Evet, disk ile alakalı sorunlar mevcut görünüyor. Dilerseniz HD Tune 5.75'i indirip diskinizin Health sekmesinin ekran alıntısını paylaşabilirsiniz.
Ek olarak bir süre BlueStacks'i kullanmayın.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffff8a8339602100, Address of the heap that reported the corruption
Arg3: ffff8a833a9c2000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7624
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 27276
Key : Analysis.Init.CPU.mSec
Value: 1140
Key : Analysis.Init.Elapsed.mSec
Value: 5243
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 13a
BUGCHECK_P1: 12
BUGCHECK_P2: ffff8a8339602100
BUGCHECK_P3: ffff8a833a9c2000
BUGCHECK_P4: 0
CORRUPTING_POOL_ADDRESS: fffff8003f4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff8a833a9c2000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffffc89`b3e53268 fffff800`3ed8e648 : 00000000`0000013a 00000000`00000012 ffff8a83`39602100 ffff8a83`3a9c2000 : nt!KeBugCheckEx
fffffc89`b3e53270 fffff800`3ed8e6a8 : 00000000`00000012 fffffc89`b3e53380 ffff8a83`39602100 fffffc89`b3e53440 : nt!RtlpHeapHandleError+0x40
fffffc89`b3e532b0 fffff800`3ed8e2d5 : ffff8a83`3a9c2000 ffff8a83`39602280 ffff8a83`39602280 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58
fffffc89`b3e532e0 fffff800`3ec811f8 : ffff8a83`3aa29460 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
fffffc89`b3e53310 fffff800`3eb122e4 : fffffc89`00000000 fffff800`3ea1e1c8 00000000`00000001 0f0f0f0f`00000000 : nt!RtlpHpVsContextFree+0x16da28
fffffc89`b3e533b0 fffff800`3f1b3149 : 00000000`00052a30 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffffc89`b3e53490 fffff800`3ea67c2e : 00000000`00000000 00000000`00000000 fffff800`3eb62ef0 fffff800`3ea9468f : nt!ExFreePool+0x9
fffffc89`b3e534c0 fffff800`3ec9edf8 : 00000000`00000000 00000000`0000003f ffff9d81`5c535ef0 fffff800`42e49e13 : nt!IoFreeMdl+0x6e
fffffc89`b3e534f0 fffff800`3eb9fa5d : 00000000`00000000 ffff8a83`3aa29480 00000000`00000000 fffff800`3eb52a09 : nt!HalFlushAdapterBuffersEx+0xff2c8
fffffc89`b3e53580 fffff800`3eace894 : ffff9d81`5c533020 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalPutScatterGatherListV3+0x3d
fffffc89`b3e535c0 fffff800`42e48dc9 : ffff9d81`5c533020 00000000`00989680 fffffc89`b3e53740 ffff8a83`3aa691a0 : nt!HalPutScatterGatherList+0x64
fffffc89`b3e53640 fffff800`42e58f1b : 00000000`00000000 00000000`00000000 fffff780`00000320 ffff9d81`5c533020 : storport!StorPortSetDeviceQueueDepth+0x4229
fffffc89`b3e537c0 fffff800`3eb230ce : fffffc89`b3e53b20 00000000`00000000 00000000`00000004 ffff9d81`5c096180 : storport!StorPortStallExecution+0xa3db
fffffc89`b3e53860 fffff800`3eb223b4 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffffc89`b3e539d0 fffff800`3ebfa78e : ffffffff`00000000 ffff9d81`5c096180 ffff9d81`5c0a11c0 ffff8a83`43617080 : nt!KiRetireDpcList+0x1f4
fffffc89`b3e53c60 00000000`00000000 : fffffc89`b3e54000 fffffc89`b3e4e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.1052
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x13a_12_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0e8bc89c-9b1f-e697-ed6c-83210db041e2}
Followup: Pool_corruption
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80466405532, Address of the instruction which caused the BugCheck
Arg3: ffffc90c90322bd0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 12343
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 20309
Key : Analysis.Init.CPU.mSec
Value: 1015
Key : Analysis.Init.Elapsed.mSec
Value: 3488
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80466405532
BUGCHECK_P3: ffffc90c90322bd0
BUGCHECK_P4: 0
CONTEXT: ffffc90c90322bd0 -- (.cxr 0xffffc90c90322bd0)
rax=ffffb3012beb6080 rbx=ffffb3012c511410 rcx=ffffb30123eb8890
rdx=0000000000000000 rsi=ffffb30124d06d20 rdi=0000000000011000
rip=fffff80466405532 rsp=ffffc90c903235d0 rbp=ffffc90c90323630
r8=0000000000000000 r9=0000000000000000 r10=ffffb30123f19ab0
r11=0000000000000001 r12=0000000000000009 r13=0000000000000009
r14=0000000000000101 r15=0000000002a7d301
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!IopQueryXxxInformation+0xa6:
fffff804`66405532 48898798000000 mov qword ptr [rdi+98h],rax ds:002b:00000000`00011098=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: javaw.exe
STACK_TEXT:
ffffc90c`903235d0 fffff804`664ce07d : ffffb301`24d6a800 00000000`00000000 00000000`000001de ffffc90c`903236b0 : nt!IopQueryXxxInformation+0xa6
ffffc90c`90323670 fffff804`664cc676 : ffffb301`2c511410 00000000`00000000 00000000`00000000 00000000`02a7d388 : nt!IopQueryNameInternal+0x3e9
ffffc90c`90323720 fffff804`664ccc23 : ffffb301`2c1dde40 ffffc90c`90323910 ffffb301`2ca3b700 00000000`00000000 : nt!IopQueryName+0x26
ffffc90c`90323770 fffff804`663fffb4 : ffffb301`2c511410 00000000`02a7d388 ffffb301`0000021a ffffc90c`903238d8 : nt!ObQueryNameStringMode+0xd3
ffffc90c`90323890 fffff804`663ff3b5 : ffffc3e1`c00016c0 ffffc3e1`f0e00008 ffffc3e1`f0f87000 ffffb301`2ca3b700 : nt!MmQueryVirtualMemory+0xbe4
ffffc90c`90323a40 fffff804`662085b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`02a7ea2c : nt!NtQueryVirtualMemory+0x25
ffffc90c`90323a90 00007ffe`14b0d284 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`02a7d2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`14b0d284
SYMBOL_NAME: nt!IopQueryXxxInformation+a6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1052
STACK_COMMAND: .cxr 0xffffc90c90322bd0 ; kb
BUCKET_ID_FUNC_OFFSET: a6
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopQueryXxxInformation
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b9f32c02-0b73-9b07-a848-9020ccc57173}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffa1480e3d, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: ffffe9e08c43d649, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10186
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 25019
Key : Analysis.Init.CPU.mSec
Value: 921
Key : Analysis.Init.Elapsed.mSec
Value: 4960
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffffffa1480e3d
BUGCHECK_P2: 2
BUGCHECK_P3: ffffe9e08c43d649
BUGCHECK_P4: 2
READ_ADDRESS: fffff80681afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffa1480e3d
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffffea0ca8c7cf90 -- (.trap 0xffffea0ca8c7cf90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffff80000f00 rbx=0000000000000000 rcx=ffffea0ca8c7d160
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=ffffe9e08c43d649 rsp=ffffea0ca8c7d120 rbp=ffffea0ca8c7d1b0
r8=ffffea0ca8c7d2d0 r9=0000000000000130 r10=fffff80681008500
r11=ffffea0ca8c7d130 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
win32kbase!GetKeyEventInputSource+0x869:
ffffe9e0`8c43d649 30803dff4721 xor byte ptr [rax+2147FF3Dh],al ds:ffffffff`a1480e3d=??
Resetting default scope
MISALIGNED_IP:
win32kbase!GetKeyEventInputSource+869
ffffe9e0`8c43d649 30803dff4721 xor byte ptr [rax+2147FF3Dh],al
STACK_TEXT:
ffffea0c`a8c7cce8 fffff806`8128dd7d : 00000000`00000050 ffffffff`a1480e3d 00000000`00000002 ffffea0c`a8c7cf90 : nt!KeBugCheckEx
ffffea0c`a8c7ccf0 fffff806`81128210 : 00000000`5b3a2c4a 00000000`00000002 ffffea0c`a8c7d010 00000000`00000000 : nt!MiSystemFault+0x147cbd
ffffea0c`a8c7cdf0 fffff806`81204d5e : 00000000`00000000 00000000`5b3a2c4a 00000000`0002553a 00000000`00000000 : nt!MmAccessFault+0x400
ffffea0c`a8c7cf90 ffffe9e0`8c43d649 : ffffffff`80000f70 ffffe9e0`8c43d228 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffea0c`a8c7d120 ffffe9e0`8c43d228 : 00000000`00000000 00000000`00000000 ffffe98e`8065f000 ffffea0c`a8c7d4b0 : win32kbase!GetKeyEventInputSource+0x869
ffffea0c`a8c7d130 ffffe9e0`8c43d0eb : 00000190`000002f2 00000190`000002f2 00000000`00000000 ffffad07`bd8b0c70 : win32kbase!GetKeyEventInputSource+0x448
ffffea0c`a8c7d1d0 ffffe9e0`8c4f9fb8 : 00000190`000002f2 ffffea0c`a8c7d310 ffffea0c`a8c7d510 ffffea0c`a8c7d670 : win32kbase!GetKeyEventInputSource+0x30b
ffffea0c`a8c7d210 ffffe9e0`8c444fd1 : ffffea0c`a8c7d670 ffffea0c`a8c7d570 ffffe9e0`8c60e188 ffffb1fa`e9c00000 : win32kbase!CInputManager::NotifyDwmInputThreadShutdown+0x280f8
ffffea0c`a8c7d470 ffffe9e0`8c4441be : ffffea0c`a8c7d720 ffffea0c`a8c7d7a0 ffffea0c`a8c7d720 00000000`00000000 : win32kbase!ProcessMouseEvent+0xeb1
ffffea0c`a8c7d640 ffffe9e0`8c44796c : ffffe9e0`8c6036f0 ffffea0c`a8c7d7a0 ffffe98e`8065fad8 ffffad07`be1c3080 : win32kbase!ProcessMouseEvent+0x9e
ffffea0c`a8c7d6a0 ffffe9e0`8c444136 : fffff806`811f4310 00000000`00000000 ffffe9e0`8c6460c0 00000000`00000000 : win32kbase!GreCleanDC+0x6bc
ffffea0c`a8c7d910 ffffe9e0`8c7b3a6c : 00000000`00000002 ffffffff`800005cc ffffe9e0`8c6460c0 00000000`00000000 : win32kbase!ProcessMouseEvent+0x16
ffffea0c`a8c7d940 ffffe9e0`8c443ffc : ffffad07`c0af0228 00000000`00000000 00000000`00000002 ffffad07`00000000 : win32kfull!EditionHandleMitSignal+0x5c
ffffea0c`a8c7d980 ffffe9e0`8c443f6e : ffffe98e`807eba20 ffffe98e`807eb010 00000000`00000000 00000000`40000040 : win32kbase!IOCPDispatcher:
ispatch+0x12c
ffffea0c`a8c7d9c0 ffffe9e0`8c443eef : 00000000`00000000 00000000`00000000 ffffe9e0`8c6460c0 00000000`00501802 : win32kbase!IOCPDispatcher:
ispatch+0x9e
ffffea0c`a8c7da00 ffffe9e0`8c443e91 : ffffea0c`00000000 ffffea0c`00000000 ffffe98e`80613fa0 ffff7ddd`00501802 : win32kbase!IOCPDispatcher:
ispatch+0x1f
ffffea0c`a8c7da60 ffffe9e0`8c443e15 : 00000000`000005e0 ffffe98e`80613fa0 00000000`000005e0 00000000`00000000 : win32kbase!NtMITDispatchCompletion+0x101
ffffea0c`a8c7daa0 ffffe9e0`8d3cf8a9 : ffffad07`be251080 ffffea0c`a8c7db80 00000214`d6d046f0 00000000`00000020 : win32kbase!NtMITDispatchCompletion+0x85
ffffea0c`a8c7dad0 fffff806`81208af1 : 00000000`00000001 ffffad07`be179560 00000000`00000000 ffffad07`00000000 : win32k!NtMITDispatchCompletion+0x15
ffffea0c`a8c7db00 00007ffe`501576e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000001c`f3d9f4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`501576e4
SYMBOL_NAME: win32kbase!GetKeyEventInputSource+869
MODULE_NAME: hardware
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.1023
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: IP_MISALIGNED_win32kbase.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1b8016c6-78a7-5881-8c18-2704f15d4870}
Followup: MachineOwner
---------[/CODE]