Selamlar, aşağıdaki ağ sürücüsünü indirip kurun. Ek olarak dilerseniz bir ara BIOS sürümünüzü de güncelleyebilirsiniz. 3002 sürümünü kullanıyorsunuz fakat şu an en güncel sürüm 3604 olarak görünmekte. Yapmanız zorunlu değil fakat yaparsanız sizin yararınıza.
Sistemi de birkaç gün test edip sonucu belirtirseniz sevinirim. Ona göre konunuzu çözüldü olarak işaretleriz.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc3812ff893f9, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg4: fffff800497a0886, address which referenced memory.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for rt640x64.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9718.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 17733.
Key : Analysis.Init.CPU.mSec
Value: 1311.
Key : Analysis.Init.Elapsed.mSec
Value: 6605.
Key : Analysis.Memory.CommitPeak.Mb
Value: 100.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 032522-7156-01.dmp
BUGCHECK_CODE: d1.
BUGCHECK_P1: ffffc3812ff893f9.
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff800497a0886.
WRITE_ADDRESS: fffff80044afa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
ffffc3812ff893f9.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
TRAP_FRAME: ffff8d0423e8e6b0 -- (.trap 0xffff8d0423e8e6b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000006edf rbx=0000000000000000 rcx=0000000000000001
rdx=000400000005a2fd rsi=0000000000000000 rdi=0000000000000000
rip=fffff800497a0886 rsp=ffff8d0423e8e840 rbp=ffff8d0423e8e940
r8=0000000000000000 r9=fffff08000000028 r10=fffff08000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po nc.
tcpip!TcpTcbHeaderSend+0x286:
fffff800`497a0886 668907 mov word ptr [rdi],ax ds:00000000`00000000=????
Resetting default scope.
STACK_TEXT:
ffff8d04`23e8e840 fffff800`497a3770 : ffffb30d`01a86010 00000000`00000000 00000000`31273209 00000000`e5b00d19 : tcpip!TcpTcbHeaderSend+0x286
ffff8d04`23e8eaf0 fffff800`497cc292 : ffffb30c`fdaf6edf 00000000`00000001 00000000`00000000 ffffb30c`f997a001 : tcpip!TcpReceive+0xbc0
ffff8d04`23e8ebe0 fffff800`49793cb0 : ffffb30c`fae2b030 00000000`00000000 00000000`00000000 ffffb30c`f5df3ba0 : tcpip!TcpNlClientReceiveDatagrams+0x22
ffff8d04`23e8ec20 fffff800`497905fb : 00000000`00000001 ffff8d04`23e8ed00 00000000`00000000 ffffb30c`f997a000 : tcpip!IppProcessDeliverList+0xc0
ffff8d04`23e8ed00 fffff800`4978fb7f : fffff800`49949230 ffffb30c`f99b68e0 ffffb30c`f997a000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x21b
ffff8d04`23e8ee00 fffff800`4978cebc : ffffb30c`fb07b140 ffffb30c`fae2b030 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x32f
ffff8d04`23e8ef20 fffff800`497d3caf : ffffb30c`fae2b030 00000000`00000000 ffff8d04`23e8eff1 00000000`00000000 : tcpip!IpFlcReceivePackets+0xc
ffff8d04`23e8ef50 fffff800`497d32ac : ffff8d04`23e8f101 ffffb30c`fa7a5800 fffff800`497c5a50 ffff8d04`23e8f32c : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x26f
ffff8d04`23e8f050 fffff800`440f8618 : ffffb30c`f9a07b40 00000000`00000002 ffffb30c`f981b040 ffff8d04`23e8f348 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17c
ffff8d04`23e8f1a0 fffff800`440f858d : fffff800`497d3130 ffff8d04`23e8f348 ffffb30c`f5f6d130 fffff800`49912614 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8d04`23e8f210 fffff800`497af66d : 00000000`00000014 fffff800`4981ca7a ffffb30c`fae2b1b0 fffff800`49a4142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff8d04`23e8f250 fffff800`497aed4d : 00000000`00000001 ffff8d04`23e8f3b0 ffffb30c`fa7a5820 ffff8d04`23e8f3c0 : tcpip!NetioExpandKernelStackAndCallout+0x8d
ffff8d04`23e8f2b0 fffff800`491d1eb0 : ffffb30c`fac95a81 00000000`00000001 ffffb30c`faf2d530 ffff8d04`23e8f6c0 : tcpip!FlReceiveNetBufferListChain+0x46d
ffff8d04`23e8f560 fffff800`491d1ccb : ffffb30c`fa79e8b0 00000000`00000001 ffff8d04`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
ffff8d04`23e8f640 fffff800`491d7ef0 : ffffb30c`fb10e1a0 ffffb30c`fae2b001 ffffb30c`fb10e1a0 00000000`00000d01 : ndis!ndisMTopReceiveNetBufferLists+0x22b
ffff8d04`23e8f6c0 fffff800`4920dfef : ffffb30c`fae2b030 ffff8d04`23e8f791 00000000`00000000 ffff8d04`23e8f700 : ndis!ndisCallReceiveHandler+0x60
ffff8d04`23e8f710 fffff800`491d4a94 : 00000000`00a323a4 00000000`00000001 ffffb30c`fb10e1a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
ffff8d04`23e8f7e0 fffff800`512761d8 : ffffb30c`face7000 ffffb30c`face7000 00000000`00000000 ffffb30c`face75f0 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffff8d04`23e8f870 ffffb30c`face7000 : ffffb30c`face7000 00000000`00000000 ffffb30c`face75f0 ffffb30c`00000001 : rt640x64+0x161d8
ffff8d04`23e8f878 ffffb30c`face7000 : 00000000`00000000 ffffb30c`face75f0 ffffb30c`00000001 ffffb30d`0d36e158 : 0xffffb30c`face7000
ffff8d04`23e8f880 00000000`00000000 : ffffb30c`face75f0 ffffb30c`00000001 ffffb30d`0d36e158 80000000`00000001 : 0xffffb30c`face7000
STACK_COMMAND: .trap 0xffff8d0423e8e6b0 ; kb.
SYMBOL_NAME: rt640x64+161d8
MODULE_NAME: rt640x64.
IMAGE_NAME: rt640x64.sys
BUCKET_ID_FUNC_OFFSET: 161d8.
FAILURE_BUCKET_ID: AV_rt640x64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {2e96e72d-48ac-dceb-22bd-11e71513e43e}
Followup: MachineOwner.
---------[/CODE]