Windows 10 Critical Procces Died Hatası

  • Konuyu başlatan Juxss
  • Başlangıç Tarihi
  • Mesaj 53
  • Görüntüleme 4.009

Juxss

Megapat
Katılım
8 Ocak 2016
Mesajlar
135
Daha fazla  
Cinsiyet
Erkek
Merhaba arkadaşlar.

Bilgisayarım'da normal takılırken. Critical Procces Died Hatasını almıyorum. Fakat oyuna girdiğimde heran gibi yüklü bir işlem yaptığımda Critical Procces Died Hatasını alıyorum. Bilgisayar kendini resetleyip açıldıktan sonra "reboot and select proper boot device or ınsert boot media in selected boot device and press a key" Siyah ekranda bu hatayı alıyorum. BIOS'a giriyorum. SSD Gözükmüyor. Sonra kapatıp açıyorum SSD geliyor. "Boot 1" Alıyorum. SSD bilgisayar açılıyor. sonra yine Bir işlem yapmaya çalıştığımızda aynı sorunu yaşıyorum. Bilgisi olan varsa yardım edebilecek şimdiden çok teşekkür ederim.

Minidump Dosyaları Aşağıdadır.
 
Son düzenleme:
SSD marka model nedir?

Hız aşırtmayı kapatır mısın.
Bellekleri orijinal 2400MHz hızlarına çeker misin.

Depolama birimi veya bellek hataları gözüküyor fakat işlemciye ve belleklere yaptığın hız aşırtma nedenli de olabilir.

MSI Afterburner, Intel(R) Extreme Tuning Utility Performance Tuning, Cheat Engine yazılımlarını kaldır.

Memtest86 testi yap, test temiz çıkarsa problemli donanım SSD olabilir.
Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffab81dfacd1b0
Arg3: 000000000000c824
Arg4: fffff8017764edc9

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  Default string

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F23

BIOS_DATE:  06/07/2017

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  X99-UD4-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: ffffab81dfacd1b0

BUGCHECK_P3: c824

BUGCHECK_P4: fffff8017764edc9

BUGCHECK_STR:  0x7f_8

TRAP_FRAME:  ffffab81dfacd1b0 -- (.trap 0xffffab81dfacd1b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000028 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017764edc9 rsp=000000000000c824 rbp=ffffc28b8b2d86f0
r8=00000000ffffffff  r9=7fff9502fb0585f8 r10=7ffffffffffffffc
r11=ffffc28b8b2d80e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!CcMapAndCopyInToCache+0x789:
fffff801`7764edc9 0085c00f8825    add     byte ptr [rbp+25880FC0h],al ss:0018:ffffc28b`b0b596b0=??
Resetting default scope

CPU_COUNT: c

CPU_MHZ: ce4

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3f

CPU_STEPPING: 2

CPU_MICROCODE: 6,3f,2,0 (F,M,S,R)  SIG: 40'00000000 (cache) 40'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  esrv_svc.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-22-2020 23:15:51.0299

ANALYSIS_VERSION: 10.0.18362.1 x86fre

BAD_STACK_POINTER:  000000000000c824

MISALIGNED_IP:
nt!CcMapAndCopyInToCache+789
fffff801`7764edc9 0085c00f8825    add     byte ptr [rbp+25880FC0h],al

LAST_CONTROL_TRANSFER:  from fffff801777d32e9 to fffff801777c14e0

STACK_TEXT:
ffffab81`dfacd068 fffff801`777d32e9 : 00000000`0000007f 00000000`00000008 ffffab81`dfacd1b0 00000000`0000c824 : nt!KeBugCheckEx
ffffab81`dfacd070 fffff801`777ce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffab81`dfacd1b0 fffff801`7764edc9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
00000000`0000c824 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcMapAndCopyInToCache+0x789


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8017764eb04 - nt!CcMapAndCopyInToCache+4c4
    [ 19:bc ]
1 error : !nt (fffff8017764eb04)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BYTE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BYTE

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BYTE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BYTE

TARGET_TIME:  2020-01-17T21:32:58.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2623

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_byte

FAILURE_ID_HASH:  {ad110d6a-3b33-2c0a-c931-570eae1ba92d}

Followup:     memory_corruption
---------
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8060bc8fd74, Virtual address for the attempted execute.
Arg2: 890000083c170963, PTE contents.
Arg3: ffff8486ba5d8630, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  Default string

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F23

BIOS_DATE:  06/07/2017

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  X99-UD4-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: fffff8060bc8fd74

BUGCHECK_P2: 890000083c170963

BUGCHECK_P3: ffff8486ba5d8630

BUGCHECK_P4: 2

CPU_COUNT: c

CPU_MHZ: ce4

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3f

CPU_STEPPING: 2

CPU_MICROCODE: 6,3f,2,0 (F,M,S,R)  SIG: 40'00000000 (cache) 40'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xFC

PROCESS_NAME:  cheatengine-x86_64.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-22-2020 23:15:55.0186

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff8486ba5d8630 -- (.trap 0xffff8486ba5d8630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000089 rbx=0000000000000000 rcx=00000000000000c8
rdx=fffffaa083eddc88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060bc8fd74 rsp=ffff8486ba5d87c8 rbp=fffffaa083739fe8
r8=0000000000000001  r9=fffffaa083eddc88 r10=fffffaa083e91c88
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
clipsp+0x8fd74:
fffff806`0bc8fd74 4d006100        add     byte ptr [r9],r12b ds:fffffaa0`83eddc88=88
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80607254aac to fffff806071c14e0

STACK_TEXT:
ffff8486`ba5d8348 fffff806`07254aac : 00000000`000000fc fffff806`0bc8fd74 89000008`3c170963 ffff8486`ba5d8630 : nt!KeBugCheckEx
ffff8486`ba5d8350 fffff806`0700d498 : fffff806`0bc8fd74 fffffdfe`ff7fb000 00000000`00000000 ffff8486`ba5d8630 : nt!MiCheckSystemNxFault+0x1298a0
ffff8486`ba5d8390 fffff806`07072eef : ffff8486`ba5d8f10 00000000`00000011 00000000`00000000 fffff806`0bc8fd74 : nt!MiSystemFault+0x728
ffff8486`ba5d8490 fffff806`071cf520 : 00000000`0099b4d1 00000000`00000000 00000000`00000000 fffffae0`724b4b27 : nt!MmAccessFault+0x34f
ffff8486`ba5d8630 fffff806`0bc8fd74 : 00000000`0000002e fffffaa0`82e4bcf0 fffff806`07042eb8 ffff8486`ba5d8859 : nt!KiPageFault+0x360
ffff8486`ba5d87c8 00000000`0000002e : fffffaa0`82e4bcf0 fffff806`07042eb8 ffff8486`ba5d8859 00000000`0000002f : clipsp+0x8fd74
ffff8486`ba5d87d0 fffffaa0`82e4bcf0 : fffff806`07042eb8 ffff8486`ba5d8859 00000000`0000002f fffffaa0`82e4bcf0 : 0x2e
ffff8486`ba5d87d8 fffff806`07042eb8 : ffff8486`ba5d8859 00000000`0000002f fffffaa0`82e4bcf0 fffffaa0`80200280 : 0xfffffaa0`82e4bcf0
ffff8486`ba5d87e0 fffff806`07042d79 : fffffaa0`80200280 fffffaa0`00000000 fffffaa0`00000000 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x48
ffff8486`ba5d88b0 fffff806`0703330e : ffffcf89`0000002f fffff806`000002d0 00000000`000002d0 fffffaa0`80200000 : nt!RtlpHpVsContextAllocateInternal+0x3c9
ffff8486`ba5d8920 fffff806`0736f06d : fffffaa0`00000021 00000000`00000000 00000000`00000000 00000000`000002b4 : nt!ExAllocateHeapPool+0xc0e
ffff8486`ba5d8a60 fffffae0`724ed01f : fffffaa0`80602080 ffff8486`ba5d8cd0 00000000`6f746547 ffff8486`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffff8486`ba5d8ab0 fffffae0`727d69a5 : fffffaa0`6f746547 fffffae0`724647de ffff8486`00000021 fffffae0`72464912 : win32kfull!Win32AllocPoolImpl+0x2f
ffff8486`ba5d8b80 fffffae0`724d4328 : 00000000`fffffffe 00000000`00000101 ffff8486`ba5d8ef0 fffffaa0`80914000 : win32kbase!AllocThreadBufferWithTag+0x55
ffff8486`ba5d8bb0 fffffae0`72451f75 : fffffaa0`000000a0 fffffaa0`83706010 ffff8486`00d1b499 fffffaa0`83706648 : win32kfull!EngTextOut+0x498
ffff8486`ba5d90b0 fffffae0`7245004b : 00000000`0023f300 00000000`00000000 ffff8486`ba5d9978 00000000`00000000 : win32kfull!GreExtTextOutWLocked+0x1d25
ffff8486`ba5d9860 fffffae0`7244eb1a : 00000000`00000007 ffffcf89`6e4b1980 ffff8486`00fffff7 fffffaa0`00d1b499 : win32kfull!GreBatchTextOut+0x21b
ffff8486`ba5d9900 fffffae0`7244e804 : 00000000`00000007 ffffcf89`6e4b1980 00000000`00000000 00000000`80000008 : win32kfull!NtGdiFlushUserBatchInternal+0x30a
ffff8486`ba5d9b80 fffffae0`727d62db : 00000000`00000000 ffffffff`af010ca4 ffff8486`ba5d9ec0 fffffae0`72445cda : win32kfull!NtGdiFlushUserBatch+0x24
ffff8486`ba5d9bc0 fffffae0`72e0103b : ffffcf89`6e4b1980 fffffae0`724f760f 00000000`021fe090 00000000`00000000 : win32kbase!W32CalloutDispatch+0x8b
ffff8486`ba5d9de0 fffff806`075cd6f1 : 00000000`00000000 00000000`00000007 00007ffa`f4250000 00000000`00000000 : win32k!W32CalloutDispatchThunk+0xb
ffff8486`ba5d9e10 fffff806`071d2c18 : 00000000`000025ec ffff8486`ba5d9ec0 00000000`00000020 fffffae0`72e026ba : nt!PsInvokeWin32Callout+0x51
ffff8486`ba5d9e40 00007ffa`f33517e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceGdiTebAccess+0x31
00000000`021fe9d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`f33517e4


THREAD_SHA1_HASH_MOD_FUNC:  fadc065f09adffb9a261490d57ccb90636264956

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6a2026d14acb4b386c9393a44d10c4fb7146db66

THREAD_SHA1_HASH_MOD:  897a46c78874969b6e1c2aec4d284e5a78f73d4d

FOLLOWUP_IP:
clipsp+8fd74
fffff806`0bc8fd74 4d006100        add     byte ptr [r9],r12b

FAULT_INSTR_CODE:  61004d

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  clipsp+8fd74

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: clipsp

IMAGE_NAME:  clipsp.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5d8991ba

IMAGE_VERSION:  10.0.18362.387

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  8fd74

FAILURE_BUCKET_ID:  0xFC_clipsp!unknown_function

BUCKET_ID:  0xFC_clipsp!unknown_function

PRIMARY_PROBLEM_CLASS:  0xFC_clipsp!unknown_function

TARGET_TIME:  2020-01-17T20:57:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1cee

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xfc_clipsp!unknown_function

FAILURE_ID_HASH:  {c5d09b32-a3d0-f7d8-4bdd-dfdada19943f}

Followup:     MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffbc80e8a0b190
Arg3: fffffd86e83dc67f
Arg4: ffff9181205c6bb0

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  Default string

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F23

BIOS_DATE:  06/07/2017

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  X99-UD4-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: ffffbc80e8a0b190

BUGCHECK_P3: fffffd86e83dc67f

BUGCHECK_P4: ffff9181205c6bb0

BUGCHECK_STR:  0x7f_8

TRAP_FRAME:  ffffbc80e8a0b190 -- (.trap 0xffffbc80e8a0b190)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=ffffa58cd888ac70
rdx=0000000000008000 rsi=0000000000000000 rdi=0000000000000000
rip=ffff9181205c6bb0 rsp=fffffd86e83dc67f rbp=fffffd86e83db340
r8=0000000000008000  r9=0000000000000001 r10=0000000000000001
r11=fffffd86e83db860 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
ffff9181`205c6bb0 ff              ???
Resetting default scope

CPU_COUNT: c

CPU_MHZ: ce4

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3f

CPU_STEPPING: 2

CPU_MICROCODE: 6,3f,2,0 (F,M,S,R)  SIG: 40'00000000 (cache) 40'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  HD-Player.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-22-2020 23:15:46.0931

ANALYSIS_VERSION: 10.0.18362.1 x86fre

BAD_STACK_POINTER:  fffffd86e83dc67f

UNALIGNED_STACK_POINTER:  fffffd86e83dc67f

LAST_CONTROL_TRANSFER:  from fffff80624fd32e9 to fffff80624fc14e0

STACK_TEXT:
ffffbc80`e8a0b048 fffff806`24fd32e9 : 00000000`0000007f 00000000`00000008 ffffbc80`e8a0b190 fffffd86`e83dc67f : nt!KeBugCheckEx
ffffbc80`e8a0b050 fffff806`24fce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffbc80`e8a0b190 ffff9181`205c6bb0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
fffffd86`e83dc67f 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff9181`205c6bb0


THREAD_SHA1_HASH_MOD_FUNC:  51182814aa74dd715a6e07997b1a1ce85754d2a6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  2f147299869881e79ac539a1994c25f25ff419a1

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!KiDoubleFaultAbort+2c5
fffff806`24fce145 90              nop

FAULT_INSTR_CODE:  6666c390

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c5

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

PRIMARY_PROBLEM_CLASS:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

TARGET_TIME:  2020-01-17T21:41:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  8be7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x7f_8_stackptr_error_nt!kidoublefaultabort

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------
 
SSD marka model nedir?

Hız aşırtmayı kapatır mısın.
Bellekleri orijinal 2400MHz hızlarına çeker misin.

Depolama birimi veya bellek hataları gözüküyor fakat işlemciye ve belleklere yaptığın hız aşırtma nedenli de olabilir.

MSI Afterburner, Intel(R) Extreme Tuning Utility Performance Tuning, Cheat Engine yazılımlarını kaldır.

Memtest86 testi yap, test temiz çıkarsa problemli donanım SSD olabilir.
Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffab81dfacd1b0
Arg3: 000000000000c824
Arg4: fffff8017764edc9

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  Default string

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F23

BIOS_DATE:  06/07/2017

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  X99-UD4-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: ffffab81dfacd1b0

BUGCHECK_P3: c824

BUGCHECK_P4: fffff8017764edc9

BUGCHECK_STR:  0x7f_8

TRAP_FRAME:  ffffab81dfacd1b0 -- (.trap 0xffffab81dfacd1b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000028 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017764edc9 rsp=000000000000c824 rbp=ffffc28b8b2d86f0
r8=00000000ffffffff  r9=7fff9502fb0585f8 r10=7ffffffffffffffc
r11=ffffc28b8b2d80e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!CcMapAndCopyInToCache+0x789:
fffff801`7764edc9 0085c00f8825    add     byte ptr [rbp+25880FC0h],al ss:0018:ffffc28b`b0b596b0=??
Resetting default scope

CPU_COUNT: c

CPU_MHZ: ce4

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3f

CPU_STEPPING: 2

CPU_MICROCODE: 6,3f,2,0 (F,M,S,R)  SIG: 40'00000000 (cache) 40'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  esrv_svc.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-22-2020 23:15:51.0299

ANALYSIS_VERSION: 10.0.18362.1 x86fre

BAD_STACK_POINTER:  000000000000c824

MISALIGNED_IP:
nt!CcMapAndCopyInToCache+789
fffff801`7764edc9 0085c00f8825    add     byte ptr [rbp+25880FC0h],al

LAST_CONTROL_TRANSFER:  from fffff801777d32e9 to fffff801777c14e0

STACK_TEXT:
ffffab81`dfacd068 fffff801`777d32e9 : 00000000`0000007f 00000000`00000008 ffffab81`dfacd1b0 00000000`0000c824 : nt!KeBugCheckEx
ffffab81`dfacd070 fffff801`777ce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffab81`dfacd1b0 fffff801`7764edc9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
00000000`0000c824 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcMapAndCopyInToCache+0x789


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8017764eb04 - nt!CcMapAndCopyInToCache+4c4
    [ 19:bc ]
1 error : !nt (fffff8017764eb04)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BYTE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BYTE

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BYTE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BYTE

TARGET_TIME:  2020-01-17T21:32:58.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2623

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_byte

FAILURE_ID_HASH:  {ad110d6a-3b33-2c0a-c931-570eae1ba92d}

Followup:     memory_corruption
---------
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8060bc8fd74, Virtual address for the attempted execute.
Arg2: 890000083c170963, PTE contents.
Arg3: ffff8486ba5d8630, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  Default string

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F23

BIOS_DATE:  06/07/2017

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  X99-UD4-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: fffff8060bc8fd74

BUGCHECK_P2: 890000083c170963

BUGCHECK_P3: ffff8486ba5d8630

BUGCHECK_P4: 2

CPU_COUNT: c

CPU_MHZ: ce4

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3f

CPU_STEPPING: 2

CPU_MICROCODE: 6,3f,2,0 (F,M,S,R)  SIG: 40'00000000 (cache) 40'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xFC

PROCESS_NAME:  cheatengine-x86_64.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-22-2020 23:15:55.0186

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff8486ba5d8630 -- (.trap 0xffff8486ba5d8630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000089 rbx=0000000000000000 rcx=00000000000000c8
rdx=fffffaa083eddc88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060bc8fd74 rsp=ffff8486ba5d87c8 rbp=fffffaa083739fe8
r8=0000000000000001  r9=fffffaa083eddc88 r10=fffffaa083e91c88
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
clipsp+0x8fd74:
fffff806`0bc8fd74 4d006100        add     byte ptr [r9],r12b ds:fffffaa0`83eddc88=88
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80607254aac to fffff806071c14e0

STACK_TEXT:
ffff8486`ba5d8348 fffff806`07254aac : 00000000`000000fc fffff806`0bc8fd74 89000008`3c170963 ffff8486`ba5d8630 : nt!KeBugCheckEx
ffff8486`ba5d8350 fffff806`0700d498 : fffff806`0bc8fd74 fffffdfe`ff7fb000 00000000`00000000 ffff8486`ba5d8630 : nt!MiCheckSystemNxFault+0x1298a0
ffff8486`ba5d8390 fffff806`07072eef : ffff8486`ba5d8f10 00000000`00000011 00000000`00000000 fffff806`0bc8fd74 : nt!MiSystemFault+0x728
ffff8486`ba5d8490 fffff806`071cf520 : 00000000`0099b4d1 00000000`00000000 00000000`00000000 fffffae0`724b4b27 : nt!MmAccessFault+0x34f
ffff8486`ba5d8630 fffff806`0bc8fd74 : 00000000`0000002e fffffaa0`82e4bcf0 fffff806`07042eb8 ffff8486`ba5d8859 : nt!KiPageFault+0x360
ffff8486`ba5d87c8 00000000`0000002e : fffffaa0`82e4bcf0 fffff806`07042eb8 ffff8486`ba5d8859 00000000`0000002f : clipsp+0x8fd74
ffff8486`ba5d87d0 fffffaa0`82e4bcf0 : fffff806`07042eb8 ffff8486`ba5d8859 00000000`0000002f fffffaa0`82e4bcf0 : 0x2e
ffff8486`ba5d87d8 fffff806`07042eb8 : ffff8486`ba5d8859 00000000`0000002f fffffaa0`82e4bcf0 fffffaa0`80200280 : 0xfffffaa0`82e4bcf0
ffff8486`ba5d87e0 fffff806`07042d79 : fffffaa0`80200280 fffffaa0`00000000 fffffaa0`00000000 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x48
ffff8486`ba5d88b0 fffff806`0703330e : ffffcf89`0000002f fffff806`000002d0 00000000`000002d0 fffffaa0`80200000 : nt!RtlpHpVsContextAllocateInternal+0x3c9
ffff8486`ba5d8920 fffff806`0736f06d : fffffaa0`00000021 00000000`00000000 00000000`00000000 00000000`000002b4 : nt!ExAllocateHeapPool+0xc0e
ffff8486`ba5d8a60 fffffae0`724ed01f : fffffaa0`80602080 ffff8486`ba5d8cd0 00000000`6f746547 ffff8486`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffff8486`ba5d8ab0 fffffae0`727d69a5 : fffffaa0`6f746547 fffffae0`724647de ffff8486`00000021 fffffae0`72464912 : win32kfull!Win32AllocPoolImpl+0x2f
ffff8486`ba5d8b80 fffffae0`724d4328 : 00000000`fffffffe 00000000`00000101 ffff8486`ba5d8ef0 fffffaa0`80914000 : win32kbase!AllocThreadBufferWithTag+0x55
ffff8486`ba5d8bb0 fffffae0`72451f75 : fffffaa0`000000a0 fffffaa0`83706010 ffff8486`00d1b499 fffffaa0`83706648 : win32kfull!EngTextOut+0x498
ffff8486`ba5d90b0 fffffae0`7245004b : 00000000`0023f300 00000000`00000000 ffff8486`ba5d9978 00000000`00000000 : win32kfull!GreExtTextOutWLocked+0x1d25
ffff8486`ba5d9860 fffffae0`7244eb1a : 00000000`00000007 ffffcf89`6e4b1980 ffff8486`00fffff7 fffffaa0`00d1b499 : win32kfull!GreBatchTextOut+0x21b
ffff8486`ba5d9900 fffffae0`7244e804 : 00000000`00000007 ffffcf89`6e4b1980 00000000`00000000 00000000`80000008 : win32kfull!NtGdiFlushUserBatchInternal+0x30a
ffff8486`ba5d9b80 fffffae0`727d62db : 00000000`00000000 ffffffff`af010ca4 ffff8486`ba5d9ec0 fffffae0`72445cda : win32kfull!NtGdiFlushUserBatch+0x24
ffff8486`ba5d9bc0 fffffae0`72e0103b : ffffcf89`6e4b1980 fffffae0`724f760f 00000000`021fe090 00000000`00000000 : win32kbase!W32CalloutDispatch+0x8b
ffff8486`ba5d9de0 fffff806`075cd6f1 : 00000000`00000000 00000000`00000007 00007ffa`f4250000 00000000`00000000 : win32k!W32CalloutDispatchThunk+0xb
ffff8486`ba5d9e10 fffff806`071d2c18 : 00000000`000025ec ffff8486`ba5d9ec0 00000000`00000020 fffffae0`72e026ba : nt!PsInvokeWin32Callout+0x51
ffff8486`ba5d9e40 00007ffa`f33517e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceGdiTebAccess+0x31
00000000`021fe9d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`f33517e4


THREAD_SHA1_HASH_MOD_FUNC:  fadc065f09adffb9a261490d57ccb90636264956

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6a2026d14acb4b386c9393a44d10c4fb7146db66

THREAD_SHA1_HASH_MOD:  897a46c78874969b6e1c2aec4d284e5a78f73d4d

FOLLOWUP_IP:
clipsp+8fd74
fffff806`0bc8fd74 4d006100        add     byte ptr [r9],r12b

FAULT_INSTR_CODE:  61004d

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  clipsp+8fd74

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: clipsp

IMAGE_NAME:  clipsp.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5d8991ba

IMAGE_VERSION:  10.0.18362.387

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  8fd74

FAILURE_BUCKET_ID:  0xFC_clipsp!unknown_function

BUCKET_ID:  0xFC_clipsp!unknown_function

PRIMARY_PROBLEM_CLASS:  0xFC_clipsp!unknown_function

TARGET_TIME:  2020-01-17T20:57:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1cee

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xfc_clipsp!unknown_function

FAILURE_ID_HASH:  {c5d09b32-a3d0-f7d8-4bdd-dfdada19943f}

Followup:     MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffbc80e8a0b190
Arg3: fffffd86e83dc67f
Arg4: ffff9181205c6bb0

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  Default string

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F23

BIOS_DATE:  06/07/2017

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  X99-UD4-CF

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: ffffbc80e8a0b190

BUGCHECK_P3: fffffd86e83dc67f

BUGCHECK_P4: ffff9181205c6bb0

BUGCHECK_STR:  0x7f_8

TRAP_FRAME:  ffffbc80e8a0b190 -- (.trap 0xffffbc80e8a0b190)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=ffffa58cd888ac70
rdx=0000000000008000 rsi=0000000000000000 rdi=0000000000000000
rip=ffff9181205c6bb0 rsp=fffffd86e83dc67f rbp=fffffd86e83db340
r8=0000000000008000  r9=0000000000000001 r10=0000000000000001
r11=fffffd86e83db860 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
ffff9181`205c6bb0 ff              ???
Resetting default scope

CPU_COUNT: c

CPU_MHZ: ce4

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3f

CPU_STEPPING: 2

CPU_MICROCODE: 6,3f,2,0 (F,M,S,R)  SIG: 40'00000000 (cache) 40'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  HD-Player.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-22-2020 23:15:46.0931

ANALYSIS_VERSION: 10.0.18362.1 x86fre

BAD_STACK_POINTER:  fffffd86e83dc67f

UNALIGNED_STACK_POINTER:  fffffd86e83dc67f

LAST_CONTROL_TRANSFER:  from fffff80624fd32e9 to fffff80624fc14e0

STACK_TEXT:
ffffbc80`e8a0b048 fffff806`24fd32e9 : 00000000`0000007f 00000000`00000008 ffffbc80`e8a0b190 fffffd86`e83dc67f : nt!KeBugCheckEx
ffffbc80`e8a0b050 fffff806`24fce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffbc80`e8a0b190 ffff9181`205c6bb0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
fffffd86`e83dc67f 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff9181`205c6bb0


THREAD_SHA1_HASH_MOD_FUNC:  51182814aa74dd715a6e07997b1a1ce85754d2a6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  2f147299869881e79ac539a1994c25f25ff419a1

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!KiDoubleFaultAbort+2c5
fffff806`24fce145 90              nop

FAULT_INSTR_CODE:  6666c390

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c5

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

PRIMARY_PROBLEM_CLASS:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

TARGET_TIME:  2020-01-17T21:41:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  8be7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x7f_8_stackptr_error_nt!kidoublefaultabort

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------
Ram hız aşırt.

Memtest86 yaptım bir sorun gözükmüyor. Yeni format attım sorun hala devam ediyor. RAM'leri 2666 dan 2400 çektim. Yine aynı hatayı verdi. CPU overlock hatası 4.7 GHz zorladığımda almıştım. Yani sorun SSD de gibi duruyor. Reboot media ile ilgili yazı atıyor ekrana tekrar açılırken.
 
Son düzenleyen: Moderatör:
SSD veya bağlı aparatta problem var.
Bende Hem Fikirim. bu konuda fakat Bad Sector aratıyorum. SSD'de Heran gibi bir bad Sector çıkmıyor. Health %93 gözüküyor. Tam olarak çözemedim. Bad Sector Çıkması gerekmiyormu ?

@MayCrasH
 

Dosya Ekleri

  • SSD.jpg
    SSD.jpg
    118,2 KB · Görüntüleme: 39
Son düzenleme:
İlla çıkacak diye bir şey yok. Dikkat edersen SSD veya aparatta problem var diyorum. Yani %100 SSD'de sorun var anlamına gelmiyor.
Hocam şimdi Şöyle yaptım. SSD yi Komple Çıkardım HDD Format attım. Fakat şuanda Mavi Ekran atmıyor. Oyun oynarken direk pat diye kapatıyor. RAM'leri tek tek denedim 32 GB Ram'i SSD Söktüm. HDD'de format var şuan BIOS Resetledim. Ama durum hala aynı Windows'da iken sorun yok internette gezerken sorun yok oyun Oynarken Kapanıyor. Isı değerleri gayet Normal Corsair LINK'den bakarak devam ediyorum. Tam anlamı ile anlayamadım hala ve işlemciyi XTU ile Stresss Testine'de soktum sorun yok passed diyor. Fakat neden reset aldığımızı hala anlayamadık.
 
Son düzenleme:
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı