Bazen oyunlar kapanıyor ve monitörde sinyal yok yazısı çıkıyor. Oluşan minidump dosyalarının linkini paylaşıyorum. Ekran kartıyla ilgili bi durum varsa yardımlarınızı bekliyorum. Yeni klasör (3).rar
Bazen masaütsüne atıyor oyun kapanıyor. Bazen de ekran tamamen gidiyor kasa çalışmaya devam ediyor ve kapatıp açmadan düzelmiyor. Garantiye göndersem mi iade için?
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000ffffa1f9, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80218042cb6, address which referenced memory
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE: 2
BUGCHECK_P1: ffffa1f9
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80218042cb6
READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
00000000ffffa1f9
CURRENT_IRQL: 0
FAULTING_IP:
+0
fffff802`18042cb6 ?? ???
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_AV
BUGCHECK_STR: AV
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-28-2019 18:29:42.0185
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff802181d1ae9 to fffff802181bfcc0
STACK_TEXT:
ffff8583`a51e6ab8 fffff802`181d1ae9 : 00000000`0000000a 00000000`ffffa1f9 00000000`00000002 00000000`00000000 : 0xfffff802`181bfcc0
ffff8583`a51e6ac0 00000000`0000000a : 00000000`ffffa1f9 00000000`00000002 00000000`00000000 fffff802`18042cb6 : 0xfffff802`181d1ae9
ffff8583`a51e6ac8 00000000`ffffa1f9 : 00000000`00000002 00000000`00000000 fffff802`18042cb6 00000028`00000000 : 0xa
ffff8583`a51e6ad0 00000000`00000002 : 00000000`00000000 fffff802`18042cb6 00000028`00000000 e160e525`169b235d : 0xffffa1f9
ffff8583`a51e6ad8 00000000`00000000 : fffff802`18042cb6 00000028`00000000 e160e525`169b235d 634ad035`042103c7 : 0x2
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID: CORRUPT_MODULELIST_AV
PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_AV
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV
TARGET_TIME: 2019-09-06T18:28:40.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
ANALYSIS_SESSION_ELAPSED_TIME: f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:corrupt_modulelist_av
FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000ffffb882, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8076d242400, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1005
BIOS_DATE: 08/02/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X570-P
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: ffffb882
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8076d242400
READ_ADDRESS: fffff8076d7723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000ffffb882
CURRENT_IRQL: 2
FAULTING_IP:
nt!RtlpHpVsFreeChunkInsert+170
fffff807`6d242400 8b4af8 mov ecx,dword ptr [rdx-8]
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-28-2019 18:29:44.0839
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffff80772866d70 -- (.trap 0xfffff80772866d70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffb88a rbx=0000000000000000 rcx=0000000000830000
rdx=00000000ffffb88a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076d242400 rsp=fffff80772866f00 rbp=ffffb88a07010280
r8=00000000008b0001 r9=3dea7b975c0a4ae2 r10=0000000000000000
r11=ffffb88a07010290 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlpHpVsFreeChunkInsert+0x170:
fffff807`6d242400 8b4af8 mov ecx,dword ptr [rdx-8] ds:00000000`ffffb882=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8076d3d2ee9 to fffff8076d3c10a0
STACK_TEXT:
fffff807`72866c28 fffff807`6d3d2ee9 : 00000000`0000000a 00000000`ffffb882 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff807`72866c30 fffff807`6d3cf22b : 00000000`00000000 fffff807`6dcb6c53 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`72866d70 fffff807`6d242400 : 00000000`00000000 ffffb88a`0d6a6410 00000000`00002bed ffffb88a`19fe3fe0 : nt!KiPageFault+0x46b
fffff807`72866f00 fffff807`6d243fb2 : ffffb88a`19fd5000 ffffb88a`07010280 ffffb88a`19fe3e70 ffffb88a`19fd5000 : nt!RtlpHpVsFreeChunkInsert+0x170
fffff807`72866f30 fffff807`6d2460ad : ffffb88a`000000a2 fffff807`00000000 ffffb88a`1539e8b0 fffff807`00000000 : nt!RtlpHpVsContextFree+0x302
fffff807`72866fd0 fffff807`6d56e0a9 : 00000000`00000000 00000000`00000450 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x56d
fffff807`728670f0 fffff807`6d23171b : ffffb88a`17d69b58 00000000`00000001 ffffb88a`17d69b58 00000000`00000002 : nt!ExFreePool+0x9
fffff807`72867120 fffff807`6d247d01 : 00000000`00000002 ffffb88a`10111010 ffffb88a`10111010 ffffb88a`10111010 : nt!IopFreeIrp+0x1ab
fffff807`72867160 fffff807`6d247667 : ffffb88a`00000001 ffffb88a`0d36e101 ffffb88a`00000000 ffffb88a`101111b8 : nt!IopfCompleteRequest+0x681
fffff807`72867270 fffff807`72216e45 : 000002b1`477e1b66 ffffb88a`1977f9e0 fffff807`728673a0 ffffb88a`1977f9e0 : nt!IofCompleteRequest+0x17
fffff807`728672a0 fffff807`6d247799 : ffffb88a`12b2866b 000002c8`00000000 fffff807`728675b8 ffffb88a`00000000 : CLASSPNP!TransferPktComplete+0x645
fffff807`728674a0 fffff807`6d247667 : 00000000`01008000 ffffb88a`00000201 ffffb88a`09a091a0 01000000`00100000 : nt!IopfCompleteRequest+0x119
fffff807`728675b0 fffff807`715799a2 : fffff807`6dcc0920 ffffb88a`099c5040 fffff807`728677b0 00000000`00000000 : nt!IofCompleteRequest+0x17
fffff807`728675e0 fffff807`7157928a : 00000000`00000000 00000000`00989680 fffff807`728677b0 ffffa500`9d0b2ef0 : storport!RaidCompleteRequestEx+0x92
fffff807`728676b0 fffff807`7158d60b : ffffb88a`0dfef178 00000000`00000000 00000000`00000000 00000000`00000000 : storport!RaidUnitCompleteRequest+0x5da
fffff807`72867850 fffff807`6d26b065 : ffffb88a`099da000 00000000`00000001 fffff807`728678a8 00000000`00000000 : storport!RaidpAdapterRedirectDpcRoutine+0x8b
fffff807`728678f0 fffff807`6d26a6bf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
fffff807`72867a30 fffff807`6d3c4be4 : 00000000`00000000 fffff807`6ac3b180 fffff807`6d790400 ffffb88a`159b4680 : nt!KiRetireDpcList+0x1ef
fffff807`72867c60 00000000`00000000 : fffff807`72868000 fffff807`72862000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84
THREAD_SHA1_HASH_MOD_FUNC: a94082232eca6b95de04de3544667deb7f9674ed
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 55edd50d5671c740a0984858021c3d53a86023fe
THREAD_SHA1_HASH_MOD: be8ee3bab5ac6018a7cc89b0d69661e74bafaaf3
FOLLOWUP_IP:
nt!ExFreePool+9
fffff807`6d56e0a9 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: nt!ExFreePool+9
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.356
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
BUCKET_ID: AV_nt!ExFreePool
PRIMARY_PROBLEM_CLASS: AV_nt!ExFreePool
TARGET_TIME: 2019-09-24T19:05:50.000Z
OSBUILD: 18362
OSSERVICEPACK: 356
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 7a4d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!exfreepool
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
---------
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffbe0557b870c0, The address of the thread.
Arg2: ffffd53cc4c67078, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1404
BIOS_DATE: 11/08/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X570-P
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: ffffbe0557b870c0
BUGCHECK_P2: ffffd53cc4c67078
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x192
PROCESS_NAME: Steam.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-28-2019 18:29:48.0495
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8040ae39c75 to fffff8040afc14e0
STACK_TEXT:
ffffe68a`b7a4c3f8 fffff804`0ae39c75 : 00000000`00000192 ffffbe05`57b870c0 ffffd53c`c4c67078 00000000`00000000 : nt!KeBugCheckEx
ffffe68a`b7a4c400 ffffd503`32c56932 : ffffd53c`c4c67020 ffffd53c`00000000 00000000`00000000 00000000`400f0f2a : nt!ExAcquirePushLockExclusiveEx+0x145
ffffe68a`b7a4c440 ffffd503`32c4fb15 : 00000000`000008c0 ffffe68a`b7a47000 ffffe68a`b7a4d000 00000000`00000000 : win32kfull!GreUpdateSpriteInternal+0x252
ffffe68a`b7a4c690 ffffd503`32c4d59e : ffffe68a`b7a4cc10 ffffd53c`c66ac620 ffffe68a`b7a4cc10 ffffd503`331c4aa0 : win32kfull!GreUpdateSpriteDevLockEnd+0x1b5
ffffe68a`b7a4c980 ffffd503`32c58403 : ffffd53c`c4b32000 ffffd53c`c3e27900 00000000`00000000 00000000`00000000 : win32kfull!DEVLOCKBLTOBJ::~DEVLOCKBLTOBJ+0x14e
ffffe68a`b7a4ca30 ffffd503`32d004fb : 00000000`00e660b8 ffffe68a`b7a4cd00 fffff804`0ae36960 ffffd503`32ffde41 : win32kfull!NtGdiBitBltInternal+0xad3
ffffe68a`b7a4cd60 fffff804`0afd2d18 : 00000000`00000020 ffffd503`32c4709e ffffbe05`57b870c0 ffffd53c`c0911000 : win32kfull!NtGdiBitBlt+0x5b
ffffe68a`b7a4cdd0 00007ffb`749efdb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0063c8a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`749efdb4
THREAD_SHA1_HASH_MOD_FUNC: 7536c886c443a0fbfd0ddc0e449662b05a8d9030
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 80c526b398100591ecee148642f92bc53619c753
THREAD_SHA1_HASH_MOD: 4fde9e56ff1f90cca0839847b6728a9769306bd5
FOLLOWUP_IP:
win32kfull!GreUpdateSpriteInternal+252
ffffd503`32c56932 488b8ba8000000 mov rcx,qword ptr [rbx+0A8h]
FAULT_INSTR_CODE: a88b8b48
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32kfull!GreUpdateSpriteInternal+252
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 252
FAILURE_BUCKET_ID: 0x192_win32kfull!GreUpdateSpriteInternal
BUCKET_ID: 0x192_win32kfull!GreUpdateSpriteInternal
PRIMARY_PROBLEM_CLASS: 0x192_win32kfull!GreUpdateSpriteInternal
TARGET_TIME: 2019-12-02T13:49:29.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 5613
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x192_win32kfull!greupdatespriteinternal
FAILURE_ID_HASH: {6d016e5d-db8f-06f7-61b8-ec8816b15658}
Followup: MachineOwner
---------
Kartı garantiye gönderdiğim için yapamadım testi hatalar RAM kaynaklı mı?Memtest86 testi yapar mısın?
Kod:IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000000ffffa1f9, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80218042cb6, address which referenced memory Debugging Details: ------------------ ***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057. KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 DUMP_TYPE: 2 BUGCHECK_P1: ffffa1f9 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80218042cb6 READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols 00000000ffffa1f9 CURRENT_IRQL: 0 FAULTING_IP: +0 fffff802`18042cb6 ?? ??? CPU_COUNT: c CPU_MHZ: e09 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_AV BUGCHECK_STR: AV ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-28-2019 18:29:42.0185 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff802181d1ae9 to fffff802181bfcc0 STACK_TEXT: ffff8583`a51e6ab8 fffff802`181d1ae9 : 00000000`0000000a 00000000`ffffa1f9 00000000`00000002 00000000`00000000 : 0xfffff802`181bfcc0 ffff8583`a51e6ac0 00000000`0000000a : 00000000`ffffa1f9 00000000`00000002 00000000`00000000 fffff802`18042cb6 : 0xfffff802`181d1ae9 ffff8583`a51e6ac8 00000000`ffffa1f9 : 00000000`00000002 00000000`00000000 fffff802`18042cb6 00000028`00000000 : 0xa ffff8583`a51e6ad0 00000000`00000002 : 00000000`00000000 fffff802`18042cb6 00000028`00000000 e160e525`169b235d : 0xffffa1f9 ffff8583`a51e6ad8 00000000`00000000 : fffff802`18042cb6 00000028`00000000 e160e525`169b235d 634ad035`042103c7 : 0x2 SYMBOL_NAME: ANALYSIS_INCONCLUSIVE FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID: CORRUPT_MODULELIST_AV PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_AV FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV TARGET_TIME: 2019-09-06T18:28:40.000Z OSBUILD: 18362 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date ANALYSIS_SESSION_ELAPSED_TIME: f ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:corrupt_modulelist_av FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000000ffffb882, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8076d242400, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: System manufacturer SYSTEM_PRODUCT_NAME: System Product Name SYSTEM_SKU: SKU SYSTEM_VERSION: System Version BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 1005 BIOS_DATE: 08/02/2019 BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: PRIME X570-P BASEBOARD_VERSION: Rev X.0x DUMP_TYPE: 2 BUGCHECK_P1: ffffb882 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8076d242400 READ_ADDRESS: fffff8076d7723b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd 00000000ffffb882 CURRENT_IRQL: 2 FAULTING_IP: nt!RtlpHpVsFreeChunkInsert+170 fffff807`6d242400 8b4af8 mov ecx,dword ptr [rdx-8] CPU_COUNT: c CPU_MHZ: e09 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-28-2019 18:29:44.0839 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: fffff80772866d70 -- (.trap 0xfffff80772866d70) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000ffffb88a rbx=0000000000000000 rcx=0000000000830000 rdx=00000000ffffb88a rsi=0000000000000000 rdi=0000000000000000 rip=fffff8076d242400 rsp=fffff80772866f00 rbp=ffffb88a07010280 r8=00000000008b0001 r9=3dea7b975c0a4ae2 r10=0000000000000000 r11=ffffb88a07010290 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!RtlpHpVsFreeChunkInsert+0x170: fffff807`6d242400 8b4af8 mov ecx,dword ptr [rdx-8] ds:00000000`ffffb882=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8076d3d2ee9 to fffff8076d3c10a0 STACK_TEXT: fffff807`72866c28 fffff807`6d3d2ee9 : 00000000`0000000a 00000000`ffffb882 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff807`72866c30 fffff807`6d3cf22b : 00000000`00000000 fffff807`6dcb6c53 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff807`72866d70 fffff807`6d242400 : 00000000`00000000 ffffb88a`0d6a6410 00000000`00002bed ffffb88a`19fe3fe0 : nt!KiPageFault+0x46b fffff807`72866f00 fffff807`6d243fb2 : ffffb88a`19fd5000 ffffb88a`07010280 ffffb88a`19fe3e70 ffffb88a`19fd5000 : nt!RtlpHpVsFreeChunkInsert+0x170 fffff807`72866f30 fffff807`6d2460ad : ffffb88a`000000a2 fffff807`00000000 ffffb88a`1539e8b0 fffff807`00000000 : nt!RtlpHpVsContextFree+0x302 fffff807`72866fd0 fffff807`6d56e0a9 : 00000000`00000000 00000000`00000450 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x56d fffff807`728670f0 fffff807`6d23171b : ffffb88a`17d69b58 00000000`00000001 ffffb88a`17d69b58 00000000`00000002 : nt!ExFreePool+0x9 fffff807`72867120 fffff807`6d247d01 : 00000000`00000002 ffffb88a`10111010 ffffb88a`10111010 ffffb88a`10111010 : nt!IopFreeIrp+0x1ab fffff807`72867160 fffff807`6d247667 : ffffb88a`00000001 ffffb88a`0d36e101 ffffb88a`00000000 ffffb88a`101111b8 : nt!IopfCompleteRequest+0x681 fffff807`72867270 fffff807`72216e45 : 000002b1`477e1b66 ffffb88a`1977f9e0 fffff807`728673a0 ffffb88a`1977f9e0 : nt!IofCompleteRequest+0x17 fffff807`728672a0 fffff807`6d247799 : ffffb88a`12b2866b 000002c8`00000000 fffff807`728675b8 ffffb88a`00000000 : CLASSPNP!TransferPktComplete+0x645 fffff807`728674a0 fffff807`6d247667 : 00000000`01008000 ffffb88a`00000201 ffffb88a`09a091a0 01000000`00100000 : nt!IopfCompleteRequest+0x119 fffff807`728675b0 fffff807`715799a2 : fffff807`6dcc0920 ffffb88a`099c5040 fffff807`728677b0 00000000`00000000 : nt!IofCompleteRequest+0x17 fffff807`728675e0 fffff807`7157928a : 00000000`00000000 00000000`00989680 fffff807`728677b0 ffffa500`9d0b2ef0 : storport!RaidCompleteRequestEx+0x92 fffff807`728676b0 fffff807`7158d60b : ffffb88a`0dfef178 00000000`00000000 00000000`00000000 00000000`00000000 : storport!RaidUnitCompleteRequest+0x5da fffff807`72867850 fffff807`6d26b065 : ffffb88a`099da000 00000000`00000001 fffff807`728678a8 00000000`00000000 : storport!RaidpAdapterRedirectDpcRoutine+0x8b fffff807`728678f0 fffff807`6d26a6bf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305 fffff807`72867a30 fffff807`6d3c4be4 : 00000000`00000000 fffff807`6ac3b180 fffff807`6d790400 ffffb88a`159b4680 : nt!KiRetireDpcList+0x1ef fffff807`72867c60 00000000`00000000 : fffff807`72868000 fffff807`72862000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84 THREAD_SHA1_HASH_MOD_FUNC: a94082232eca6b95de04de3544667deb7f9674ed THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 55edd50d5671c740a0984858021c3d53a86023fe THREAD_SHA1_HASH_MOD: be8ee3bab5ac6018a7cc89b0d69661e74bafaaf3 FOLLOWUP_IP: nt!ExFreePool+9 fffff807`6d56e0a9 4883c428 add rsp,28h FAULT_INSTR_CODE: 28c48348 SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: nt!ExFreePool+9 FOLLOWUP_NAME: Pool_corruption IMAGE_NAME: Pool_Corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.356 MODULE_NAME: Pool_Corruption STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: AV_nt!ExFreePool BUCKET_ID: AV_nt!ExFreePool PRIMARY_PROBLEM_CLASS: AV_nt!ExFreePool TARGET_TIME: 2019-09-24T19:05:50.000Z OSBUILD: 18362 OSSERVICEPACK: 356 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 7a4d ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_nt!exfreepool FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1} Followup: Pool_corruption --------- KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192) A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or above. Arguments: Arg1: ffffbe0557b870c0, The address of the thread. Arg2: ffffd53cc4c67078, The lock address. Arg3: 0000000000000000, The IRQL at which the lock was acquired. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: System manufacturer SYSTEM_PRODUCT_NAME: System Product Name SYSTEM_SKU: SKU SYSTEM_VERSION: System Version BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 1404 BIOS_DATE: 11/08/2019 BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: PRIME X570-P BASEBOARD_VERSION: Rev X.0x DUMP_TYPE: 2 BUGCHECK_P1: ffffbe0557b870c0 BUGCHECK_P2: ffffd53cc4c67078 BUGCHECK_P3: 0 BUGCHECK_P4: 0 CPU_COUNT: c CPU_MHZ: e09 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x192 PROCESS_NAME: Steam.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-28-2019 18:29:48.0495 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8040ae39c75 to fffff8040afc14e0 STACK_TEXT: ffffe68a`b7a4c3f8 fffff804`0ae39c75 : 00000000`00000192 ffffbe05`57b870c0 ffffd53c`c4c67078 00000000`00000000 : nt!KeBugCheckEx ffffe68a`b7a4c400 ffffd503`32c56932 : ffffd53c`c4c67020 ffffd53c`00000000 00000000`00000000 00000000`400f0f2a : nt!ExAcquirePushLockExclusiveEx+0x145 ffffe68a`b7a4c440 ffffd503`32c4fb15 : 00000000`000008c0 ffffe68a`b7a47000 ffffe68a`b7a4d000 00000000`00000000 : win32kfull!GreUpdateSpriteInternal+0x252 ffffe68a`b7a4c690 ffffd503`32c4d59e : ffffe68a`b7a4cc10 ffffd53c`c66ac620 ffffe68a`b7a4cc10 ffffd503`331c4aa0 : win32kfull!GreUpdateSpriteDevLockEnd+0x1b5 ffffe68a`b7a4c980 ffffd503`32c58403 : ffffd53c`c4b32000 ffffd53c`c3e27900 00000000`00000000 00000000`00000000 : win32kfull!DEVLOCKBLTOBJ::~DEVLOCKBLTOBJ+0x14e ffffe68a`b7a4ca30 ffffd503`32d004fb : 00000000`00e660b8 ffffe68a`b7a4cd00 fffff804`0ae36960 ffffd503`32ffde41 : win32kfull!NtGdiBitBltInternal+0xad3 ffffe68a`b7a4cd60 fffff804`0afd2d18 : 00000000`00000020 ffffd503`32c4709e ffffbe05`57b870c0 ffffd53c`c0911000 : win32kfull!NtGdiBitBlt+0x5b ffffe68a`b7a4cdd0 00007ffb`749efdb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`0063c8a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`749efdb4 THREAD_SHA1_HASH_MOD_FUNC: 7536c886c443a0fbfd0ddc0e449662b05a8d9030 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 80c526b398100591ecee148642f92bc53619c753 THREAD_SHA1_HASH_MOD: 4fde9e56ff1f90cca0839847b6728a9769306bd5 FOLLOWUP_IP: win32kfull!GreUpdateSpriteInternal+252 ffffd503`32c56932 488b8ba8000000 mov rcx,qword ptr [rbx+0A8h] FAULT_INSTR_CODE: a88b8b48 SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: win32kfull!GreUpdateSpriteInternal+252 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32kfull IMAGE_NAME: win32kfull.sys DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.476 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 252 FAILURE_BUCKET_ID: 0x192_win32kfull!GreUpdateSpriteInternal BUCKET_ID: 0x192_win32kfull!GreUpdateSpriteInternal PRIMARY_PROBLEM_CLASS: 0x192_win32kfull!GreUpdateSpriteInternal TARGET_TIME: 2019-12-02T13:49:29.000Z OSBUILD: 18362 OSSERVICEPACK: 476 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2011-12-30 02:28:41 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 5613 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x192_win32kfull!greupdatespriteinternal FAILURE_ID_HASH: {6d016e5d-db8f-06f7-61b8-ec8816b15658} Followup: MachineOwner ---------
Garantiden dönmesini beklemekten başka yol yok o zaman.İhtimal dahilinde fakat kesin odur diyemem.
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.