FX-6100 sistemde mavi ekran hatası ve ekran kilitlenmesi

sefa2121

Picopat
Katılım
1 Haziran 2021
Mesajlar
204
Makaleler
1
Daha fazla  
Cinsiyet
Erkek
Ekran kartı: AMD R7 200 series.
İşlemci: AMD FX-6100.
RAM: 8 GB.
Windows 10 Pro 64 bit.

Arkadaşlar ben bilgisayarda CraftRise ve Valorant oynuyorum. Onları oynarken bilgisayar ekran birden donuyor, hareket edilmiyor ve bir ses çıkıyor "vızzz" gibi. Daha yeni mavi ekran hatası verdi. Öncesinden de verdi ama kodlar değişikti. Ne yapabilirim?
 
Arkadaşım bak dosyaların olmadan bir şey yapamayız. Sana anlatamıyoruz şunu.
Dosyalarını paylaş, sorunu çözmeye uğraşalım. Sürekli de yeni konu açma.
 
Evet mümkün. Sorunun kaynağını bizim de onaylamamız için minidump dosyanızı bizimle paylaşabilirsiniz.

 
Evet mümkün. Sorunun kaynağını bizim de onaylamamız için minidump dosyanızı bizimle paylaşabilirsiniz.

Arkadaşım bak dosyaların olmadan bir şey yapamayız. Sana anlatamıyoruz şunu.
Dosyalarını paylaş, sorunu çözmeye uğraşalım. Sürekli de yeni konu açma.
 
Evet, disk ile alakalı sorunlar mevcut görünüyor. Dilerseniz HD Tune 5.75'i indirip diskinizin Health sekmesinin ekran alıntısını paylaşabilirsiniz.

Ek olarak bir süre Bluestacks'i kullanmayın.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffff8a8339602100, Address of the heap that reported the corruption
Arg3: ffff8a833a9c2000, Address at which the corruption was detected
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7624

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 27276

Key : Analysis.Init.CPU.mSec
Value: 1140

Key : Analysis.Init.Elapsed.mSec
Value: 5243

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 13a

BUGCHECK_P1: 12

BUGCHECK_P2: ffff8a8339602100

BUGCHECK_P3: ffff8a833a9c2000

BUGCHECK_P4: 0

CORRUPTING_POOL_ADDRESS: fffff8003f4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff8a833a9c2000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffffc89`b3e53268 fffff800`3ed8e648 : 00000000`0000013a 00000000`00000012 ffff8a83`39602100 ffff8a83`3a9c2000 : nt!KeBugCheckEx
fffffc89`b3e53270 fffff800`3ed8e6a8 : 00000000`00000012 fffffc89`b3e53380 ffff8a83`39602100 fffffc89`b3e53440 : nt!RtlpHeapHandleError+0x40
fffffc89`b3e532b0 fffff800`3ed8e2d5 : ffff8a83`3a9c2000 ffff8a83`39602280 ffff8a83`39602280 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58
fffffc89`b3e532e0 fffff800`3ec811f8 : ffff8a83`3aa29460 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
fffffc89`b3e53310 fffff800`3eb122e4 : fffffc89`00000000 fffff800`3ea1e1c8 00000000`00000001 0f0f0f0f`00000000 : nt!RtlpHpVsContextFree+0x16da28
fffffc89`b3e533b0 fffff800`3f1b3149 : 00000000`00052a30 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffffc89`b3e53490 fffff800`3ea67c2e : 00000000`00000000 00000000`00000000 fffff800`3eb62ef0 fffff800`3ea9468f : nt!ExFreePool+0x9
fffffc89`b3e534c0 fffff800`3ec9edf8 : 00000000`00000000 00000000`0000003f ffff9d81`5c535ef0 fffff800`42e49e13 : nt!IoFreeMdl+0x6e
fffffc89`b3e534f0 fffff800`3eb9fa5d : 00000000`00000000 ffff8a83`3aa29480 00000000`00000000 fffff800`3eb52a09 : nt!HalFlushAdapterBuffersEx+0xff2c8
fffffc89`b3e53580 fffff800`3eace894 : ffff9d81`5c533020 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalPutScatterGatherListV3+0x3d
fffffc89`b3e535c0 fffff800`42e48dc9 : ffff9d81`5c533020 00000000`00989680 fffffc89`b3e53740 ffff8a83`3aa691a0 : nt!HalPutScatterGatherList+0x64
fffffc89`b3e53640 fffff800`42e58f1b : 00000000`00000000 00000000`00000000 fffff780`00000320 ffff9d81`5c533020 : storport!StorPortSetDeviceQueueDepth+0x4229
fffffc89`b3e537c0 fffff800`3eb230ce : fffffc89`b3e53b20 00000000`00000000 00000000`00000004 ffff9d81`5c096180 : storport!StorPortStallExecution+0xa3db
fffffc89`b3e53860 fffff800`3eb223b4 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffffc89`b3e539d0 fffff800`3ebfa78e : ffffffff`00000000 ffff9d81`5c096180 ffff9d81`5c0a11c0 ffff8a83`43617080 : nt!KiRetireDpcList+0x1f4
fffffc89`b3e53c60 00000000`00000000 : fffffc89`b3e54000 fffffc89`b3e4e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption

IMAGE_VERSION: 10.0.19041.1052

MODULE_NAME: Pool_Corruption

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: 0x13a_12_nt!ExFreePool

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {0e8bc89c-9b1f-e697-ed6c-83210db041e2}

Followup: Pool_corruption
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80466405532, Address of the instruction which caused the BugCheck
Arg3: ffffc90c90322bd0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 12343

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 20309

Key : Analysis.Init.CPU.mSec
Value: 1015

Key : Analysis.Init.Elapsed.mSec
Value: 3488

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80466405532

BUGCHECK_P3: ffffc90c90322bd0

BUGCHECK_P4: 0

CONTEXT: ffffc90c90322bd0 -- (.cxr 0xffffc90c90322bd0)
rax=ffffb3012beb6080 rbx=ffffb3012c511410 rcx=ffffb30123eb8890
rdx=0000000000000000 rsi=ffffb30124d06d20 rdi=0000000000011000
rip=fffff80466405532 rsp=ffffc90c903235d0 rbp=ffffc90c90323630
r8=0000000000000000 r9=0000000000000000 r10=ffffb30123f19ab0
r11=0000000000000001 r12=0000000000000009 r13=0000000000000009
r14=0000000000000101 r15=0000000002a7d301
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!IopQueryXxxInformation+0xa6:
fffff804`66405532 48898798000000 mov qword ptr [rdi+98h],rax ds:002b:00000000`00011098=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: javaw.exe

STACK_TEXT:
ffffc90c`903235d0 fffff804`664ce07d : ffffb301`24d6a800 00000000`00000000 00000000`000001de ffffc90c`903236b0 : nt!IopQueryXxxInformation+0xa6
ffffc90c`90323670 fffff804`664cc676 : ffffb301`2c511410 00000000`00000000 00000000`00000000 00000000`02a7d388 : nt!IopQueryNameInternal+0x3e9
ffffc90c`90323720 fffff804`664ccc23 : ffffb301`2c1dde40 ffffc90c`90323910 ffffb301`2ca3b700 00000000`00000000 : nt!IopQueryName+0x26
ffffc90c`90323770 fffff804`663fffb4 : ffffb301`2c511410 00000000`02a7d388 ffffb301`0000021a ffffc90c`903238d8 : nt!ObQueryNameStringMode+0xd3
ffffc90c`90323890 fffff804`663ff3b5 : ffffc3e1`c00016c0 ffffc3e1`f0e00008 ffffc3e1`f0f87000 ffffb301`2ca3b700 : nt!MmQueryVirtualMemory+0xbe4
ffffc90c`90323a40 fffff804`662085b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`02a7ea2c : nt!NtQueryVirtualMemory+0x25
ffffc90c`90323a90 00007ffe`14b0d284 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`02a7d2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`14b0d284


SYMBOL_NAME: nt!IopQueryXxxInformation+a6

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1052

STACK_COMMAND: .cxr 0xffffc90c90322bd0 ; kb

BUCKET_ID_FUNC_OFFSET: a6

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopQueryXxxInformation

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {b9f32c02-0b73-9b07-a848-9020ccc57173}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffa1480e3d, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: ffffe9e08c43d649, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 10186

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 25019

Key : Analysis.Init.CPU.mSec
Value: 921

Key : Analysis.Init.Elapsed.mSec
Value: 4960

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 50

BUGCHECK_P1: ffffffffa1480e3d

BUGCHECK_P2: 2

BUGCHECK_P3: ffffe9e08c43d649

BUGCHECK_P4: 2

READ_ADDRESS: fffff80681afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffa1480e3d

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dwm.exe

TRAP_FRAME: ffffea0ca8c7cf90 -- (.trap 0xffffea0ca8c7cf90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffff80000f00 rbx=0000000000000000 rcx=ffffea0ca8c7d160
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=ffffe9e08c43d649 rsp=ffffea0ca8c7d120 rbp=ffffea0ca8c7d1b0
r8=ffffea0ca8c7d2d0 r9=0000000000000130 r10=fffff80681008500
r11=ffffea0ca8c7d130 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
win32kbase!GetKeyEventInputSource+0x869:
ffffe9e0`8c43d649 30803dff4721 xor byte ptr [rax+2147FF3Dh],al ds:ffffffff`a1480e3d=??
Resetting default scope

MISALIGNED_IP:
win32kbase!GetKeyEventInputSource+869
ffffe9e0`8c43d649 30803dff4721 xor byte ptr [rax+2147FF3Dh],al

STACK_TEXT:
ffffea0c`a8c7cce8 fffff806`8128dd7d : 00000000`00000050 ffffffff`a1480e3d 00000000`00000002 ffffea0c`a8c7cf90 : nt!KeBugCheckEx
ffffea0c`a8c7ccf0 fffff806`81128210 : 00000000`5b3a2c4a 00000000`00000002 ffffea0c`a8c7d010 00000000`00000000 : nt!MiSystemFault+0x147cbd
ffffea0c`a8c7cdf0 fffff806`81204d5e : 00000000`00000000 00000000`5b3a2c4a 00000000`0002553a 00000000`00000000 : nt!MmAccessFault+0x400
ffffea0c`a8c7cf90 ffffe9e0`8c43d649 : ffffffff`80000f70 ffffe9e0`8c43d228 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffea0c`a8c7d120 ffffe9e0`8c43d228 : 00000000`00000000 00000000`00000000 ffffe98e`8065f000 ffffea0c`a8c7d4b0 : win32kbase!GetKeyEventInputSource+0x869
ffffea0c`a8c7d130 ffffe9e0`8c43d0eb : 00000190`000002f2 00000190`000002f2 00000000`00000000 ffffad07`bd8b0c70 : win32kbase!GetKeyEventInputSource+0x448
ffffea0c`a8c7d1d0 ffffe9e0`8c4f9fb8 : 00000190`000002f2 ffffea0c`a8c7d310 ffffea0c`a8c7d510 ffffea0c`a8c7d670 : win32kbase!GetKeyEventInputSource+0x30b
ffffea0c`a8c7d210 ffffe9e0`8c444fd1 : ffffea0c`a8c7d670 ffffea0c`a8c7d570 ffffe9e0`8c60e188 ffffb1fa`e9c00000 : win32kbase!CInputManager::NotifyDwmInputThreadShutdown+0x280f8
ffffea0c`a8c7d470 ffffe9e0`8c4441be : ffffea0c`a8c7d720 ffffea0c`a8c7d7a0 ffffea0c`a8c7d720 00000000`00000000 : win32kbase!ProcessMouseEvent+0xeb1
ffffea0c`a8c7d640 ffffe9e0`8c44796c : ffffe9e0`8c6036f0 ffffea0c`a8c7d7a0 ffffe98e`8065fad8 ffffad07`be1c3080 : win32kbase!ProcessMouseEvent+0x9e
ffffea0c`a8c7d6a0 ffffe9e0`8c444136 : fffff806`811f4310 00000000`00000000 ffffe9e0`8c6460c0 00000000`00000000 : win32kbase!GreCleanDC+0x6bc
ffffea0c`a8c7d910 ffffe9e0`8c7b3a6c : 00000000`00000002 ffffffff`800005cc ffffe9e0`8c6460c0 00000000`00000000 : win32kbase!ProcessMouseEvent+0x16
ffffea0c`a8c7d940 ffffe9e0`8c443ffc : ffffad07`c0af0228 00000000`00000000 00000000`00000002 ffffad07`00000000 : win32kfull!EditionHandleMitSignal+0x5c
ffffea0c`a8c7d980 ffffe9e0`8c443f6e : ffffe98e`807eba20 ffffe98e`807eb010 00000000`00000000 00000000`40000040 : win32kbase!IOCPDispatcher::Dispatch+0x12c
ffffea0c`a8c7d9c0 ffffe9e0`8c443eef : 00000000`00000000 00000000`00000000 ffffe9e0`8c6460c0 00000000`00501802 : win32kbase!IOCPDispatcher::Dispatch+0x9e
ffffea0c`a8c7da00 ffffe9e0`8c443e91 : ffffea0c`00000000 ffffea0c`00000000 ffffe98e`80613fa0 ffff7ddd`00501802 : win32kbase!IOCPDispatcher::Dispatch+0x1f
ffffea0c`a8c7da60 ffffe9e0`8c443e15 : 00000000`000005e0 ffffe98e`80613fa0 00000000`000005e0 00000000`00000000 : win32kbase!NtMITDispatchCompletion+0x101
ffffea0c`a8c7daa0 ffffe9e0`8d3cf8a9 : ffffad07`be251080 ffffea0c`a8c7db80 00000214`d6d046f0 00000000`00000020 : win32kbase!NtMITDispatchCompletion+0x85
ffffea0c`a8c7dad0 fffff806`81208af1 : 00000000`00000001 ffffad07`be179560 00000000`00000000 ffffad07`00000000 : win32k!NtMITDispatchCompletion+0x15
ffffea0c`a8c7db00 00007ffe`501576e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000001c`f3d9f4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`501576e4


SYMBOL_NAME: win32kbase!GetKeyEventInputSource+869

MODULE_NAME: hardware

IMAGE_NAME: hardware

IMAGE_VERSION: 10.0.19041.1023

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: IP_MISALIGNED_win32kbase.sys

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {1b8016c6-78a7-5881-8c18-2704f15d4870}

Followup: MachineOwner
---------[/CODE]
 
Evet, disk ile alakalı sorunlar mevcut görünüyor. Dilerseniz HD Tune 5.75'i indirip diskinizin Health sekmesinin ekran alıntısını paylaşabilirsiniz.

Ek olarak bir süre BlueStacks'i kullanmayın.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffff8a8339602100, Address of the heap that reported the corruption
Arg3: ffff8a833a9c2000, Address at which the corruption was detected
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7624

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 27276

Key : Analysis.Init.CPU.mSec
Value: 1140

Key : Analysis.Init.Elapsed.mSec
Value: 5243

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 13a

BUGCHECK_P1: 12

BUGCHECK_P2: ffff8a8339602100

BUGCHECK_P3: ffff8a833a9c2000

BUGCHECK_P4: 0

CORRUPTING_POOL_ADDRESS: fffff8003f4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff8a833a9c2000

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffffc89`b3e53268 fffff800`3ed8e648 : 00000000`0000013a 00000000`00000012 ffff8a83`39602100 ffff8a83`3a9c2000 : nt!KeBugCheckEx
fffffc89`b3e53270 fffff800`3ed8e6a8 : 00000000`00000012 fffffc89`b3e53380 ffff8a83`39602100 fffffc89`b3e53440 : nt!RtlpHeapHandleError+0x40
fffffc89`b3e532b0 fffff800`3ed8e2d5 : ffff8a83`3a9c2000 ffff8a83`39602280 ffff8a83`39602280 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58
fffffc89`b3e532e0 fffff800`3ec811f8 : ffff8a83`3aa29460 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
fffffc89`b3e53310 fffff800`3eb122e4 : fffffc89`00000000 fffff800`3ea1e1c8 00000000`00000001 0f0f0f0f`00000000 : nt!RtlpHpVsContextFree+0x16da28
fffffc89`b3e533b0 fffff800`3f1b3149 : 00000000`00052a30 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffffc89`b3e53490 fffff800`3ea67c2e : 00000000`00000000 00000000`00000000 fffff800`3eb62ef0 fffff800`3ea9468f : nt!ExFreePool+0x9
fffffc89`b3e534c0 fffff800`3ec9edf8 : 00000000`00000000 00000000`0000003f ffff9d81`5c535ef0 fffff800`42e49e13 : nt!IoFreeMdl+0x6e
fffffc89`b3e534f0 fffff800`3eb9fa5d : 00000000`00000000 ffff8a83`3aa29480 00000000`00000000 fffff800`3eb52a09 : nt!HalFlushAdapterBuffersEx+0xff2c8
fffffc89`b3e53580 fffff800`3eace894 : ffff9d81`5c533020 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalPutScatterGatherListV3+0x3d
fffffc89`b3e535c0 fffff800`42e48dc9 : ffff9d81`5c533020 00000000`00989680 fffffc89`b3e53740 ffff8a83`3aa691a0 : nt!HalPutScatterGatherList+0x64
fffffc89`b3e53640 fffff800`42e58f1b : 00000000`00000000 00000000`00000000 fffff780`00000320 ffff9d81`5c533020 : storport!StorPortSetDeviceQueueDepth+0x4229
fffffc89`b3e537c0 fffff800`3eb230ce : fffffc89`b3e53b20 00000000`00000000 00000000`00000004 ffff9d81`5c096180 : storport!StorPortStallExecution+0xa3db
fffffc89`b3e53860 fffff800`3eb223b4 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffffc89`b3e539d0 fffff800`3ebfa78e : ffffffff`00000000 ffff9d81`5c096180 ffff9d81`5c0a11c0 ffff8a83`43617080 : nt!KiRetireDpcList+0x1f4
fffffc89`b3e53c60 00000000`00000000 : fffffc89`b3e54000 fffffc89`b3e4e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption

IMAGE_VERSION: 10.0.19041.1052

MODULE_NAME: Pool_Corruption

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: 0x13a_12_nt!ExFreePool

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {0e8bc89c-9b1f-e697-ed6c-83210db041e2}

Followup: Pool_corruption
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80466405532, Address of the instruction which caused the BugCheck
Arg3: ffffc90c90322bd0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 12343

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 20309

Key : Analysis.Init.CPU.mSec
Value: 1015

Key : Analysis.Init.Elapsed.mSec
Value: 3488

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80466405532

BUGCHECK_P3: ffffc90c90322bd0

BUGCHECK_P4: 0

CONTEXT: ffffc90c90322bd0 -- (.cxr 0xffffc90c90322bd0)
rax=ffffb3012beb6080 rbx=ffffb3012c511410 rcx=ffffb30123eb8890
rdx=0000000000000000 rsi=ffffb30124d06d20 rdi=0000000000011000
rip=fffff80466405532 rsp=ffffc90c903235d0 rbp=ffffc90c90323630
r8=0000000000000000 r9=0000000000000000 r10=ffffb30123f19ab0
r11=0000000000000001 r12=0000000000000009 r13=0000000000000009
r14=0000000000000101 r15=0000000002a7d301
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!IopQueryXxxInformation+0xa6:
fffff804`66405532 48898798000000 mov qword ptr [rdi+98h],rax ds:002b:00000000`00011098=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: javaw.exe

STACK_TEXT:
ffffc90c`903235d0 fffff804`664ce07d : ffffb301`24d6a800 00000000`00000000 00000000`000001de ffffc90c`903236b0 : nt!IopQueryXxxInformation+0xa6
ffffc90c`90323670 fffff804`664cc676 : ffffb301`2c511410 00000000`00000000 00000000`00000000 00000000`02a7d388 : nt!IopQueryNameInternal+0x3e9
ffffc90c`90323720 fffff804`664ccc23 : ffffb301`2c1dde40 ffffc90c`90323910 ffffb301`2ca3b700 00000000`00000000 : nt!IopQueryName+0x26
ffffc90c`90323770 fffff804`663fffb4 : ffffb301`2c511410 00000000`02a7d388 ffffb301`0000021a ffffc90c`903238d8 : nt!ObQueryNameStringMode+0xd3
ffffc90c`90323890 fffff804`663ff3b5 : ffffc3e1`c00016c0 ffffc3e1`f0e00008 ffffc3e1`f0f87000 ffffb301`2ca3b700 : nt!MmQueryVirtualMemory+0xbe4
ffffc90c`90323a40 fffff804`662085b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`02a7ea2c : nt!NtQueryVirtualMemory+0x25
ffffc90c`90323a90 00007ffe`14b0d284 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`02a7d2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`14b0d284

SYMBOL_NAME: nt!IopQueryXxxInformation+a6

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1052

STACK_COMMAND: .cxr 0xffffc90c90322bd0 ; kb

BUCKET_ID_FUNC_OFFSET: a6

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopQueryXxxInformation

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {b9f32c02-0b73-9b07-a848-9020ccc57173}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffa1480e3d, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: ffffe9e08c43d649, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 10186

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 25019

Key : Analysis.Init.CPU.mSec
Value: 921

Key : Analysis.Init.Elapsed.mSec
Value: 4960

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffffffa1480e3d

BUGCHECK_P2: 2

BUGCHECK_P3: ffffe9e08c43d649

BUGCHECK_P4: 2

READ_ADDRESS: fffff80681afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffa1480e3d

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dwm.exe

TRAP_FRAME: ffffea0ca8c7cf90 -- (.trap 0xffffea0ca8c7cf90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffff80000f00 rbx=0000000000000000 rcx=ffffea0ca8c7d160
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=ffffe9e08c43d649 rsp=ffffea0ca8c7d120 rbp=ffffea0ca8c7d1b0
r8=ffffea0ca8c7d2d0 r9=0000000000000130 r10=fffff80681008500
r11=ffffea0ca8c7d130 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
win32kbase!GetKeyEventInputSource+0x869:
ffffe9e0`8c43d649 30803dff4721 xor byte ptr [rax+2147FF3Dh],al ds:ffffffff`a1480e3d=??
Resetting default scope

MISALIGNED_IP:
win32kbase!GetKeyEventInputSource+869
ffffe9e0`8c43d649 30803dff4721 xor byte ptr [rax+2147FF3Dh],al

STACK_TEXT:
ffffea0c`a8c7cce8 fffff806`8128dd7d : 00000000`00000050 ffffffff`a1480e3d 00000000`00000002 ffffea0c`a8c7cf90 : nt!KeBugCheckEx
ffffea0c`a8c7ccf0 fffff806`81128210 : 00000000`5b3a2c4a 00000000`00000002 ffffea0c`a8c7d010 00000000`00000000 : nt!MiSystemFault+0x147cbd
ffffea0c`a8c7cdf0 fffff806`81204d5e : 00000000`00000000 00000000`5b3a2c4a 00000000`0002553a 00000000`00000000 : nt!MmAccessFault+0x400
ffffea0c`a8c7cf90 ffffe9e0`8c43d649 : ffffffff`80000f70 ffffe9e0`8c43d228 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffea0c`a8c7d120 ffffe9e0`8c43d228 : 00000000`00000000 00000000`00000000 ffffe98e`8065f000 ffffea0c`a8c7d4b0 : win32kbase!GetKeyEventInputSource+0x869
ffffea0c`a8c7d130 ffffe9e0`8c43d0eb : 00000190`000002f2 00000190`000002f2 00000000`00000000 ffffad07`bd8b0c70 : win32kbase!GetKeyEventInputSource+0x448
ffffea0c`a8c7d1d0 ffffe9e0`8c4f9fb8 : 00000190`000002f2 ffffea0c`a8c7d310 ffffea0c`a8c7d510 ffffea0c`a8c7d670 : win32kbase!GetKeyEventInputSource+0x30b
ffffea0c`a8c7d210 ffffe9e0`8c444fd1 : ffffea0c`a8c7d670 ffffea0c`a8c7d570 ffffe9e0`8c60e188 ffffb1fa`e9c00000 : win32kbase!CInputManager::NotifyDwmInputThreadShutdown+0x280f8
ffffea0c`a8c7d470 ffffe9e0`8c4441be : ffffea0c`a8c7d720 ffffea0c`a8c7d7a0 ffffea0c`a8c7d720 00000000`00000000 : win32kbase!ProcessMouseEvent+0xeb1
ffffea0c`a8c7d640 ffffe9e0`8c44796c : ffffe9e0`8c6036f0 ffffea0c`a8c7d7a0 ffffe98e`8065fad8 ffffad07`be1c3080 : win32kbase!ProcessMouseEvent+0x9e
ffffea0c`a8c7d6a0 ffffe9e0`8c444136 : fffff806`811f4310 00000000`00000000 ffffe9e0`8c6460c0 00000000`00000000 : win32kbase!GreCleanDC+0x6bc
ffffea0c`a8c7d910 ffffe9e0`8c7b3a6c : 00000000`00000002 ffffffff`800005cc ffffe9e0`8c6460c0 00000000`00000000 : win32kbase!ProcessMouseEvent+0x16
ffffea0c`a8c7d940 ffffe9e0`8c443ffc : ffffad07`c0af0228 00000000`00000000 00000000`00000002 ffffad07`00000000 : win32kfull!EditionHandleMitSignal+0x5c
ffffea0c`a8c7d980 ffffe9e0`8c443f6e : ffffe98e`807eba20 ffffe98e`807eb010 00000000`00000000 00000000`40000040 : win32kbase!IOCPDispatcher::Dispatch+0x12c
ffffea0c`a8c7d9c0 ffffe9e0`8c443eef : 00000000`00000000 00000000`00000000 ffffe9e0`8c6460c0 00000000`00501802 : win32kbase!IOCPDispatcher::Dispatch+0x9e
ffffea0c`a8c7da00 ffffe9e0`8c443e91 : ffffea0c`00000000 ffffea0c`00000000 ffffe98e`80613fa0 ffff7ddd`00501802 : win32kbase!IOCPDispatcher::Dispatch+0x1f
ffffea0c`a8c7da60 ffffe9e0`8c443e15 : 00000000`000005e0 ffffe98e`80613fa0 00000000`000005e0 00000000`00000000 : win32kbase!NtMITDispatchCompletion+0x101
ffffea0c`a8c7daa0 ffffe9e0`8d3cf8a9 : ffffad07`be251080 ffffea0c`a8c7db80 00000214`d6d046f0 00000000`00000020 : win32kbase!NtMITDispatchCompletion+0x85
ffffea0c`a8c7dad0 fffff806`81208af1 : 00000000`00000001 ffffad07`be179560 00000000`00000000 ffffad07`00000000 : win32k!NtMITDispatchCompletion+0x15
ffffea0c`a8c7db00 00007ffe`501576e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000001c`f3d9f4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`501576e4

SYMBOL_NAME: win32kbase!GetKeyEventInputSource+869

MODULE_NAME: hardware

IMAGE_NAME: hardware

IMAGE_VERSION: 10.0.19041.1023

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: IP_MISALIGNED_win32kbase.sys

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {1b8016c6-78a7-5881-8c18-2704f15d4870}

Followup: MachineOwner
---------[/CODE]

Enes bey teşekkür ederim öncelikle ben HDD çıkardım şu an sadece SSD var ama yine ekran kilitlendi BlueStacks'i kaldırırsam kökten çözülme olabilir mi?
Evet, disk ile alakalı sorunlar mevcut görünüyor. Dilerseniz HD Tune 5.75'i indirip diskinizin Health sekmesinin ekran alıntısını paylaşabilirsiniz.

Ek olarak bir süre BlueStacks'i kullanmayın.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffff8a8339602100, Address of the heap that reported the corruption
Arg3: ffff8a833a9c2000, Address at which the corruption was detected
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7624

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 27276

Key : Analysis.Init.CPU.mSec
Value: 1140

Key : Analysis.Init.Elapsed.mSec
Value: 5243

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 13a

BUGCHECK_P1: 12

BUGCHECK_P2: ffff8a8339602100

BUGCHECK_P3: ffff8a833a9c2000

BUGCHECK_P4: 0

CORRUPTING_POOL_ADDRESS: fffff8003f4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff8a833a9c2000

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffffc89`b3e53268 fffff800`3ed8e648 : 00000000`0000013a 00000000`00000012 ffff8a83`39602100 ffff8a83`3a9c2000 : nt!KeBugCheckEx
fffffc89`b3e53270 fffff800`3ed8e6a8 : 00000000`00000012 fffffc89`b3e53380 ffff8a83`39602100 fffffc89`b3e53440 : nt!RtlpHeapHandleError+0x40
fffffc89`b3e532b0 fffff800`3ed8e2d5 : ffff8a83`3a9c2000 ffff8a83`39602280 ffff8a83`39602280 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58
fffffc89`b3e532e0 fffff800`3ec811f8 : ffff8a83`3aa29460 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
fffffc89`b3e53310 fffff800`3eb122e4 : fffffc89`00000000 fffff800`3ea1e1c8 00000000`00000001 0f0f0f0f`00000000 : nt!RtlpHpVsContextFree+0x16da28
fffffc89`b3e533b0 fffff800`3f1b3149 : 00000000`00052a30 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffffc89`b3e53490 fffff800`3ea67c2e : 00000000`00000000 00000000`00000000 fffff800`3eb62ef0 fffff800`3ea9468f : nt!ExFreePool+0x9
fffffc89`b3e534c0 fffff800`3ec9edf8 : 00000000`00000000 00000000`0000003f ffff9d81`5c535ef0 fffff800`42e49e13 : nt!IoFreeMdl+0x6e
fffffc89`b3e534f0 fffff800`3eb9fa5d : 00000000`00000000 ffff8a83`3aa29480 00000000`00000000 fffff800`3eb52a09 : nt!HalFlushAdapterBuffersEx+0xff2c8
fffffc89`b3e53580 fffff800`3eace894 : ffff9d81`5c533020 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalPutScatterGatherListV3+0x3d
fffffc89`b3e535c0 fffff800`42e48dc9 : ffff9d81`5c533020 00000000`00989680 fffffc89`b3e53740 ffff8a83`3aa691a0 : nt!HalPutScatterGatherList+0x64
fffffc89`b3e53640 fffff800`42e58f1b : 00000000`00000000 00000000`00000000 fffff780`00000320 ffff9d81`5c533020 : storport!StorPortSetDeviceQueueDepth+0x4229
fffffc89`b3e537c0 fffff800`3eb230ce : fffffc89`b3e53b20 00000000`00000000 00000000`00000004 ffff9d81`5c096180 : storport!StorPortStallExecution+0xa3db
fffffc89`b3e53860 fffff800`3eb223b4 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffffc89`b3e539d0 fffff800`3ebfa78e : ffffffff`00000000 ffff9d81`5c096180 ffff9d81`5c0a11c0 ffff8a83`43617080 : nt!KiRetireDpcList+0x1f4
fffffc89`b3e53c60 00000000`00000000 : fffffc89`b3e54000 fffffc89`b3e4e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption

IMAGE_VERSION: 10.0.19041.1052

MODULE_NAME: Pool_Corruption

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: 0x13a_12_nt!ExFreePool

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {0e8bc89c-9b1f-e697-ed6c-83210db041e2}

Followup: Pool_corruption
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80466405532, Address of the instruction which caused the BugCheck
Arg3: ffffc90c90322bd0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 12343

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 20309

Key : Analysis.Init.CPU.mSec
Value: 1015

Key : Analysis.Init.Elapsed.mSec
Value: 3488

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80466405532

BUGCHECK_P3: ffffc90c90322bd0

BUGCHECK_P4: 0

CONTEXT: ffffc90c90322bd0 -- (.cxr 0xffffc90c90322bd0)
rax=ffffb3012beb6080 rbx=ffffb3012c511410 rcx=ffffb30123eb8890
rdx=0000000000000000 rsi=ffffb30124d06d20 rdi=0000000000011000
rip=fffff80466405532 rsp=ffffc90c903235d0 rbp=ffffc90c90323630
r8=0000000000000000 r9=0000000000000000 r10=ffffb30123f19ab0
r11=0000000000000001 r12=0000000000000009 r13=0000000000000009
r14=0000000000000101 r15=0000000002a7d301
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!IopQueryXxxInformation+0xa6:
fffff804`66405532 48898798000000 mov qword ptr [rdi+98h],rax ds:002b:00000000`00011098=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: javaw.exe

STACK_TEXT:
ffffc90c`903235d0 fffff804`664ce07d : ffffb301`24d6a800 00000000`00000000 00000000`000001de ffffc90c`903236b0 : nt!IopQueryXxxInformation+0xa6
ffffc90c`90323670 fffff804`664cc676 : ffffb301`2c511410 00000000`00000000 00000000`00000000 00000000`02a7d388 : nt!IopQueryNameInternal+0x3e9
ffffc90c`90323720 fffff804`664ccc23 : ffffb301`2c1dde40 ffffc90c`90323910 ffffb301`2ca3b700 00000000`00000000 : nt!IopQueryName+0x26
ffffc90c`90323770 fffff804`663fffb4 : ffffb301`2c511410 00000000`02a7d388 ffffb301`0000021a ffffc90c`903238d8 : nt!ObQueryNameStringMode+0xd3
ffffc90c`90323890 fffff804`663ff3b5 : ffffc3e1`c00016c0 ffffc3e1`f0e00008 ffffc3e1`f0f87000 ffffb301`2ca3b700 : nt!MmQueryVirtualMemory+0xbe4
ffffc90c`90323a40 fffff804`662085b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`02a7ea2c : nt!NtQueryVirtualMemory+0x25
ffffc90c`90323a90 00007ffe`14b0d284 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`02a7d2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`14b0d284

SYMBOL_NAME: nt!IopQueryXxxInformation+a6

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1052

STACK_COMMAND: .cxr 0xffffc90c90322bd0 ; kb

BUCKET_ID_FUNC_OFFSET: a6

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopQueryXxxInformation

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {b9f32c02-0b73-9b07-a848-9020ccc57173}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffa1480e3d, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: ffffe9e08c43d649, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 10186

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 25019

Key : Analysis.Init.CPU.mSec
Value: 921

Key : Analysis.Init.Elapsed.mSec
Value: 4960

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffffffa1480e3d

BUGCHECK_P2: 2

BUGCHECK_P3: ffffe9e08c43d649

BUGCHECK_P4: 2

READ_ADDRESS: fffff80681afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffa1480e3d

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dwm.exe

TRAP_FRAME: ffffea0ca8c7cf90 -- (.trap 0xffffea0ca8c7cf90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffff80000f00 rbx=0000000000000000 rcx=ffffea0ca8c7d160
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=ffffe9e08c43d649 rsp=ffffea0ca8c7d120 rbp=ffffea0ca8c7d1b0
r8=ffffea0ca8c7d2d0 r9=0000000000000130 r10=fffff80681008500
r11=ffffea0ca8c7d130 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
win32kbase!GetKeyEventInputSource+0x869:
ffffe9e0`8c43d649 30803dff4721 xor byte ptr [rax+2147FF3Dh],al ds:ffffffff`a1480e3d=??
Resetting default scope

MISALIGNED_IP:
win32kbase!GetKeyEventInputSource+869
ffffe9e0`8c43d649 30803dff4721 xor byte ptr [rax+2147FF3Dh],al

STACK_TEXT:
ffffea0c`a8c7cce8 fffff806`8128dd7d : 00000000`00000050 ffffffff`a1480e3d 00000000`00000002 ffffea0c`a8c7cf90 : nt!KeBugCheckEx
ffffea0c`a8c7ccf0 fffff806`81128210 : 00000000`5b3a2c4a 00000000`00000002 ffffea0c`a8c7d010 00000000`00000000 : nt!MiSystemFault+0x147cbd
ffffea0c`a8c7cdf0 fffff806`81204d5e : 00000000`00000000 00000000`5b3a2c4a 00000000`0002553a 00000000`00000000 : nt!MmAccessFault+0x400
ffffea0c`a8c7cf90 ffffe9e0`8c43d649 : ffffffff`80000f70 ffffe9e0`8c43d228 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffea0c`a8c7d120 ffffe9e0`8c43d228 : 00000000`00000000 00000000`00000000 ffffe98e`8065f000 ffffea0c`a8c7d4b0 : win32kbase!GetKeyEventInputSource+0x869
ffffea0c`a8c7d130 ffffe9e0`8c43d0eb : 00000190`000002f2 00000190`000002f2 00000000`00000000 ffffad07`bd8b0c70 : win32kbase!GetKeyEventInputSource+0x448
ffffea0c`a8c7d1d0 ffffe9e0`8c4f9fb8 : 00000190`000002f2 ffffea0c`a8c7d310 ffffea0c`a8c7d510 ffffea0c`a8c7d670 : win32kbase!GetKeyEventInputSource+0x30b
ffffea0c`a8c7d210 ffffe9e0`8c444fd1 : ffffea0c`a8c7d670 ffffea0c`a8c7d570 ffffe9e0`8c60e188 ffffb1fa`e9c00000 : win32kbase!CInputManager::NotifyDwmInputThreadShutdown+0x280f8
ffffea0c`a8c7d470 ffffe9e0`8c4441be : ffffea0c`a8c7d720 ffffea0c`a8c7d7a0 ffffea0c`a8c7d720 00000000`00000000 : win32kbase!ProcessMouseEvent+0xeb1
ffffea0c`a8c7d640 ffffe9e0`8c44796c : ffffe9e0`8c6036f0 ffffea0c`a8c7d7a0 ffffe98e`8065fad8 ffffad07`be1c3080 : win32kbase!ProcessMouseEvent+0x9e
ffffea0c`a8c7d6a0 ffffe9e0`8c444136 : fffff806`811f4310 00000000`00000000 ffffe9e0`8c6460c0 00000000`00000000 : win32kbase!GreCleanDC+0x6bc
ffffea0c`a8c7d910 ffffe9e0`8c7b3a6c : 00000000`00000002 ffffffff`800005cc ffffe9e0`8c6460c0 00000000`00000000 : win32kbase!ProcessMouseEvent+0x16
ffffea0c`a8c7d940 ffffe9e0`8c443ffc : ffffad07`c0af0228 00000000`00000000 00000000`00000002 ffffad07`00000000 : win32kfull!EditionHandleMitSignal+0x5c
ffffea0c`a8c7d980 ffffe9e0`8c443f6e : ffffe98e`807eba20 ffffe98e`807eb010 00000000`00000000 00000000`40000040 : win32kbase!IOCPDispatcher::Dispatch+0x12c
ffffea0c`a8c7d9c0 ffffe9e0`8c443eef : 00000000`00000000 00000000`00000000 ffffe9e0`8c6460c0 00000000`00501802 : win32kbase!IOCPDispatcher::Dispatch+0x9e
ffffea0c`a8c7da00 ffffe9e0`8c443e91 : ffffea0c`00000000 ffffea0c`00000000 ffffe98e`80613fa0 ffff7ddd`00501802 : win32kbase!IOCPDispatcher::Dispatch+0x1f
ffffea0c`a8c7da60 ffffe9e0`8c443e15 : 00000000`000005e0 ffffe98e`80613fa0 00000000`000005e0 00000000`00000000 : win32kbase!NtMITDispatchCompletion+0x101
ffffea0c`a8c7daa0 ffffe9e0`8d3cf8a9 : ffffad07`be251080 ffffea0c`a8c7db80 00000214`d6d046f0 00000000`00000020 : win32kbase!NtMITDispatchCompletion+0x85
ffffea0c`a8c7dad0 fffff806`81208af1 : 00000000`00000001 ffffad07`be179560 00000000`00000000 ffffad07`00000000 : win32k!NtMITDispatchCompletion+0x15
ffffea0c`a8c7db00 00007ffe`501576e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000001c`f3d9f4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`501576e4

SYMBOL_NAME: win32kbase!GetKeyEventInputSource+869

MODULE_NAME: hardware

IMAGE_NAME: hardware

IMAGE_VERSION: 10.0.19041.1023

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: IP_MISALIGNED_win32kbase.sys

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {1b8016c6-78a7-5881-8c18-2704f15d4870}

Followup: MachineOwner
---------[/CODE]

Enes bey HDD çıkardım BlueStacks'i sildim hata hala devam ediyor.
 
Son düzenleme:

Geri
Yukarı