Windows 10 mavi ekran hatası

BurakFİDAN

Hectopat
Katılım
18 Kasım 2018
Mesajlar
241
Makaleler
2
Çözümler
3
Daha fazla  
Cinsiyet
Erkek
Daha dün bilgisayara format attım ve bugün mavi ekran verdi. Bilgisayar kendine res attı kullanmaya devam ettim. Yaklaşık 1 saat önce tekrar mavi ekran verdi hızlıca res attı açıldı oturumu açmamla mavi ekran vermesi bir oldu birkaç kez denedim yine mavi ekran verdi 3-4 denemeden sonra açtım. Hata koduna falan bakamadım ama bir daha verirse bakarım ve yazarım.
 
Son düzenleyen: Moderatör:
 
 
Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


HD Tune programı ile sisteme takılı tüm depolama birimlerinin Error Scan ve Health sonuçlarını fotoğraf şeklinde paylaş.
Error Scan testinde Quick Scan yapma.
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe1022e1fe420, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe1022e1fe378, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7721

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  9.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  V8.4

BIOS_DATE:  08/10/2016

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  A68HM-E33 V2 (MS-7721)

BASEBOARD_VERSION:  9.0

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffe1022e1fe420

BUGCHECK_P3: ffffe1022e1fe378

BUGCHECK_P4: 0

TRAP_FRAME:  ffffe1022e1fe420 -- (.trap 0xffffe1022e1fe420)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc839c702938 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80510fef675 rsp=ffffe1022e1fe5b0 rbp=fffff80511045450
 r8=ffff8584a685c9e8  r9=ffffbc8398f57490 r10=7ffffffffffffffc
r11=0000000000000066 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
Ntfs!NtfsTeardownStructures+0x265:
fffff805`10fef675 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffe1022e1fe378 -- (.exr 0xffffe1022e1fe378)
ExceptionAddress: fffff80510fef675 (Ntfs!NtfsTeardownStructures+0x0000000000000265)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: c16

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-09-2020 22:39:58.0917

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8050f5d33e9 to fffff8050f5c1510

STACK_TEXT: 
ffffe102`2e1fe0f8 fffff805`0f5d33e9 : 00000000`00000139 00000000`00000003 ffffe102`2e1fe420 ffffe102`2e1fe378 : nt!KeBugCheckEx
ffffe102`2e1fe100 fffff805`0f5d3810 : 00000000`000003ed ffff8584`b2688e90 00000000`00000000 00000000`6c734d46 : nt!KiBugCheckDispatch+0x69
ffffe102`2e1fe240 fffff805`0f5d1ba5 : ffffbc83`98f571b8 00000000`00000706 ffffbc83`98f57170 fffff805`0fa709c1 : nt!KiFastFailDispatch+0xd0
ffffe102`2e1fe420 fffff805`10fef675 : ffffe102`2e1fe8f0 fffff805`11045450 ffffbc83`98f57010 ffffbc83`98f57400 : nt!KiRaiseSecurityCheckFailure+0x325
ffffe102`2e1fe5b0 fffff805`10f1892a : ffffe102`2e1fe8f0 ffffe102`2e1fe6b1 ffffbc83`98f57458 ffffe102`2e1fe8f0 : Ntfs!NtfsTeardownStructures+0x265
ffffe102`2e1fe630 fffff805`11010cec : ffffe102`2e1fe700 ffffbc83`00000000 ffffe102`00000000 ffffe102`2e1fe8f0 : Ntfs!NtfsDecrementCloseCounts+0xaa
ffffe102`2e1fe670 fffff805`1100fc31 : ffffe102`2e1fe8f0 ffffbc83`98f57170 ffffbc83`98f57010 ffff8584`a685c180 : Ntfs!NtfsCommonClose+0x45c
ffffe102`2e1fe750 fffff805`110454d8 : 00000000`0000001c fffff805`0f98f240 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
ffffe102`2e1fe8b0 fffff805`0f4bd005 : ffff8584`a4ab7bf0 ffff8584`a4a9e000 ffff8584`a4ab7b00 ffff8584`a4ab7bf0 : Ntfs!NtfsFspClose+0x88
ffffe102`2e1feb70 fffff805`0f52a7b5 : ffff8584`a4a9e040 00000000`00000080 ffff8584`a4a7f340 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffe102`2e1fec10 fffff805`0f5c8b5a : ffffcf80`19edf180 ffff8584`a4a9e040 fffff805`0f52a760 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffe102`2e1fec60 00000000`00000000 : ffffe102`2e1ff000 ffffe102`2e1f9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  bcc254fbcc10e3515ae9c5d01d918449f14643b5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0256d10b13dae5b6bca8f3e4c2a07c96e77f048f

THREAD_SHA1_HASH_MOD:  a03f19eeb49ce2a11b05e3ac8612b1437f93a88d

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff805`0f5d3810 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4269a790

IMAGE_VERSION:  10.0.18362.657

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

TARGET_TIME:  2020-03-09T10:27:29.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  c63

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------


MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
    the pagefile offset. Parameter 3 contains the page CRC value.
    Parameter 4 contains the expected CRC value.
Arg2: 0000000000021fd5
Arg3: 0000000065aa5eea
Arg4: 0000000065aa62ea

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7721

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  9.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  V8.4

BIOS_DATE:  08/10/2016

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  A68HM-E33 V2 (MS-7721)

BASEBOARD_VERSION:  9.0

DUMP_TYPE:  2

BUGCHECK_P1: 3f

BUGCHECK_P2: 21fd5

BUGCHECK_P3: 65aa5eea

BUGCHECK_P4: 65aa62ea

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


BUGCHECK_STR:  0x1a_3f

CPU_COUNT: 4

CPU_MHZ: c16

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

CURRENT_IRQL:  2

PAGE_HASH_ERRORS_DETECTED: 1

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-09-2020 22:39:55.0013

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8065966409a to fffff806595c1510

STACK_TEXT: 
fffffd84`80cc2dd8 fffff806`5966409a : 00000000`0000001a 00000000`0000003f 00000000`00021fd5 00000000`65aa5eea : nt!KeBugCheckEx
fffffd84`80cc2de0 fffff806`5948df82 : ffffe10c`7448e200 ffffffff`ffffffff 00000000`00000000 ffffe10c`7448e2f0 : nt!MiValidatePagefilePageHash+0x10186e
fffffd84`80cc2ec0 fffff806`59454a2f : ffffe10c`766b3540 fffffd84`00000000 fffffd84`80cc3000 ffffe10c`00000000 : nt!MiWaitForInPageComplete+0x472
fffffd84`80cc2fd0 fffff806`59454965 : fffffd84`80cc3138 fffffd84`80cc3149 fffffd84`80cc3138 00000000`00000000 : nt!MiPfCompleteInPageSupport+0x83
fffffd84`80cc30c0 fffff806`595375c6 : 00000000`c0000005 00000000`00000000 ffffe10c`78faa000 00000000`00000000 : nt!MiPfCompletePrefetchIos+0x51
fffffd84`80cc30f0 fffff806`59aec110 : fffffd84`00000000 00000000`00000001 fffffd84`80cc3210 00000000`c0000005 : nt!MiPrefetchVirtualMemory+0x2b6
fffffd84`80cc31b0 fffff806`59af3f9b : ffff858a`33a09000 fffffd84`80cc3318 ffff858a`33a09000 00000000`00000000 : nt!MmPrefetchVirtualMemory+0xa8
fffffd84`80cc32a0 fffff806`59ac4d8c : fffffd84`80cc33b0 fffffd84`00000000 ffff858a`00000925 00000000`00000004 : nt!PfpPrefetchPrivatePages+0x19f
fffffd84`80cc3360 fffff806`59ac495d : ffff858a`33a09000 ffff858a`33a09000 fffffd84`80cc3580 00000000`00000000 : nt!PfpPrefetchRequestPerform+0x364
fffffd84`80cc34d0 fffff806`59a00c96 : 00000000`00000001 fffffd84`80cc3701 ffff858a`33a09000 ffffe10c`78a6c7e0 : nt!PfpPrefetchRequest+0x129
fffffd84`80cc3550 fffff806`599ffe24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!PfSetSuperfetchInformation+0x16e
fffffd84`80cc3650 fffff806`595d2e15 : 0000003d`4c07fa80 fffffd84`80cc3b80 00000000`00000000 00000000`00000000 : nt!NtSetSystemInformation+0x294
fffffd84`80cc3b00 00007ffd`828df534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000003d`4c07fac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`828df534


THREAD_SHA1_HASH_MOD_FUNC:  03ffd89db4c0f02f8ddc5c1ef3af5a00a243473f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5c54bc297e43a998c8fd5d5d0cd842bd5a70eb2e

THREAD_SHA1_HASH_MOD:  fe34192f63d13620a8987d294372ee74d699cfee

SYMBOL_NAME:  PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FOLLOWUP_NAME:  MachineOwner

BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

DEFAULT_BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

PRIMARY_PROBLEM_CLASS:  PAGE_HASH_ERRORS_0x1a_3f

FAILURE_BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

TARGET_TIME:  2020-03-09T14:39:01.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  747e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:page_hash_errors_0x1a_3f

FAILURE_ID_HASH:  {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup:     MachineOwner
---------

 *** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8031744e51d, The address that the exception occurred at
Arg3: ffffc28e27577848, Exception Record Address
Arg4: ffffc28e27577090, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Write


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7721

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  9.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  V8.4

BIOS_DATE:  08/10/2016

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  A68HM-E33 V2 (MS-7721)

BASEBOARD_VERSION:  9.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8031744e51d

BUGCHECK_P3: ffffc28e27577848

BUGCHECK_P4: ffffc28e27577090

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
fileinfo!FIPfInterfaceClose+5d
fffff803`1744e51d f0ff8064010000  lock inc dword ptr [rax+164h]

EXCEPTION_RECORD:  ffffc28e27577848 -- (.exr 0xffffc28e27577848)
ExceptionAddress: fffff8031744e51d (fileinfo!FIPfInterfaceClose+0x000000000000005d)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: 0000000000000164
Attempt to write to address 0000000000000164

CONTEXT:  ffffc28e27577090 -- (.cxr 0xffffc28e27577090)
rax=0000000000000000 rbx=ffffc28e27577ae0 rcx=b46f601316ef0000
rdx=0000000000000000 rsi=ffffa0074c485140 rdi=0000000000000000
rip=fffff8031744e51d rsp=ffffc28e27577a80 rbp=fffff80313a45210
 r8=ffffd882836f4010  r9=ffffc60114480180 r10=ffffd882797c1d00
r11=ffffd882796f9080 r12=0000000000000200 r13=0000000000000000
r14=ffffa0074cdfc840 r15=ffffa0074cdfc338
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
fileinfo!FIPfInterfaceClose+0x5d:
fffff803`1744e51d f0ff8064010000  lock inc dword ptr [rax+164h] ds:002b:00000000`00000164=????????
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: c16

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

CURRENT_IRQL:  0

FOLLOWUP_IP:
fileinfo!FIPfInterfaceClose+5d
fffff803`1744e51d f0ff8064010000  lock inc dword ptr [rax+164h]

BUGCHECK_STR:  AV

WRITE_ADDRESS: fffff803139733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000164

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  0000000000000164

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-09-2020 22:39:50.0743

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80313a4601d to fffff8031744e51d

STACK_TEXT: 
ffffc28e`27577a80 fffff803`13a4601d : fffff803`13a45210 ffffa007`4cdfc840 ffffa007`4cdfc338 00000000`00000000 : fileinfo!FIPfInterfaceClose+0x5d
ffffc28e`27577ac0 fffff803`13a45dc9 : ffffa007`4cdfaff8 ffffc28e`2786fa80 ffffd882`7969fcb0 01000000`00100000 : nt!PfpOpenHandleClose+0x55
ffffc28e`27577b10 fffff803`13a4528c : ffffc28e`2786f7a0 ffffd882`81361360 ffffd882`7969fcb0 fffff803`17467490 : nt!PfSnCleanupPrefetchSectionInfo+0x45
ffffc28e`27577b40 fffff803`134bd005 : ffffd882`796f9080 ffffd882`7969fcb0 ffffd882`81e4fa00 ffffd882`81e4fa00 : nt!PfSnSectionInfoCleanupWorkItem+0x7c
ffffc28e`27577b70 fffff803`1352a7b5 : ffffd882`796f9080 00000000`00000080 ffffd882`796b4300 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffc28e`27577c10 fffff803`135c8b5a : ffffc601`144df180 ffffd882`796f9080 fffff803`1352a760 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc28e`27577c60 00000000`00000000 : ffffc28e`27578000 ffffc28e`27572000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  ea2ee713e3078ce086f1b8e9a9b6b5e5acde754d

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c4ad866a8ccdf2270aef72dc7c23fcee27165ed1

THREAD_SHA1_HASH_MOD:  fb0fb058372b6cdb3dffe4867c502054b012d889

FAULT_INSTR_CODE:  6480fff0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  fileinfo!FIPfInterfaceClose+5d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: fileinfo

IMAGE_NAME:  fileinfo.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  24bbed20

IMAGE_VERSION:  10.0.18362.1049

STACK_COMMAND:  .cxr 0xffffc28e27577090 ; kb

BUCKET_ID_FUNC_OFFSET:  5d

FAILURE_BUCKET_ID:  AV_fileinfo!FIPfInterfaceClose

BUCKET_ID:  AV_fileinfo!FIPfInterfaceClose

PRIMARY_PROBLEM_CLASS:  AV_fileinfo!FIPfInterfaceClose

TARGET_TIME:  2020-03-09T18:38:38.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1410

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_fileinfo!fipfinterfaceclose

FAILURE_ID_HASH:  {79f73c97-103a-4ef0-8108-af7855ec30f6}

Followup:     MachineOwner
---------
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
 or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware
 breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39ffcdd6a98d5c6, Reserved
Arg2: 0000000000000000, Reserved
Arg3: 814c29dce8936fec, Failure type dependent information
Arg4: 0000000000000101, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7721

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  9.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  V8.4

BIOS_DATE:  08/10/2016

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  A68HM-E33 V2 (MS-7721)

BASEBOARD_VERSION:  9.0

DUMP_TYPE:  2

BUGCHECK_P1: a39ffcdd6a98d5c6

BUGCHECK_P2: 0

BUGCHECK_P3: 814c29dce8936fec

BUGCHECK_P4: 101

PG_MISMATCH:  4000

MEMORY_CORRUPTOR:  ONE_BIT

CPU_COUNT: 4

CPU_MHZ: c16

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x109

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-09-2020 22:39:45.0814

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

STACK_TEXT: 
fffff608`96213e98 00000000`00000000 : 00000000`00000109 a39ffcdd`6a98d5c6 00000000`00000000 814c29dc`e8936fec : nt!KeBugCheckEx


THREAD_SHA1_HASH_MOD_FUNC:  81a83ae0317433a47fcc36991983df3b6e638b71

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6e16edd8c7dd677734fdbcd2397a2e35e9fae964

THREAD_SHA1_HASH_MOD:  76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-03-09T18:37:01.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  8e2

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
 
Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


HD Tune programı ile sisteme takılı tüm depolama birimlerinin Error Scan ve Health sonuçlarını fotoğraf şeklinde paylaş.
Error Scan testinde Quick Scan yapma.
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe1022e1fe420, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe1022e1fe378, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7721

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  9.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  V8.4

BIOS_DATE:  08/10/2016

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  A68HM-E33 V2 (MS-7721)

BASEBOARD_VERSION:  9.0

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffe1022e1fe420

BUGCHECK_P3: ffffe1022e1fe378

BUGCHECK_P4: 0

TRAP_FRAME:  ffffe1022e1fe420 -- (.trap 0xffffe1022e1fe420)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc839c702938 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80510fef675 rsp=ffffe1022e1fe5b0 rbp=fffff80511045450
r8=ffff8584a685c9e8  r9=ffffbc8398f57490 r10=7ffffffffffffffc
r11=0000000000000066 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
Ntfs!NtfsTeardownStructures+0x265:
fffff805`10fef675 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffe1022e1fe378 -- (.exr 0xffffe1022e1fe378)
ExceptionAddress: fffff80510fef675 (Ntfs!NtfsTeardownStructures+0x0000000000000265)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: c16

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-09-2020 22:39:58.0917

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8050f5d33e9 to fffff8050f5c1510

STACK_TEXT:
ffffe102`2e1fe0f8 fffff805`0f5d33e9 : 00000000`00000139 00000000`00000003 ffffe102`2e1fe420 ffffe102`2e1fe378 : nt!KeBugCheckEx
ffffe102`2e1fe100 fffff805`0f5d3810 : 00000000`000003ed ffff8584`b2688e90 00000000`00000000 00000000`6c734d46 : nt!KiBugCheckDispatch+0x69
ffffe102`2e1fe240 fffff805`0f5d1ba5 : ffffbc83`98f571b8 00000000`00000706 ffffbc83`98f57170 fffff805`0fa709c1 : nt!KiFastFailDispatch+0xd0
ffffe102`2e1fe420 fffff805`10fef675 : ffffe102`2e1fe8f0 fffff805`11045450 ffffbc83`98f57010 ffffbc83`98f57400 : nt!KiRaiseSecurityCheckFailure+0x325
ffffe102`2e1fe5b0 fffff805`10f1892a : ffffe102`2e1fe8f0 ffffe102`2e1fe6b1 ffffbc83`98f57458 ffffe102`2e1fe8f0 : Ntfs!NtfsTeardownStructures+0x265
ffffe102`2e1fe630 fffff805`11010cec : ffffe102`2e1fe700 ffffbc83`00000000 ffffe102`00000000 ffffe102`2e1fe8f0 : Ntfs!NtfsDecrementCloseCounts+0xaa
ffffe102`2e1fe670 fffff805`1100fc31 : ffffe102`2e1fe8f0 ffffbc83`98f57170 ffffbc83`98f57010 ffff8584`a685c180 : Ntfs!NtfsCommonClose+0x45c
ffffe102`2e1fe750 fffff805`110454d8 : 00000000`0000001c fffff805`0f98f240 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
ffffe102`2e1fe8b0 fffff805`0f4bd005 : ffff8584`a4ab7bf0 ffff8584`a4a9e000 ffff8584`a4ab7b00 ffff8584`a4ab7bf0 : Ntfs!NtfsFspClose+0x88
ffffe102`2e1feb70 fffff805`0f52a7b5 : ffff8584`a4a9e040 00000000`00000080 ffff8584`a4a7f340 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffe102`2e1fec10 fffff805`0f5c8b5a : ffffcf80`19edf180 ffff8584`a4a9e040 fffff805`0f52a760 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffe102`2e1fec60 00000000`00000000 : ffffe102`2e1ff000 ffffe102`2e1f9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  bcc254fbcc10e3515ae9c5d01d918449f14643b5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0256d10b13dae5b6bca8f3e4c2a07c96e77f048f

THREAD_SHA1_HASH_MOD:  a03f19eeb49ce2a11b05e3ac8612b1437f93a88d

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff805`0f5d3810 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4269a790

IMAGE_VERSION:  10.0.18362.657

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

TARGET_TIME:  2020-03-09T10:27:29.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  c63

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------


MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
    the pagefile offset. Parameter 3 contains the page CRC value.
    Parameter 4 contains the expected CRC value.
Arg2: 0000000000021fd5
Arg3: 0000000065aa5eea
Arg4: 0000000065aa62ea

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7721

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  9.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  V8.4

BIOS_DATE:  08/10/2016

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  A68HM-E33 V2 (MS-7721)

BASEBOARD_VERSION:  9.0

DUMP_TYPE:  2

BUGCHECK_P1: 3f

BUGCHECK_P2: 21fd5

BUGCHECK_P3: 65aa5eea

BUGCHECK_P4: 65aa62ea

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


BUGCHECK_STR:  0x1a_3f

CPU_COUNT: 4

CPU_MHZ: c16

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

CURRENT_IRQL:  2

PAGE_HASH_ERRORS_DETECTED: 1

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-09-2020 22:39:55.0013

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8065966409a to fffff806595c1510

STACK_TEXT:
fffffd84`80cc2dd8 fffff806`5966409a : 00000000`0000001a 00000000`0000003f 00000000`00021fd5 00000000`65aa5eea : nt!KeBugCheckEx
fffffd84`80cc2de0 fffff806`5948df82 : ffffe10c`7448e200 ffffffff`ffffffff 00000000`00000000 ffffe10c`7448e2f0 : nt!MiValidatePagefilePageHash+0x10186e
fffffd84`80cc2ec0 fffff806`59454a2f : ffffe10c`766b3540 fffffd84`00000000 fffffd84`80cc3000 ffffe10c`00000000 : nt!MiWaitForInPageComplete+0x472
fffffd84`80cc2fd0 fffff806`59454965 : fffffd84`80cc3138 fffffd84`80cc3149 fffffd84`80cc3138 00000000`00000000 : nt!MiPfCompleteInPageSupport+0x83
fffffd84`80cc30c0 fffff806`595375c6 : 00000000`c0000005 00000000`00000000 ffffe10c`78faa000 00000000`00000000 : nt!MiPfCompletePrefetchIos+0x51
fffffd84`80cc30f0 fffff806`59aec110 : fffffd84`00000000 00000000`00000001 fffffd84`80cc3210 00000000`c0000005 : nt!MiPrefetchVirtualMemory+0x2b6
fffffd84`80cc31b0 fffff806`59af3f9b : ffff858a`33a09000 fffffd84`80cc3318 ffff858a`33a09000 00000000`00000000 : nt!MmPrefetchVirtualMemory+0xa8
fffffd84`80cc32a0 fffff806`59ac4d8c : fffffd84`80cc33b0 fffffd84`00000000 ffff858a`00000925 00000000`00000004 : nt!PfpPrefetchPrivatePages+0x19f
fffffd84`80cc3360 fffff806`59ac495d : ffff858a`33a09000 ffff858a`33a09000 fffffd84`80cc3580 00000000`00000000 : nt!PfpPrefetchRequestPerform+0x364
fffffd84`80cc34d0 fffff806`59a00c96 : 00000000`00000001 fffffd84`80cc3701 ffff858a`33a09000 ffffe10c`78a6c7e0 : nt!PfpPrefetchRequest+0x129
fffffd84`80cc3550 fffff806`599ffe24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!PfSetSuperfetchInformation+0x16e
fffffd84`80cc3650 fffff806`595d2e15 : 0000003d`4c07fa80 fffffd84`80cc3b80 00000000`00000000 00000000`00000000 : nt!NtSetSystemInformation+0x294
fffffd84`80cc3b00 00007ffd`828df534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000003d`4c07fac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`828df534


THREAD_SHA1_HASH_MOD_FUNC:  03ffd89db4c0f02f8ddc5c1ef3af5a00a243473f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5c54bc297e43a998c8fd5d5d0cd842bd5a70eb2e

THREAD_SHA1_HASH_MOD:  fe34192f63d13620a8987d294372ee74d699cfee

SYMBOL_NAME:  PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FOLLOWUP_NAME:  MachineOwner

BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

DEFAULT_BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

PRIMARY_PROBLEM_CLASS:  PAGE_HASH_ERRORS_0x1a_3f

FAILURE_BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

TARGET_TIME:  2020-03-09T14:39:01.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  747e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:page_hash_errors_0x1a_3f

FAILURE_ID_HASH:  {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup:     MachineOwner
---------

*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8031744e51d, The address that the exception occurred at
Arg3: ffffc28e27577848, Exception Record Address
Arg4: ffffc28e27577090, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Write


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7721

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  9.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  V8.4

BIOS_DATE:  08/10/2016

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  A68HM-E33 V2 (MS-7721)

BASEBOARD_VERSION:  9.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8031744e51d

BUGCHECK_P3: ffffc28e27577848

BUGCHECK_P4: ffffc28e27577090

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
fileinfo!FIPfInterfaceClose+5d
fffff803`1744e51d f0ff8064010000  lock inc dword ptr [rax+164h]

EXCEPTION_RECORD:  ffffc28e27577848 -- (.exr 0xffffc28e27577848)
ExceptionAddress: fffff8031744e51d (fileinfo!FIPfInterfaceClose+0x000000000000005d)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: 0000000000000164
Attempt to write to address 0000000000000164

CONTEXT:  ffffc28e27577090 -- (.cxr 0xffffc28e27577090)
rax=0000000000000000 rbx=ffffc28e27577ae0 rcx=b46f601316ef0000
rdx=0000000000000000 rsi=ffffa0074c485140 rdi=0000000000000000
rip=fffff8031744e51d rsp=ffffc28e27577a80 rbp=fffff80313a45210
r8=ffffd882836f4010  r9=ffffc60114480180 r10=ffffd882797c1d00
r11=ffffd882796f9080 r12=0000000000000200 r13=0000000000000000
r14=ffffa0074cdfc840 r15=ffffa0074cdfc338
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
fileinfo!FIPfInterfaceClose+0x5d:
fffff803`1744e51d f0ff8064010000  lock inc dword ptr [rax+164h] ds:002b:00000000`00000164=????????
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: c16

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

CURRENT_IRQL:  0

FOLLOWUP_IP:
fileinfo!FIPfInterfaceClose+5d
fffff803`1744e51d f0ff8064010000  lock inc dword ptr [rax+164h]

BUGCHECK_STR:  AV

WRITE_ADDRESS: fffff803139733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000164

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  0000000000000164

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-09-2020 22:39:50.0743

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80313a4601d to fffff8031744e51d

STACK_TEXT:
ffffc28e`27577a80 fffff803`13a4601d : fffff803`13a45210 ffffa007`4cdfc840 ffffa007`4cdfc338 00000000`00000000 : fileinfo!FIPfInterfaceClose+0x5d
ffffc28e`27577ac0 fffff803`13a45dc9 : ffffa007`4cdfaff8 ffffc28e`2786fa80 ffffd882`7969fcb0 01000000`00100000 : nt!PfpOpenHandleClose+0x55
ffffc28e`27577b10 fffff803`13a4528c : ffffc28e`2786f7a0 ffffd882`81361360 ffffd882`7969fcb0 fffff803`17467490 : nt!PfSnCleanupPrefetchSectionInfo+0x45
ffffc28e`27577b40 fffff803`134bd005 : ffffd882`796f9080 ffffd882`7969fcb0 ffffd882`81e4fa00 ffffd882`81e4fa00 : nt!PfSnSectionInfoCleanupWorkItem+0x7c
ffffc28e`27577b70 fffff803`1352a7b5 : ffffd882`796f9080 00000000`00000080 ffffd882`796b4300 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffc28e`27577c10 fffff803`135c8b5a : ffffc601`144df180 ffffd882`796f9080 fffff803`1352a760 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc28e`27577c60 00000000`00000000 : ffffc28e`27578000 ffffc28e`27572000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  ea2ee713e3078ce086f1b8e9a9b6b5e5acde754d

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c4ad866a8ccdf2270aef72dc7c23fcee27165ed1

THREAD_SHA1_HASH_MOD:  fb0fb058372b6cdb3dffe4867c502054b012d889

FAULT_INSTR_CODE:  6480fff0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  fileinfo!FIPfInterfaceClose+5d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: fileinfo

IMAGE_NAME:  fileinfo.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  24bbed20

IMAGE_VERSION:  10.0.18362.1049

STACK_COMMAND:  .cxr 0xffffc28e27577090 ; kb

BUCKET_ID_FUNC_OFFSET:  5d

FAILURE_BUCKET_ID:  AV_fileinfo!FIPfInterfaceClose

BUCKET_ID:  AV_fileinfo!FIPfInterfaceClose

PRIMARY_PROBLEM_CLASS:  AV_fileinfo!FIPfInterfaceClose

TARGET_TIME:  2020-03-09T18:38:38.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1410

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_fileinfo!fipfinterfaceclose

FAILURE_ID_HASH:  {79f73c97-103a-4ef0-8108-af7855ec30f6}

Followup:     MachineOwner
---------
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39ffcdd6a98d5c6, Reserved
Arg2: 0000000000000000, Reserved
Arg3: 814c29dce8936fec, Failure type dependent information
Arg4: 0000000000000101, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7721

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  9.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  V8.4

BIOS_DATE:  08/10/2016

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  A68HM-E33 V2 (MS-7721)

BASEBOARD_VERSION:  9.0

DUMP_TYPE:  2

BUGCHECK_P1: a39ffcdd6a98d5c6

BUGCHECK_P2: 0

BUGCHECK_P3: 814c29dce8936fec

BUGCHECK_P4: 101

PG_MISMATCH:  4000

MEMORY_CORRUPTOR:  ONE_BIT

CPU_COUNT: 4

CPU_MHZ: c16

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 30

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x109

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-09-2020 22:39:45.0814

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

STACK_TEXT:
fffff608`96213e98 00000000`00000000 : 00000000`00000109 a39ffcdd`6a98d5c6 00000000`00000000 814c29dc`e8936fec : nt!KeBugCheckEx


THREAD_SHA1_HASH_MOD_FUNC:  81a83ae0317433a47fcc36991983df3b6e638b71

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6e16edd8c7dd677734fdbcd2397a2e35e9fae964

THREAD_SHA1_HASH_MOD:  76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-03-09T18:37:01.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  8e2

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
USB Belleğim yok ki :(
 
Elinde bulunan bilgisayar ile HD Tune testi yap o zaman.

USB belleği ben mi yollayayım anlamadım ki? Yoksa bir tane edin.
Memtest videosundakilerin aynısını yaptım fakat videodaki gibi olmadı.

s1.PNG
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı