Oyunlar kapanıyor sinyal yok hatası

Çözünürlük değişiyor o sırada, masaüstü geliyorsa sonra sıkıntı olmaz ama sistem kapanıyor ve görüntü gelmiyorsa sıkıntı vardır, dosya paylaşımı kapalı sanırsam.
 
Bazen masaütsüne atıyor oyun kapanıyor. Bazen de ekran tamamen gidiyor kasa çalışmaya devam ediyor ve kapatıp açmadan düzelmiyor. Garantiye göndersem mi iade için?
 
Masaüstüne atıyorsa sıkıntı etmeye gerek yok derdim ama kapatıp açmadan düzelmiyorsa orada bir sıkıntı var derim, minidump dosyası sanırım gönderdiğiniz dosya ama Google Drive hata veriyor (sanırım link hatalı veya paylaşım kapalı), iade etme şansınız varsa edin veya değişim talep edin.
Bazen masaütsüne atıyor oyun kapanıyor. Bazen de ekran tamamen gidiyor kasa çalışmaya devam ediyor ve kapatıp açmadan düzelmiyor. Garantiye göndersem mi iade için?
 
Memtest86 testi yapar mısın?
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000ffffa1f9, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80218042cb6, address which referenced memory

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

DUMP_TYPE:  2

BUGCHECK_P1: ffffa1f9

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80218042cb6

READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
 00000000ffffa1f9

CURRENT_IRQL:  0

FAULTING_IP:
+0
fffff802`18042cb6 ??              ???

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CORRUPT_MODULELIST_AV

BUGCHECK_STR:  AV

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-28-2019 18:29:42.0185

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff802181d1ae9 to fffff802181bfcc0

STACK_TEXT: 
ffff8583`a51e6ab8 fffff802`181d1ae9 : 00000000`0000000a 00000000`ffffa1f9 00000000`00000002 00000000`00000000 : 0xfffff802`181bfcc0
ffff8583`a51e6ac0 00000000`0000000a : 00000000`ffffa1f9 00000000`00000002 00000000`00000000 fffff802`18042cb6 : 0xfffff802`181d1ae9
ffff8583`a51e6ac8 00000000`ffffa1f9 : 00000000`00000002 00000000`00000000 fffff802`18042cb6 00000028`00000000 : 0xa
ffff8583`a51e6ad0 00000000`00000002 : 00000000`00000000 fffff802`18042cb6 00000028`00000000 e160e525`169b235d : 0xffffa1f9
ffff8583`a51e6ad8 00000000`00000000 : fffff802`18042cb6 00000028`00000000 e160e525`169b235d 634ad035`042103c7 : 0x2


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  CORRUPT_MODULELIST_AV

PRIMARY_PROBLEM_CLASS:  CORRUPT_MODULELIST_AV

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_AV

TARGET_TIME:  2019-09-06T18:28:40.000Z

OSBUILD:  18362

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

ANALYSIS_SESSION_ELAPSED_TIME:  f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:corrupt_modulelist_av

FAILURE_ID_HASH:  {fc259191-ef0c-6215-476f-d32e5dcaf1b7}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000ffffb882, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8076d242400, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1005

BIOS_DATE:  08/02/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME X570-P

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: ffffb882

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8076d242400

READ_ADDRESS: fffff8076d7723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 00000000ffffb882

CURRENT_IRQL:  2

FAULTING_IP:
nt!RtlpHpVsFreeChunkInsert+170
fffff807`6d242400 8b4af8          mov     ecx,dword ptr [rdx-8]

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-28-2019 18:29:44.0839

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff80772866d70 -- (.trap 0xfffff80772866d70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffb88a rbx=0000000000000000 rcx=0000000000830000
rdx=00000000ffffb88a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076d242400 rsp=fffff80772866f00 rbp=ffffb88a07010280
 r8=00000000008b0001  r9=3dea7b975c0a4ae2 r10=0000000000000000
r11=ffffb88a07010290 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!RtlpHpVsFreeChunkInsert+0x170:
fffff807`6d242400 8b4af8          mov     ecx,dword ptr [rdx-8] ds:00000000`ffffb882=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8076d3d2ee9 to fffff8076d3c10a0

STACK_TEXT: 
fffff807`72866c28 fffff807`6d3d2ee9 : 00000000`0000000a 00000000`ffffb882 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff807`72866c30 fffff807`6d3cf22b : 00000000`00000000 fffff807`6dcb6c53 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`72866d70 fffff807`6d242400 : 00000000`00000000 ffffb88a`0d6a6410 00000000`00002bed ffffb88a`19fe3fe0 : nt!KiPageFault+0x46b
fffff807`72866f00 fffff807`6d243fb2 : ffffb88a`19fd5000 ffffb88a`07010280 ffffb88a`19fe3e70 ffffb88a`19fd5000 : nt!RtlpHpVsFreeChunkInsert+0x170
fffff807`72866f30 fffff807`6d2460ad : ffffb88a`000000a2 fffff807`00000000 ffffb88a`1539e8b0 fffff807`00000000 : nt!RtlpHpVsContextFree+0x302
fffff807`72866fd0 fffff807`6d56e0a9 : 00000000`00000000 00000000`00000450 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x56d
fffff807`728670f0 fffff807`6d23171b : ffffb88a`17d69b58 00000000`00000001 ffffb88a`17d69b58 00000000`00000002 : nt!ExFreePool+0x9
fffff807`72867120 fffff807`6d247d01 : 00000000`00000002 ffffb88a`10111010 ffffb88a`10111010 ffffb88a`10111010 : nt!IopFreeIrp+0x1ab
fffff807`72867160 fffff807`6d247667 : ffffb88a`00000001 ffffb88a`0d36e101 ffffb88a`00000000 ffffb88a`101111b8 : nt!IopfCompleteRequest+0x681
fffff807`72867270 fffff807`72216e45 : 000002b1`477e1b66 ffffb88a`1977f9e0 fffff807`728673a0 ffffb88a`1977f9e0 : nt!IofCompleteRequest+0x17
fffff807`728672a0 fffff807`6d247799 : ffffb88a`12b2866b 000002c8`00000000 fffff807`728675b8 ffffb88a`00000000 : CLASSPNP!TransferPktComplete+0x645
fffff807`728674a0 fffff807`6d247667 : 00000000`01008000 ffffb88a`00000201 ffffb88a`09a091a0 01000000`00100000 : nt!IopfCompleteRequest+0x119
fffff807`728675b0 fffff807`715799a2 : fffff807`6dcc0920 ffffb88a`099c5040 fffff807`728677b0 00000000`00000000 : nt!IofCompleteRequest+0x17
fffff807`728675e0 fffff807`7157928a : 00000000`00000000 00000000`00989680 fffff807`728677b0 ffffa500`9d0b2ef0 : storport!RaidCompleteRequestEx+0x92
fffff807`728676b0 fffff807`7158d60b : ffffb88a`0dfef178 00000000`00000000 00000000`00000000 00000000`00000000 : storport!RaidUnitCompleteRequest+0x5da
fffff807`72867850 fffff807`6d26b065 : ffffb88a`099da000 00000000`00000001 fffff807`728678a8 00000000`00000000 : storport!RaidpAdapterRedirectDpcRoutine+0x8b
fffff807`728678f0 fffff807`6d26a6bf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
fffff807`72867a30 fffff807`6d3c4be4 : 00000000`00000000 fffff807`6ac3b180 fffff807`6d790400 ffffb88a`159b4680 : nt!KiRetireDpcList+0x1ef
fffff807`72867c60 00000000`00000000 : fffff807`72868000 fffff807`72862000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84


THREAD_SHA1_HASH_MOD_FUNC:  a94082232eca6b95de04de3544667deb7f9674ed

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  55edd50d5671c740a0984858021c3d53a86023fe

THREAD_SHA1_HASH_MOD:  be8ee3bab5ac6018a7cc89b0d69661e74bafaaf3

FOLLOWUP_IP:
nt!ExFreePool+9
fffff807`6d56e0a9 4883c428        add     rsp,28h

FAULT_INSTR_CODE:  28c48348

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  nt!ExFreePool+9

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.356

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_nt!ExFreePool

BUCKET_ID:  AV_nt!ExFreePool

PRIMARY_PROBLEM_CLASS:  AV_nt!ExFreePool

TARGET_TIME:  2019-09-24T19:05:50.000Z

OSBUILD:  18362

OSSERVICEPACK:  356

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  7a4d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!exfreepool

FAILURE_ID_HASH:  {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}

Followup:     Pool_corruption
---------
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffbe0557b870c0, The address of the thread.
Arg2: ffffd53cc4c67078, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1404

BIOS_DATE:  11/08/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME X570-P

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: ffffbe0557b870c0

BUGCHECK_P2: ffffd53cc4c67078

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x192

PROCESS_NAME:  Steam.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-28-2019 18:29:48.0495

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8040ae39c75 to fffff8040afc14e0

STACK_TEXT: 
ffffe68a`b7a4c3f8 fffff804`0ae39c75 : 00000000`00000192 ffffbe05`57b870c0 ffffd53c`c4c67078 00000000`00000000 : nt!KeBugCheckEx
ffffe68a`b7a4c400 ffffd503`32c56932 : ffffd53c`c4c67020 ffffd53c`00000000 00000000`00000000 00000000`400f0f2a : nt!ExAcquirePushLockExclusiveEx+0x145
ffffe68a`b7a4c440 ffffd503`32c4fb15 : 00000000`000008c0 ffffe68a`b7a47000 ffffe68a`b7a4d000 00000000`00000000 : win32kfull!GreUpdateSpriteInternal+0x252
ffffe68a`b7a4c690 ffffd503`32c4d59e : ffffe68a`b7a4cc10 ffffd53c`c66ac620 ffffe68a`b7a4cc10 ffffd503`331c4aa0 : win32kfull!GreUpdateSpriteDevLockEnd+0x1b5
ffffe68a`b7a4c980 ffffd503`32c58403 : ffffd53c`c4b32000 ffffd53c`c3e27900 00000000`00000000 00000000`00000000 : win32kfull!DEVLOCKBLTOBJ::~DEVLOCKBLTOBJ+0x14e
ffffe68a`b7a4ca30 ffffd503`32d004fb : 00000000`00e660b8 ffffe68a`b7a4cd00 fffff804`0ae36960 ffffd503`32ffde41 : win32kfull!NtGdiBitBltInternal+0xad3
ffffe68a`b7a4cd60 fffff804`0afd2d18 : 00000000`00000020 ffffd503`32c4709e ffffbe05`57b870c0 ffffd53c`c0911000 : win32kfull!NtGdiBitBlt+0x5b
ffffe68a`b7a4cdd0 00007ffb`749efdb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0063c8a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`749efdb4


THREAD_SHA1_HASH_MOD_FUNC:  7536c886c443a0fbfd0ddc0e449662b05a8d9030

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  80c526b398100591ecee148642f92bc53619c753

THREAD_SHA1_HASH_MOD:  4fde9e56ff1f90cca0839847b6728a9769306bd5

FOLLOWUP_IP:
win32kfull!GreUpdateSpriteInternal+252
ffffd503`32c56932 488b8ba8000000  mov     rcx,qword ptr [rbx+0A8h]

FAULT_INSTR_CODE:  a88b8b48

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  win32kfull!GreUpdateSpriteInternal+252

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  252

FAILURE_BUCKET_ID:  0x192_win32kfull!GreUpdateSpriteInternal

BUCKET_ID:  0x192_win32kfull!GreUpdateSpriteInternal

PRIMARY_PROBLEM_CLASS:  0x192_win32kfull!GreUpdateSpriteInternal

TARGET_TIME:  2019-12-02T13:49:29.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5613

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x192_win32kfull!greupdatespriteinternal

FAILURE_ID_HASH:  {6d016e5d-db8f-06f7-61b8-ec8816b15658}

Followup:     MachineOwner
---------
 
Memtest86 testi yapar mısın?
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000ffffa1f9, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80218042cb6, address which referenced memory

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

DUMP_TYPE:  2

BUGCHECK_P1: ffffa1f9

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80218042cb6

READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
00000000ffffa1f9

CURRENT_IRQL:  0

FAULTING_IP:
+0
fffff802`18042cb6 ??              ???

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CORRUPT_MODULELIST_AV

BUGCHECK_STR:  AV

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-28-2019 18:29:42.0185

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff802181d1ae9 to fffff802181bfcc0

STACK_TEXT:
ffff8583`a51e6ab8 fffff802`181d1ae9 : 00000000`0000000a 00000000`ffffa1f9 00000000`00000002 00000000`00000000 : 0xfffff802`181bfcc0
ffff8583`a51e6ac0 00000000`0000000a : 00000000`ffffa1f9 00000000`00000002 00000000`00000000 fffff802`18042cb6 : 0xfffff802`181d1ae9
ffff8583`a51e6ac8 00000000`ffffa1f9 : 00000000`00000002 00000000`00000000 fffff802`18042cb6 00000028`00000000 : 0xa
ffff8583`a51e6ad0 00000000`00000002 : 00000000`00000000 fffff802`18042cb6 00000028`00000000 e160e525`169b235d : 0xffffa1f9
ffff8583`a51e6ad8 00000000`00000000 : fffff802`18042cb6 00000028`00000000 e160e525`169b235d 634ad035`042103c7 : 0x2


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  CORRUPT_MODULELIST_AV

PRIMARY_PROBLEM_CLASS:  CORRUPT_MODULELIST_AV

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_AV

TARGET_TIME:  2019-09-06T18:28:40.000Z

OSBUILD:  18362

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

ANALYSIS_SESSION_ELAPSED_TIME:  f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:corrupt_modulelist_av

FAILURE_ID_HASH:  {fc259191-ef0c-6215-476f-d32e5dcaf1b7}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000ffffb882, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8076d242400, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1005

BIOS_DATE:  08/02/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME X570-P

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: ffffb882

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8076d242400

READ_ADDRESS: fffff8076d7723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000ffffb882

CURRENT_IRQL:  2

FAULTING_IP:
nt!RtlpHpVsFreeChunkInsert+170
fffff807`6d242400 8b4af8          mov     ecx,dword ptr [rdx-8]

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-28-2019 18:29:44.0839

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff80772866d70 -- (.trap 0xfffff80772866d70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffb88a rbx=0000000000000000 rcx=0000000000830000
rdx=00000000ffffb88a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076d242400 rsp=fffff80772866f00 rbp=ffffb88a07010280
r8=00000000008b0001  r9=3dea7b975c0a4ae2 r10=0000000000000000
r11=ffffb88a07010290 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!RtlpHpVsFreeChunkInsert+0x170:
fffff807`6d242400 8b4af8          mov     ecx,dword ptr [rdx-8] ds:00000000`ffffb882=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8076d3d2ee9 to fffff8076d3c10a0

STACK_TEXT:
fffff807`72866c28 fffff807`6d3d2ee9 : 00000000`0000000a 00000000`ffffb882 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff807`72866c30 fffff807`6d3cf22b : 00000000`00000000 fffff807`6dcb6c53 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`72866d70 fffff807`6d242400 : 00000000`00000000 ffffb88a`0d6a6410 00000000`00002bed ffffb88a`19fe3fe0 : nt!KiPageFault+0x46b
fffff807`72866f00 fffff807`6d243fb2 : ffffb88a`19fd5000 ffffb88a`07010280 ffffb88a`19fe3e70 ffffb88a`19fd5000 : nt!RtlpHpVsFreeChunkInsert+0x170
fffff807`72866f30 fffff807`6d2460ad : ffffb88a`000000a2 fffff807`00000000 ffffb88a`1539e8b0 fffff807`00000000 : nt!RtlpHpVsContextFree+0x302
fffff807`72866fd0 fffff807`6d56e0a9 : 00000000`00000000 00000000`00000450 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x56d
fffff807`728670f0 fffff807`6d23171b : ffffb88a`17d69b58 00000000`00000001 ffffb88a`17d69b58 00000000`00000002 : nt!ExFreePool+0x9
fffff807`72867120 fffff807`6d247d01 : 00000000`00000002 ffffb88a`10111010 ffffb88a`10111010 ffffb88a`10111010 : nt!IopFreeIrp+0x1ab
fffff807`72867160 fffff807`6d247667 : ffffb88a`00000001 ffffb88a`0d36e101 ffffb88a`00000000 ffffb88a`101111b8 : nt!IopfCompleteRequest+0x681
fffff807`72867270 fffff807`72216e45 : 000002b1`477e1b66 ffffb88a`1977f9e0 fffff807`728673a0 ffffb88a`1977f9e0 : nt!IofCompleteRequest+0x17
fffff807`728672a0 fffff807`6d247799 : ffffb88a`12b2866b 000002c8`00000000 fffff807`728675b8 ffffb88a`00000000 : CLASSPNP!TransferPktComplete+0x645
fffff807`728674a0 fffff807`6d247667 : 00000000`01008000 ffffb88a`00000201 ffffb88a`09a091a0 01000000`00100000 : nt!IopfCompleteRequest+0x119
fffff807`728675b0 fffff807`715799a2 : fffff807`6dcc0920 ffffb88a`099c5040 fffff807`728677b0 00000000`00000000 : nt!IofCompleteRequest+0x17
fffff807`728675e0 fffff807`7157928a : 00000000`00000000 00000000`00989680 fffff807`728677b0 ffffa500`9d0b2ef0 : storport!RaidCompleteRequestEx+0x92
fffff807`728676b0 fffff807`7158d60b : ffffb88a`0dfef178 00000000`00000000 00000000`00000000 00000000`00000000 : storport!RaidUnitCompleteRequest+0x5da
fffff807`72867850 fffff807`6d26b065 : ffffb88a`099da000 00000000`00000001 fffff807`728678a8 00000000`00000000 : storport!RaidpAdapterRedirectDpcRoutine+0x8b
fffff807`728678f0 fffff807`6d26a6bf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
fffff807`72867a30 fffff807`6d3c4be4 : 00000000`00000000 fffff807`6ac3b180 fffff807`6d790400 ffffb88a`159b4680 : nt!KiRetireDpcList+0x1ef
fffff807`72867c60 00000000`00000000 : fffff807`72868000 fffff807`72862000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84


THREAD_SHA1_HASH_MOD_FUNC:  a94082232eca6b95de04de3544667deb7f9674ed

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  55edd50d5671c740a0984858021c3d53a86023fe

THREAD_SHA1_HASH_MOD:  be8ee3bab5ac6018a7cc89b0d69661e74bafaaf3

FOLLOWUP_IP:
nt!ExFreePool+9
fffff807`6d56e0a9 4883c428        add     rsp,28h

FAULT_INSTR_CODE:  28c48348

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  nt!ExFreePool+9

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.356

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_nt!ExFreePool

BUCKET_ID:  AV_nt!ExFreePool

PRIMARY_PROBLEM_CLASS:  AV_nt!ExFreePool

TARGET_TIME:  2019-09-24T19:05:50.000Z

OSBUILD:  18362

OSSERVICEPACK:  356

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  7a4d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!exfreepool

FAILURE_ID_HASH:  {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}

Followup:     Pool_corruption
---------
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffbe0557b870c0, The address of the thread.
Arg2: ffffd53cc4c67078, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1404

BIOS_DATE:  11/08/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME X570-P

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: ffffbe0557b870c0

BUGCHECK_P2: ffffd53cc4c67078

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x192

PROCESS_NAME:  Steam.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-28-2019 18:29:48.0495

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8040ae39c75 to fffff8040afc14e0

STACK_TEXT:
ffffe68a`b7a4c3f8 fffff804`0ae39c75 : 00000000`00000192 ffffbe05`57b870c0 ffffd53c`c4c67078 00000000`00000000 : nt!KeBugCheckEx
ffffe68a`b7a4c400 ffffd503`32c56932 : ffffd53c`c4c67020 ffffd53c`00000000 00000000`00000000 00000000`400f0f2a : nt!ExAcquirePushLockExclusiveEx+0x145
ffffe68a`b7a4c440 ffffd503`32c4fb15 : 00000000`000008c0 ffffe68a`b7a47000 ffffe68a`b7a4d000 00000000`00000000 : win32kfull!GreUpdateSpriteInternal+0x252
ffffe68a`b7a4c690 ffffd503`32c4d59e : ffffe68a`b7a4cc10 ffffd53c`c66ac620 ffffe68a`b7a4cc10 ffffd503`331c4aa0 : win32kfull!GreUpdateSpriteDevLockEnd+0x1b5
ffffe68a`b7a4c980 ffffd503`32c58403 : ffffd53c`c4b32000 ffffd53c`c3e27900 00000000`00000000 00000000`00000000 : win32kfull!DEVLOCKBLTOBJ::~DEVLOCKBLTOBJ+0x14e
ffffe68a`b7a4ca30 ffffd503`32d004fb : 00000000`00e660b8 ffffe68a`b7a4cd00 fffff804`0ae36960 ffffd503`32ffde41 : win32kfull!NtGdiBitBltInternal+0xad3
ffffe68a`b7a4cd60 fffff804`0afd2d18 : 00000000`00000020 ffffd503`32c4709e ffffbe05`57b870c0 ffffd53c`c0911000 : win32kfull!NtGdiBitBlt+0x5b
ffffe68a`b7a4cdd0 00007ffb`749efdb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0063c8a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`749efdb4


THREAD_SHA1_HASH_MOD_FUNC:  7536c886c443a0fbfd0ddc0e449662b05a8d9030

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  80c526b398100591ecee148642f92bc53619c753

THREAD_SHA1_HASH_MOD:  4fde9e56ff1f90cca0839847b6728a9769306bd5

FOLLOWUP_IP:
win32kfull!GreUpdateSpriteInternal+252
ffffd503`32c56932 488b8ba8000000  mov     rcx,qword ptr [rbx+0A8h]

FAULT_INSTR_CODE:  a88b8b48

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  win32kfull!GreUpdateSpriteInternal+252

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  252

FAILURE_BUCKET_ID:  0x192_win32kfull!GreUpdateSpriteInternal

BUCKET_ID:  0x192_win32kfull!GreUpdateSpriteInternal

PRIMARY_PROBLEM_CLASS:  0x192_win32kfull!GreUpdateSpriteInternal

TARGET_TIME:  2019-12-02T13:49:29.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5613

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x192_win32kfull!greupdatespriteinternal

FAILURE_ID_HASH:  {6d016e5d-db8f-06f7-61b8-ec8816b15658}

Followup:     MachineOwner
---------
Kartı garantiye gönderdiğim için yapamadım testi hatalar RAM kaynaklı mı?
 
Son düzenleyen: Moderatör:
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı