R3 1200 sistem mavi ekran veriyor

glbhkn

Decapat
Katılım
26 Eylül 2020
Mesajlar
65
İşlemci AMD Ryzen 3 1200 Quad-Core Processor, 3100 MHz, 4 çekirdek, 4 mantıksal işlemci.

Yüklü fiziksel bellek (RAM) 16, 0 GB.

Temel kart ürünü A320M PRO-VH Plus(MS-7B07)

Adı NVIDIA GeForce GTX 1050 Ti 4 GB.

Özelliklerim bunlar.

Bilgisayarım yaklaşık 2-3 saat sonra mavi ekran ya da siyah ekran veriyor ve kendisini kapatıyor. Mavi ekran sorunlarını araştırdım 1 aydan beri çözmeye çalışıyorum, her türlü sorunları düzelttim ama ginede aynı hataları veriyor ya da farklı bir hata veriyor. Driverlarımın hepsi güncel her şeyi tertemiz kurdum C diskimin formatladım tamamen fakat yine de aynı sorunları yaşıyorum. Oyunlarımda hiçbir şekilde sorun yaşamıyorum FPS'ım 300'lerde CS:GO'da veya başka bir oyunda drop yemioyurm ama bir anda dediğim gibi kapanıyor ya da mavi ekran veriyor. Yardımcı olursanız sevinirim.

https://drive.google.com/file/d/1sFTr5g1r05Cktzghy55mE6YTmZip6mXN/view?usp=sharing minidump dosyalarım burada.
 
Çıkarabilir.
En son sürümü yüklediniz derse aşağıdaki 7B07V3E versiyonlu BIOS'u kurun.

Eyvallah reis sağ olasın teşekkür ederim <3.
Çıkarabilir.
En son sürümü yüklediniz derse aşağıdaki 7B07V3E versiyonlu BIOS'u kurun.

Reis BIOS'u şimdi eski sürümüne güncelledim XMP açıktı onları da kapadım disabled ettim.
Çıkarabilir.
En son sürümü yüklediniz derse aşağıdaki 7B07V3E versiyonlu BIOS'u kurun.


Reis seni de rahatsız ediyorum ama 1 saatlik aralarla gine mavi ekran yedim sana zahmet bakar mısın şunlara.
 
Son düzenleme:
Malwarebytes kaldırınız.
DDU ile ekran kartı sürücünüzü kaldırıp güncelini yükleyiniz.
Ağ kartı sürücünüzü güncelleyiniz.
Memtest86 ile bellek testi yapınız.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffdf81419f0e70
Arg3: 0000000000000000
Arg4: fffff8041ab62eca

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9515

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 107467

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffdf81419f0e70

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8041ab62eca

TRAP_FRAME:  ffffdf81419f0e70 -- (.trap 0xffffdf81419f0e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041ab62eca rsp=0000000000000000 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
amdppm!ReadIoMemRaw+0x5a:
fffff804`1ab62eca c3              ret
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffdf81`419f0d28 fffff804`0c005e69     : 00000000`0000007f 00000000`00000008 ffffdf81`419f0e70 00000000`00000000 : nt!KeBugCheckEx
ffffdf81`419f0d30 fffff804`0c000c83     : 02e08211`0f000002 0002f082`110f0000 00000300`82110f00 48000003`10828948 : nt!KiBugCheckDispatch+0x69
ffffdf81`419f0e70 fffff804`1ab62eca     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`00000000 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : amdppm!ReadIoMemRaw+0x5a


SYMBOL_NAME:  amdppm!ReadIoMemRaw+5a

MODULE_NAME: amdppm

IMAGE_NAME:  amdppm.sys

IMAGE_VERSION:  10.0.19041.208

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5a

FAILURE_BUCKET_ID:  0x7f_8_amdppm!ReadIoMemRaw

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {224c29e4-aa37-00cf-dfef-b2ba3b97b525}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8055d5fb3a8, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5155

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9026

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8055d5fb3a8

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff8055defa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8055de0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8055de0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff

EXCEPTION_PARAMETER2:  ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

BAD_STACK_POINTER:  fffff805620c38e8

STACK_TEXT: 
fffff805`620c38e8 fffff805`5d64e5b9     : 00000000`0000001e ffffffff`c0000005 fffff805`5d5fb3a8 00000000`00000000 : nt!KeBugCheckEx
fffff805`620c38f0 fffff805`5d5f4d32     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1caa59
fffff805`620c3fb0 fffff805`5d5f4d00     : fffff805`5d605fa5 00000000`00000006 00000000`00000003 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8285`7ed25358 fffff805`5d605fa5     : 00000000`00000006 00000000`00000003 00000000`00000000 00000000`00000005 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8285`7ed25360 fffff805`5d601ce0     : ffff8285`7ed25710 fffff805`5d5fae64 00000000`00000000 00000001`00000000 : nt!KiExceptionDispatch+0x125
ffff8285`7ed25540 fffff805`5d5fb3a8     : f4fff805`5d5fac26 f7ffdc80`5eb08180 07000000`00000000 fdfff805`5d200000 : nt!KiGeneralProtectionFault+0x320
ffff8285`7ed256d8 f4fff805`5d5fac26     : f7ffdc80`5eb08180 07000000`00000000 fdfff805`5d200000 f6ffa607`0e865080 : nt!SwapContext+0x4a8
ffff8285`7ed256e0 f7ffdc80`5eb08180     : 07000000`00000000 fdfff805`5d200000 f6ffa607`0e865080 00000000`0000000f : 0xf4fff805`5d5fac26
ffff8285`7ed256e8 07000000`00000000     : fdfff805`5d200000 f6ffa607`0e865080 00000000`0000000f 00000000`00000400 : 0xf7ffdc80`5eb08180
ffff8285`7ed256f0 fdfff805`5d200000     : f6ffa607`0e865080 00000000`0000000f 00000000`00000400 7eec3dcd`ef89c429 : 0x07000000`00000000
ffff8285`7ed256f8 f6ffa607`0e865080     : 00000000`0000000f 00000000`00000400 7eec3dcd`ef89c429 62cee072`c7f85d84 : 0xfdfff805`5d200000
ffff8285`7ed25700 00000000`0000000f     : 00000000`00000400 7eec3dcd`ef89c429 62cee072`c7f85d84 bea0465d`2bc764f3 : 0xf6ffa607`0e865080
ffff8285`7ed25708 00000000`00000400     : 7eec3dcd`ef89c429 62cee072`c7f85d84 bea0465d`2bc764f3 a004b742`b4b28e4b : 0xf
ffff8285`7ed25710 7eec3dcd`ef89c429     : 62cee072`c7f85d84 bea0465d`2bc764f3 a004b742`b4b28e4b 00000000`00000000 : 0x400
ffff8285`7ed25718 62cee072`c7f85d84     : bea0465d`2bc764f3 a004b742`b4b28e4b 00000000`00000000 00000000`00000000 : 0x7eec3dcd`ef89c429
ffff8285`7ed25720 bea0465d`2bc764f3     : a004b742`b4b28e4b 00000000`00000000 00000000`00000000 00000000`00000000 : 0x62cee072`c7f85d84
ffff8285`7ed25728 a004b742`b4b28e4b     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xbea0465d`2bc764f3
ffff8285`7ed25730 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xa004b742`b4b28e4b


SYMBOL_NAME:  nt!SwapContext+4a8

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4a8

FAILURE_BUCKET_ID:  0x1E_c0000005_R_STACKPTR_ERROR_nt!SwapContext

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {bd591bce-fa9d-a983-0398-0157fd169b8e}
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80068a172f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80065d05808, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for rt640x64.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11030

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 58092

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: fffff80068a172f0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80065d05808

READ_ADDRESS: fffff800666fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8006660f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8006660f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 fffff80068a172f0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff9085024de130 -- (.trap 0xffff9085024de130)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80065d05808 rsp=ffff9085024de2c0 rbp=0000000000000004
 r8=ffffde8329a25f70  r9=0000000000000004 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!MiFillSystemPtes+0xa8:
fffff800`65d05808 498b9cc7d0720100 mov     rbx,qword ptr [r15+rax*8+172D0h] ds:00000000`000172f0=????????????????
Resetting default scope

STACK_TEXT: 
ffff9085`024de2c0 fffff800`65d05692     : ffffde83`00000001 00000000`00000001 ffff9085`024de988 ffffde83`2a451720 : nt!MiFillSystemPtes+0xa8
ffff9085`024de380 fffff800`73f5b795     : ffffde83`29a25f40 00000000`00000000 00000000`00000254 ffffde83`295e8de0 : nt!MmMapLockedPagesSpecifyCache+0x162
ffff9085`024de3e0 fffff800`73f5b31d     : 00000000`00000000 00000000`00000000 00001e00`00001e00 00000000`00000000 : afd!AfdMapMdlChain+0x39
ffff9085`024de420 fffff800`73f1245e     : ffffde83`28edf900 ffffde83`00000000 ffffde83`00000254 00000000`00000000 : afd!AfdSetupReceiveDatagramIrp+0x6d
ffff9085`024de4e0 fffff800`73f5d1c9     : ffffde83`289ff2b0 ffffde83`253f60e0 ffffde83`253f6118 fffff800`6b584d1b : afd!AfdReceiveDatagramEventCommonHandler+0x32e
ffff9085`024de600 fffff800`6bb1704b     : ffff9085`024de7d0 00000000`00000000 ffff9085`00000254 00000000`00000000 : afd!AfdTLDgramReceiveEventHandler+0x149
ffff9085`024de6d0 fffff800`6bb15d7d     : 00000000`00000000 ffff9085`024de9f0 ffffde83`2a451791 ffff9085`024de988 : tcpip!UdpDeliverDatagrams+0x8eb
ffff9085`024de8f0 fffff800`6bb159c0     : ffffde83`2a554320 00000000`00000001 00000000`00000000 ffff9085`024df0b0 : tcpip!UdpReceiveDatagrams+0x2ad
ffff9085`024decf0 fffff800`6bb00969     : 00000000`00000000 00000000`00000001 ffffde83`23eee9f0 00000000`00000000 : tcpip!UdpNlClientReceiveDatagrams+0x10
ffff9085`024ded20 fffff800`6bb59a2e     : ffffde83`250ff140 ffffde83`2560c970 00000001`ffffff11 fffffff6`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
ffff9085`024defb0 fffff800`65cb8908     : ffffde83`2378ff60 00000000`00000002 ffffde83`236ee040 ffff9085`024df2a8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
ffff9085`024df100 fffff800`65cb887d     : fffff800`6bb59900 ffff9085`024df2a8 ffffde83`234dac40 fffff800`6b6f23af : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff9085`024df170 fffff800`6bae331d     : ffffde83`282a4488 00000000`00000000 ffffde83`28f31a20 fffff800`6bdd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff9085`024df1b0 fffff800`6bae29fd     : 00000000`00000001 ffff9085`024df310 ffffde83`2560c970 00000000`00000000 : tcpip!NetioExpandKernelStackAndCallout+0x8d
ffff9085`024df210 fffff800`6b581eb0     : ffffde83`23e8c961 00000000`00000001 ffffde83`238439b0 ffff9085`024df620 : tcpip!FlReceiveNetBufferListChain+0x46d
ffff9085`024df4c0 fffff800`6b581ccb     : ffffde83`25613050 fffff800`00000001 ffff9085`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
ffff9085`024df5a0 fffff800`6b587ef0     : ffffde83`23ae41a0 ffffde83`23f45001 ffffde83`23ae41a0 ffffde83`29413001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
ffff9085`024df620 fffff800`6b5bdcf3     : ffffde83`23f45030 ffff9085`024df6f1 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
ffff9085`024df670 fffff800`6b584a94     : 00000000`00008c94 00000000`00000001 ffffde83`23ae41a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
ffff9085`024df740 fffff800`74516a28     : ffffde83`23ee0000 ffffde83`23ee0000 00000000`00000000 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffff9085`024df7d0 ffffde83`23ee0000     : ffffde83`23ee0000 00000000`00000000 00000000`00000000 00000000`00000001 : rt640x64+0x26a28
ffff9085`024df7d8 ffffde83`23ee0000     : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : 0xffffde83`23ee0000
ffff9085`024df7e0 00000000`00000000     : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : 0xffffde83`23ee0000


STACK_COMMAND:  .trap 0xffff9085024de130 ; kb

SYMBOL_NAME:  rt640x64+26a28

MODULE_NAME: rt640x64

IMAGE_NAME:  rt640x64.sys

BUCKET_ID_FUNC_OFFSET:  26a28

FAILURE_BUCKET_ID:  AV_rt640x64!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2e96e72d-48ac-dceb-22bd-11e71513e43e}

Followup:     MachineOwner
---------*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000000c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8010e2e6955, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5218

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 20050

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8010e2e6955

READ_ADDRESS: fffff8010ecfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8010ec0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8010ec0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 000000000000000c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

TRAP_FRAME:  ffffaa0ce9ab5710 -- (.trap 0xffffaa0ce9ab5710)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8a0540d58010 rbx=0000000000000000 rcx=0000000000000004
rdx=ffff8a053edf9348 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8010e2e6955 rsp=ffffaa0ce9ab58a0 rbp=ffffaa0ce9ab5920
 r8=ffff8a053d6900c0  r9=fffff8010e000000 r10=ffffffffffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiDeliverApc+0x135:
fffff801`0e2e6955 48395108        cmp     qword ptr [rcx+8],rdx ds:00000000`0000000c=????????????????
Resetting default scope

STACK_TEXT: 
ffffaa0c`e9ab55c8 fffff801`0e405e69     : 00000000`0000000a 00000000`0000000c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffaa0c`e9ab55d0 fffff801`0e402169     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffaa0c`e9ab5710 fffff801`0e2e6955     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffaa0c`e9ab58a0 fffff801`0e20dcfb     : 00000000`00000e74 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x135
ffffaa0c`e9ab5950 fffff801`0e2c76af     : ffff8a05`3cad5f30 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCheckForKernelApcDelivery+0x2b
ffffaa0c`e9ab5980 fffff801`0e6d4b41     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeLeaveCriticalRegionThread+0x2f
ffffaa0c`e9ab59b0 fffff801`0e6d48fe     : ffff8a05`3d6900c0 00000000`00000002 ffff8a05`354c1900 00000000`00000001 : nt!ObpReferenceObjectByHandleWithTag+0x231
ffffaa0c`e9ab5a40 fffff801`0e6a4890     : 00000000`00000000 ffff8a05`3edf9280 00000000`1aa1ec28 ffffaa0c`e9ab5aa8 : nt!ObReferenceObjectByHandle+0x2e
ffffaa0c`e9ab5a90 fffff801`0e4058b8     : ffff8a05`3edf9280 00000000`00000000 00000000`00000000 ffff8a05`3cad5f60 : nt!NtSetEvent+0x90
ffffaa0c`e9ab5b00 00000000`77411cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1aa1ec08 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77411cfc


SYMBOL_NAME:  nt!KiDeliverApc+135

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  135

FAILURE_BUCKET_ID:  AV_nt!KiDeliverApc

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f94393b9-4308-5aa6-9044-71825dde3286}

Followup:     MachineOwner
---------
Üst üste mesaj atınca bildirim gelmemiş o yüzden konuya bakmamışım kusura bakmayın.
 

Geri
Yukarı