Ryzen 3 3100 ntkrnlmp.exe mavi ekran hatası

İşletim sistemi
Windows 10
Katılım
24 Temmuz 2021
Mesajlar
60
Daha fazla  
Cinsiyet
Erkek
RAM
Lokitech PC4-21300U-1.2V 8 GB DDR4 2666 MHz Ram
SSD veya HDD modeli
120gb SSD, 250 + 250 GB, 2 Harddisk
Ekran kartı
GTX 1050 2gb
Anakart
A320
İşlemci
Ryzen 3 3100
Merhabalar. Sistemi topladığımdan bugüne kadar mavi ekran alıyorum. Mavi ekranın altında IRQL_NOT_LESS_OR_EQUAL yazıyor. Recep Baltaş'ın minidump analiz etme videosunu gördüm, kendi minidump dosyalarımı analiz ettim. 2 tane dosyam var, ikisinde de ntkrnlmp.exe hatası çıktı. Çözümü nedir? Nasıl baş ederim bu mavi ekranlardan?

Ryzen 3 3100
8 GB RAM
GTX 1050 2 GB Ekran kartı
A320 anakart

Minidump;

 
Son düzenleyen: Moderatör:
Selamlar, öncelikle BIOS güncellemesi yapmanızı önereceğim. BIOS güncellemenizi dilerseniz F32 > F40 ve son sürüm diye ilerletebilirsiniz. Kendinize güvenmiyorsanız bu güncellemeyi bir bilgisayarcıya ya da teknik servise yaptırabilirsiniz. Yapmadan önce de anakartınızın Rev. x.x olduğunu kontrol edin. Dumplara göre anakartınız 2.0 ya da 3.0 sürüm değil ama siz tedbiri elden bırakmayın.


Ek olarak Easy Anti-Cheat'i de kaldırıp kurarsanız sevinirim.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000020000e, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807142fb560, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7374

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 14033

Key : Analysis.Init.CPU.mSec
Value: 968

Key : Analysis.Init.Elapsed.mSec
Value: 3007

Key : Analysis.Memory.CommitPeak.Mb
Value: 78

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021322-7953-01.dmp

BUGCHECK_CODE: a

BUGCHECK_P1: 20000e

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807142fb560

READ_ADDRESS: fffff80714cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000020000e

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

TRAP_FRAME: ffff900c8ca2f590 -- (.trap 0xffff900c8ca2f590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=03d06b30ffffae88 rbx=0000000000000000 rcx=0000000000200006
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807142fb560 rsp=ffff900c8ca2f720 rbp=0000000000000000
r8=ffffae87fbf6b6c8 r9=ffff900c8ca2f9a0 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!KiActivateWaiterQueueWithNoLocks+0x84:
fffff807`142fb560 4c397108 cmp qword ptr [rcx+8],r14 ds:00000000`0020000e=????????????????
Resetting default scope

STACK_TEXT:
ffff900c`8ca2f448 fffff807`14409369 : 00000000`0000000a 00000000`0020000e 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff900c`8ca2f450 fffff807`14405669 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff900c`8ca2f590 fffff807`142fb560 : ffffae88`03d06b00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff900c`8ca2f720 fffff807`142fcd59 : 00000000`00000000 ffffae88`03d08540 ffffae87`fbf6b4c0 ffffae87`fbf6b6c8 : nt!KiActivateWaiterQueueWithNoLocks+0x84
ffff900c`8ca2f750 fffff807`1420f974 : ffffae87`fbf6b4c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchQueue+0x79
ffff900c`8ca2f780 fffff807`1420f098 : ffffae88`03d08540 00000000`00000001 00000000`00000000 00000000`00000001 : nt!KeRemoveQueueEx+0x574
ffff900c`8ca2f820 fffff807`145f7e3e : 00000000`00000000 00000000`00000000 ffff1bc7`e5ac30d1 ffff900c`8ca2f480 : nt!IoRemoveIoCompletion+0x98
ffff900c`8ca2f950 fffff807`14408db8 : 00000000`0e24f5e0 00000000`00000200 00000000`00000040 00000000`00000000 : nt!NtRemoveIoCompletionEx+0xfe
ffff900c`8ca2fa90 00007ffe`c826fb64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0087e4f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c826fb64


SYMBOL_NAME: nt!KiActivateWaiterQueueWithNoLocks+84

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1526

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 84

FAILURE_BUCKET_ID: AV_nt!KiActivateWaiterQueueWithNoLocks

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {541c3e90-ca94-455b-29eb-77a09339d2a4}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000fffff834, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8046f287ebc, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5999

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 12326

Key : Analysis.Init.CPU.mSec
Value: 889

Key : Analysis.Init.Elapsed.mSec
Value: 2898

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 021522-5968-01.dmp

BUGCHECK_CODE: a

BUGCHECK_P1: fffff834

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8046f287ebc

WRITE_ADDRESS: fffff8046fcfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000fffff834

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: League of Legends.exe

TRAP_FRAME: ffffa602069e2630 -- (.trap 0xffffa602069e2630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000157ebd rbx=0000000000000000 rcx=ffffbf0f7fe5b158
rdx=fffff8046a63ceb0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046f287ebc rsp=ffffa602069e27c0 rbp=ffffbf0f834ee080
r8=000000000000000b r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiDeferredReadySingleThread+0xa7c:
fffff804`6f287ebc f04883663000 lock and qword ptr [rsi+30h],0 ds:00000000`00000030=????????????????
Resetting default scope

STACK_TEXT:
ffffa602`069e24e8 fffff804`6f409369 : 00000000`0000000a 00000000`fffff834 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffa602`069e24f0 fffff804`6f405669 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`6f51abe9 : nt!KiBugCheckDispatch+0x69
ffffa602`069e2630 fffff804`6f287ebc : fffff804`6a635180 ffffbf0f`00000000 ffffbf0f`7fe5b080 ffffa602`069e27fc : nt!KiPageFault+0x469
ffffa602`069e27c0 fffff804`6f287181 : 00000000`00000000 fffff804`6f5f5f71 ffff8480`d4e43180 00000000`00000001 : nt!KiDeferredReadySingleThread+0xa7c
ffffa602`069e29b0 fffff804`6f328070 : 00000000`00000000 00000000`00000000 ffffbf0f`8a2054e0 ffffbf0f`80fef1c0 : nt!KiExitDispatcher+0x141
ffffa602`069e2a20 fffff804`6f6d5fcb : ffffbf0f`00000000 00000000`00000000 ffffa602`069e2b80 ffffbf0f`8a2054e0 : nt!KeReleaseSemaphore+0x110
ffffa602`069e2aa0 fffff804`6f408db8 : ffffbf0f`87f77080 00000000`09aab404 00000000`00000000 00000000`00000001 : nt!NtReleaseSemaphore+0x9b
ffffa602`069e2b00 00000000`77d11cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1638f228 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77d11cfc


SYMBOL_NAME: nt!KiDeferredReadySingleThread+a7c

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1526

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: a7c

FAILURE_BUCKET_ID: AV_nt!KiDeferredReadySingleThread

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {626f59d5-90cc-ab48-85f0-60e170096c96}

Followup: MachineOwner
---------[/CODE]
 
Selamlar, öncelikle BIOS güncellemesi yapmanızı önereceğim. BIOS güncellemenizi dilerseniz F32 > F40 ve son sürüm diye ilerletebilirsiniz. Kendinize güvenmiyorsanız bu güncellemeyi bir bilgisayarcıya ya da teknik servise yaptırabilirsiniz. Yapmadan önce de anakartınızın rev. X. X olduğunu kontrol edin. Dumplara göre anakartınız 2.0 ya da 3.0 sürüm değil ama siz tedbiri elden bırakmayın.


Ek olarak Easy Anti-Cheat'i de kaldırıp kurarsanız sevinirim.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000020000e, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807142fb560, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7374.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 14033.

Key : Analysis.Init.CPU.mSec
Value: 968.

Key : Analysis.Init.Elapsed.mSec
Value: 3007.

Key : Analysis.Memory.CommitPeak.Mb
Value: 78.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 021322-7953-01.dmp

BUGCHECK_CODE: a

BUGCHECK_P1: 20000e.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807142fb560.

READ_ADDRESS: fffff80714cfb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
000000000020000e.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

TRAP_FRAME: ffff900c8ca2f590 -- (.trap 0xffff900c8ca2f590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=03d06b30ffffae88 rbx=0000000000000000 rcx=0000000000200006
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807142fb560 rsp=ffff900c8ca2f720 rbp=0000000000000000
r8=ffffae87fbf6b6c8 r9=ffff900c8ca2f9a0 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy.
nt!KiActivateWaiterQueueWithNoLocks+0x84:
fffff807`142fb560 4c397108 cmp qword ptr [rcx+8],r14 ds:00000000`0020000e=????????????????
Resetting default scope.

STACK_TEXT:
ffff900c`8ca2f448 fffff807`14409369 : 00000000`0000000a 00000000`0020000e 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff900c`8ca2f450 fffff807`14405669 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff900c`8ca2f590 fffff807`142fb560 : ffffae88`03d06b00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff900c`8ca2f720 fffff807`142fcd59 : 00000000`00000000 ffffae88`03d08540 ffffae87`fbf6b4c0 ffffae87`fbf6b6c8 : nt!KiActivateWaiterQueueWithNoLocks+0x84
ffff900c`8ca2f750 fffff807`1420f974 : ffffae87`fbf6b4c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchQueue+0x79
ffff900c`8ca2f780 fffff807`1420f098 : ffffae88`03d08540 00000000`00000001 00000000`00000000 00000000`00000001 : nt!KeRemoveQueueEx+0x574
ffff900c`8ca2f820 fffff807`145f7e3e : 00000000`00000000 00000000`00000000 ffff1bc7`e5ac30d1 ffff900c`8ca2f480 : nt!IoRemoveIoCompletion+0x98
ffff900c`8ca2f950 fffff807`14408db8 : 00000000`0e24f5e0 00000000`00000200 00000000`00000040 00000000`00000000 : nt!NtRemoveIoCompletionEx+0xfe
ffff900c`8ca2fa90 00007ffe`c826fb64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0087e4f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c826fb64

SYMBOL_NAME: nt!KiActivateWaiterQueueWithNoLocks+84

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1526

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 84.

FAILURE_BUCKET_ID: AV_nt!KiActivateWaiterQueueWithNoLocks

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {541c3e90-ca94-455b-29eb-77a09339d2a4}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000fffff834, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8046f287ebc, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5999.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 12326.

Key : Analysis.Init.CPU.mSec
Value: 889.

Key : Analysis.Init.Elapsed.mSec
Value: 2898.

Key : Analysis.Memory.CommitPeak.Mb
Value: 74.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 021522-5968-01.dmp

BUGCHECK_CODE: a

BUGCHECK_P1: fffff834.

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8046f287ebc.

WRITE_ADDRESS: fffff8046fcfb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
00000000fffff834.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: League of Legends.exe

TRAP_FRAME: ffffa602069e2630 -- (.trap 0xffffa602069e2630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000157ebd rbx=0000000000000000 rcx=ffffbf0f7fe5b158
rdx=fffff8046a63ceb0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046f287ebc rsp=ffffa602069e27c0 rbp=ffffbf0f834ee080
r8=000000000000000b r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KiDeferredReadySingleThread+0xa7c:
fffff804`6f287ebc f04883663000 lock and qword ptr [rsi+30h],0 ds:00000000`00000030=????????????????
Resetting default scope.

STACK_TEXT:
ffffa602`069e24e8 fffff804`6f409369 : 00000000`0000000a 00000000`fffff834 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffa602`069e24f0 fffff804`6f405669 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`6f51abe9 : nt!KiBugCheckDispatch+0x69
ffffa602`069e2630 fffff804`6f287ebc : fffff804`6a635180 ffffbf0f`00000000 ffffbf0f`7fe5b080 ffffa602`069e27fc : nt!KiPageFault+0x469
ffffa602`069e27c0 fffff804`6f287181 : 00000000`00000000 fffff804`6f5f5f71 ffff8480`d4e43180 00000000`00000001 : nt!KiDeferredReadySingleThread+0xa7c
ffffa602`069e29b0 fffff804`6f328070 : 00000000`00000000 00000000`00000000 ffffbf0f`8a2054e0 ffffbf0f`80fef1c0 : nt!KiExitDispatcher+0x141
ffffa602`069e2a20 fffff804`6f6d5fcb : ffffbf0f`00000000 00000000`00000000 ffffa602`069e2b80 ffffbf0f`8a2054e0 : nt!KeReleaseSemaphore+0x110
ffffa602`069e2aa0 fffff804`6f408db8 : ffffbf0f`87f77080 00000000`09aab404 00000000`00000000 00000000`00000001 : nt!NtReleaseSemaphore+0x9b
ffffa602`069e2b00 00000000`77d11cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1638f228 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77d11cfc.

SYMBOL_NAME: nt!KiDeferredReadySingleThread+a7c

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1526

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: a7c.

FAILURE_BUCKET_ID: AV_nt!KiDeferredReadySingleThread

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {626f59d5-90cc-ab48-85f0-60e170096c96}

Followup: MachineOwner.
---------[/CODE]

Merhabalar, anakartım rev. 3.0, anakart kutusunda öyle yazıyor. BIOS'u güncelledim, dediğiniz gibi Easy Anti-Cheat'i de kaldırdım. Kendisi Dead by Daylight'ın programı. Bir süre böyle takılayım umarım almam aynı hatayı.
 
Son düzenleyen: Moderatör:

Yeni konular

Geri
Yukarı