Sürekli mavi ekran hatası

muratglr

Femtopat
Katılım
4 Ekim 2020
Mesajlar
43
Daha fazla  
Cinsiyet
Erkek
Bilgisayarım sürekli mavi ekran veriyor. 2 kere bilgisayarcıya götürdüm. Bilgisayarcı bana ekran kartımın değişmesi gerektiğini, değişirse sorunumun düzeleceğini söyledi. Ekran kartımı değiştirmeden sorun çözülür mü? Veya ekran kartını değiştirsem sorunum ortadan kesinlikle kalkar mı?

Minidump dosyası: Minidump.rar dosyasını indir - download
 
Son düzenleyen: Moderatör:
Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804c680e3c6, The address that the exception occurred at
Arg3: ffffdb05c58e6588, Exception Record Address
Arg4: ffffdb05c58e5dc0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 4499

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25759

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff804c680e3c6

BUGCHECK_P3: ffffdb05c58e6588

BUGCHECK_P4: ffffdb05c58e5dc0

EXCEPTION_RECORD:  ffffdb05c58e6588 -- (.exr 0xffffdb05c58e6588)
ExceptionAddress: fffff804c680e3c6 (BEDaisy+0x00000000002de3c6)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048

CONTEXT:  ffffdb05c58e5dc0 -- (.cxr 0xffffdb05c58e5dc0)
rax=ffffdb05c58e6900 rbx=0000000000022708 rcx=0000000000014070
rdx=0000000140004c97 rsi=0000000000000090 rdi=fffff804c654ad28
rip=fffff804c680e3c6 rsp=ffffdb05c58e67c0 rbp=000000000008d2ed
r8=fffff804c680e386  r9=ffffdb05c58e69d8 r10=0000000000000048
r11=0000000000000f06 r12=0000000000000000 r13=0000000000000005
r14=0000000000000001 r15=0000000000000009
iopl=0         ov up ei pl nz ac po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050a16
BEDaisy+0x2de3c6:
fffff804`c680e3c6 8b0c14          mov     ecx,dword ptr [rsp+rdx] ss:ffffdb07`058eb457=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80476afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000048

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000048

MISALIGNED_IP:
BEDaisy+2de3c6
fffff804`c680e3c6 8b0c14          mov     ecx,dword ptr [rsp+rdx]

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffffdb05`c58e67c0 00000000`00000004     : 00000000`00000005 ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 : BEDaisy+0x2de3c6
ffffdb05`c58e67c8 00000000`00000005     : ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 00000000`00000001 : 0x4
ffffdb05`c58e67d0 ffffc80a`14b1fce0     : 00000000`00000000 fffff804`c6534c01 00000000`00000001 00000000`00040282 : 0x5
ffffdb05`c58e67d8 00000000`00000000     : fffff804`c6534c01 00000000`00000001 00000000`00040282 00000000`00000004 : 0xffffc80a`14b1fce0


SYMBOL_NAME:  BEDaisy+2de3c6

IMAGE_NAME:  hardware

STACK_COMMAND:  .cxr 0xffffdb05c58e5dc0 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED_BEDaisy.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0d6989f4-a5e2-2225-1046-259fcb6d205e}

Followup:     MachineOwner
---------

5: kd> !sysinfo cpuinfo
[CPU Information]
~MHz = REG_DWORD 3800
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 23 Model 1 Stepping 1
ProcessorNameString = REG_SZ AMD Ryzen 5 1500X Quad-Core Processor      
Update Status = REG_DWORD 3
VendorIdentifier = REG_SZ AuthenticAMD

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80754d25016, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4843

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8578

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80754d25016

READ_ADDRESS: fffff807556fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock
fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

TRAP_FRAME:  fffff407e94df030 -- (.trap 0xfffff407e94df030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=537af407eb4d49b8 rbx=0000000000000000 rcx=fffff407e94df4b8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80754d25016 rsp=fffff407e94df1c0 rbp=0000000000000006
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!HalpInterruptSendIpi+0x46:
fffff807`54d25016 0000            add     byte ptr [rax],al ds:537af407`eb4d49b8=??
Resetting default scope

MISALIGNED_IP:
nt!HalpInterruptSendIpi+46
fffff807`54d25016 0000            add     byte ptr [rax],al

STACK_TEXT:
fffff407`e94deee8 fffff807`54e07169     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff407`e94deef0 fffff807`54e03469     : fffff407`e94df8d0 fffff407`e94df6ec 00000000`00000001 fffff407`e94df3c0 : nt!KiBugCheckDispatch+0x69
fffff407`e94df030 fffff807`54d25016     : fffff407`e94df4b8 00000000`000f0000 fffff407`e94df230 00000000`00000000 : nt!KiPageFault+0x469
fffff407`e94df1c0 00000000`00000000     : ffffa60d`c2dc2080 00000000`00000000 00000000`00000000 00000000`00000001 : nt!HalpInterruptSendIpi+0x46


SYMBOL_NAME:  nt!HalpInterruptSendIpi+46

IMAGE_NAME:  hardware

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff8023cfbd5bc, The address that the exception occurred at
Arg3: ffffd1017ec534b8, Exception Record Address
Arg4: ffff9000731a9920, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7452

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10075

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc000001d

BUGCHECK_P2: fffff8023cfbd5bc

BUGCHECK_P3: ffffd1017ec534b8

BUGCHECK_P4: ffff9000731a9920

EXCEPTION_RECORD:  ffffd1017ec534b8 -- (.exr 0xffffd1017ec534b8)
ExceptionAddress: fffff8023cfbd5bc (ndis!ndisNsiGetAllInterfaceInformation+0x0000000000000e3c)
   ExceptionCode: c000001d (Illegal instruction)
  ExceptionFlags: 00000000
NumberParameters: 0

CONTEXT:  ffff9000731a9920 -- (.cxr 0xffff9000731a9920)
rax=000000000000005c rbx=ffffa58a1658c1a0 rcx=ffffa58a110fa2e0
rdx=ffffa58a163a8e58 rsi=0000000000000000 rdi=ffffa58a110c11a0
rip=fffff8023cfbd5bc rsp=ffffd1017ec536f0 rbp=ffffd1017ec537f0
r8=000000000000005c  r9=0000000000000002 r10=fffff8023a330eb0
r11=ffffa58a15ee4a30 r12=0000000000000001 r13=ffffa58a1658b1a8
r14=ffffa58a1658b020 r15=0000000000000002
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
ndis!ndisNsiGetAllInterfaceInformation+0xe3c:
fffff802`3cfbd5bc 488b4910        mov     rcx,qword ptr [rcx+10h] ds:002b:ffffa58a`110fa2f0=ffffa58a110fa308
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM}  Ge ersiz Y nerge  Ge ersiz bir y nerge y r t lmeye  al   ld .

EXCEPTION_CODE_STR:  c000001d

EXCEPTION_STR:  0xc000001d

BAD_STACK_POINTER:  ffff9000731a90e8

FAILED_INSTRUCTION_ADDRESS:
ndis!ndisNsiGetAllInterfaceInformation+e3c
fffff802`3cfbd5bc 488b4910        mov     rcx,qword ptr [rcx+10h]

STACK_TEXT:
ffffd101`7ec536f0 fffff802`3d1359da     : ffffa58a`18f0c020 00000000`00000000 ffffd101`7ec53a00 ffffd101`7ec53ab0 : ndis!ndisNsiGetAllInterfaceInformation+0xe3c
ffffd101`7ec53820 fffff802`3d13ec9d     : ffffa58a`19108a20 00000000`00000444 ffffa58a`13b75401 ffffd101`7ec53ab0 : NETIO!NsiGetAllParametersEx+0x24a
ffffd101`7ec53990 fffff802`3d13ea71     : 00000000`00000558 ffffd101`7ec548c0 00000000`00000002 00000000`00000000 : NETIO!InternalGetIfEntry2Ex+0x21d
ffffd101`7ec54760 fffff802`838f3afc     : 00000000`00000007 00000000`00000002 ffffa58a`0c010100 fffff802`3a2c7262 : NETIO!GetIfEntry2+0x11
ffffd101`7ec54790 fffff802`83928737     : 00000000`00000007 00000000`00000000 c0011020`063000a6 00000000`00000400 : srvnet!SrvNetSkipAddress+0xcc
ffffd101`7ec547c0 fffff802`838f38fd     : 00000000`00000000 00000000`00000000 ffffa58a`0b696040 00000000`00000000 : srvnet!SrvNetBuildNetname+0xc3
ffffd101`7ec54a80 fffff802`3a21aa33     : ffffa58a`18eb4d20 ffffa58a`166eda70 ffffa58a`166eda70 ffffa58a`166bc040 : srvnet!SrvNetUpdateNetNameWorkerRoutine+0x8d
ffffd101`7ec54b00 fffff802`3a3034b5     : ffffa58a`0e794080 ffffa58a`0e794080 fffff802`3a21a9a0 ffffa58a`00000000 : nt!IopProcessWorkItem+0x93
ffffd101`7ec54b70 fffff802`3a2a29a5     : ffffa58a`0e794080 00000000`00000080 ffffa58a`0b696040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffd101`7ec54c10 fffff802`3a3fc868     : ffff9000`73243180 ffffa58a`0e794080 fffff802`3a2a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd101`7ec54c60 00000000`00000000     : ffffd101`7ec55000 ffffd101`7ec4f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  NETIO!NsiGetAllParametersEx+24a

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .cxr 0xffff9000731a9920 ; kb

BUCKET_ID_FUNC_OFFSET:  24a

FAILURE_BUCKET_ID:  AV_STACKPTR_ERROR_BAD_IP_NETIO!NsiGetAllParametersEx

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c092daa6-3bf4-0dbc-0db7-7576bdae5a66}

Followup:     MachineOwner
---------

OCCT sırasında mavi ekran GPU sorununa da işaret edebilir. O da ihtimaller arasında ama şimdilik bunları yapın.
 
Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard.
coded breakpoint or assertion was hit, but this system was booted.
/NODEBUG. This is not supposed to happen as developers should never have.
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the.
system is booted /DEBUG. This will let us see why this breakpoint is.
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff804c680e3c6, The address that the exception occurred at.
Arg3: ffffdb05c58e6588, Exception Record Address.
Arg4: ffffdb05c58e5dc0, Context Record Address.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : AV.Dereference.
Value: NullClassPtr.

Key : AV.Fault.
Value: Read.

Key : Analysis.CPU.mSec.
Value: 4499.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 25759.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 7e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff804c680e3c6.

BUGCHECK_P3: ffffdb05c58e6588.

BUGCHECK_P4: ffffdb05c58e5dc0.

EXCEPTION_RECORD: ffffdb05c58e6588 -- (.exr 0xffffdb05c58e6588)
ExceptionAddress: fffff804c680e3c6 (BEDaisy+0x00000000002de3c6)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2.
Parameter[0]: 0000000000000000.
Parameter[1]: 0000000000000048.
Attempt to read from address 0000000000000048.

CONTEXT: ffffdb05c58e5dc0 -- (.cxr 0xffffdb05c58e5dc0)
rax=ffffdb05c58e6900 rbx=0000000000022708 rcx=0000000000014070.
rdx=0000000140004c97 rsi=0000000000000090 rdi=fffff804c654ad28.
rip=fffff804c680e3c6 rsp=ffffdb05c58e67c0 rbp=000000000008d2ed.
r8=fffff804c680e386 r9=ffffdb05c58e69d8 r10=0000000000000048.
r11=0000000000000f06 r12=0000000000000000 r13=0000000000000005.
r14=0000000000000001 r15=0000000000000009.
iopl=0 ov up ei pl nz ac po nc.
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050a16.
BEDaisy+0x2de3c6:
fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx] ss:ffffdb07`058eb457=????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

READ_ADDRESS: fffff80476afb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock.
fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000048.

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005.

EXCEPTION_PARAMETER1: 0000000000000000.

EXCEPTION_PARAMETER2: 0000000000000048.

MISALIGNED_IP:
BEDaisy+2de3c6.
fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx]

EXCEPTION_STR: 0xc0000005.

STACK_TEXT:
ffffdb05`c58e67c0 00000000`00000004 : 00000000`00000005 ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 : BEDaisy+0x2de3c6.
ffffdb05`c58e67c8 00000000`00000005 : ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 00000000`00000001 : 0x4.
ffffdb05`c58e67d0 ffffc80a`14b1fce0 : 00000000`00000000 fffff804`c6534c01 00000000`00000001 00000000`00040282 : 0x5.
ffffdb05`c58e67d8 00000000`00000000 : fffff804`c6534c01 00000000`00000001 00000000`00040282 00000000`00000004 : 0xffffc80a`14b1fce0.

SYMBOL_NAME: BEDaisy+2de3c6.

IMAGE_NAME: hardware.

STACK_COMMAND: .cxr 0xffffdb05c58e5dc0 ; kb.

MODULE_NAME: hardware.

FAILURE_BUCKET_ID: IP_MISALIGNED_BEDaisy.sys.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {0d6989f4-a5e2-2225-1046-259fcb6d205e}

Followup: MachineOwner.
---------

5: kd> !sysinfo cpuinfo.
[CPU Information]
~MHz = REG_DWORD 3800.
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0.
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0.
Identifier = REG_SZ AMD64 Family 23 Model 1 Stepping 1.
ProcessorNameString = REG_SZ AMD Ryzen 5 1500X Quad-Core Processor
Update Status = REG_DWORD 3.
VendorIdentifier = REG_SZ AuthenticAMD.

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80754d25016, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4843.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 8578.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 0.

BUGCHECK_P2: 2.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff80754d25016.

READ_ADDRESS: fffff807556fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock.
fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000000.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: opera.exe.

TRAP_FRAME: fffff407e94df030 -- (.trap 0xfffff407e94df030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=537af407eb4d49b8 rbx=0000000000000000 rcx=fffff407e94df4b8.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80754d25016 rsp=fffff407e94df1c0 rbp=0000000000000006.
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po nc.
nt!HalpInterruptSendIpi+0x46:
fffff807`54d25016 0000 add byte ptr [rax],al ds:537af407`eb4d49b8=??
Resetting default scope.

MISALIGNED_IP:
nt!HalpInterruptSendIpi+46.
fffff807`54d25016 0000 add byte ptr [rax],al.

STACK_TEXT:
fffff407`e94deee8 fffff807`54e07169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
fffff407`e94deef0 fffff807`54e03469 : fffff407`e94df8d0 fffff407`e94df6ec 00000000`00000001 fffff407`e94df3c0 : nt!KiBugCheckDispatch+0x69.
fffff407`e94df030 fffff807`54d25016 : fffff407`e94df4b8 00000000`000f0000 fffff407`e94df230 00000000`00000000 : nt!KiPageFault+0x469.
fffff407`e94df1c0 00000000`00000000 : ffffa60d`c2dc2080 00000000`00000000 00000000`00000000 00000000`00000001 : nt!HalpInterruptSendIpi+0x46.

SYMBOL_NAME: nt!HalpInterruptSendIpi+46.

IMAGE_NAME: hardware.

IMAGE_VERSION: 10.0.19041.630.

STACK_COMMAND: .thread ; .cxr ; kb.

MODULE_NAME: hardware.

FAILURE_BUCKET_ID: IP_MISALIGNED.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup: MachineOwner.
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard.
coded breakpoint or assertion was hit, but this system was booted.
/NODEBUG. This is not supposed to happen as developers should never have.
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the.
system is booted /DEBUG. This will let us see why this breakpoint is.
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled.
Arg2: fffff8023cfbd5bc, The address that the exception occurred at.
Arg3: ffffd1017ec534b8, Exception Record Address.
Arg4: ffff9000731a9920, Context Record Address.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 7452.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 10075.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 92.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 7e.

BUGCHECK_P1: ffffffffc000001d.

BUGCHECK_P2: fffff8023cfbd5bc.

BUGCHECK_P3: ffffd1017ec534b8.

BUGCHECK_P4: ffff9000731a9920.

EXCEPTION_RECORD: ffffd1017ec534b8 -- (.exr 0xffffd1017ec534b8)
ExceptionAddress: fffff8023cfbd5bc (ndis!ndisNsiGetAllInterfaceInformation+0x0000000000000e3c)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000.
NumberParameters: 0.

CONTEXT: ffff9000731a9920 -- (.cxr 0xffff9000731a9920)
rax=000000000000005c rbx=ffffa58a1658c1a0 rcx=ffffa58a110fa2e0.
rdx=ffffa58a163a8e58 rsi=0000000000000000 rdi=ffffa58a110c11a0.
rip=fffff8023cfbd5bc rsp=ffffd1017ec536f0 rbp=ffffd1017ec537f0.
r8=000000000000005c r9=0000000000000002 r10=fffff8023a330eb0.
r11=ffffa58a15ee4a30 r12=0000000000000001 r13=ffffa58a1658b1a8.
r14=ffffa58a1658b020 r15=0000000000000002.
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246.
ndis!ndisNsiGetAllInterfaceInformation+0xe3c:
fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h] ds:002b:ffffa58a`110fa2f0=ffffa58a110fa308.
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM} Ge ersiz Y nerge Ge ersiz bir y nerge y r t lmeye al ld .

EXCEPTION_CODE_STR: c000001d.

EXCEPTION_STR: 0xc000001d.

BAD_STACK_POINTER: ffff9000731a90e8.

FAILED_INSTRUCTION_ADDRESS:
ndis!ndisNsiGetAllInterfaceInformation+e3c.
fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h]

STACK_TEXT:
ffffd101`7ec536f0 fffff802`3d1359da : ffffa58a`18f0c020 00000000`00000000 ffffd101`7ec53a00 ffffd101`7ec53ab0 : ndis!ndisNsiGetAllInterfaceInformation+0xe3c.
ffffd101`7ec53820 fffff802`3d13ec9d : ffffa58a`19108a20 00000000`00000444 ffffa58a`13b75401 ffffd101`7ec53ab0 : NETIO!NsiGetAllParametersEx+0x24a.
ffffd101`7ec53990 fffff802`3d13ea71 : 00000000`00000558 ffffd101`7ec548c0 00000000`00000002 00000000`00000000 : NETIO!InternalGetIfEntry2Ex+0x21d.
ffffd101`7ec54760 fffff802`838f3afc : 00000000`00000007 00000000`00000002 ffffa58a`0c010100 fffff802`3a2c7262 : NETIO!GetIfEntry2+0x11.
ffffd101`7ec54790 fffff802`83928737 : 00000000`00000007 00000000`00000000 c0011020`063000a6 00000000`00000400 : srvnet!SrvNetSkipAddress+0xcc.
ffffd101`7ec547c0 fffff802`838f38fd : 00000000`00000000 00000000`00000000 ffffa58a`0b696040 00000000`00000000 : srvnet!SrvNetBuildNetname+0xc3.
ffffd101`7ec54a80 fffff802`3a21aa33 : ffffa58a`18eb4d20 ffffa58a`166eda70 ffffa58a`166eda70 ffffa58a`166bc040 : srvnet!SrvNetUpdateNetNameWorkerRoutine+0x8d.
ffffd101`7ec54b00 fffff802`3a3034b5 : ffffa58a`0e794080 ffffa58a`0e794080 fffff802`3a21a9a0 ffffa58a`00000000 : nt!IopProcessWorkItem+0x93.
ffffd101`7ec54b70 fffff802`3a2a29a5 : ffffa58a`0e794080 00000000`00000080 ffffa58a`0b696040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105.
ffffd101`7ec54c10 fffff802`3a3fc868 : ffff9000`73243180 ffffa58a`0e794080 fffff802`3a2a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55.
ffffd101`7ec54c60 00000000`00000000 : ffffd101`7ec55000 ffffd101`7ec4f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28.

SYMBOL_NAME: NETIO!NsiGetAllParametersEx+24a.

MODULE_NAME: NETIO.

IMAGE_NAME: NETIO.SYS.

IMAGE_VERSION: 10.0.19041.610.

STACK_COMMAND: .cxr 0xffff9000731a9920 ; kb.

BUCKET_ID_FUNC_OFFSET: 24a.

FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_BAD_IP_NETIO!NsiGetAllParametersEx.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {c092daa6-3bf4-0dbc-0db7-7576bdae5a66}

Followup: MachineOwner.
---------

OCCT sırasında mavi ekran GPU sorununa da işaret edebilir. O da ihtimaller arasında ama şimdilik bunları yapın.

İşlemciye herhangi bir OC işlemi yapmadım nasıl kaldırabilirim?
Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804c680e3c6, The address that the exception occurred at
Arg3: ffffdb05c58e6588, Exception Record Address
Arg4: ffffdb05c58e5dc0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 4499

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25759

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff804c680e3c6

BUGCHECK_P3: ffffdb05c58e6588

BUGCHECK_P4: ffffdb05c58e5dc0

EXCEPTION_RECORD:  ffffdb05c58e6588 -- (.exr 0xffffdb05c58e6588)
ExceptionAddress: fffff804c680e3c6 (BEDaisy+0x00000000002de3c6)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048

CONTEXT:  ffffdb05c58e5dc0 -- (.cxr 0xffffdb05c58e5dc0)
rax=ffffdb05c58e6900 rbx=0000000000022708 rcx=0000000000014070
rdx=0000000140004c97 rsi=0000000000000090 rdi=fffff804c654ad28
rip=fffff804c680e3c6 rsp=ffffdb05c58e67c0 rbp=000000000008d2ed
r8=fffff804c680e386  r9=ffffdb05c58e69d8 r10=0000000000000048
r11=0000000000000f06 r12=0000000000000000 r13=0000000000000005
r14=0000000000000001 r15=0000000000000009
iopl=0         ov up ei pl nz ac po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050a16
BEDaisy+0x2de3c6:
fffff804`c680e3c6 8b0c14          mov     ecx,dword ptr [rsp+rdx] ss:ffffdb07`058eb457=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80476afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000048

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000048

MISALIGNED_IP:
BEDaisy+2de3c6
fffff804`c680e3c6 8b0c14          mov     ecx,dword ptr [rsp+rdx]

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffffdb05`c58e67c0 00000000`00000004     : 00000000`00000005 ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 : BEDaisy+0x2de3c6
ffffdb05`c58e67c8 00000000`00000005     : ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 00000000`00000001 : 0x4
ffffdb05`c58e67d0 ffffc80a`14b1fce0     : 00000000`00000000 fffff804`c6534c01 00000000`00000001 00000000`00040282 : 0x5
ffffdb05`c58e67d8 00000000`00000000     : fffff804`c6534c01 00000000`00000001 00000000`00040282 00000000`00000004 : 0xffffc80a`14b1fce0


SYMBOL_NAME:  BEDaisy+2de3c6

IMAGE_NAME:  hardware

STACK_COMMAND:  .cxr 0xffffdb05c58e5dc0 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED_BEDaisy.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0d6989f4-a5e2-2225-1046-259fcb6d205e}

Followup:     MachineOwner
---------

5: kd> !sysinfo cpuinfo
[CPU Information]
~MHz = REG_DWORD 3800
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 23 Model 1 Stepping 1
ProcessorNameString = REG_SZ AMD Ryzen 5 1500X Quad-Core Processor     
Update Status = REG_DWORD 3
VendorIdentifier = REG_SZ AuthenticAMD

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80754d25016, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4843

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8578

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80754d25016

READ_ADDRESS: fffff807556fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock
fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

TRAP_FRAME:  fffff407e94df030 -- (.trap 0xfffff407e94df030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=537af407eb4d49b8 rbx=0000000000000000 rcx=fffff407e94df4b8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80754d25016 rsp=fffff407e94df1c0 rbp=0000000000000006
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!HalpInterruptSendIpi+0x46:
fffff807`54d25016 0000            add     byte ptr [rax],al ds:537af407`eb4d49b8=??
Resetting default scope

MISALIGNED_IP:
nt!HalpInterruptSendIpi+46
fffff807`54d25016 0000            add     byte ptr [rax],al

STACK_TEXT:
fffff407`e94deee8 fffff807`54e07169     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff407`e94deef0 fffff807`54e03469     : fffff407`e94df8d0 fffff407`e94df6ec 00000000`00000001 fffff407`e94df3c0 : nt!KiBugCheckDispatch+0x69
fffff407`e94df030 fffff807`54d25016     : fffff407`e94df4b8 00000000`000f0000 fffff407`e94df230 00000000`00000000 : nt!KiPageFault+0x469
fffff407`e94df1c0 00000000`00000000     : ffffa60d`c2dc2080 00000000`00000000 00000000`00000000 00000000`00000001 : nt!HalpInterruptSendIpi+0x46


SYMBOL_NAME:  nt!HalpInterruptSendIpi+46

IMAGE_NAME:  hardware

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff8023cfbd5bc, The address that the exception occurred at
Arg3: ffffd1017ec534b8, Exception Record Address
Arg4: ffff9000731a9920, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7452

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10075

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc000001d

BUGCHECK_P2: fffff8023cfbd5bc

BUGCHECK_P3: ffffd1017ec534b8

BUGCHECK_P4: ffff9000731a9920

EXCEPTION_RECORD:  ffffd1017ec534b8 -- (.exr 0xffffd1017ec534b8)
ExceptionAddress: fffff8023cfbd5bc (ndis!ndisNsiGetAllInterfaceInformation+0x0000000000000e3c)
   ExceptionCode: c000001d (Illegal instruction)
  ExceptionFlags: 00000000
NumberParameters: 0

CONTEXT:  ffff9000731a9920 -- (.cxr 0xffff9000731a9920)
rax=000000000000005c rbx=ffffa58a1658c1a0 rcx=ffffa58a110fa2e0
rdx=ffffa58a163a8e58 rsi=0000000000000000 rdi=ffffa58a110c11a0
rip=fffff8023cfbd5bc rsp=ffffd1017ec536f0 rbp=ffffd1017ec537f0
r8=000000000000005c  r9=0000000000000002 r10=fffff8023a330eb0
r11=ffffa58a15ee4a30 r12=0000000000000001 r13=ffffa58a1658b1a8
r14=ffffa58a1658b020 r15=0000000000000002
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
ndis!ndisNsiGetAllInterfaceInformation+0xe3c:
fffff802`3cfbd5bc 488b4910        mov     rcx,qword ptr [rcx+10h] ds:002b:ffffa58a`110fa2f0=ffffa58a110fa308
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM}  Ge ersiz Y nerge  Ge ersiz bir y nerge y r t lmeye  al   ld .

EXCEPTION_CODE_STR:  c000001d

EXCEPTION_STR:  0xc000001d

BAD_STACK_POINTER:  ffff9000731a90e8

FAILED_INSTRUCTION_ADDRESS:
ndis!ndisNsiGetAllInterfaceInformation+e3c
fffff802`3cfbd5bc 488b4910        mov     rcx,qword ptr [rcx+10h]

STACK_TEXT:
ffffd101`7ec536f0 fffff802`3d1359da     : ffffa58a`18f0c020 00000000`00000000 ffffd101`7ec53a00 ffffd101`7ec53ab0 : ndis!ndisNsiGetAllInterfaceInformation+0xe3c
ffffd101`7ec53820 fffff802`3d13ec9d     : ffffa58a`19108a20 00000000`00000444 ffffa58a`13b75401 ffffd101`7ec53ab0 : NETIO!NsiGetAllParametersEx+0x24a
ffffd101`7ec53990 fffff802`3d13ea71     : 00000000`00000558 ffffd101`7ec548c0 00000000`00000002 00000000`00000000 : NETIO!InternalGetIfEntry2Ex+0x21d
ffffd101`7ec54760 fffff802`838f3afc     : 00000000`00000007 00000000`00000002 ffffa58a`0c010100 fffff802`3a2c7262 : NETIO!GetIfEntry2+0x11
ffffd101`7ec54790 fffff802`83928737     : 00000000`00000007 00000000`00000000 c0011020`063000a6 00000000`00000400 : srvnet!SrvNetSkipAddress+0xcc
ffffd101`7ec547c0 fffff802`838f38fd     : 00000000`00000000 00000000`00000000 ffffa58a`0b696040 00000000`00000000 : srvnet!SrvNetBuildNetname+0xc3
ffffd101`7ec54a80 fffff802`3a21aa33     : ffffa58a`18eb4d20 ffffa58a`166eda70 ffffa58a`166eda70 ffffa58a`166bc040 : srvnet!SrvNetUpdateNetNameWorkerRoutine+0x8d
ffffd101`7ec54b00 fffff802`3a3034b5     : ffffa58a`0e794080 ffffa58a`0e794080 fffff802`3a21a9a0 ffffa58a`00000000 : nt!IopProcessWorkItem+0x93
ffffd101`7ec54b70 fffff802`3a2a29a5     : ffffa58a`0e794080 00000000`00000080 ffffa58a`0b696040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffd101`7ec54c10 fffff802`3a3fc868     : ffff9000`73243180 ffffa58a`0e794080 fffff802`3a2a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd101`7ec54c60 00000000`00000000     : ffffd101`7ec55000 ffffd101`7ec4f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  NETIO!NsiGetAllParametersEx+24a

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .cxr 0xffff9000731a9920 ; kb

BUCKET_ID_FUNC_OFFSET:  24a

FAILURE_BUCKET_ID:  AV_STACKPTR_ERROR_BAD_IP_NETIO!NsiGetAllParametersEx

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c092daa6-3bf4-0dbc-0db7-7576bdae5a66}

Followup:     MachineOwner
---------

OCCT sırasında mavi ekran GPU sorununa da işaret edebilir. O da ihtimaller arasında ama şimdilik bunları yapın.
LAN driverlarınıda yeni yükledim zaten.
Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard.
coded breakpoint or assertion was hit, but this system was booted.
/NODEBUG. This is not supposed to happen as developers should never have.
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the.
system is booted /DEBUG. This will let us see why this breakpoint is.
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff804c680e3c6, The address that the exception occurred at.
Arg3: ffffdb05c58e6588, Exception Record Address.
Arg4: ffffdb05c58e5dc0, Context Record Address.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : AV.Dereference.
Value: NullClassPtr.

Key : AV.Fault.
Value: Read.

Key : Analysis.CPU.mSec.
Value: 4499.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 25759.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 7e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff804c680e3c6.

BUGCHECK_P3: ffffdb05c58e6588.

BUGCHECK_P4: ffffdb05c58e5dc0.

EXCEPTION_RECORD: ffffdb05c58e6588 -- (.exr 0xffffdb05c58e6588)
ExceptionAddress: fffff804c680e3c6 (BEDaisy+0x00000000002de3c6)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2.
Parameter[0]: 0000000000000000.
Parameter[1]: 0000000000000048.
Attempt to read from address 0000000000000048.

CONTEXT: ffffdb05c58e5dc0 -- (.cxr 0xffffdb05c58e5dc0)
rax=ffffdb05c58e6900 rbx=0000000000022708 rcx=0000000000014070.
rdx=0000000140004c97 rsi=0000000000000090 rdi=fffff804c654ad28.
rip=fffff804c680e3c6 rsp=ffffdb05c58e67c0 rbp=000000000008d2ed.
r8=fffff804c680e386 r9=ffffdb05c58e69d8 r10=0000000000000048.
r11=0000000000000f06 r12=0000000000000000 r13=0000000000000005.
r14=0000000000000001 r15=0000000000000009.
iopl=0 ov up ei pl nz ac po nc.
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050a16.
BEDaisy+0x2de3c6:
fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx] ss:ffffdb07`058eb457=????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

READ_ADDRESS: fffff80476afb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock.
fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000048.

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005.

EXCEPTION_PARAMETER1: 0000000000000000.

EXCEPTION_PARAMETER2: 0000000000000048.

MISALIGNED_IP:
BEDaisy+2de3c6.
fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx]

EXCEPTION_STR: 0xc0000005.

STACK_TEXT:
ffffdb05`c58e67c0 00000000`00000004 : 00000000`00000005 ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 : BEDaisy+0x2de3c6.
ffffdb05`c58e67c8 00000000`00000005 : ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 00000000`00000001 : 0x4.
ffffdb05`c58e67d0 ffffc80a`14b1fce0 : 00000000`00000000 fffff804`c6534c01 00000000`00000001 00000000`00040282 : 0x5.
ffffdb05`c58e67d8 00000000`00000000 : fffff804`c6534c01 00000000`00000001 00000000`00040282 00000000`00000004 : 0xffffc80a`14b1fce0.

SYMBOL_NAME: BEDaisy+2de3c6.

IMAGE_NAME: hardware.

STACK_COMMAND: .cxr 0xffffdb05c58e5dc0 ; kb.

MODULE_NAME: hardware.

FAILURE_BUCKET_ID: IP_MISALIGNED_BEDaisy.sys.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {0d6989f4-a5e2-2225-1046-259fcb6d205e}

Followup: MachineOwner.
---------

5: kd> !sysinfo cpuinfo.
[CPU Information]
~MHz = REG_DWORD 3800.
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0.
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0.
Identifier = REG_SZ AMD64 Family 23 Model 1 Stepping 1.
ProcessorNameString = REG_SZ AMD Ryzen 5 1500X Quad-Core Processor
Update Status = REG_DWORD 3.
VendorIdentifier = REG_SZ AuthenticAMD.

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80754d25016, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4843.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 8578.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 0.

BUGCHECK_P2: 2.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff80754d25016.

READ_ADDRESS: fffff807556fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock.
fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000000.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: opera.exe.

TRAP_FRAME: fffff407e94df030 -- (.trap 0xfffff407e94df030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=537af407eb4d49b8 rbx=0000000000000000 rcx=fffff407e94df4b8.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80754d25016 rsp=fffff407e94df1c0 rbp=0000000000000006.
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po nc.
nt!HalpInterruptSendIpi+0x46:
fffff807`54d25016 0000 add byte ptr [rax],al ds:537af407`eb4d49b8=??
Resetting default scope.

MISALIGNED_IP:
nt!HalpInterruptSendIpi+46.
fffff807`54d25016 0000 add byte ptr [rax],al.

STACK_TEXT:
fffff407`e94deee8 fffff807`54e07169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
fffff407`e94deef0 fffff807`54e03469 : fffff407`e94df8d0 fffff407`e94df6ec 00000000`00000001 fffff407`e94df3c0 : nt!KiBugCheckDispatch+0x69.
fffff407`e94df030 fffff807`54d25016 : fffff407`e94df4b8 00000000`000f0000 fffff407`e94df230 00000000`00000000 : nt!KiPageFault+0x469.
fffff407`e94df1c0 00000000`00000000 : ffffa60d`c2dc2080 00000000`00000000 00000000`00000000 00000000`00000001 : nt!HalpInterruptSendIpi+0x46.

SYMBOL_NAME: nt!HalpInterruptSendIpi+46.

IMAGE_NAME: hardware.

IMAGE_VERSION: 10.0.19041.630.

STACK_COMMAND: .thread ; .cxr ; kb.

MODULE_NAME: hardware.

FAILURE_BUCKET_ID: IP_MISALIGNED.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup: MachineOwner.
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard.
coded breakpoint or assertion was hit, but this system was booted.
/NODEBUG. This is not supposed to happen as developers should never have.
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the.
system is booted /DEBUG. This will let us see why this breakpoint is.
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled.
Arg2: fffff8023cfbd5bc, The address that the exception occurred at.
Arg3: ffffd1017ec534b8, Exception Record Address.
Arg4: ffff9000731a9920, Context Record Address.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 7452.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-62N06FT.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 10075.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 92.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 7e.

BUGCHECK_P1: ffffffffc000001d.

BUGCHECK_P2: fffff8023cfbd5bc.

BUGCHECK_P3: ffffd1017ec534b8.

BUGCHECK_P4: ffff9000731a9920.

EXCEPTION_RECORD: ffffd1017ec534b8 -- (.exr 0xffffd1017ec534b8)
ExceptionAddress: fffff8023cfbd5bc (ndis!ndisNsiGetAllInterfaceInformation+0x0000000000000e3c)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000.
NumberParameters: 0.

CONTEXT: ffff9000731a9920 -- (.cxr 0xffff9000731a9920)
rax=000000000000005c rbx=ffffa58a1658c1a0 rcx=ffffa58a110fa2e0.
rdx=ffffa58a163a8e58 rsi=0000000000000000 rdi=ffffa58a110c11a0.
rip=fffff8023cfbd5bc rsp=ffffd1017ec536f0 rbp=ffffd1017ec537f0.
r8=000000000000005c r9=0000000000000002 r10=fffff8023a330eb0.
r11=ffffa58a15ee4a30 r12=0000000000000001 r13=ffffa58a1658b1a8.
r14=ffffa58a1658b020 r15=0000000000000002.
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246.
ndis!ndisNsiGetAllInterfaceInformation+0xe3c:
fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h] ds:002b:ffffa58a`110fa2f0=ffffa58a110fa308.
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM} Ge ersiz Y nerge Ge ersiz bir y nerge y r t lmeye al ld .

EXCEPTION_CODE_STR: c000001d.

EXCEPTION_STR: 0xc000001d.

BAD_STACK_POINTER: ffff9000731a90e8.

FAILED_INSTRUCTION_ADDRESS:
ndis!ndisNsiGetAllInterfaceInformation+e3c.
fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h]

STACK_TEXT:
ffffd101`7ec536f0 fffff802`3d1359da : ffffa58a`18f0c020 00000000`00000000 ffffd101`7ec53a00 ffffd101`7ec53ab0 : ndis!ndisNsiGetAllInterfaceInformation+0xe3c.
ffffd101`7ec53820 fffff802`3d13ec9d : ffffa58a`19108a20 00000000`00000444 ffffa58a`13b75401 ffffd101`7ec53ab0 : NETIO!NsiGetAllParametersEx+0x24a.
ffffd101`7ec53990 fffff802`3d13ea71 : 00000000`00000558 ffffd101`7ec548c0 00000000`00000002 00000000`00000000 : NETIO!InternalGetIfEntry2Ex+0x21d.
ffffd101`7ec54760 fffff802`838f3afc : 00000000`00000007 00000000`00000002 ffffa58a`0c010100 fffff802`3a2c7262 : NETIO!GetIfEntry2+0x11.
ffffd101`7ec54790 fffff802`83928737 : 00000000`00000007 00000000`00000000 c0011020`063000a6 00000000`00000400 : srvnet!SrvNetSkipAddress+0xcc.
ffffd101`7ec547c0 fffff802`838f38fd : 00000000`00000000 00000000`00000000 ffffa58a`0b696040 00000000`00000000 : srvnet!SrvNetBuildNetname+0xc3.
ffffd101`7ec54a80 fffff802`3a21aa33 : ffffa58a`18eb4d20 ffffa58a`166eda70 ffffa58a`166eda70 ffffa58a`166bc040 : srvnet!SrvNetUpdateNetNameWorkerRoutine+0x8d.
ffffd101`7ec54b00 fffff802`3a3034b5 : ffffa58a`0e794080 ffffa58a`0e794080 fffff802`3a21a9a0 ffffa58a`00000000 : nt!IopProcessWorkItem+0x93.
ffffd101`7ec54b70 fffff802`3a2a29a5 : ffffa58a`0e794080 00000000`00000080 ffffa58a`0b696040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105.
ffffd101`7ec54c10 fffff802`3a3fc868 : ffff9000`73243180 ffffa58a`0e794080 fffff802`3a2a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55.
ffffd101`7ec54c60 00000000`00000000 : ffffd101`7ec55000 ffffd101`7ec4f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28.

SYMBOL_NAME: NETIO!NsiGetAllParametersEx+24a.

MODULE_NAME: NETIO.

IMAGE_NAME: NETIO.SYS.

IMAGE_VERSION: 10.0.19041.610.

STACK_COMMAND: .cxr 0xffff9000731a9920 ; kb.

BUCKET_ID_FUNC_OFFSET: 24a.

FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_BAD_IP_NETIO!NsiGetAllParametersEx.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {c092daa6-3bf4-0dbc-0db7-7576bdae5a66}

Followup: MachineOwner.
---------

OCCT sırasında mavi ekran GPU sorununa da işaret edebilir. O da ihtimaller arasında ama şimdilik bunları yapın.

Memtest86 yaptım ve sorun çıkmadı ramlarde yeni zaten RAM'lar.
 
İşlemciye herhangi bir OC işlemi yapmadım, nasıl kaldırabilirim?
İşlemciniz 3800 MHz'de çalışıyor gibi görünüyor, oysaki AMD'nin sitesinde işlemcinizin "Boost" frekansı 3,7 GHz olarak görünüyor.
Kod:
5: kd> !sysinfo cpuinfo
[CPU Information]
~MHz = REG_DWORD 3800
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 23 Model 1 Stepping 1
ProcessorNameString = REG_SZ AMD Ryzen 5 1500X Quad-Core Processor     
Update Status = REG_DWORD 3
VendorIdentifier = REG_SZ AuthenticAMD

BIOS'u sıfırlamayı deneyebilirsiniz. Ryzen Master yazılımı kullanıyorsanız ayarları sıfırlayabilirsiniz.

MemTest86 yaptım ve sorun çıkmadı. RAM'ler de yeni zaten.
XMP açık mı yaptınız, kapalı mı? Açık yaptıysanız kapatarak, kapalı yaptıysanız açarak yeniden deneyebilirsiniz.
 

Yeni konular

Geri
Yukarı