SYSTEM_SERVICE_EXCEPTION mavi ekran hatası

İşletim sistemi
Windows 10
Katılım
13 Nisan 2021
Mesajlar
15
Daha fazla  
Cinsiyet
Erkek
R7 2700X işlemcim ve RTX 2060 ekran kartım var.


IMG_3330.JPG
 
Ekran kartınızın sürücüsünü DDU ile kaldırıp verdiğimi kurun.

BIOS sürümünüz çok eski. Önce aşağıda verdiğim sürücüyü kurun, sonra anakartın sitesinden BIOS'u güncelleyin.

RAM hızını elle mi ayarladınız? NVMe SSD'nin modelini belirtin. Ondan başka bir depolama birimi varsa HD Tune Pro ile quick scan kapalı şekilde hata ve sağlık taraması yapıp sonuçları paylaşın.
Kod:
VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000033, The subtype of the bugcheck:
Arg2: ffffdd010a15d010
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7468

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 33330

    Key  : Analysis.Init.CPU.mSec
    Value: 890

    Key  : Analysis.Init.Elapsed.mSec
    Value: 53117

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  10e

BUGCHECK_P1: 33

BUGCHECK_P2: ffffdd010a15d010

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT: 
fffff58f`85d9c098 fffff807`6ed23ad0     : 00000000`0000010e 00000000`00000033 ffffdd01`0a15d010 00000000`00000000 : nt!KeBugCheckEx
fffff58f`85d9c0a0 fffff807`6f647ded     : 00000000`00000000 ffffdd01`0a15d110 ffffb90f`28814000 00000000`00000001 : watchdog!WdLogEvent5_WdCriticalError+0xe0
fffff58f`85d9c0e0 fffff807`6f5b1caa     : ffffdd01`0a15d010 00000000`00000000 ffffdd01`09371770 00000000`00000001 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+0x25611
fffff58f`85d9c120 fffff807`6f6227b9     : ffffdd01`0a15d010 00000000`00000000 ffffdd01`09371770 ffffb90f`286bd700 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::`scalar deleting destructor'+0xe
fffff58f`85d9c150 fffff807`6f622225     : 00000000`00000000 ffffdd01`09371770 ffffdd01`0a15d010 ffffb90f`2f410080 : dxgmms2!VIDMM_PROCESS::DestroyAdapterInfo+0xe5
fffff58f`85d9c180 fffff807`6f5b1cee     : ffffdd01`10012ee0 fffff58f`85d9c339 ffffb90f`286bd700 01000000`00100000 : dxgmms2!VIDMM_PROCESS::CloseAdapter+0xb9
fffff58f`85d9c240 fffff807`6eac6b89     : 00000000`00000030 00000000`00000799 00000000`c0007d40 00000000`00000000 : dxgmms2!VidMmCloseAdapter+0x1e
fffff58f`85d9c270 fffff807`6ea8556f     : ffffb90f`26c02000 00000000`00000000 ffffb90f`289a8890 fffff807`67c61553 : dxgkrnl!DXGPROCESS_ADAPTER_INFO::CloseVidMmAdapter+0x2d
fffff58f`85d9c2a0 fffff807`6ea4ad75     : ffffdd01`10012ee0 ffffdd01`00000002 ffffdd01`10012ee0 ffffb90f`286bd700 : dxgkrnl!DXGPROCESS::DestroyAdapterInfo+0x143
fffff58f`85d9c3a0 fffff807`6ea4985d     : ffffb90f`286df000 fffff807`00000001 ffffb90f`286df000 ffffdd01`0a93ded0 : dxgkrnl!DXGPROCESS::CloseAdapter+0xf9
fffff58f`85d9c430 fffff807`6ea8a9f9     : ffffb90f`31cabc80 fffff58f`85d9c580 00000000`0000029e ffffdd01`0a93dde0 : dxgkrnl!DXGADAPTER::DestroyHandle+0x11d
fffff58f`85d9c480 fffff807`6ea85c15     : ffffdd01`0a93dde0 ffffb90f`315650d0 ffffdd01`0a93dde0 fffff58f`85d9c8f9 : dxgkrnl!DXGPROCESS::Destroy+0x341
fffff58f`85d9c6f0 fffff807`6e976c71     : 00000000`00000000 ffffb90f`34a03c40 00000000`00000000 fffff807`6cc79c58 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
fffff58f`85d9c840 fffff807`680379ff     : 00000000`00000000 ffffb90f`264490b0 ffffb90f`309a4340 ffffb90f`31027670 : dxgkrnl!DxgkProcessNotify+0x1a1
fffff58f`85d9c890 fffff807`68062cf4     : ffffb90f`309a4300 ffffb90f`309a4340 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
fffff58f`85d9c960 fffff807`68106af2     : ffffb90f`2f4104b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
fffff58f`85d9c990 fffff807`6810a02e     : ffffb90f`d00002fe 00000000`00000001 00000000`00000000 0000006d`2e17b000 : nt!PspExitThread+0x5b2
fffff58f`85d9ca90 fffff807`67e075b8     : ffffb90f`309a4340 ffffb90f`2f410080 fffff58f`85d9cb80 ffffb90f`309a4340 : nt!NtTerminateProcess+0xde
fffff58f`85d9cb00 00007ffb`1044d194     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000006d`2e27f668 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1044d194


SYMBOL_NAME:  dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+25611

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.1140

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25611

FAILURE_BUCKET_ID:  0x10e_33_dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::_VIDMM_PROCESS_ADAPTER_INFO

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {590e82e4-fa32-3e14-0943-e6b01c6637c4}

Followup:     MachineOwner
---------


PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffc05c101b1d8, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff804636128e2, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4811

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 30001

    Key  : Analysis.Init.CPU.mSec
    Value: 780

    Key  : Analysis.Init.Elapsed.mSec
    Value: 43508

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: fffffc05c101b1d8

BUGCHECK_P2: 2

BUGCHECK_P3: fffff804636128e2

BUGCHECK_P4: 2

READ_ADDRESS: fffff8045eefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffffc05c101b1d8

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffffc05c0fdae50 -- (.trap 0xfffffc05c0fdae50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000005d676000 rbx=0000000000000000 rcx=ffffad81e8469000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804636128e2 rsp=fffffc05c0fdafe0 rbp=fffffc05c0fdb100
 r8=ffffbf095b6ed3e0  r9=0000000000000000 r10=0000000000015ca0
r11=fffffc05c0fdb268 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
dxgmms2!VIDMM_GLOBAL::UpdatePageTable+0x82:
fffff804`636128e2 4c89b5d8000000  mov     qword ptr [rbp+0D8h],r14 ss:0018:fffffc05`c0fdb1d8=fffff8045e457dbd
Resetting default scope

STACK_TEXT: 
fffffc05`c0fdaba8 fffff804`5e61eb01     : 00000000`00000050 fffffc05`c101b1d8 00000000`00000002 fffffc05`c0fdae50 : nt!KeBugCheckEx
fffffc05`c0fdabb0 fffff804`5e40c960     : 00000000`000000f5 00000000`00000002 fffffc05`c0fdaed0 00000000`00000000 : nt!MiSystemFault+0x1f42f1
fffffc05`c0fdacb0 fffff804`5e603d5e     : 00000000`00000000 00000000`00000000 ffffad81`dde42000 ffffad81`e8271080 : nt!MmAccessFault+0x400
fffffc05`c0fdae50 fffff804`636128e2     : ffffad81`dde42000 ffffad81`e8271080 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
fffffc05`c0fdafe0 fffff804`63612341     : 00000000`00000000 00000000`00000000 ffffbf09`65a6e2c0 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::UpdatePageTable+0x82
fffffc05`c0fdb270 fffff804`63611852     : 00000000`00000000 00000000`00000000 fffffc05`c0fdb6a0 fffffc05`00000002 : dxgmms2!VIDMM_PAGE_TABLE::UncommitVirtualAddressRange+0x1f1
fffffc05`c0fdb350 fffff804`6363d03e     : 00000000`00000000 ffffbf09`64f4f790 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x422
fffffc05`c0fdb4c0 fffff804`636113bc     : ffffad81`e82e5018 ffffbf09`64f4f790 fffffc05`c0fdb700 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x2bc0e
fffffc05`c0fdb630 fffff804`63614131     : 00000000`00000002 fffffc05`c0fdb790 00000000`00000000 ffffbf09`64f4e340 : dxgmms2!CVirtualAddressAllocator::UncommitVirtualAddressRange+0xf4
fffffc05`c0fdb740 fffff804`636071ba     : 00000000`00000000 00000000`00000071 fffffc05`c0fdb8d0 ffffad81`e8469000 : dxgmms2!VIDMM_GLOBAL::CommitVirtualAddressRangeSystemCommand+0xb1
fffffc05`c0fdb7d0 fffff804`6362be5e     : 00000000`00000001 00000000`00989680 ffffbf09`5b34d130 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x10ea
fffffc05`c0fdba00 fffff804`63635e09     : ffffbf09`5b34d060 ffffad81`e8271001 fffffc05`c0fcda00 00000000`04316100 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xe5e
fffffc05`c0fdbbe0 fffff804`5e517e85     : ffffad81`e8271080 fffff804`63635e00 ffffbf09`5b34d060 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
fffffc05`c0fdbc10 fffff804`5e5fd2a8     : ffff9c01`705eb180 ffffad81`e8271080 fffff804`5e517e30 e51cd250`db108266 : nt!PspSystemThreadStartup+0x55
fffffc05`c0fdbc60 00000000`00000000     : fffffc05`c0fdc000 fffffc05`c0fd6000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VIDMM_GLOBAL::UpdatePageTable+82

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.1140

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  82

FAILURE_BUCKET_ID:  AV_INVALID_dxgmms2!VIDMM_GLOBAL::UpdatePageTable

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {bd3f8caf-ebf1-f63d-d244-5a849cc958ee}

Followup:     MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80260292dfd, Address of the instruction which caused the bugcheck
Arg3: fffff2084ffc5a70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5859

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 17579

    Key  : Analysis.Init.CPU.mSec
    Value: 796

    Key  : Analysis.Init.Elapsed.mSec
    Value: 34042

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80260292dfd

BUGCHECK_P3: fffff2084ffc5a70

BUGCHECK_P4: 0

CONTEXT:  fffff2084ffc5a70 -- (.cxr 0xfffff2084ffc5a70)
rax=000000000000003e rbx=ffffaa043baa0700 rcx=0000000000000005
rdx=0000000000000001 rsi=ffffaa043baa0790 rdi=ffff980851c6ca78
rip=fffff80260292dfd rsp=fffff2084ffc6478 rbp=0000000000000000
 r8=00000000ffffffff  r9=7fff9808518aa2d8 r10=7ffffffffffffffc
r11=fffff2084ffc6478 r12=0000000000000000 r13=ffff98085149a700
r14=0000000000000001 r15=ffff980851578a20
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
Ntfs!wil_details_FeatureReporting_RecordUsageInCache+0x95:
fffff802`60292dfd 8b02            mov     eax,dword ptr [rdx] ds:002b:00000000`00000001=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT: 
fffff208`4ffc6478 ffffaa04`00000000     : fffff802`6026f4fb ffff9808`51c6ca78 fffff802`604e3750 00000000`000000f8 : Ntfs!wil_details_FeatureReporting_RecordUsageInCache+0x95
fffff208`4ffc64a8 fffff802`6026f4fb     : ffff9808`51c6ca78 fffff802`604e3750 00000000`000000f8 ffff9808`51c6ca78 : 0xffffaa04`00000000
fffff208`4ffc64b0 fffff802`6026ee22     : 00000000`000000f8 fffff208`4ffc6720 00000000`00000001 ffffaa04`3baa0700 : Ntfs!NtfsAcquirePagingResourceShared+0x5b
fffff208`4ffc64f0 fffff802`6026cc2c     : ffff9808`51c6ca78 ffff9808`51578a20 ffff9808`00000001 ffff9808`00000000 : Ntfs!NtfsCommonRead+0x1fc2
fffff208`4ffc66f0 fffff802`5be52f55     : ffff9808`50e64ba0 ffff9808`51578a20 ffff9808`51578a20 ffff9808`4a113da0 : Ntfs!NtfsFsdRead+0x1fc
fffff208`4ffc67c0 fffff802`5a106ccf     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
fffff208`4ffc6800 fffff802`5a1048d3     : fffff208`4ffc6890 00000000`00000000 00000000`00000000 fffff802`5c22b3e1 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff208`4ffc6870 fffff802`5be52f55     : ffff9808`51578a20 00000000`0a33e348 fffff208`4ffc6b80 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
fffff208`4ffc68d0 fffff802`5c1fd898     : 00000000`00000000 ffff9808`5149a700 00000000`00000001 ffff9808`441fcc01 : nt!IofCallDriver+0x55
fffff208`4ffc6910 fffff802`5c1e59d9     : ffff9808`00000000 fffff208`4ffc6b80 00000000`00000000 fffff208`4ffc6b80 : nt!IopSynchronousServiceTail+0x1a8
fffff208`4ffc69b0 fffff802`5c0075b8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x599
fffff208`4ffc6a90 00000000`777f1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0a23e728 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777f1cfc


SYMBOL_NAME:  Ntfs!wil_details_FeatureReporting_RecordUsageInCache+95

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.19041.1136

STACK_COMMAND:  .cxr 0xfffff2084ffc5a70 ; kb

BUCKET_ID_FUNC_OFFSET:  95

FAILURE_BUCKET_ID:  0x3B_c0000005_Ntfs!wil_details_FeatureReporting_RecordUsageInCache

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {646fbfa6-78c4-b332-4ae6-e1de1fd63121}

Followup:     MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8035ca92dfd, Address of the instruction which caused the bugcheck
Arg3: fffff306737a2a70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4999

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16226

    Key  : Analysis.Init.CPU.mSec
    Value: 827

    Key  : Analysis.Init.Elapsed.mSec
    Value: 24344

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8035ca92dfd

BUGCHECK_P3: fffff306737a2a70

BUGCHECK_P4: 0

CONTEXT:  fffff306737a2a70 -- (.cxr 0xfffff306737a2a70)
rax=000000000000003e rbx=ffffcf0f17cea170 rcx=0000000000000005
rdx=0000000000000001 rsi=ffffcf0f17cea200 rdi=ffffab8dadd16518
rip=fffff8035ca92dfd rsp=fffff306737a3478 rbp=0000000000000000
 r8=00000000ffffffff  r9=7fffab8daff98598 r10=7ffffffffffffffc
r11=fffff306737a3478 r12=0000000000000000 r13=ffffab8daf7b1530
r14=0000000000000001 r15=ffffab8dae8ba5e0
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
Ntfs!wil_details_FeatureReporting_RecordUsageInCache+0x95:
fffff803`5ca92dfd 8b02            mov     eax,dword ptr [rdx] ds:002b:00000000`00000001=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

STACK_TEXT: 
fffff306`737a3478 ffffab8d`00000000     : fffff803`5ca6bd8b fffff306`737a3701 ffffab8d`add16518 00000000`0000053c : Ntfs!wil_details_FeatureReporting_RecordUsageInCache+0x95
fffff306`737a34a8 fffff803`5ca6bd8b     : fffff306`737a3701 ffffab8d`add16518 00000000`0000053c ffffab8d`add16518 : 0xffffab8d`00000000
fffff306`737a34b0 fffff803`5ca6ee22     : 00000000`0000053c fffff306`737a3720 00000000`00000003 ffffcf0f`17cea170 : Ntfs!NtfsAcquirePagingResourceExclusive+0x5b
fffff306`737a34f0 fffff803`5ca6cc2c     : ffffab8d`add16518 ffffab8d`ae8ba5e0 ffffab8d`00000003 ffffab8d`00000000 : Ntfs!NtfsCommonRead+0x1fc2
fffff306`737a36f0 fffff803`5a052f55     : ffffab8d`afef4400 ffffab8d`ae8ba5e0 ffffab8d`ae8ba5e0 ffffab8d`a4b1ad60 : Ntfs!NtfsFsdRead+0x1fc
fffff306`737a37c0 fffff803`56896ccf     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
fffff306`737a3800 fffff803`568948d3     : fffff306`737a3890 00000000`00000000 00000000`00000000 fffff803`5a42b3e1 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff306`737a3870 fffff803`5a052f55     : ffffab8d`ae8ba5e0 00000000`001bd020 fffff306`737a3b80 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
fffff306`737a38d0 fffff803`5a3fd898     : 00000000`00000000 ffffab8d`af7b1530 00000000`00000001 ffffab8d`a36fe701 : nt!IofCallDriver+0x55
fffff306`737a3910 fffff803`5a3e59d9     : ffffab8d`00000000 fffff306`737a3b80 00000000`00000000 fffff306`737a3b80 : nt!IopSynchronousServiceTail+0x1a8
fffff306`737a39b0 fffff803`5a2075b8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x599
fffff306`737a3a90 00000000`779a1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`000bee28 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779a1cfc


SYMBOL_NAME:  Ntfs!wil_details_FeatureReporting_RecordUsageInCache+95

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.19041.1136

STACK_COMMAND:  .cxr 0xfffff306737a2a70 ; kb

BUCKET_ID_FUNC_OFFSET:  95

FAILURE_BUCKET_ID:  0x3B_c0000005_Ntfs!wil_details_FeatureReporting_RecordUsageInCache

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {646fbfa6-78c4-b332-4ae6-e1de1fd63121}

Followup:     MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80575292dfd, Address of the instruction which caused the bugcheck
Arg3: ffffc18743178a70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4953

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10564

    Key  : Analysis.Init.CPU.mSec
    Value: 827

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13727

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80575292dfd

BUGCHECK_P3: ffffc18743178a70

BUGCHECK_P4: 0

CONTEXT:  ffffc18743178a70 -- (.cxr 0xffffc18743178a70)
rax=000000000000003e rbx=ffffd788bd117170 rcx=0000000000000005
rdx=0000000000000001 rsi=ffffd788bd117200 rdi=ffff888513c19bb8
rip=fffff80575292dfd rsp=ffffc18743179478 rbp=0000000000000000
 r8=00000000ffffffff  r9=7fff888511746998 r10=7ffffffffffffffc
r11=ffffc18743179478 r12=0000000000000000 r13=ffff888513202820
r14=0000000000000001 r15=ffff88851349b010
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
Ntfs!wil_details_FeatureReporting_RecordUsageInCache+0x95:
fffff805`75292dfd 8b02            mov     eax,dword ptr [rdx] ds:002b:00000000`00000001=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MsMpEng.exe

STACK_TEXT: 
ffffc187`43179478 ffffd788`00000000     : fffff805`7526f4fb ffff8885`13c19bb8 fffff805`754e3750 00000000`00001d5c : Ntfs!wil_details_FeatureReporting_RecordUsageInCache+0x95
ffffc187`431794a8 fffff805`7526f4fb     : ffff8885`13c19bb8 fffff805`754e3750 00000000`00001d5c ffff8885`13c19bb8 : 0xffffd788`00000000
ffffc187`431794b0 fffff805`7526ee22     : 00000000`00001000 ffffc187`43179720 00000000`00000001 ffffd788`bd117170 : Ntfs!NtfsAcquirePagingResourceShared+0x5b
ffffc187`431794f0 fffff805`7526cc2c     : ffff8885`13c19bb8 ffff8885`1349b010 ffff8885`00000001 ffff8885`00000000 : Ntfs!NtfsCommonRead+0x1fc2
ffffc187`431796f0 fffff805`71452f55     : ffff8885`122eb520 ffff8885`1349b010 ffff8885`1349b010 ffff8885`08f1dd60 : Ntfs!NtfsFsdRead+0x1fc
ffffc187`431797c0 fffff805`6f0e6ccf     : 00000000`00000000 ffffc187`431798e8 ffffc187`431798a8 ffff8885`08f1dd60 : nt!IofCallDriver+0x55
ffffc187`43179800 fffff805`6f0e48d3     : ffffc187`43179890 00000000`00000000 ffff8885`08f1dd60 fffff805`7182b3e1 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffc187`43179870 fffff805`71452f55     : ffff8885`1349b010 00000000`00000000 ffffc187`43179b80 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffffc187`431798d0 fffff805`717fd898     : 00000000`00000000 ffff8885`13202820 00000000`00000001 ffff8885`07afe201 : nt!IofCallDriver+0x55
ffffc187`43179910 fffff805`717e59d9     : ffff8885`00000000 ffffc187`43179b80 00000000`00000000 ffffc187`43179b80 : nt!IopSynchronousServiceTail+0x1a8
ffffc187`431799b0 fffff805`716075b8     : 00000000`00001130 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x599
ffffc187`43179a90 00007fff`b704ccd4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000093`b3dfeb98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b704ccd4


SYMBOL_NAME:  Ntfs!wil_details_FeatureReporting_RecordUsageInCache+95

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.19041.1136

STACK_COMMAND:  .cxr 0xffffc18743178a70 ; kb

BUCKET_ID_FUNC_OFFSET:  95

FAILURE_BUCKET_ID:  0x3B_c0000005_Ntfs!wil_details_FeatureReporting_RecordUsageInCache

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {646fbfa6-78c4-b332-4ae6-e1de1fd63121}

Followup:     MachineOwner
---------
 
Adsız.png


Dediklerinizi uyguladım, verdiğinizi kuruyorum. RAM frekanslarını elimle değiştirdim BIOS'tan. Başka bir şey yapmam gerekli mi? Bir de RAM frekans hızını 3600 MHz'e çektiğimde gene mavi ekran hatası alır mıyım? Daha önceden alıyordum.

IMG_3331.JPG
 
Şimdilik sadece dediklerimi yapmanız yeterli. Ama eksik yaptınız. Tamamını yapın.

3600 MHz'e alırsanız mavi ekran alabilirsiniz yine. Minidump dosyasında gördüğüm kadarıyla 3333 MHz'te çalışıyordu bellekler, 3200'ün üstüne çıkarmayın bu işlemciyle.

Dediğim her şeyi yapıp tüm sorularıma cevap verin, çözülecektir. Çözülmezse yeni dosyaları atarsınız, incelerim.
 
Şimdilik sadece dediklerimi yapmanız yeterli. Ama eksik yaptınız. Tamamını yapın.

3600 MHz'e alırsanız mavi ekran alabilirsiniz yine. Minidump dosyasında gördüğüm kadarıyla 3333 MHz'te çalışıyordu bellekler, 3200'ün üstüne çıkarmayın bu işlemciyle.

Dediğim her şeyi yapıp tüm sorularıma cevap verin, çözülecektir. Çözülmezse yeni dosyaları atarsınız, incelerim.

Başka ne yapmam gerekli şu an, tam olarak ne kaldı ki?
 
Ekran kartınızın sürücüsünü DDU ile kaldırıp verdiğimi kurun.
https://us.download.nvidia.com/Windows/465.89/465.89-desktop-win10-64bit-international-dch-whql.exe
NVMe SSD'nin modelini belirtin.
...sağlık taraması...
 
Bunu indirin, Firmware güncellemesi varsa yapın. Sonra da oradaki sağlık bilgilerini paylaşın.

Biri gitti, kaldı ikisi.
 
Bir de Memtest84 yapın hocam. Ama tecrübelerime göre sorun depolamada büyük ihtimal.
 

Geri
Yukarı