LAN sürücüsünü aşağıdan indireceksiniz.
Ayrıca HD Tune 5.75 indirin ve tüm disklerinizin Health sekmelerinin ekran alıntılarını paylaşın.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_THREAD_PRIORITY_FLOOR_VIOLATION (157)
An illegal operation was attempted on the priority floor of a particular
thread.
Arguments:
Arg1: ffffd2083f4e5080, The address of the thread
Arg2: 0000000000000005, The target priority value
Arg3: 0000000000000002, The priority counter for the target priority underflowed
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for Ntfs.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10858
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 20122
Key : Analysis.Init.CPU.mSec
Value: 2140
Key : Analysis.Init.Elapsed.mSec
Value: 51606
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 157
BUGCHECK_P1: ffffd2083f4e5080
BUGCHECK_P2: 5
BUGCHECK_P3: 2
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
STACK_TEXT:
ffff8e83`8558a788 fffff801`70068cc8 : 00000000`00000157 ffffd208`3f4e5080 00000000`00000005 00000000`00000002 : nt!KeBugCheckEx
ffff8e83`8558a790 fffff801`6fe60dad : ffff8e83`8560a8b0 00000000`00000001 00000000`00000004 00000000`00000000 : nt!KiAbThreadUnboostCpuPriority+0x164cd4
ffff8e83`8558a800 fffff801`6feeae4e : ffffd208`3f4e5080 ffffd208`3f4e56d0 ffffa904`5ee0b010 ffffa904`5ee0b010 : nt!KiAbThreadRemoveBoosts+0x5d
ffff8e83`8558a830 fffff801`71fc7e28 : 00000000`00000000 ffffa904`5ee0b200 ffff8e83`00000000 ffffa904`5ee0b200 : nt!FsRtlAcquireEofLock+0xee
ffff8e83`8558a8a0 00000000`00000000 : ffffa904`5ee0b200 ffff8e83`00000000 ffffa904`5ee0b200 ffff8e83`8558a9b1 : Ntfs+0xe7e28
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8016feeae41 - nt!FsRtlAcquireEofLock+e1
[ 00:08 ]
1 error : !nt (fffff8016feeae41)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80628a26e26, Address of the instruction which caused the BugCheck
Arg3: ffffcf0e68d54da0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6780
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 18493
Key : Analysis.Init.CPU.mSec
Value: 2280
Key : Analysis.Init.Elapsed.mSec
Value: 68060
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80628a26e26
BUGCHECK_P3: ffffcf0e68d54da0
BUGCHECK_P4: 0
CONTEXT: ffffcf0e68d54da0 -- (.cxr 0xffffcf0e68d54da0)
rax=ffffd28ccf0a0080 rbx=0000000000000007 rcx=0000000000000000
rdx=ffffcf0e68d55948 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80628a26e26 rsp=ffffcf0e68d557a0 rbp=ffffcf0e68d55b80
r8=0000000000000000 r9=0000000000000016 r10=7ffffffffffffffc
r11=ffffcf0e68d558a8 r12=ffffcf0e68d55948 r13=ffffcf0e68d55980
r14=0000000000000000 r15=00000000c0000503
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!CmpCallCallBacksEx+0x2f6:
fffff806`28a26e26 488b4308 mov rax,qword ptr [rbx+8] ds:002b:00000000`0000000f=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffcf0e`68d557a0 fffff806`289ec32e : 00000000`00000016 ffffcf0e`68d55948 00000000`00000000 0000000c`5e9fd900 : nt!CmpCallCallBacksEx+0x2f6
ffffcf0e`68d558b0 fffff806`28807cf1 : 00000000`00001db4 fffff806`289a4860 00000000`00000000 00000000`00000000 : nt!NtQueryKey+0x3fe
ffffcf0e`68d55a90 00007ffa`928ccfe4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000000c`5e9fd978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`928ccfe4
SYMBOL_NAME: nt!CmpCallCallBacksEx+2f6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .cxr 0xffffcf0e68d54da0 ; kb
BUCKET_ID_FUNC_OFFSET: 2f6
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!CmpCallCallBacksEx
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {90e2aa9e-3e98-5e42-6146-ca3020c63d6e}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80613d6d6d4, Address of the instruction which caused the BugCheck
Arg3: ffffed8fbf783480, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8296
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 40585
Key : Analysis.Init.CPU.mSec
Value: 2155
Key : Analysis.Init.Elapsed.mSec
Value: 54265
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80613d6d6d4
BUGCHECK_P3: ffffed8fbf783480
BUGCHECK_P4: 0
CONTEXT: ffffed8fbf783480 -- (.cxr 0xffffed8fbf783480)
rax=fffff80613d6d6d0 rbx=ffffed8fbf7840f8 rcx=ffff5a0dbb3a48b0
rdx=0000000000000008 rsi=0000000000000008 rdi=ffff5a0dbb3a48b0
rip=fffff80613d6d6d4 rsp=ffffed8fbf783e80 rbp=fffff80613d6d6d0
r8=ffffed8fbf7840f8 r9=fffff80613d6d6d0 r10=0000fffff80613d6
r11=ffff6ffdb7800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
dxgkrnl!DXGALLOCATIONREFERENCE::~DXGALLOCATIONREFERENCE+0x4:
fffff806`13d6d6d4 488b09 mov rcx,qword ptr [rcx] ds:002b:ffff5a0d`bb3a48b0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
STACK_TEXT:
ffffed8f`bf783e80 fffff806`13c8c362 : 00000000`00000000 00000000`00000000 ffffc50b`c695ac20 00000000`00000000 : dxgkrnl!DXGALLOCATIONREFERENCE::~DXGALLOCATIONREFERENCE+0x4
ffffed8f`bf783eb0 fffff806`13cad8ca : ffffed8f`bf7840f0 ffffed8f`bf784090 ffffed8f`bf7848d0 00000000`00050202 : dxgkrnl!`vector destructor iterator'+0x3a
ffffed8f`bf783ee0 fffff806`13e5b3d8 : ffffc50b`c72b43b0 00000000`00000000 00000000`00000000 ffffed8f`bf7848d0 : dxgkrnl!DXGALLOCATIONREFERENCE::`vector deleting destructor'+0x1e
ffffed8f`bf783f10 fffff806`13f1132a : 00000000`00000000 ffffed8f`bf784090 ffffed8f`bf7848d0 00000000`00000000 : dxgkrnl!PagedPoolArray<DXGALLOCATIONREFERENCE,4>::~PagedPoolArray<DXGALLOCATIONREFERENCE,4>+0x8caa0
ffffed8f`bf783f40 fffff806`13f14719 : ffffed8f`bf784b80 ffffda84`5ec0adc0 00000000`00000020 ffffed8f`bf784938 : dxgkrnl!DXGCONTEXT:

resentMultiPlaneOverlay3+0x170e
ffffed8f`bf784840 fffff806`07a07cf1 : ffffc50b`c769f080 ffffc50b`c769f080 00000000`00000001 00000000`00000000 : dxgkrnl!DxgkPresentMultiPlaneOverlay3+0xbb9
ffffed8f`bf784b00 00007fff`21175484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000075`7617aac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`21175484
SYMBOL_NAME: dxgkrnl!DXGALLOCATIONREFERENCE::~DXGALLOCATIONREFERENCE+4
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .cxr 0xffffed8fbf783480 ; kb
BUCKET_ID_FUNC_OFFSET: 4
FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!DXGALLOCATIONREFERENCE::_DXGALLOCATIONREFERENCE
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3040e53f-e565-763f-eecd-a2f199d85b16}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80627186c48, The address that the exception occurred at
Arg3: ffffffffffffffff, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8952
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 45392
Key : Analysis.Init.CPU.mSec
Value: 2124
Key : Analysis.Init.Elapsed.mSec
Value: 48659
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80627186c48
BUGCHECK_P3: ffffffffffffffff
BUGCHECK_P4: 0
WRITE_ADDRESS: fffff806254fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
EXCEPTION_PARAMETER1: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8036ea0def7 -- (.trap 0xfffff8036ea0def7)
Unable to read trap frame at fffff803`6ea0def7
STACK_TEXT:
ffff9c81`3f7a9158 fffff806`24cf52de : 00000000`0000001e ffffffff`c0000005 fffff806`27186c48 ffffffff`ffffffff : nt!KeBugCheckEx
ffff9c81`3f7a9160 fffff806`24bfec72 : fffff806`24cf52bc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffff9c81`3f7a91a0 fffff806`24b2bff7 : ffff9c81`3f7a9710 00000000`00000000 ffff978e`52c61c60 fffff806`24bf991e : nt!RtlpExecuteHandlerForException+0x12
ffff9c81`3f7a91d0 fffff806`24b2abe6 : ffff978e`52c61228 ffff9c81`3f7a9e20 ffff978e`52c61228 ffff860a`4368e678 : nt!RtlDispatchException+0x297
ffff9c81`3f7a98f0 fffff806`24bf6c42 : ffffd201`a3ba9210 ffffffff`c0000005 fffff803`6ea0def7 00000000`00000000 : nt!KiDispatchException+0x186
ffff9c81`3f7a9fb0 fffff806`24bf6c10 : fffff806`24c07ea5 ffff860a`4a669d80 ffff860a`383a18a8 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff978e`52c610e8 fffff806`24c07ea5 : ffff860a`4a669d80 ffff860a`383a18a8 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff978e`52c610f0 fffff806`24c038b1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
ffff978e`52c612d0 fffff806`27186c48 : 00000000`00000005 ffff9c81`3f900180 00000000`00000246 fffff806`24a6dfa2 : nt!KiStackFault+0x331
ffff978e`52c61460 fffff806`2724bf73 : ffff860a`3839fc60 00000000`00000000 00000000`00000000 ffff860a`386fc040 : NETIO!RtlIndicateTimerWheelEntryTimerStart+0xb8
ffff978e`52c61490 fffff806`2724b8d3 : 00000000`00000005 fffff806`24800000 00000000`00000005 fffff806`2725082b : tcpip!TcpStartTimerTcbAndTraceInternal+0x163
ffff978e`52c61560 fffff806`27250591 : 00000000`00000000 00000000`00000005 00000000`0011093c 00000000`0011093c : tcpip!TcpTcbKeepAliveSend+0xeb
ffff978e`52c61640 fffff806`24a0781e : ffff9c81`3f78c240 ffff978e`52c61b10 ffff978e`52c61b20 ffff9c81`3f789180 : tcpip!TcpPeriodicTimeoutHandler+0x16e1
ffff978e`52c61860 fffff806`24a06b04 : fffff780`c0001158 00000000`00000008 00000000`00140001 00000000`0000a66d : nt!KiExecuteAllDpcs+0x30e
ffff978e`52c619d0 fffff806`24bf991e : ffffffff`00000000 ffff9c81`3f789180 ffff9c81`3f794240 ffff860a`428ef080 : nt!KiRetireDpcList+0x1f4
ffff978e`52c61c60 00000000`00000000 : ffff978e`52c62000 ffff978e`52c5c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
CHKIMG_EXTENSION: !chkimg -lo 50 -d !NETIO
fffff80627186c41 - NETIO!RtlIndicateTimerWheelEntryTimerStart+b1
[ 89:81 ]
1 error : !NETIO (fffff80627186c41)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------[/CODE]