Depolama kaynaklı gibi. İkisine de HD Tune Pro ile hata (quick scan kapalı şekilde) taraması yapıp sonuçları paylaşın. Aynı yazılımdan sağlık bilgilerini de paylaşın.
Normalde RAM'e de sallayacaktım ama RAM değişikliğinden önce de hata alıyormuşsunuz, o dursun şimdilik.
Çipset sürücüsünü de güncelleyin:
Kod:Panoya kopyala
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8077c692adf, Address of the instruction which caused the BugCheck
Arg3: ffffea8198b848c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1874
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 5456
Key : Analysis.Init.CPU.mSec
Value: 609
Key : Analysis.Init.Elapsed.mSec
Value: 48705
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 071522-10078-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8077c692adf
BUGCHECK_P3: ffffea8198b848c0
BUGCHECK_P4: 0
CONTEXT: ffffea8198b848c0 -- (.cxr 0xffffea8198b848c0)
rax=000000000000005d rbx=0000000000000001 rcx=0000000000000012
rdx=00000000001f0003 rsi=ffff990e00820088 rdi=0000000000000001
rip=fffff8077c692adf rsp=ffffea8198b852e0 rbp=ffffea8198b85320
r8=990eeb05d1b07db5 r9=0000000000000000 r10=0000000000000001
r11=fffff8077c000000 r12=0000000000000000 r13=0000000000000001
r14=ffff990eeb05d1b0 r15=ffff990eeb05d1e0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ObWaitForMultipleObjects+0x22f:
fffff807`7c692adf 488b4620 mov rax,qword ptr [rsi+20h] ds:002b:ffff990e`008200a8=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RobloxPlayerBe
STACK_TEXT:
ffffea81`98b852e0 fffff807`7c791c1c : 00000000`00000000 00000000`00000001 00000000`08a1ff08 fffff807`00000000 : nt!ObWaitForMultipleObjects+0x22f
ffffea81`98b857e0 fffff807`7c42a278 : 00000000`000003c0 ffff990e`ea6a5080 00000000`07c5e9b8 fffff807`7c788370 : nt!NtWaitForMultipleObjects32+0x11c
ffffea81`98b85a70 00000000`77361cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`07c5e998 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77361cf3
SYMBOL_NAME: nt!ObWaitForMultipleObjects+22f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.795
STACK_COMMAND: .cxr 0xffffea8198b848c0 ; kb
BUCKET_ID_FUNC_OFFSET: 22f
FAILURE_BUCKET_ID: AV_nt!ObWaitForMultipleObjects
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {53188f0d-e1b8-788f-a37a-25a7a83704bd}
Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077061cf3, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 00000000ffff0000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff938749a2fb60, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1327
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1335
Key : Analysis.Init.CPU.mSec
Value: 577
Key : Analysis.Init.Elapsed.mSec
Value: 52113
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Bugcheck.Code.DumpHeader
Value: 0x1
Key : Bugcheck.Code.Register
Value: 0x1
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 071522-10390-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 1
BUGCHECK_P1: 77061cf3
BUGCHECK_P2: 0
BUGCHECK_P3: ffff0000
BUGCHECK_P4: ffff938749a2fb60
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RobloxPlayerBe
STACK_TEXT:
ffff9387`49a2f998 fffff806`8562a8a9 : 00000000`00000001 00000000`77061cf3 00000000`00000000 00000000`ffff0000 : nt!KeBugCheckEx
ffff9387`49a2f9a0 fffff806`8562a76b : ffffd182`9ccdb080 ffffd182`9b61f080 ffffffff`fffddd20 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9387`49a2fae0 00000000`77061cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x238
00000000`09b7edc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77061cf3
SYMBOL_NAME: nt!KiSystemServiceExitPico+238
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.795
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 238
FAILURE_BUCKET_ID: 0x1_SysCallNum_40070_nt!KiSystemServiceExitPico
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {62591322-e178-777b-3e39-cdc4544eb06c}
Followup: MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff810193ec0e70
Arg3: fffffd0699c93f70
Arg4: fffff8072b4de55f
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1983
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9346
Key : Analysis.Init.CPU.mSec
Value: 640
Key : Analysis.Init.Elapsed.mSec
Value: 37146
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Bugcheck.Code.DumpHeader
Value: 0x1000007f
Key : Bugcheck.Code.Register
Value: 0x7f
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 071622-11140-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffff810193ec0e70
BUGCHECK_P3: fffffd0699c93f70
BUGCHECK_P4: fffff8072b4de55f
STACK_OVERFLOW: Stack Limit: fffffd0699c94000. Use (kF) and (!stackusage) to investigate stack usage.
STACKUSAGE_FUNCTION: The function at address 0xfffff8072b4e2731 was blamed for the stack overflow. It is using 8800 bytes of stack total in 5 instances (likely recursion).
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: r5apex.exe
STACK_TEXT:
fffffd06`99c93f70 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c94a90 fffffd06`99c94a90 fffffd06`99c94200 : nt!RtlDispatchException+0x4f
fffffd06`99c941d0 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c94a90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c948b0 fffff807`2b6269da : 00000000`00000000 00000000`00000000 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c94a90 fffff807`2b4e092f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c94c20 fffff807`2b4e03ce : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c94ce0 fffff807`2b4df3f9 : fffffd06`99c99950 fffffd06`99c94e90 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c94d90 fffff807`2b4de706 : fffffd06`99c95390 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c94e90 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c94e20 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c95e40 fffffd06`99c95e40 fffffd06`99c955b0 : nt!RtlDispatchException+0x1f6
fffffd06`99c95580 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c95e40 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c95c60 fffff807`2b6269da : 00000000`00000000 00000000`00000000 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c95e40 fffff807`2b4e092f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c95fd0 fffff807`2b4e03ce : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c96090 fffff807`2b4df3f9 : fffffd06`99c99950 fffffd06`99c96240 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c96140 fffff807`2b4de706 : fffffd06`99c96740 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c96240 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c961d0 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c971f0 fffffd06`99c971f0 fffffd06`99c96960 : nt!RtlDispatchException+0x1f6
fffffd06`99c96930 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c971f0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c97010 fffff807`2b6269da : 00000166`c8cc1220 00000000`00000004 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c971f0 fffff807`2b4e092f : 00000000`00000030 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c97380 fffff807`2b4e03ce : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c97440 fffff807`2b4df3f9 : fffffd06`99c99950 fffffd06`99c975f0 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c974f0 fffff807`2b4de706 : fffffd06`99c97af0 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c975f0 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c97580 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c985a0 fffffd06`99c985a0 fffffd06`99c97d10 : nt!RtlDispatchException+0x1f6
fffffd06`99c97ce0 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c985a0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c983c0 fffff807`2b6269da : 00000000`00000000 00000000`00000000 00007fff`fffeffff fffffd06`99c98b00 : nt!KiExceptionDispatch+0x10e
fffffd06`99c985a0 fffff807`2b4e092f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c98730 fffff807`2b4e03ce : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c987f0 fffff807`2b4df3f9 : 00000000`0010000b fffffd06`99c989a0 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c988a0 fffff807`2b4de706 : fffffd06`99c98ea0 fffff807`2b62a280 00000000`0010000b fffffd06`99c989a0 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c98930 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c99950 fffffd06`99c99950 fffffd06`99c990c0 : nt!RtlDispatchException+0x1f6
fffffd06`99c99090 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c99950 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c99770 fffff807`2b6269da : 00000000`0000003f 00000000`00000000 00007ff6`40722240 ffff9503`8ad14158 : nt!KiExceptionDispatch+0x10e
fffffd06`99c99950 fffff807`2b62a280 : ffff9503`b61be080 ffff9503`8ad14080 fffffd06`99c99b60 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c99ae0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit
SYMBOL_NAME: nt!KiDispatchException+1b1
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.795
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1b1
FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {cbb9a1ac-821c-b542-365f-2dd5602e6100}
Followup: MachineOwner
---------
CLOCK_WATCHDOG_TIMEOUT (101)
An expected clock interrupt was not received on a secondary processor in an
MP system within the allocated interval. This indicates that the specified
processor is hung and not processing interrupts.
Arguments:
Arg1: 0000000000000020, Clock interrupt time out interval in nominal clock ticks.
Arg2: 0000000000000000, 0.
Arg3: ffffe78045640180, The PRCB address of the hung processor.
Arg4: 0000000000000003, The index of the hung processor.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1327
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13770
Key : Analysis.Init.CPU.mSec
Value: 702
Key : Analysis.Init.Elapsed.mSec
Value: 56309
Key : Analysis.Memory.CommitPeak.Mb
Value: 106
Key : Bugcheck.Code.DumpHeader
Value: 0x101
Key : Bugcheck.Code.Register
Value: 0x101
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 071722-10265-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 101
BUGCHECK_P1: 20
BUGCHECK_P2: 0
BUGCHECK_P3: ffffe78045640180
BUGCHECK_P4: 3
FAULTING_PROCESSOR: 3
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
fffff801`100b69e8 fffff801`11091fb4 : 00000000`00000101 00000000`00000020 00000000`00000000 ffffe780`45640180 : nt!KeBugCheckEx
fffff801`100b69f0 fffff801`10eb6d71 : 00000000`00000000 fffff801`0fd27180 ffff35e7`2b1d5f8e fffff801`10f3e240 : nt!KeAccumulateTicks+0x1db064
fffff801`100b6a60 fffff801`10eb3da6 : 00000000`000e5c22 00000000`00088f25 00000022`3c958cf9 00000000`00000000 : nt!KiUpdateRunTime+0x61
fffff801`100b6ac0 fffff801`10eb50b2 : ffffbc89`495b9e90 00000000`00000000 fffff801`1182b450 00000000`00000000 : nt!KiUpdateTime+0x686
fffff801`100b6eb0 fffff801`10eb29e2 : ffffbc89`495b9e90 fffff801`118f7de0 fffff801`00000000 00000000`0000000c : nt!KeClockInterruptNotify+0x272
fffff801`100b6f40 fffff801`10e91340 : 00000022`3d87281c fffff801`118f7d30 ffffe780`47a7e830 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
fffff801`100b6f70 fffff801`1101990a : ffffbc89`495b9f10 fffff801`118f7d30 00000e71`8e2a273e 00000000`00000001 : nt!KiCallInterruptServiceRoutine+0xa0
fffff801`100b6fb0 fffff801`11019ed7 : 00000000`181b1c3c fffff801`0fd27180 fffff801`0fd2a250 fffff801`0fd2a148 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffbc89`495b9e90 fffff801`10e627e0 : 86000004`100c4900 fffff801`0fd27180 ffffbc89`495ba110 86000004`100c4900 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffbc89`495ba020 fffff801`10e33d79 : 86000004`100c4900 00000000`00000000 86000004`100c4921 00000000`00000000 : nt!MiFlushTbList+0x400
ffffbc89`495ba0b0 fffff801`10ebe36c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffbc89`495ba310 : nt!MmSetAddressRangeModifiedEx+0x2a9
ffffbc89`495ba210 fffff801`10f5835f : ffff9788`04509c68 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcFlushCachePriv+0x6ec
ffffbc89`495ba3b0 fffff801`1649fc79 : 00000000`00000005 00000000`00000000 00000000`00000000 ffffc001`3b2d0170 : nt!CcCoherencyFlushAndPurgeCache+0x7f
ffffbc89`495ba400 fffff801`1649f98f : ffffc001`3b2d0170 ffffbc89`495ba9c1 ffffc001`3b2d0000 ffff9788`0427c018 : Ntfs!NtfsCoherencyFlushAndPurgeCache+0x55
ffffbc89`495ba440 fffff801`164eb981 : ffffc001`3b2d0170 ffffc001`3b2d0170 ffffc001`3b2d0170 ffffc001`3b2d0010 : Ntfs!NtfsFlushUserStream+0xdf
ffffbc89`495ba4d0 fffff801`164eda3d : ffffc001`3b2d0170 ffffc001`3b2d0170 ffff9788`04557c88 ffffc001`3b266be0 : Ntfs!NtfsPerformOptimisticFlush+0xa1
ffffbc89`495ba520 fffff801`164ebec9 : ffff9788`0427c018 ffff9788`05ad58a0 fffff801`164ebe01 ffffbc89`495ba9c1 : Ntfs!NtfsCommonFlushBuffers+0x289
ffffbc89`495ba630 fffff801`10ee4ab8 : ffffbc89`495ba740 ffff9788`0427c018 ffff9788`00000000 00000022`3987d5d2 : Ntfs!NtfsCommonFlushBuffersCallout+0x19
ffffbc89`495ba660 fffff801`10ee4a2d : fffff801`164ebeb0 ffffbc89`495ba740 ffff9788`0427c018 fffff801`15796d68 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffbc89`495ba6d0 fffff801`1647ed9e : ffffbc89`495ba820 fffff801`163b2616 ffffbc89`495ba738 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffbc89`495ba710 fffff801`1647ecc5 : ffff9788`0427c018 ffff9788`05ad58a0 ffffbc89`495ba9c1 ffff9788`05ad58a0 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x66
ffffbc89`495ba780 fffff801`10e504a5 : ffff9788`00000000 ffff9788`05ad58a0 ffff9788`0427c018 ffffbc89`495ba7b0 : Ntfs!NtfsFsdFlushBuffers+0xf5
ffffbc89`495ba810 fffff801`15797bb5 : ffffbc89`495bb000 ffffbc89`495b5000 00000000`00000000 ffffbc89`495ba8f0 : nt!IofCallDriver+0x55
ffffbc89`495ba850 fffff801`15795853 : ffffbc89`495ba8e0 00000000`00000000 ffffbc89`495baa00 ffff9787`fc9825c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2b5
ffffbc89`495ba8c0 fffff801`10e504a5 : ffff9788`05ad58a0 00000000`0012019f ffff9788`0441f310 00000000`0009be01 : FLTMGR!FltpDispatch+0xa3
ffffbc89`495ba920 fffff801`1128e4b2 : 00000000`00000001 ffff9788`05ad58a0 ffffbc89`495ba9c1 fffff801`10e50263 : nt!IofCallDriver+0x55
ffffbc89`495ba960 fffff801`113a222b : ffff9788`00000000 ffffbc89`495bab60 00000000`00000000 ffff9788`05ad58a0 : nt!IopSynchronousServiceTail+0x1d2
ffffbc89`495baa10 fffff801`113a2016 : ffff9788`05b81040 00000000`00000000 ffff9787`fcb2dda0 ffffbc89`495baa68 : nt!NtFlushBuffersFileEx+0x1fb
ffffbc89`495baaa0 fffff801`1102a278 : ffff9788`05b81040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtFlushBuffersFile+0x16
ffffbc89`495baae0 00007ffd`83ca4874 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000082`d3efe528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`83ca4874
SYMBOL_NAME: nt!KeAccumulateTicks+1db064
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.795
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1db064
FAILURE_BUCKET_ID: CLOCK_WATCHDOG_TIMEOUT_IDLE_THREAD_INVALID_CONTEXT_nt!KeAccumulateTicks
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b37ea922-6ea8-0080-e849-451291ca96f3}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80b733088b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803728a9fc9, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1639
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7425
Key : Analysis.Init.CPU.mSec
Value: 483
Key : Analysis.Init.Elapsed.mSec
Value: 50516
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 071722-10281-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: fffff80b733088b8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff803728a9fc9
READ_ADDRESS: fffff80373305450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80b733088b8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffcb81b5c52c70 -- (.trap 0xffffcb81b5c52c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=00000000ffffffff
rdx=000000000000ffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff803728a9fc9 rsp=ffffcb81b5c52e00 rbp=ffffcb81b5c52e89
r8=ffff800a97679a78 r9=0000000000000000 r10=0000000000000000
r11=fffff80372600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiDeferredReadySingleThread+0xc09:
fffff803`728a9fc9 498bb4c3c088d000 mov rsi,qword ptr [r11+rax*8+0D088C0h] ds:fffff80b`733088b8=????????????????
Resetting default scope
STACK_TEXT:
ffffcb81`b5c52b28 fffff803`72a2a8a9 : 00000000`0000000a fffff80b`733088b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffcb81`b5c52b30 fffff803`72a26a00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcb81`b5c52c70 fffff803`728a9fc9 : fffff803`732e6350 fffff803`7284849b 00000000`00000000 ffff9001`a4c40180 : nt!KiPageFault+0x440
ffffcb81`b5c52e00 fffff803`72886ecf : ffff9001`a4c40180 ffff9001`a4c40100 ffffcb81`b5c52f78 00000000`00000000 : nt!KiDeferredReadySingleThread+0xc09
ffffcb81`b5c52ef0 fffff803`72927bd5 : ffff9001`a4c40180 ffff800a`976790c0 ffff9001`a4c40180 00000000`00000000 : nt!KiQueueReadyThread+0x31f
ffffcb81`b5c52f60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSetLegacyAffinityThread+0x295
SYMBOL_NAME: nt!KiDeferredReadySingleThread+c09
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.795
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: c09
FAILURE_BUCKET_ID: AV_nt!KiDeferredReadySingleThread
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {626f59d5-90cc-ab48-85f0-60e170096c96}
Followup: MachineOwner
---------
Teşekkürler. Deneyip tekrar dönüş yaparım.
Depolama kaynaklı gibi. İkisine de HD Tune Pro ile hata (quick scan kapalı şekilde) taraması yapıp sonuçları paylaşın. Aynı yazılımdan sağlık bilgilerini de paylaşın.
Normalde RAM'e de sallayacaktım ama RAM değişikliğinden önce de hata alıyormuşsunuz, o dursun şimdilik.
Çipset sürücüsünü de güncelleyin:
Kod:Panoya kopyala
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8077c692adf, Address of the instruction which caused the BugCheck
Arg3: ffffea8198b848c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1874
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 5456
Key : Analysis.Init.CPU.mSec
Value: 609
Key : Analysis.Init.Elapsed.mSec
Value: 48705
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 071522-10078-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8077c692adf
BUGCHECK_P3: ffffea8198b848c0
BUGCHECK_P4: 0
CONTEXT: ffffea8198b848c0 -- (.cxr 0xffffea8198b848c0)
rax=000000000000005d rbx=0000000000000001 rcx=0000000000000012
rdx=00000000001f0003 rsi=ffff990e00820088 rdi=0000000000000001
rip=fffff8077c692adf rsp=ffffea8198b852e0 rbp=ffffea8198b85320
r8=990eeb05d1b07db5 r9=0000000000000000 r10=0000000000000001
r11=fffff8077c000000 r12=0000000000000000 r13=0000000000000001
r14=ffff990eeb05d1b0 r15=ffff990eeb05d1e0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ObWaitForMultipleObjects+0x22f:
fffff807`7c692adf 488b4620 mov rax,qword ptr [rsi+20h] ds:002b:ffff990e`008200a8=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RobloxPlayerBe
STACK_TEXT:
ffffea81`98b852e0 fffff807`7c791c1c : 00000000`00000000 00000000`00000001 00000000`08a1ff08 fffff807`00000000 : nt!ObWaitForMultipleObjects+0x22f
ffffea81`98b857e0 fffff807`7c42a278 : 00000000`000003c0 ffff990e`ea6a5080 00000000`07c5e9b8 fffff807`7c788370 : nt!NtWaitForMultipleObjects32+0x11c
ffffea81`98b85a70 00000000`77361cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`07c5e998 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77361cf3
SYMBOL_NAME: nt!ObWaitForMultipleObjects+22f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.795
STACK_COMMAND: .cxr 0xffffea8198b848c0 ; kb
BUCKET_ID_FUNC_OFFSET: 22f
FAILURE_BUCKET_ID: AV_nt!ObWaitForMultipleObjects
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {53188f0d-e1b8-788f-a37a-25a7a83704bd}
Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077061cf3, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 00000000ffff0000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff938749a2fb60, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1327
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1335
Key : Analysis.Init.CPU.mSec
Value: 577
Key : Analysis.Init.Elapsed.mSec
Value: 52113
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Bugcheck.Code.DumpHeader
Value: 0x1
Key : Bugcheck.Code.Register
Value: 0x1
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 071522-10390-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 1
BUGCHECK_P1: 77061cf3
BUGCHECK_P2: 0
BUGCHECK_P3: ffff0000
BUGCHECK_P4: ffff938749a2fb60
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RobloxPlayerBe
STACK_TEXT:
ffff9387`49a2f998 fffff806`8562a8a9 : 00000000`00000001 00000000`77061cf3 00000000`00000000 00000000`ffff0000 : nt!KeBugCheckEx
ffff9387`49a2f9a0 fffff806`8562a76b : ffffd182`9ccdb080 ffffd182`9b61f080 ffffffff`fffddd20 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9387`49a2fae0 00000000`77061cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x238
00000000`09b7edc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77061cf3
SYMBOL_NAME: nt!KiSystemServiceExitPico+238
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.795
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 238
FAILURE_BUCKET_ID: 0x1_SysCallNum_40070_nt!KiSystemServiceExitPico
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {62591322-e178-777b-3e39-cdc4544eb06c}
Followup: MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff810193ec0e70
Arg3: fffffd0699c93f70
Arg4: fffff8072b4de55f
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1983
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9346
Key : Analysis.Init.CPU.mSec
Value: 640
Key : Analysis.Init.Elapsed.mSec
Value: 37146
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Bugcheck.Code.DumpHeader
Value: 0x1000007f
Key : Bugcheck.Code.Register
Value: 0x7f
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 071622-11140-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffff810193ec0e70
BUGCHECK_P3: fffffd0699c93f70
BUGCHECK_P4: fffff8072b4de55f
STACK_OVERFLOW: Stack Limit: fffffd0699c94000. Use (kF) and (!stackusage) to investigate stack usage.
STACKUSAGE_FUNCTION: The function at address 0xfffff8072b4e2731 was blamed for the stack overflow. It is using 8800 bytes of stack total in 5 instances (likely recursion).
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: r5apex.exe
STACK_TEXT:
fffffd06`99c93f70 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c94a90 fffffd06`99c94a90 fffffd06`99c94200 : nt!RtlDispatchException+0x4f
fffffd06`99c941d0 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c94a90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c948b0 fffff807`2b6269da : 00000000`00000000 00000000`00000000 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c94a90 fffff807`2b4e092f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c94c20 fffff807`2b4e03ce : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c94ce0 fffff807`2b4df3f9 : fffffd06`99c99950 fffffd06`99c94e90 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c94d90 fffff807`2b4de706 : fffffd06`99c95390 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c94e90 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c94e20 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c95e40 fffffd06`99c95e40 fffffd06`99c955b0 : nt!RtlDispatchException+0x1f6
fffffd06`99c95580 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c95e40 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c95c60 fffff807`2b6269da : 00000000`00000000 00000000`00000000 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c95e40 fffff807`2b4e092f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c95fd0 fffff807`2b4e03ce : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c96090 fffff807`2b4df3f9 : fffffd06`99c99950 fffffd06`99c96240 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c96140 fffff807`2b4de706 : fffffd06`99c96740 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c96240 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c961d0 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c971f0 fffffd06`99c971f0 fffffd06`99c96960 : nt!RtlDispatchException+0x1f6
fffffd06`99c96930 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c971f0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c97010 fffff807`2b6269da : 00000166`c8cc1220 00000000`00000004 00007fff`fffeffff 00000000`00000000 : nt!KiExceptionDispatch+0x10e
fffffd06`99c971f0 fffff807`2b4e092f : 00000000`00000030 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c97380 fffff807`2b4e03ce : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c97440 fffff807`2b4df3f9 : fffffd06`99c99950 fffffd06`99c975f0 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c974f0 fffff807`2b4de706 : fffffd06`99c97af0 fffff807`2b62a280 fffffd06`99c99950 fffffd06`99c975f0 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c97580 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c985a0 fffffd06`99c985a0 fffffd06`99c97d10 : nt!RtlDispatchException+0x1f6
fffffd06`99c97ce0 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c985a0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c983c0 fffff807`2b6269da : 00000000`00000000 00000000`00000000 00007fff`fffeffff fffffd06`99c98b00 : nt!KiExceptionDispatch+0x10e
fffffd06`99c985a0 fffff807`2b4e092f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c98730 fffff807`2b4e03ce : fffff807`2b200000 fffff807`2b62a280 ffffffff`ffffff80 fffff807`2b2e8094 : nt!RtlpUnwindPrologue+0x1ff
fffffd06`99c987f0 fffff807`2b4df3f9 : 00000000`0010000b fffffd06`99c989a0 fffff807`2b62a280 fffff807`2b2e8094 : nt!RtlpxVirtualUnwind+0x10e
fffffd06`99c988a0 fffff807`2b4de706 : fffffd06`99c98ea0 fffff807`2b62a280 00000000`0010000b fffffd06`99c989a0 : nt!RtlVirtualUnwind2+0x89
fffffd06`99c98930 fffff807`2b4e2731 : ffffffff`ffffffff fffffd06`99c99950 fffffd06`99c99950 fffffd06`99c990c0 : nt!RtlDispatchException+0x1f6
fffffd06`99c99090 fffff807`2b62a9ce : 00000000`00001000 fffffd06`99c99950 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
fffffd06`99c99770 fffff807`2b6269da : 00000000`0000003f 00000000`00000000 00007ff6`40722240 ffff9503`8ad14158 : nt!KiExceptionDispatch+0x10e
fffffd06`99c99950 fffff807`2b62a280 : ffff9503`b61be080 ffff9503`8ad14080 fffffd06`99c99b60 00000000`00000000 : nt!KiPageFault+0x41a
fffffd06`99c99ae0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit
SYMBOL_NAME: nt!KiDispatchException+1b1
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.795
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1b1
FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {cbb9a1ac-821c-b542-365f-2dd5602e6100}
Followup: MachineOwner
---------
CLOCK_WATCHDOG_TIMEOUT (101)
An expected clock interrupt was not received on a secondary processor in an
MP system within the allocated interval. This indicates that the specified
processor is hung and not processing interrupts.
Arguments:
Arg1: 0000000000000020, Clock interrupt time out interval in nominal clock ticks.
Arg2: 0000000000000000, 0.
Arg3: ffffe78045640180, The PRCB address of the hung processor.
Arg4: 0000000000000003, The index of the hung processor.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1327
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13770
Key : Analysis.Init.CPU.mSec
Value: 702
Key : Analysis.Init.Elapsed.mSec
Value: 56309
Key : Analysis.Memory.CommitPeak.Mb
Value: 106
Key : Bugcheck.Code.DumpHeader
Value: 0x101
Key : Bugcheck.Code.Register
Value: 0x101
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 071722-10265-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 101
BUGCHECK_P1: 20
BUGCHECK_P2: 0
BUGCHECK_P3: ffffe78045640180
BUGCHECK_P4: 3
FAULTING_PROCESSOR: 3
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
fffff801`100b69e8 fffff801`11091fb4 : 00000000`00000101 00000000`00000020 00000000`00000000 ffffe780`45640180 : nt!KeBugCheckEx
fffff801`100b69f0 fffff801`10eb6d71 : 00000000`00000000 fffff801`0fd27180 ffff35e7`2b1d5f8e fffff801`10f3e240 : nt!KeAccumulateTicks+0x1db064
fffff801`100b6a60 fffff801`10eb3da6 : 00000000`000e5c22 00000000`00088f25 00000022`3c958cf9 00000000`00000000 : nt!KiUpdateRunTime+0x61
fffff801`100b6ac0 fffff801`10eb50b2 : ffffbc89`495b9e90 00000000`00000000 fffff801`1182b450 00000000`00000000 : nt!KiUpdateTime+0x686
fffff801`100b6eb0 fffff801`10eb29e2 : ffffbc89`495b9e90 fffff801`118f7de0 fffff801`00000000 00000000`0000000c : nt!KeClockInterruptNotify+0x272
fffff801`100b6f40 fffff801`10e91340 : 00000022`3d87281c fffff801`118f7d30 ffffe780`47a7e830 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
fffff801`100b6f70 fffff801`1101990a : ffffbc89`495b9f10 fffff801`118f7d30 00000e71`8e2a273e 00000000`00000001 : nt!KiCallInterruptServiceRoutine+0xa0
fffff801`100b6fb0 fffff801`11019ed7 : 00000000`181b1c3c fffff801`0fd27180 fffff801`0fd2a250 fffff801`0fd2a148 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffbc89`495b9e90 fffff801`10e627e0 : 86000004`100c4900 fffff801`0fd27180 ffffbc89`495ba110 86000004`100c4900 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffbc89`495ba020 fffff801`10e33d79 : 86000004`100c4900 00000000`00000000 86000004`100c4921 00000000`00000000 : nt!MiFlushTbList+0x400
ffffbc89`495ba0b0 fffff801`10ebe36c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffbc89`495ba310 : nt!MmSetAddressRangeModifiedEx+0x2a9
ffffbc89`495ba210 fffff801`10f5835f : ffff9788`04509c68 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcFlushCachePriv+0x6ec
ffffbc89`495ba3b0 fffff801`1649fc79 : 00000000`00000005 00000000`00000000 00000000`00000000 ffffc001`3b2d0170 : nt!CcCoherencyFlushAndPurgeCache+0x7f
ffffbc89`495ba400 fffff801`1649f98f : ffffc001`3b2d0170 ffffbc89`495ba9c1 ffffc001`3b2d0000 ffff9788`0427c018 : Ntfs!NtfsCoherencyFlushAndPurgeCache+0x55
ffffbc89`495ba440 fffff801`164eb981 : ffffc001`3b2d0170 ffffc001`3b2d0170 ffffc001`3b2d0170 ffffc001`3b2d0010 : Ntfs!NtfsFlushUserStream+0xdf
ffffbc89`495ba4d0 fffff801`164eda3d : ffffc001`3b2d0170 ffffc001`3b2d0170 ffff9788`04557c88 ffffc001`3b266be0 : Ntfs!NtfsPerformOptimisticFlush+0xa1
ffffbc89`495ba520 fffff801`164ebec9 : ffff9788`0427c018 ffff9788`05ad58a0 fffff801`164ebe01 ffffbc89`495ba9c1 : Ntfs!NtfsCommonFlushBuffers+0x289
ffffbc89`495ba630 fffff801`10ee4ab8 : ffffbc89`495ba740 ffff9788`0427c018 ffff9788`00000000 00000022`3987d5d2 : Ntfs!NtfsCommonFlushBuffersCallout+0x19
ffffbc89`495ba660 fffff801`10ee4a2d : fffff801`164ebeb0 ffffbc89`495ba740 ffff9788`0427c018 fffff801`15796d68 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffbc89`495ba6d0 fffff801`1647ed9e : ffffbc89`495ba820 fffff801`163b2616 ffffbc89`495ba738 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffbc89`495ba710 fffff801`1647ecc5 : ffff9788`0427c018 ffff9788`05ad58a0 ffffbc89`495ba9c1 ffff9788`05ad58a0 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x66
ffffbc89`495ba780 fffff801`10e504a5 : ffff9788`00000000 ffff9788`05ad58a0 ffff9788`0427c018 ffffbc89`495ba7b0 : Ntfs!NtfsFsdFlushBuffers+0xf5
ffffbc89`495ba810 fffff801`15797bb5 : ffffbc89`495bb000 ffffbc89`495b5000 00000000`00000000 ffffbc89`495ba8f0 : nt!IofCallDriver+0x55
ffffbc89`495ba850 fffff801`15795853 : ffffbc89`495ba8e0 00000000`00000000 ffffbc89`495baa00 ffff9787`fc9825c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2b5
ffffbc89`495ba8c0 fffff801`10e504a5 : ffff9788`05ad58a0 00000000`0012019f ffff9788`0441f310 00000000`0009be01 : FLTMGR!FltpDispatch+0xa3
ffffbc89`495ba920 fffff801`1128e4b2 : 00000000`00000001 ffff9788`05ad58a0 ffffbc89`495ba9c1 fffff801`10e50263 : nt!IofCallDriver+0x55
ffffbc89`495ba960 fffff801`113a222b : ffff9788`00000000 ffffbc89`495bab60 00000000`00000000 ffff9788`05ad58a0 : nt!IopSynchronousServiceTail+0x1d2
ffffbc89`495baa10 fffff801`113a2016 : ffff9788`05b81040 00000000`00000000 ffff9787`fcb2dda0 ffffbc89`495baa68 : nt!NtFlushBuffersFileEx+0x1fb
ffffbc89`495baaa0 fffff801`1102a278 : ffff9788`05b81040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtFlushBuffersFile+0x16
ffffbc89`495baae0 00007ffd`83ca4874 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000082`d3efe528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`83ca4874
SYMBOL_NAME: nt!KeAccumulateTicks+1db064
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.795
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1db064
FAILURE_BUCKET_ID: CLOCK_WATCHDOG_TIMEOUT_IDLE_THREAD_INVALID_CONTEXT_nt!KeAccumulateTicks
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b37ea922-6ea8-0080-e849-451291ca96f3}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80b733088b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803728a9fc9, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1639
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7425
Key : Analysis.Init.CPU.mSec
Value: 483
Key : Analysis.Init.Elapsed.mSec
Value: 50516
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 071722-10281-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: fffff80b733088b8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff803728a9fc9
READ_ADDRESS: fffff80373305450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80b733088b8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffcb81b5c52c70 -- (.trap 0xffffcb81b5c52c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=00000000ffffffff
rdx=000000000000ffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff803728a9fc9 rsp=ffffcb81b5c52e00 rbp=ffffcb81b5c52e89
r8=ffff800a97679a78 r9=0000000000000000 r10=0000000000000000
r11=fffff80372600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiDeferredReadySingleThread+0xc09:
fffff803`728a9fc9 498bb4c3c088d000 mov rsi,qword ptr [r11+rax*8+0D088C0h] ds:fffff80b`733088b8=????????????????
Resetting default scope
STACK_TEXT:
ffffcb81`b5c52b28 fffff803`72a2a8a9 : 00000000`0000000a fffff80b`733088b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffcb81`b5c52b30 fffff803`72a26a00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcb81`b5c52c70 fffff803`728a9fc9 : fffff803`732e6350 fffff803`7284849b 00000000`00000000 ffff9001`a4c40180 : nt!KiPageFault+0x440
ffffcb81`b5c52e00 fffff803`72886ecf : ffff9001`a4c40180 ffff9001`a4c40100 ffffcb81`b5c52f78 00000000`00000000 : nt!KiDeferredReadySingleThread+0xc09
ffffcb81`b5c52ef0 fffff803`72927bd5 : ffff9001`a4c40180 ffff800a`976790c0 ffff9001`a4c40180 00000000`00000000 : nt!KiQueueReadyThread+0x31f
ffffcb81`b5c52f60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSetLegacyAffinityThread+0x295
SYMBOL_NAME: nt!KiDeferredReadySingleThread+c09
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.795
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: c09
FAILURE_BUCKET_ID: AV_nt!KiDeferredReadySingleThread
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {626f59d5-90cc-ab48-85f0-60e170096c96}
Followup: MachineOwner
---------
HD Tune tarama sonuçları bu şekilde;
HD Tune Pro: Toshiba-TR200 Health
ID Current Worst ThresholdData Status
(09) Power On Hours Count 100 100 0 8348 ok
(0C) Power Cycle Count 100 100 0 2473 ok
(A7) Unknown Attribute 100 100 0 0 ok
(A8) Unknown Attribute 100 100 0 0 ok
(A9) Unknown Attribute 100 100 10 0 ok
(AD) Unknown Attribute 180 180 0 0 ok
(C0) Unsafe Shutdown Count 100 100 0 345 ok
(C2) Temperature 67 56 20 188979413025 ok
(F1) Unknown Attribute 100 100 0 616762 ok
Health Status: Ok
HD Tune Pro: Toshiba-TR200 Error Scan
Scanned data: 239 GB
Damaged Blocks: 0.0 %
Elapsed Time: 9:38
HD Tune Pro: ST2000DM008-2FR102 Error Scan
Scanned data: 1999 GB
Damaged Blocks: 0.0 %
Elapsed Time: 2:17:58
HD Tune Pro: ST2000DM008-2FR102 Health
ID Current Worst ThresholdData Status
(01) RAW Read Error Rate 78 64 6 56783808 ok
(03) Spin Up Time 99 97 0 0 ok
(04) Start/Stop Count 99 99 20 1403 ok
(05) Reallocated Sector Count 100 100 10 0 ok
(07) Seek Error Rate 77 60 45 50206626 ok
(09) Power On Hours Count 97 97 0 213077622524564 ok
(0A) Spin Retry Count 100 100 97 0 ok
(0C) Power Cycle Count 100 100 20 736 ok
(B7) SATA Downshift Count 100 100 0 0 ok
(B8) End To End Error Detection 100 100 99 0 ok
(BB) Uncorrectable Error Count 100 100 0 0 ok
(BC) Command Timeout 100 100 0 0 ok
(BD) Unknown Attribute 100 100 0 0 ok
(BE) Airflow Temperature 70 58 40 505217054 ok
(BF) G-sense Error Rate 100 100 0 0 ok
(C0) Unsafe Shutdown Count 100 100 0 42 ok
(C1) Load Cycle Count 92 92 0 17283 ok
(C2) Temperature 30 42 0 60129542174 ok
(C3) Hardware ECC Recovered 78 64 0 56783808 ok
(C5) Current Pending Sector 100 100 0 0 ok
(C6) Offline Uncorrectable 100 100 0 0 ok
(C7) Interface CRC Error Count 200 200 0 0 ok
(F0) Head Flying Hours 100 253 0 277128469808292 ok
(F1) Unknown Attribute 100 253 0 11350012269 ok
(F2) Unknown Attribute 100 253 0 27859005466 ok
Health Status: Ok