R5 3500X sistemde "SYSTEM_SERVICE_EXCEPTION" mavi ekran hatası

İşletim sistemi
Windows 11

RipeCK

Centipat
Katılım
10 Temmuz 2022
Mesajlar
10
Daha fazla  
Cinsiyet
Erkek
RAM
G.Skill RipjawsV 16 GB (2x8gb) 3600MHz
SSD veya HDD modeli
Toshiba TR200 - Seagate BarraCuda 2TB 7200RPM
Ekran kartı
MSI RX 570
Anakart
Asus PRIME B450M-K II
İşlemci
AMD Ryzen 5 3500X 6-Core Processor
Sistemi ilk aldıgımdan itibaren birçok mavi ekran hataları alıyorum. Hatta format atarken bile maruz kaldım. Yardımcı olursanız çok sevinirim.

 
Depolama kaynaklı gibi. İkisine de HD Tune Pro ile hata (quick scan kapalı şekilde) taraması yapıp sonuçları paylaşın. Aynı yazılımdan sağlık bilgilerini de paylaşın.

Normalde RAM'e de sallayacaktım ama RAM değişikliğinden önce de hata alıyormuşsunuz, o dursun şimdilik.

Çipset sürücüsünü de güncelleyin:

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8077c692adf, Address of the instruction which caused the BugCheck
Arg3: ffffea8198b848c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1874

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5456

    Key  : Analysis.Init.CPU.mSec
    Value: 609

    Key  : Analysis.Init.Elapsed.mSec
    Value: 48705

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  071522-10078-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8077c692adf

BUGCHECK_P3: ffffea8198b848c0

BUGCHECK_P4: 0

CONTEXT:  ffffea8198b848c0 -- (.cxr 0xffffea8198b848c0)
rax=000000000000005d rbx=0000000000000001 rcx=0000000000000012
rdx=00000000001f0003 rsi=ffff990e00820088 rdi=0000000000000001
rip=fffff8077c692adf rsp=ffffea8198b852e0 rbp=ffffea8198b85320
 r8=990eeb05d1b07db5  r9=0000000000000000 r10=0000000000000001
r11=fffff8077c000000 r12=0000000000000000 r13=0000000000000001
r14=ffff990eeb05d1b0 r15=ffff990eeb05d1e0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ObWaitForMultipleObjects+0x22f:
fffff807`7c692adf 488b4620        mov     rax,qword ptr [rsi+20h] ds:002b:ffff990e`008200a8=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RobloxPlayerBe

STACK_TEXT: 
ffffea81`98b852e0 fffff807`7c791c1c     : 00000000`00000000 00000000`00000001 00000000`08a1ff08 fffff807`00000000 : nt!ObWaitForMultipleObjects+0x22f
ffffea81`98b857e0 fffff807`7c42a278     : 00000000`000003c0 ffff990e`ea6a5080 00000000`07c5e9b8 fffff807`7c788370 : nt!NtWaitForMultipleObjects32+0x11c
ffffea81`98b85a70 00000000`77361cf3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`07c5e998 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77361cf3


SYMBOL_NAME:  nt!ObWaitForMultipleObjects+22f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.795

STACK_COMMAND:  .cxr 0xffffea8198b848c0 ; kb

BUCKET_ID_FUNC_OFFSET:  22f

FAILURE_BUCKET_ID:  AV_nt!ObWaitForMultipleObjects

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {53188f0d-e1b8-788f-a37a-25a7a83704bd}

Followup:     MachineOwner
---------


APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077061cf3, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 00000000ffff0000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff938749a2fb60, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1327

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1335

    Key  : Analysis.Init.CPU.mSec
    Value: 577

    Key  : Analysis.Init.Elapsed.mSec
    Value: 52113

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1

    Key  : Bugcheck.Code.Register
    Value: 0x1

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  071522-10390-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1

BUGCHECK_P1: 77061cf3

BUGCHECK_P2: 0

BUGCHECK_P3: ffff0000

BUGCHECK_P4: ffff938749a2fb60

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RobloxPlayerBe

STACK_TEXT: 
ffff9387`49a2f998 fffff806`8562a8a9     : 00000000`00000001 00000000`77061cf3 00000000`00000000 00000000`ffff0000 : nt!KeBugCheckEx
ffff9387`49a2f9a0 fffff806`8562a76b     : ffffd182`9ccdb080 ffffd182`9b61f080 ffffffff`fffddd20 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9387`49a2fae0 00000000`77061cf3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x238
00000000`09b7edc8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77061cf3


SYMBOL_NAME:  nt!KiSystemServiceExitPico+238

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.795

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  238

FAILURE_BUCKET_ID:  0x1_SysCallNum_40070_nt!KiSystemServiceExitPico

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {62591322-e178-777b-3e39-cdc4544eb06c}

Followup:     MachineOwner
---------


UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff810193ec0e70
Arg3: fffffd0699c93f70
Arg4: fffff8072b4de55f

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1983

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9346

    Key  : Analysis.Init.CPU.mSec
    Value: 640

    Key  : Analysis.Init.Elapsed.mSec
    Value: 37146

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1000007f

    Key  : Bugcheck.Code.Register
    Value: 0x7f

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  071622-11140-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffff810193ec0e70

BUGCHECK_P3: fffffd0699c93f70

BUGCHECK_P4: fffff8072b4de55f

STACK_OVERFLOW: Stack Limit: fffffd0699c94000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xfffff8072b4e2731 was blamed for the stack overflow. It is using 8800 bytes of stack total in 5 instances (likely recursion).

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  r5apex.exe

STACK_TEXT: 
fffffd06`99c93f70 fffff807`2b4e2731     : ffffffff`ffffffff fffffd06`99c94a90 fffffd06`99c94a90 fffffd06`99c94200 : nt!RtlDispatchException+0x4f
fffffd06`99c941d0 fffff807`2b62a9ce     : 00000000`00001000 fffffd06`99c94a90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c948b0 fffff807`2b6269da     : 00000000`00000000 00000000`00000000 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c94a90 fffff807`2b4e092f     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c94c20 fffff807`2b4e03ce     : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c94ce0 fffff807`2b4df3f9     : fffffd06`99c99950 fffffd06`99c94e90 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c94d90 fffff807`2b4de706     : fffffd06`99c95390 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c94e90 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c94e20 fffff807`2b4e2731     : ffffffff`ffffffff fffffd06`99c95e40 fffffd06`99c95e40 fffffd06`99c955b0 : nt!RtlDispatchException+0x1f6
fffffd06`99c95580 fffff807`2b62a9ce     : 00000000`00001000 fffffd06`99c95e40 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c95c60 fffff807`2b6269da     : 00000000`00000000 00000000`00000000 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c95e40 fffff807`2b4e092f     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c95fd0 fffff807`2b4e03ce     : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c96090 fffff807`2b4df3f9     : fffffd06`99c99950 fffffd06`99c96240 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c96140 fffff807`2b4de706     : fffffd06`99c96740 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c96240 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c961d0 fffff807`2b4e2731     : ffffffff`ffffffff fffffd06`99c971f0 fffffd06`99c971f0 fffffd06`99c96960 : nt!RtlDispatchException+0x1f6
fffffd06`99c96930 fffff807`2b62a9ce     : 00000000`00001000 fffffd06`99c971f0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c97010 fffff807`2b6269da     : 00000166`c8cc1220 00000000`00000004 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c971f0 fffff807`2b4e092f     : 00000000`00000030 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c97380 fffff807`2b4e03ce     : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c97440 fffff807`2b4df3f9     : fffffd06`99c99950 fffffd06`99c975f0 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c974f0 fffff807`2b4de706     : fffffd06`99c97af0 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c975f0 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c97580 fffff807`2b4e2731     : ffffffff`ffffffff fffffd06`99c985a0 fffffd06`99c985a0 fffffd06`99c97d10 : nt!RtlDispatchException+0x1f6
fffffd06`99c97ce0 fffff807`2b62a9ce     : 00000000`00001000 fffffd06`99c985a0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c983c0 fffff807`2b6269da     : 00000000`00000000 00000000`00000000 00007fff`fffeffff fffffd06`99c98b00 : nt!KiExceptionDispatch+0x10e
fffffd06`99c985a0 fffff807`2b4e092f     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c98730 fffff807`2b4e03ce     : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c987f0 fffff807`2b4df3f9     : 00000000`0010000b fffffd06`99c989a0 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c988a0 fffff807`2b4de706     : fffffd06`99c98ea0 fffff807`2b62a280 00000000`0010000b fffffd06`99c989a0 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c98930 fffff807`2b4e2731     : ffffffff`ffffffff fffffd06`99c99950 fffffd06`99c99950 fffffd06`99c990c0 : nt!RtlDispatchException+0x1f6
fffffd06`99c99090 fffff807`2b62a9ce     : 00000000`00001000 fffffd06`99c99950 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c99770 fffff807`2b6269da     : 00000000`0000003f 00000000`00000000 00007ff6`40722240 ffff9503`8ad14158 : nt!KiExceptionDispatch+0x10e
fffffd06`99c99950 fffff807`2b62a280     : ffff9503`b61be080 ffff9503`8ad14080 fffffd06`99c99b60 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c99ae0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit


SYMBOL_NAME:  nt!KiDispatchException+1b1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.795

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1b1

FAILURE_BUCKET_ID:  0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {cbb9a1ac-821c-b542-365f-2dd5602e6100}

Followup:     MachineOwner
---------


CLOCK_WATCHDOG_TIMEOUT (101)
An expected clock interrupt was not received on a secondary processor in an
MP system within the allocated interval. This indicates that the specified
processor is hung and not processing interrupts.
Arguments:
Arg1: 0000000000000020, Clock interrupt time out interval in nominal clock ticks.
Arg2: 0000000000000000, 0.
Arg3: ffffe78045640180, The PRCB address of the hung processor.
Arg4: 0000000000000003, The index of the hung processor.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1327

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13770

    Key  : Analysis.Init.CPU.mSec
    Value: 702

    Key  : Analysis.Init.Elapsed.mSec
    Value: 56309

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 106

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x101

    Key  : Bugcheck.Code.Register
    Value: 0x101

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  071722-10265-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  101

BUGCHECK_P1: 20

BUGCHECK_P2: 0

BUGCHECK_P3: ffffe78045640180

BUGCHECK_P4: 3

FAULTING_PROCESSOR: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
fffff801`100b69e8 fffff801`11091fb4     : 00000000`00000101 00000000`00000020 00000000`00000000 ffffe780`45640180 : nt!KeBugCheckEx
fffff801`100b69f0 fffff801`10eb6d71     : 00000000`00000000 fffff801`0fd27180 ffff35e7`2b1d5f8e fffff801`10f3e240 : nt!KeAccumulateTicks+0x1db064
fffff801`100b6a60 fffff801`10eb3da6     : 00000000`000e5c22 00000000`00088f25 00000022`3c958cf9 00000000`00000000 : nt!KiUpdateRunTime+0x61
fffff801`100b6ac0 fffff801`10eb50b2     : ffffbc89`495b9e90 00000000`00000000 fffff801`1182b450 00000000`00000000 : nt!KiUpdateTime+0x686
fffff801`100b6eb0 fffff801`10eb29e2     : ffffbc89`495b9e90 fffff801`118f7de0 fffff801`00000000 00000000`0000000c : nt!KeClockInterruptNotify+0x272
fffff801`100b6f40 fffff801`10e91340     : 00000022`3d87281c fffff801`118f7d30 ffffe780`47a7e830 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
fffff801`100b6f70 fffff801`1101990a     : ffffbc89`495b9f10 fffff801`118f7d30 00000e71`8e2a273e 00000000`00000001 : nt!KiCallInterruptServiceRoutine+0xa0
fffff801`100b6fb0 fffff801`11019ed7     : 00000000`181b1c3c fffff801`0fd27180 fffff801`0fd2a250 fffff801`0fd2a148 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffbc89`495b9e90 fffff801`10e627e0     : 86000004`100c4900 fffff801`0fd27180 ffffbc89`495ba110 86000004`100c4900 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffbc89`495ba020 fffff801`10e33d79     : 86000004`100c4900 00000000`00000000 86000004`100c4921 00000000`00000000 : nt!MiFlushTbList+0x400
ffffbc89`495ba0b0 fffff801`10ebe36c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffbc89`495ba310 : nt!MmSetAddressRangeModifiedEx+0x2a9
ffffbc89`495ba210 fffff801`10f5835f     : ffff9788`04509c68 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcFlushCachePriv+0x6ec
ffffbc89`495ba3b0 fffff801`1649fc79     : 00000000`00000005 00000000`00000000 00000000`00000000 ffffc001`3b2d0170 : nt!CcCoherencyFlushAndPurgeCache+0x7f
ffffbc89`495ba400 fffff801`1649f98f     : ffffc001`3b2d0170 ffffbc89`495ba9c1 ffffc001`3b2d0000 ffff9788`0427c018 : Ntfs!NtfsCoherencyFlushAndPurgeCache+0x55
ffffbc89`495ba440 fffff801`164eb981     : ffffc001`3b2d0170 ffffc001`3b2d0170 ffffc001`3b2d0170 ffffc001`3b2d0010 : Ntfs!NtfsFlushUserStream+0xdf
ffffbc89`495ba4d0 fffff801`164eda3d     : ffffc001`3b2d0170 ffffc001`3b2d0170 ffff9788`04557c88 ffffc001`3b266be0 : Ntfs!NtfsPerformOptimisticFlush+0xa1
ffffbc89`495ba520 fffff801`164ebec9     : ffff9788`0427c018 ffff9788`05ad58a0 fffff801`164ebe01 ffffbc89`495ba9c1 : Ntfs!NtfsCommonFlushBuffers+0x289
ffffbc89`495ba630 fffff801`10ee4ab8     : ffffbc89`495ba740 ffff9788`0427c018 ffff9788`00000000 00000022`3987d5d2 : Ntfs!NtfsCommonFlushBuffersCallout+0x19
ffffbc89`495ba660 fffff801`10ee4a2d     : fffff801`164ebeb0 ffffbc89`495ba740 ffff9788`0427c018 fffff801`15796d68 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffbc89`495ba6d0 fffff801`1647ed9e     : ffffbc89`495ba820 fffff801`163b2616 ffffbc89`495ba738 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffbc89`495ba710 fffff801`1647ecc5     : ffff9788`0427c018 ffff9788`05ad58a0 ffffbc89`495ba9c1 ffff9788`05ad58a0 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x66
ffffbc89`495ba780 fffff801`10e504a5     : ffff9788`00000000 ffff9788`05ad58a0 ffff9788`0427c018 ffffbc89`495ba7b0 : Ntfs!NtfsFsdFlushBuffers+0xf5
ffffbc89`495ba810 fffff801`15797bb5     : ffffbc89`495bb000 ffffbc89`495b5000 00000000`00000000 ffffbc89`495ba8f0 : nt!IofCallDriver+0x55
ffffbc89`495ba850 fffff801`15795853     : ffffbc89`495ba8e0 00000000`00000000 ffffbc89`495baa00 ffff9787`fc9825c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2b5
ffffbc89`495ba8c0 fffff801`10e504a5     : ffff9788`05ad58a0 00000000`0012019f ffff9788`0441f310 00000000`0009be01 : FLTMGR!FltpDispatch+0xa3
ffffbc89`495ba920 fffff801`1128e4b2     : 00000000`00000001 ffff9788`05ad58a0 ffffbc89`495ba9c1 fffff801`10e50263 : nt!IofCallDriver+0x55
ffffbc89`495ba960 fffff801`113a222b     : ffff9788`00000000 ffffbc89`495bab60 00000000`00000000 ffff9788`05ad58a0 : nt!IopSynchronousServiceTail+0x1d2
ffffbc89`495baa10 fffff801`113a2016     : ffff9788`05b81040 00000000`00000000 ffff9787`fcb2dda0 ffffbc89`495baa68 : nt!NtFlushBuffersFileEx+0x1fb
ffffbc89`495baaa0 fffff801`1102a278     : ffff9788`05b81040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtFlushBuffersFile+0x16
ffffbc89`495baae0 00007ffd`83ca4874     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000082`d3efe528 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`83ca4874


SYMBOL_NAME:  nt!KeAccumulateTicks+1db064

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.795

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1db064

FAILURE_BUCKET_ID:  CLOCK_WATCHDOG_TIMEOUT_IDLE_THREAD_INVALID_CONTEXT_nt!KeAccumulateTicks

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b37ea922-6ea8-0080-e849-451291ca96f3}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80b733088b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803728a9fc9, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1639

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7425

    Key  : Analysis.Init.CPU.mSec
    Value: 483

    Key  : Analysis.Init.Elapsed.mSec
    Value: 50516

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  071722-10281-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: fffff80b733088b8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803728a9fc9

READ_ADDRESS: fffff80373305450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff80b733088b8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffcb81b5c52c70 -- (.trap 0xffffcb81b5c52c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=00000000ffffffff
rdx=000000000000ffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff803728a9fc9 rsp=ffffcb81b5c52e00 rbp=ffffcb81b5c52e89
 r8=ffff800a97679a78  r9=0000000000000000 r10=0000000000000000
r11=fffff80372600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiDeferredReadySingleThread+0xc09:
fffff803`728a9fc9 498bb4c3c088d000 mov     rsi,qword ptr [r11+rax*8+0D088C0h] ds:fffff80b`733088b8=????????????????
Resetting default scope

STACK_TEXT: 
ffffcb81`b5c52b28 fffff803`72a2a8a9     : 00000000`0000000a fffff80b`733088b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffcb81`b5c52b30 fffff803`72a26a00     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcb81`b5c52c70 fffff803`728a9fc9     : fffff803`732e6350 fffff803`7284849b 00000000`00000000 ffff9001`a4c40180 : nt!KiPageFault+0x440
ffffcb81`b5c52e00 fffff803`72886ecf     : ffff9001`a4c40180 ffff9001`a4c40100 ffffcb81`b5c52f78 00000000`00000000 : nt!KiDeferredReadySingleThread+0xc09
ffffcb81`b5c52ef0 fffff803`72927bd5     : ffff9001`a4c40180 ffff800a`976790c0 ffff9001`a4c40180 00000000`00000000 : nt!KiQueueReadyThread+0x31f
ffffcb81`b5c52f60 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSetLegacyAffinityThread+0x295


SYMBOL_NAME:  nt!KiDeferredReadySingleThread+c09

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.795

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  c09

FAILURE_BUCKET_ID:  AV_nt!KiDeferredReadySingleThread

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {626f59d5-90cc-ab48-85f0-60e170096c96}

Followup:     MachineOwner
---------
 
Depolama kaynaklı gibi. İkisine de HD Tune Pro ile hata (quick scan kapalı şekilde) taraması yapıp sonuçları paylaşın. Aynı yazılımdan sağlık bilgilerini de paylaşın.

Normalde RAM'e de sallayacaktım ama RAM değişikliğinden önce de hata alıyormuşsunuz, o dursun şimdilik.

Çipset sürücüsünü de güncelleyin:

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8077c692adf, Address of the instruction which caused the BugCheck
Arg3: ffffea8198b848c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1874

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5456

    Key  : Analysis.Init.CPU.mSec
    Value: 609

    Key  : Analysis.Init.Elapsed.mSec
    Value: 48705

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  071522-10078-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8077c692adf

BUGCHECK_P3: ffffea8198b848c0

BUGCHECK_P4: 0

CONTEXT:  ffffea8198b848c0 -- (.cxr 0xffffea8198b848c0)
rax=000000000000005d rbx=0000000000000001 rcx=0000000000000012
rdx=00000000001f0003 rsi=ffff990e00820088 rdi=0000000000000001
rip=fffff8077c692adf rsp=ffffea8198b852e0 rbp=ffffea8198b85320
 r8=990eeb05d1b07db5  r9=0000000000000000 r10=0000000000000001
r11=fffff8077c000000 r12=0000000000000000 r13=0000000000000001
r14=ffff990eeb05d1b0 r15=ffff990eeb05d1e0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ObWaitForMultipleObjects+0x22f:
fffff807`7c692adf 488b4620        mov     rax,qword ptr [rsi+20h] ds:002b:ffff990e`008200a8=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RobloxPlayerBe

STACK_TEXT:
ffffea81`98b852e0 fffff807`7c791c1c     : 00000000`00000000 00000000`00000001 00000000`08a1ff08 fffff807`00000000 : nt!ObWaitForMultipleObjects+0x22f
ffffea81`98b857e0 fffff807`7c42a278     : 00000000`000003c0 ffff990e`ea6a5080 00000000`07c5e9b8 fffff807`7c788370 : nt!NtWaitForMultipleObjects32+0x11c
ffffea81`98b85a70 00000000`77361cf3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`07c5e998 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77361cf3


SYMBOL_NAME:  nt!ObWaitForMultipleObjects+22f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.795

STACK_COMMAND:  .cxr 0xffffea8198b848c0 ; kb

BUCKET_ID_FUNC_OFFSET:  22f

FAILURE_BUCKET_ID:  AV_nt!ObWaitForMultipleObjects

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {53188f0d-e1b8-788f-a37a-25a7a83704bd}

Followup:     MachineOwner
---------


APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077061cf3, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 00000000ffff0000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff938749a2fb60, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1327

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1335

    Key  : Analysis.Init.CPU.mSec
    Value: 577

    Key  : Analysis.Init.Elapsed.mSec
    Value: 52113

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1

    Key  : Bugcheck.Code.Register
    Value: 0x1

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  071522-10390-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1

BUGCHECK_P1: 77061cf3

BUGCHECK_P2: 0

BUGCHECK_P3: ffff0000

BUGCHECK_P4: ffff938749a2fb60

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RobloxPlayerBe

STACK_TEXT:
ffff9387`49a2f998 fffff806`8562a8a9     : 00000000`00000001 00000000`77061cf3 00000000`00000000 00000000`ffff0000 : nt!KeBugCheckEx
ffff9387`49a2f9a0 fffff806`8562a76b     : ffffd182`9ccdb080 ffffd182`9b61f080 ffffffff`fffddd20 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9387`49a2fae0 00000000`77061cf3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x238
00000000`09b7edc8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77061cf3


SYMBOL_NAME:  nt!KiSystemServiceExitPico+238

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.795

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  238

FAILURE_BUCKET_ID:  0x1_SysCallNum_40070_nt!KiSystemServiceExitPico

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {62591322-e178-777b-3e39-cdc4544eb06c}

Followup:     MachineOwner
---------


UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff810193ec0e70
Arg3: fffffd0699c93f70
Arg4: fffff8072b4de55f

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1983

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9346

    Key  : Analysis.Init.CPU.mSec
    Value: 640

    Key  : Analysis.Init.Elapsed.mSec
    Value: 37146

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1000007f

    Key  : Bugcheck.Code.Register
    Value: 0x7f

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  071622-11140-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffff810193ec0e70

BUGCHECK_P3: fffffd0699c93f70

BUGCHECK_P4: fffff8072b4de55f

STACK_OVERFLOW: Stack Limit: fffffd0699c94000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xfffff8072b4e2731 was blamed for the stack overflow. It is using 8800 bytes of stack total in 5 instances (likely recursion).

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  r5apex.exe

STACK_TEXT:
fffffd06`99c93f70 fffff807`2b4e2731     : ffffffff`ffffffff fffffd06`99c94a90 fffffd06`99c94a90 fffffd06`99c94200 : nt!RtlDispatchException+0x4f
fffffd06`99c941d0 fffff807`2b62a9ce     : 00000000`00001000 fffffd06`99c94a90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c948b0 fffff807`2b6269da     : 00000000`00000000 00000000`00000000 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c94a90 fffff807`2b4e092f     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c94c20 fffff807`2b4e03ce     : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c94ce0 fffff807`2b4df3f9     : fffffd06`99c99950 fffffd06`99c94e90 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c94d90 fffff807`2b4de706     : fffffd06`99c95390 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c94e90 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c94e20 fffff807`2b4e2731     : ffffffff`ffffffff fffffd06`99c95e40 fffffd06`99c95e40 fffffd06`99c955b0 : nt!RtlDispatchException+0x1f6
fffffd06`99c95580 fffff807`2b62a9ce     : 00000000`00001000 fffffd06`99c95e40 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c95c60 fffff807`2b6269da     : 00000000`00000000 00000000`00000000 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c95e40 fffff807`2b4e092f     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c95fd0 fffff807`2b4e03ce     : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c96090 fffff807`2b4df3f9     : fffffd06`99c99950 fffffd06`99c96240 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c96140 fffff807`2b4de706     : fffffd06`99c96740 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c96240 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c961d0 fffff807`2b4e2731     : ffffffff`ffffffff fffffd06`99c971f0 fffffd06`99c971f0 fffffd06`99c96960 : nt!RtlDispatchException+0x1f6
fffffd06`99c96930 fffff807`2b62a9ce     : 00000000`00001000 fffffd06`99c971f0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c97010 fffff807`2b6269da     : 00000166`c8cc1220 00000000`00000004 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c971f0 fffff807`2b4e092f     : 00000000`00000030 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c97380 fffff807`2b4e03ce     : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c97440 fffff807`2b4df3f9     : fffffd06`99c99950 fffffd06`99c975f0 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c974f0 fffff807`2b4de706     : fffffd06`99c97af0 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c975f0 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c97580 fffff807`2b4e2731     : ffffffff`ffffffff fffffd06`99c985a0 fffffd06`99c985a0 fffffd06`99c97d10 : nt!RtlDispatchException+0x1f6
fffffd06`99c97ce0 fffff807`2b62a9ce     : 00000000`00001000 fffffd06`99c985a0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c983c0 fffff807`2b6269da     : 00000000`00000000 00000000`00000000 00007fff`fffeffff fffffd06`99c98b00 : nt!KiExceptionDispatch+0x10e
fffffd06`99c985a0 fffff807`2b4e092f     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c98730 fffff807`2b4e03ce     : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c987f0 fffff807`2b4df3f9     : 00000000`0010000b fffffd06`99c989a0 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c988a0 fffff807`2b4de706     : fffffd06`99c98ea0 fffff807`2b62a280 00000000`0010000b fffffd06`99c989a0 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c98930 fffff807`2b4e2731     : ffffffff`ffffffff fffffd06`99c99950 fffffd06`99c99950 fffffd06`99c990c0 : nt!RtlDispatchException+0x1f6
fffffd06`99c99090 fffff807`2b62a9ce     : 00000000`00001000 fffffd06`99c99950 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c99770 fffff807`2b6269da     : 00000000`0000003f 00000000`00000000 00007ff6`40722240 ffff9503`8ad14158 : nt!KiExceptionDispatch+0x10e
fffffd06`99c99950 fffff807`2b62a280     : ffff9503`b61be080 ffff9503`8ad14080 fffffd06`99c99b60 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c99ae0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit


SYMBOL_NAME:  nt!KiDispatchException+1b1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.795

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1b1

FAILURE_BUCKET_ID:  0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {cbb9a1ac-821c-b542-365f-2dd5602e6100}

Followup:     MachineOwner
---------


CLOCK_WATCHDOG_TIMEOUT (101)
An expected clock interrupt was not received on a secondary processor in an
MP system within the allocated interval. This indicates that the specified
processor is hung and not processing interrupts.
Arguments:
Arg1: 0000000000000020, Clock interrupt time out interval in nominal clock ticks.
Arg2: 0000000000000000, 0.
Arg3: ffffe78045640180, The PRCB address of the hung processor.
Arg4: 0000000000000003, The index of the hung processor.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1327

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13770

    Key  : Analysis.Init.CPU.mSec
    Value: 702

    Key  : Analysis.Init.Elapsed.mSec
    Value: 56309

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 106

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x101

    Key  : Bugcheck.Code.Register
    Value: 0x101

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  071722-10265-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  101

BUGCHECK_P1: 20

BUGCHECK_P2: 0

BUGCHECK_P3: ffffe78045640180

BUGCHECK_P4: 3

FAULTING_PROCESSOR: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT:
fffff801`100b69e8 fffff801`11091fb4     : 00000000`00000101 00000000`00000020 00000000`00000000 ffffe780`45640180 : nt!KeBugCheckEx
fffff801`100b69f0 fffff801`10eb6d71     : 00000000`00000000 fffff801`0fd27180 ffff35e7`2b1d5f8e fffff801`10f3e240 : nt!KeAccumulateTicks+0x1db064
fffff801`100b6a60 fffff801`10eb3da6     : 00000000`000e5c22 00000000`00088f25 00000022`3c958cf9 00000000`00000000 : nt!KiUpdateRunTime+0x61
fffff801`100b6ac0 fffff801`10eb50b2     : ffffbc89`495b9e90 00000000`00000000 fffff801`1182b450 00000000`00000000 : nt!KiUpdateTime+0x686
fffff801`100b6eb0 fffff801`10eb29e2     : ffffbc89`495b9e90 fffff801`118f7de0 fffff801`00000000 00000000`0000000c : nt!KeClockInterruptNotify+0x272
fffff801`100b6f40 fffff801`10e91340     : 00000022`3d87281c fffff801`118f7d30 ffffe780`47a7e830 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
fffff801`100b6f70 fffff801`1101990a     : ffffbc89`495b9f10 fffff801`118f7d30 00000e71`8e2a273e 00000000`00000001 : nt!KiCallInterruptServiceRoutine+0xa0
fffff801`100b6fb0 fffff801`11019ed7     : 00000000`181b1c3c fffff801`0fd27180 fffff801`0fd2a250 fffff801`0fd2a148 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffbc89`495b9e90 fffff801`10e627e0     : 86000004`100c4900 fffff801`0fd27180 ffffbc89`495ba110 86000004`100c4900 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffbc89`495ba020 fffff801`10e33d79     : 86000004`100c4900 00000000`00000000 86000004`100c4921 00000000`00000000 : nt!MiFlushTbList+0x400
ffffbc89`495ba0b0 fffff801`10ebe36c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffbc89`495ba310 : nt!MmSetAddressRangeModifiedEx+0x2a9
ffffbc89`495ba210 fffff801`10f5835f     : ffff9788`04509c68 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcFlushCachePriv+0x6ec
ffffbc89`495ba3b0 fffff801`1649fc79     : 00000000`00000005 00000000`00000000 00000000`00000000 ffffc001`3b2d0170 : nt!CcCoherencyFlushAndPurgeCache+0x7f
ffffbc89`495ba400 fffff801`1649f98f     : ffffc001`3b2d0170 ffffbc89`495ba9c1 ffffc001`3b2d0000 ffff9788`0427c018 : Ntfs!NtfsCoherencyFlushAndPurgeCache+0x55
ffffbc89`495ba440 fffff801`164eb981     : ffffc001`3b2d0170 ffffc001`3b2d0170 ffffc001`3b2d0170 ffffc001`3b2d0010 : Ntfs!NtfsFlushUserStream+0xdf
ffffbc89`495ba4d0 fffff801`164eda3d     : ffffc001`3b2d0170 ffffc001`3b2d0170 ffff9788`04557c88 ffffc001`3b266be0 : Ntfs!NtfsPerformOptimisticFlush+0xa1
ffffbc89`495ba520 fffff801`164ebec9     : ffff9788`0427c018 ffff9788`05ad58a0 fffff801`164ebe01 ffffbc89`495ba9c1 : Ntfs!NtfsCommonFlushBuffers+0x289
ffffbc89`495ba630 fffff801`10ee4ab8     : ffffbc89`495ba740 ffff9788`0427c018 ffff9788`00000000 00000022`3987d5d2 : Ntfs!NtfsCommonFlushBuffersCallout+0x19
ffffbc89`495ba660 fffff801`10ee4a2d     : fffff801`164ebeb0 ffffbc89`495ba740 ffff9788`0427c018 fffff801`15796d68 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffbc89`495ba6d0 fffff801`1647ed9e     : ffffbc89`495ba820 fffff801`163b2616 ffffbc89`495ba738 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffbc89`495ba710 fffff801`1647ecc5     : ffff9788`0427c018 ffff9788`05ad58a0 ffffbc89`495ba9c1 ffff9788`05ad58a0 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x66
ffffbc89`495ba780 fffff801`10e504a5     : ffff9788`00000000 ffff9788`05ad58a0 ffff9788`0427c018 ffffbc89`495ba7b0 : Ntfs!NtfsFsdFlushBuffers+0xf5
ffffbc89`495ba810 fffff801`15797bb5     : ffffbc89`495bb000 ffffbc89`495b5000 00000000`00000000 ffffbc89`495ba8f0 : nt!IofCallDriver+0x55
ffffbc89`495ba850 fffff801`15795853     : ffffbc89`495ba8e0 00000000`00000000 ffffbc89`495baa00 ffff9787`fc9825c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2b5
ffffbc89`495ba8c0 fffff801`10e504a5     : ffff9788`05ad58a0 00000000`0012019f ffff9788`0441f310 00000000`0009be01 : FLTMGR!FltpDispatch+0xa3
ffffbc89`495ba920 fffff801`1128e4b2     : 00000000`00000001 ffff9788`05ad58a0 ffffbc89`495ba9c1 fffff801`10e50263 : nt!IofCallDriver+0x55
ffffbc89`495ba960 fffff801`113a222b     : ffff9788`00000000 ffffbc89`495bab60 00000000`00000000 ffff9788`05ad58a0 : nt!IopSynchronousServiceTail+0x1d2
ffffbc89`495baa10 fffff801`113a2016     : ffff9788`05b81040 00000000`00000000 ffff9787`fcb2dda0 ffffbc89`495baa68 : nt!NtFlushBuffersFileEx+0x1fb
ffffbc89`495baaa0 fffff801`1102a278     : ffff9788`05b81040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtFlushBuffersFile+0x16
ffffbc89`495baae0 00007ffd`83ca4874     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000082`d3efe528 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`83ca4874


SYMBOL_NAME:  nt!KeAccumulateTicks+1db064

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.795

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1db064

FAILURE_BUCKET_ID:  CLOCK_WATCHDOG_TIMEOUT_IDLE_THREAD_INVALID_CONTEXT_nt!KeAccumulateTicks

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b37ea922-6ea8-0080-e849-451291ca96f3}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80b733088b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803728a9fc9, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1639

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7425

    Key  : Analysis.Init.CPU.mSec
    Value: 483

    Key  : Analysis.Init.Elapsed.mSec
    Value: 50516

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  071722-10281-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: fffff80b733088b8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803728a9fc9

READ_ADDRESS: fffff80373305450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff80b733088b8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffcb81b5c52c70 -- (.trap 0xffffcb81b5c52c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=00000000ffffffff
rdx=000000000000ffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff803728a9fc9 rsp=ffffcb81b5c52e00 rbp=ffffcb81b5c52e89
 r8=ffff800a97679a78  r9=0000000000000000 r10=0000000000000000
r11=fffff80372600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiDeferredReadySingleThread+0xc09:
fffff803`728a9fc9 498bb4c3c088d000 mov     rsi,qword ptr [r11+rax*8+0D088C0h] ds:fffff80b`733088b8=????????????????
Resetting default scope

STACK_TEXT:
ffffcb81`b5c52b28 fffff803`72a2a8a9     : 00000000`0000000a fffff80b`733088b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffcb81`b5c52b30 fffff803`72a26a00     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcb81`b5c52c70 fffff803`728a9fc9     : fffff803`732e6350 fffff803`7284849b 00000000`00000000 ffff9001`a4c40180 : nt!KiPageFault+0x440
ffffcb81`b5c52e00 fffff803`72886ecf     : ffff9001`a4c40180 ffff9001`a4c40100 ffffcb81`b5c52f78 00000000`00000000 : nt!KiDeferredReadySingleThread+0xc09
ffffcb81`b5c52ef0 fffff803`72927bd5     : ffff9001`a4c40180 ffff800a`976790c0 ffff9001`a4c40180 00000000`00000000 : nt!KiQueueReadyThread+0x31f
ffffcb81`b5c52f60 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSetLegacyAffinityThread+0x295


SYMBOL_NAME:  nt!KiDeferredReadySingleThread+c09

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.795

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  c09

FAILURE_BUCKET_ID:  AV_nt!KiDeferredReadySingleThread

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {626f59d5-90cc-ab48-85f0-60e170096c96}

Followup:     MachineOwner
---------
Teşekkürler. Deneyip tekrar dönüş yaparım.

Depolama kaynaklı gibi. İkisine de HD Tune Pro ile hata (quick scan kapalı şekilde) taraması yapıp sonuçları paylaşın. Aynı yazılımdan sağlık bilgilerini de paylaşın.

Normalde RAM'e de sallayacaktım ama RAM değişikliğinden önce de hata alıyormuşsunuz, o dursun şimdilik.

Çipset sürücüsünü de güncelleyin:

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8077c692adf, Address of the instruction which caused the BugCheck
Arg3: ffffea8198b848c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1874

 Key : Analysis.DebugAnalysisManager
 Value: Create

 Key : Analysis.Elapsed.mSec
 Value: 5456

 Key : Analysis.Init.CPU.mSec
 Value: 609

 Key : Analysis.Init.Elapsed.mSec
 Value: 48705

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 86

 Key : Bugcheck.Code.DumpHeader
 Value: 0x3b

 Key : Bugcheck.Code.Register
 Value: 0x3b

 Key : Dump.Attributes.AsUlong
 Value: 1008

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

FILE_IN_CAB: 071522-10078-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
 Kernel Generated Triage Dump

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8077c692adf

BUGCHECK_P3: ffffea8198b848c0

BUGCHECK_P4: 0

CONTEXT: ffffea8198b848c0 -- (.cxr 0xffffea8198b848c0)
rax=000000000000005d rbx=0000000000000001 rcx=0000000000000012
rdx=00000000001f0003 rsi=ffff990e00820088 rdi=0000000000000001
rip=fffff8077c692adf rsp=ffffea8198b852e0 rbp=ffffea8198b85320
 r8=990eeb05d1b07db5 r9=0000000000000000 r10=0000000000000001
r11=fffff8077c000000 r12=0000000000000000 r13=0000000000000001
r14=ffff990eeb05d1b0 r15=ffff990eeb05d1e0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ObWaitForMultipleObjects+0x22f:
fffff807`7c692adf 488b4620 mov rax,qword ptr [rsi+20h] ds:002b:ffff990e`008200a8=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: RobloxPlayerBe

STACK_TEXT:
ffffea81`98b852e0 fffff807`7c791c1c : 00000000`00000000 00000000`00000001 00000000`08a1ff08 fffff807`00000000 : nt!ObWaitForMultipleObjects+0x22f
ffffea81`98b857e0 fffff807`7c42a278 : 00000000`000003c0 ffff990e`ea6a5080 00000000`07c5e9b8 fffff807`7c788370 : nt!NtWaitForMultipleObjects32+0x11c
ffffea81`98b85a70 00000000`77361cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`07c5e998 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77361cf3

SYMBOL_NAME: nt!ObWaitForMultipleObjects+22f

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22000.795

STACK_COMMAND: .cxr 0xffffea8198b848c0 ; kb

BUCKET_ID_FUNC_OFFSET: 22f

FAILURE_BUCKET_ID: AV_nt!ObWaitForMultipleObjects

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {53188f0d-e1b8-788f-a37a-25a7a83704bd}

Followup: MachineOwner
---------

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077061cf3, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 00000000ffff0000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff938749a2fb60, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1327

 Key : Analysis.DebugAnalysisManager
 Value: Create

 Key : Analysis.Elapsed.mSec
 Value: 1335

 Key : Analysis.Init.CPU.mSec
 Value: 577

 Key : Analysis.Init.Elapsed.mSec
 Value: 52113

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 89

 Key : Bugcheck.Code.DumpHeader
 Value: 0x1

 Key : Bugcheck.Code.Register
 Value: 0x1

 Key : Dump.Attributes.AsUlong
 Value: 1008

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

FILE_IN_CAB: 071522-10390-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
 Kernel Generated Triage Dump

BUGCHECK_CODE: 1

BUGCHECK_P1: 77061cf3

BUGCHECK_P2: 0

BUGCHECK_P3: ffff0000

BUGCHECK_P4: ffff938749a2fb60

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: RobloxPlayerBe

STACK_TEXT:
ffff9387`49a2f998 fffff806`8562a8a9 : 00000000`00000001 00000000`77061cf3 00000000`00000000 00000000`ffff0000 : nt!KeBugCheckEx
ffff9387`49a2f9a0 fffff806`8562a76b : ffffd182`9ccdb080 ffffd182`9b61f080 ffffffff`fffddd20 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9387`49a2fae0 00000000`77061cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x238
00000000`09b7edc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77061cf3

SYMBOL_NAME: nt!KiSystemServiceExitPico+238

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22000.795

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 238

FAILURE_BUCKET_ID: 0x1_SysCallNum_40070_nt!KiSystemServiceExitPico

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {62591322-e178-777b-3e39-cdc4544eb06c}

Followup: MachineOwner
---------

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
 use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
 use .trap on that value
Else
 .trap on the appropriate frame will show where the trap was taken
 (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff810193ec0e70
Arg3: fffffd0699c93f70
Arg4: fffff8072b4de55f

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1983

 Key : Analysis.DebugAnalysisManager
 Value: Create

 Key : Analysis.Elapsed.mSec
 Value: 9346

 Key : Analysis.Init.CPU.mSec
 Value: 640

 Key : Analysis.Init.Elapsed.mSec
 Value: 37146

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 84

 Key : Bugcheck.Code.DumpHeader
 Value: 0x1000007f

 Key : Bugcheck.Code.Register
 Value: 0x7f

 Key : Dump.Attributes.AsUlong
 Value: 1008

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

FILE_IN_CAB: 071622-11140-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
 Kernel Generated Triage Dump

BUGCHECK_CODE: 7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffff810193ec0e70

BUGCHECK_P3: fffffd0699c93f70

BUGCHECK_P4: fffff8072b4de55f

STACK_OVERFLOW: Stack Limit: fffffd0699c94000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xfffff8072b4e2731 was blamed for the stack overflow. It is using 8800 bytes of stack total in 5 instances (likely recursion).

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: r5apex.exe

STACK_TEXT:
fffffd06`99c93f70 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c94a90 fffffd06`99c94a90 fffffd06`99c94200 : nt!RtlDispatchException+0x4f
fffffd06`99c941d0 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c94a90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c948b0 fffff807`2b6269da : 00000000`00000000 00000000`00000000 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c94a90 fffff807`2b4e092f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c94c20 fffff807`2b4e03ce : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c94ce0 fffff807`2b4df3f9 : fffffd06`99c99950 fffffd06`99c94e90 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c94d90 fffff807`2b4de706 : fffffd06`99c95390 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c94e90 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c94e20 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c95e40 fffffd06`99c95e40 fffffd06`99c955b0 : nt!RtlDispatchException+0x1f6
fffffd06`99c95580 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c95e40 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c95c60 fffff807`2b6269da : 00000000`00000000 00000000`00000000 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c95e40 fffff807`2b4e092f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c95fd0 fffff807`2b4e03ce : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c96090 fffff807`2b4df3f9 : fffffd06`99c99950 fffffd06`99c96240 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c96140 fffff807`2b4de706 : fffffd06`99c96740 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c96240 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c961d0 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c971f0 fffffd06`99c971f0 fffffd06`99c96960 : nt!RtlDispatchException+0x1f6
fffffd06`99c96930 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c971f0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c97010 fffff807`2b6269da : 00000166`c8cc1220 00000000`00000004 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c971f0 fffff807`2b4e092f : 00000000`00000030 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c97380 fffff807`2b4e03ce : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c97440 fffff807`2b4df3f9 : fffffd06`99c99950 fffffd06`99c975f0 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c974f0 fffff807`2b4de706 : fffffd06`99c97af0 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c975f0 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c97580 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c985a0 fffffd06`99c985a0 fffffd06`99c97d10 : nt!RtlDispatchException+0x1f6
fffffd06`99c97ce0 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c985a0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c983c0 fffff807`2b6269da : 00000000`00000000 00000000`00000000 00007fff`fffeffff fffffd06`99c98b00 : nt!KiExceptionDispatch+0x10e
fffffd06`99c985a0 fffff807`2b4e092f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c98730 fffff807`2b4e03ce : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c987f0 fffff807`2b4df3f9 : 00000000`0010000b fffffd06`99c989a0 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c988a0 fffff807`2b4de706 : fffffd06`99c98ea0 fffff807`2b62a280 00000000`0010000b fffffd06`99c989a0 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c98930 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c99950 fffffd06`99c99950 fffffd06`99c990c0 : nt!RtlDispatchException+0x1f6
fffffd06`99c99090 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c99950 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c99770 fffff807`2b6269da : 00000000`0000003f 00000000`00000000 00007ff6`40722240 ffff9503`8ad14158 : nt!KiExceptionDispatch+0x10e
fffffd06`99c99950 fffff807`2b62a280 : ffff9503`b61be080 ffff9503`8ad14080 fffffd06`99c99b60 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c99ae0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit

SYMBOL_NAME: nt!KiDispatchException+1b1

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22000.795

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 1b1

FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {cbb9a1ac-821c-b542-365f-2dd5602e6100}

Followup: MachineOwner
---------

CLOCK_WATCHDOG_TIMEOUT (101)
An expected clock interrupt was not received on a secondary processor in an
MP system within the allocated interval. This indicates that the specified
processor is hung and not processing interrupts.
Arguments:
Arg1: 0000000000000020, Clock interrupt time out interval in nominal clock ticks.
Arg2: 0000000000000000, 0.
Arg3: ffffe78045640180, The PRCB address of the hung processor.
Arg4: 0000000000000003, The index of the hung processor.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1327

 Key : Analysis.DebugAnalysisManager
 Value: Create

 Key : Analysis.Elapsed.mSec
 Value: 13770

 Key : Analysis.Init.CPU.mSec
 Value: 702

 Key : Analysis.Init.Elapsed.mSec
 Value: 56309

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 106

 Key : Bugcheck.Code.DumpHeader
 Value: 0x101

 Key : Bugcheck.Code.Register
 Value: 0x101

 Key : Dump.Attributes.AsUlong
 Value: 1008

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

FILE_IN_CAB: 071722-10265-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
 Kernel Generated Triage Dump

BUGCHECK_CODE: 101

BUGCHECK_P1: 20

BUGCHECK_P2: 0

BUGCHECK_P3: ffffe78045640180

BUGCHECK_P4: 3

FAULTING_PROCESSOR: 3

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
fffff801`100b69e8 fffff801`11091fb4 : 00000000`00000101 00000000`00000020 00000000`00000000 ffffe780`45640180 : nt!KeBugCheckEx
fffff801`100b69f0 fffff801`10eb6d71 : 00000000`00000000 fffff801`0fd27180 ffff35e7`2b1d5f8e fffff801`10f3e240 : nt!KeAccumulateTicks+0x1db064
fffff801`100b6a60 fffff801`10eb3da6 : 00000000`000e5c22 00000000`00088f25 00000022`3c958cf9 00000000`00000000 : nt!KiUpdateRunTime+0x61
fffff801`100b6ac0 fffff801`10eb50b2 : ffffbc89`495b9e90 00000000`00000000 fffff801`1182b450 00000000`00000000 : nt!KiUpdateTime+0x686
fffff801`100b6eb0 fffff801`10eb29e2 : ffffbc89`495b9e90 fffff801`118f7de0 fffff801`00000000 00000000`0000000c : nt!KeClockInterruptNotify+0x272
fffff801`100b6f40 fffff801`10e91340 : 00000022`3d87281c fffff801`118f7d30 ffffe780`47a7e830 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
fffff801`100b6f70 fffff801`1101990a : ffffbc89`495b9f10 fffff801`118f7d30 00000e71`8e2a273e 00000000`00000001 : nt!KiCallInterruptServiceRoutine+0xa0
fffff801`100b6fb0 fffff801`11019ed7 : 00000000`181b1c3c fffff801`0fd27180 fffff801`0fd2a250 fffff801`0fd2a148 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffbc89`495b9e90 fffff801`10e627e0 : 86000004`100c4900 fffff801`0fd27180 ffffbc89`495ba110 86000004`100c4900 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffbc89`495ba020 fffff801`10e33d79 : 86000004`100c4900 00000000`00000000 86000004`100c4921 00000000`00000000 : nt!MiFlushTbList+0x400
ffffbc89`495ba0b0 fffff801`10ebe36c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffbc89`495ba310 : nt!MmSetAddressRangeModifiedEx+0x2a9
ffffbc89`495ba210 fffff801`10f5835f : ffff9788`04509c68 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcFlushCachePriv+0x6ec
ffffbc89`495ba3b0 fffff801`1649fc79 : 00000000`00000005 00000000`00000000 00000000`00000000 ffffc001`3b2d0170 : nt!CcCoherencyFlushAndPurgeCache+0x7f
ffffbc89`495ba400 fffff801`1649f98f : ffffc001`3b2d0170 ffffbc89`495ba9c1 ffffc001`3b2d0000 ffff9788`0427c018 : Ntfs!NtfsCoherencyFlushAndPurgeCache+0x55
ffffbc89`495ba440 fffff801`164eb981 : ffffc001`3b2d0170 ffffc001`3b2d0170 ffffc001`3b2d0170 ffffc001`3b2d0010 : Ntfs!NtfsFlushUserStream+0xdf
ffffbc89`495ba4d0 fffff801`164eda3d : ffffc001`3b2d0170 ffffc001`3b2d0170 ffff9788`04557c88 ffffc001`3b266be0 : Ntfs!NtfsPerformOptimisticFlush+0xa1
ffffbc89`495ba520 fffff801`164ebec9 : ffff9788`0427c018 ffff9788`05ad58a0 fffff801`164ebe01 ffffbc89`495ba9c1 : Ntfs!NtfsCommonFlushBuffers+0x289
ffffbc89`495ba630 fffff801`10ee4ab8 : ffffbc89`495ba740 ffff9788`0427c018 ffff9788`00000000 00000022`3987d5d2 : Ntfs!NtfsCommonFlushBuffersCallout+0x19
ffffbc89`495ba660 fffff801`10ee4a2d : fffff801`164ebeb0 ffffbc89`495ba740 ffff9788`0427c018 fffff801`15796d68 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffbc89`495ba6d0 fffff801`1647ed9e : ffffbc89`495ba820 fffff801`163b2616 ffffbc89`495ba738 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffbc89`495ba710 fffff801`1647ecc5 : ffff9788`0427c018 ffff9788`05ad58a0 ffffbc89`495ba9c1 ffff9788`05ad58a0 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x66
ffffbc89`495ba780 fffff801`10e504a5 : ffff9788`00000000 ffff9788`05ad58a0 ffff9788`0427c018 ffffbc89`495ba7b0 : Ntfs!NtfsFsdFlushBuffers+0xf5
ffffbc89`495ba810 fffff801`15797bb5 : ffffbc89`495bb000 ffffbc89`495b5000 00000000`00000000 ffffbc89`495ba8f0 : nt!IofCallDriver+0x55
ffffbc89`495ba850 fffff801`15795853 : ffffbc89`495ba8e0 00000000`00000000 ffffbc89`495baa00 ffff9787`fc9825c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2b5
ffffbc89`495ba8c0 fffff801`10e504a5 : ffff9788`05ad58a0 00000000`0012019f ffff9788`0441f310 00000000`0009be01 : FLTMGR!FltpDispatch+0xa3
ffffbc89`495ba920 fffff801`1128e4b2 : 00000000`00000001 ffff9788`05ad58a0 ffffbc89`495ba9c1 fffff801`10e50263 : nt!IofCallDriver+0x55
ffffbc89`495ba960 fffff801`113a222b : ffff9788`00000000 ffffbc89`495bab60 00000000`00000000 ffff9788`05ad58a0 : nt!IopSynchronousServiceTail+0x1d2
ffffbc89`495baa10 fffff801`113a2016 : ffff9788`05b81040 00000000`00000000 ffff9787`fcb2dda0 ffffbc89`495baa68 : nt!NtFlushBuffersFileEx+0x1fb
ffffbc89`495baaa0 fffff801`1102a278 : ffff9788`05b81040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtFlushBuffersFile+0x16
ffffbc89`495baae0 00007ffd`83ca4874 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000082`d3efe528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`83ca4874

SYMBOL_NAME: nt!KeAccumulateTicks+1db064

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22000.795

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 1db064

FAILURE_BUCKET_ID: CLOCK_WATCHDOG_TIMEOUT_IDLE_THREAD_INVALID_CONTEXT_nt!KeAccumulateTicks

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {b37ea922-6ea8-0080-e849-451291ca96f3}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80b733088b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
 bit 0 : value 0 = read operation, 1 = write operation
 bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803728a9fc9, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1639

 Key : Analysis.DebugAnalysisManager
 Value: Create

 Key : Analysis.Elapsed.mSec
 Value: 7425

 Key : Analysis.Init.CPU.mSec
 Value: 483

 Key : Analysis.Init.Elapsed.mSec
 Value: 50516

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 86

 Key : Bugcheck.Code.DumpHeader
 Value: 0xa

 Key : Bugcheck.Code.Register
 Value: 0xa

 Key : Dump.Attributes.AsUlong
 Value: 1008

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

FILE_IN_CAB: 071722-10281-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
 Kernel Generated Triage Dump

BUGCHECK_CODE: a

BUGCHECK_P1: fffff80b733088b8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803728a9fc9

READ_ADDRESS: fffff80373305450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff80b733088b8

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffcb81b5c52c70 -- (.trap 0xffffcb81b5c52c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=00000000ffffffff
rdx=000000000000ffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff803728a9fc9 rsp=ffffcb81b5c52e00 rbp=ffffcb81b5c52e89
 r8=ffff800a97679a78 r9=0000000000000000 r10=0000000000000000
r11=fffff80372600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiDeferredReadySingleThread+0xc09:
fffff803`728a9fc9 498bb4c3c088d000 mov rsi,qword ptr [r11+rax*8+0D088C0h] ds:fffff80b`733088b8=????????????????
Resetting default scope

STACK_TEXT:
ffffcb81`b5c52b28 fffff803`72a2a8a9 : 00000000`0000000a fffff80b`733088b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffcb81`b5c52b30 fffff803`72a26a00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcb81`b5c52c70 fffff803`728a9fc9 : fffff803`732e6350 fffff803`7284849b 00000000`00000000 ffff9001`a4c40180 : nt!KiPageFault+0x440
ffffcb81`b5c52e00 fffff803`72886ecf : ffff9001`a4c40180 ffff9001`a4c40100 ffffcb81`b5c52f78 00000000`00000000 : nt!KiDeferredReadySingleThread+0xc09
ffffcb81`b5c52ef0 fffff803`72927bd5 : ffff9001`a4c40180 ffff800a`976790c0 ffff9001`a4c40180 00000000`00000000 : nt!KiQueueReadyThread+0x31f
ffffcb81`b5c52f60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSetLegacyAffinityThread+0x295

SYMBOL_NAME: nt!KiDeferredReadySingleThread+c09

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22000.795

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: c09

FAILURE_BUCKET_ID: AV_nt!KiDeferredReadySingleThread

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {626f59d5-90cc-ab48-85f0-60e170096c96}

Followup: MachineOwner
---------

HD Tune tarama sonuçları bu şekilde;

HD Tune Pro: Toshiba-TR200 Health

ID Current Worst ThresholdData Status
(09) Power On Hours Count 100 100 0 8348 ok
(0C) Power Cycle Count 100 100 0 2473 ok
(A7) Unknown Attribute 100 100 0 0 ok
(A8) Unknown Attribute 100 100 0 0 ok
(A9) Unknown Attribute 100 100 10 0 ok
(AD) Unknown Attribute 180 180 0 0 ok
(C0) Unsafe Shutdown Count 100 100 0 345 ok
(C2) Temperature 67 56 20 188979413025 ok
(F1) Unknown Attribute 100 100 0 616762 ok

Health Status: Ok
HD Tune Pro: Toshiba-TR200 Error Scan

Scanned data: 239 GB
Damaged Blocks: 0.0 %
Elapsed Time: 9:38

HD Tune Pro: ST2000DM008-2FR102 Error Scan

Scanned data: 1999 GB
Damaged Blocks: 0.0 %
Elapsed Time: 2:17:58

HD Tune Pro: ST2000DM008-2FR102 Health

ID Current Worst ThresholdData Status
(01) RAW Read Error Rate 78 64 6 56783808 ok
(03) Spin Up Time 99 97 0 0 ok
(04) Start/Stop Count 99 99 20 1403 ok
(05) Reallocated Sector Count 100 100 10 0 ok
(07) Seek Error Rate 77 60 45 50206626 ok
(09) Power On Hours Count 97 97 0 213077622524564 ok
(0A) Spin Retry Count 100 100 97 0 ok
(0C) Power Cycle Count 100 100 20 736 ok
(B7) SATA Downshift Count 100 100 0 0 ok
(B8) End To End Error Detection 100 100 99 0 ok
(BB) Uncorrectable Error Count 100 100 0 0 ok
(BC) Command Timeout 100 100 0 0 ok
(BD) Unknown Attribute 100 100 0 0 ok
(BE) Airflow Temperature 70 58 40 505217054 ok
(BF) G-sense Error Rate 100 100 0 0 ok
(C0) Unsafe Shutdown Count 100 100 0 42 ok
(C1) Load Cycle Count 92 92 0 17283 ok
(C2) Temperature 30 42 0 60129542174 ok
(C3) Hardware ECC Recovered 78 64 0 56783808 ok
(C5) Current Pending Sector 100 100 0 0 ok
(C6) Offline Uncorrectable 100 100 0 0 ok
(C7) Interface CRC Error Count 200 200 0 0 ok
(F0) Head Flying Hours 100 253 0 277128469808292 ok
(F1) Unknown Attribute 100 253 0 11350012269 ok
(F2) Unknown Attribute 100 253 0 27859005466 ok

Health Status: Ok
 
Son düzenleme:
HD Tune Pro ile yaptığınıza emin misiniz? Bilinmeyen parametreler var. HD Tune Pro 5.75 ile tekrar yapın testleri. Bu sefer sonuçların ekran görüntüsünü paylaşın, metin halinde kopyalayıp yapıştırmayın.
 
HD Tune Pro ile yaptığınıza emin misiniz? Bilinmeyen parametreler var. HD Tune Pro 5.75 ile tekrar yapın testleri. Bu sefer sonuçların ekran görüntüsünü paylaşın, metin halinde kopyalayıp yapıştırmayın.

Evet hocam HD Tune Pro 5.75 ile tarama yaptım. Bu arada Windows 10 Home sürümüne geçtim. Tekrardan format atarken mavi ekran hataları aldım. Tekrar tarama yapıp minidump dosyalarıyla birlikte paylaşırım.

HD Tune Pro ile yaptığınıza emin misiniz? Bilinmeyen parametreler var. HD Tune Pro 5.75 ile tekrar yapın testleri. Bu sefer sonuçların ekran görüntüsünü paylaşın, metin halinde kopyalayıp yapıştırmayın.
 

Dosya Ekleri

  • 18-Temmuz-2022_21-42.png
    18-Temmuz-2022_21-42.png
    26,5 KB · Görüntüleme: 42
  • 18-Temmuz-2022_21-43.png
    18-Temmuz-2022_21-43.png
    31,6 KB · Görüntüleme: 33
  • 19-Temmuz-2022_09-01.png
    19-Temmuz-2022_09-01.png
    50,7 KB · Görüntüleme: 24
  • 19-Temmuz-2022_09-03.png
    19-Temmuz-2022_09-03.png
    54,8 KB · Görüntüleme: 40
Son düzenleme:
Neden eski Windows kurdunuz? Windows Update altındaki tüm güncellemeleri yapın, sürüm güncellemesi dahil. Dosyalarda gördüğüm birkaç şey var ama bazıları güncelleme sonrası gidecek muhtemelen.

Bir tanesi sadece kontrolcüden ötürü görünüyor. Oyun oynamadığınız zamanlarda kontrolcüyü çıkarın, sürücüsünü kaldırıp tekrar kurmayı da deneyebilirsiniz.

Her şeyden sonra bir de Memtest yapsanız iyi olur.
 
Neden eski Windows kurdunuz? Windows Update altındaki tüm güncellemeleri yapın, sürüm güncellemesi dahil. Dosyalarda gördüğüm birkaç şey var ama bazıları güncelleme sonrası gidecek muhtemelen.

Bir tanesi sadece kontrolcüden ötürü görünüyor. Oyun oynamadığınız zamanlarda kontrolcüyü çıkarın, sürücüsünü kaldırıp tekrar kurmayı da deneyebilirsiniz.

Her şeyden sonra bir de Memtest yapsanız iyi olur.

Hocam Windows 11'de chipset yüklemede sorun yarattı o yuzden Windows 10 geçmek durumunda kaldım ve tüm Update'leri yaptım. Daha önce anakart, PSU ve RAM'leri degiştirip denedim ama aynı hataları almaya devam etti. Evet iki adet kontrolcü var Xbox 360 ve Xbox Wireless 9.nesil.
 
Windows 11 kullanmamanız sorun değil fakat Windows 10'un güncel olmayan bir sürümünü kullanıyorsunuz. En son Windows 10 sürümü 21H2, siz 2004 kullanıyorsunuz. Onu güncelleyin demek istemiştim. Onu güncelledikten sonra düzeleceğini düşündüğüm birkaç şey var, sürüm yükseltmesi sonrası mavi ekran alırsanız atarsınız yeni dosyaları.

HDD ve SSD'nin kablolarını ve bağlı olduğu SATA portlarını değiştirmeyi denediniz mi?
 
Windows 11 kullanmamanız sorun değil fakat Windows 10'un güncel olmayan bir sürümünü kullanıyorsunuz. En son Windows 10 sürümü 21h2, siz 2004 kullanıyorsunuz. Onu güncelleyin demek istemiştim. Onu güncelledikten sonra düzeleceğini düşündüğüm birkaç şey var, sürüm yükseltmesi sonrası mavi ekran alırsanız atarsınız yeni dosyaları.

HDD ve SSD'nin kablolarını ve bağlı olduğu SATA portlarını değiştirmeyi denediniz mi?

Tamamdır dediklerinizi yapıp tekrar dönüş yaparım. Evet SATA kablo ve portları denedim.

Windows 11 kullanmamanız sorun değil fakat Windows 10'un güncel olmayan bir sürümünü kullanıyorsunuz. En son Windows 10 sürümü 21h2, siz 2004 kullanıyorsunuz. Onu güncelleyin demek istemiştim. Onu güncelledikten sonra düzeleceğini düşündüğüm birkaç şey var, sürüm yükseltmesi sonrası mavi ekran alırsanız atarsınız yeni dosyaları.

HDD ve SSD'nin kablolarını ve bağlı olduğu SATA portlarını değiştirmeyi denediniz mi?

Windows güncel görünüyor.

Windows 11 kullanmamanız sorun değil fakat Windows 10'un güncel olmayan bir sürümünü kullanıyorsunuz. En son Windows 10 sürümü 21h2, siz 2004 kullanıyorsunuz. Onu güncelleyin demek istemiştim. Onu güncelledikten sonra düzeleceğini düşündüğüm birkaç şey var, sürüm yükseltmesi sonrası mavi ekran alırsanız atarsınız yeni dosyaları.

HDD ve SSD'nin kablolarını ve bağlı olduğu SATA portlarını değiştirmeyi denediniz mi?

Yeni mavi ekran hatalarını paylaşıyorum.
 

Dosya Ekleri

  • Ekran görüntüsü 2022-07-24 220442.png
    Ekran görüntüsü 2022-07-24 220442.png
    43 KB · Görüntüleme: 38
Son düzenleme:
Sürücüleri nasıl güncellediniz? Ekran kartının sürücüsü güncel değilse sitesinden güncelleyin. Wi-Fi adaptörü kullanıyorsanız belirtin.

Ağ sürücülerinizi güncelleyin:

Bunlar küçük şeyler ama, ben hala sorunun depolama kaynaklı olduğunu düşünüyorum. Bunlardan sonra sorun çözülmezse iki depolama aygıtını da sistemden çıkarmanızı ve başka bir depolama aygıtı ile denemenizi isteyeceğim.
 

Technopat Haberler

Geri
Yukarı