QP Gaming Z mavi ekran hatası

İşletim sistemi
Windows 10

Efe Yusuf Bodur

Hectopat
Katılım
24 Ekim 2020
Mesajlar
23
Daha fazla  
Cinsiyet
Erkek
Herkese merhabalar Technopat'ın tavsiye ettiği QP Gaming Z adlı bilgisayarı aldım alalı yaklaşık 1 ay oldu ve devamlı mavi ekran hataları alıyorum. Sıfırdan Windows 10 kurmayı da denedim hem de sizin tavsiye ettiğiniz yöntemlerle kurdum ama genede bir işe yaramadı. Minidump dosyalarım aşağıda bulunmaktadır. Yardımlarınız için şimdiden teşekkürler.


Sistem Özellikleri:

TürKodİsim
Kasa210197246MSI MAG Forge 100R Temperli Cam Mid Tower ATX Bilgisayar Kasası
İşlemciBILCAD3500XBBT01AMD Ryzen 5 3500X 3.6 – 4.1 GHz 6 Çekirdek 32MB AM4 İşlemci
Anakart210205682MSI B550M PRO-VDH WIFI AM4 mATX Anakart
Ekran Kartı210182057MSI GeForce RTX 2060 GAMING Z 6GB 192 Bit Ekran Kartı
RamAX4U300038G16A-DT50XPG Spectrix D50 16GB (2×8) DDR4 3000 MHz CL16 RGB Tungsten Gri Ram
SSDAS40G-512GT-CXPG SPECTRIX S40G RGB 512 GB M.2 SSD 3500/2400 MBs
PowerCP-9020172-EUCorsair VS650 (2018) 650W 80+ Güç Kaynağı
 
Son düzenleyen: Moderatör:
Cfossped yazılımını kaldırın.

SFC /scannow komutu nedir? Ne işe yarar? | Technopat Sosyal

"Sfc /scannow" rehberini uygulayın.

BIOS sıfırlayın. Fabrika ayarlarına getirin.

Cfossspeed'i kaldırdım scannow uyguladım herhangi bir sorun bulmadı. BIOS'u zaten geçen açtığım konuda da sıfırlamıştım ondan beridir hiçbir şey ellemedim. Yeni mavi ekran hatası alırsam tekrardan bu konu altına yazabilir miyim yoksa yeni konu mu açayım?
 
Son düzenleyen: Moderatör:
Şimdi ben DISM rehberini uyguladım. BIOS'u nasıl sıfırlamam lazım ben açılırkenki BIOS menüsünden fabrika ayarlarına döndürmüştüm eğer böyle bir sıfırlamaysa halihazırda yaptım zaten ama eğer BIOS pilini söküp takmam lazımsa onu da yaparım sorun yok. AMD yonga setini ben zaten MSI'in sitesinden sürekli güncel tutuyordum ve yeni bir sürümde gelmemiş yine de yüklemem gerekiyorsa yüklerim. Bir de merak ettiğim bu Tencent Games neden mavi ekran hatası verdirtiyor başkaları çatır çatır oynarken ben neden oynayamıyorum bunuda merak ediyorum.
 
Biraz önce bilgisayarım kendi kendine ne mavi ekran neden bir hata vermeden kapandı. Minidump dosyasıda oluşmamış nedir acaba bunun sebebi. Donanımsal bir hata mı?
Muhtemelen donanımsaldır. Kapanma derken ekran mı gitmişti yoksa elektrik gitmiş gibi kasa tamamen mi kapanmıştı? Dosyalarınız abakıyorum.
 
Muhtemelen donanımsaldır. Kapanma derken ekran mı gitmişti yoksa elektrik gitmiş gibi kasa tamamen mi kapanmıştı?

Kasa tamamen kapanmıştı. Bende anlamadım bir anda kapandı RAM'lerden kaynaklı olabilir mi acaba çünkü sık sık mavi ekran hataları alıyorum bunla ilgili açtığım diğer konuyuda incelerseniz sevinirim.
Kusura bakmayın zaten iki konu birleşmiş. :D
 
Konularınızı birleştirdim ve dosyalarınıza bakıyorum şu anda.

İlk olarak bellekleri test edin:


Sonrasında ekran kartı ve PSU testi yapacağız.

Kod:
INVALID_WORK_QUEUE_ITEM (96)
This message occurs when KeRemoveQueue removes a queue entry whose flink
or blink field is null.  This is almost always called by code misusing
worker thread work items, but any queue misuse can cause this.  The rule
is that an entry on a queue may only be inserted on the list once. When an
item is removed from a queue, it's flink field is set to NULL. This bugcheck
occurs when remove queue attempts to remove an entry, but the flink or blink
field is NULL. In order to debug this problem, you need to know the queue being
referenced.
In an attempt to help identify the guilty driver, this bugcheck assumes the
queue is a worker queue (ExWorkerQueue) and prints the worker routine as
parameter 4 below.
Arguments:
Arg1: ffffcf88bbe9eb60, The address of the queue entry whose flink/blink field is NULL
Arg2: ffffcf88b7ebbe40, The address of the queue being references. Usually this is one
    of the ExWorkerQueues.
Arg3: ffffcf88ad902a60, The base address of the ExWorkerQueue array. This will help determine
    if the queue in question is an ExWorkerQueue and if so, the offset from
    this parameter will isolate the queue.
Arg4: 0000000000000502, If this is an ExWorkerQueue (which it usually is), this is the address
    of the worker routine that would have been called if the work item was
    valid. This can be used to isolate the driver that is misusing the work
    queue.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4953

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13027

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  96

BUGCHECK_P1: ffffcf88bbe9eb60

BUGCHECK_P2: ffffcf88b7ebbe40

BUGCHECK_P3: ffffcf88ad902a60

BUGCHECK_P4: 502

WORK_ITEM:  ffffcf88bbe9eb60

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT:
ffffdf89`26052f48 fffff806`3a671335     : 00000000`00000096 ffffcf88`bbe9eb60 ffffcf88`b7ebbe40 ffffcf88`ad902a60 : nt!KeBugCheckEx
ffffdf89`26052f50 fffff806`3a4e26f8     : ffffcf88`b7ebbe40 00000000`00000000 ffffcf88`b89cd080 ffff8080`00000001 : nt!KeRemoveQueueEx+0x18e8d5
ffffdf89`26052ff0 fffff806`3a8f17ae     : ffffcf88`bcc13a90 00000000`00989680 00000000`00000001 ffffcf88`bcc13a90 : nt!IoRemoveIoCompletion+0x98
ffffdf89`26053120 fffff806`3a606bb8     : 00000000`0000000a 00000000`00000019 00000000`00000032 00000000`00000000 : nt!NtRemoveIoCompletionEx+0xfe
ffffdf89`26053260 fffff806`3a5f9070     : fffffd19`32f3ceb8 fffffd3b`c71cf8a0 fffffd3b`c71cf8a0 ffffdf89`26053b80 : nt!KiSystemServiceCopyEnd+0x28
ffffdf89`26053468 fffffd19`32f3ceb8     : fffffd3b`c71cf8a0 fffffd3b`c71cf8a0 ffffdf89`26053b80 fffff806`3a4e16e4 : nt!KiServiceLinkage
ffffdf89`26053470 fffffd19`32f3b876     : fffffd3b`c71cf8a0 ffffdf89`26050000 00000000`00000001 fffffd3b`00000000 : win32kfull!xxxRealSleepThread+0x3d8
ffffdf89`26053590 fffffd19`32f3a062     : ffffdf89`26053a78 00000000`1034e801 00000000`00000000 00000000`00000000 : win32kfull!xxxRealInternalGetMessage+0x15d6
ffffdf89`26053a30 fffffd19`33646275     : ffffcf88`b89cd080 00007ffe`24d83970 00000000`00000020 00000000`0996d000 : win32kfull!NtUserGetMessage+0x92
ffffdf89`26053ac0 fffff806`3a606bb8     : 00000000`77083a10 00000000`00000000 00000000`00000000 00000000`1034e790 : win32k!NtUserGetMessage+0x15
ffffdf89`26053b00 00007ffe`24d90014     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1034e7e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`24d90014


SYMBOL_NAME:  win32kfull!xxxRealSleepThread+3d8

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.631

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  3d8

FAILURE_BUCKET_ID:  0x96_win32kfull!xxxRealSleepThread

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {746db16b-421c-42f8-95da-7c29ad48484f}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffed0a213edba0, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffed0a213edba0, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6109

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 48827

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffed0a213edba0

BUGCHECK_P2: 11

BUGCHECK_P3: ffffed0a213edba0

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff80114cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80114c0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80114c0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffed0a213edba0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffed0a213ed980 -- (.trap 0xffffed0a213ed980)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffed0a213edad0 rbx=0000000000000000 rcx=ffff9881df4e6180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffed0a213edba0 rsp=ffffed0a213edb10 rbp=ffffed0a213ede89
r8=0000000000000001  r9=0000000000000001 r10=0000000000000000
r11=ffff8878f7800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffffed0a`213edba0 017262          add     dword ptr [rdx+62h],esi ds:00000000`00000062=????????
Resetting default scope

STACK_TEXT:
ffffed0a`213ed6d8 fffff801`1447a665     : 00000000`00000050 ffffed0a`213edba0 00000000`00000011 ffffed0a`213ed980 : nt!KeBugCheckEx
ffffed0a`213ed6e0 fffff801`142ea4a0     : ffffed0a`00000000 00000000`00000011 ffffed0a`213eda00 00000000`00000000 : nt!MiSystemFault+0x172315
ffffed0a`213ed7e0 fffff801`1440335e     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`16df920a : nt!MmAccessFault+0x400
ffffed0a`213ed980 ffffed0a`213edba0     : fffff801`22b86890 ffffa98f`b66af030 fffff801`22b868a0 fffff801`22afaf1a : nt!KiPageFault+0x35e
ffffed0a`213edb10 fffff801`22b86890     : ffffa98f`b66af030 fffff801`22b868a0 fffff801`22afaf1a ffffa98f`b8a60dc0 : 0xffffed0a`213edba0
ffffed0a`213edb18 ffffa98f`b66af030     : fffff801`22b868a0 fffff801`22afaf1a ffffa98f`b8a60dc0 fffff801`22aa4aea : cfosspeed6+0x196890
ffffed0a`213edb20 fffff801`22b868a0     : fffff801`22afaf1a ffffa98f`b8a60dc0 fffff801`22aa4aea ffffa98f`b02593e0 : 0xffffa98f`b66af030
ffffed0a`213edb28 fffff801`22afaf1a     : ffffa98f`b8a60dc0 fffff801`22aa4aea ffffa98f`b02593e0 ffffa98f`b66af030 : cfosspeed6+0x1968a0
ffffed0a`213edb30 ffffa98f`b8a60dc0     : fffff801`22aa4aea ffffa98f`b02593e0 ffffa98f`b66af030 00000000`00000000 : cfosspeed6+0x10af1a
ffffed0a`213edb38 fffff801`22aa4aea     : ffffa98f`b02593e0 ffffa98f`b66af030 00000000`00000000 fffff801`22b87101 : 0xffffa98f`b8a60dc0
ffffed0a`213edb40 ffffa98f`b02593e0     : ffffa98f`b66af030 00000000`00000000 fffff801`22b87101 00000000`00000000 : cfosspeed6+0xb4aea
ffffed0a`213edb48 ffffa98f`b66af030     : 00000000`00000000 fffff801`22b87101 00000000`00000000 fffff801`22aa6cf8 : 0xffffa98f`b02593e0
ffffed0a`213edb50 00000000`00000000     : fffff801`22b87101 00000000`00000000 fffff801`22aa6cf8 ffffed0a`213edba0 : 0xffffa98f`b66af030


SYMBOL_NAME:  cfosspeed6+196890

MODULE_NAME: cfosspeed6

IMAGE_NAME:  cfosspeed6.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  196890

FAILURE_BUCKET_ID:  AV_INVALID_cfosspeed6!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2a193c8d-232a-853e-b4eb-0538df41ee22}

Followup:     MachineOwner
---------

4: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2634]
BiosMajorRelease = 5
BiosMinorRelease = 17
BiosVendor = American Megatrends Inc.
BiosVersion = 2.41
BiosReleaseDate = 09/29/2020
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7C95
SystemFamily = To be filled by O.E.M.
SystemVersion = 1.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = B550M PRO-VDH WIFI (MS-7C95)
BaseBoardVersion = 1.0
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8063a4097fd, The address that the exception occurred at
Arg3: ffff810164806098, Exception Record Address
Arg4: ffff8101648058d0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Write

    Key  : Analysis.CPU.mSec
    Value: 5483

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8765

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8063a4097fd

BUGCHECK_P3: ffff810164806098

BUGCHECK_P4: ffff8101648058d0

EXCEPTION_RECORD:  ffff810164806098 -- (.exr 0xffff810164806098)
ExceptionAddress: fffff8063a4097fd (FLTMGR!FltReleaseContext+0x000000000000000d)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: 000000000001002e
Attempt to write to address 000000000001002e

CONTEXT:  ffff8101648058d0 -- (.cxr 0xffff8101648058d0)
rax=000000000000ffde rbx=ffffb00526e090f8 rcx=000000000001003e
rdx=00000000ffffffff rsi=ffffb00526e090f8 rdi=0000000000000001
rip=fffff8063a4097fd rsp=ffff8101648062d0 rbp=0000000000000000
r8=00000000ffffffff  r9=7fffb0051d1fa828 r10=fffff8063a4097f0
r11=ffff810164806398 r12=ffffb00526e09090 r13=ffff8101648065d0
r14=ffff810164806438 r15=0000000010000004
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
FLTMGR!FltReleaseContext+0xd:
fffff806`3a4097fd f00fc15050      lock xadd dword ptr [rax+50h],edx ds:002b:00000000`0001002e=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

WRITE_ADDRESS: fffff8063befb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8063be0f340: Unable to get Flags value from nt!KdVersionBlock
fffff8063be0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000001002e

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  000000000001002e

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffff8101`648062d0 fffff806`4e79cb61     : ffffb005`26e090f8 00000000`00000000 00000000`00000000 ffff8101`00000240 : FLTMGR!FltReleaseContext+0xd
ffff8101`64806310 fffff806`3a40608b     : 00000000`00000000 ffffb005`26e090f8 ffff9c08`00000000 ffffb005`24755400 : bindflt!BfPreFsControl+0x311
ffff8101`648063a0 fffff806`3a405b37     : ffff8101`64806500 ffffb005`24991a0d ffffb005`26a6fe00 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x36b
ffff8101`648064c0 fffff806`3a404b46     : ffff8101`64807000 ffff8101`64801000 00000000`00000000 ffff8101`648065e0 : FLTMGR!FltpPassThroughInternal+0xc7
ffff8101`64806510 fffff806`3a43caaf     : 00000000`00000000 ffffb005`24991aa8 00000000`000000e0 ffffb005`1d07e050 : FLTMGR!FltpPassThrough+0x1d6
ffff8101`648065b0 fffff806`3b4cd6c5     : 00000000`0000000a ffffb005`25aec010 00000000`00000002 00000000`00000000 : FLTMGR!FltpFsControl+0xbf
ffff8101`64806610 fffff806`3b8c2528     : ffffb005`25aec010 00000000`00000000 00000000`00000000 ffffb005`26ce1080 : nt!IofCallDriver+0x55
ffff8101`64806650 fffff806`3b8c1df5     : 00000000`00090120 ffff8101`64806990 00000000`00440005 ffff8101`64806990 : nt!IopSynchronousServiceTail+0x1a8
ffff8101`648066f0 fffff806`3b89a0f8     : 00000000`00000000 ffffffff`80005a14 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff8101`64806830 fffff806`3ba41c33     : ffff9c08`b676b0b8 ffffffff`80002f6c ffff8101`648069b1 ffff9c08`b74ee188 : nt!PfSnPrefetchFileMetadata+0xe8
ffff8101`648068d0 fffff806`3b9078b5     : 00000000`0000006c ffff8101`64806b00 ffff9c08`b74f1258 ffff9c08`00000000 : nt!PfSnGetSectionObject+0x13a0fb
ffff8101`64806a00 fffff806`3b5034b5     : ffffb005`2375d040 ffffb005`2375d040 ffffb005`1a0efa60 00000000`00000600 : nt!PfSnPopulateReadList+0x2b5
ffff8101`64806b70 fffff806`3b4a29a5     : ffffb005`2375d040 00000000`00000080 ffffb005`1a092040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8101`64806c10 fffff806`3b5fc868     : fffff806`39297180 ffffb005`2375d040 fffff806`3b4a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8101`64806c60 00000000`00000000     : ffff8101`64807000 ffff8101`64801000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  bindflt!BfPreFsControl+311

MODULE_NAME: bindflt

IMAGE_NAME:  bindflt.sys

IMAGE_VERSION:  10.0.19041.292

STACK_COMMAND:  .cxr 0xffff8101648058d0 ; kb

BUCKET_ID_FUNC_OFFSET:  311

FAILURE_BUCKET_ID:  AV_bindflt!BfPreFsControl

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c5df67ac-dd81-d64e-979b-0c0100e4ecbf}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ExceptionRecord                               ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ContextRecord                                 ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3592

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3601

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : Dump.Attributes.InsufficientDumpfileSize
    Value: 1

    Key  : Dump.Attributes.RequiredDumpfileSize
    Value: 0xe5c98cd6


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0xc
  Insufficient Dumpfile Size
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: 0

BUGCHECK_P3: 8

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  HD-Player.exe

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
ffff9a8e`8503d1a8 fffff804`37830d05     : 00000000`0000001e ffffffff`c0000005 00000000`00000000 00000000`00000008 : nt!KeBugCheckEx
ffff9a8e`8503d1b0 fffff804`378072ac     : 00000000`00001000 ffff9a8e`8503da50 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1df4e5
ffff9a8e`8503d870 fffff804`37803443     : 00000000`00f8004c ffffb906`5597dd00 00000000`00000000 ffff9a8e`8503dd18 : nt!KiExceptionDispatch+0x12c
ffff9a8e`8503da50 00000000`00000000     : ffffa88d`4f9a4b80 00000000`00000000 ffff9a8e`8503dd18 ffffffff`800000d0 : nt!KiPageFault+0x443


SYMBOL_NAME:  nt!KiDispatchException+1df4e5

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1df4e5

FAILURE_BUCKET_ID:  0x1E_nt!KiDispatchException

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4c003660-11e1-3fb7-2474-3522eb7ee67b}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80300000000, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff80300000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4202

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 71985

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff80300000000

BUGCHECK_P2: 10

BUGCHECK_P3: fffff80300000000

BUGCHECK_P4: 2

READ_ADDRESS: fffff803442fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8034420f340: Unable to get Flags value from nt!KdVersionBlock
fffff8034420f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff80300000000

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  aow_exe.exe

TRAP_FRAME:  fffff2810977fdb0 -- (.trap 0xfffff2810977fdb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff28109780050
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80300000000 rsp=fffff2810977ff40 rbp=ffff8181abce6180
r8=0000000000000020  r9=0000000000000001 r10=0000000000000144
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
fffff803`00000000 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
fffff803`00000000 ??              ???

STACK_TEXT:
fffff281`0977fb08 fffff803`43a7a665     : 00000000`00000050 fffff803`00000000 00000000`00000010 fffff281`0977fdb0 : nt!KeBugCheckEx
fffff281`0977fb10 fffff803`438ea4a0     : 00000000`00000000 00000000`00000010 fffff281`0977fe30 00000000`00000000 : nt!MiSystemFault+0x172315
fffff281`0977fc10 fffff803`43a0335e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
fffff281`0977fdb0 fffff803`00000000     : ffff0ab2`d9315609 ffffb809`ef6fcd90 fffff281`09780050 00000000`00000001 : nt!KiPageFault+0x35e
fffff281`0977ff40 ffff0ab2`d9315609     : ffffb809`ef6fcd90 fffff281`09780050 00000000`00000001 ffffb809`ecc361f0 : 0xfffff803`00000000
fffff281`0977ff48 ffffb809`ef6fcd90     : fffff281`09780050 00000000`00000001 ffffb809`ecc361f0 ffffb809`ecc361f0 : 0xffff0ab2`d9315609
fffff281`0977ff50 fffff281`09780050     : 00000000`00000001 ffffb809`ecc361f0 ffffb809`ecc361f0 00000000`00000000 : 0xffffb809`ef6fcd90
fffff281`0977ff58 00000000`00000001     : ffffb809`ecc361f0 ffffb809`ecc361f0 00000000`00000000 00000000`00000000 : 0xfffff281`09780050
fffff281`0977ff60 ffffb809`ecc361f0     : ffffb809`ecc361f0 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1
fffff281`0977ff68 ffffb809`ecc361f0     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffb809`ecc361f0
fffff281`0977ff70 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffb809`ecc361f0


SYMBOL_NAME:  nt!MiSystemFault+172315

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  172315

FAILURE_BUCKET_ID:  AV_INVALID_BAD_IP_nt!MiSystemFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {48ad9531-e3f8-1044-fc5f-d917677674c7}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801439041ab, The address that the exception occurred at
Arg3: fffffb0298315558, Exception Record Address
Arg4: fffffb0298314d90, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 6280

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 39352

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff801439041ab

BUGCHECK_P3: fffffb0298315558

BUGCHECK_P4: fffffb0298314d90

EXCEPTION_RECORD:  fffffb0298315558 -- (.exr 0xfffffb0298315558)
ExceptionAddress: fffff801439041ab (dxgmms2!VIDMM_GLOBAL::RemoveAllocationFromDecommitList+0x0000000000000093)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 000000000000000a
Attempt to read from address 000000000000000a

CONTEXT:  fffffb0298314d90 -- (.cxr 0xfffffb0298314d90)
rax=ffff870836604f38 rbx=ffff8708308e0cc8 rcx=0000000000000002
rdx=0000000000000002 rsi=ffff8708308e0cb0 rdi=ffff870836604da0
rip=fffff801439041ab rsp=fffffb0298315790 rbp=fffffb02983158c0
r8=00000000ffffffff  r9=7fff8708308e0cb0 r10=fffff801332dbb10
r11=ffffae050eb27860 r12=0000000000000000 r13=fffffb0298315b40
r14=ffffae051d039210 r15=ffff870836604da0
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
dxgmms2!VIDMM_GLOBAL::RemoveAllocationFromDecommitList+0x93:
fffff801`439041ab 48394208        cmp     qword ptr [rdx+8],rax ds:002b:00000000`0000000a=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80133cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80133c0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80133c0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000000a

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  000000000000000a

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffffb02`98315790 fffff801`438e9198     : ffffae05`158dcc20 ffffae05`158d3000 ffffae05`00000000 ffffae05`158d3000 : dxgmms2!VIDMM_GLOBAL::RemoveAllocationFromDecommitList+0x93
fffffb02`983157c0 fffff801`438d9ce8     : ffffae05`158d3000 ffffae05`158dcc10 ffffae05`158d3000 ffffae05`158d3000 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x344c8
fffffb02`98315a00 fffff801`438e3e99     : ffff8708`29c82b50 ffffae05`144c2000 00000000`00000000 00000000`04e1f000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xb78
fffffb02`98315be0 fffff801`332a29a5     : ffffae05`144c2080 fffff801`438e3e90 ffff8708`29c82b50 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
fffffb02`98315c10 fffff801`333fc868     : ffffc000`19ae6180 ffffae05`144c2080 fffff801`332a2950 ffffffff`ffffffff : nt!PspSystemThreadStartup+0x55
fffffb02`98315c60 00000000`00000000     : fffffb02`98316000 fffffb02`98310000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VIDMM_GLOBAL::RemoveAllocationFromDecommitList+93

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.1124

STACK_COMMAND:  .cxr 0xfffffb0298314d90 ; kb

BUCKET_ID_FUNC_OFFSET:  93

FAILURE_BUCKET_ID:  AV_dxgmms2!VIDMM_GLOBAL::RemoveAllocationFromDecommitList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6c59b4be-29a7-a7bc-e0e2-8ae2ed2665e1}

Followup:     MachineOwner
---------
 
Tamamdır ben RAM'lerimi test ettikten hemen sonra sonuçlarını buraya tekrardan yazarım. Yardımlarınız için çok teşekkür ederim. İyi çalışmalar.

Abi RAM'lerde herhangi bir sorun yokmuş fotoğrafını şöyle aşağıya bıraktım.

20201207_185353.jpg


Ekran kartı ve PSU testini nasıl yapacağız Recep abi ?

BIOS güncelle o zaman. Güncelleyene kadar konuya yazma lütfen.

Güncelleme sonrası sabırlı ol. LED FW falan da güncelleyecek kendi.

Güncelledin mi?
Recep abi bilmem buraya yazmam ne kadar doğru fakat şuanda söylemiş olduğun testi yapmış bulunmaktayım. Senin söyleyeceğin diğer önerileri bekliyorum.
 
Son düzenleyen: Moderatör:
Furmark ve OCCT ile yapacağız.

Önce Furmark çalıştırın. 15dk yeterli.


Sorun olmazsa OCCT'ye geçin, Power testiyle başlayabiliriz 15 dk.

 

Geri
Yukarı