XFX RX 5500 XT sistemde mavi ekran hatası

AkifDuygulu

Decapat
Katılım
5 Aralık 2020
Mesajlar
40
Daha fazla  
Cinsiyet
Erkek
Sistemi yaklaşık 1 ay önce incehesap.com üzerinden aldım. Sistem ilk birkaç gün sorunsuz çalıştı sonrasında ekran kartımdan hata gelmeye başladı.

Ekran kartım:
XFX RX 5500 XT THICC II Pro 8 GB

Az çok anlarsınız zaten sorunun ne olduğunu mavi ekran hatası verip kapanıyor her seferinde başka bir hata kodu veriyor. Tekrar açtığımda ise WattMan ayarları sıfırlandı diyor. Bazen de derste iken ekran siyahlaşıyor ve ses gidiyor sonrasında zaten mavi ekran. Bu sorunları yaşamaktan bıktım lütfen bana yardımcı olun. Bir de ekleyim AMD CPU stock soğutucusu RAM'i kastırıyor gibi gözüktü bana.
Galiba RAM kaynaklı bir sorun ama bir de sizler bakın pek bir bilgim yok.
minidump dosyasınıda hemen atacağım yorum olarak.
Sabah verdiği hata kodunu arattığımda mouse kaynaklı olduğunu öğrendim.
Dün de bir hata kodunu aratmıştım bunda ise laptoplardaki o dokunmatik yüzey kaynaklı olduğu yazıyordu.
Açıkcası sorunun ne olduğunu ne ben biliyorum ne de bilgisayar.

Anakart: Gigabyte B450M S2H.
İşlemci: AMD Ryzen 5 2600
RAM: Apacer Panther 8 GB 3000MHz CL16
Ekran kartı: XFX RX 5500 XT THICC II Pro 8 GB

Unutmadan monitörüm için HDMI to VGA kablosu kullanıyorum.
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffdc8b2712c400, Virtual address for the attempted execute.
Arg2: 8a00000203a009e3, PTE contents.
Arg3: ffff9c8c7368ae10, (reserved)
Arg4: 0000000000000003, (reserved)

Debugging Details:
------------------

Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4062

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-SGVNOPO

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 14447

Key : Analysis.Memory.CommitPeak.Mb
Value: 82

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: fc

BUGCHECK_P1: ffffdc8b2712c400

BUGCHECK_P2: 8a00000203a009e3

BUGCHECK_P3: ffff9c8c7368ae10

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

TRAP_FRAME: ffff9c8c7368ae10 -- (.trap 0xffff9c8c7368ae10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdc8b2712c400 rbx=0000000000000000 rcx=ffffdc8b334fa134
rdx=ffff9c8c7368b1e0 rsi=0000000000000000 rdi=0000000000000000
rip=ffffdc8b2712c400 rsp=ffff9c8c7368afa8 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000ffffdc8b2712
r11=ffff7b7883200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ffffdc8b`2712c400 00c4 add ah,al
Resetting default scope

STACK_TEXT:
ffff9c8c`7368abe8 fffff800`0de56a80 : 00000000`000000fc ffffdc8b`2712c400 8a000002`03a009e3 ffff9c8c`7368ae10 : nt!KeBugCheckEx
ffff9c8c`7368abf0 fffff800`0de50e27 : 00000000`00000003 00000000`00000001 00000000`00000000 ffff9c8c`7368ad30 : nt!MiCheckSystemNxFault+0x1228bc
ffff9c8c`7368ac30 fffff800`0dccac3a : 00000000`00000000 00000000`00000011 ffff9c8c`7368ad70 00000000`00000000 : nt!MiRaisedIrqlFault+0x127de7
ffff9c8c`7368ac70 fffff800`0ddd1b5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffff9c8c`7368ae10 ffffdc8b`2712c400 : fffff800`10ce016c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffff9c8c`7368afa8 fffff800`10ce016c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffdc8b`2712c400
ffff9c8c`7368afb0 fffff800`10ce005c : ffff9c8c`7368b5f0 00000000`00000000 ffffdc8b`334fa134 ffffdc8b`2712c370 : tcpip!IppJoinPath+0xfc
ffff9c8c`7368b070 fffff800`10c9ece5 : ffffdc8b`324c8040 ffffdc8b`334fa130 fffff800`00000000 fffff800`0e6b898a : tcpip!IpNlpJoinPath+0xc
ffff9c8c`7368b0a0 fffff800`10c9e875 : ffffdc8b`3232c310 ffff9c8c`7368b5f0 ffff9c8c`7368b550 ffff9c8c`7368b550 : tcpip!UdpSendMessages+0x455
ffff9c8c`7368b440 fffff800`0dcc18f8 : 00000000`00000008 ffffdc8b`244faea0 ffff8b80`00000003 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
ffff9c8c`7368b470 fffff800`0dcc186d : fffff800`10c9e860 ffff9c8c`7368b550 ffffdc8b`24bc5a70 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff9c8c`7368b4e0 fffff800`10ca84f3 : ffffdc8b`2bd427a0 fffff800`1c273b00 00000000`00000200 00000000`00000010 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff9c8c`7368b520 fffff800`1c221330 : ffffdc8b`2db4bc70 00000000`00000010 ffffdc8b`2db4bc70 ffffdc8b`00000000 : tcpip!UdpTlProviderSendMessages+0x73
ffff9c8c`7368b5a0 fffff800`1c221afb : 00000000`00000802 00000000`00000000 ffffdc8b`2bd428b8 fffff800`0dc37334 : tdx!TdxSendDatagramTransportAddress+0x320
ffff9c8c`7368b680 fffff800`0dc37159 : 00000000`00000032 ffffdc8b`3b18e550 ffffdc8b`380f7120 fffff800`1c273bb0 : tdx!TdxTdiDispatchInternalDeviceControl+0x31b
ffff9c8c`7368b700 fffff800`1c2729df : ffffdc8b`338542f0 8a000000`9d697b63 ffffd76e`459dced0 ffffdc8b`380f7120 : nt!IofCallDriver+0x59
ffff9c8c`7368b740 fffff800`1c272436 : ffffdc8b`31268f78 00000000`c0a801ff ffffdc8b`24e3d690 ffffdc8b`31268dc0 : netbt!UdpSendDatagram+0x28f
ffff9c8c`7368b7c0 fffff800`1c291886 : ffffdc8b`3b18c400 ffffdc8b`3a9dbd90 ffff8b80`3e2a1102 00000000`00000000 : netbt!SendNameServiceRequest+0x646
ffff9c8c`7368b860 fffff800`1c273a2d : 00000000`00000000 ffffdc8b`3a9dbd90 00000000`00000080 00000000`00000002 : netbt!MSnodeCompletion+0x376
ffff9c8c`7368b8f0 fffff800`0dcc3559 : 00000000`00000080 00000000`00000002 00000000`00000002 ffffdc8b`00000002 : netbt!TimerExpiry+0x7d
ffff9c8c`7368b940 fffff800`0dcc22b9 : 00000000`00000014 00000000`00989680 00000000`00017884 00000000`0000009c : nt!KiProcessExpiredTimerList+0x169
ffff9c8c`7368ba30 fffff800`0ddc764e : ffffffff`00000000 ffff8b80`3e2a1180 ffff8b80`3e2b2340 ffffdc8b`352ed300 : nt!KiRetireDpcList+0x4e9
ffff9c8c`7368bc60 00000000`00000000 : ffff9c8c`7368c000 ffff9c8c`73686000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e


SYMBOL_NAME: tdx!TdxSendDatagramTransportAddress+320

MODULE_NAME: tdx

IMAGE_NAME: tdx.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 320

FAILURE_BUCKET_ID: 0xFC_tdx!TdxSendDatagramTransportAddress

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {fe778169-342b-a12e-ae56-77413b23722a}

Followup: MachineOwner
---------

8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffdc8b2712c400, Virtual address for the attempted execute.
Arg2: 8a00000203a009e3, PTE contents.
Arg3: ffff9c8c7368ae10, (reserved)
Arg4: 0000000000000003, (reserved)

Debugging Details:
------------------

Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3671

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-SGVNOPO

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 3664

Key : Analysis.Memory.CommitPeak.Mb
Value: 85

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: fc

BUGCHECK_P1: ffffdc8b2712c400

BUGCHECK_P2: 8a00000203a009e3

BUGCHECK_P3: ffff9c8c7368ae10

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

TRAP_FRAME: ffff9c8c7368ae10 -- (.trap 0xffff9c8c7368ae10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdc8b2712c400 rbx=0000000000000000 rcx=ffffdc8b334fa134
rdx=ffff9c8c7368b1e0 rsi=0000000000000000 rdi=0000000000000000
rip=ffffdc8b2712c400 rsp=ffff9c8c7368afa8 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000ffffdc8b2712
r11=ffff7b7883200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ffffdc8b`2712c400 00c4 add ah,al
Resetting default scope

STACK_TEXT:
ffff9c8c`7368abe8 fffff800`0de56a80 : 00000000`000000fc ffffdc8b`2712c400 8a000002`03a009e3 ffff9c8c`7368ae10 : nt!KeBugCheckEx
ffff9c8c`7368abf0 fffff800`0de50e27 : 00000000`00000003 00000000`00000001 00000000`00000000 ffff9c8c`7368ad30 : nt!MiCheckSystemNxFault+0x1228bc
ffff9c8c`7368ac30 fffff800`0dccac3a : 00000000`00000000 00000000`00000011 ffff9c8c`7368ad70 00000000`00000000 : nt!MiRaisedIrqlFault+0x127de7
ffff9c8c`7368ac70 fffff800`0ddd1b5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffff9c8c`7368ae10 ffffdc8b`2712c400 : fffff800`10ce016c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffff9c8c`7368afa8 fffff800`10ce016c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffdc8b`2712c400
ffff9c8c`7368afb0 fffff800`10ce005c : ffff9c8c`7368b5f0 00000000`00000000 ffffdc8b`334fa134 ffffdc8b`2712c370 : tcpip!IppJoinPath+0xfc
ffff9c8c`7368b070 fffff800`10c9ece5 : ffffdc8b`324c8040 ffffdc8b`334fa130 fffff800`00000000 fffff800`0e6b898a : tcpip!IpNlpJoinPath+0xc
ffff9c8c`7368b0a0 fffff800`10c9e875 : ffffdc8b`3232c310 ffff9c8c`7368b5f0 ffff9c8c`7368b550 ffff9c8c`7368b550 : tcpip!UdpSendMessages+0x455
ffff9c8c`7368b440 fffff800`0dcc18f8 : 00000000`00000008 ffffdc8b`244faea0 ffff8b80`00000003 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
ffff9c8c`7368b470 fffff800`0dcc186d : fffff800`10c9e860 ffff9c8c`7368b550 ffffdc8b`24bc5a70 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff9c8c`7368b4e0 fffff800`10ca84f3 : ffffdc8b`2bd427a0 fffff800`1c273b00 00000000`00000200 00000000`00000010 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff9c8c`7368b520 fffff800`1c221330 : ffffdc8b`2db4bc70 00000000`00000010 ffffdc8b`2db4bc70 ffffdc8b`00000000 : tcpip!UdpTlProviderSendMessages+0x73
ffff9c8c`7368b5a0 fffff800`1c221afb : 00000000`00000802 00000000`00000000 ffffdc8b`2bd428b8 fffff800`0dc37334 : tdx!TdxSendDatagramTransportAddress+0x320
ffff9c8c`7368b680 fffff800`0dc37159 : 00000000`00000032 ffffdc8b`3b18e550 ffffdc8b`380f7120 fffff800`1c273bb0 : tdx!TdxTdiDispatchInternalDeviceControl+0x31b
ffff9c8c`7368b700 fffff800`1c2729df : ffffdc8b`338542f0 8a000000`9d697b63 ffffd76e`459dced0 ffffdc8b`380f7120 : nt!IofCallDriver+0x59
ffff9c8c`7368b740 fffff800`1c272436 : ffffdc8b`31268f78 00000000`c0a801ff ffffdc8b`24e3d690 ffffdc8b`31268dc0 : netbt!UdpSendDatagram+0x28f
ffff9c8c`7368b7c0 fffff800`1c291886 : ffffdc8b`3b18c400 ffffdc8b`3a9dbd90 ffff8b80`3e2a1102 00000000`00000000 : netbt!SendNameServiceRequest+0x646
ffff9c8c`7368b860 fffff800`1c273a2d : 00000000`00000000 ffffdc8b`3a9dbd90 00000000`00000080 00000000`00000002 : netbt!MSnodeCompletion+0x376
ffff9c8c`7368b8f0 fffff800`0dcc3559 : 00000000`00000080 00000000`00000002 00000000`00000002 ffffdc8b`00000002 : netbt!TimerExpiry+0x7d
ffff9c8c`7368b940 fffff800`0dcc22b9 : 00000000`00000014 00000000`00989680 00000000`00017884 00000000`0000009c : nt!KiProcessExpiredTimerList+0x169
ffff9c8c`7368ba30 fffff800`0ddc764e : ffffffff`00000000 ffff8b80`3e2a1180 ffff8b80`3e2b2340 ffffdc8b`352ed300 : nt!KiRetireDpcList+0x4e9
ffff9c8c`7368bc60 00000000`00000000 : ffff9c8c`7368c000 ffff9c8c`73686000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e


SYMBOL_NAME: tdx!TdxSendDatagramTransportAddress+320

MODULE_NAME: tdx

IMAGE_NAME: tdx.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 320

FAILURE_BUCKET_ID: 0xFC_tdx!TdxSendDatagramTransportAddress

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {fe778169-342b-a12e-ae56-77413b23722a}

Followup: MachineOwner
---------

8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffdc8b2712c400, Virtual address for the attempted execute.
Arg2: 8a00000203a009e3, PTE contents.
Arg3: ffff9c8c7368ae10, (reserved)
Arg4: 0000000000000003, (reserved)

Debugging Details:
------------------

Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3655

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-SGVNOPO

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 3660

Key : Analysis.Memory.CommitPeak.Mb
Value: 85

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: fc

BUGCHECK_P1: ffffdc8b2712c400

BUGCHECK_P2: 8a00000203a009e3

BUGCHECK_P3: ffff9c8c7368ae10

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

TRAP_FRAME: ffff9c8c7368ae10 -- (.trap 0xffff9c8c7368ae10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdc8b2712c400 rbx=0000000000000000 rcx=ffffdc8b334fa134
rdx=ffff9c8c7368b1e0 rsi=0000000000000000 rdi=0000000000000000
rip=ffffdc8b2712c400 rsp=ffff9c8c7368afa8 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000ffffdc8b2712
r11=ffff7b7883200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ffffdc8b`2712c400 00c4 add ah,al
Resetting default scope

STACK_TEXT:
ffff9c8c`7368abe8 fffff800`0de56a80 : 00000000`000000fc ffffdc8b`2712c400 8a000002`03a009e3 ffff9c8c`7368ae10 : nt!KeBugCheckEx
ffff9c8c`7368abf0 fffff800`0de50e27 : 00000000`00000003 00000000`00000001 00000000`00000000 ffff9c8c`7368ad30 : nt!MiCheckSystemNxFault+0x1228bc
ffff9c8c`7368ac30 fffff800`0dccac3a : 00000000`00000000 00000000`00000011 ffff9c8c`7368ad70 00000000`00000000 : nt!MiRaisedIrqlFault+0x127de7
ffff9c8c`7368ac70 fffff800`0ddd1b5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffff9c8c`7368ae10 ffffdc8b`2712c400 : fffff800`10ce016c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffff9c8c`7368afa8 fffff800`10ce016c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffdc8b`2712c400
ffff9c8c`7368afb0 fffff800`10ce005c : ffff9c8c`7368b5f0 00000000`00000000 ffffdc8b`334fa134 ffffdc8b`2712c370 : tcpip!IppJoinPath+0xfc
ffff9c8c`7368b070 fffff800`10c9ece5 : ffffdc8b`324c8040 ffffdc8b`334fa130 fffff800`00000000 fffff800`0e6b898a : tcpip!IpNlpJoinPath+0xc
ffff9c8c`7368b0a0 fffff800`10c9e875 : ffffdc8b`3232c310 ffff9c8c`7368b5f0 ffff9c8c`7368b550 ffff9c8c`7368b550 : tcpip!UdpSendMessages+0x455
ffff9c8c`7368b440 fffff800`0dcc18f8 : 00000000`00000008 ffffdc8b`244faea0 ffff8b80`00000003 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
ffff9c8c`7368b470 fffff800`0dcc186d : fffff800`10c9e860 ffff9c8c`7368b550 ffffdc8b`24bc5a70 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff9c8c`7368b4e0 fffff800`10ca84f3 : ffffdc8b`2bd427a0 fffff800`1c273b00 00000000`00000200 00000000`00000010 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff9c8c`7368b520 fffff800`1c221330 : ffffdc8b`2db4bc70 00000000`00000010 ffffdc8b`2db4bc70 ffffdc8b`00000000 : tcpip!UdpTlProviderSendMessages+0x73
ffff9c8c`7368b5a0 fffff800`1c221afb : 00000000`00000802 00000000`00000000 ffffdc8b`2bd428b8 fffff800`0dc37334 : tdx!TdxSendDatagramTransportAddress+0x320
ffff9c8c`7368b680 fffff800`0dc37159 : 00000000`00000032 ffffdc8b`3b18e550 ffffdc8b`380f7120 fffff800`1c273bb0 : tdx!TdxTdiDispatchInternalDeviceControl+0x31b
ffff9c8c`7368b700 fffff800`1c2729df : ffffdc8b`338542f0 8a000000`9d697b63 ffffd76e`459dced0 ffffdc8b`380f7120 : nt!IofCallDriver+0x59
ffff9c8c`7368b740 fffff800`1c272436 : ffffdc8b`31268f78 00000000`c0a801ff ffffdc8b`24e3d690 ffffdc8b`31268dc0 : netbt!UdpSendDatagram+0x28f
ffff9c8c`7368b7c0 fffff800`1c291886 : ffffdc8b`3b18c400 ffffdc8b`3a9dbd90 ffff8b80`3e2a1102 00000000`00000000 : netbt!SendNameServiceRequest+0x646
ffff9c8c`7368b860 fffff800`1c273a2d : 00000000`00000000 ffffdc8b`3a9dbd90 00000000`00000080 00000000`00000002 : netbt!MSnodeCompletion+0x376
ffff9c8c`7368b8f0 fffff800`0dcc3559 : 00000000`00000080 00000000`00000002 00000000`00000002 ffffdc8b`00000002 : netbt!TimerExpiry+0x7d
ffff9c8c`7368b940 fffff800`0dcc22b9 : 00000000`00000014 00000000`00989680 00000000`00017884 00000000`0000009c : nt!KiProcessExpiredTimerList+0x169
ffff9c8c`7368ba30 fffff800`0ddc764e : ffffffff`00000000 ffff8b80`3e2a1180 ffff8b80`3e2b2340 ffffdc8b`352ed300 : nt!KiRetireDpcList+0x4e9
ffff9c8c`7368bc60 00000000`00000000 : ffff9c8c`7368c000 ffff9c8c`73686000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e


SYMBOL_NAME: tdx!TdxSendDatagramTransportAddress+320

MODULE_NAME: tdx

IMAGE_NAME: tdx.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 320

FAILURE_BUCKET_ID: 0xFC_tdx!TdxSendDatagramTransportAddress

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {fe778169-342b-a12e-ae56-77413b23722a}

Followup: MachineOwner
---------

8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffdc8b2712c400, Virtual address for the attempted execute.
Arg2: 8a00000203a009e3, PTE contents.
Arg3: ffff9c8c7368ae10, (reserved)
Arg4: 0000000000000003, (reserved)

Debugging Details:
------------------

Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 208283 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e2 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details
Page 2083e9 not present in the dump file. Type ".hh dbgerr004" for details

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3655

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-SGVNOPO

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 3660

Key : Analysis.Memory.CommitPeak.Mb
Value: 85

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: fc

BUGCHECK_P1: ffffdc8b2712c400

BUGCHECK_P2: 8a00000203a009e3

BUGCHECK_P3: ffff9c8c7368ae10

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

TRAP_FRAME: ffff9c8c7368ae10 -- (.trap 0xffff9c8c7368ae10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdc8b2712c400 rbx=0000000000000000 rcx=ffffdc8b334fa134
rdx=ffff9c8c7368b1e0 rsi=0000000000000000 rdi=0000000000000000
rip=ffffdc8b2712c400 rsp=ffff9c8c7368afa8 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000ffffdc8b2712
r11=ffff7b7883200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ffffdc8b`2712c400 00c4 add ah,al
Resetting default scope

STACK_TEXT:
ffff9c8c`7368abe8 fffff800`0de56a80 : 00000000`000000fc ffffdc8b`2712c400 8a000002`03a009e3 ffff9c8c`7368ae10 : nt!KeBugCheckEx
ffff9c8c`7368abf0 fffff800`0de50e27 : 00000000`00000003 00000000`00000001 00000000`00000000 ffff9c8c`7368ad30 : nt!MiCheckSystemNxFault+0x1228bc
ffff9c8c`7368ac30 fffff800`0dccac3a : 00000000`00000000 00000000`00000011 ffff9c8c`7368ad70 00000000`00000000 : nt!MiRaisedIrqlFault+0x127de7
ffff9c8c`7368ac70 fffff800`0ddd1b5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffff9c8c`7368ae10 ffffdc8b`2712c400 : fffff800`10ce016c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffff9c8c`7368afa8 fffff800`10ce016c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffdc8b`2712c400
ffff9c8c`7368afb0 fffff800`10ce005c : ffff9c8c`7368b5f0 00000000`00000000 ffffdc8b`334fa134 ffffdc8b`2712c370 : tcpip!IppJoinPath+0xfc
ffff9c8c`7368b070 fffff800`10c9ece5 : ffffdc8b`324c8040 ffffdc8b`334fa130 fffff800`00000000 fffff800`0e6b898a : tcpip!IpNlpJoinPath+0xc
ffff9c8c`7368b0a0 fffff800`10c9e875 : ffffdc8b`3232c310 ffff9c8c`7368b5f0 ffff9c8c`7368b550 ffff9c8c`7368b550 : tcpip!UdpSendMessages+0x455
ffff9c8c`7368b440 fffff800`0dcc18f8 : 00000000`00000008 ffffdc8b`244faea0 ffff8b80`00000003 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
ffff9c8c`7368b470 fffff800`0dcc186d : fffff800`10c9e860 ffff9c8c`7368b550 ffffdc8b`24bc5a70 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff9c8c`7368b4e0 fffff800`10ca84f3 : ffffdc8b`2bd427a0 fffff800`1c273b00 00000000`00000200 00000000`00000010 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff9c8c`7368b520 fffff800`1c221330 : ffffdc8b`2db4bc70 00000000`00000010 ffffdc8b`2db4bc70 ffffdc8b`00000000 : tcpip!UdpTlProviderSendMessages+0x73
ffff9c8c`7368b5a0 fffff800`1c221afb : 00000000`00000802 00000000`00000000 ffffdc8b`2bd428b8 fffff800`0dc37334 : tdx!TdxSendDatagramTransportAddress+0x320
ffff9c8c`7368b680 fffff800`0dc37159 : 00000000`00000032 ffffdc8b`3b18e550 ffffdc8b`380f7120 fffff800`1c273bb0 : tdx!TdxTdiDispatchInternalDeviceControl+0x31b
ffff9c8c`7368b700 fffff800`1c2729df : ffffdc8b`338542f0 8a000000`9d697b63 ffffd76e`459dced0 ffffdc8b`380f7120 : nt!IofCallDriver+0x59
ffff9c8c`7368b740 fffff800`1c272436 : ffffdc8b`31268f78 00000000`c0a801ff ffffdc8b`24e3d690 ffffdc8b`31268dc0 : netbt!UdpSendDatagram+0x28f
ffff9c8c`7368b7c0 fffff800`1c291886 : ffffdc8b`3b18c400 ffffdc8b`3a9dbd90 ffff8b80`3e2a1102 00000000`00000000 : netbt!SendNameServiceRequest+0x646
ffff9c8c`7368b860 fffff800`1c273a2d : 00000000`00000000 ffffdc8b`3a9dbd90 00000000`00000080 00000000`00000002 : netbt!MSnodeCompletion+0x376
ffff9c8c`7368b8f0 fffff800`0dcc3559 : 00000000`00000080 00000000`00000002 00000000`00000002 ffffdc8b`00000002 : netbt!TimerExpiry+0x7d
ffff9c8c`7368b940 fffff800`0dcc22b9 : 00000000`00000014 00000000`00989680 00000000`00017884 00000000`0000009c : nt!KiProcessExpiredTimerList+0x169
ffff9c8c`7368ba30 fffff800`0ddc764e : ffffffff`00000000 ffff8b80`3e2a1180 ffff8b80`3e2b2340 ffffdc8b`352ed300 : nt!KiRetireDpcList+0x4e9
ffff9c8c`7368bc60 00000000`00000000 : ffff9c8c`7368c000 ffff9c8c`73686000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e


SYMBOL_NAME: tdx!TdxSendDatagramTransportAddress+320

MODULE_NAME: tdx

IMAGE_NAME: tdx.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 320

FAILURE_BUCKET_ID: 0xFC_tdx!TdxSendDatagramTransportAddress

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {fe778169-342b-a12e-ae56-77413b23722a}

Followup: MachineOwner
---------
Sistemi yaklaşık 1 ay önce incehesap.com üzerinden aldım. Sistem ilk birkaç gün sorunsuz çalıştı sonrasında ekran kartımdan hata gelmeye başladı.

Ekran kartım:
XFX RX 5500 XT THICC II Pro 8 GB

Az çok anlarsınız zaten sorunun ne olduğunu mavi ekran hatası verip kapanıyor her seferinde başka bir hata kodu veriyor. Tekrar açtığımda ise WattMan ayarları sıfırlandı diyor. Bazen de derste iken ekran siyahlaşıyor ve ses gidiyor sonrasında zaten mavi ekran. Bu sorunları yaşamaktan bıktım lütfen bana yardımcı olun. Bir de ekleyim AMD CPU stock soğutucusu RAM'i kastırıyor gibi gözüktü bana.
Galiba RAM kaynaklı bir sorun ama bir de sizler bakın pek bir bilgim yok.
minidump dosyasınıda hemen atacağım yorum olarak.
Sabah verdiği hata kodunu arattığımda mouse kaynaklı olduğunu öğrendim.
Dün de bir hata kodunu aratmıştım bunda ise laptoplardaki o dokunmatik yüzey kaynaklı olduğu yazıyordu.
Açıkcası sorunun ne olduğunu ne ben biliyorum ne de bilgisayar.

Anakart: Gigabyte B450M S2H.
İşlemci: AMD Ryzen 5 2600
RAM: Apacer Panther 8 GB 3000MHz CL16
Ekran kartı: XFX RX 5500 XT THICC II Pro 8 GB

Unutmadan monitörüm için HDMI to VGA kablosu kullanıyorum.
 
Son düzenleme:
Tam olarak nasıl paylaşacağım konusunda en ufak bir fikrim yok.
Tam olarak nasıl paylaşacağım konusunda en ufak bir fikrim yok.

Minidump diye orada paylaştım.
 
Çok sevgili ince hesap anakart a deneme amaçlı yüklenen bir test BIOS'u kurmuş sonradan da Gigabayt'ta bunu kaldırmış destek olmayınca da hatalar vermeye başladı.
Gidip en güncel BIOS'u ve Windows'u kurdum şu anda hiçbir sıkıntısı yok lakin Memtest86 ile bir RAM testi yapmak istiyorum.😄
 

Yeni konular

Geri
Yukarı