Sergio Ramos
Hectopat
- Katılım
- 2 Nisan 2019
- Mesajlar
- 72
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80318a24e51, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4312
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8506
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80318a24e51
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff803098fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8030980f330: Unable to get Flags value from nt!KdVersionBlock
fffff8030980f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
BAD_STACK_POINTER: fffff8030f281158
STACK_TEXT:
fffff803`0f281158 fffff803`090f4b0e : 00000000`0000001e ffffffff`c0000005 fffff803`18a24e51 00000000`00000000 : nt!KeBugCheckEx
fffff803`0f281160 fffff803`08ffe642 : fffff803`090f4aec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff803`0f2811a0 fffff803`08f2bf97 : fffff803`0f281710 00000000`00000000 fffff803`0f26cc60 fffff803`08ff92ee : nt!RtlpExecuteHandlerForException+0x12
fffff803`0f2811d0 fffff803`08f2ab86 : fffff803`0f26c438 fffff803`0f281e20 fffff803`0f26c438 ffffbb8c`a77ceb30 : nt!RtlDispatchException+0x297
fffff803`0f2818f0 fffff803`08ff6612 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff803`0f281fb0 fffff803`08ff65e0 : fffff803`090078a5 00000004`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff803`0f26c2f8 fffff803`090078a5 : 00000004`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff803`0f26c300 fffff803`090035e0 : fffff803`06b68180 fffff803`09924440 00000000`00000000 ffffbb8c`a1ee6cf0 : nt!KiExceptionDispatch+0x125
fffff803`0f26c4e0 fffff803`18a24e51 : fffff803`18a2560a ffffbb8c`a77ceb30 00000000`00000001 fffff803`0f26c6f0 : nt!KiGeneralProtectionFault+0x320
fffff803`0f26c678 fffff803`18a2560a : ffffbb8c`a77ceb30 00000000`00000001 fffff803`0f26c6f0 00000000`00000000 : kbdclass!KeyboardClassDequeueRead+0x11
fffff803`0f26c680 fffff803`18a03ad7 : ffffbb8c`a785cd02 ffffbb8c`a79376e0 ffffbb8c`a79377e8 fffff803`0f26c790 : kbdclass!KeyboardClassServiceCallback+0x9a
fffff803`0f26c720 fffff803`19fd4cac : ffffbb8c`a785cd1c 00000000`00000006 00000000`00000000 fffff803`18a039c0 : kbdhid!KbdHid_InsertCodesIntoQueue+0x117
fffff803`0f26c780 fffff803`19fd4d1d : 00000000`00004de0 00000000`00000000 00000000`00000000 00000000`00000000 : HIDPARSE!HidP_KbdPutKey+0x44
fffff803`0f26c7b0 fffff803`19fd4f87 : ffffbb8c`a785cd1c 00000000`0000000e 00000000`00000001 00000000`00000001 : HIDPARSE!HidP_KeyboardKeypadCode+0x5d
fffff803`0f26c7e0 fffff803`19fd5083 : ffffbb8c`a785ce20 ffffbb8c`a79376e0 ffffbb8c`a878c0e0 ffffbb8c`a93110c0 : HIDPARSE!HidP_TranslateUsage+0x8b
fffff803`0f26c830 fffff803`18a03f1e : ffffbb8c`a785ccd0 00000000`00000004 ffffbb8c`a785cd58 ffffbb8c`a7937850 : HIDPARSE!HidP_TranslateUsageAndPagesToI8042ScanCodes+0xb3
fffff803`0f26c8a0 fffff803`08e44f12 : 00000000`00000002 fffff803`06b68180 00000000`00000080 00000000`0002e98d : kbdhid!KbdHid_AutoRepeat+0xbe
fffff803`0f26c8e0 fffff803`08e06eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0002e98d : nt!KiProcessExpiredTimerList+0x172
fffff803`0f26c9d0 fffff803`08ff92ee : 00000000`00000000 fffff803`06b68180 fffff803`09926600 ffffbb8c`abcab0c0 : nt!KiRetireDpcList+0x5dd
fffff803`0f26cc60 00000000`00000000 : fffff803`0f26d000 fffff803`0f267000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!KeyboardClassDequeueRead+11
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 11
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_kbdclass!KeyboardClassDequeueRead
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8beaeffe-f5de-227d-a802-dc0248cc8c43}
Followup: MachineOwner
---------
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 000000000000000d, Attempt to release quota on a corrupted pool allocation.
Arg2: ffffe08db1e1f690, Address of pool
Arg3: 000000004b677844, Pool allocation's tag
Arg4: b0688a15580401cd, Quota process pointer (bad).
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5874
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 33038
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: c2
BUGCHECK_P1: d
BUGCHECK_P2: ffffe08db1e1f690
BUGCHECK_P3: 4b677844
BUGCHECK_P4: b0688a15580401cd
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: FIFA19.exe
STACK_TEXT:
fffffc82`73108f48 fffff805`63c2cfe8 : 00000000`000000c2 00000000`0000000d ffffe08d`b1e1f690 00000000`4b677844 : nt!KeBugCheckEx
fffffc82`73108f50 fffff805`641b1019 : ffffe08d`b1e1f690 00000000`00000001 ffffe08d`b1e1f690 01000000`00100000 : nt!ExFreeHeapPool+0x1e0858
fffffc82`73109030 fffff805`701fe367 : 00000000`00000003 ffffe08d`99d8c6e0 00000000`00000003 00000000`00000000 : nt!ExFreePool+0x9
fffffc82`73109060 fffff805`7021acc3 : 00000000`00000003 00000000`00000000 ffffe08d`99d8c6e0 ffffe08d`99d8c6e0 : dxgkrnl!DXGDEVICE::DestroyResource+0x77
fffffc82`731090a0 fffff805`7021a121 : 00000000`003c5000 ffffe08d`b1e1f690 ffffe08d`00000001 ffffe08d`9cb8c790 : dxgkrnl!DXGDEVICE::TerminateAllocations+0x8c3
fffffc82`73109140 fffff805`7021b438 : ffffbc0a`1af48528 fffffc82`73109650 ffffffff`ffffffff ffffe08d`99d8c6e0 : dxgkrnl!DxgkDestroyAllocationInternal+0xe41
fffffc82`73109550 fffff805`7021ba5b : 00000000`7f90e4e8 00000001`361c4501 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkDestroyAllocationHelper+0x568
fffffc82`73109a20 fffff805`63c071b8 : ffffbc0a`219a8080 ffffbc0a`219a8080 00000001`361c45e0 00000000`00000020 : dxgkrnl!DxgkDestroyAllocation2+0x21b
fffffc82`73109b00 00007ffc`7b1b49c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`7f90e468 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`7b1b49c4
SYMBOL_NAME: dxgkrnl!DXGDEVICE::DestroyResource+77
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 77
FAILURE_BUCKET_ID: 0xc2_d_dxgkrnl!DXGDEVICE::DestroyResource
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e1410ff9-2806-5b46-8f16-233ba02fb9c5}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffc8890735d680, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc8890735d5d8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5405
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8532
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: ffffc8890735d680
BUGCHECK_P3: ffffc8890735d5d8
BUGCHECK_P4: 0
TRAP_FRAME: ffffc8890735d680 -- (.trap 0xffffc8890735d680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa209176455f8 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffa20917645620 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80344a2d4a1 rsp=ffffc8890735d818 rbp=fffff80351677190
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff803516771a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!RtlRbRemoveNode+0x1de9d1:
fffff803`44a2d4a1 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffc8890735d5d8 -- (.exr 0xffffc8890735d5d8)
ExceptionAddress: fffff80344a2d4a1 (nt!RtlRbRemoveNode+0x00000000001de9d1)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: audiodg.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffc889`0735d358 fffff803`44a07769 : 00000000`00000139 00000000`0000001d ffffc889`0735d680 ffffc889`0735d5d8 : nt!KeBugCheckEx
ffffc889`0735d360 fffff803`44a07b90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc889`0735d4a0 fffff803`44a05f23 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc889`0735d680 fffff803`44a2d4a1 : 00000000`00000000 ffffa209`17645620 fffff803`5167151d fffff803`51677190 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc889`0735d818 fffff803`5167151d : fffff803`51677190 ffffa209`176455f8 00000000`00015ca1 00000004`0b2e1605 : nt!RtlRbRemoveNode+0x1de9d1
ffffc889`0735d830 fffff803`5167a4b5 : 00000004`0b4fe6b1 00015ca1`00021ff1 ffffc889`0735db80 00000000`00000000 : mmcss!CiSchedulerTaskIndexYield+0x3ad
ffffc889`0735d880 fffff803`44bfcb82 : 00000000`00222017 fffff803`5167a350 ffffa209`174beb60 00000000`00000000 : mmcss!CiDispatchFastIoDeviceControl+0x165
ffffc889`0735d8e0 fffff803`44bfc7e6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
ffffc889`0735da20 fffff803`44a071b8 : 00000000`81588e00 00000000`00000000 ffffa209`156fbe60 ffffffff`fffdb610 : nt!NtDeviceIoControlFile+0x56
ffffc889`0735da90 00007ffc`91a8c094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a7`bb0ffcc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`91a8c094
SYMBOL_NAME: mmcss!CiSchedulerTaskIndexYield+3ad
MODULE_NAME: mmcss
IMAGE_NAME: mmcss.sys
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 3ad
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_mmcss!CiSchedulerTaskIndexYield
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b4250d1d-a1d8-cd2d-7c9d-07f7fb2fccd6}
Followup: MachineOwner
---------
İşletim sisteminizi 20H2 sürümüne güncelleyin. Afterburner'ı kaldırın, bir işlem yaptıysanız sıfırlayın. Sisteme USB aracılığıyla takılı klavye/fare dışındaki aygıtları çıkarın. Ayrıca ekran kartınızın sürücüsünü DDU ile kaldırıp sitesinden güncelleyin.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net
Kod:KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints. the driver/function that caused the problem. Always note this address. as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled. Arg2: fffff80318a24e51, The address that the exception occurred at. Arg3: 0000000000000000, Parameter 0 of the exception. Arg4: ffffffffffffffff, Parameter 1 of the exception. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 4312. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on BORA. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 8506. Key : Analysis.Memory.CommitPeak.Mb. Value: 77. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 1e. BUGCHECK_P1: ffffffffc0000005. BUGCHECK_P2: fffff80318a24e51. BUGCHECK_P3: 0. BUGCHECK_P4: ffffffffffffffff. READ_ADDRESS: fffff803098fa390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8030980f330: Unable to get Flags value from nt!KdVersionBlock. fffff8030980f330: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. ffffffffffffffff. EXCEPTION_PARAMETER2: ffffffffffffffff. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: System. BAD_STACK_POINTER: fffff8030f281158. STACK_TEXT: fffff803`0f281158 fffff803`090f4b0e : 00000000`0000001e ffffffff`c0000005 fffff803`18a24e51 00000000`00000000 : nt!KeBugCheckEx. fffff803`0f281160 fffff803`08ffe642 : fffff803`090f4aec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22. fffff803`0f2811a0 fffff803`08f2bf97 : fffff803`0f281710 00000000`00000000 fffff803`0f26cc60 fffff803`08ff92ee : nt!RtlpExecuteHandlerForException+0x12. fffff803`0f2811d0 fffff803`08f2ab86 : fffff803`0f26c438 fffff803`0f281e20 fffff803`0f26c438 ffffbb8c`a77ceb30 : nt!RtlDispatchException+0x297. fffff803`0f2818f0 fffff803`08ff6612 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186. fffff803`0f281fb0 fffff803`08ff65e0 : fffff803`090078a5 00000004`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12. fffff803`0f26c2f8 fffff803`090078a5 : 00000004`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue. fffff803`0f26c300 fffff803`090035e0 : fffff803`06b68180 fffff803`09924440 00000000`00000000 ffffbb8c`a1ee6cf0 : nt!KiExceptionDispatch+0x125. fffff803`0f26c4e0 fffff803`18a24e51 : fffff803`18a2560a ffffbb8c`a77ceb30 00000000`00000001 fffff803`0f26c6f0 : nt!KiGeneralProtectionFault+0x320. fffff803`0f26c678 fffff803`18a2560a : ffffbb8c`a77ceb30 00000000`00000001 fffff803`0f26c6f0 00000000`00000000 : kbdclass!KeyboardClassDequeueRead+0x11. fffff803`0f26c680 fffff803`18a03ad7 : ffffbb8c`a785cd02 ffffbb8c`a79376e0 ffffbb8c`a79377e8 fffff803`0f26c790 : kbdclass!KeyboardClassServiceCallback+0x9a. fffff803`0f26c720 fffff803`19fd4cac : ffffbb8c`a785cd1c 00000000`00000006 00000000`00000000 fffff803`18a039c0 : kbdhid!KbdHid_InsertCodesIntoQueue+0x117. fffff803`0f26c780 fffff803`19fd4d1d : 00000000`00004de0 00000000`00000000 00000000`00000000 00000000`00000000 : HIDPARSE!HidP_KbdPutKey+0x44. fffff803`0f26c7b0 fffff803`19fd4f87 : ffffbb8c`a785cd1c 00000000`0000000e 00000000`00000001 00000000`00000001 : HIDPARSE!HidP_KeyboardKeypadCode+0x5d. fffff803`0f26c7e0 fffff803`19fd5083 : ffffbb8c`a785ce20 ffffbb8c`a79376e0 ffffbb8c`a878c0e0 ffffbb8c`a93110c0 : HIDPARSE!HidP_TranslateUsage+0x8b. fffff803`0f26c830 fffff803`18a03f1e : ffffbb8c`a785ccd0 00000000`00000004 ffffbb8c`a785cd58 ffffbb8c`a7937850 : HIDPARSE!HidP_TranslateUsageAndPagesToI8042ScanCodes+0xb3. fffff803`0f26c8a0 fffff803`08e44f12 : 00000000`00000002 fffff803`06b68180 00000000`00000080 00000000`0002e98d : kbdhid!KbdHid_AutoRepeat+0xbe. fffff803`0f26c8e0 fffff803`08e06eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0002e98d : nt!KiProcessExpiredTimerList+0x172. fffff803`0f26c9d0 fffff803`08ff92ee : 00000000`00000000 fffff803`06b68180 fffff803`09926600 ffffbb8c`abcab0c0 : nt!KiRetireDpcList+0x5dd. fffff803`0f26cc60 00000000`00000000 : fffff803`0f26d000 fffff803`0f267000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e. SYMBOL_NAME: kbdclass!KeyboardClassDequeueRead+11. MODULE_NAME: kbdclass. IMAGE_NAME: kbdclass.sys. IMAGE_VERSION: 10.0.19041.1030. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 11. FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_kbdclass!KeyboardClassDequeueRead. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {8beaeffe-f5de-227d-a802-dc0248cc8c43} Followup: MachineOwner. --------- BAD_POOL_CALLER (c2) The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc. Arguments: Arg1: 000000000000000d, Attempt to release quota on a corrupted pool allocation. Arg2: ffffe08db1e1f690, Address of pool. Arg3: 000000004b677844, Pool allocation's tag. Arg4: b0688a15580401cd, Quota process pointer (bad). Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 5874. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on BORA. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 33038. Key : Analysis.Memory.CommitPeak.Mb. Value: 82. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: c2. BUGCHECK_P1: d. BUGCHECK_P2: ffffe08db1e1f690. BUGCHECK_P3: 4b677844. BUGCHECK_P4: b0688a15580401cd. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: FIFA19.exe. STACK_TEXT: fffffc82`73108f48 fffff805`63c2cfe8 : 00000000`000000c2 00000000`0000000d ffffe08d`b1e1f690 00000000`4b677844 : nt!KeBugCheckEx. fffffc82`73108f50 fffff805`641b1019 : ffffe08d`b1e1f690 00000000`00000001 ffffe08d`b1e1f690 01000000`00100000 : nt!ExFreeHeapPool+0x1e0858. fffffc82`73109030 fffff805`701fe367 : 00000000`00000003 ffffe08d`99d8c6e0 00000000`00000003 00000000`00000000 : nt!ExFreePool+0x9. fffffc82`73109060 fffff805`7021acc3 : 00000000`00000003 00000000`00000000 ffffe08d`99d8c6e0 ffffe08d`99d8c6e0 : dxgkrnl!DXGDEVICE::DestroyResource+0x77. fffffc82`731090a0 fffff805`7021a121 : 00000000`003c5000 ffffe08d`b1e1f690 ffffe08d`00000001 ffffe08d`9cb8c790 : dxgkrnl!DXGDEVICE::TerminateAllocations+0x8c3. fffffc82`73109140 fffff805`7021b438 : ffffbc0a`1af48528 fffffc82`73109650 ffffffff`ffffffff ffffe08d`99d8c6e0 : dxgkrnl!DxgkDestroyAllocationInternal+0xe41. fffffc82`73109550 fffff805`7021ba5b : 00000000`7f90e4e8 00000001`361c4501 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkDestroyAllocationHelper+0x568. fffffc82`73109a20 fffff805`63c071b8 : ffffbc0a`219a8080 ffffbc0a`219a8080 00000001`361c45e0 00000000`00000020 : dxgkrnl!DxgkDestroyAllocation2+0x21b. fffffc82`73109b00 00007ffc`7b1b49c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 00000000`7f90e468 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`7b1b49c4. SYMBOL_NAME: dxgkrnl!DXGDEVICE::DestroyResource+77. MODULE_NAME: dxgkrnl. IMAGE_NAME: dxgkrnl.sys. IMAGE_VERSION: 10.0.19041.685. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 77. FAILURE_BUCKET_ID: 0xc2_d_dxgkrnl!DXGDEVICE::DestroyResource. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {e1410ff9-2806-5b46-8f16-233ba02fb9c5} Followup: MachineOwner. --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption. could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 000000000000001d, Type of memory safety violation. Arg2: ffffc8890735d680, Address of the trap frame for the exception that caused the bugcheck. Arg3: ffffc8890735d5d8, Address of the exception record for the exception that caused the bugcheck. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 5405. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on BORA. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 8532. Key : Analysis.Memory.CommitPeak.Mb. Value: 75. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 139. BUGCHECK_P1: 1d. BUGCHECK_P2: ffffc8890735d680. BUGCHECK_P3: ffffc8890735d5d8. BUGCHECK_P4: 0. TRAP_FRAME: ffffc8890735d680 -- (.trap 0xffffc8890735d680) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffa209176455f8 rbx=0000000000000000 rcx=000000000000001d. rdx=ffffa20917645620 rsi=0000000000000000 rdi=0000000000000000. rip=fffff80344a2d4a1 rsp=ffffc8890735d818 rbp=fffff80351677190. r8=0000000000000000 r9=0000000000000000 r10=0000000000000000. r11=fffff803516771a0 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei ng nz na po cy. nt!RtlRbRemoveNode+0x1de9d1: fffff803`44a2d4a1 cd29 int 29h. Resetting default scope. EXCEPTION_RECORD: ffffc8890735d5d8 -- (.exr 0xffffc8890735d5d8) ExceptionAddress: fffff80344a2d4a1 (nt!RtlRbRemoveNode+0x00000000001de9d1) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001. NumberParameters: 1. Parameter[0]: 000000000000001d. Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: audiodg.exe. ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409. EXCEPTION_PARAMETER1: 000000000000001d. EXCEPTION_STR: 0xc0000409. STACK_TEXT: ffffc889`0735d358 fffff803`44a07769 : 00000000`00000139 00000000`0000001d ffffc889`0735d680 ffffc889`0735d5d8 : nt!KeBugCheckEx. ffffc889`0735d360 fffff803`44a07b90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69. ffffc889`0735d4a0 fffff803`44a05f23 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0. ffffc889`0735d680 fffff803`44a2d4a1 : 00000000`00000000 ffffa209`17645620 fffff803`5167151d fffff803`51677190 : nt!KiRaiseSecurityCheckFailure+0x323. ffffc889`0735d818 fffff803`5167151d : fffff803`51677190 ffffa209`176455f8 00000000`00015ca1 00000004`0b2e1605 : nt!RtlRbRemoveNode+0x1de9d1. ffffc889`0735d830 fffff803`5167a4b5 : 00000004`0b4fe6b1 00015ca1`00021ff1 ffffc889`0735db80 00000000`00000000 : mmcss!CiSchedulerTaskIndexYield+0x3ad. ffffc889`0735d880 fffff803`44bfcb82 : 00000000`00222017 fffff803`5167a350 ffffa209`174beb60 00000000`00000000 : mmcss!CiDispatchFastIoDeviceControl+0x165. ffffc889`0735d8e0 fffff803`44bfc7e6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382. ffffc889`0735da20 fffff803`44a071b8 : 00000000`81588e00 00000000`00000000 ffffa209`156fbe60 ffffffff`fffdb610 : nt!NtDeviceIoControlFile+0x56. ffffc889`0735da90 00007ffc`91a8c094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 000000a7`bb0ffcc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`91a8c094. SYMBOL_NAME: mmcss!CiSchedulerTaskIndexYield+3ad. MODULE_NAME: mmcss. IMAGE_NAME: mmcss.sys. IMAGE_VERSION: 10.0.19041.546. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 3ad. FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_mmcss!CiSchedulerTaskIndexYield. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {b4250d1d-a1d8-cd2d-7c9d-07f7fb2fccd6} Followup: MachineOwner. ---------
Güzel. Şimdi sistemi bir süre kullanın, tekrar mavi ekran alırsanız buraya yazarsınız.
Sürücü olarak da (yine öncesinde DDU ile kaldırmak şartıyla) 20.12.1 sürümüne geçmenizi öneririm.
Anladım. Siz yine de en günceline geçin. Fakat ilerleyen süreçte mavi ekran alırsanız ve yine ekran kartıyla alakalı görünürse donanımsal bir sorundan şüpheleneceğim.
Anladım. Siz yine de en günceline geçin. Fakat ilerleyen süreçte mavi ekran alırsanız ve yine ekran kartıyla alakalı görünürse donanımsal bir sorundan şüpheleneceğim.