KERNEL_SECURITY_CHECK_FAILURE hatası

  • Konuyu başlatan 142404
  • Başlangıç Tarihi
  • Mesaj 13
  • Görüntüleme 1.338

142404

Kilopat
Katılım
23 Kasım 2016
Mesajlar
109
Merhaba,
Az önce aoe4 oynarken oyun bitiminde bir anda kscf mavi ekranı yedim. Dump dosyasını debuger üzerinden inceledim ama çok anlayamadım durumu. Özelikle bir exe dosyasını işaret etmedi Minidump dosyam. Yardımlarınız için şimdiden teşekkür ederim.
Windows 11 22621 sürümündeyim.

Yine AO4 oynarken mavi ekran yedim ama hata ekranı karşıma çıkmadı. Bilgisayar kendini yeniden başlattı ardından Chrome falan açılırken yeniden mavi ekran geldi Yeni dump dosyası
 
Son düzenleyen: Moderatör:
Ben kesin bir sebep göremedim açıkçası dökümlerde. Sorun devam ediyor mu?

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8066f154b78, Address of the instruction which caused the BugCheck
Arg3: fffffc8d37cb6110, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1468

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13953

    Key  : Analysis.IO.Other.Mb
    Value: 14

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 28

    Key  : Analysis.Init.CPU.mSec
    Value: 155

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30915

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 99

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : Dump.Attributes.AsUlong
    Value: 808

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  030623-11265-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8066f154b78

BUGCHECK_P3: fffffc8d37cb6110

BUGCHECK_P4: 0

CONTEXT:  fffffc8d37cb6110 -- (.cxr 0xfffffc8d37cb6110)
rax=0000000000000001 rbx=0000000000000024 rcx=0000000000000024
rdx=000100000000001d rsi=0000000000000000 rdi=fffffc8d37cb6c50
rip=fffff8066f154b78 rsp=fffffc8d37cb6b30 rbp=ffffc801a835ed20
 r8=fffffc8d37cb6c50  r9=ffff800f26f79600 r10=0000000000000039
r11=fffffffff70aa4a0 r12=fffffc8d37cb6c50 r13=000100000000001d
r14=ffffc801a8454420 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nt!FsRtlCompareNodeAndKey+0x18:
fffff806`6f154b78 48395130        cmp     qword ptr [rcx+30h],rdx ds:002b:00000000`00000054=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
fffffc8d`37cb6b30 fffff806`6f5c22ea     : 00000000`00000000 00000000`00000024 ffffc801`a835ed20 00000000`00000000 : nt!FsRtlCompareNodeAndKey+0x18
fffffc8d`37cb6b60 fffff806`720395aa     : ffffc801`a8454420 00000000`00000000 00000000`00000000 fffffc8d`37cb6dc0 : nt!FsRtlFindInTunnelCacheEx+0x8a
fffffc8d`37cb6bc0 fffff806`7207b2aa     : 00000000`00000000 00000000`00000000 ffff800f`2a8b9a01 ffffc801`a835ed20 : Ntfs!NtfsRenameToPrivateDir+0x86a
fffffc8d`37cb6ed0 fffff806`72024c0c     : 00000000`00000000 fffffc8d`37cb73a8 00000000`00000000 ffffc801`b21d9010 : Ntfs!NtfsCommonCleanup+0x103a
fffffc8d`37cb7340 fffff806`6f0cf765     : ffffc801`afb49620 fffff806`6bab7da9 ffffc801`a835ed20 ffffc801`b21d9440 : Ntfs!NtfsFsdCleanup+0x1ec
fffffc8d`37cb76b0 fffff806`6bab9f5b     : ffffc801`b21d9001 ffffc801`afb49620 ffffc801`b3016eb0 ffffc801`b21d9020 : nt!IofCallDriver+0x55
fffffc8d`37cb76f0 fffff806`6bab7ba3     : fffffc8d`37cb7780 00000000`00000000 00000000`00000000 ffffc801`a835ed20 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15b
fffffc8d`37cb7760 fffff806`6f0cf765     : ffffc801`b3016eb0 fffff806`6f0d8368 ffffc801`b21d9020 ffffc801`b21d9040 : FLTMGR!FltpDispatch+0xa3
fffffc8d`37cb77c0 fffff806`6f4e5cbf     : ffffc801`b3016eb0 ffffc801`a835ed20 ffffc801`b01b8080 ffffc801`b21d9010 : nt!IofCallDriver+0x55
fffffc8d`37cb7800 fffff806`6f4dd188     : fffffc8d`37cb7949 fffffc8d`00000000 00000000`000028e0 00000000`00000001 : nt!IopCloseFile+0x18f
fffffc8d`37cb7890 fffff806`6f4da8b9     : ffffc891`a2aeeb91 00000000`00000000 00000000`000028e0 00000000`00000000 : nt!ObpCloseHandle+0x298
fffffc8d`37cb79b0 fffff806`6f23d9e5     : ffffc801`ad0b0080 ffffc801`afd654e0 ffffc801`ad0b0080 ffffc801`00000000 : nt!NtClose+0x39
fffffc8d`37cb79e0 00007ff9`8b1cefe4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000002e`027fe958 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8b1cefe4


SYMBOL_NAME:  nt!FsRtlCompareNodeAndKey+18

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22621.1265

STACK_COMMAND:  .cxr 0xfffffc8d37cb6110 ; kb

BUCKET_ID_FUNC_OFFSET:  18

FAILURE_BUCKET_ID:  AV_nt!FsRtlCompareNodeAndKey

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {430cf121-0791-6c40-72be-1b7c0ebfdc85}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff801270d1570, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff801270d14c8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1077

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9096

    Key  : Analysis.IO.Other.Mb
    Value: 12

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 23

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 20162

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x139

    Key  : Bugcheck.Code.Register
    Value: 0x139

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3


FILE_IN_CAB:  030623-9984-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff801270d1570

BUGCHECK_P3: fffff801270d14c8

BUGCHECK_P4: 0

TRAP_FRAME:  fffff801270d1570 -- (.trap 0xfffff801270d1570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe386a7cd64e8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012b8ba6c1 rsp=fffff801270d1700 rbp=ffffe386a60a4730
 r8=fffff801258ab360  r9=0000000000000001 r10=0000000000000000
r11=ffffe386a119d5c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiProcessThreadWaitList+0xa1:
fffff801`2b8ba6c1 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff801270d14c8 -- (.exr 0xfffff801270d14c8)
ExceptionAddress: fffff8012b8ba6c1 (nt!KiProcessThreadWaitList+0x00000000000000a1)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffff801`270d1248 fffff801`2ba3e2a9     : 00000000`00000139 00000000`00000003 fffff801`270d1570 fffff801`270d14c8 : nt!KeBugCheckEx
fffff801`270d1250 fffff801`2ba3e832     : fffff801`258a8180 00000005`00000000 fffff801`00000005 fffff801`270d1720 : nt!KiBugCheckDispatch+0x69
fffff801`270d1390 fffff801`2ba3c606     : ffffab81`7b896180 ffffe386`996b6780 ffffe386`a119d5c0 ffffe386`a119d5c0 : nt!KiFastFailDispatch+0xb2
fffff801`270d1570 fffff801`2b8ba6c1     : ffffe386`9e039010 ffffe386`9cbe0158 00000000`00000000 ffffe386`a119d730 : nt!KiRaiseSecurityCheckFailure+0x346
fffff801`270d1700 fffff801`2b8bb883     : ffffe386`00000002 ffffe386`00000001 fffff801`00000000 ffffe386`00000002 : nt!KiProcessThreadWaitList+0xa1
fffff801`270d1780 fffff801`2b8bcea6     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00cb508b : nt!KiProcessExpiredTimerList+0x343
fffff801`270d18b0 fffff801`2ba2da4e     : fffff801`258a8180 fffff801`258a8180 fffff801`2c34c6c0 ffffe386`a7e3c5c0 : nt!KiRetireDpcList+0xed6
fffff801`270d1b40 00000000`00000000     : fffff801`270d2000 fffff801`270cb000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiProcessExpiredTimerList+343

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22621.1265

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  343

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9db7945b-255d-24a1-9f2c-82344e883ab8}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffade003000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80443a4d1ee, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 812

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1696

    Key  : Analysis.IO.Other.Mb
    Value: 11

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 23

    Key  : Analysis.Init.CPU.mSec
    Value: 186

    Key  : Analysis.Init.Elapsed.mSec
    Value: 22696

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 808

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  030623-10000-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffade003000028

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80443a4d1ee

READ_ADDRESS: fffff8044451c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffade003000028

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RelicCardinal_

TRAP_FRAME:  ffffba04db6cf2c0 -- (.trap 0xffffba04db6cf2c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000200100000 rbx=0000000000000000 rcx=000000ffffffffff
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80443a4d1ee rsp=ffffba04db6cf450 rbp=ffff8006402bba60
 r8=ffffba04db6cf528  r9=0000000000000000 r10=fffff77bbddee000
r11=fffff77bbddee7f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiGetPageProtection+0xbe:
fffff804`43a4d1ee 4b8b4cf528      mov     rcx,qword ptr [r13+r14*8+28h] ds:00000000`00000028=????????????????
Resetting default scope

STACK_TEXT: 
ffffba04`db6cf178 fffff804`43c3e2a9     : 00000000`0000000a ffffade0`03000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffba04`db6cf180 fffff804`43c39934     : fffff701`1dcb3af8 00000000`00000000 00000000`00000000 ffffba04`db6cf5b4 : nt!KiBugCheckDispatch+0x69
ffffba04`db6cf2c0 fffff804`43a4d1ee     : ffffffff`ffffffff fffff77b`bdc04770 fffff77b`808ee5a0 ffff8006`2ea5c140 : nt!KiPageFault+0x474
ffffba04`db6cf450 fffff804`43a4c0e9     : 00000000`00000000 00000000`00001000 00000000`00000000 ffffba04`db6cf5b0 : nt!MiGetPageProtection+0xbe
ffffba04`db6cf4b0 fffff804`43a494e9     : 00000000`00000000 ffffba04`00000000 00000000`00040282 fffff804`43b09404 : nt!MiQueryAddressState+0x4c9
ffffba04`db6cf6c0 fffff804`43eb2517     : ffffba04`db6cf810 0000023b`96810000 ffff8006`402b0000 ffff8006`402bba60 : nt!MiQueryAddressSpan+0x219
ffffba04`db6cf780 fffff804`43eb1dc5     : 00000000`00000000 00000000`00000000 00000000`10000000 000000d7`c84ff090 : nt!MmQueryVirtualMemory+0x737
ffffba04`db6cf920 fffff804`43c3d9e5     : ffff8006`2eaa6380 00000000`00000000 00000000`77566d4d ffffba04`db6cf900 : nt!NtQueryVirtualMemory+0x25
ffffba04`db6cf970 00007ffb`750ef264     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000d7`c84fede8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`750ef264


SYMBOL_NAME:  nt!MiGetPageProtection+be

MODULE_NAME: nt

IMAGE_VERSION:  10.0.22621.1265

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  be

FAILURE_BUCKET_ID:  AV_nt!MiGetPageProtection

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {41372a35-237d-1281-82f6-8f5f9bf6044a}

Followup:     MachineOwner
---------

WhoCrashed de net bir sebep bulamadı.




Crash dump file: C:\Users\Recep\Downloads\Compressed\030623-9984-01.dmp (Minidump)
Uptime:4 days, 01:01:31 (hh:mm:ss)
Bugcheck code: 0x139(0x3, 0xFFFFF801270D1570, 0xFFFFF801270D14C8, 0x0)
Bugcheck name:KERNEL_SECURITY_CHECK_FAILURE
Driver or module in which error occurred: ntkrnlmp.exe (nt!KiBugCheckDispatch+0x69)
This is the core Windows kernel module. No offending driver has been revealed.
Description: NT Kernel & System
Product: Microsoft® Windows® Operating System
Company: Microsoft Corporation
Bug check description:The kernel has detected the corruption of a critical data structure.
Analysis:This particular bugcheck may be caused by malware or a security product that does not follow programming guidelines. This can also be caused by memory corruption. This is possibly a software problem. There is a possibility that this is caused by memory corruption. Memory corruption can be caused by a faulty driver, faulty RAM, overheating and more. Read this article on memory corruption. Read this article on thermal issues


On Mon 6.03.2023 05:20:12 your computer crashed or a problem was reported


Crash dump file: C:\Users\Recep\Downloads\Compressed\030623-11265-01.dmp (Minidump)
Uptime:00:01:04 (hh:mm:ss)
Bugcheck code: 0x3B(0xC0000005, 0xFFFFF8066F154B78, 0xFFFFFC8D37CB6110, 0x0)
Bugcheck name:SYSTEM_SERVICE_EXCEPTION
Driver or module in which error occurred: Ntfs.sys (Ntfs!NtfsRenameToPrivateDir+0x86A)
File path:Ntfs.sys
Description: NT Dosya Sistemi Sürücüsü
Product: Microsoft® Windows® İşletim Sistemi
Company: Microsoft Corporation
Bug check description:This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
Analysis:This is a typical software problem. Most likely this is caused by a bug in a driver. The crash took place in a file system driver. Since a problem was detected with a file system driver, it's suggested that you run CHKDSK to check your drive(s) for errors.


On Mon 6.03.2023 05:18:48 your computer crashed or a problem was reported


Crash dump file: C:\Users\Recep\Downloads\Compressed\030623-10000-01.dmp (Minidump)
Uptime:03:27:42 (hh:mm:ss)
Bugcheck code: 0xA(0xFFFFADE003000028, 0x2, 0x0, 0xFFFFF80443A4D1EE)
Bugcheck name:IRQL_NOT_LESS_OR_EQUAL
Driver or module in which error occurred: ntkrnlmp.exe (nt!KiBugCheckDispatch+0x69)
This is the core Windows kernel module. No offending driver has been revealed.
Description: NT Kernel & System
Product: Microsoft® Windows® Operating System
Company: Microsoft Corporation
Bug check description:This indicates that Microsoft Windows or a kernel-mode driver accessed paged memory at DISPATCH_LEVEL or above. This is a software bug.
Analysis:This is a typical software problem. Most likely this is caused by a bug in a driver. The crash analysis did not reveal an offending driver. Possibly this problem was caused by a driver that cannot be identified at this time.
 
Son düzenleme:
En son attığım minidump dosyasından sonra henüz karşılaşmadım ama iş yoğunluğu çok fazla. Irgat gibi çalıştırdıkları için 3 gündür oyun oynamaya vakit bulamadım. Şimdi mesaim bitti foruma girdim birazdan oyna gireceğim yine hata gelirse paylaşacağım.

Bilgisayarın test edebileceğim bütün parçalarını test ettim stres testlerine soktum defalarca virüs taraması yaptım somut bir şey bulamadım. Voltajlarla belki sorun vardır diye 2 gün boyunca kullandığım prizin akım verilerini kaydettim diğer yerler ile karşılaştırdım sorun bulamadım oradan da.

İlk oyunumda tekrardan farklı bir hata ile mavi ekran yedim yine. Dump dosyası

Dump dosyası inceleme konusunda iyi değilim sadece Recep abinin videosundaki bilgiler üzerinden düşününce sanırım buradaki hata Chrome yüzünden bir bellek hatası.
 
Son düzenleyen: Moderatör:
Değerli konu sahibi. Dediklerimi yapmazsan yada sonradan kendi bildiğini okursan nasıl sorun çözülebilir
Corsaiar silinmemiş. Ses ve ağ kartı güncellenmemiş. Chorme için donanım hızlandırna açık/kapalı olarak dene. Şu an hangisi var ise tam tersi olarak dene. RAM değerleri ile oynadıysan oto'ya çek. Birde düşük ihtimal ama memtest86 ile bellek testi yap.
 
Bellek sorunu gibi ama size ilk önerim Windows sürümünüz biraz eski gibi. Sizdeki sürüm 19041.2728, olması gereken 19045.2728.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000006000, The subtype of the BugCheck.
Arg2: ffff9a8a61ced3f0
Arg3: ffffffffc0000225
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13130

    Key  : Analysis.IO.Other.Mb
    Value: 4

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 24

    Key  : Analysis.Init.CPU.mSec
    Value: 250

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10576

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  031823-7515-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 6000

BUGCHECK_P2: ffff9a8a61ced3f0

BUGCHECK_P3: ffffffffc0000225

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffffe18d`ca8b7668 fffff804`75a389ff     : 00000000`0000001a 00000000`00006000 ffff9a8a`61ced3f0 ffffffff`c0000225 : nt!KeBugCheckEx
ffffe18d`ca8b7670 fffff804`759470eb     : ffff9a8a`61ced410 fffff804`00000009 ffff9a8a`61ced400 00000000`00000000 : nt!MiStoreFaultComplete+0x1ea10f
ffffe18d`ca8b76b0 fffff804`75944e75     : ffffe18d`00001000 ffffe18d`ca8b7700 ffffe18d`ca8b77f0 ffff9a8a`00000000 : nt!MiWaitForInPageComplete+0x2fb
ffffe18d`ca8b77a0 fffff804`758a4dd8     : 00000000`c0033333 00000000`00000001 00007ff5`0feb9db8 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffffe18d`ca8b7860 fffff804`75a09bd8     : 00000863`7bd05af7 000000a0`6503f320 ffffe18d`ca8b7a18 ffffffff`fffe0430 : nt!MmAccessFault+0x468
ffffe18d`ca8b7a00 00007ffe`77efc73e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
000000a0`6503ebc8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`77efc73e


SYMBOL_NAME:  nt!MiStoreFaultComplete+1ea10f

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.2728

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1ea10f

FAILURE_BUCKET_ID:  0x1a_6000_nt!MiStoreFaultComplete

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5aeab764-ac22-f5da-da84-a57cd09c5d73}

Followup:     MachineOwner
---------
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…