Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10

blackman16

Hectopat
Katılım
15 Nisan 2020
Mesajlar
184
Daha fazla  
Cinsiyet
Erkek
Merhabalar PC açtığım zaman 3-4 defa olmuıştu mavi ekran veriyor. Critical process died hatası yazıyordu çözümü nedir? Minidump dosyalarıma alttaki linkten indirerek ulaşabilirsiniz. Bu arada başka mavi ekran hataları da almıştım fakat onların hata kodlarını hatırlamıyorum maalesef.
  • 3600X.
  • B450 Tomahawk Max.
  • 5700 XT Nitro+
  • 16 GB RAM.
  • Kingston M.2 SSD 500 GB.
  • WD 1TB HDD.
  • Corsair VS650 PSU.
 
RAM bellek ya da HDD/SSD aygıtlarınızda arıza var. "Memory Corruption" yazısı buna işaret eder.
MemTest86 ile RAM belleklere, HD Tune ile de HDD/SSD aygıtlarımıza "Error Scan" yapalım ama "Quick Scan" kapalı olsun.

Ekran kartınızın markası sanırım Sapphire. Sapphire TRIXX yazılımını kaldırın, daha sonra yeniden kurarsınız.

MSI Afterburner yazılımını kaldırın, sonra yeniden kurarsınız.

CPU-Z yazılımını kaldırın.

Bu kadar şimdilik. İlk önce HD Tune yapmanızı öneririm, MemTest çok uzun sürecek.
 
HDD ve SSD error scan taraması yaptım sıkıntı çıkmadı hepsi yeşil çıktı fakat RAM testini akşam yapacağım uzun sureceği için. yapınca sizi bilgilendireceğim teşekkürler şimdiden cevaplarınız için.

Hocam testlere başladım dogru mu yapıyorum şu an.

RAM bellek ya da HDD/SSD aygıtlarınızda arıza var. "Memory corruption" yazısı buna işaret eder.
Memtest86 ile RAM belleklere, HD Tune ile de HDD/SSD aygıtlarımıza "error scan" yapalım ama "quick scan" kapalı olsun.

Ekran kartınızın markası sanırım Sapphire. Sapphire trıxx yazılımını kaldırın, daha sonra yeniden kurarsınız.

MSI Afterburner yazılımını kaldırın, sonra yeniden kurarsınız.

CPU-Z yazılımını kaldırın.

Bu kadar şimdilik. İlk önce HD Tune yapmanızı öneririm, Memtest çok uzun sürecek.

Hocam buyurun RAM testi sonuçlarım durum kötü galiba.
 

Dosya Ekleri

  • 73AFE23C-570D-4C08-812B-A3BAE15511DC.jpeg
    73AFE23C-570D-4C08-812B-A3BAE15511DC.jpeg
    89,1 KB · Görüntüleme: 263
  • ram testi sonuçları 1.jpg
    ram testi sonuçları 1.jpg
    124,2 KB · Görüntüleme: 274
  • ram testi sonuçları 2.jpg
    ram testi sonuçları 2.jpg
    121,7 KB · Görüntüleme: 214
Kod:
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffd80373d0c340, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5843

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11659

    Key  : Analysis.Init.CPU.mSec
    Value: 577

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10035

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : CriticalProcessDied.ExceptionCode
    Value: 67e93080

    Key  : CriticalProcessDied.Process
    Value: svchost.exe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffd80373d0c340

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

ERROR_CODE: (NTSTATUS) 0x67e93080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT:  
ffffcf8a`9b14f938 fffff802`5b3069e2     : 00000000`000000ef ffffd803`73d0c340 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffcf8a`9b14f940 fffff802`5b249f75     : 00000000`00000000 fffff802`5ad597ad 00000000`00000002 fffff802`5ad58dc7 : nt!PspCatchCriticalBreak+0x10e
ffffcf8a`9b14f9e0 fffff802`5b109cc4     : ffffd803`00000000 00000000`00000000 ffffd803`73d0c340 ffffd803`73d0c778 : nt!PspTerminateAllThreads+0x1409e9
ffffcf8a`9b14fa50 fffff802`5b109fec     : ffffd803`73d0c340 00000000`00000000 00000035`241ff6cc fffff802`5b035d5a : nt!PspTerminateProcess+0xe0
ffffcf8a`9b14fa90 fffff802`5ae075b8     : ffffd803`73d0c340 ffffd803`67e93080 ffffcf8a`9b14fb80 ffffd803`73d0c340 : nt!NtTerminateProcess+0x9c
ffffcf8a`9b14fb00 00007ffd`52acd194     : 00007ffd`52b42943 00007ffd`52b76710 00000035`241ff690 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000035`241fd2a8 00007ffd`52b42943     : 00007ffd`52b76710 00000035`241ff690 00000000`00000000 00007ffd`52a30000 : 0x00007ffd`52acd194
00000035`241fd2b0 00007ffd`52b76710     : 00000035`241ff690 00000000`00000000 00007ffd`52a30000 00000000`00000004 : 0x00007ffd`52b42943
00000035`241fd2b8 00000035`241ff690     : 00000000`00000000 00007ffd`52a30000 00000000`00000004 00007ffd`52ad51ad : 0x00007ffd`52b76710
00000035`241fd2c0 00000000`00000000     : 00007ffd`52a30000 00000000`00000004 00007ffd`52ad51ad 00007ffd`52b76710 : 0x00000035`241ff690


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_67e93080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b205271e-7b75-db2a-657d-822f5d973c1b}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000003a4, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8017f4a2c8b, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4858

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9656

    Key  : Analysis.Init.CPU.mSec
    Value: 515

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13345

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 3a4

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8017f4a2c8b

READ_ADDRESS: fffff8017fefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 00000000000003a4

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  lsass.exe

TRAP_FRAME:  fffffd86eb63e400 -- (.trap 0xfffffd86eb63e400)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=00000000ffffff01
rdx=00000000000003a4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017f4a2c8b rsp=fffffd86eb63e590 rbp=0000000000000000
 r8=00000000000000a5  r9=ffffb081b6b2bd70 r10=0000000000000001
r11=ffffb081b1d969d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!RtlAvlInsertNodeEx+0x6b:
fffff801`7f4a2c8b 48391a          cmp     qword ptr [rdx],rbx ds:00000000`000003a4=????????????????
Resetting default scope

STACK_TEXT:  
fffffd86`eb63e2b8 fffff801`7f607b69     : 00000000`0000000a 00000000`000003a4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffd86`eb63e2c0 fffff801`7f603e69     : 00000000`00000000 ffff8558`0c084020 00000000`00000002 ffff8542`ac060420 : nt!KiBugCheckDispatch+0x69
fffffd86`eb63e400 fffff801`7f4a2c8b     : ffffb081`b1d96200 00000000`00000000 00000000`00000000 00000000`00000003 : nt!KiPageFault+0x469
fffffd86`eb63e590 fffff801`7f4a2b63     : 00000007`fff70142 ffffb081`b1d96200 ffffb081`bf96b7e0 ffffb081`b1453f18 : nt!RtlAvlInsertNodeEx+0x6b
fffffd86`eb63e5d0 fffff801`7f4a277d     : ffffb081`bf96b7e0 fffffd86`eb63e780 ffffb081`bf96b7e0 ffffb081`bf96b7e0 : nt!MiInsertVad+0x163
fffffd86`eb63e620 fffff801`7f836734     : 00000000`00000842 fffffd86`eb63e780 ffffb081`bf96b7e0 fffffd86`eb63e900 : nt!MiGetWsAndInsertVad+0x2d
fffffd86`eb63e680 fffff801`7f8323bc     : ffffb081`b3ba7520 00000000`00000000 fffffd86`eb63e858 fffffd86`eb63e9b8 : nt!MiMapViewOfImageSection+0x514
fffffd86`eb63e800 fffff801`7f833d79     : 00000000`00000000 fffffd86`eb63eb80 00000264`ed8d8610 00000000`00000000 : nt!MiMapViewOfSection+0x3fc
fffffd86`eb63e950 fffff801`7f6075b8     : ffffb081`bbecb040 000000dd`91b3dea8 00000000`00000000 00000000`00000000 : nt!NtMapViewOfSection+0x159
fffffd86`eb63ea90 00007fff`8deed114     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000dd`91b3de88 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`8deed114


SYMBOL_NAME:  nt!RtlAvlInsertNodeEx+6b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  6b

FAILURE_BUCKET_ID:  AV_nt!RtlAvlInsertNodeEx

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5534c61b-8588-1c8e-dde4-5603d0a8d33b}

Followup:     MachineOwner
---------


INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
    hibernation file.
Arg2: 000000000000000a
Arg3: 000000000000f4b6, Incorrect checksum
Arg4: 000000000000c0aa, Previous disk read's checksum

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2640

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4800

    Key  : Analysis.Init.CPU.mSec
    Value: 1015

    Key  : Analysis.Init.Elapsed.mSec
    Value: 21327

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74


DUMP_FILE_ATTRIBUTES: 0x9
  Hiber Crash Dump
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a0

BUGCHECK_P1: 10e

BUGCHECK_P2: a

BUGCHECK_P3: f4b6

BUGCHECK_P4: c0aa

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffffea0b`9a110648 fffff801`425a07ee     : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`0000f4b6 : nt!KeBugCheckEx
ffffea0b`9a110650 fffff801`425adc01     : 00000000`00000001 ffffc18a`d16de050 00000001`c9e2c000 ffffc18a`f23d2000 : nt!PopHiberChecksumHiberFileData+0x103ae
ffffea0b`9a1106b0 fffff801`4259fdc7     : 00000000`00000000 ffff9408`11139f38 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x7d
ffffea0b`9a110720 fffff801`4258f5d0     : 00015bae`a4ee301d ffff9408`11139f38 00000000`00000000 00000000`00000000 : nt!PopRestoreHiberContext+0x1069f
ffffea0b`9a1107b0 fffff801`4258f316     : fffff801`428504e0 ffffea0b`9a110930 fffff801`428504e0 00000000`00000100 : nt!PopHandleNextState+0x210
ffffea0b`9a110800 fffff801`4258f093     : 00000000`00000100 fffff801`428504e0 00000189`a8130def 00000000`00989680 : nt!PopIssueNextState+0x1a
ffffea0b`9a110830 fffff801`42591c99     : ffffea0b`9a110b20 00000000`00000000 00000000`00000000 fffff801`42591a1f : nt!PopInvokeSystemStateHandler+0x33b
ffffea0b`9a110a30 fffff801`4258c98a     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt!PopEndMirroring+0x1e9
ffffea0b`9a110af0 fffff801`4258c675     : 00000000`00000000 00000000`00000000 00000000`00000001 ffffc18a`cc48a040 : nt!MmDuplicateMemory+0x2be
ffffea0b`9a110b80 fffff801`41f17e25     : ffffc18a`dba0c000 ffffc18a`dba0c040 fffff801`4258c540 00000000`00000001 : nt!PopTransitionToSleep+0x135
ffffea0b`9a110c10 fffff801`41ffd0d8     : ffffab01`a29c0180 ffffc18a`dba0c040 fffff801`41f17dd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffea0b`9a110c60 00000000`00000000     : ffffea0b`9a111000 ffffea0b`9a10b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!PopHiberChecksumHiberFileData+103ae

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  103ae

FAILURE_BUCKET_ID:  0xa0_10e_nt!PopHiberChecksumHiberFileData

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {28ba2091-a476-6f77-2dec-6241bccd4685}

Followup:     MachineOwner
---------

INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
    hibernation file.
Arg2: 000000000000000a
Arg3: 0000000000001f90, Incorrect checksum
Arg4: 0000000000000a0f, Previous disk read's checksum

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3311

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6692

    Key  : Analysis.Init.CPU.mSec
    Value: 609

    Key  : Analysis.Init.Elapsed.mSec
    Value: 18890

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75


DUMP_FILE_ATTRIBUTES: 0x9
  Hiber Crash Dump
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a0

BUGCHECK_P1: 10e

BUGCHECK_P2: a

BUGCHECK_P3: 1f90

BUGCHECK_P4: a0f

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffffc302`beb252e8 fffff800`3dba07ee     : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00001f90 : nt!KeBugCheckEx
ffffc302`beb252f0 fffff800`3dbadc01     : 00000000`00000001 ffff8e08`276e7310 00000002`fa0e7000 ffff8e08`47b52000 : nt!PopHiberChecksumHiberFileData+0x103ae
ffffc302`beb25350 fffff800`3dbad5b6     : 00000000`00000000 ffffc80f`37139f38 ffffc302`beb25450 00000000`00000002 : nt!PopRequestRead+0x7d
ffffc302`beb253c0 fffff800`3d5856e4     : ffffc80f`37139dd0 00000000`00000000 fffff800`4dad1010 fffff800`4bfc905f : nt!PopDecompressCallback+0x16
ffffc302`beb253f0 fffff800`3d78ca26     : ffff8e08`47b92d21 ffffdb81`43a0c070 00000000`00000000 00000000`00000000 : nt!RtlpMakeXpressCallback+0x24
ffffc302`beb25420 fffff800`3d78c122     : ffffdb81`43a00000 ffffdb81`43a00000 ffffc302`beb25600 00000000`00000000 : nt!RtlDecompressBufferXpressLzProgress+0x26e
ffffc302`beb254a0 fffff800`3db9eacb     : 00000000`00000001 ffffc302`beb25600 00000000`00000000 00000000`00010000 : nt!RtlDecompressBufferProgress+0x62
ffffc302`beb25500 fffff800`3db9fde4     : 00000000`00000000 ffffc80f`37139f38 00000000`00000001 00000000`00000001 : nt!PopDecompressHiberBlocks+0x111df
ffffc302`beb25720 fffff800`3db8f5d0     : 0001ac53`633d7ffe ffffc80f`37139f38 00000000`00000000 00000000`00000000 : nt!PopRestoreHiberContext+0x106bc
ffffc302`beb257b0 fffff800`3db8f316     : fffff800`3de50620 ffffc302`beb25930 fffff800`3de50620 00000000`00000100 : nt!PopHandleNextState+0x210
ffffc302`beb25800 fffff800`3db8f093     : 00000000`00000100 fffff800`3de50620 000001b4`06b82fb9 00000000`00989680 : nt!PopIssueNextState+0x1a
ffffc302`beb25830 fffff800`3db91c99     : ffffc302`beb25b20 00000000`00000000 00000000`00000000 fffff800`3db91a1f : nt!PopInvokeSystemStateHandler+0x33b
ffffc302`beb25a30 fffff800`3db8c98a     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt!PopEndMirroring+0x1e9
ffffc302`beb25af0 fffff800`3db8c675     : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MmDuplicateMemory+0x2be
ffffc302`beb25b80 fffff800`3d517e85     : ffff8e08`27e93000 ffff8e08`27e93040 fffff800`3db8c540 00000000`00000001 : nt!PopTransitionToSleep+0x135
ffffc302`beb25c10 fffff800`3d5fd2a8     : ffffdb81`415dd180 ffff8e08`27e93040 fffff800`3d517e30 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffc302`beb25c60 00000000`00000000     : ffffc302`beb26000 ffffc302`beb20000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!PopHiberChecksumHiberFileData+103ae

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  103ae

FAILURE_BUCKET_ID:  0xa0_10e_nt!PopHiberChecksumHiberFileData

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {28ba2091-a476-6f77-2dec-6241bccd4685}

Followup:     MachineOwner
---------
DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer.  This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned.  This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 00008a1afb507778, Actual security check cookie from the stack
Arg2: 0000fffffb507778, Expected security check cookie
Arg3: ffff75e504af8887, Complement of the expected security check cookie
Arg4: 0000000000000000, zero

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3937

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4827

    Key  : Analysis.Init.CPU.mSec
    Value: 593

    Key  : Analysis.Init.Elapsed.mSec
    Value: 16317

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  f7

BUGCHECK_P1: 8a1afb507778

BUGCHECK_P2: fffffb507778

BUGCHECK_P3: ffff75e504af8887

BUGCHECK_P4: 0

SECURITY_COOKIE:  Expected 0000fffffb507778 found 00008a1afb507778

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Corsair.Service.exe

STACK_TEXT: 
fffffa89`2d18e2c8 fffff805`5e0b0cd5     : 00000000`000000f7 00008a1a`fb507778 0000ffff`fb507778 ffff75e5`04af8887 : nt!KeBugCheckEx
fffffa89`2d18e2d0 fffff805`5e1f7b2a     : fffffa89`2d18e5c0 00000000`00000001 ffffdc8d`4901e040 00000000`00000000 : nt!_report_gsfailure+0x25
fffffa89`2d18e310 fffff805`5e2c339b     : ffff8004`495a0820 fffff805`5e5b1019 00000000`00000002 ffff8004`495a07f0 : nt!ObWaitForMultipleObjects+0x35a
fffffa89`2d18e810 fffff805`5e0075b8     : fffffa89`2d18eb18 ffffdc8d`4891f080 00000000`0625ec08 fffffa89`2d18eaa8 : nt!NtWaitForMultipleObjects32+0x11b
fffffa89`2d18ea90 00000000`76fb1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0625ebe8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fb1cfc


SYMBOL_NAME:  nt!_report_gsfailure+25

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25

FAILURE_BUCKET_ID:  0xF7_MISSING_GSFRAME_nt!_report_gsfailure

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {82d2c1b5-b0cb-60a5-9a5d-78c8c4284f84}

Followup:     MachineOwner
---------
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı