SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M mavi ekran hatası

The Dude

Femtopat
Katılım
30 Ocak 2021
Mesajlar
3
Daha fazla  
Cinsiyet
Erkek
Merhabalar arkadaşlar, yeni sistem aldım ve arada mavi erkan hatası alıyorum. Ekran kartı driverını silip 0'dan tekrar yükledim. Ama aynı hata koduyla tekrar mavi erkan aldım. Daha sonra başka bir kodla yine mavi ekran aldım.Bu sefer memory management hatası yazıyordu. Memtest86 testi yaptım ve herhangi bir hata çıkmadı. Minidump dosyalarının google drive bağlantısını ve sistem özelliklerini aşağıda veriyorum. Yardımcı olabilirseniz çok sevinirim. Memory Management ve system_thread_exception_not_handled BSOD hatası.


 
Sil:

F60c BETA, F1 sürümüne dön.


OC yaptıysan sıfırla, XMP açıksa kapat.

Rehberi uygula:


Ekran kartı sürücünü de kaldırıp tekrar kur.


Klavye ve fare dışındaki USB cihazlarını çıkart ve yazılımları varsa sil.
 
Belleklere test yapın.

Ekran kartınızın sürücüsünü DDU ile kaldırıp verdiğim sürücüyü kurun.

BattlEye'ı kaldırın. Klavye/fare dışındaki takılı aygıtları çıkarın (kontrolcü dahil). VPN servisini kaldırın. EAC ve Afterburner'ı da kaldırın. İşletim sisteminizi 20H2 sürümüne güncelleyin.

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8028eec0e36, The address that the exception occurred at
Arg3: ffffe58616d54ef8, Exception Record Address
Arg4: ffffe58616d54730, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 6484

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 47017

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8028eec0e36

BUGCHECK_P3: ffffe58616d54ef8

BUGCHECK_P4: ffffe58616d54730

EXCEPTION_RECORD:  ffffe58616d54ef8 -- (.exr 0xffffe58616d54ef8)
ExceptionAddress: fffff8028eec0e36 (nvlddmkm+0x00000000007c0e36)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048

CONTEXT:  ffffe58616d54730 -- (.cxr 0xffffe58616d54730)
rax=0000000000000000 rbx=0000000000000000 rcx=ffff988c568dc1d8
rdx=0000000000000000 rsi=ffffe78178845c28 rdi=ffff988c56846000
rip=fffff8028eec0e36 rsp=ffffe58616d55130 rbp=ffff988c56867f20
 r8=0000000000000004  r9=0000000000000000 r10=0000000000000000
r11=ffffe78178845c94 r12=0000000000000000 r13=0000000000000000
r14=0000000000000002 r15=ffff988c56846180
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nvlddmkm+0x7c0e36:
fffff802`8eec0e36 ff5048          call    qword ptr [rax+48h] ds:002b:00000000`00000048=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8027d4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8027d40f330: Unable to get Flags value from nt!KdVersionBlock
fffff8027d40f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000048

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000048

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffffe586`16d55130 00000000`00000000     : fffff802`8e869543 00000000`00000001 fffff802`7cbd3608 00000000`000000ff : nvlddmkm+0x7c0e36


SYMBOL_NAME:  nvlddmkm+7c0e36

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffffe58616d54730 ; kb

BUCKET_ID_FUNC_OFFSET:  7c0e36

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------



SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804368b0e36, The address that the exception occurred at
Arg3: ffffd583aff52ef8, Exception Record Address
Arg4: ffffd583aff52730, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 5358

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 40493

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff804368b0e36

BUGCHECK_P3: ffffd583aff52ef8

BUGCHECK_P4: ffffd583aff52730

EXCEPTION_RECORD:  ffffd583aff52ef8 -- (.exr 0xffffd583aff52ef8)
ExceptionAddress: fffff804368b0e36 (nvlddmkm+0x00000000007c0e36)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048

CONTEXT:  ffffd583aff52730 -- (.cxr 0xffffd583aff52730)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc304331dc1d8
rdx=0000000000000000 rsi=ffff8b06ec94799b rdi=ffffc30433146000
rip=fffff804368b0e36 rsp=ffffd583aff53130 rbp=ffffc30433167f20
 r8=0000000000000007  r9=0000000000000000 r10=0000000000000000
r11=ffff8b06ec947a07 r12=0000000000000000 r13=0000000000000000
r14=0000000000000002 r15=ffffc30433146180
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nvlddmkm+0x7c0e36:
fffff804`368b0e36 ff5048          call    qword ptr [rax+48h] ds:002b:00000000`00000048=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80420efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80420e0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80420e0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000048

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000048

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffffd583`aff53130 00000000`00000000     : fffff804`36259543 00000000`00000001 fffff804`205d3608 00000000`000000ff : nvlddmkm+0x7c0e36


SYMBOL_NAME:  nvlddmkm+7c0e36

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffffd583aff52730 ; kb

BUCKET_ID_FUNC_OFFSET:  7c0e36

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------



SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804454d0e36, The address that the exception occurred at
Arg3: ffff948767c27ef8, Exception Record Address
Arg4: ffff948767c27730, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 6733

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 48926

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff804454d0e36

BUGCHECK_P3: ffff948767c27ef8

BUGCHECK_P4: ffff948767c27730

EXCEPTION_RECORD:  ffff948767c27ef8 -- (.exr 0xffff948767c27ef8)
ExceptionAddress: fffff804454d0e36 (nvlddmkm+0x00000000007c0e36)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048

CONTEXT:  ffff948767c27730 -- (.cxr 0xffff948767c27730)
rax=0000000000000000 rbx=0000000000000000 rcx=ffff960841fdc1d8
rdx=0000000000000000 rsi=ffffd98f2f3df9a6 rdi=ffff960841f46000
rip=fffff804454d0e36 rsp=ffff948767c28130 rbp=ffff960841f67f20
 r8=0000000000000002  r9=0000000000000000 r10=0000000000000000
r11=ffffd98f2f3dfa12 r12=0000000000000000 r13=0000000000000000
r14=0000000000000002 r15=ffff960841f46180
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nvlddmkm+0x7c0e36:
fffff804`454d0e36 ff5048          call    qword ptr [rax+48h] ds:002b:00000000`00000048=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80431efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80431e0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80431e0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000048

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000048

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffff9487`67c28130 00000000`00000000     : fffff804`44e79543 00000000`00000001 fffff804`315d3608 00000000`000000ff : nvlddmkm+0x7c0e36


SYMBOL_NAME:  nvlddmkm+7c0e36

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xffff948767c27730 ; kb

BUCKET_ID_FUNC_OFFSET:  7c0e36

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------




MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008886, The subtype of the bugcheck.
Arg2: ffffca80089fcdc0
Arg3: ffffcab00b77de20
Arg4: 0000000000000500

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5640

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8818

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 8886

BUGCHECK_P2: ffffca80089fcdc0

BUGCHECK_P3: ffffcab00b77de20

BUGCHECK_P4: 500

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  runonce.exe

STACK_TEXT: 
fffff98f`f4ac7548 fffff803`2cc17ef0     : 00000000`0000001a 00000000`00008886 ffffca80`089fcdc0 ffffcab0`0b77de20 : nt!KeBugCheckEx
fffff98f`f4ac7550 fffff803`2cc16f60     : ffffca80`00000002 0a000000`00000000 00000000`002dfef4 00000000`00000000 : nt!MiUnlinkPageFromList+0xcb0
fffff98f`f4ac75e0 fffff803`2cc16544     : fffff98f`f4ac7880 fffff98f`f4ac7920 0000000f`ffffffff 00000002`dfef48a0 : nt!MiHandleTransitionFault+0x180
fffff98f`f4ac7660 fffff803`2cc15f96     : fffff98f`f4ac7880 00000000`00000000 ffffca80`01ce11d0 00000000`00000002 : nt!MiResolveTransitionFault+0x424
fffff98f`f4ac7720 fffff803`2cc0e7a5     : fffff98f`f4ac7880 00000000`00000002 fffff98f`f4ac7860 fffff98f`f4ac7a20 : nt!MiResolveProtoPteFault+0x1236
fffff98f`f4ac7820 fffff803`2cc0c6e9     : 00000000`00000100 00000000`00000100 00000000`c0000016 ffffe48f`0c9c5a70 : nt!MiDispatchFault+0x3d5
fffff98f`f4ac7960 fffff803`2ce0395e     : 00000000`6f972f68 fffff98f`f4ac7b80 00000000`02a0dab8 00000000`0233e3d8 : nt!MmAccessFault+0x189
fffff98f`f4ac7b00 00000000`775e15f0     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0237d7c0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775e15f0


SYMBOL_NAME:  nt!MiUnlinkPageFromList+cb0

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.746

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  cb0

FAILURE_BUCKET_ID:  0x1a_8886_nt!MiUnlinkPageFromList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf}

Followup:     MachineOwner
---------



IRQL_GT_ZERO_AT_SYSTEM_SERVICE (4a)
Returning to usermode from a system call at an IRQL > PASSIVE_LEVEL.
Arguments:
Arg1: 00007ffb239ec074, Address of system function (system call routine)
Arg2: 0000000000000002, Current IRQL
Arg3: 0000000000000000, 0
Arg4: fffff688f69d9b80, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6328

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8902

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4a

BUGCHECK_P1: 7ffb239ec074

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff688f69d9b80

PROCESS_NAME:  r5apex.exe

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
fffff688`f69d9948 fffff803`41207769     : 00000000`0000004a 00007ffb`239ec074 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff688`f69d9950 fffff803`41207633     : 00000000`00000000 00000000`00000000 00007ffb`215a7740 00007ff6`56c5d200 : nt!KiBugCheckDispatch+0x69
fffff688`f69d9a90 00007ffb`239ec074     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
000000de`4a14fa68 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`239ec074


SYMBOL_NAME:  nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.746

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1fe

FAILURE_BUCKET_ID:  RAISED_IRQL_FAULT_r5apex.exe_nt!KiSystemServiceExitPico

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d0115d15-b4a0-ee6d-352a-b65331547b13}

Followup:     MachineOwner
---------
 
Hızlı dönüşünüz için teşekkür ederim. MSI Afterburner sebep oluyor mu buna? Bir de bu problemlerin anakarttan kaynaklı olduğundan şüpheleniyorum. Bu model anakrtlarla ilgili genel bir sıkıntı var mı bildiğiniz? Dediklerinizi deneyeceğim sağ olun.
 
Sorunun anakart ile ilgili olduğunu sanmıyorum.

Bir sürü şey dedim, sorunun asıl sebebi Bitdefender veya MSI Afterburner gibi.

@Bora Dere, arkadaş Memtest86 yaptığını ve sıkıntı çıkmadığını söylemiş.
 
@Bora Dere, arkadaş Memtest86 yaptığını ve sıkıntı çıkmadığını söylemiş.
Ekran kartının sürücüsünü silip yüklediğini de söylemiş, gördüğümüzü söylüyoruz işte.

Çorba RAM vakası da olabilir. Konu sahibi, hiçbiri işe yaramazsa RAM'lerin sadece birisini takıp sistemi öyle kullanın bakalım.
 

Şu an bilgisayarımın başında değilim dediklerinizi deneyeceğim. MSI Afterburner alternatifi bir program önerebilir misiniz?


Teşekkür ederim aynen onları yaptım ya.
 
Hatanın uygulama silmek ile çözüleceğini sanmıyorum. Memtest sorunsuz çıkmış olsa bile RAM kaynaklı uyuşmazlıklar BSOD'u tetikliyor olabilir.

XMP kapalıyken kullanmayı deneyin, oyun falan oynayıp test edin.
Çorba RAM vakası da olabilir. Konu sahibi, hiçbiri işe yaramazsa RAM'lerin sadece birisini takıp sistemi öyle kullanın bakalım.

Ayrı ayrı iki modü almış, bununla alakalı olabilir bence de.
 
@SideWinder raporda Comodo, Anti-Cheat yazılımına engel olmuş ve mavi ekrana sebep olmuş diye gözüküyor. Şahsi fikrim öyle en azından. XMP kapatmasını da söyledim.

@The Dude, CPU-Z indirip SPD sekmesinden "Slot 1" ve "Slot 2"nin ekran görüntüsünü atar mısın?
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…