Minidump.rar
drive.google.com
Üst üste mavi ekran alıyorum CS GO veya başka oyunlara girince. Sebebini söyleyebilir misiniz?
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff801c4e0d202, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff80239f68308
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.19478.amd64fre.winblue_ltsb.190831-0600
SYSTEM_MANUFACTURER: To be filled by O.E.M.
SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
SYSTEM_SKU: SKU
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2501
BIOS_DATE: 04/07/2014
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: M5A97 R2.0
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff801c4e0d202
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80239f682a8
GetUlongPtrFromAddress: unable to read from fffff80239f68530
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nvlddmkm+12b202
fffff801`c4e0d202 488908 mov qword ptr [rax],rcx
CPU_COUNT: 8
CPU_MHZ: fad
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-06-2019 18:13:46.0301
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffff8023b593950 -- (.trap 0xfffff8023b593950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe0017f8ce06c
rdx=0000000000000020 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801c4e0d202 rsp=fffff8023b593ae0 rbp=ffffe001854f6010
r8=fffff8023b593ac8 r9=fffff8023b5939a0 r10=fffff801c4f905d8
r11=fffff8023b593980 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nvlddmkm+0x12b202:
fffff801`c4e0d202 488908 mov qword ptr [rax],rcx ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80239d6a669 to fffff80239d5a3a0
STACK_TEXT:
fffff802`3b593808 fffff802`39d6a669 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff802`3b593810 fffff802`39d67ba8 : fffff802`00000020 fffff802`3b593970 00000000`00000000 fffff801`c4dfca98 : nt!KiBugCheckDispatch+0x69
fffff802`3b593950 fffff801`c4e0d202 : ffffe001`7f8cd000 ffffe001`854f6010 ffffe001`7f8cd000 ffffe001`857ba830 : nt!KiPageFault+0x428
fffff802`3b593ae0 ffffe001`7f8cd000 : ffffe001`854f6010 ffffe001`7f8cd000 ffffe001`857ba830 fffff802`3b593b80 : nvlddmkm+0x12b202
fffff802`3b593ae8 ffffe001`854f6010 : ffffe001`7f8cd000 ffffe001`857ba830 fffff802`3b593b80 fffff801`c52e44bf : 0xffffe001`7f8cd000
fffff802`3b593af0 ffffe001`7f8cd000 : ffffe001`857ba830 fffff802`3b593b80 fffff801`c52e44bf 00000000`0000000c : 0xffffe001`854f6010
fffff802`3b593af8 ffffe001`857ba830 : fffff802`3b593b80 fffff801`c52e44bf 00000000`0000000c ffffe001`8256f1c0 : 0xffffe001`7f8cd000
fffff802`3b593b00 fffff802`3b593b80 : fffff801`c52e44bf 00000000`0000000c ffffe001`8256f1c0 00000000`ffffffff : 0xffffe001`857ba830
fffff802`3b593b08 fffff801`c52e44bf : 00000000`0000000c ffffe001`8256f1c0 00000000`ffffffff 00000000`00000000 : 0xfffff802`3b593b80
fffff802`3b593b10 00000000`0000000c : ffffe001`8256f1c0 00000000`ffffffff 00000000`00000000 ffffe001`8256f1c0 : nvlddmkm+0x6024bf
fffff802`3b593b18 ffffe001`8256f1c0 : 00000000`ffffffff 00000000`00000000 ffffe001`8256f1c0 fffff801`c52e46a2 : 0xc
fffff802`3b593b20 00000000`ffffffff : 00000000`00000000 ffffe001`8256f1c0 fffff801`c52e46a2 ffffe001`857ba830 : 0xffffe001`8256f1c0
fffff802`3b593b28 00000000`00000000 : ffffe001`8256f1c0 fffff801`c52e46a2 ffffe001`857ba830 fffff802`3b593c30 : 0xffffffff
THREAD_SHA1_HASH_MOD_FUNC: 43d66b695656ff6029e0896a0f38861e7138cae6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 63ca32e99b7d430cf3c41ae57597537fd14ad994
THREAD_SHA1_HASH_MOD: c5849c14d56648baae932b75ab8e18776e6ef2ce
FOLLOWUP_IP:
nvlddmkm+12b202
fffff801`c4e0d202 488908 mov qword ptr [rax],rcx
FAULT_INSTR_CODE: 48088948
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+12b202
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5daf4287
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12b202
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
BUCKET_ID: AV_nvlddmkm!unknown_function
PRIMARY_PROBLEM_CLASS: AV_nvlddmkm!unknown_function
TARGET_TIME: 2019-11-06T14:40:40.000Z
OSBUILD: 9600
OSSERVICEPACK: 19478
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-08-31 18:06:47
BUILDDATESTAMP_STR: 190831-0600
BUILDLAB_STR: winblue_ltsb
BUILDOSVER_STR: 6.3.9600.19478.amd64fre.winblue_ltsb.190831-0600
ANALYSIS_SESSION_ELAPSED_TIME: f12
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nvlddmkm!unknown_function
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff800ec73d202, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff8003556d308
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.19478.amd64fre.winblue_ltsb.190831-0600
SYSTEM_MANUFACTURER: To be filled by O.E.M.
SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
SYSTEM_SKU: SKU
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2501
BIOS_DATE: 04/07/2014
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: M5A97 R2.0
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff800ec73d202
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8003556d2a8
GetUlongPtrFromAddress: unable to read from fffff8003556d530
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nvlddmkm+12b202
fffff800`ec73d202 488908 mov qword ptr [rax],rcx
CPU_COUNT: 8
CPU_MHZ: fad
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-06-2019 18:13:44.0488
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffd001ec52f680 -- (.trap 0xffffd001ec52f680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe0011dcc806c
rdx=0000000000000020 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800ec73d202 rsp=ffffd001ec52f810 rbp=ffffe0011dccad80
r8=ffffd001ec52f7f8 r9=ffffd001ec52f6d0 r10=fffff800ec8c05d8
r11=ffffd001ec52f6b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nvlddmkm+0x12b202:
fffff800`ec73d202 488908 mov qword ptr [rax],rcx ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8003536f669 to fffff8003535f3a0
STACK_TEXT:
ffffd001`ec52f538 fffff800`3536f669 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`ec52f540 fffff800`3536cba8 : ffffd001`00000020 ffffd001`ec52f6a0 00000000`00000000 fffff800`ec72ca98 : nt!KiBugCheckDispatch+0x69
ffffd001`ec52f680 fffff800`ec73d202 : ffffe001`1dcc7000 ffffe001`1dccad80 ffffe001`1dcc7000 ffffe001`21fc1830 : nt!KiPageFault+0x428
ffffd001`ec52f810 ffffe001`1dcc7000 : ffffe001`1dccad80 ffffe001`1dcc7000 ffffe001`21fc1830 ffffd001`ec52f8b0 : nvlddmkm+0x12b202
ffffd001`ec52f818 ffffe001`1dccad80 : ffffe001`1dcc7000 ffffe001`21fc1830 ffffd001`ec52f8b0 fffff800`ecc144bf : 0xffffe001`1dcc7000
ffffd001`ec52f820 ffffe001`1dcc7000 : ffffe001`21fc1830 ffffd001`ec52f8b0 fffff800`ecc144bf 00000000`0000000c : 0xffffe001`1dccad80
ffffd001`ec52f828 ffffe001`21fc1830 : ffffd001`ec52f8b0 fffff800`ecc144bf 00000000`0000000c ffffe001`1fc2a1c0 : 0xffffe001`1dcc7000
ffffd001`ec52f830 ffffd001`ec52f8b0 : fffff800`ecc144bf 00000000`0000000c ffffe001`1fc2a1c0 00000000`ffffffff : 0xffffe001`21fc1830
ffffd001`ec52f838 fffff800`ecc144bf : 00000000`0000000c ffffe001`1fc2a1c0 00000000`ffffffff 00000000`00000000 : 0xffffd001`ec52f8b0
ffffd001`ec52f840 00000000`0000000c : ffffe001`1fc2a1c0 00000000`ffffffff 00000000`00000000 ffffe001`1fc2a1c0 : nvlddmkm+0x6024bf
ffffd001`ec52f848 ffffe001`1fc2a1c0 : 00000000`ffffffff 00000000`00000000 ffffe001`1fc2a1c0 fffff800`ecc146a2 : 0xc
ffffd001`ec52f850 00000000`ffffffff : 00000000`00000000 ffffe001`1fc2a1c0 fffff800`ecc146a2 ffffe001`21fc1830 : 0xffffe001`1fc2a1c0
ffffd001`ec52f858 00000000`00000000 : ffffe001`1fc2a1c0 fffff800`ecc146a2 ffffe001`21fc1830 ffffd001`ec52f960 : 0xffffffff
THREAD_SHA1_HASH_MOD_FUNC: 43d66b695656ff6029e0896a0f38861e7138cae6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 63ca32e99b7d430cf3c41ae57597537fd14ad994
THREAD_SHA1_HASH_MOD: c5849c14d56648baae932b75ab8e18776e6ef2ce
FOLLOWUP_IP:
nvlddmkm+12b202
fffff800`ec73d202 488908 mov qword ptr [rax],rcx
FAULT_INSTR_CODE: 48088948
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+12b202
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5daf4287
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12b202
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
BUCKET_ID: AV_nvlddmkm!unknown_function
PRIMARY_PROBLEM_CLASS: AV_nvlddmkm!unknown_function
TARGET_TIME: 2019-11-06T14:28:44.000Z
OSBUILD: 9600
OSSERVICEPACK: 19478
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-08-31 18:06:47
BUILDDATESTAMP_STR: 190831-0600
BUILDLAB_STR: winblue_ltsb
BUILDOSVER_STR: 6.3.9600.19478.amd64fre.winblue_ltsb.190831-0600
ANALYSIS_SESSION_ELAPSED_TIME: f80
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nvlddmkm!unknown_function
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80047421202, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff80384dd8308
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.19478.amd64fre.winblue_ltsb.190831-0600
SYSTEM_MANUFACTURER: To be filled by O.E.M.
SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
SYSTEM_SKU: SKU
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2501
BIOS_DATE: 04/07/2014
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: M5A97 R2.0
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80047421202
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80384dd82a8
GetUlongPtrFromAddress: unable to read from fffff80384dd8530
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nvlddmkm+12b202
fffff800`47421202 488908 mov qword ptr [rax],rcx
CPU_COUNT: 8
CPU_MHZ: fad
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-06-2019 18:13:42.0312
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffd000acffd950 -- (.trap 0xffffd000acffd950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe000eae5d06c
rdx=0000000000000020 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80047421202 rsp=ffffd000acffdae0 rbp=ffffe000eef42970
r8=ffffd000acffdac8 r9=ffffd000acffd9a0 r10=fffff800475a45d8
r11=ffffd000acffd980 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nvlddmkm+0x12b202:
fffff800`47421202 488908 mov qword ptr [rax],rcx ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80384bda669 to fffff80384bca3a0
STACK_TEXT:
ffffd000`acffd808 fffff803`84bda669 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`acffd810 fffff803`84bd7ba8 : ffffd000`00000020 ffffd000`acffd970 00000000`00000000 fffff800`47410a98 : nt!KiBugCheckDispatch+0x69
ffffd000`acffd950 fffff800`47421202 : ffffe000`eae5c000 ffffe000`eef42970 ffffe000`eae5c000 ffffe000`eaf06830 : nt!KiPageFault+0x428
ffffd000`acffdae0 ffffe000`eae5c000 : ffffe000`eef42970 ffffe000`eae5c000 ffffe000`eaf06830 ffffd000`acffdb80 : nvlddmkm+0x12b202
ffffd000`acffdae8 ffffe000`eef42970 : ffffe000`eae5c000 ffffe000`eaf06830 ffffd000`acffdb80 fffff800`478f84bf : 0xffffe000`eae5c000
ffffd000`acffdaf0 ffffe000`eae5c000 : ffffe000`eaf06830 ffffd000`acffdb80 fffff800`478f84bf 00000000`0000000c : 0xffffe000`eef42970
ffffd000`acffdaf8 ffffe000`eaf06830 : ffffd000`acffdb80 fffff800`478f84bf 00000000`0000000c ffffe000`ece281c0 : 0xffffe000`eae5c000
ffffd000`acffdb00 ffffd000`acffdb80 : fffff800`478f84bf 00000000`0000000c ffffe000`ece281c0 00000000`ffffffff : 0xffffe000`eaf06830
ffffd000`acffdb08 fffff800`478f84bf : 00000000`0000000c ffffe000`ece281c0 00000000`ffffffff 00000000`00000000 : 0xffffd000`acffdb80
ffffd000`acffdb10 00000000`0000000c : ffffe000`ece281c0 00000000`ffffffff 00000000`00000000 ffffe000`ece281c0 : nvlddmkm+0x6024bf
ffffd000`acffdb18 ffffe000`ece281c0 : 00000000`ffffffff 00000000`00000000 ffffe000`ece281c0 fffff800`478f86a2 : 0xc
ffffd000`acffdb20 00000000`ffffffff : 00000000`00000000 ffffe000`ece281c0 fffff800`478f86a2 ffffe000`eaf06830 : 0xffffe000`ece281c0
ffffd000`acffdb28 00000000`00000000 : ffffe000`ece281c0 fffff800`478f86a2 ffffe000`eaf06830 ffffd000`acffdc30 : 0xffffffff
THREAD_SHA1_HASH_MOD_FUNC: 43d66b695656ff6029e0896a0f38861e7138cae6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 63ca32e99b7d430cf3c41ae57597537fd14ad994
THREAD_SHA1_HASH_MOD: c5849c14d56648baae932b75ab8e18776e6ef2ce
FOLLOWUP_IP:
nvlddmkm+12b202
fffff800`47421202 488908 mov qword ptr [rax],rcx
FAULT_INSTR_CODE: 48088948
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+12b202
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5daf4287
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12b202
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
BUCKET_ID: AV_nvlddmkm!unknown_function
PRIMARY_PROBLEM_CLASS: AV_nvlddmkm!unknown_function
TARGET_TIME: 2019-11-06T14:37:06.000Z
OSBUILD: 9600
OSSERVICEPACK: 19478
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-08-31 18:06:47
BUILDDATESTAMP_STR: 190831-0600
BUILDLAB_STR: winblue_ltsb
BUILDOSVER_STR: 6.3.9600.19478.amd64fre.winblue_ltsb.190831-0600
ANALYSIS_SESSION_ELAPSED_TIME: fe3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nvlddmkm!unknown_function
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
Vindıs başlangıçta bile yapıyor bios ayarları ekranındada.acaba ekran kartı komplemi bozulduNvdia sürücüsü hata veriyor, DDU ile güvenli mod da kaldırıp tekrardan kurun eğer sorun devam ederse bir önceki sürümü kurun.
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff801c4e0d202, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nvlddmkm.sys GetUlongPtrFromAddress: unable to read from fffff80239f68308 KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 9600.19478.amd64fre.winblue_ltsb.190831-0600 SYSTEM_MANUFACTURER: To be filled by O.E.M. SYSTEM_PRODUCT_NAME: To be filled by O.E.M. SYSTEM_SKU: SKU SYSTEM_VERSION: To be filled by O.E.M. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2501 BIOS_DATE: 04/07/2014 BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: M5A97 R2.0 BASEBOARD_VERSION: Rev 1.xx DUMP_TYPE: 2 BUGCHECK_P1: 0 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff801c4e0d202 WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80239f682a8 GetUlongPtrFromAddress: unable to read from fffff80239f68530 0000000000000000 CURRENT_IRQL: 2 FAULTING_IP: nvlddmkm+12b202 fffff801`c4e0d202 488908 mov qword ptr [rax],rcx CPU_COUNT: 8 CPU_MHZ: fad CPU_VENDOR: AuthenticAMD CPU_FAMILY: 15 CPU_MODEL: 2 CPU_STEPPING: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 11-06-2019 18:13:46.0301 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: fffff8023b593950 -- (.trap 0xfffff8023b593950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffe0017f8ce06c rdx=0000000000000020 rsi=0000000000000000 rdi=0000000000000000 rip=fffff801c4e0d202 rsp=fffff8023b593ae0 rbp=ffffe001854f6010 r8=fffff8023b593ac8 r9=fffff8023b5939a0 r10=fffff801c4f905d8 r11=fffff8023b593980 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc nvlddmkm+0x12b202: fffff801`c4e0d202 488908 mov qword ptr [rax],rcx ds:00000000`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80239d6a669 to fffff80239d5a3a0 STACK_TEXT: fffff802`3b593808 fffff802`39d6a669 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff802`3b593810 fffff802`39d67ba8 : fffff802`00000020 fffff802`3b593970 00000000`00000000 fffff801`c4dfca98 : nt!KiBugCheckDispatch+0x69 fffff802`3b593950 fffff801`c4e0d202 : ffffe001`7f8cd000 ffffe001`854f6010 ffffe001`7f8cd000 ffffe001`857ba830 : nt!KiPageFault+0x428 fffff802`3b593ae0 ffffe001`7f8cd000 : ffffe001`854f6010 ffffe001`7f8cd000 ffffe001`857ba830 fffff802`3b593b80 : nvlddmkm+0x12b202 fffff802`3b593ae8 ffffe001`854f6010 : ffffe001`7f8cd000 ffffe001`857ba830 fffff802`3b593b80 fffff801`c52e44bf : 0xffffe001`7f8cd000 fffff802`3b593af0 ffffe001`7f8cd000 : ffffe001`857ba830 fffff802`3b593b80 fffff801`c52e44bf 00000000`0000000c : 0xffffe001`854f6010 fffff802`3b593af8 ffffe001`857ba830 : fffff802`3b593b80 fffff801`c52e44bf 00000000`0000000c ffffe001`8256f1c0 : 0xffffe001`7f8cd000 fffff802`3b593b00 fffff802`3b593b80 : fffff801`c52e44bf 00000000`0000000c ffffe001`8256f1c0 00000000`ffffffff : 0xffffe001`857ba830 fffff802`3b593b08 fffff801`c52e44bf : 00000000`0000000c ffffe001`8256f1c0 00000000`ffffffff 00000000`00000000 : 0xfffff802`3b593b80 fffff802`3b593b10 00000000`0000000c : ffffe001`8256f1c0 00000000`ffffffff 00000000`00000000 ffffe001`8256f1c0 : nvlddmkm+0x6024bf fffff802`3b593b18 ffffe001`8256f1c0 : 00000000`ffffffff 00000000`00000000 ffffe001`8256f1c0 fffff801`c52e46a2 : 0xc fffff802`3b593b20 00000000`ffffffff : 00000000`00000000 ffffe001`8256f1c0 fffff801`c52e46a2 ffffe001`857ba830 : 0xffffe001`8256f1c0 fffff802`3b593b28 00000000`00000000 : ffffe001`8256f1c0 fffff801`c52e46a2 ffffe001`857ba830 fffff802`3b593c30 : 0xffffffff THREAD_SHA1_HASH_MOD_FUNC: 43d66b695656ff6029e0896a0f38861e7138cae6 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 63ca32e99b7d430cf3c41ae57597537fd14ad994 THREAD_SHA1_HASH_MOD: c5849c14d56648baae932b75ab8e18776e6ef2ce FOLLOWUP_IP: nvlddmkm+12b202 fffff801`c4e0d202 488908 mov qword ptr [rax],rcx FAULT_INSTR_CODE: 48088948 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nvlddmkm+12b202 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5daf4287 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 12b202 FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function BUCKET_ID: AV_nvlddmkm!unknown_function PRIMARY_PROBLEM_CLASS: AV_nvlddmkm!unknown_function TARGET_TIME: 2019-11-06T14:40:40.000Z OSBUILD: 9600 OSSERVICEPACK: 19478 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-08-31 18:06:47 BUILDDATESTAMP_STR: 190831-0600 BUILDLAB_STR: winblue_ltsb BUILDOSVER_STR: 6.3.9600.19478.amd64fre.winblue_ltsb.190831-0600 ANALYSIS_SESSION_ELAPSED_TIME: f12 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_nvlddmkm!unknown_function FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff800ec73d202, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nvlddmkm.sys GetUlongPtrFromAddress: unable to read from fffff8003556d308 KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 9600.19478.amd64fre.winblue_ltsb.190831-0600 SYSTEM_MANUFACTURER: To be filled by O.E.M. SYSTEM_PRODUCT_NAME: To be filled by O.E.M. SYSTEM_SKU: SKU SYSTEM_VERSION: To be filled by O.E.M. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2501 BIOS_DATE: 04/07/2014 BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: M5A97 R2.0 BASEBOARD_VERSION: Rev 1.xx DUMP_TYPE: 2 BUGCHECK_P1: 0 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff800ec73d202 WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8003556d2a8 GetUlongPtrFromAddress: unable to read from fffff8003556d530 0000000000000000 CURRENT_IRQL: 2 FAULTING_IP: nvlddmkm+12b202 fffff800`ec73d202 488908 mov qword ptr [rax],rcx CPU_COUNT: 8 CPU_MHZ: fad CPU_VENDOR: AuthenticAMD CPU_FAMILY: 15 CPU_MODEL: 2 CPU_STEPPING: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 11-06-2019 18:13:44.0488 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: ffffd001ec52f680 -- (.trap 0xffffd001ec52f680) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffe0011dcc806c rdx=0000000000000020 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800ec73d202 rsp=ffffd001ec52f810 rbp=ffffe0011dccad80 r8=ffffd001ec52f7f8 r9=ffffd001ec52f6d0 r10=fffff800ec8c05d8 r11=ffffd001ec52f6b0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nvlddmkm+0x12b202: fffff800`ec73d202 488908 mov qword ptr [rax],rcx ds:00000000`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8003536f669 to fffff8003535f3a0 STACK_TEXT: ffffd001`ec52f538 fffff800`3536f669 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx ffffd001`ec52f540 fffff800`3536cba8 : ffffd001`00000020 ffffd001`ec52f6a0 00000000`00000000 fffff800`ec72ca98 : nt!KiBugCheckDispatch+0x69 ffffd001`ec52f680 fffff800`ec73d202 : ffffe001`1dcc7000 ffffe001`1dccad80 ffffe001`1dcc7000 ffffe001`21fc1830 : nt!KiPageFault+0x428 ffffd001`ec52f810 ffffe001`1dcc7000 : ffffe001`1dccad80 ffffe001`1dcc7000 ffffe001`21fc1830 ffffd001`ec52f8b0 : nvlddmkm+0x12b202 ffffd001`ec52f818 ffffe001`1dccad80 : ffffe001`1dcc7000 ffffe001`21fc1830 ffffd001`ec52f8b0 fffff800`ecc144bf : 0xffffe001`1dcc7000 ffffd001`ec52f820 ffffe001`1dcc7000 : ffffe001`21fc1830 ffffd001`ec52f8b0 fffff800`ecc144bf 00000000`0000000c : 0xffffe001`1dccad80 ffffd001`ec52f828 ffffe001`21fc1830 : ffffd001`ec52f8b0 fffff800`ecc144bf 00000000`0000000c ffffe001`1fc2a1c0 : 0xffffe001`1dcc7000 ffffd001`ec52f830 ffffd001`ec52f8b0 : fffff800`ecc144bf 00000000`0000000c ffffe001`1fc2a1c0 00000000`ffffffff : 0xffffe001`21fc1830 ffffd001`ec52f838 fffff800`ecc144bf : 00000000`0000000c ffffe001`1fc2a1c0 00000000`ffffffff 00000000`00000000 : 0xffffd001`ec52f8b0 ffffd001`ec52f840 00000000`0000000c : ffffe001`1fc2a1c0 00000000`ffffffff 00000000`00000000 ffffe001`1fc2a1c0 : nvlddmkm+0x6024bf ffffd001`ec52f848 ffffe001`1fc2a1c0 : 00000000`ffffffff 00000000`00000000 ffffe001`1fc2a1c0 fffff800`ecc146a2 : 0xc ffffd001`ec52f850 00000000`ffffffff : 00000000`00000000 ffffe001`1fc2a1c0 fffff800`ecc146a2 ffffe001`21fc1830 : 0xffffe001`1fc2a1c0 ffffd001`ec52f858 00000000`00000000 : ffffe001`1fc2a1c0 fffff800`ecc146a2 ffffe001`21fc1830 ffffd001`ec52f960 : 0xffffffff THREAD_SHA1_HASH_MOD_FUNC: 43d66b695656ff6029e0896a0f38861e7138cae6 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 63ca32e99b7d430cf3c41ae57597537fd14ad994 THREAD_SHA1_HASH_MOD: c5849c14d56648baae932b75ab8e18776e6ef2ce FOLLOWUP_IP: nvlddmkm+12b202 fffff800`ec73d202 488908 mov qword ptr [rax],rcx FAULT_INSTR_CODE: 48088948 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nvlddmkm+12b202 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5daf4287 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 12b202 FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function BUCKET_ID: AV_nvlddmkm!unknown_function PRIMARY_PROBLEM_CLASS: AV_nvlddmkm!unknown_function TARGET_TIME: 2019-11-06T14:28:44.000Z OSBUILD: 9600 OSSERVICEPACK: 19478 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-08-31 18:06:47 BUILDDATESTAMP_STR: 190831-0600 BUILDLAB_STR: winblue_ltsb BUILDOSVER_STR: 6.3.9600.19478.amd64fre.winblue_ltsb.190831-0600 ANALYSIS_SESSION_ELAPSED_TIME: f80 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_nvlddmkm!unknown_function FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3} Followup: MachineOwner --------- 7: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff80047421202, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nvlddmkm.sys GetUlongPtrFromAddress: unable to read from fffff80384dd8308 KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 9600.19478.amd64fre.winblue_ltsb.190831-0600 SYSTEM_MANUFACTURER: To be filled by O.E.M. SYSTEM_PRODUCT_NAME: To be filled by O.E.M. SYSTEM_SKU: SKU SYSTEM_VERSION: To be filled by O.E.M. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2501 BIOS_DATE: 04/07/2014 BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: M5A97 R2.0 BASEBOARD_VERSION: Rev 1.xx DUMP_TYPE: 2 BUGCHECK_P1: 0 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff80047421202 WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80384dd82a8 GetUlongPtrFromAddress: unable to read from fffff80384dd8530 0000000000000000 CURRENT_IRQL: 2 FAULTING_IP: nvlddmkm+12b202 fffff800`47421202 488908 mov qword ptr [rax],rcx CPU_COUNT: 8 CPU_MHZ: fad CPU_VENDOR: AuthenticAMD CPU_FAMILY: 15 CPU_MODEL: 2 CPU_STEPPING: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 11-06-2019 18:13:42.0312 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: ffffd000acffd950 -- (.trap 0xffffd000acffd950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffe000eae5d06c rdx=0000000000000020 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80047421202 rsp=ffffd000acffdae0 rbp=ffffe000eef42970 r8=ffffd000acffdac8 r9=ffffd000acffd9a0 r10=fffff800475a45d8 r11=ffffd000acffd980 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc nvlddmkm+0x12b202: fffff800`47421202 488908 mov qword ptr [rax],rcx ds:00000000`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80384bda669 to fffff80384bca3a0 STACK_TEXT: ffffd000`acffd808 fffff803`84bda669 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx ffffd000`acffd810 fffff803`84bd7ba8 : ffffd000`00000020 ffffd000`acffd970 00000000`00000000 fffff800`47410a98 : nt!KiBugCheckDispatch+0x69 ffffd000`acffd950 fffff800`47421202 : ffffe000`eae5c000 ffffe000`eef42970 ffffe000`eae5c000 ffffe000`eaf06830 : nt!KiPageFault+0x428 ffffd000`acffdae0 ffffe000`eae5c000 : ffffe000`eef42970 ffffe000`eae5c000 ffffe000`eaf06830 ffffd000`acffdb80 : nvlddmkm+0x12b202 ffffd000`acffdae8 ffffe000`eef42970 : ffffe000`eae5c000 ffffe000`eaf06830 ffffd000`acffdb80 fffff800`478f84bf : 0xffffe000`eae5c000 ffffd000`acffdaf0 ffffe000`eae5c000 : ffffe000`eaf06830 ffffd000`acffdb80 fffff800`478f84bf 00000000`0000000c : 0xffffe000`eef42970 ffffd000`acffdaf8 ffffe000`eaf06830 : ffffd000`acffdb80 fffff800`478f84bf 00000000`0000000c ffffe000`ece281c0 : 0xffffe000`eae5c000 ffffd000`acffdb00 ffffd000`acffdb80 : fffff800`478f84bf 00000000`0000000c ffffe000`ece281c0 00000000`ffffffff : 0xffffe000`eaf06830 ffffd000`acffdb08 fffff800`478f84bf : 00000000`0000000c ffffe000`ece281c0 00000000`ffffffff 00000000`00000000 : 0xffffd000`acffdb80 ffffd000`acffdb10 00000000`0000000c : ffffe000`ece281c0 00000000`ffffffff 00000000`00000000 ffffe000`ece281c0 : nvlddmkm+0x6024bf ffffd000`acffdb18 ffffe000`ece281c0 : 00000000`ffffffff 00000000`00000000 ffffe000`ece281c0 fffff800`478f86a2 : 0xc ffffd000`acffdb20 00000000`ffffffff : 00000000`00000000 ffffe000`ece281c0 fffff800`478f86a2 ffffe000`eaf06830 : 0xffffe000`ece281c0 ffffd000`acffdb28 00000000`00000000 : ffffe000`ece281c0 fffff800`478f86a2 ffffe000`eaf06830 ffffd000`acffdc30 : 0xffffffff THREAD_SHA1_HASH_MOD_FUNC: 43d66b695656ff6029e0896a0f38861e7138cae6 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 63ca32e99b7d430cf3c41ae57597537fd14ad994 THREAD_SHA1_HASH_MOD: c5849c14d56648baae932b75ab8e18776e6ef2ce FOLLOWUP_IP: nvlddmkm+12b202 fffff800`47421202 488908 mov qword ptr [rax],rcx FAULT_INSTR_CODE: 48088948 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nvlddmkm+12b202 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5daf4287 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 12b202 FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function BUCKET_ID: AV_nvlddmkm!unknown_function PRIMARY_PROBLEM_CLASS: AV_nvlddmkm!unknown_function TARGET_TIME: 2019-11-06T14:37:06.000Z OSBUILD: 9600 OSSERVICEPACK: 19478 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-08-31 18:06:47 BUILDDATESTAMP_STR: 190831-0600 BUILDLAB_STR: winblue_ltsb BUILDOSVER_STR: 6.3.9600.19478.amd64fre.winblue_ltsb.190831-0600 ANALYSIS_SESSION_ELAPSED_TIME: fe3 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_nvlddmkm!unknown_function FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3} Followup: MachineOwner ---------
teşekkür ederim. en son güncellemelerimi yaptıktan sonra başladı bu oyun. deneyeceğim.
Vindıs başlangıçta bile yapıyor bios ayarları ekranındada.acaba ekran kartı komplemi bozuldu
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.