RTX 2060 sistemde KERNEL_SECURITY_CHECK_FAILURE hatası

Son olarak hızlı başlatmayı kapatın derim. Onun da rehberi aşağıda yer almaktadır. Yine alırsanız ya da almazsanız belirtirseniz sevinirim.


[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff589a2414880, Address of the trap frame for the exception that caused the BugCheck.
Arg3: fffff589a24147d8, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8984.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 22782.

Key : Analysis.Init.CPU.mSec
Value: 875.

Key : Analysis.Init.Elapsed.mSec
Value: 2981.

Key : Analysis.Memory.CommitPeak.Mb
Value: 82.

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 022222-9515-01.dmp

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: fffff589a2414880.

BUGCHECK_P3: fffff589a24147d8.

BUGCHECK_P4: 0

TRAP_FRAME: fffff589a2414880 -- (.trap 0xfffff589a2414880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff868d975df038 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80413a1993d rsp=fffff589a2414a10 rbp=fffff589a2414aa1
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc.
nt!KeWaitForSingleObject+0x20e59d:
fffff804`13a1993d cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: fffff589a24147d8 -- (.exr 0xfffff589a24147d8)
ExceptionAddress: fffff80413a1993d (nt!KeWaitForSingleObject+0x000000000020e59d)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
fffff589`a2414558 fffff804`13a09569 : 00000000`00000139 00000000`00000003 fffff589`a2414880 fffff589`a24147d8 : nt!KeBugCheckEx
fffff589`a2414560 fffff804`13a09990 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff589`a24146a0 fffff804`13a07d23 : fffff804`108e0100 fffff804`14326a00 ffff868d`97bb4040 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff589`a2414880 fffff804`13a1993d : 00000000`0000001a fffff589`a2414a68 00000000`00000008 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff589`a2414a10 fffff804`17fd8711 : ffff868d`975df030 fffff804`00000000 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x20e59d
fffff589`a2414b00 fffff804`17f37c27 : ffff868d`975df010 ffff868d`975df010 fffff589`a2414ba9 fffff804`17f17100 : ndis!ndisWaitForKernelObject+0x21
fffff589`a2414b40 fffff804`13955a05 : ffff868d`97bb4040 ffff868d`97bb4040 fffff804`17f17130 00000000`00000000 : ndis!ndisReceiveWorkerThread+0x20af7
fffff589`a2414c10 fffff804`139fec68 : ffffb700`b8ca2180 ffff868d`97bb4040 fffff804`139559b0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff589`a2414c60 00000000`00000000 : fffff589`a2415000 fffff589`a240f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: ndis!ndisWaitForKernelObject+21

MODULE_NAME: ndis.

IMAGE_NAME: ndis.sys

IMAGE_VERSION: 10.0.19041.1173

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 21.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_ndis!ndisWaitForKernelObject

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {2962b9d2-f992-275a-c6bd-ede01b778f2f}

Followup: MachineOwner.
---------[/CODE]

Hocam dediğinizi yaptım. Bir süre kullandıktan sonra aniden bilgisayar yeniden başlattı kendini. DMP dosyası da oluşmamış. Temiz kurulum yaparak tekrardan Windows 11'e geçmeyi düşünüyorum. Eğer hala sorun devam ederse RAM'leri servise vereceğim. Ya da direkt kasayı Vatan Bilgisayar'a götüreceğim. Sistemi oradan toplamıştım. Montajını onlar yaptı. Henüz iki sene geçmedi alalı. Mavi ekran tespiti gibi bir servisleri var mı? Yoksa bütün parçaları servise mi gönderiyorlar? Bir bilginiz var mı hocam?
 
Son düzenleyen: Moderatör:
Dilerseniz bir süre daha bekleyin, voltaj dalgalanması vb. bir nedenden dolayı da sistem kapanmış olabilir. Ayrıca buradaki teknik servisin %10'u Vatan'da olsa şu an hata çözüm şirketleriydi. :)
 
Dilerseniz bir süre daha bekleyin, voltaj dalgalanması vb. bir nedenden dolayı da sistem kapanmış olabilir. Ayrıca buradaki teknik servisin %10'u Vatan'da olsa şu an hata çözüm şirketleriydi. :)
Hocam az önce bu hatayı aldım.
Az önce de bu hata geldi. @Enes3078
 
Son düzenleme:
ASUS yazılımlarını da kaldırırsanız sevinirim. Böyle böyle çözeceğiz artık. :)

ASUS'un kablosuz mouseunu kullanıyorum. Bu yüzden yazılımını kaldıramam. Bu konudan dolayı başkaları da dertli. Fakat sanırım çözümü yok. Ayrıca aşağıdaki sorunun da kaynağını explorer.exe olarak gördüm. Bunun için bir çözümünüz var mı?
 
En iyisi tekrar bi' Olay Görüntüleyicisi raporu paylaşın. Sorun yine bellek kaynaklı gibi görünüyor ama farklı bir şeyler çıkarabilmek adına o raporu inceleyelim. Ayrıca ASUS'un kontrol merkezini kaldırın dediğimde biraz yanlış anladınız, kaldırın dediğim her şeyi kaldırdıktan sonra tekrar kurabilirsiniz. Bunu da belirtmiş olayım. :)

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff806610745c6, Address of the instruction which caused the BugCheck
Arg3: ffffd8819e0bf920, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8186

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 14362

Key : Analysis.Init.CPU.mSec
Value: 921

Key : Analysis.Init.Elapsed.mSec
Value: 3365

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 022322-9734-01.dmp

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff806610745c6

BUGCHECK_P3: ffffd8819e0bf920

BUGCHECK_P4: 0

CONTEXT: ffffd8819e0bf920 -- (.cxr 0xffffd8819e0bf920)
rax=ffffc202ddc20de8 rbx=ffffc202e71ca080 rcx=c202ddc20db02fb3
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffc202ddc20de0
rip=fffff806610745c6 rsp=fffff3805b9fe940 rbp=fffff3805b9fea01
r8=0000000000000000 r9=0000001e4485f9da r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=c202ddc20db02fb3
r14=0000000000000000 r15=ffffc202e71ca1c0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!KeAbPreWait+0x6:
fffff806`610745c6 0fb64120 movzx eax,byte ptr [rcx+20h] ds:002b:c202ddc2`0db02fd3=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: explorer.exe

STACK_TEXT:
fffff380`5b9fe940 fffff806`6121967d : ffffd881`000000f9 fffff806`613f6b91 000f8067`b4bbbd01 ffffc202`e71ca1c0 : nt!KeAbPreWait+0x6
fffff380`5b9fe970 fffff806`613f87e1 : ffffc202`ddc20de0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x20e2dd
fffff380`5b9fea60 fffff806`613f888a : ffffc202`e71ca080 00000000`0a6bf578 00000000`00000000 fffff806`61208e18 : nt!ObWaitForSingleObject+0x91
fffff380`5b9feac0 fffff806`61208fb8 : 00000000`1b7f23e0 00000000`0000000e fffff380`5b9feb18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
fffff380`5b9feb00 00007ffa`ba40cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0a6bf548 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ba40cdf4


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffea915729a8d0-ffffea915729a8d4 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+510
[ 9c 24 b0 03 00:48 8b 02 49 3b ]
ffffea915729a8d6-ffffea915729a8df 10 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+516 (+0x06)
[ 48 81 c4 a0 03 00 00 5d:77 09 1b c0 f7 d0 83 e0 ]
ffffea915729a8e1-ffffea915729a8e6 6 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+521 (+0x0b)
[ cc cc cc cc cc cc:b8 01 00 00 00 c3 ]
ffffea915729a8e8-ffffea915729a8fe 23 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __ (+0x07)
[ 40 55 48 8d ac 24 80 fe:cc cc cc cc cc cc cc cc ]
ffffea915729a900-ffffea915729a91b 28 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+18 (+0x18)
[ 48 33 c4 48 89 85 70 01:00 83 ea 01 74 7c 83 ea ]
ffffea915729a91d-ffffea915729a92a 14 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+35 (+0x1d)
[ 00 00 48 89 85 50 01 00:75 2c b8 80 00 00 00 8d ]
ffffea915729a92d-ffffea915729a935 9 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+45 (+0x10)
[ 48 89 85 40 01 00 00 48:00 8d 48 10 49 8d 14 0a ]
ffffea915729a937-ffffea915729a94c 22 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+4f (+0x0a)
[ a0 02 00 00 48 89 85 30:d2 74 0c f3 0f 11 12 41 ]
ffffea915729a94e-ffffea915729a954 7 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+66 (+0x17)
[ 00 00 48 8b 85 90 02:0f 85 c2 d2 06 00 b8 ]
ffffea915729a956-ffffea915729a96a 21 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+6e (+0x08)
[ 00 48 89 85 10 01 00 00:08 00 00 8d 4a 5b eb d3 ]
ffffea915729a96c-ffffea915729a970 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+84 (+0x16)
[ 48 8b 85 80 02:01 00 00 b9 60 ]
ffffea915729a973-ffffea915729a976 4 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+8b (+0x07)
[ 48 89 85 f0:00 eb bb b8 ]
ffffea915729a978 - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+90 (+0x05)
[ 00:04 ]
ffffea915729a97a-ffffea915729a97e 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+92 (+0x02)
[ 48 8b 85 78 02:00 b9 54 00 00 ]
ffffea915729a980-ffffea915729a984 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+98 (+0x06)
[ 00 48 89 85 e0:eb af b8 00 20 ]
ffffea915729a987-ffffea915729a994 14 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+9f (+0x07)
[ 00 48 8b 85 70 02 00 00:b9 6c 00 00 00 eb a3 b8 ]
ffffea915729a996-ffffea915729a9b1 28 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+ae (+0x0f)
[ 48 8b 85 68 02 00 00 48:00 00 eb 97 cc cc cc cc ]
ffffea915729a9b3-ffffea915729a9bc 10 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+cb (+0x1d)
[ 8b 85 58 02 00 00 48 89:8d 6c 24 c9 48 81 ec 00 ]
ffffea915729a9be-ffffea915729a9cf 18 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+d6 (+0x0b)
[ 00 00 48 8b 85 50 02 00:48 8b 05 db c2 1a 00 48 ]
ffffea91572a3f00-ffffea91572a3f1d 30 bytes - win32kbase!UserGetDesktopDC+c8 (+0x9542)
[ 05 e8 9a 09 fa ff 48 8b:48 83 ec 28 48 8b ca e8 ]
ffffea91572a3f1f-ffffea91572a3f78 90 bytes - win32kbase!UserGetDesktopDC+e7 (+0x1f)
[ 45 33 c0 8b d7 85 f6 48:cc 45 33 db 4c 8b d1 4d ]
ffffea91572a3f7a-ffffea91572a3f93 26 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+1a (+0x5b)
[ 40 32 ff 84 c0 74 72 8b:00 74 44 48 8b 44 24 28 ]
ffffea91572a3f95-ffffea91572a3fb0 28 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+35 (+0x1b)
[ 5c 24 40 0f ba e0 09 73:4c 01 00 00 8a c1 c0 e8 ]
ffffea91572a3fb2-ffffea91572a3fff 78 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+52 (+0x1d)
[ 0f ba 73 10 09 8b 43 10:88 92 4c 01 00 00 c6 00 ]
ffffea91572a6561-ffffea91572a6585 37 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+c5 (+0x25af)
[ 8b 4e 58 49 23 d2 0f 10:83 ec 28 8b ca 45 33 c0 ]
ffffea91572a6587-ffffea91572a6589 3 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+eb (+0x26)
[ 8b 74 24:83 ec 20 ]
ffffea91572a658b-ffffea91572a65bf 53 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+ef (+0x04)
[ 48 83 c4 20 5f c3 cc 48:8d 05 2f 9d 15 00 8b da ]
ffffea91572a65c2-ffffea91572a65fb 58 bytes - win32kbase!DirectComposition::CAnimationMarshaler::`vector deleting destructor'+e (+0x37)
[ f9 e8 24 00 00 00 f6 c3:c4 48 89 58 10 89 48 08 ]
ffffea91572a65fd-ffffea91572a664b 79 bytes - win32kbase!DirectComposition::CAnimationMarshaler::~CAnimationMarshaler+11 (+0x3b)
[ 48 8b f9 48 89 01 48 8d:00 00 49 8d 48 08 49 3b ]
ffffea91572a664d-ffffea91572a665f 19 bytes - win32kbase!DirectComposition::CAnimationMarshaler::~CAnimationMarshaler+61 (+0x50)
[ 00 48 89 5f 48 48 85 db:eb c5 0f 10 02 f3 0f 7f ]
736 errors : !win32kbase (ffffea915729a8d0-ffffea91572a665f)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

MEMORY_CORRUPTOR: LARGE

STACK_COMMAND: .cxr 0xffffd8819e0bf920 ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------[/CODE]
 
En iyisi tekrar bi' Olay Görüntüleyicisi raporu paylaşın. Sorun yine bellek kaynaklı gibi görünüyor ama farklı bir şeyler çıkarabilmek adına o raporu inceleyelim. Ayrıca ASUS'un kontrol merkezini kaldırın dediğimde biraz yanlış anladınız, kaldırın dediğim her şeyi kaldırdıktan sonra tekrar kurabilirsiniz. Bunu da belirtmiş olayım. :)

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff806610745c6, Address of the instruction which caused the BugCheck
Arg3: ffffd8819e0bf920, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8186

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 14362

Key : Analysis.Init.CPU.mSec
Value: 921

Key : Analysis.Init.Elapsed.mSec
Value: 3365

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 022322-9734-01.dmp

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff806610745c6

BUGCHECK_P3: ffffd8819e0bf920

BUGCHECK_P4: 0

CONTEXT: ffffd8819e0bf920 -- (.cxr 0xffffd8819e0bf920)
rax=ffffc202ddc20de8 rbx=ffffc202e71ca080 rcx=c202ddc20db02fb3
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffc202ddc20de0
rip=fffff806610745c6 rsp=fffff3805b9fe940 rbp=fffff3805b9fea01
r8=0000000000000000 r9=0000001e4485f9da r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=c202ddc20db02fb3
r14=0000000000000000 r15=ffffc202e71ca1c0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!KeAbPreWait+0x6:
fffff806`610745c6 0fb64120 movzx eax,byte ptr [rcx+20h] ds:002b:c202ddc2`0db02fd3=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: explorer.exe

STACK_TEXT:
fffff380`5b9fe940 fffff806`6121967d : ffffd881`000000f9 fffff806`613f6b91 000f8067`b4bbbd01 ffffc202`e71ca1c0 : nt!KeAbPreWait+0x6
fffff380`5b9fe970 fffff806`613f87e1 : ffffc202`ddc20de0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x20e2dd
fffff380`5b9fea60 fffff806`613f888a : ffffc202`e71ca080 00000000`0a6bf578 00000000`00000000 fffff806`61208e18 : nt!ObWaitForSingleObject+0x91
fffff380`5b9feac0 fffff806`61208fb8 : 00000000`1b7f23e0 00000000`0000000e fffff380`5b9feb18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
fffff380`5b9feb00 00007ffa`ba40cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0a6bf548 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ba40cdf4


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffea915729a8d0-ffffea915729a8d4 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+510
[ 9c 24 b0 03 00:48 8b 02 49 3b ]
ffffea915729a8d6-ffffea915729a8df 10 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+516 (+0x06)
[ 48 81 c4 a0 03 00 00 5d:77 09 1b c0 f7 d0 83 e0 ]
ffffea915729a8e1-ffffea915729a8e6 6 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+521 (+0x0b)
[ cc cc cc cc cc cc:b8 01 00 00 00 c3 ]
ffffea915729a8e8-ffffea915729a8fe 23 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __ (+0x07)
[ 40 55 48 8d ac 24 80 fe:cc cc cc cc cc cc cc cc ]
ffffea915729a900-ffffea915729a91b 28 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+18 (+0x18)
[ 48 33 c4 48 89 85 70 01:00 83 ea 01 74 7c 83 ea ]
ffffea915729a91d-ffffea915729a92a 14 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+35 (+0x1d)
[ 00 00 48 89 85 50 01 00:75 2c b8 80 00 00 00 8d ]
ffffea915729a92d-ffffea915729a935 9 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+45 (+0x10)
[ 48 89 85 40 01 00 00 48:00 8d 48 10 49 8d 14 0a ]
ffffea915729a937-ffffea915729a94c 22 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+4f (+0x0a)
[ a0 02 00 00 48 89 85 30:d2 74 0c f3 0f 11 12 41 ]
ffffea915729a94e-ffffea915729a954 7 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+66 (+0x17)
[ 00 00 48 8b 85 90 02:0f 85 c2 d2 06 00 b8 ]
ffffea915729a956-ffffea915729a96a 21 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+6e (+0x08)
[ 00 48 89 85 10 01 00 00:08 00 00 8d 4a 5b eb d3 ]
ffffea915729a96c-ffffea915729a970 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+84 (+0x16)
[ 48 8b 85 80 02:01 00 00 b9 60 ]
ffffea915729a973-ffffea915729a976 4 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+8b (+0x07)
[ 48 89 85 f0:00 eb bb b8 ]
ffffea915729a978 - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+90 (+0x05)
[ 00:04 ]
ffffea915729a97a-ffffea915729a97e 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+92 (+0x02)
[ 48 8b 85 78 02:00 b9 54 00 00 ]
ffffea915729a980-ffffea915729a984 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+98 (+0x06)
[ 00 48 89 85 e0:eb af b8 00 20 ]
ffffea915729a987-ffffea915729a994 14 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+9f (+0x07)
[ 00 48 8b 85 70 02 00 00:b9 6c 00 00 00 eb a3 b8 ]
ffffea915729a996-ffffea915729a9b1 28 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+ae (+0x0f)
[ 48 8b 85 68 02 00 00 48:00 00 eb 97 cc cc cc cc ]
ffffea915729a9b3-ffffea915729a9bc 10 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+cb (+0x1d)
[ 8b 85 58 02 00 00 48 89:8d 6c 24 c9 48 81 ec 00 ]
ffffea915729a9be-ffffea915729a9cf 18 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+d6 (+0x0b)
[ 00 00 48 8b 85 50 02 00:48 8b 05 db c2 1a 00 48 ]
ffffea91572a3f00-ffffea91572a3f1d 30 bytes - win32kbase!UserGetDesktopDC+c8 (+0x9542)
[ 05 e8 9a 09 fa ff 48 8b:48 83 ec 28 48 8b ca e8 ]
ffffea91572a3f1f-ffffea91572a3f78 90 bytes - win32kbase!UserGetDesktopDC+e7 (+0x1f)
[ 45 33 c0 8b d7 85 f6 48:cc 45 33 db 4c 8b d1 4d ]
ffffea91572a3f7a-ffffea91572a3f93 26 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+1a (+0x5b)
[ 40 32 ff 84 c0 74 72 8b:00 74 44 48 8b 44 24 28 ]
ffffea91572a3f95-ffffea91572a3fb0 28 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+35 (+0x1b)
[ 5c 24 40 0f ba e0 09 73:4c 01 00 00 8a c1 c0 e8 ]
ffffea91572a3fb2-ffffea91572a3fff 78 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+52 (+0x1d)
[ 0f ba 73 10 09 8b 43 10:88 92 4c 01 00 00 c6 00 ]
ffffea91572a6561-ffffea91572a6585 37 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+c5 (+0x25af)
[ 8b 4e 58 49 23 d2 0f 10:83 ec 28 8b ca 45 33 c0 ]
ffffea91572a6587-ffffea91572a6589 3 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+eb (+0x26)
[ 8b 74 24:83 ec 20 ]
ffffea91572a658b-ffffea91572a65bf 53 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+ef (+0x04)
[ 48 83 c4 20 5f c3 cc 48:8d 05 2f 9d 15 00 8b da ]
ffffea91572a65c2-ffffea91572a65fb 58 bytes - win32kbase!DirectComposition::CAnimationMarshaler::`vector deleting destructor'+e (+0x37)
[ f9 e8 24 00 00 00 f6 c3:c4 48 89 58 10 89 48 08 ]
ffffea91572a65fd-ffffea91572a664b 79 bytes - win32kbase!DirectComposition::CAnimationMarshaler::~CAnimationMarshaler+11 (+0x3b)
[ 48 8b f9 48 89 01 48 8d:00 00 49 8d 48 08 49 3b ]
ffffea91572a664d-ffffea91572a665f 19 bytes - win32kbase!DirectComposition::CAnimationMarshaler::~CAnimationMarshaler+61 (+0x50)
[ 00 48 89 5f 48 48 85 db:eb c5 0f 10 02 f3 0f 7f ]
736 errors : !win32kbase (ffffea915729a8d0-ffffea91572a665f)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

MEMORY_CORRUPTOR: LARGE

STACK_COMMAND: .cxr 0xffffd8819e0bf920 ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------[/CODE]
Az önce bu hatayı aldım:
 
Son düzenleme:
Sanal bellek sorunu, yine tam da tahmin ettiğim gibi.

1645811949752.png


Sanal belleği kapatın ve sistemi yeniden başlatın. Ardından sanal belleği otomatik moda alıp sistemi yine yeniden başlatın ve öyle deneyin. Son durumdan haberdar ederseniz sevinirim.

Dump çıktısını da eklemiş olayım. :)

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80600000009, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000098, value 0 = read operation, 1 = write operation
Arg4: fffff80600000009, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9046

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 31410

Key : Analysis.Init.CPU.mSec
Value: 1218

Key : Analysis.Init.Elapsed.mSec
Value: 4170

Key : Analysis.Memory.CommitPeak.Mb
Value: 78

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 022522-9656-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: fffff80600000009

BUGCHECK_P2: ff

BUGCHECK_P3: 98

BUGCHECK_P4: fffff80600000009

READ_ADDRESS: fffff806588fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80600000009

ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffe78c9208b550 -- (.trap 0xffffe78c9208b550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80600000009 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80600000009 rsp=ffffe78c9208b6e8 rbp=0000000000000000
r8=0000000000043632 r9=0000000000000000 r10=0000fffff8060000
r11=ffffc1f94e200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
fffff806`00000009 ?? ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
fffff806`00000009 ?? ???

STACK_TEXT:
ffffe78c`9208b408 fffff806`58009569 : 00000000`0000000a fffff806`00000009 00000000`000000ff 00000000`00000098 : nt!KeBugCheckEx
ffffe78c`9208b410 fffff806`58005869 : 00000000`00000000 fffff806`6a982d23 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffe78c`9208b550 fffff806`00000009 : fffff806`57e18a2b 00000e1f`1f2b2be1 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x469
ffffe78c`9208b6e8 fffff806`57e18a2b : 00000e1f`1f2b2be1 00000000`00000001 00000000`00000000 0000000a`0ac3878a : 0xfffff806`00000009
ffffe78c`9208b6f0 fffff806`57e17104 : 00000000`00000000 00001f80`00000008 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x17ab
ffffe78c`9208baf0 fffff806`57ffb134 : ffffffff`00000000 ffffd201`6bfcb340 ffffab0b`91a84080 00000000`00000750 : nt!PoIdle+0x374
ffffe78c`9208bc60 00000000`00000000 : ffffe78c`9208c000 ffffe78c`92086000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME: nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1566

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 469

FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36}

Followup: MachineOwner
---------[/CODE]
 
Son düzenleme:
Sanal bellek sorunu, yine tam da tahmin ettiğim gibi.

Eki Görüntüle 1315842

Sanal belleği kapatın ve sistemi yeniden başlatın. Ardından sanal belleği otomatik moda alıp sistemi yine yeniden başlatın ve öyle deneyin. Son durumdan haberdar ederseniz sevinirim.

Dump çıktısını da eklemiş olayım. :)

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80600000009, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000098, value 0 = read operation, 1 = write operation
Arg4: fffff80600000009, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9046

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 31410

Key : Analysis.Init.CPU.mSec
Value: 1218

Key : Analysis.Init.Elapsed.mSec
Value: 4170

Key : Analysis.Memory.CommitPeak.Mb
Value: 78

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 022522-9656-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: fffff80600000009

BUGCHECK_P2: ff

BUGCHECK_P3: 98

BUGCHECK_P4: fffff80600000009

READ_ADDRESS: fffff806588fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80600000009

ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffe78c9208b550 -- (.trap 0xffffe78c9208b550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80600000009 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80600000009 rsp=ffffe78c9208b6e8 rbp=0000000000000000
r8=0000000000043632 r9=0000000000000000 r10=0000fffff8060000
r11=ffffc1f94e200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
fffff806`00000009 ?? ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
fffff806`00000009 ?? ???

STACK_TEXT:
ffffe78c`9208b408 fffff806`58009569 : 00000000`0000000a fffff806`00000009 00000000`000000ff 00000000`00000098 : nt!KeBugCheckEx
ffffe78c`9208b410 fffff806`58005869 : 00000000`00000000 fffff806`6a982d23 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffe78c`9208b550 fffff806`00000009 : fffff806`57e18a2b 00000e1f`1f2b2be1 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x469
ffffe78c`9208b6e8 fffff806`57e18a2b : 00000e1f`1f2b2be1 00000000`00000001 00000000`00000000 0000000a`0ac3878a : 0xfffff806`00000009
ffffe78c`9208b6f0 fffff806`57e17104 : 00000000`00000000 00001f80`00000008 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x17ab
ffffe78c`9208baf0 fffff806`57ffb134 : ffffffff`00000000 ffffd201`6bfcb340 ffffab0b`91a84080 00000000`00000750 : nt!PoIdle+0x374
ffffe78c`9208bc60 00000000`00000000 : ffffe78c`9208c000 ffffe78c`92086000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME: nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1566

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 469

FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36}

Followup: MachineOwner
---------[/CODE]
Dediğinizi yaptım. Bir süre bilgisayarı sorunsuz kullandım. Az önce aldığım hatayı paylaşıyorum:
 
Diskin Health sekmesini paylaşmamıştınız, Health sekmesinin ekran alıntısını paylaşabilir misiniz?

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffc983147d3080, Virtual address for the attempted execute.
Arg2: 8a0000015f2009e3, PTE contents.
Arg3: fffffc86a2689600, (reserved)
Arg4: 0000000000000003, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5530

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 6337

Key : Analysis.Init.CPU.mSec
Value: 921

Key : Analysis.Init.Elapsed.mSec
Value: 2559

Key : Analysis.Memory.CommitPeak.Mb
Value: 72

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 022722-9390-01.dmp

BUGCHECK_CODE: fc

BUGCHECK_P1: ffffc983147d3080

BUGCHECK_P2: 8a0000015f2009e3

BUGCHECK_P3: fffffc86a2689600

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: explorer.exe

TRAP_FRAME: fffffc86a2689600 -- (.trap 0xfffffc86a2689600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000fe8 rbx=0000000000000000 rcx=00000013c2ae52a5
rdx=ffff9d80f56880f0 rsi=0000000000000000 rdi=0000000000000000
rip=ffffc983147d3080 rsp=fffffc86a2689790 rbp=fffffc86a2689990
r8=0000000000000020 r9=0000000000000001 r10=00000000000008b8
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffc983`147d3080 06 ???
Resetting default scope

STACK_TEXT:
fffffc86`a26893c8 fffff801`82c84328 : 00000000`000000fc ffffc983`147d3080 8a000001`5f2009e3 fffffc86`a2689600 : nt!KeBugCheckEx
fffffc86`a26893d0 fffff801`82c75b37 : 00000000`00000011 00000000`00000003 00000000`00000000 fffffc86`a2689520 : nt!MiCheckSystemNxFault+0x12e150
fffffc86`a2689410 fffff801`82a9f62f : fffff801`83524440 00000000`00000011 fffffc86`a2689680 00000000`00000000 : nt!MiRaisedIrqlFault+0x1427ab
fffffc86`a2689460 fffff801`82c0575e : ffffc983`1707b080 fffffc86`a2689701 00000000`00000005 fffff801`82d1a09e : nt!MmAccessFault+0x4ef
fffffc86`a2689600 ffffc983`147d3080 : ffff9d80`f5680180 00000289`c56279e0 00000289`c5607480 ffffc983`147d3080 : nt!KiPageFault+0x35e
fffffc86`a2689790 ffff9d80`f5680180 : 00000289`c56279e0 00000289`c5607480 ffffc983`147d3080 ffffc983`140be080 : 0xffffc983`147d3080
fffffc86`a2689798 00000289`c56279e0 : 00000289`c5607480 ffffc983`147d3080 ffffc983`140be080 fffffc86`a2689901 : 0xffff9d80`f5680180
fffffc86`a26897a0 00000289`c5607480 : ffffc983`147d3080 ffffc983`140be080 fffffc86`a2689901 fffffc86`a2689990 : 0x00000289`c56279e0
fffffc86`a26897a8 ffffc983`147d3080 : ffffc983`140be080 fffffc86`a2689901 fffffc86`a2689990 fffff801`82bfe5d4 : 0x00000289`c5607480
fffffc86`a26897b0 ffffc983`140be080 : fffffc86`a2689901 fffffc86`a2689990 fffff801`82bfe5d4 ffffffff`ffffffff : 0xffffc983`147d3080
fffffc86`a26897b8 fffffc86`a2689901 : fffffc86`a2689990 fffff801`82bfe5d4 ffffffff`ffffffff 00000000`00000000 : 0xffffc983`140be080
fffffc86`a26897c0 fffffc86`a2689990 : fffff801`82bfe5d4 ffffffff`ffffffff 00000000`00000000 ffff9d80`00000000 : 0xfffffc86`a2689901
fffffc86`a26897c8 fffff801`82bfe5d4 : ffffffff`ffffffff 00000000`00000000 ffff9d80`00000000 00000000`00000000 : 0xfffffc86`a2689990
fffffc86`a26897d0 fffff801`82bfdb0e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxDispatchInterrupt+0x144
fffffc86`a2689910 fffff801`82abc375 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffc86`a2689b80 : nt!KiDpcInterrupt+0x2ee
fffffc86`a2689aa0 fffff801`82e982df : 00000289`c5607480 00000289`c5607480 00000289`c5627900 00000000`00000002 : nt!KeDelayExecutionThread+0x75
fffffc86`a2689ad0 fffff801`82c08fb8 : 00000000`00000000 ffffc983`1472c080 ffffffff`fffe7960 ffffc983`00000000 : nt!NtDelayExecution+0x5f
fffffc86`a2689b00 00007fff`915ad3f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000095`ef8ff9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`915ad3f4


SYMBOL_NAME: nt!MiCheckSystemNxFault+12e150

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1566

STACK_COMMAND: .cxr; .ecxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 12e150

FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup: MachineOwner
---------[/CODE]
 

Geri
Yukarı