Windows 10 çeşitli mavi ekran hataları

Öncelikle Memtest86 ile belleklerini test et.

Sonra ekran kartı sürücüsünü DDU ile kaldır ve en güncel sürücüyü yükle.

Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff9b00eb24b0b0
Arg3: 00000000377a5ba0
Arg4: fffff80668a9c258

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4296

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RED-PC

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 89737

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffff9b00eb24b0b0

BUGCHECK_P3: 377a5ba0

BUGCHECK_P4: fffff80668a9c258

TRAP_FRAME:  ffff9b00eb24b0b0 -- (.trap 0xffff9b00eb24b0b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000001021004
rdx=ffffe10b377a5c60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80668a9c258 rsp=00000000377a5ba0 rbp=ffffe10b377a5bd1
 r8=0000000000000007  r9=0000000000000901 r10=ffffd10f2e66a000
r11=ffffe10b377a5a20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nvlddmkm+0x32c258:
fffff806`68a9c258 415f            pop     r15
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

BAD_STACK_POINTER:  00000000377a5ba0

STACK_TEXT: 
ffff9b00`eb24af68 fffff806`4a1d47e9     : 00000000`0000007f 00000000`00000008 ffff9b00`eb24b0b0 00000000`377a5ba0 : nt!KeBugCheckEx
ffff9b00`eb24af70 fffff806`4a1cf643     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9b00`eb24b0b0 fffff806`68a9c258     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`377a5ba0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x32c258


SYMBOL_NAME:  nvlddmkm+32c258

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  32c258

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nvlddmkm!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a6a9f385-3944-d532-1786-ddbcad5847ca}

Followup:     MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff8050f8e96005, Address of the instruction which caused the bugcheck
Arg3: ffffd481f8066d10, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2015

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RED-PC

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6202

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff8050f8e96005

BUGCHECK_P3: ffffd481f8066d10

BUGCHECK_P4: 0

CONTEXT:  ffffd481f8066d10 -- (.cxr 0xffffd481f8066d10)
rax=ffff803a50510240 rbx=ffff802944446330 rcx=0000000221ee0048
rdx=0000000000000000 rsi=0000000000000318 rdi=0000000000000000
rip=ffff8050f8e96005 rsp=ffffd481f8067700 rbp=ffffd481f8067a80
 r8=ffffd481f8067500  r9=0000000000000000 r10=ffffab0a620c1e60
r11=ffffd481f80674c0 r12=0000000000000001 r13=0000000000000001
r14=ffff803a50510240 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
win32kfull!xxxRealInternalGetMessage+0x1d85:
ffff8050`f8e96005 663b7e1a        cmp     di,word ptr [rsi+1Ah] ds:002b:00000000`00000332=????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT: 
ffffd481`f8067700 ffff8050`f8e94207     : ffffd481`f8067920 00000000`00000000 00000000`00000000 00000000`0f8ce5c0 : win32kfull!xxxRealInternalGetMessage+0x1d85
ffffd481`f80678e0 fffff804`2a5d4215     : 00000000`0f8ce5c0 ffffab0a`69756080 ffffd481`f80679a8 00000000`0a54c000 : win32kfull!NtUserPeekMessage+0x157
ffffd481`f8067990 00007fff`d21cfd34     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0f8ce588 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`d21cfd34


SYMBOL_NAME:  win32kfull!xxxRealInternalGetMessage+1d85

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.18362.1049

STACK_COMMAND:  .cxr 0xffffd481f8066d10 ; kb

BUCKET_ID_FUNC_OFFSET:  1d85

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!xxxRealInternalGetMessage

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {39ebc5cc-b3eb-e530-cf38-b3c453009f0b}

Followup:     MachineOwner
---------


KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff802729ca887, The address that the exception occurred at
Arg3: ffffbe83ecbd3b88, Parameter 0 of the exception
Arg4: ffffe6008a667930, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2202

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RED-PC

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17028

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff802729ca887

BUGCHECK_P3: ffffbe83ecbd3b88

BUGCHECK_P4: ffffe6008a667930

WRITE_ADDRESS: fffff80272d713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80272c283b8: Unable to get Flags value from nt!KdVersionBlock
fffff80272c283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffe6008a667930

EXCEPTION_PARAMETER1:  ffffbe83ecbd3b88

EXCEPTION_PARAMETER2:  ffffe6008a667930

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

BAD_STACK_POINTER:  ffffe6008a667088

STACK_TEXT: 
ffffe600`8a667088 fffff802`72aa5d97     : 00000000`0000001e ffffffff`c0000005 fffff802`729ca887 ffffbe83`ecbd3b88 : nt!KeBugCheckEx
ffffe600`8a667090 fffff802`729da576     : fffff802`729ca887 fffff802`7290c1fb ffffbe83`ecbd3dc0 ffffe600`8a667930 : nt!KiFatalFilter+0x1f
ffffe600`8a6670d0 fffff802`7299d989     : fffff802`00000002 ffffbe83`ecbd4fd0 ffffbe83`ecbcf000 ffffbe83`ecbd6000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffffe600`8a667110 fffff802`729cb78f     : ffffbe83`ecbd4fd0 ffffe600`8a6676f0 00000000`00000000 00000000`0010001f : nt!_C_specific_handler+0xa9
ffffe600`8a667180 fffff802`72889555     : 00000000`00000000 00000000`00000000 ffffe600`8a6676f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
ffffe600`8a6671b0 fffff802`7288d66e     : ffffbe83`ecbd3b88 ffffe600`8a667e30 ffffbe83`ecbd3b88 ffff8f84`80608200 : nt!RtlDispatchException+0x4a5
ffffe600`8a667900 fffff802`729c3812     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffe600`8a667fb0 fffff802`729c37e0     : fffff802`729d4916 00000000`00000001 00000000`00000001 ffff8f84`8eb19cc0 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffbe83`ecbd3a48 fffff802`729d4916     : 00000000`00000001 00000000`00000001 ffff8f84`8eb19cc0 00000000`00000009 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffbe83`ecbd3a50 fffff802`729d06a0     : 00000000`000000f0 00000000`00000001 00000000`abef0002 00000011`8edd4a00 : nt!KiExceptionDispatch+0x116
ffffbe83`ecbd3c30 fffff802`729ca887     : 00000000`00000000 fffff802`75970b9d 00000000`00000004 00000000`00000002 : nt!KiGeneralProtectionFault+0x320
ffffbe83`ecbd3dc0 fffff802`75970b9d     : 00000000`00000004 00000000`00000002 00000000`00000004 ffffbe83`ecbd3f80 : nt!ExpInterlockedPopEntrySListFault
ffffbe83`ecbd3dd0 fffff802`75972cf2     : 00000000`0000011a ffff8f84`8c5434e0 ffff8f84`00000915 ffff8f84`00000000 : tcpip!WfpProcessInTransportStackIndication+0x12d
ffffbe83`ecbd4270 fffff802`759a5911     : ffff8f84`8dcb3e00 ffffbe83`ecbd44d0 ffffbe83`ecbd4488 ffff8f84`8988e4c0 : tcpip!InetInspectReceiveDatagram+0x2c2
ffffbe83`ecbd43d0 fffff802`759a4d3e     : ffff8f84`894af040 ffff8f84`8dcb3e71 ffffbe83`ecbd4910 00000000`00000000 : tcpip!UdpDeliverDatagrams+0x181
ffffbe83`ecbd4810 fffff802`759a49c0     : ffff8f84`894af040 00000000`00000000 ffff8f84`807cf008 ffffbe83`ecbd4f69 : tcpip!UdpReceiveDatagrams+0x36e
ffffbe83`ecbd4c00 fffff802`7594a46a     : 00000000`00000000 00000000`00000000 ffff8f84`85eecc60 00000000`00000000 : tcpip!UdpNlClientReceiveDatagrams+0x10
ffffbe83`ecbd4c30 fffff802`75961a3a     : ffff8f84`80be7420 ffff8f84`85ecc850 fffff802`75951211 ffffbe83`ecbd5001 : tcpip!IpFlcReceivePreValidatedPackets+0xc4a
ffffbe83`ecbd4ea0 fffff802`7284f698     : ffffbe83`ecbd5180 00000000`00000002 ffff8f84`805cd040 ffffbe83`ecbd5108 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x16a
ffffbe83`ecbd4fd0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78


SYMBOL_NAME:  tcpip!WfpProcessInTransportStackIndication+12d

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

IMAGE_VERSION:  10.0.18362.1049

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  12d

FAILURE_BUCKET_ID:  0x1E_c0000005_STACKPTR_ERROR_tcpip!WfpProcessInTransportStackIndication

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {935035f8-2c56-8f82-0a1d-4678ab5c5684}

Followup:     MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff803578ad967, Address of the instruction which caused the bugcheck
Arg3: ffff938b7a5d65a0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RED-PC

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 36060

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff803578ad967

BUGCHECK_P3: ffff938b7a5d65a0

BUGCHECK_P4: 0

CONTEXT:  ffff938b7a5d65a0 -- (.cxr 0xffff938b7a5d65a0)
rax=0000000000000000 rbx=ffffbf0333026be0 rcx=ffffe40c0b7a8590
rdx=0000000056706e50 rsi=ffffe40c05ccede0 rdi=ffffbf0333026be0
rip=fffff803578ad967 rsp=ffff938b7a5d6f98 rbp=ffff938b7a5d7201
 r8=ffff938b7a5d7100  r9=7ffff80357c5f0a0 r10=7ffffffffffffffc
r11=ffff938b7a5d70e8 r12=ffff800000000000 r13=0000000000000000
r14=0000000000000002 r15=0000000000000004
iopl=0         nv up ei ng nz ac pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050292
nt!ExFreeHeapPool+0x17:
fffff803`578ad967 0f29b424c0000000 movaps  xmmword ptr [rsp+0C0h],xmm6 ss:0018:ffff938b`7a5d7058=ffffe40c0b7a89680000000000000000
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Razer Synapse Service.exe

STACK_TEXT: 
ffff938b`7a5d6f98 fffff803`57b6e0a9     : 00000000`00000000 ffffe40c`0a266040 00000000`00000002 ffffbf03`33026be0 : nt!ExFreeHeapPool+0x17
ffff938b`7a5d70b8 fffff803`57f32bcf     : ffff938b`7a5d7201 ffffe40c`00000000 ffffe40c`05ccede0 fffff803`00000000 : nt!ExFreePool+0x9
ffff938b`7a5d70e8 fffff803`5797456f     : fffff803`57c61220 ffffe40c`05ccede0 fffff803`57c61220 fffff803`57c61220 : nt!PnpDereferenceNotify+0x87
ffff938b`7a5d7118 fffff803`57f457cb     : ffffe40c`03e09530 ffff938b`7a5d7248 ffffe40c`05ccede0 ffff9a81`81786180 : nt!PnpUnregisterPlugPlayNotification+0x7b
ffff938b`7a5d7168 fffff803`5a59abca     : 00000000`00000004 00000000`00000002 00000000`00000000 ffffbf03`33026be0 : nt!IoUnregisterPlugPlayNotificationEx+0xb
ffff938b`7a5d7198 fffff803`5a599675     : ffffe40c`03e09530 00000000`00000000 ffffe40c`05ccede0 ffffe40c`03e09530 : Wdf01000!FxIoTargetRemote::UnregisterForPnpNotification+0x1e [minkernel\wdf\framework\shared\targets\general\km\fxiotargetremotekm.cpp @ 195]
ffff938b`7a5d71c8 fffff803`5a595ba8     : 00001bf3`fc1f6a00 ffffe40c`060d6200 00000000`00000000 ffffe40c`05ccede0 : Wdf01000!FxIoTargetRemote::Close+0x311 [minkernel\wdf\framework\shared\targets\general\fxiotargetremote.cpp @ 648]
ffff938b`7a5d7288 fffff803`72a21e41     : ffffe40c`03e09530 00001bf3`fc1f6ac8 ffffe40c`064952c0 ffffe40c`0a266360 : Wdf01000!imp_WdfIoTargetClose+0x78 [minkernel\wdf\framework\shared\targets\general\fxiotargetapi.cpp @ 635]
ffff938b`7a5d72c8 ffffe40c`03e09530     : 00001bf3`fc1f6ac8 ffffe40c`064952c0 ffffe40c`0a266360 fffff803`578a1a5d : RzDev_0C00+0x1e41
ffff938b`7a5d72d0 00001bf3`fc1f6ac8     : ffffe40c`064952c0 ffffe40c`0a266360 fffff803`578a1a5d 00000000`00000000 : 0xffffe40c`03e09530
ffff938b`7a5d72d8 ffffe40c`064952c0     : ffffe40c`0a266360 fffff803`578a1a5d 00000000`00000000 fffff803`6ea433ea : 0x00001bf3`fc1f6ac8
ffff938b`7a5d72e0 ffffe40c`0a266360     : fffff803`578a1a5d 00000000`00000000 fffff803`6ea433ea 00000000`00000000 : 0xffffe40c`064952c0
ffff938b`7a5d72e8 fffff803`578a1a5d     : 00000000`00000000 fffff803`6ea433ea 00000000`00000000 ffffe40b`fa8d10c0 : 0xffffe40c`0a266360
ffff938b`7a5d72f0 ffff938b`7a5d7430     : 00000000`00000001 ffffe40c`00000000 fffff803`00000000 00000000`00000001 : nt!ExAcquirePushLockExclusiveEx+0xed
ffff938b`7a5d7330 00000000`00000001     : ffffe40c`00000000 fffff803`00000000 00000000`00000001 ffff9a81`81786100 : 0xffff938b`7a5d7430
ffff938b`7a5d7338 ffffe40c`00000000     : fffff803`00000000 00000000`00000001 ffff9a81`81786100 fffff803`579c9b00 : 0x1
ffff938b`7a5d7340 fffff803`00000000     : 00000000`00000001 ffff9a81`81786100 fffff803`579c9b00 00000000`00000000 : 0xffffe40c`00000000
ffff938b`7a5d7348 00000000`00000001     : ffff9a81`81786100 fffff803`579c9b00 00000000`00000000 00000000`00000000 : 0xfffff803`00000000
ffff938b`7a5d7350 ffff9a81`81786100     : fffff803`579c9b00 00000000`00000000 00000000`00000000 00000000`faf82980 : 0x1
ffff938b`7a5d7358 fffff803`579c9b00     : 00000000`00000000 00000000`00000000 00000000`faf82980 ffffe40c`068cf080 : 0xffff9a81`81786100
ffff938b`7a5d7360 00001bf4`0507d788     : ffff938b`7a5d7400 fffff803`6ea41890 00000000`c0000001 ffffe40c`88883140 : nt!SwapContext+0x140
ffff938b`7a5d73a0 ffff938b`7a5d7400     : fffff803`6ea41890 00000000`c0000001 ffffe40c`88883140 00000000`00000000 : 0x00001bf4`0507d788
ffff938b`7a5d73a8 fffff803`6ea41890     : 00000000`c0000001 ffffe40c`88883140 00000000`00000000 00000000`00000000 : 0xffff938b`7a5d7400
ffff938b`7a5d73b0 00000000`c0000001     : ffffe40c`88883140 00000000`00000000 00000000`00000000 00000000`00000000 : RzCommon+0x1890
ffff938b`7a5d73b8 ffffe40c`88883140     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff938b`7a5d7430 : 0xc0000001
ffff938b`7a5d73c0 00000000`00000000     : 00000000`00000000 00000000`00000000 ffff938b`7a5d7430 00001bf4`0507d788 : 0xffffe40c`88883140


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.18362.1049

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xffff938b7a5d65a0 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExFreePool

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c9913766-80de-cdf5-a1a8-15c856d3f064}

Followup:     Pool_corruption
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80461c67a22, Address of the instruction which caused the bugcheck
Arg3: ffffdd01fa1b3930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RED-PC

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15680

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80461c67a22

BUGCHECK_P3: ffffdd01fa1b3930

BUGCHECK_P4: 0

CONTEXT:  ffffdd01fa1b3930 -- (.cxr 0xffffdd01fa1b3930)
rax=0000000000000000 rbx=ffff96800bdd5360 rcx=ffdfb701aa08d620
rdx=0a000003f4712921 rsi=8000000000000000 rdi=ffdfb701aa08d620
rip=fffff80461c67a22 rsp=fffff60ae8bb6fa0 rbp=0000000000140000
 r8=0000000020000006  r9=fffffa64854bdc20 r10=000000000033954d
r11=fffff60ae8bb6fa0 r12=0000000000000005 r13=7fffffffffffffff
r14=fffffa64854bdc20 r15=000000000000000f
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!MiReadyStandbyPageForActive+0xc2:
fffff804`61c67a22 488917          mov     qword ptr [rdi],rdx ds:002b:ffdfb701`aa08d620=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

BAD_STACK_POINTER:  ffffdd01fa1b2ff8

STACK_TEXT: 
fffff60a`e8bb6fa0 fffff804`61c678e6     : ffff9680`0bdd5360 00000000`0000000c 00000000`0000000c ffffb701`aa08d620 : nt!MiReadyStandbyPageForActive+0xc2
fffff60a`e8bb6fd0 fffff804`61c656d5     : 00000000`00000001 ffff9680`085cb2b0 fffffa64`854bdc00 00000000`00000000 : nt!MiUnlinkStandbyBatch+0x186
fffff60a`e8bb7010 fffff804`61c63abf     : 00000000`0000fac0 00000000`8fac0000 00000000`00040000 ffffa20a`cb7b5400 : nt!MmCheckCachedPageStates+0x1145
fffff60a`e8bb7210 fffff804`621e29d9     : 00000000`8fac0000 00000000`00000000 00000000`00000001 fffff60a`e8bb7320 : nt!CcFetchDataForRead+0x8f
fffff60a`e8bb7270 fffff804`61c63865     : ffffa20a`cb7b80d8 00000000`8fac0000 00000000`00040000 ffffa20a`cc386001 : nt!CcMapAndCopyFromCache+0xd9
fffff60a`e8bb7310 fffff804`661f2009     : 00000000`00000000 00000000`00000000 00000000`00400000 ffffa20a`cb6969c8 : nt!CcCopyReadEx+0x135
fffff60a`e8bb73b0 fffff804`662071da     : 00000001`0111051f ffffa20a`ca202370 fffff60a`e8bb7610 ffffa20a`cf83b010 : Ntfs!NtfsCachedRead+0x179
fffff60a`e8bb7420 fffff804`6620641c     : fffff60a`e8bb7620 ffffa20a`cf83b010 fffff60a`e8bb7620 ffffa20a`cb6969c8 : Ntfs!NtfsCommonRead+0xbaa
fffff60a`e8bb75e0 fffff804`61c99db9     : ffffa20a`cc21f9a0 ffffa20a`cf83b010 ffffa20a`cf83b758 00000000`00000000 : Ntfs!NtfsFsdRead+0x20c
fffff60a`e8bb76a0 fffff804`64b155de     : 00000000`00000000 fffff60a`e8bb7780 ffffa20a`cf83b010 fffff60a`e8bb7790 : nt!IofCallDriver+0x59
fffff60a`e8bb76e0 fffff804`64b13f16     : fffff60a`e8bb7780 00000000`00000000 00000000`00000001 fffff60a`e8bb7820 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
fffff60a`e8bb7760 fffff804`61c99db9     : ffffa20a`cf83b010 00000000`000007d8 fffff60a`00000000 fffff60a`e8bb7900 : FLTMGR!FltpDispatch+0xb6
fffff60a`e8bb77c0 fffff804`62206085     : 00000000`00000000 ffffa20a`ca202370 ffffa20a`ca2023c0 ffffa20a`ca202370 : nt!IofCallDriver+0x59
fffff60a`e8bb7800 fffff804`6220225f     : ffffa20a`00000000 00000000`00000000 00000000`00000000 fffff60a`e8bb7a80 : nt!IopSynchronousServiceTail+0x1a5
fffff60a`e8bb78a0 fffff804`61dd4215     : 00000041`5194f2f0 00000000`00000000 00000000`00000000 000001b5`56197b90 : nt!NtReadFile+0x59f
fffff60a`e8bb7990 00007ff8`c29fc134     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000041`5194e898 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c29fc134


SYMBOL_NAME:  nt!MiReadyStandbyPageForActive+c2

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.1049

STACK_COMMAND:  .cxr 0xffffdd01fa1b3930 ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  c2

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!MiReadyStandbyPageForActive

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {800e382a-6b78-26e4-1cbd-382bbdcbefe3}

Followup:     MachineOwner
---------
 
Tamamdır teşekkür ederim. Hepsini deneyip dönüş yapıcam sizlere. Gördüğüm kadarıyla memtest uzun sürecekmiş.
Şu an durum bu şekilde fazla error var gözüküyor. Bunun onarımı falan var mı yada ram mi bozuldu, çok fazla teknik bilgim yokta.
 

Dosya Ekleri

  • 20200904_180321.jpg
    20200904_180321.jpg
    1,3 MB · Görüntüleme: 47
Son düzenleme:
Biostan Xmp açtığım zaman mavi ekran veriyor kapalıyken sorun yok. ramler 2300 de çalışıyor yani şu an anakartı gidip vatanda test ettiricem düzelmezse ramleri garantiye yollıyıcam.İlginize teşekkürler :D
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı