1) Internet Explorer'ı kaldırabiliyorsanız kaldırın, kaldıramıyorsanız da mevcut güncelleştirmesi varsa güncelleştirmesini kaldırın.
2) Hızlı Başlatma ayarını kapatın. Bununla alakalı rehber aşağıda yer almaktadır.
Microsoft'un Windows 8 ile birlikte kullanıcılara sunduÄu hızlı baÅlat özelliÄini nasıl devre dıÅı bırakacaÄınızı anlatıyoruz Windows 8 ve 8.
3) Vanguard'ı kaldırın. Kaldırdıktan sonra dilediğiniz zaman tekrar kurulumunu başlatabilirsiniz.
Tüm önerileri deneyip sonucu olumlu ya da olumsuz bir biçimde bizimle paylaşırsanız sevinirim.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, An RTL_BALANCED_NODE RBTree entry has been corrupted.
Arg2: ffffa585cbf62890, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffa585cbf627e8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for CI.dll
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8640
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 15765
Key : Analysis.Init.CPU.mSec
Value: 1593
Key : Analysis.Init.Elapsed.mSec
Value: 10151
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : FailFast.Name
Value: INVALID_BALANCED_TREE
Key : FailFast.Type
Value: 29
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 021122-6828-01.dmp
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: ffffa585cbf62890
BUGCHECK_P3: ffffa585cbf627e8
BUGCHECK_P4: 0
TRAP_FRAME: ffffa585cbf62890 -- (.trap 0xffffa585cbf62890)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8081a2d2ae38 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff8081a2d65e38 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80545cb88f5 rsp=ffffa585cbf62a20 rbp=0000000000000000
r8=0000000000000001 r9=ffff0081a2d65e38 r10=ffff8081a2d65e48
r11=ffff8081a2cd4e38 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!RtlRbRemoveNode+0x1bb3f5:
fffff805`45cb88f5 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffa585cbf627e8 -- (.exr 0xffffa585cbf627e8)
ExceptionAddress: fffff80545cb88f5 (nt!RtlRbRemoveNode+0x00000000001bb3f5)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffa585`cbf62568 fffff805`45c28da9 : 00000000`00000139 00000000`0000001d ffffa585`cbf62890 ffffa585`cbf627e8 : nt!KeBugCheckEx
ffffa585`cbf62570 fffff805`45c291f2 : ffffcc8e`5e88a040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa585`cbf626b0 fffff805`45c274d2 : ffffcc8e`5e94ef60 00000000`00000000 0000021c`636c0000 00000000`00000000 : nt!KiFastFailDispatch+0xb2
ffffa585`cbf62890 fffff805`45cb88f5 : 00000022`001b0000 00000000`0000012d 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x312
ffffa585`cbf62a20 fffff805`45afd2a8 : 00000000`72634943 ffff8081`a2c2efe0 ffff8081`a2c2ee30 fffff805`4aae8983 : nt!RtlRbRemoveNode+0x1bb3f5
ffffa585`cbf62a50 fffff805`45afcc93 : ffff8081`9ec002c0 ffff8081`a2c24000 ffffa585`cbf62cd0 ffffa585`cbf62b48 : nt!RtlpHpVsChunkCoalesce+0xb8
ffffa585`cbf62ab0 fffff805`45b03f1a : ffff8081`00000000 ffff8081`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x1b3
ffffa585`cbf62b40 fffff805`4626b019 : 01000000`000012c0 00000000`00000000 ffff8081`a27f57f0 fffff805`4aad16c8 : nt!ExFreeHeapPool+0x4fa
ffffa585`cbf62bf0 fffff805`4ab0797c : 01000000`00000000 0000021c`636c0000 ffff8081`a27f57f0 ffffa585`cbf62d88 : nt!ExFreePool+0x9
ffffa585`cbf62c20 01000000`00000000 : 0000021c`636c0000 ffff8081`a27f57f0 ffffa585`cbf62d88 ffff8081`a27f57f0 : CI+0x6797c
ffffa585`cbf62c28 0000021c`636c0000 : ffff8081`a27f57f0 ffffa585`cbf62d88 ffff8081`a27f57f0 fffff805`4aae75fd : 0x01000000`00000000
ffffa585`cbf62c30 ffff8081`a27f57f0 : ffffa585`cbf62d88 ffff8081`a27f57f0 fffff805`4aae75fd 00000000`00000000 : 0x0000021c`636c0000
ffffa585`cbf62c38 ffffa585`cbf62d88 : ffff8081`a27f57f0 fffff805`4aae75fd 00000000`00000000 ffff8081`9fe9bce0 : 0xffff8081`a27f57f0
ffffa585`cbf62c40 ffff8081`a27f57f0 : fffff805`4aae75fd 00000000`00000000 ffff8081`9fe9bce0 00000000`00000004 : 0xffffa585`cbf62d88
ffffa585`cbf62c48 fffff805`4aae75fd : 00000000`00000000 ffff8081`9fe9bce0 00000000`00000004 fffff805`4aad16c8 : 0xffff8081`a27f57f0
ffffa585`cbf62c50 00000000`00000000 : ffff8081`9fe9bce0 00000000`00000004 fffff805`4aad16c8 00000000`00000800 : CI+0x475fd
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.22000.469
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ab43366d-59cb-5971-8e17-b53398bf3f90}
Followup: Pool_corruption
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80639762423, The address that the exception occurred at
Arg3: ffffa982c8405338, Exception Record Address
Arg4: ffffa982c8404b50, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for CI.dll
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 7733
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 19096
Key : Analysis.Init.CPU.mSec
Value: 1436
Key : Analysis.Init.Elapsed.mSec
Value: 6641
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 020822-7734-01.dmp
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80639762423
BUGCHECK_P3: ffffa982c8405338
BUGCHECK_P4: ffffa982c8404b50
EXCEPTION_RECORD: ffffa982c8405338 -- (.exr 0xffffa982c8405338)
ExceptionAddress: fffff80639762423 (CI+0x0000000000022423)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffa982c8404b50 -- (.cxr 0xffffa982c8404b50)
rax=5cce28e603aa9240 rbx=00ffb28470f89d30 rcx=ffffb284712e7c38
rdx=00ffffffffca20f8 rsi=0000000000000001 rdi=00ffb28470f89d30
rip=fffff80639762423 rsp=ffffa982c8405578 rbp=0000000000000000
r8=0000000000000014 r9=0000000000000002 r10=0000fffff8063978
r11=ffff787866c00000 r12=0000000000000000 r13=ffffb284712e7c38
r14=0000000000000000 r15=0000000000000014
iopl=0 nv up ei pl nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050213
CI+0x22423:
fffff806`39762423 483b0411 cmp rax,qword ptr [rcx+rdx] ds:002b:00ffb284`70f89d30=????????????????
Resetting default scope
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff80638105450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffa982`c8405578 fffff806`39788f1f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : CI+0x22423
ffffa982`c8405580 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`39788f10 : CI+0x48f1f
SYMBOL_NAME: CI+22423
MODULE_NAME: CI
IMAGE_NAME: CI.dll
STACK_COMMAND: .cxr 0xffffa982c8404b50 ; kb
BUCKET_ID_FUNC_OFFSET: 22423
FAILURE_BUCKET_ID: AV_CI!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fd26e961-fe42-67bc-8b39-afa3c1dac45e}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
hibernation file.
Arg2: 000000000000000a
Arg3: 0000000000001055, Incorrect checksum
Arg4: 0000000000003561, Previous disk read's checksum
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6109
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11261
Key : Analysis.Init.CPU.mSec
Value: 1312
Key : Analysis.Init.Elapsed.mSec
Value: 11255
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
FILE_IN_CAB: 020322-12296-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1009
Hiber Crash Dump
Kernel Generated Triage Dump
BUGCHECK_CODE: a0
BUGCHECK_P1: 10e
BUGCHECK_P2: a
BUGCHECK_P3: 1055
BUGCHECK_P4: 3561
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffff9a83`50eca618 fffff806`0b85a796 : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00001055 : nt!KeBugCheckEx
ffff9a83`50eca620 fffff806`0b84a09c : 00000000`00000001 ffffb10a`87139f38 00000004`230ee000 ffffe78d`766f2000 : nt!PopHiberChecksumHiberFileData+0x10436
ffff9a83`50eca680 fffff806`0b84949b : 00000000`00000000 ffffb10a`87139f38 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x2d8
ffff9a83`50eca6f0 fffff806`0b8480fe : 00000b2b`fd2f9165 ffffb10a`87139f38 ffff9a83`50eca910 00000000`0000000c : nt!PopRestoreHiberContext+0x21b
ffff9a83`50eca780 fffff806`0b847df6 : fffff806`0ba54840 ffff9a83`50eca900 fffff806`0ba54840 ffff9a83`50eca900 : nt!PopHandleNextState+0x25e
ffff9a83`50eca7d0 fffff806`0b847b5a : 00000000`00989680 fffff806`0ba54840 00000008`620fa96e 00000000`00000000 : nt!PopIssueNextState+0x1a
ffff9a83`50eca800 fffff806`0b84afb1 : ffff9a83`50ecab00 00000000`00000000 00000000`00000000 fffff806`0b84d28f : nt!PopInvokeSystemStateHandler+0x346
ffff9a83`50ecaa10 fffff806`0b8459ed : ffffffff`00000000 ffffffff`ffffffff ffffe78d`70b8f040 ffffe78d`70b8f040 : nt!PopEndMirroring+0x1e1
ffff9a83`50ecaad0 fffff806`0b845765 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MmDuplicateMemory+0x22d
ffff9a83`50ecab60 fffff806`0b0478f5 : ffffe78d`70b8f000 ffffe78d`70b8f040 fffff806`0b845630 00000000`00400000 : nt!PopTransitionToSleep+0x135
ffff9a83`50ecabf0 fffff806`0b21a2d4 : ffff9f00`9cf0f180 ffffe78d`70b8f040 fffff806`0b0478a0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffff9a83`50ecac40 00000000`00000000 : ffff9a83`50ecb000 ffff9a83`50ec5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+10436
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.469
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 10436
FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}
Followup: MachineOwner
---------[/CODE]