010000 : 00000000`000011ab 00000003`f936ec20 000001a9`e9f36400 00000000`00000001 : 0x00000003`00000000
fffffa07`c085cb30 00000000`000011ab : 00000003`f936ec20 000001a9`e9f36400 00000000`00000001 00000000`00000000 : 0x00001fbf`02010000
fffffa07`c085cb38 00000003`f936ec20 : 000001a9`e9f36400 00000000`00000001 00000000`00000000 00000000`00000000 : 0x11ab
fffffa07`c085cb40 000001a9`e9f36400 : 00000000`00000001 00000000`00000000 00000000`00000000 00000003`f936e8d0 : 0x00000003`f936ec20
fffffa07`c085cb48 00000000`00000001 : 00000000`00000000 00000000`00000000 00000003`f936e8d0 00000003`f9487000 : 0x000001a9`e9f36400
fffffa07`c085cb50 00000000`00000000 : 00000000`00000000 00000003`f936e8d0 00000003`f9487000 00000000`00000000 : 0x1


THREAD_SHA1_HASH_MOD_FUNC:  dc42c1e2b4307cbbe9143d49cb7020dbf83e8418

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  26f867838c672f326181e1427c3292e258f53b8d

THREAD_SHA1_HASH_MOD:  7c3f789d6a5214d404ab1bf8108e28e878a3dc28

FOLLOWUP_IP:
dxgkrnl!DxgkCheckMonitorPowerState+16d
fffff807`77ca08dd f049ff4618      lock inc qword ptr [r14+18h]

FAULT_INSTR_CODE:  46ff49f0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt_wrong_symbols!EADCD02BAB2000

FOLLOWUP_NAME:  MachineOwner

IMAGE_VERSION:  10.0.18362.145

STACK_COMMAND:  .cxr 0xfffffa07c085c050 ; kb

EXCEPTION_CODE_STR:  EADCD02B

EXCEPTION_STR:  WRONG_SYMBOLS

PROCESS_NAME:  ntoskrnl.wrong.symbols.exe

IMAGE_NAME:  ntoskrnl.wrong.symbols.exe

MODULE_NAME: nt_wrong_symbols

BUCKET_ID:  WRONG_SYMBOLS_X64_18362.1.amd64fre.19h1_release.190318-1202_TIMESTAMP_941111-184915

DEFAULT_BUCKET_ID:  WRONG_SYMBOLS_X64_18362.1.amd64fre.19h1_release.190318-1202_TIMESTAMP_941111-184915

PRIMARY_PROBLEM_CLASS:  WRONG_SYMBOLS

FAILURE_BUCKET_ID:  WRONG_SYMBOLS_X64_18362.1.amd64fre.19h1_release.190318-1202_TIMESTAMP_941111-184915_EADCD02B_nt_wrong_symbols!EADCD02BAB2000

TARGET_TIME:  2019-12-12T21:13:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  15c38

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:wrong_symbols_x64_18362.1.amd64fre.19h1_release.190318-1202_timestamp_941111-184915_eadcd02b_nt_wrong_symbols!eadcd02bab2000

FAILURE_ID_HASH:  {36981398-f663-a775-531f-958b92e22d66}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
    buffer overrun.
Arg2: fffff38c4decfba0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff38c4decfaf8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7B86

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  4.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  M.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450-A PRO MAX (MS-7B86)

BASEBOARD_VERSION:  4.0

DUMP_TYPE:  2

BUGCHECK_P1: 2

BUGCHECK_P2: fffff38c4decfba0

BUGCHECK_P3: fffff38c4decfaf8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd28af9ba2c20 -- (.trap 0xffffd28af9ba2c20)
Unable to read trap frame at ffffd28a`f9ba2c20

EXCEPTION_RECORD:  ffffd28a00000003 -- (.exr 0xffffd28a00000003)
Cannot read Exception record @ ffffd28a00000003

CPU_COUNT: 10

CPU_MHZ: c80

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_STACK_COOKIE_CHECK_FAILURE

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000002

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-15-2019 16:52:07.0519

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff804053d32e9 to fffff804053c14e0

STACK_TEXT:
fffff38c`4decf878 fffff804`053d32e9 : 00000000`00000139 00000000`00000002 fffff38c`4decfba0 fffff38c`4decfaf8 : nt!KeBugCheckEx
fffff38c`4decf880 fffff804`053d3710 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff38c`4decf9c0 fffff804`053d1aa5 : ffff7088`455d3aef ffffd28a`f8dd65c8 fffff38c`4decfd54 00000000`00000004 : nt!KiFastFailDispatch+0xd0
fffff38c`4decfba0 fffff804`0a623235 : fffff804`0a624a06 00000000`00000000 fffff38c`4ded0320 fffff38c`4decfe10 : nt!KiRaiseSecurityCheckFailure+0x325
fffff38c`4decfd38 fffff804`0a624a06 : 00000000`00000000 fffff38c`4ded0320 fffff38c`4decfe10 fffff804`0a882493 : dxgkrnl!_report_gsfailure+0x5
fffff38c`4decfd40 fffff804`0a62499b : fffff38c`4ded0310 fffff804`052c5e34 fffff38c`4ded03f0 00000000`00001128 : dxgkrnl!_GSHandlerCheckCommon+0x5a
fffff38c`4decfd70 fffff804`053ca312 : fffff804`0a6a6000 fffff804`0a600000 00016314`00374000 00000000`0010001f : dxgkrnl!_GSHandlerCheck+0x13
fffff38c`4decfda0 fffff804`052c2fa5 : fffff38c`4ded0d08 00000000`00000000 fffff38c`4ded0310 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
fffff38c`4decfdd0 fffff804`052c753e : fffff38c`4ded0d08 fffff38c`4ded0a50 fffff38c`4ded0d08 ffff8884`1159fb30 : nt!RtlDispatchException+0x4a5
fffff38c`4ded0520 fffff804`053d341d : ffffd28a`00000003 ffffd28a`fc08f710 ffffd28a`f9ba2c20 fffff804`100a5a0f : nt!KiDispatchException+0x16e
fffff38c`4ded0bd0 fffff804`053cd9ab : ffff8884`1159fb01 ffff8884`1159fb30 fffff38c`4ded1638 00000000`00000001 : nt!KiExceptionDispatch+0x11d
fffff38c`4ded0db0 fffff804`0a882493 : fffff38c`4ded10a0 00000000`00000001 fffff38c`4ded1920 fffff38c`4ded1920 : nt!KiInvalidOpcodeFault+0x32b
fffff38c`4ded0f48 fffff38c`4ded1970 : fffff804`0a886604 ffffffff`c000000d fffff38c`4ded1970 00000000`00000001 : dxgkrnl!DXGCONTEXT::PresentMultiPlaneOverlay3+0x48f
fffff38c`4ded1868 fffff804`0a886604 : ffffffff`c000000d fffff38c`4ded1970 00000000`00000001 ffff8884`1159fb30 : 0xfffff38c`4ded1970
fffff38c`4ded1870 fffff804`053d2d18 : ffffd28a`f9909080 ffffd28a`f9909080 00000000`00000000 ffffd28a`fcae9c60 : dxgkrnl!DxgkPresentMultiPlaneOverlay3+0x714
fffff38c`4ded1b00 00007ffc`63e853e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000016`7bf1c6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`63e853e4


THREAD_SHA1_HASH_MOD_FUNC:  bc3876223a37a7da3f93c90dcbc1f83d66a94a53

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a8329166538a4e9e0d5818565c46c7e0f503f2ee

THREAD_SHA1_HASH_MOD:  5209a8b1eaabccde7d9cd706aa41e72169fb8edd

FOLLOWUP_IP:
dxgkrnl!_report_gsfailure+5
fffff804`0a623235 cd29            int     29h

FAULT_INSTR_CODE:  cccc29cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgkrnl!_report_gsfailure+5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_dxgkrnl!_report_gsfailure

BUCKET_ID:  0x139_MISSING_GSFRAME_dxgkrnl!_report_gsfailure

PRIMARY_PROBLEM_CLASS:  0x139_MISSING_GSFRAME_dxgkrnl!_report_gsfailure

TARGET_TIME:  2019-12-14T20:36:49.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  a085

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_missing_gsframe_dxgkrnl!_report_gsfailure

FAILURE_ID_HASH:  {1685fa82-f4b9-d129-b6b1-78c3bba339a9}

Followup:     MachineOwner
---------
BIOS güncelle, güncelleme sonrası XMP açık Memtest86 testi yap.

Test bittikten sonra veya test sırasında hata alıyorsan fotoğraf çekmeyi unutma!
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff909426870081, Address of the instruction which caused the bugcheck
Arg3: ffffbd887a1cf520, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7B86

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  4.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  M.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450-A PRO MAX (MS-7B86)

BASEBOARD_VERSION:  4.0

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff909426870081

BUGCHECK_P3: ffffbd887a1cf520

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
win32kfull!xxxGetNextSysMsg+45
ffff9094`26870081 4183781000      cmp     dword ptr [r8+10h],0

CONTEXT:  ffffbd887a1cf520 -- (.cxr 0xffffbd887a1cf520)
rax=ffff90b846029830 rbx=ffffbd887a1d0060 rcx=3d7bff3533640000
rdx=0000004000000000 rsi=0000000000000000 rdi=ffff90b844f7f010
rip=ffff909426870081 rsp=ffffbd887a1cff10 rbp=ffffbd887a1d0b80
r8=3d7bff3533640018  r9=ffff90b846923d40 r10=ffff909426bc7aa0
r11=ffffbd887a1cfda0 r12=ffff909426ad9fe8 r13=0000000000000000
r14=0000000000000000 r15=ffff909426b21000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
win32kfull!xxxGetNextSysMsg+0x45:
ffff9094`26870081 4183781000      cmp     dword ptr [r8+10h],0 ds:002b:3d7bff35`33640028=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 10

CPU_MHZ: c80

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  League of Legends.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-15-2019 16:52:03.0669

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from ffff90942686d442 to ffff909426870081

STACK_TEXT:
ffffbd88`7a1cff10 ffff9094`2686d442 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000001 : win32kfull!xxxGetNextSysMsg+0x45
ffffbd88`7a1cff50 ffff9094`26859efb : ffff90b8`44f7f010 ffffbd88`7a1d0b80 00000000`00000001 ffffae79`ca200000 : win32kfull!xxxScanSysQueue+0x422
ffffbd88`7a1d0800 ffff9094`268594f7 : ffffbd88`7a1d0a20 00000000`00000000 00000000`00000000 00000000`0383e0a0 : win32kfull!xxxRealInternalGetMessage+0x98b
ffffbd88`7a1d09e0 fffff805`6cdd2d18 : 00000000`0383e0a0 ffff9a8b`ce970080 ffffbd88`7a1d0aa8 00000000`036e2000 : win32kfull!NtUserPeekMessage+0x157
ffffbd88`7a1d0a90 00007ffc`caa6fcd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0383e068 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`caa6fcd4


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kfull
    ffff90942687018a - win32kfull!xxxGetNextSysMsg+14e
    [ 8f:87 ]
1 error : !win32kfull (ffff90942687018a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xffffbd887a1cf520 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2019-12-15T01:48:06.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  22b0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7B86

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  4.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  M.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450-A PRO MAX (MS-7B86)

BASEBOARD_VERSION:  4.0

ADDITIONAL_DEBUG_TEXT:
You can run '.symfix; .reload' to try to fix the symbol path and load symbols.

WRONG_SYMBOLS_TIMESTAMP: eadcd02b

WRONG_SYMBOLS_SIZE: ab2000

FAULTING_MODULE: fffff80773800000 nt

DEBUG_FLR_IMAGE_TIMESTAMP:  eadcd02b

DUMP_TYPE:  2

BUGCHECK_P1: c0000096

BUGCHECK_P2: fffff80777ca08dd

BUGCHECK_P3: fffffa07c085c050

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xeadcd02b - <Unable to get error code text>

FAULTING_IP:
dxgkrnl!DxgkCheckMonitorPowerState+16d
fffff807`77ca08dd f049ff4618      lock inc qword ptr [r14+18h]

CONTEXT:  fffffa07c085c050 -- (.cxr 0xfffffa07c085c050)
rax=0000000000000001 rbx=0000000040001080 rcx=0000000000040010
rdx=0000000000040010 rsi=ffffba8f9d841760 rdi=ffffffffffffffff
rip=fffff80777ca08dd rsp=fffffa07c085ca40 rbp=fffffa07c085cb80
r8=00000000ffffffff  r9=7fffba8f9d841818 r10=fffff80773906e50
r11=ffffc87e4a000000 r12=0000000000000000 r13=000001a9e9fb8980
r14=ffffa6038c570000 r15=00000003f936f638
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
dxgkrnl!DxgkCheckMonitorPowerState+0x16d:
fffff807`77ca08dd f049ff4618      lock inc qword ptr [r14+18h] ds:002b:ffffa603`8c570018=00000000000026d7
Resetting default scope

BUGCHECK_STR:  EADCD02B

CPU_COUNT: 10

CPU_MHZ: c80

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-15-2019 16:52:16.0878

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff807739cdf98 to fffff80777ca08dd

STACK_TEXT:
fffffa07`c085ca40 fffff807`739cdf98 : 00000000`000304ba ffffa603`8d1a1080 ffffa603`8c570000 00000000`40001080 : dxgkrnl!DxgkCheckMonitorPowerState+0x16d
fffffa07`c085cb00 00000000`000304ba : ffffa603`8d1a1080 ffffa603`8c570000 00000000`40001080 00000003`00000000 : nt+0x1cdf98
fffffa07`c085cb08 ffffa603`8d1a1080 : ffffa603`8c570000 00000000`40001080 00000003`00000000 00001fbf`02010000 : 0x304ba
fffffa07`c085cb10 ffffa603`8c570000 : 00000000`40001080 00000003`00000000 00001fbf`02010000 00000000`000011ab : 0xffffa603`8d1a1080
fffffa07`c085cb18 00000000`40001080 : 00000003`00000000 00001fbf`02010000 00000000`000011ab 00000003`f936ec20 : 0xffffa603`8c570000
fffffa07`c085cb20 00000003`00000000 : 00001fbf`02010000 00000000`000011ab 00000003`f936ec20 000001a9`e9f36400 : 0x40001080
fffffa07`c085cb28 00001fbf`02010000 : 00000000`000011ab 00000003`f936ec20 000001a9`e9f36400 00000000`00000001 : 0x00000003`00000000
fffffa07`c085cb30 00000000`000011ab : 00000003`f936ec20 000001a9`e9f36400 00000000`00000001 00000000`00000000 : 0x00001fbf`02010000
fffffa07`c085cb38 00000003`f936ec20 : 000001a9`e9f36400 00000000`00000001 00000000`00000000 00000000`00000000 : 0x11ab
fffffa07`c085cb40 000001a9`e9f36400 : 00000000`00000001 00000000`00000000 00000000`00000000 00000003`f936e8d0 : 0x00000003`f936ec20
fffffa07`c085cb48 00000000`00000001 : 00000000`00000000 00000000`00000000 00000003`f936e8d0 00000003`f9487000 : 0x000001a9`e9f36400
fffffa07`c085cb50 00000000`00000000 : 00000000`00000000 00000003`f936e8d0 00000003`f9487000 00000000`00000000 : 0x1


THREAD_SHA1_HASH_MOD_FUNC:  dc42c1e2b4307cbbe9143d49cb7020dbf83e8418

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  26f867838c672f326181e1427c3292e258f53b8d

THREAD_SHA1_HASH_MOD:  7c3f789d6a5214d404ab1bf8108e28e878a3dc28

FOLLOWUP_IP:
dxgkrnl!DxgkCheckMonitorPowerState+16d
fffff807`77ca08dd f049ff4618      lock inc qword ptr [r14+18h]

FAULT_INSTR_CODE:  46ff49f0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt_wrong_symbols!EADCD02BAB2000

FOLLOWUP_NAME:  MachineOwner

IMAGE_VERSION:  10.0.18362.145

STACK_COMMAND:  .cxr 0xfffffa07c085c050 ; kb

EXCEPTION_CODE_STR:  EADCD02B

EXCEPTION_STR:  WRONG_SYMBOLS

PROCESS_NAME:  ntoskrnl.wrong.symbols.exe

IMAGE_NAME:  ntoskrnl.wrong.symbols.exe

MODULE_NAME: nt_wrong_symbols

BUCKET_ID:  WRONG_SYMBOLS_X64_18362.1.amd64fre.19h1_release.190318-1202_TIMESTAMP_941111-184915

DEFAULT_BUCKET_ID:  WRONG_SYMBOLS_X64_18362.1.amd64fre.19h1_release.190318-1202_TIMESTAMP_941111-184915

PRIMARY_PROBLEM_CLASS:  WRONG_SYMBOLS

FAILURE_BUCKET_ID:  WRONG_SYMBOLS_X64_18362.1.amd64fre.19h1_release.190318-1202_TIMESTAMP_941111-184915_EADCD02B_nt_wrong_symbols!EADCD02BAB2000

TARGET_TIME:  2019-12-12T21:13:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  15c38

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:wrong_symbols_x64_18362.1.amd64fre.19h1_release.190318-1202_timestamp_941111-184915_eadcd02b_nt_wrong_symbols!eadcd02bab2000

FAILURE_ID_HASH:  {36981398-f663-a775-531f-958b92e22d66}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
    buffer overrun.
Arg2: fffff38c4decfba0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff38c4decfaf8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7B86

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  4.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  M.50

BIOS_DATE:  11/07/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B450-A PRO MAX (MS-7B86)

BASEBOARD_VERSION:  4.0

DUMP_TYPE:  2

BUGCHECK_P1: 2

BUGCHECK_P2: fffff38c4decfba0

BUGCHECK_P3: fffff38c4decfaf8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd28af9ba2c20 -- (.trap 0xffffd28af9ba2c20)
Unable to read trap frame at ffffd28a`f9ba2c20

EXCEPTION_RECORD:  ffffd28a00000003 -- (.exr 0xffffd28a00000003)
Cannot read Exception record @ ffffd28a00000003

CPU_COUNT: 10

CPU_MHZ: c80

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_STACK_COOKIE_CHECK_FAILURE

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000002

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-15-2019 16:52:07.0519

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff804053d32e9 to fffff804053c14e0

STACK_TEXT:
fffff38c`4decf878 fffff804`053d32e9 : 00000000`00000139 00000000`00000002 fffff38c`4decfba0 fffff38c`4decfaf8 : nt!KeBugCheckEx
fffff38c`4decf880 fffff804`053d3710 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff38c`4decf9c0 fffff804`053d1aa5 : ffff7088`455d3aef ffffd28a`f8dd65c8 fffff38c`4decfd54 00000000`00000004 : nt!KiFastFailDispatch+0xd0
fffff38c`4decfba0 fffff804`0a623235 : fffff804`0a624a06 00000000`00000000 fffff38c`4ded0320 fffff38c`4decfe10 : nt!KiRaiseSecurityCheckFailure+0x325
fffff38c`4decfd38 fffff804`0a624a06 : 00000000`00000000 fffff38c`4ded0320 fffff38c`4decfe10 fffff804`0a882493 : dxgkrnl!_report_gsfailure+0x5
fffff38c`4decfd40 fffff804`0a62499b : fffff38c`4ded0310 fffff804`052c5e34 fffff38c`4ded03f0 00000000`00001128 : dxgkrnl!_GSHandlerCheckCommon+0x5a
fffff38c`4decfd70 fffff804`053ca312 : fffff804`0a6a6000 fffff804`0a600000 00016314`00374000 00000000`0010001f : dxgkrnl!_GSHandlerCheck+0x13
fffff38c`4decfda0 fffff804`052c2fa5 : fffff38c`4ded0d08 00000000`00000000 fffff38c`4ded0310 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
fffff38c`4decfdd0 fffff804`052c753e : fffff38c`4ded0d08 fffff38c`4ded0a50 fffff38c`4ded0d08 ffff8884`1159fb30 : nt!RtlDispatchException+0x4a5
fffff38c`4ded0520 fffff804`053d341d : ffffd28a`00000003 ffffd28a`fc08f710 ffffd28a`f9ba2c20 fffff804`100a5a0f : nt!KiDispatchException+0x16e
fffff38c`4ded0bd0 fffff804`053cd9ab : ffff8884`1159fb01 ffff8884`1159fb30 fffff38c`4ded1638 00000000`00000001 : nt!KiExceptionDispatch+0x11d
fffff38c`4ded0db0 fffff804`0a882493 : fffff38c`4ded10a0 00000000`00000001 fffff38c`4ded1920 fffff38c`4ded1920 : nt!KiInvalidOpcodeFault+0x32b
fffff38c`4ded0f48 fffff38c`4ded1970 : fffff804`0a886604 ffffffff`c000000d fffff38c`4ded1970 00000000`00000001 : dxgkrnl!DXGCONTEXT::PresentMultiPlaneOverlay3+0x48f
fffff38c`4ded1868 fffff804`0a886604 : ffffffff`c000000d fffff38c`4ded1970 00000000`00000001 ffff8884`1159fb30 : 0xfffff38c`4ded1970
fffff38c`4ded1870 fffff804`053d2d18 : ffffd28a`f9909080 ffffd28a`f9909080 00000000`00000000 ffffd28a`fcae9c60 : dxgkrnl!DxgkPresentMultiPlaneOverlay3+0x714
fffff38c`4ded1b00 00007ffc`63e853e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000016`7bf1c6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`63e853e4


THREAD_SHA1_HASH_MOD_FUNC:  bc3876223a37a7da3f93c90dcbc1f83d66a94a53

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a8329166538a4e9e0d5818565c46c7e0f503f2ee

THREAD_SHA1_HASH_MOD:  5209a8b1eaabccde7d9cd706aa41e72169fb8edd

FOLLOWUP_IP:
dxgkrnl!_report_gsfailure+5
fffff804`0a623235 cd29            int     29h

FAULT_INSTR_CODE:  cccc29cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgkrnl!_report_gsfailure+5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_dxgkrnl!_report_gsfailure

BUCKET_ID:  0x139_MISSING_GSFRAME_dxgkrnl!_report_gsfailure

PRIMARY_PROBLEM_CLASS:  0x139_MISSING_GSFRAME_dxgkrnl!_report_gsfailure

TARGET_TIME:  2019-12-14T20:36:49.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  a085

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_missing_gsframe_dxgkrnl!_report_gsfailure

FAILURE_ID_HASH:  {1685fa82-f4b9-d129-b6b1-78c3bba339a9}

Followup:     MachineOwner
---------
 
Son düzenleme:
Çözüm
Dediklerinizi aynen uyguladım. Memtest86 testinde aldığım hataların fotoğrafını ekledim. Ne yapmam gerekli?
 

Dosya Ekleri

  • 20191215_225025.jpg
    2,1 MB · Görüntüleme: 59
  • 20191215_225047.jpg
    2,1 MB · Görüntüleme: 58
  • 20191215_225105.jpg
    1,9 MB · Görüntüleme: 37
  • aaa.jpg
    1,2 MB · Görüntüleme: 57
Xmp kapalıyken hata almadım 2. teste kadar, ben de kapadım. Sabah ise bir ampül yandı kafamda . Anakart'ın desteklediği Ddr memory kapasiteleri arasında 3600Mhz yer almıyor. Ram konusunda hatalı seçim yapmışım. Desteğiniz için teşekkür ederim! Ramleri değiştirmeye gidiyorum.
 
Tavsiyenize uyacağım. Teşekkürler!
Elle çektim 3466ya ancak OC ayarları içerisinde geçiyor. Bu işlem ileride anakarta zarar verir mi?
 

Dosya Ekleri

  • 15764826612142693878907032374026.jpg
    1,6 MB · Görüntüleme: 61
Son düzenleme:
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…