Windows 10 sürekli mavi ekran hatası

Phalearos

Centipat
Katılım
21 Mart 2020
Mesajlar
20
Merhaba bayağı süredir mavi ekran alıp duruyorum farklı farklı hata kodları geliyor çoğunlukla PC boşta iken oluyor. Minidump aşağıda paylaştım. Aldığım hata kodları çoğunlukla:

"WHEA_UNCORRECTABLE_ERROR"
"Kernel Security Check Failure"
"System thread exception not handled"

 
Son düzenleyen: Moderatör:
İlk olarak bellek testi yapar mısnıız? Raporar buna işaret ediyor.


Kod:
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 0000000000000107, A data mismatch has occurred in the internal hibernation data
structures.
Arg2: 000000000000000a
Arg3: ffffc10aa3eafa90, POP_HIBER_CONTEXT
Arg4: 0000000000000000, PO_MEMORY_RANGE_ARRAY

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 3

Key : Analysis.Memory.CommitPeak.Mb
Value: 69

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump

BUGCHECK_CODE: a0

BUGCHECK_P1: 107

BUGCHECK_P2: a

BUGCHECK_P3: ffffc10aa3eafa90

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT: 1

STACK_TEXT:
ffffab07`d8c29618 fffff800`243a6e85 : 00000000`000000a0 00000000`00000107 00000000`0000000a ffffc10a`a3eafa90 : nt!KeBugCheckEx
ffffab07`d8c29620 fffff800`24398e87 : ffffe600`f75c0180 fffff800`23f5dee6 00070106`00070106 00000000`00000001 : nt!PopDecompressHiberBlocks+0xb661
ffffab07`d8c29840 fffff800`2439a3fe : 00000000`0000018c 00000000`00000000 00000000`00000006 ffffc10a`00000000 : nt!PopRestoreHiberContext+0x147
ffffab07`d8c298d0 fffff800`2439a1c3 : fffff800`24269fd0 ffffab07`d8c29af0 ffffab07`dbb1eb90 ffffffff`23ec1500 : nt!PopHandleNextState+0x20e
ffffab07`d8c29920 fffff800`23ec115a : ffffe600`f75c0180 00000000`00000001 ffffab07`d8c299a8 fffff800`23ebc05c : nt!PopInvokeStateHandlerTargetProcessor+0x53
ffffab07`d8c299f0 fffff800`23ec07af : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x30a
ffffab07`d8c29b30 fffff800`23fc5ebe : 00000000`00000000 ffffe600`f75c0180 00000000`00000000 ffffe600`f75d10c0 : nt!KiRetireDpcList+0x1ef
ffffab07`d8c29d60 00000000`00000000 : ffffab07`d8c2a000 ffffab07`d8c24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e


SYMBOL_NAME: nt!PopDecompressHiberBlocks+b661

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.778

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: b661

FAILURE_BUCKET_ID: 0xa0_107_nt!PopDecompressHiberBlocks

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {5d9c83f4-ef2e-05d6-286b-9d88881fdb2f}

Followup: MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000f4a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800e9fbe80c, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 62

Key : Analysis.Memory.CommitPeak.Mb
Value: 68

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE: d1

BUGCHECK_P1: f4a

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff800e9fbe80c

READ_ADDRESS: fffff806451733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8064502a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8064502a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000f4a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME:  fffff8064bdd7750 -- (.trap 0xfffff8064bdd7750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8064bdd7928 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800e9fbe80c rsp=fffff8064bdd78e0 rbp=fffff8064bdd7af0
r8=ffff8e89a59ab000 r9=0000000000000000 r10=fffff800e9fb5e1c
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x16e80c:
fffff800`e9fbe80c 80b9490f000000 cmp byte ptr [rcx+0F49h],0 ds:00000000`00000f4a=??
Resetting default scope

STACK_TEXT:
fffff806`4bdd7608 fffff806`44dd41e9 : 00000000`0000000a 00000000`00000f4a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`4bdd7610 fffff806`44dd0529 : fffff806`4bdd78e0 00000000`00000001 00000000`00000000 fffff800`ea452347 : nt!KiBugCheckDispatch+0x69
fffff806`4bdd7750 fffff800`e9fbe80c : fffff806`00001000 00000000`00000000 00000000`00000000 fffff800`ea5d3d40 : nt!KiPageFault+0x469
fffff806`4bdd78e0 fffff806`00001000 : 00000000`00000000 00000000`00000000 fffff800`ea5d3d40 00000000`00000010 : nvlddmkm+0x16e80c
fffff806`4bdd78e8 00000000`00000000 : 00000000`00000000 fffff800`ea5d3d40 00000000`00000010 00000000`00000000 : 0xfffff806`00001000


SYMBOL_NAME: nvlddmkm+16e80c

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 16e80c

FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup: MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffa4806c7791a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa4806c7790f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE: 139

BUGCHECK_P1: 1d

BUGCHECK_P2: ffffa4806c7791a0

BUGCHECK_P3: ffffa4806c7790f8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa4806c7791a0 -- (.trap 0xffffa4806c7791a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=66268ed898483b54 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff8d09e3775648 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8033e465c3b rsp=ffffa4806c779338 rbp=0000000000000075
r8=ffff8d09e27eff68 r9=0000000000000000 r10=ffff8d09e2790f68
r11=66268ed898483b55 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!RtlRbRemoveNode+0x148d3b:
fffff803`3e465c3b cd29 int 29h
Resetting default scope

EXCEPTION_RECORD:  ffffa4806c7790f8 -- (.exr 0xffffa4806c7790f8)
ExceptionAddress: fffff8033e465c3b (nt!RtlRbRemoveNode+0x0000000000148d3b)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 000000000000001d

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffa480`6c778e78 fffff803`3e3d41e9 : 00000000`00000139 00000000`0000001d ffffa480`6c7791a0 ffffa480`6c7790f8 : nt!KeBugCheckEx
ffffa480`6c778e80 fffff803`3e3d4610 : fffff803`3e668d40 fffff803`3e2cb1b6 ffffdd6e`b75ba000 ffff8d09`e27eff78 : nt!KiBugCheckDispatch+0x69
ffffa480`6c778fc0 fffff803`3e3d29a3 : ffffdf84`bdc20000 ffffdf84`b6493af0 ffff8d09`e3768030 fffff803`00000000 : nt!KiFastFailDispatch+0xd0
ffffa480`6c7791a0 fffff803`3e465c3b : 00000066`00080000 0001000f`00660001 fffff803`3e31cd53 00000000`00000075 : nt!KiRaiseSecurityCheckFailure+0x323
ffffa480`6c779338 fffff803`3e31cd53 : 00000000`00000075 ffff8d09`e3774ef0 00000000`00000000 ffff8d09`e3775640 : nt!RtlRbRemoveNode+0x148d3b
ffffa480`6c779350 fffff803`3e31c73a : ffff8d09`df400280 ffff8d09`e288ab10 00000000`00000024 ffffa480`6c779460 : nt!RtlpHpVsChunkCoalesce+0x183
ffffa480`6c7793c0 fffff803`3e31e9ad : 00000000`00000024 00000000`00000000 ffffdf84`bdd3d960 00000000`00000000 : nt!RtlpHpVsContextFree+0x18a
ffffa480`6c779460 fffff803`3e56f019 : 00000000`00000000 00000000`00000440 000000b2`0637f002 01000000`00100000 : nt!ExFreeHeapPool+0x56d
ffffa480`6c779580 fffff803`3e9e09a9 : ffffdf84`be3479c0 ffffa480`6c7796b0 ffffdf84`bdbea978 00000000`00000000 : nt!ExFreePool+0x9
ffffa480`6c7795b0 fffff803`3e88b051 : ffffdf84`be784390 ffffdf84`be784390 ffffdf84`be347901 ffffdf84`be347901 : nt!EtwpProviderArrivalCallback+0xad859
ffffa480`6c779830 fffff803`3e88c279 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwpAddRegEntryToGroup+0x4c1
ffffa480`6c7799b0 fffff803`3e88c06d : 00000000`00000000 ffffa480`6c779c80 ffffdf84`be784390 000000b2`00000000 : nt!EtwpSetProviderTraitsCommon+0x1c9
ffffa480`6c779a60 fffff803`3e888f72 : ffffdf84`be784390 00000000`0000001e 00000000`50777445 ffffdf84`be784390 : nt!EtwpSetProviderTraitsUm+0x165
ffffa480`6c779ae0 fffff803`3e3d3c15 : 00000000`0000001e 000000b2`0637f038 00000000`00000018 000000b2`0637f050 : nt!NtTraceControl+0x312
ffffa480`6c779b90 00007ffd`b607f804 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000b2`0637eff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b607f804


SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption

IMAGE_VERSION: 10.0.18362.778

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ab43366d-59cb-5971-8e17-b53398bf3f90}

Followup: Pool_corruption
---------


MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: ffff838074b8d000
Arg3: 3ffe9131abf0b767
Arg4: ffff85866abee700

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 4

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 41201

BUGCHECK_P2: ffff838074b8d000

BUGCHECK_P3: 3ffe9131abf0b767

BUGCHECK_P4: ffff85866abee700

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: StartMenuExperienceHost.exe

STACK_TEXT:
fffff68a`8b4b3648 fffff807`0d6401be : 00000000`0000001a 00000000`00041201 ffff8380`74b8d000 3ffe9131`abf0b767 : nt!KeBugCheckEx
fffff68a`8b4b3650 fffff807`0d4c5201 : ffff8380`74b8d008 3ffe9131`abf0b767 00000000`00000002 ffff83c1`c03a5c68 : nt!MiGetPageProtection+0x17ba7e
fffff68a`8b4b36c0 fffff807`0d417d00 : 000000d0`73d7f2f0 00000000`00000017 00000000`00000246 fffff807`0d50dd24 : nt!MiQueryAddressState+0x5c1
fffff68a`8b4b38e0 fffff807`0da928c7 : fffff68a`8b4b3c80 000000e9`71a00000 fffff68a`00000000 000000d0`00000001 : nt!MiQueryAddressSpan+0x140
fffff68a`8b4b39a0 fffff807`0da92365 : ffff7f53`c31814e5 00000000`00000000 00000000`10000000 000000d0`73d7f440 : nt!MmQueryVirtualMemory+0x557
fffff68a`8b4b3b40 fffff807`0d5d3c15 : ffff8586`6129fbc0 00000000`00000000 00000000`77566d4d fffff68a`8b4b3b00 : nt!NtQueryVirtualMemory+0x25
fffff68a`8b4b3b90 00007ffd`8a87c4d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000d0`73d7f208 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`8a87c4d4


SYMBOL_NAME: nt!MiGetPageProtection+17ba7e

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: memory_corruption

BUCKET_ID_FUNC_OFFSET: 17ba7e

FAILURE_BUCKET_ID: 0x1a_41201_nt!MiGetPageProtection

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c1fe3b27-3ba8-d99e-656f-85f3d58dc669}

Followup: MachineOwner
---------


SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80541f41e4c, The address that the exception occurred at
Arg3: ffffbe0e9eab97e8, Exception Record Address
Arg4: ffffbe0e9eab9030, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80541f41e4c

BUGCHECK_P3: ffffbe0e9eab97e8

BUGCHECK_P4: ffffbe0e9eab9030

EXCEPTION_RECORD:  ffffbe0e9eab97e8 -- (.exr 0xffffbe0e9eab97e8)
ExceptionAddress: fffff80541f41e4c (CLFS!ClfsDispatchIoRequest+0x00000000000001fc)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000003501e8000b
Attempt to read from address 0000003501e8000b

CONTEXT:  ffffbe0e9eab9030 -- (.cxr 0xffffbe0e9eab9030)
rax=0000003501e80003 rbx=0000000000000000 rcx=fffff8053bfa2180
rdx=0000000000000000 rsi=ffff970399463e50 rdi=ffff970390d13720
rip=fffff80541f41e4c rsp=ffffbe0e9eab9a20 rbp=0000000000000000
 r8=0000000000000001  r9=0000000000000000 r10=00000000ffffffff
r11=ffffbe0e9eab9998 r12=ffff970390462040 r13=0000000000000000
r14=0000000000000000 r15=ffff970390d13720
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
CLFS!ClfsDispatchIoRequest+0x1fc:
fffff805`41f41e4c 488b4008        mov     rax,qword ptr [rax+8] ds:002b:00000035`01e8000b=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8053df733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053de2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8053de2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000003501e8000b

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000003501e8000b

EXCEPTION_STR:  0xc0000005

LOCK_ADDRESS:  fffff8053de629a0 -- (!locks fffff8053de629a0)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff8053de629a0)    Available
1 total locks

PNP_TRIAGE_DATA:
    Lock address  : 0xfffff8053de629a0
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0

STACK_TEXT: 
ffffbe0e`9eab9a20 fffff805`41f41c27 : ffff9703`99463e50 ffff9703`99463e50 00000000`00000000 00000000`00000004 : CLFS!ClfsDispatchIoRequest+0x1fc
ffffbe0e`9eab9a70 fffff805`3db0a929 : ffff9703`94fba5b0 fffff805`3db0a81d 00000000`00000000 fffff805`3db24f1e : CLFS!CClfsDriver::LogIoDispatch+0x27
ffffbe0e`9eab9aa0 fffff805`3e0ad938 : 00000000`00000000 ffff9703`94fba5b0 00000000`00000000 ffff9703`99463e50 : nt!IofCallDriver+0x59
ffffbe0e`9eab9ae0 fffff805`3e0b5a68 : 00000000`00000000 00000000`00000001 ffff9703`00000001 00000000`00007fff : nt!IopCloseFile+0x188
ffffbe0e`9eab9b70 fffff805`3e0badae : 00000000`000024cc fffff805`41eec433 00000000`00000000 ffffbe0e`9eab9de0 : nt!ObCloseHandleTableEntry+0x278
ffffbe0e`9eab9cb0 fffff805`3dbd3c15 : 00000000`00000000 00000000`00000000 ffffbe0e`9eab9da0 00000000`00000003 : nt!NtClose+0xde
ffffbe0e`9eab9d20 fffff805`3dbc61b0 : fffff805`41f44b26 00000000`00000030 fffff805`3e069f9d 00000000`00000010 : nt!KiSystemServiceCopyEnd+0x25
ffffbe0e`9eab9eb8 fffff805`41f44b26 : 00000000`00000030 fffff805`3e069f9d 00000000`00000010 00000000`00000086 : nt!KiServiceLinkage
ffffbe0e`9eab9ec0 fffff805`3dfd997d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : CLFS!ClfsCloseLogFileObject+0x66
ffffbe0e`9eab9f00 fffff805`3da76bb7 : ffffac02`4579b000 ffffac02`4579b000 00000000`00000000 ffffac02`4579b000 : nt!CmpInitCmRM+0x4f9
ffffbe0e`9eaba0e0 fffff805`3e0286be : ffffbe0e`9eaba5d8 ffffbe0e`9eaba2d0 ffffac02`4579b000 00000000`00000000 : nt!CmpLoadKeyCommon+0x25f
ffffbe0e`9eaba1d0 fffff805`3e0449f3 : 00000000`00000000 ffffbe0e`00000080 00000000`00000000 00000000`00000001 : nt!CmLoadKey+0x25a
ffffbe0e`9eaba510 fffff805`3e0441e1 : ffff9703`90e99670 ffff9703`904cb180 00000000`02100050 fffff805`00000000 : nt!CmLoadDifferencingKey+0x807
ffffbe0e`9eaba890 fffff805`3dbd3c15 : ffff9703`8fe02100 fffff805`3db1e797 ffff9703`904cb080 fffff805`3dbc9864 : nt!NtLoadKeyEx+0x51
ffffbe0e`9eaba900 fffff805`3dbc61b0 : fffff805`3e0f17f4 00000000`00000000 ffff9703`904cb1c0 fffff805`3bfa2180 : nt!KiSystemServiceCopyEnd+0x25
ffffbe0e`9eabab08 fffff805`3e0f17f4 : 00000000`00000000 ffff9703`904cb1c0 fffff805`3bfa2180 00000000`00000000 : nt!KiServiceLinkage
ffffbe0e`9eabab10 fffff805`3e0f1413 : ffff9703`904cb080 ffff9703`9050cd90 ffff9703`904d69e0 fffff805`3daf486c : nt!PiDrvDbLoadHive+0x90
ffffbe0e`9eababc0 fffff805`3daf43b5 : ffff9703`00000001 ffff9703`00000000 ffff9703`00000000 00000000`00000000 : nt!PiDrvDbLoadNodeWorkerCallback+0x63
ffffbe0e`9eabac70 fffff805`3da6bcd5 : ffff9703`904cb080 00000000`00000080 ffff9703`90462040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffbe0e`9eabad10 fffff805`3dbc9998 : fffff805`3bfa2180 ffff9703`904cb080 fffff805`3da6bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffbe0e`9eabad60 00000000`00000000 : ffffbe0e`9eabb000 ffffbe0e`9eab5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  CLFS!ClfsDispatchIoRequest+1fc

MODULE_NAME: CLFS

IMAGE_NAME:  CLFS.SYS

IMAGE_VERSION:  10.0.18362.1059

STACK_COMMAND:  .cxr 0xffffbe0e9eab9030 ; kb

BUCKET_ID_FUNC_OFFSET:  1fc

FAILURE_BUCKET_ID:  AV_CLFS!ClfsDispatchIoRequest

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1a713bdc-81f1-70fc-0244-d300fb0f8c4a}

Followup:     MachineOwner
---------
 
Evet PSU almadan önce daha çok vardı şu an sadece boşta masaüstünde iken oluyor oyunlarda falan aşırı nadir veriyor hatayı.

Bir de tekrardan Memtest yapayım dedim siz belleklerden olabilir deyince;

A997F52F-F541-49AF-AA01-7E8C2D4A0EEE.jpeg
 
PSU aldığım zaman termal macunda almıştım onu da halletmiştim. BIOS güncel fakat clear CMOS nasıl yapılıyor bilmiyorum. Bir de direkt temiz bir format atsam geçer mi acaba?
Bir de konuyla alakasız ama sistemim biraz eski Windows 7'ye dönmem daha mı iyi olur?
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Yeni konular

Geri
Yukarı