Sadece video izlerken mavi ekran hatası

sameddagli

Femtopat
Katılım
20 Ekim 2020
Mesajlar
6
Daha fazla  
Cinsiyet
Erkek
Bilgisayarımı yeni topladım ve video izlerken mavi ekran hatası alıyorum ve her seferinde de farklı hatalar.

Yaptığım işlemler: DDU ile ekran kartı driverını sildim ve güncelledim, BIOS'u güncelledim, Memtest86 ile RAM'leri kontrol ettim herhangi bir sorun bulamadı.


Sistem özellikleri: Zotac GTX 1660, ASUS Prime B450M-K, Ryzen5 3500X ve 2x8 3000MHz RAM.
Minidump raporları: minidumpp - Google Drive
 
Son düzenleyen: Moderatör:
HDD Sentinel ile diskinizin sağlık durumunu paylaşınız. Soruna RAM ve ekran kartı sebep olmuş Memtest hata bulamadı diye sorunlu olmadıkları anlamına gelmiyor. Bir tanesini çıkarıp sistemi test ediniz.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8062d2f01d0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8375

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 42447

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8062d2f01d0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

READ_ADDRESS: fffff8062d8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8062d80f340: Unable to get Flags value from nt!KdVersionBlock
fffff8062d80f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
ffff808c`1369f4e8 fffff806`2d030105     : 00000000`0000001e ffffffff`c0000005 fffff806`2d2f01d0 00000000`00000000 : nt!KeBugCheckEx
ffff808c`1369f4f0 fffff806`2d0066ac     : 00000000`00001000 ffff808c`1369fd90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
ffff808c`1369fbb0 fffff806`2d002843     : ffff808c`1369fe81 fffff806`2cecaa71 ffff980f`3e010340 ffff980f`3e012e80 : nt!KiExceptionDispatch+0x12c
ffff808c`1369fd90 fffff806`2d2f01d0     : fffff806`2d2bc582 00000000`000000c0 ffff808c`1369ff70 00000000`00000000 : nt!KiPageFault+0x443
ffff808c`1369ff28 fffff806`2d2bc582     : 00000000`000000c0 ffff808c`1369ff70 00000000`00000000 fffff806`00000000 : nt!ExpLookupHandleTableEntry
ffff808c`1369ff30 fffff806`2d2bc429     : 00000000`00000000 ffff980f`459d9080 00000000`00000000 ffff808c`136a0601 : nt!ObWaitForMultipleObjects+0x122
ffff808c`136a0430 fffff806`2d005fb8     : fffff806`2cff0690 fffff806`2ce7460a ffff980f`459d9080 00000000`00000000 : nt!NtWaitForMultipleObjects+0x119
ffff808c`136a06c0 fffff806`2cff8400     : fffff806`3629e08d ffff8783`05c84990 ffff8783`00000000 ffff8783`05c84990 : nt!KiSystemServiceCopyEnd+0x28
ffff808c`136a08c8 fffff806`3629e08d     : ffff8783`05c84990 ffff8783`00000000 ffff8783`05c84990 00000000`00000000 : nt!KiServiceLinkage
ffff808c`136a08d0 fffff806`3629d719     : 00000000`00000000 ffff980f`47543ee0 ffff8783`0e60a360 fffff806`362a2c53 : dxgkrnl!CTokenManager::ProcessTokens+0x1bd
ffff808c`136a0990 fffff806`362a2b8d     : 00000000`00000000 ffff808c`136a0b80 ffff8783`0e60a360 fffff806`2d2e23f6 : dxgkrnl!CTokenManager::TokenThread+0x79
ffff808c`136a09e0 fffff806`2d005fb8     : ffff980f`459d9080 000001fa`95189ee8 00000000`00000020 ffff808c`136a0b80 : dxgkrnl!NtTokenManagerThread+0x1bd
ffff808c`136a0b00 00007ff8`44298304     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`7eeffb68 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`44298304


SYMBOL_NAME:  dxgkrnl!CTokenManager::ProcessTokens+1bd

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1bd

FAILURE_BUCKET_ID:  0x1E_c0000005_R_dxgkrnl!CTokenManager::ProcessTokens

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {58736931-a2cb-f30c-610a-4966ec3d47f8}

Followup:     MachineOwner
---------*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbe06ee010340, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffbe06ee010340, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8937

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 31353

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffbe06ee010340

BUGCHECK_P2: 11

BUGCHECK_P3: ffffbe06ee010340

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff8002d0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8002d00f340: Unable to get Flags value from nt!KdVersionBlock
fffff8002d00f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffbe06ee010340

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  ffff8f09174d7bf0 -- (.trap 0xffff8f09174d7bf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffff8f09174d7ec0
rdx=000000000000003b rsi=0000000000000000 rdi=0000000000000000
rip=ffffbe06ee010340 rsp=ffff8f09174d7d80 rbp=ffffcf00a9ccf180
r8=00000001000001bb  r9=ffffcf00a9ccf180 r10=ffffbe06f6b8f340
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffffbe06`ee010340 0001            add     byte ptr [rcx],al ds:ffff8f09`174d7ec0=00
Resetting default scope

STACK_TEXT:
ffff8f09`174d7948 fffff800`2c879b57     : 00000000`00000050 ffffbe06`ee010340 00000000`00000011 ffff8f09`174d7bf0 : nt!KeBugCheckEx
ffff8f09`174d7950 fffff800`2c6ea5e0     : ff1fe313`00000011 00000000`00000011 ffff8f09`174d7c70 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffff8f09`174d7a50 fffff800`2c80275e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff8f09`174d7bf0 ffffbe06`ee010340     : 00000000`00000004 00000000`00000001 ffff8f09`174d7ec0 fffff800`00000000 : nt!KiPageFault+0x35e
ffff8f09`174d7d80 00000000`00000004     : 00000000`00000001 ffff8f09`174d7ec0 fffff800`00000000 ffffbe06`ee010340 : 0xffffbe06`ee010340
ffff8f09`174d7d88 00000000`00000001     : ffff8f09`174d7ec0 fffff800`00000000 ffffbe06`ee010340 ffffbe06`ee012bc0 : 0x4
ffff8f09`174d7d90 ffff8f09`174d7ec0     : fffff800`00000000 ffffbe06`ee010340 ffffbe06`ee012bc0 ffffbe06`ee012e00 : 0x1
ffff8f09`174d7d98 fffff800`00000000     : ffffbe06`ee010340 ffffbe06`ee012bc0 ffffbe06`ee012e00 00000000`00000000 : 0xffff8f09`174d7ec0
ffff8f09`174d7da0 ffffbe06`ee010340     : ffffbe06`ee012bc0 ffffbe06`ee012e00 00000000`00000000 00000000`00000000 : 0xfffff800`00000000
ffff8f09`174d7da8 ffffbe06`ee012bc0     : ffffbe06`ee012e00 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffbe06`ee010340
ffff8f09`174d7db0 ffffbe06`ee012e00     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffbe06`ee012bc0
ffff8f09`174d7db8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffbe06`ee012e00


SYMBOL_NAME:  nt!MiSystemFault+1716c7

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1716c7

FAILURE_BUCKET_ID:  AV_INVALID_nt!MiSystemFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}

Followup:     MachineOwner
---------*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803738f01d0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7249

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 26693

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff803738f01d0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

READ_ADDRESS: fffff80373efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80373e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80373e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
ffffc38f`1ce524e8 fffff803`73630105     : 00000000`0000001e ffffffff`c0000005 fffff803`738f01d0 00000000`00000000 : nt!KeBugCheckEx
ffffc38f`1ce524f0 fffff803`736066ac     : 00000000`00001000 ffffc38f`1ce52d90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
ffffc38f`1ce52bb0 fffff803`73602843     : ffffc38f`1ce52e81 fffff803`734caa71 ffffdb0c`32010340 ffffdb0c`32014480 : nt!KiExceptionDispatch+0x12c
ffffc38f`1ce52d90 fffff803`738f01d0     : fffff803`738bc582 00000000`000000c0 ffffc38f`1ce52f70 00000000`00000000 : nt!KiPageFault+0x443
ffffc38f`1ce52f28 fffff803`738bc582     : 00000000`000000c0 ffffc38f`1ce52f70 00000000`00000000 fffff803`00000000 : nt!ExpLookupHandleTableEntry
ffffc38f`1ce52f30 fffff803`738bc429     : 00000000`00000006 00000000`00000001 00000000`00000000 00000000`00000005 : nt!ObWaitForMultipleObjects+0x122
ffffc38f`1ce53430 fffff803`73605fb8     : 00000000`00000000 00001f80`00000000 ffffdb0c`3b22c5c0 00000000`00000000 : nt!NtWaitForMultipleObjects+0x119
ffffc38f`1ce536c0 fffff803`735f8400     : fffff803`8141e08d ffffc883`df278b90 ffffc883`00000000 ffffc883`df278b90 : nt!KiSystemServiceCopyEnd+0x28
ffffc38f`1ce538c8 fffff803`8141e08d     : ffffc883`df278b90 ffffc883`00000000 ffffc883`df278b90 00000000`00000000 : nt!KiServiceLinkage
ffffc38f`1ce538d0 fffff803`8141d719     : 00000000`00000000 ffffdb0c`3cd2f3e0 ffffc883`e64c4920 fffff803`81422c53 : dxgkrnl!CTokenManager::ProcessTokens+0x1bd
ffffc38f`1ce53990 fffff803`81422b8d     : 00000000`00000000 ffffc38f`1ce53b80 ffffc883`e64c4920 fffff803`00000002 : dxgkrnl!CTokenManager::TokenThread+0x79
ffffc38f`1ce539e0 fffff803`73605fb8     : ffffdb0c`3b22c5c0 00000255`b3802298 00000000`00000020 00000000`00000000 : dxgkrnl!NtTokenManagerThread+0x1bd
ffffc38f`1ce53b00 00007fff`dd2f8304     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000072`f2f7fd98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`dd2f8304


SYMBOL_NAME:  dxgkrnl!CTokenManager::ProcessTokens+1bd

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1bd

FAILURE_BUCKET_ID:  0x1E_c0000005_R_dxgkrnl!CTokenManager::ProcessTokens

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {58736931-a2cb-f30c-610a-4966ec3d47f8}

Followup:     MachineOwner
---------*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd78ad1eed7d0, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffd78ad1eed7d0, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8249

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 28328

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffd78ad1eed7d0

BUGCHECK_P2: 11

BUGCHECK_P3: ffffd78ad1eed7d0

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff807082fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8070820f340: Unable to get Flags value from nt!KdVersionBlock
fffff8070820f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffd78ad1eed7d0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

TRAP_FRAME:  ffffd78ad2139d80 -- (.trap 0xffffd78ad2139d80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd78ad1eed7d0 rbx=0000000000000000 rcx=ffff8a03ee05d240
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd78ad1eed7d0 rsp=ffffd78ad2139f18 rbp=ffffd78ad213a009
r8=0000000100000045  r9=ffffda01794cf180 r10=0000ffffd78ad1ee
r11=ffffc9fd34600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ffffd78a`d1eed7d0 40fd            std
Resetting default scope

STACK_TEXT:
ffffd78a`d2139ad8 fffff807`07a79b57     : 00000000`00000050 ffffd78a`d1eed7d0 00000000`00000011 ffffd78a`d2139d80 : nt!KeBugCheckEx
ffffd78a`d2139ae0 fffff807`078ea5e0     : 00000000`001f0003 00000000`00000011 ffffd78a`d2139e00 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffd78a`d2139be0 fffff807`07a0275e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffd78a`d2139d80 ffffd78a`d1eed7d0     : fffff807`0792fa82 00000000`00000000 00000000`00000000 ffff8a03`d6ee16c0 : nt!KiPageFault+0x35e
ffffd78a`d2139f18 fffff807`0792fa82     : 00000000`00000000 00000000`00000000 ffff8a03`d6ee16c0 fffff807`07600000 : 0xffffd78a`d1eed7d0
ffffd78a`d2139f20 ffffab89`ee44ee85     : 00000000`00000000 00000000`00000000 00000000`00000001 ffff8a03`d6ee16c0 : nt!KeQueryPerformanceCounter+0x112
ffffd78a`d2139f50 ffffab89`ef645037     : 00000000`000186a0 00000000`00000102 ffffd78a`d213a0c0 00000000`00000000 : win32kbase!EnterCrit+0x55
ffffd78a`d213a070 ffffab89`ef547a5e     : 00000000`00000000 ffffabb9`85f47350 00000000`00000004 00000000`00001cff : win32kfull!xxxMsgWaitForMultipleObjectsEx+0x103
ffffd78a`d213a120 ffffab89`ee736fcf     : ffffd78a`d213aaa8 00000000`00000000 00000065`00000004 ffffd78a`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x3fe
ffffd78a`d213aa50 fffff807`07a05fb8     : 00000065`69f9fb00 00000000`00000108 00000000`00000040 00000065`69f9f300 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
ffffd78a`d213aa90 00007ff8`9f46a104     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000065`69f9f988 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`9f46a104


SYMBOL_NAME:  win32kbase!EnterCrit+55

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  55

FAILURE_BUCKET_ID:  AV_INVALID_win32kbase!EnterCrit

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2dee8c85-5155-4e28-b094-d21d7943ce11}

Followup:     MachineOwner
---------*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff928a49010340, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffff928a49010340, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7593

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 51433

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff928a49010340

BUGCHECK_P2: 11

BUGCHECK_P3: ffff928a49010340

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff80418efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80418e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80418e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff928a49010340

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  ffffdd8e57eb4bf0 -- (.trap 0xffffdd8e57eb4bf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffffdd8e57eb4ec0
rdx=00000000000000e8 rsi=0000000000000000 rdi=0000000000000000
rip=ffff928a49010340 rsp=ffffdd8e57eb4d80 rbp=ffffa6802b0cf180
r8=000000010000000e  r9=ffffa6802b0cf180 r10=ffff928a4fbdc0c0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffff928a`49010340 0001            add     byte ptr [rcx],al ds:ffffdd8e`57eb4ec0=00
Resetting default scope

STACK_TEXT:
ffffdd8e`57eb4948 fffff804`18679b57     : 00000000`00000050 ffff928a`49010340 00000000`00000011 ffffdd8e`57eb4bf0 : nt!KeBugCheckEx
ffffdd8e`57eb4950 fffff804`184ea5e0     : 00000158`cc209e20 00000000`00000011 ffffdd8e`57eb4c70 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffdd8e`57eb4a50 fffff804`1860275e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffdd8e`57eb4bf0 ffff928a`49010340     : 00000000`00000004 00000000`00000000 ffffdd8e`57eb4ec0 fffff804`00000000 : nt!KiPageFault+0x35e
ffffdd8e`57eb4d80 00000000`00000004     : 00000000`00000000 ffffdd8e`57eb4ec0 fffff804`00000000 ffff928a`49010340 : 0xffff928a`49010340
ffffdd8e`57eb4d88 00000000`00000000     : ffffdd8e`57eb4ec0 fffff804`00000000 ffff928a`49010340 ffff928a`49014480 : 0x4


SYMBOL_NAME:  nt!MiSystemFault+1716c7

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1716c7

FAILURE_BUCKET_ID:  AV_INVALID_nt!MiSystemFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}

Followup:     MachineOwner
---------
 
HDD sentinel ile diskinizin sağlık durumunu paylaşınız. Soruna RAM ve ekran kartı sebep olmuş Memtest hata bulamadı diye sorunlu olmadıkları anlamına gelmiyor. Bir tanesini çıkarıp sistemi test ediniz.
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff8062d2f01d0, The address that the exception occurred at.
Arg3: 0000000000000000, Parameter 0 of the exception.
Arg4: 0000000000000000, Parameter 1 of the exception.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 8375.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-J7A11VA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 42447.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 90.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff8062d2f01d0.

BUGCHECK_P3: 0.

BUGCHECK_P4: 0.

READ_ADDRESS: fffff8062d8fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8062d80f340: Unable to get Flags value from nt!KdVersionBlock.
fffff8062d80f340: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000000.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: dwm.exe.

TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000.

STACK_TEXT:
ffff808c`1369f4e8 fffff806`2d030105 : 00000000`0000001e ffffffff`c0000005 fffff806`2d2f01d0 00000000`00000000 : nt!KeBugCheckEx.
ffff808c`1369f4f0 fffff806`2d0066ac : 00000000`00001000 ffff808c`1369fd90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5.
ffff808c`1369fbb0 fffff806`2d002843 : ffff808c`1369fe81 fffff806`2cecaa71 ffff980f`3e010340 ffff980f`3e012e80 : nt!KiExceptionDispatch+0x12c.
ffff808c`1369fd90 fffff806`2d2f01d0 : fffff806`2d2bc582 00000000`000000c0 ffff808c`1369ff70 00000000`00000000 : nt!KiPageFault+0x443.
ffff808c`1369ff28 fffff806`2d2bc582 : 00000000`000000c0 ffff808c`1369ff70 00000000`00000000 fffff806`00000000 : nt!ExpLookupHandleTableEntry.
ffff808c`1369ff30 fffff806`2d2bc429 : 00000000`00000000 ffff980f`459d9080 00000000`00000000 ffff808c`136a0601 : nt!ObWaitForMultipleObjects+0x122.
ffff808c`136a0430 fffff806`2d005fb8 : fffff806`2cff0690 fffff806`2ce7460a ffff980f`459d9080 00000000`00000000 : nt!NtWaitForMultipleObjects+0x119.
ffff808c`136a06c0 fffff806`2cff8400 : fffff806`3629e08d ffff8783`05c84990 ffff8783`00000000 ffff8783`05c84990 : nt!KiSystemServiceCopyEnd+0x28.
ffff808c`136a08c8 fffff806`3629e08d : ffff8783`05c84990 ffff8783`00000000 ffff8783`05c84990 00000000`00000000 : nt!KiServiceLinkage.
ffff808c`136a08d0 fffff806`3629d719 : 00000000`00000000 ffff980f`47543ee0 ffff8783`0e60a360 fffff806`362a2c53 : dxgkrnl!CTokenManager::processTokens+0x1bd.
ffff808c`136a0990 fffff806`362a2b8d : 00000000`00000000 ffff808c`136a0b80 ffff8783`0e60a360 fffff806`2d2e23f6 : dxgkrnl!CTokenManager::TokenThread+0x79.
ffff808c`136a09e0 fffff806`2d005fb8 : ffff980f`459d9080 000001fa`95189ee8 00000000`00000020 ffff808c`136a0b80 : dxgkrnl!NtTokenManagerThread+0x1bd.
ffff808c`136a0b00 00007ff8`44298304 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000096`7eeffb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`44298304.

SYMBOL_NAME: dxgkrnl!CTokenManager::processTokens+1bd.

MODULE_NAME: dxgkrnl.

IMAGE_NAME: dxgkrnl.sys.

IMAGE_VERSION: 10.0.19041.546.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1bd.

FAILURE_BUCKET_ID: 0x1E_c0000005_R_dxgkrnl!CTokenManager::processTokens.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {58736931-a2cb-f30c-610a-4966ec3d47f8}

Followup: MachineOwner.
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbe06ee010340, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffbe06ee010340, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name.
*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 8937.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-J7A11VA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 31353.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 50.

BUGCHECK_P1: ffffbe06ee010340.

BUGCHECK_P2: 11.

BUGCHECK_P3: ffffbe06ee010340.

BUGCHECK_P4: 2.

WRITE_ADDRESS: fffff8002d0fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8002d00f340: Unable to get Flags value from nt!KdVersionBlock.
fffff8002d00f340: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffffbe06ee010340.

MM_INTERNAL_CODE: 2.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: dwm.exe.

TRAP_FRAME: ffff8f09174d7bf0 -- (.trap 0xffff8f09174d7bf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffff8f09174d7ec0.
rdx=000000000000003b rsi=0000000000000000 rdi=0000000000000000.
rip=ffffbe06ee010340 rsp=ffff8f09174d7d80 rbp=ffffcf00a9ccf180.
r8=00000001000001bb r9=ffffcf00a9ccf180 r10=ffffbe06f6b8f340.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na pe nc.
ffffbe06`ee010340 0001 add byte ptr [rcx],al ds:ffff8f09`174d7ec0=00.
Resetting default scope.

STACK_TEXT:
ffff8f09`174d7948 fffff800`2c879b57 : 00000000`00000050 ffffbe06`ee010340 00000000`00000011 ffff8f09`174d7bf0 : nt!KeBugCheckEx.
ffff8f09`174d7950 fffff800`2c6ea5e0 : ff1fe313`00000011 00000000`00000011 ffff8f09`174d7c70 00000000`00000000 : nt!MiSystemFault+0x1716c7.
ffff8f09`174d7a50 fffff800`2c80275e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400.
ffff8f09`174d7bf0 ffffbe06`ee010340 : 00000000`00000004 00000000`00000001 ffff8f09`174d7ec0 fffff800`00000000 : nt!KiPageFault+0x35e.
ffff8f09`174d7d80 00000000`00000004 : 00000000`00000001 ffff8f09`174d7ec0 fffff800`00000000 ffffbe06`ee010340 : 0xffffbe06`ee010340.
ffff8f09`174d7d88 00000000`00000001 : ffff8f09`174d7ec0 fffff800`00000000 ffffbe06`ee010340 ffffbe06`ee012bc0 : 0x4.
ffff8f09`174d7d90 ffff8f09`174d7ec0 : fffff800`00000000 ffffbe06`ee010340 ffffbe06`ee012bc0 ffffbe06`ee012e00 : 0x1.
ffff8f09`174d7d98 fffff800`00000000 : ffffbe06`ee010340 ffffbe06`ee012bc0 ffffbe06`ee012e00 00000000`00000000 : 0xffff8f09`174d7ec0.
ffff8f09`174d7da0 ffffbe06`ee010340 : ffffbe06`ee012bc0 ffffbe06`ee012e00 00000000`00000000 00000000`00000000 : 0xfffff800`00000000.
ffff8f09`174d7da8 ffffbe06`ee012bc0 : ffffbe06`ee012e00 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffbe06`ee010340.
ffff8f09`174d7db0 ffffbe06`ee012e00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffbe06`ee012bc0.
ffff8f09`174d7db8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffbe06`ee012e00.

SYMBOL_NAME: nt!MiSystemFault+1716c7.

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.19041.572.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrnlmp.exe.

BUCKET_ID_FUNC_OFFSET: 1716c7.

FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}

Followup: MachineOwner.
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff803738f01d0, The address that the exception occurred at.
Arg3: 0000000000000000, Parameter 0 of the exception.
Arg4: 0000000000000000, Parameter 1 of the exception.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 7249.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-J7A11VA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 26693.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 82.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff803738f01d0.

BUGCHECK_P3: 0.

BUGCHECK_P4: 0.

READ_ADDRESS: fffff80373efb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80373e0f340: Unable to get Flags value from nt!KdVersionBlock.
fffff80373e0f340: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000000.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: dwm.exe.

TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000.

STACK_TEXT:
ffffc38f`1ce524e8 fffff803`73630105 : 00000000`0000001e ffffffff`c0000005 fffff803`738f01d0 00000000`00000000 : nt!KeBugCheckEx.
ffffc38f`1ce524f0 fffff803`736066ac : 00000000`00001000 ffffc38f`1ce52d90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5.
ffffc38f`1ce52bb0 fffff803`73602843 : ffffc38f`1ce52e81 fffff803`734caa71 ffffdb0c`32010340 ffffdb0c`32014480 : nt!KiExceptionDispatch+0x12c.
ffffc38f`1ce52d90 fffff803`738f01d0 : fffff803`738bc582 00000000`000000c0 ffffc38f`1ce52f70 00000000`00000000 : nt!KiPageFault+0x443.
ffffc38f`1ce52f28 fffff803`738bc582 : 00000000`000000c0 ffffc38f`1ce52f70 00000000`00000000 fffff803`00000000 : nt!ExpLookupHandleTableEntry.
ffffc38f`1ce52f30 fffff803`738bc429 : 00000000`00000006 00000000`00000001 00000000`00000000 00000000`00000005 : nt!ObWaitForMultipleObjects+0x122.
ffffc38f`1ce53430 fffff803`73605fb8 : 00000000`00000000 00001f80`00000000 ffffdb0c`3b22c5c0 00000000`00000000 : nt!NtWaitForMultipleObjects+0x119.
ffffc38f`1ce536c0 fffff803`735f8400 : fffff803`8141e08d ffffc883`df278b90 ffffc883`00000000 ffffc883`df278b90 : nt!KiSystemServiceCopyEnd+0x28.
ffffc38f`1ce538c8 fffff803`8141e08d : ffffc883`df278b90 ffffc883`00000000 ffffc883`df278b90 00000000`00000000 : nt!KiServiceLinkage.
ffffc38f`1ce538d0 fffff803`8141d719 : 00000000`00000000 ffffdb0c`3cd2f3e0 ffffc883`e64c4920 fffff803`81422c53 : dxgkrnl!CTokenManager::processTokens+0x1bd.
ffffc38f`1ce53990 fffff803`81422b8d : 00000000`00000000 ffffc38f`1ce53b80 ffffc883`e64c4920 fffff803`00000002 : dxgkrnl!CTokenManager::TokenThread+0x79.
ffffc38f`1ce539e0 fffff803`73605fb8 : ffffdb0c`3b22c5c0 00000255`b3802298 00000000`00000020 00000000`00000000 : dxgkrnl!NtTokenManagerThread+0x1bd.
ffffc38f`1ce53b00 00007fff`dd2f8304 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000072`f2f7fd98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`dd2f8304.

SYMBOL_NAME: dxgkrnl!CTokenManager::processTokens+1bd.

MODULE_NAME: dxgkrnl.

IMAGE_NAME: dxgkrnl.sys.

IMAGE_VERSION: 10.0.19041.546.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1bd.

FAILURE_BUCKET_ID: 0x1E_c0000005_R_dxgkrnl!CTokenManager::processTokens.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {58736931-a2cb-f30c-610a-4966ec3d47f8}

Followup: MachineOwner.
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd78ad1eed7d0, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffd78ad1eed7d0, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 8249.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-J7A11VA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 28328.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 90.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 50.

BUGCHECK_P1: ffffd78ad1eed7d0.

BUGCHECK_P2: 11.

BUGCHECK_P3: ffffd78ad1eed7d0.

BUGCHECK_P4: 2.

WRITE_ADDRESS: fffff807082fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8070820f340: Unable to get Flags value from nt!KdVersionBlock.
fffff8070820f340: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffffd78ad1eed7d0.

MM_INTERNAL_CODE: 2.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: NVIDIA Share.exe.

TRAP_FRAME: ffffd78ad2139d80 -- (.trap 0xffffd78ad2139d80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd78ad1eed7d0 rbx=0000000000000000 rcx=ffff8a03ee05d240.
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000.
rip=ffffd78ad1eed7d0 rsp=ffffd78ad2139f18 rbp=ffffd78ad213a009.
r8=0000000100000045 r9=ffffda01794cf180 r10=0000ffffd78ad1ee.
r11=ffffc9fd34600000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na pe nc.
ffffd78a`d1eed7d0 40fd std.
Resetting default scope.

STACK_TEXT:
ffffd78a`d2139ad8 fffff807`07a79b57 : 00000000`00000050 ffffd78a`d1eed7d0 00000000`00000011 ffffd78a`d2139d80 : nt!KeBugCheckEx.
ffffd78a`d2139ae0 fffff807`078ea5e0 : 00000000`001f0003 00000000`00000011 ffffd78a`d2139e00 00000000`00000000 : nt!MiSystemFault+0x1716c7.
ffffd78a`d2139be0 fffff807`07a0275e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400.
ffffd78a`d2139d80 ffffd78a`d1eed7d0 : fffff807`0792fa82 00000000`00000000 00000000`00000000 ffff8a03`d6ee16c0 : nt!KiPageFault+0x35e.
ffffd78a`d2139f18 fffff807`0792fa82 : 00000000`00000000 00000000`00000000 ffff8a03`d6ee16c0 fffff807`07600000 : 0xffffd78a`d1eed7d0.
ffffd78a`d2139f20 ffffab89`ee44ee85 : 00000000`00000000 00000000`00000000 00000000`00000001 ffff8a03`d6ee16c0 : nt!KeQueryPerformanceCounter+0x112.
ffffd78a`d2139f50 ffffab89`ef645037 : 00000000`000186a0 00000000`00000102 ffffd78a`d213a0c0 00000000`00000000 : win32kbase!EnterCrit+0x55.
ffffd78a`d213a070 ffffab89`ef547a5e : 00000000`00000000 ffffabb9`85f47350 00000000`00000004 00000000`00001cff : win32kfull!xxxMsgWaitForMultipleObjectsEx+0x103.
ffffd78a`d213a120 ffffab89`ee736fcf : ffffd78a`d213aaa8 00000000`00000000 00000065`00000004 ffffd78a`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x3fe.
ffffd78a`d213aa50 fffff807`07a05fb8 : 00000065`69f9fb00 00000000`00000108 00000000`00000040 00000065`69f9f300 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f.
ffffd78a`d213aa90 00007ff8`9f46a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000065`69f9f988 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`9f46a104.

SYMBOL_NAME: win32kbase!EnterCrit+55.

MODULE_NAME: win32kbase.

IMAGE_NAME: win32kbase.sys.

IMAGE_VERSION: 10.0.19041.572.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 55.

FAILURE_BUCKET_ID: AV_INVALID_win32kbase!EnterCrit.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {2dee8c85-5155-4e28-b094-d21d7943ce11}

Followup: MachineOwner.
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff928a49010340, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffff928a49010340, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 7593.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-J7A11VA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 51433.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 50.

BUGCHECK_P1: ffff928a49010340.

BUGCHECK_P2: 11.

BUGCHECK_P3: ffff928a49010340.

BUGCHECK_P4: 2.

WRITE_ADDRESS: fffff80418efb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80418e0f340: Unable to get Flags value from nt!KdVersionBlock.
fffff80418e0f340: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffff928a49010340.

MM_INTERNAL_CODE: 2.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: dwm.exe.

TRAP_FRAME: ffffdd8e57eb4bf0 -- (.trap 0xffffdd8e57eb4bf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffffdd8e57eb4ec0.
rdx=00000000000000e8 rsi=0000000000000000 rdi=0000000000000000.
rip=ffff928a49010340 rsp=ffffdd8e57eb4d80 rbp=ffffa6802b0cf180.
r8=000000010000000e r9=ffffa6802b0cf180 r10=ffff928a4fbdc0c0.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na pe nc.
ffff928a`49010340 0001 add byte ptr [rcx],al ds:ffffdd8e`57eb4ec0=00.
Resetting default scope.

STACK_TEXT:
ffffdd8e`57eb4948 fffff804`18679b57 : 00000000`00000050 ffff928a`49010340 00000000`00000011 ffffdd8e`57eb4bf0 : nt!KeBugCheckEx.
ffffdd8e`57eb4950 fffff804`184ea5e0 : 00000158`cc209e20 00000000`00000011 ffffdd8e`57eb4c70 00000000`00000000 : nt!MiSystemFault+0x1716c7.
ffffdd8e`57eb4a50 fffff804`1860275e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400.
ffffdd8e`57eb4bf0 ffff928a`49010340 : 00000000`00000004 00000000`00000000 ffffdd8e`57eb4ec0 fffff804`00000000 : nt!KiPageFault+0x35e.
ffffdd8e`57eb4d80 00000000`00000004 : 00000000`00000000 ffffdd8e`57eb4ec0 fffff804`00000000 ffff928a`49010340 : 0xffff928a`49010340.
ffffdd8e`57eb4d88 00000000`00000000 : ffffdd8e`57eb4ec0 fffff804`00000000 ffff928a`49010340 ffff928a`49014480 : 0x4.

SYMBOL_NAME: nt!MiSystemFault+1716c7.

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.19041.572.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrnlmp.exe.

BUCKET_ID_FUNC_OFFSET: 1716c7.

FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}

Followup: MachineOwner.
---------

Disk sağlığım böyle sanırım diskte bir sorun yok, RAM'lerin de dediğiniz gibi birini çıkarıp deneyeceğim ama uzun sürebilir çünkü 3-4 bölüm dizi izliyorum 5.bölümde veriyor mavi ekranı yani sorunla hızlı bir şekilde karşılaşmıyorum.
 

Dosya Ekleri

  • disk.png
    disk.png
    30,2 KB · Görüntüleme: 98
Diskin durumu iyi gözüküyor. Tek RAM ile gene alırsanız mavi ekran garantiye gönderin kasayı ya da RAM'leri.

Bu sefer mavi ekran vermedi fakat görüntü donuyor sadece ses devam ediyor.
Aynı RAM ile kullanmaya devam ediyordum bu sefer de bu mavi ekran hatasını aldım.
 
Son düzenleme:
Hata gene bellekten dolayı. X.M.P açıksa kapatın ya da garantiye gönderin Ramleri.
Bu iki hatayı da 2.belleği taktıktan sonra aldım. X.M.P açıktı evet şuan X.M.P'yi de kapattım öyle deneyeceğim. Şu hatalarda ram ile mi alakalı yoksa ekran kartı mı bakabilir misiniz ona göre ekran kartını da göndereceğim garantiye. İlginiz için de ayrıyeten teşekkür ederim.
 
Bir tane dosyada ekran kartı hata vermiş bellek bozulması yüzünden.
0xC0000005: STATUS_ACCESS_VIOLATION

A memory access violation occurred. (Parameter 4 of the bug check is the address that the driver attempted to access.)
Ekran kartı bellek üzerinden bir adrese ulaşmaya çalışırken erişimi engellenmiş. Bu RAM kaynaklı oluşan bir hatadır. 2. belleği takmadan test edin sistemi.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8074a6f01d0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8562

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25755

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8074a6f01d0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

READ_ADDRESS: fffff8074acfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8074ac0f340: Unable to get Flags value from nt!KdVersionBlock
fffff8074ac0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT: 
ffffe88a`320524e8 fffff807`4a430105     : 00000000`0000001e ffffffff`c0000005 fffff807`4a6f01d0 00000000`00000000 : nt!KeBugCheckEx
ffffe88a`320524f0 fffff807`4a4066ac     : 00000000`00001000 ffffe88a`32052d90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
ffffe88a`32052bb0 fffff807`4a402843     : ffffe88a`32052e81 fffff807`4a2caa71 ffff9906`aa010340 ffff9906`aa011e00 : nt!KiExceptionDispatch+0x12c
ffffe88a`32052d90 fffff807`4a6f01d0     : fffff807`4a6bc582 00000000`000000c0 ffffe88a`32052f70 00000000`00000000 : nt!KiPageFault+0x443
ffffe88a`32052f28 fffff807`4a6bc582     : 00000000`000000c0 ffffe88a`32052f70 00000000`00000000 fffff807`00000000 : nt!ExpLookupHandleTableEntry
ffffe88a`32052f30 fffff807`4a6bc429     : 00000000`00000000 ffff9906`b2516080 00000000`00000000 ffffe88a`32053601 : nt!ObWaitForMultipleObjects+0x122
ffffe88a`32053430 fffff807`4a405fb8     : 00000000`00000004 00000000`00000000 ffff9906`b2516080 fffff807`4a3fac85 : nt!NtWaitForMultipleObjects+0x119
ffffe88a`320536c0 fffff807`4a3f8400     : fffff807`53d9e08d ffffd70e`7a18f4a0 ffffd70e`00000000 ffffd70e`7a18f4a0 : nt!KiSystemServiceCopyEnd+0x28
ffffe88a`320538c8 fffff807`53d9e08d     : ffffd70e`7a18f4a0 ffffd70e`00000000 ffffd70e`7a18f4a0 00000000`00000000 : nt!KiServiceLinkage
ffffe88a`320538d0 fffff807`53d9d719     : 00000000`00000000 ffff9906`b5004d60 ffffd70e`754e5db0 fffff807`53da2c53 : dxgkrnl!CTokenManager::ProcessTokens+0x1bd
ffffe88a`32053990 fffff807`53da2b8d     : 00000000`00000000 ffffe88a`32053b80 ffffd70e`754e5db0 fffff807`4a6e23f6 : dxgkrnl!CTokenManager::TokenThread+0x79
ffffe88a`320539e0 fffff807`4a405fb8     : ffff9906`b2516080 000002bd`746d3638 00000000`00000020 ffffe88a`32053b80 : dxgkrnl!NtTokenManagerThread+0x1bd
ffffe88a`32053b00 00007ff9`0ca78304     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ce`f537f898 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`0ca78304


SYMBOL_NAME:  dxgkrnl!CTokenManager::ProcessTokens+1bd

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1bd

FAILURE_BUCKET_ID:  0x1E_c0000005_R_dxgkrnl!CTokenManager::ProcessTokens

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {58736931-a2cb-f30c-610a-4966ec3d47f8}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ff810b2be14, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffa00e97fb6b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6531

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10890

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1

BUGCHECK_P1: 7ff810b2be14

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: ffffa00e97fb6b80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

STACK_TEXT: 
ffffa00e`97fb69b8 fffff807`05a06569     : 00000000`00000001 00007ff8`10b2be14 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffa00e`97fb69c0 fffff807`05a06433     : ffffca05`4dfc1080 00000000`00000000 ffffa00e`97fb6b18 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa00e`97fb6b00 00007ff8`10b2be14     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000084`3a0ff088 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`10b2be14


SYMBOL_NAME:  nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1fe

FAILURE_BUCKET_ID:  0x1_SysCallNum_4_nt!KiSystemServiceExitPico

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {52cd694c-15ec-48c3-924a-3539560711db}

Followup:     MachineOwner
---------
Dosyalar birbirinin aynısı.
Taktığınız bellek bozuk olabilir.
 
Nvidia Share kapalı sanırım N harfi ile başlayan bütün hizmetler bunlar.
Bir de zaten 1.ram takılıyken de aldığım mavi ekran hatasına ram'den kaynaklı demiştiniz, bu seferkiler de sadece 2.ram takılıyken gerçekleşti. Yani anladığım kadarıyla ikisinde de sıkıntı var doğru mudur? Bir de X.M.P kapalıyken deneyim mi yoksa direk yollayım mı garantiye? İşlemci 3500mhz ye kadar izin veriyordu sanırım ram için bu arada.
 

Dosya Ekleri

  • nvidia.png
    nvidia.png
    17 KB · Görüntüleme: 84

Yeni konular

Geri
Yukarı