KERNEL_SECURITY_CHECK_FAILURE mavi ekran hatası

İşletim sistemi
Windows 10

Mamican50

Femtopat
Katılım
8 Ocak 2021
Mesajlar
8
Daha fazla  
Cinsiyet
Erkek
Selam arkadaşlar. Yeni sistem kurdum Steam üzerinden ve farklı yollardan çeşitli oyun indirdim. Steam'den Shadow of War oyununu oynadım ve yarım saat sonra oyundan attı, tekrar girdim ve farklı hata kodlarıyla mavi ekran hatasını defalarca aldım. Bu arada oyunu oynarken ekran kartımın sıcaklığı %72'yi işlemcimin de sıcaklığı %74'ü aşmadı. Steam'i silip farklı bir sürücüye kurdum aynı hatayı yine aldım. Son çare format dedim ve Windows 10 format attım. Ekran kartımı GeForce Experience ile güncelledim ve BIOS'um güncel durumda. Aygıt yöneticisinde herhangi bir güncelleme bildirimi yok. Yine aynı şekilde farklı hata kodlarıyla mavi ekran hatası aldım. Kodlar şunlar:

KMODE_EXCEPTION_NOT_HANDLED başarısız: nvlddmkm.sys.
KERNEL_SECURITY_CHECK_FAILURE.
MEMORY_MANAGEMENT.

Sistemim: Ryzen 5 2600 six Core, MSI GTX 1080 Gaming X 8 GB, ASUS tufB450 PRO GAMING anakart, 16 GB Ripjaws 3200MHz RAM.
 
Son düzenleyen: Moderatör:
1) Ekran kartı sürücünüzü aşağıdaki linkten indirin. Daha sonra DDU ile eski sürücüyü kaldırıp PC yeniden başladığında indirdiğiniz sürücüyü kurun.

Sürücü: Grafik Sürücüsü - GeForce Game Ready Driver | NVIDIA
Rehber: DDU ile Sürücü Kaldırma Rehberi

2) Bilgisayara bağlı Sandisk Cruzer Blade USB aygıtını çıkartın.

3) Aşağıdaki rehberi uygulayın ve sonucun ekran alıntısını paylaşın.


4) XMP modu açıksa kapatın ve sonra da Memtest86 testi uygulayın. En sonunda da sonuçları bizimle paylaşın.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff8015edf0ca2, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffff9a8e3a5cfcd0, Parameter 1 of the exception

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8406

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 47103

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffff80000003

BUGCHECK_P2: fffff8015edf0ca2

BUGCHECK_P3: 0

BUGCHECK_P4: ffff9a8e3a5cfcd0

EXCEPTION_PARAMETER2:  ffff9a8e3a5cfcd0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

BAD_STACK_POINTER:  fffff80153c81158

STACK_TEXT: 
fffff801`53c81158 fffff801`4dcf4b0e     : 00000000`0000001e ffffffff`80000003 fffff801`5edf0ca2 00000000`00000000 : nt!KeBugCheckEx
fffff801`53c81160 fffff801`4dbfe642     : fffff801`4dcf4aec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff801`53c811a0 fffff801`4db2bf97     : fffff801`53c81710 00000000`00000000 fffff801`53c6cc60 fffff801`4dbf92ee : nt!RtlpExecuteHandlerForException+0x12
fffff801`53c811d0 fffff801`4db2ab86     : fffff801`53c6c018 fffff801`53c81e20 fffff801`53c6c018 fffff801`53c6c2e4 : nt!RtlDispatchException+0x297
fffff801`53c818f0 fffff801`4dbf6612     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff801`53c81fb0 fffff801`4dbf65e0     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff801`53c6bed8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue


SYMBOL_NAME:  nvlddmkm+6d0ca2

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  6d0ca2

FAILURE_BUCKET_ID:  0x1E_80000003_STACKPTR_ERROR_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {190d579c-5762-fb1d-d0aa-ccf876db757e}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008886, The subtype of the bugcheck.
Arg2: ffff9f7ffffeedb0
Arg3: ffff9f7fffe5ab00
Arg4: 0000000000000500

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8733

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 22478

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 8886

BUGCHECK_P2: ffff9f7ffffeedb0

BUGCHECK_P3: ffff9f7fffe5ab00

BUGCHECK_P4: 500

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffff808a`6d33f928 fffff800`7d817ef0     : 00000000`0000001a 00000000`00008886 ffff9f7f`fffeedb0 ffff9f7f`ffe5ab00 : nt!KeBugCheckEx
ffff808a`6d33f930 fffff800`7d83f273     : ffff808a`00000002 fffff800`00000000 0000000f`fffffa49 00000000`00000000 : nt!MiUnlinkPageFromList+0xcb0
ffff808a`6d33f9c0 fffff800`7d83f1cb     : 00000000`00000005 ffff9f7f`fffeedb0 ffff9f80`0000818a ffff9f80`0000818a : nt!MiRelinkStandbyPage+0x3f
ffff808a`6d33f9f0 fffff800`7d8404d5     : fffff800`00000000 fffff800`7e250b40 00000000`00000000 ffffe208`6c04b010 : nt!MiEmptyDecayClusterTimers+0x16f
ffff808a`6d33fa60 fffff800`7d9b4e37     : 00000000`00000005 00000000`00000005 00000000`ffffffff ffff8780`e7790180 : nt!MiWorkingSetManager+0x85
ffff808a`6d33fb20 fffff800`7d917e25     : ffffe208`6c0ad040 00000000`00000080 fffff800`7d9b4ce0 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffff808a`6d33fc10 fffff800`7d9fcdd8     : ffff8780`e7790180 ffffe208`6c0ad040 fffff800`7d917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff808a`6d33fc60 00000000`00000000     : ffff808a`6d340000 ffff808a`6d33a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiUnlinkPageFromList+cb0

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  cb0

FAILURE_BUCKET_ID:  0x1a_8886_nt!MiUnlinkPageFromList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff948384cd11c0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff948384cd1118, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 14468

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 82779

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff948384cd11c0

BUGCHECK_P3: ffff948384cd1118

BUGCHECK_P4: 0

TRAP_FRAME:  ffff948384cd11c0 -- (.trap 0xffff948384cd11c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdd83e6df0188 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffdd83e6decbe8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076d712b51 rsp=ffff948384cd1350 rbp=0000000000000000
 r8=ffff948384cd1330  r9=0000000000000044 r10=fffff80761340d40
r11=ffff948384cd1370 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85:
fffff807`6d712b51 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff948384cd1118 -- (.exr 0xffff948384cd1118)
ExceptionAddress: fffff8076d712b51 (dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x0000000000000085)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff9483`84cd0e98 fffff807`61407769     : 00000000`00000139 00000000`00000003 ffff9483`84cd11c0 ffff9483`84cd1118 : nt!KeBugCheckEx
ffff9483`84cd0ea0 fffff807`61407b90     : 00000000`00000000 00000000`38616956 ffff6abc`87de61d3 fffff807`6123c5b9 : nt!KiBugCheckDispatch+0x69
ffff9483`84cd0fe0 fffff807`61405f23     : 00000000`00000000 00000000`00000000 00000000`00000103 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9483`84cd11c0 fffff807`6d712b51     : 00000000`00000060 fffff807`61260913 ffffdd83`e5a11080 ffffdd83`e0a53160 : nt!KiRaiseSecurityCheckFailure+0x323
ffff9483`84cd1350 fffff807`6d712c5b     : ffffdd83`e6df0cc0 ffffdd83`e6df0cc0 00000000`40001dc0 ffff8106`beed6ed0 : dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85
ffff9483`84cd1380 fffff807`6d7135d5     : ffffdd83`e0a53160 ffff9483`84cd1430 ffff8106`beed6de0 ffff8106`beed6de0 : dxgkrnl!DXGSYNCOBJECT::Destroy+0xff
ffff9483`84cd13c0 fffff807`6d7186b0     : ffffdd83`e6df0cc0 ffff8106`be4d2720 ffffdd83`e6df0cc0 ffff8106`be4d2720 : dxgkrnl!DXGGLOBAL::DestroySyncObject+0x285
ffff9483`84cd1470 fffff807`6d7138e5     : ffff8106`beed6de0 00000000`000020d0 ffff8106`beed6de0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x328
ffff9483`84cd16e0 fffff807`6d606b67     : 00000000`00000000 ffff8106`beed6de0 ffffdd83`dda80350 fffff807`66ae4713 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff9483`84cd1830 fffff807`6163759f     : 00000000`00000000 ffffdd83`e5905080 00000000`0000ff00 ffffdd83`e5b76050 : dxgkrnl!DxgkProcessNotify+0xf7
ffff9483`84cd1890 fffff807`61662894     : ffffdd83`e5905000 ffffdd83`e5905080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff9483`84cd1960 fffff807`61706552     : ffffdd83`e5a114b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
ffff9483`84cd1990 fffff807`61709a8e     : ffffdd83`00000000 00000000`00000001 00000000`00000000 00000005`dd770000 : nt!PspExitThread+0x5b2
ffff9483`84cd1a90 fffff807`614071b8     : ffffdd83`e5905080 ffffdd83`e5a11080 ffff9483`84cd1b80 ffffdd83`e5905080 : nt!NtTerminateProcess+0xde
ffff9483`84cd1b00 00007fff`2364c534     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000005`dd54fbb8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2364c534


SYMBOL_NAME:  dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+85

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  85

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!DXGADAPTERSYNCOBJECT::_DXGADAPTERSYNCOBJECT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {45500ca4-091f-73c0-5a5a-21a7c0e5a624}

Followup:     MachineOwner
---------
 
1) Ekran kartı sürücünüzü aşağıdaki linkten indirin. Daha sonra DDU ile eski sürücüyü kaldırıp PC yeniden başladığında indirdiğiniz sürücüyü kurun.

Sürücü: Grafik Sürücüsü - GeForce Game Ready Driver | NVIDIA
Rehber: DDU ile Sürücü Kaldırma Rehberi

2) Bilgisayara bağlı Sandisk Cruzer Blade USB aygıtını çıkartın.

3) Aşağıdaki rehberi uygulayın ve sonucun ekran alıntısını paylaşın.


4) XMP modu açıksa kapatın ve sonra da Memtest86 testi uygulayın. En sonunda da sonuçları bizimle paylaşın.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff8015edf0ca2, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffff9a8e3a5cfcd0, Parameter 1 of the exception

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8406

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 47103

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffff80000003

BUGCHECK_P2: fffff8015edf0ca2

BUGCHECK_P3: 0

BUGCHECK_P4: ffff9a8e3a5cfcd0

EXCEPTION_PARAMETER2:  ffff9a8e3a5cfcd0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

BAD_STACK_POINTER:  fffff80153c81158

STACK_TEXT:
fffff801`53c81158 fffff801`4dcf4b0e     : 00000000`0000001e ffffffff`80000003 fffff801`5edf0ca2 00000000`00000000 : nt!KeBugCheckEx
fffff801`53c81160 fffff801`4dbfe642     : fffff801`4dcf4aec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff801`53c811a0 fffff801`4db2bf97     : fffff801`53c81710 00000000`00000000 fffff801`53c6cc60 fffff801`4dbf92ee : nt!RtlpExecuteHandlerForException+0x12
fffff801`53c811d0 fffff801`4db2ab86     : fffff801`53c6c018 fffff801`53c81e20 fffff801`53c6c018 fffff801`53c6c2e4 : nt!RtlDispatchException+0x297
fffff801`53c818f0 fffff801`4dbf6612     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff801`53c81fb0 fffff801`4dbf65e0     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff801`53c6bed8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue


SYMBOL_NAME:  nvlddmkm+6d0ca2

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  6d0ca2

FAILURE_BUCKET_ID:  0x1E_80000003_STACKPTR_ERROR_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {190d579c-5762-fb1d-d0aa-ccf876db757e}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008886, The subtype of the bugcheck.
Arg2: ffff9f7ffffeedb0
Arg3: ffff9f7fffe5ab00
Arg4: 0000000000000500

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8733

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 22478

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 8886

BUGCHECK_P2: ffff9f7ffffeedb0

BUGCHECK_P3: ffff9f7fffe5ab00

BUGCHECK_P4: 500

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffff808a`6d33f928 fffff800`7d817ef0     : 00000000`0000001a 00000000`00008886 ffff9f7f`fffeedb0 ffff9f7f`ffe5ab00 : nt!KeBugCheckEx
ffff808a`6d33f930 fffff800`7d83f273     : ffff808a`00000002 fffff800`00000000 0000000f`fffffa49 00000000`00000000 : nt!MiUnlinkPageFromList+0xcb0
ffff808a`6d33f9c0 fffff800`7d83f1cb     : 00000000`00000005 ffff9f7f`fffeedb0 ffff9f80`0000818a ffff9f80`0000818a : nt!MiRelinkStandbyPage+0x3f
ffff808a`6d33f9f0 fffff800`7d8404d5     : fffff800`00000000 fffff800`7e250b40 00000000`00000000 ffffe208`6c04b010 : nt!MiEmptyDecayClusterTimers+0x16f
ffff808a`6d33fa60 fffff800`7d9b4e37     : 00000000`00000005 00000000`00000005 00000000`ffffffff ffff8780`e7790180 : nt!MiWorkingSetManager+0x85
ffff808a`6d33fb20 fffff800`7d917e25     : ffffe208`6c0ad040 00000000`00000080 fffff800`7d9b4ce0 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffff808a`6d33fc10 fffff800`7d9fcdd8     : ffff8780`e7790180 ffffe208`6c0ad040 fffff800`7d917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff808a`6d33fc60 00000000`00000000     : ffff808a`6d340000 ffff808a`6d33a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiUnlinkPageFromList+cb0

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  cb0

FAILURE_BUCKET_ID:  0x1a_8886_nt!MiUnlinkPageFromList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff948384cd11c0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff948384cd1118, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 14468

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 82779

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff948384cd11c0

BUGCHECK_P3: ffff948384cd1118

BUGCHECK_P4: 0

TRAP_FRAME:  ffff948384cd11c0 -- (.trap 0xffff948384cd11c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdd83e6df0188 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffdd83e6decbe8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076d712b51 rsp=ffff948384cd1350 rbp=0000000000000000
r8=ffff948384cd1330  r9=0000000000000044 r10=fffff80761340d40
r11=ffff948384cd1370 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85:
fffff807`6d712b51 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff948384cd1118 -- (.exr 0xffff948384cd1118)
ExceptionAddress: fffff8076d712b51 (dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x0000000000000085)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffff9483`84cd0e98 fffff807`61407769     : 00000000`00000139 00000000`00000003 ffff9483`84cd11c0 ffff9483`84cd1118 : nt!KeBugCheckEx
ffff9483`84cd0ea0 fffff807`61407b90     : 00000000`00000000 00000000`38616956 ffff6abc`87de61d3 fffff807`6123c5b9 : nt!KiBugCheckDispatch+0x69
ffff9483`84cd0fe0 fffff807`61405f23     : 00000000`00000000 00000000`00000000 00000000`00000103 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9483`84cd11c0 fffff807`6d712b51     : 00000000`00000060 fffff807`61260913 ffffdd83`e5a11080 ffffdd83`e0a53160 : nt!KiRaiseSecurityCheckFailure+0x323
ffff9483`84cd1350 fffff807`6d712c5b     : ffffdd83`e6df0cc0 ffffdd83`e6df0cc0 00000000`40001dc0 ffff8106`beed6ed0 : dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85
ffff9483`84cd1380 fffff807`6d7135d5     : ffffdd83`e0a53160 ffff9483`84cd1430 ffff8106`beed6de0 ffff8106`beed6de0 : dxgkrnl!DXGSYNCOBJECT::Destroy+0xff
ffff9483`84cd13c0 fffff807`6d7186b0     : ffffdd83`e6df0cc0 ffff8106`be4d2720 ffffdd83`e6df0cc0 ffff8106`be4d2720 : dxgkrnl!DXGGLOBAL::DestroySyncObject+0x285
ffff9483`84cd1470 fffff807`6d7138e5     : ffff8106`beed6de0 00000000`000020d0 ffff8106`beed6de0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x328
ffff9483`84cd16e0 fffff807`6d606b67     : 00000000`00000000 ffff8106`beed6de0 ffffdd83`dda80350 fffff807`66ae4713 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff9483`84cd1830 fffff807`6163759f     : 00000000`00000000 ffffdd83`e5905080 00000000`0000ff00 ffffdd83`e5b76050 : dxgkrnl!DxgkProcessNotify+0xf7
ffff9483`84cd1890 fffff807`61662894     : ffffdd83`e5905000 ffffdd83`e5905080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff9483`84cd1960 fffff807`61706552     : ffffdd83`e5a114b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
ffff9483`84cd1990 fffff807`61709a8e     : ffffdd83`00000000 00000000`00000001 00000000`00000000 00000005`dd770000 : nt!PspExitThread+0x5b2
ffff9483`84cd1a90 fffff807`614071b8     : ffffdd83`e5905080 ffffdd83`e5a11080 ffff9483`84cd1b80 ffffdd83`e5905080 : nt!NtTerminateProcess+0xde
ffff9483`84cd1b00 00007fff`2364c534     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000005`dd54fbb8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2364c534


SYMBOL_NAME:  dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+85

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  85

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!DXGADAPTERSYNCOBJECT::_DXGADAPTERSYNCOBJECT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {45500ca4-091f-73c0-5a5a-21a7c0e5a624}

Followup:     MachineOwner
---------
hocam xmp açıksa kapatın yazmışsınız da. Bios'a girdiğimde ram frekansı 1860 mhz gözüküyordu. Benim Ramlerim zaten 3200 mhz. Bunu 3200 mhz e çıkarttığımda xmp mi yapmış oluyorum. Yoksa kendi ayarlarında 1860 mhz de mi dediklerinizi yapıyım ?
1) Ekran kartı sürücünüzü aşağıdaki linkten indirin. Daha sonra DDU ile eski sürücüyü kaldırıp PC yeniden başladığında indirdiğiniz sürücüyü kurun.

Sürücü: Grafik Sürücüsü - GeForce Game Ready Driver | NVIDIA
Rehber: DDU ile Sürücü Kaldırma Rehberi

2) Bilgisayara bağlı Sandisk Cruzer Blade USB aygıtını çıkartın.

3) Aşağıdaki rehberi uygulayın ve sonucun ekran alıntısını paylaşın.


4) XMP modu açıksa kapatın ve sonra da Memtest86 testi uygulayın. En sonunda da sonuçları bizimle paylaşın.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff8015edf0ca2, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffff9a8e3a5cfcd0, Parameter 1 of the exception

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8406

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 47103

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffff80000003

BUGCHECK_P2: fffff8015edf0ca2

BUGCHECK_P3: 0

BUGCHECK_P4: ffff9a8e3a5cfcd0

EXCEPTION_PARAMETER2:  ffff9a8e3a5cfcd0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

BAD_STACK_POINTER:  fffff80153c81158

STACK_TEXT:
fffff801`53c81158 fffff801`4dcf4b0e     : 00000000`0000001e ffffffff`80000003 fffff801`5edf0ca2 00000000`00000000 : nt!KeBugCheckEx
fffff801`53c81160 fffff801`4dbfe642     : fffff801`4dcf4aec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff801`53c811a0 fffff801`4db2bf97     : fffff801`53c81710 00000000`00000000 fffff801`53c6cc60 fffff801`4dbf92ee : nt!RtlpExecuteHandlerForException+0x12
fffff801`53c811d0 fffff801`4db2ab86     : fffff801`53c6c018 fffff801`53c81e20 fffff801`53c6c018 fffff801`53c6c2e4 : nt!RtlDispatchException+0x297
fffff801`53c818f0 fffff801`4dbf6612     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff801`53c81fb0 fffff801`4dbf65e0     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff801`53c6bed8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue


SYMBOL_NAME:  nvlddmkm+6d0ca2

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  6d0ca2

FAILURE_BUCKET_ID:  0x1E_80000003_STACKPTR_ERROR_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {190d579c-5762-fb1d-d0aa-ccf876db757e}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008886, The subtype of the bugcheck.
Arg2: ffff9f7ffffeedb0
Arg3: ffff9f7fffe5ab00
Arg4: 0000000000000500

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8733

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 22478

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 8886

BUGCHECK_P2: ffff9f7ffffeedb0

BUGCHECK_P3: ffff9f7fffe5ab00

BUGCHECK_P4: 500

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffff808a`6d33f928 fffff800`7d817ef0     : 00000000`0000001a 00000000`00008886 ffff9f7f`fffeedb0 ffff9f7f`ffe5ab00 : nt!KeBugCheckEx
ffff808a`6d33f930 fffff800`7d83f273     : ffff808a`00000002 fffff800`00000000 0000000f`fffffa49 00000000`00000000 : nt!MiUnlinkPageFromList+0xcb0
ffff808a`6d33f9c0 fffff800`7d83f1cb     : 00000000`00000005 ffff9f7f`fffeedb0 ffff9f80`0000818a ffff9f80`0000818a : nt!MiRelinkStandbyPage+0x3f
ffff808a`6d33f9f0 fffff800`7d8404d5     : fffff800`00000000 fffff800`7e250b40 00000000`00000000 ffffe208`6c04b010 : nt!MiEmptyDecayClusterTimers+0x16f
ffff808a`6d33fa60 fffff800`7d9b4e37     : 00000000`00000005 00000000`00000005 00000000`ffffffff ffff8780`e7790180 : nt!MiWorkingSetManager+0x85
ffff808a`6d33fb20 fffff800`7d917e25     : ffffe208`6c0ad040 00000000`00000080 fffff800`7d9b4ce0 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffff808a`6d33fc10 fffff800`7d9fcdd8     : ffff8780`e7790180 ffffe208`6c0ad040 fffff800`7d917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff808a`6d33fc60 00000000`00000000     : ffff808a`6d340000 ffff808a`6d33a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiUnlinkPageFromList+cb0

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  cb0

FAILURE_BUCKET_ID:  0x1a_8886_nt!MiUnlinkPageFromList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff948384cd11c0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff948384cd1118, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 14468

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 82779

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff948384cd11c0

BUGCHECK_P3: ffff948384cd1118

BUGCHECK_P4: 0

TRAP_FRAME:  ffff948384cd11c0 -- (.trap 0xffff948384cd11c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdd83e6df0188 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffdd83e6decbe8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076d712b51 rsp=ffff948384cd1350 rbp=0000000000000000
r8=ffff948384cd1330  r9=0000000000000044 r10=fffff80761340d40
r11=ffff948384cd1370 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85:
fffff807`6d712b51 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff948384cd1118 -- (.exr 0xffff948384cd1118)
ExceptionAddress: fffff8076d712b51 (dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x0000000000000085)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffff9483`84cd0e98 fffff807`61407769     : 00000000`00000139 00000000`00000003 ffff9483`84cd11c0 ffff9483`84cd1118 : nt!KeBugCheckEx
ffff9483`84cd0ea0 fffff807`61407b90     : 00000000`00000000 00000000`38616956 ffff6abc`87de61d3 fffff807`6123c5b9 : nt!KiBugCheckDispatch+0x69
ffff9483`84cd0fe0 fffff807`61405f23     : 00000000`00000000 00000000`00000000 00000000`00000103 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9483`84cd11c0 fffff807`6d712b51     : 00000000`00000060 fffff807`61260913 ffffdd83`e5a11080 ffffdd83`e0a53160 : nt!KiRaiseSecurityCheckFailure+0x323
ffff9483`84cd1350 fffff807`6d712c5b     : ffffdd83`e6df0cc0 ffffdd83`e6df0cc0 00000000`40001dc0 ffff8106`beed6ed0 : dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85
ffff9483`84cd1380 fffff807`6d7135d5     : ffffdd83`e0a53160 ffff9483`84cd1430 ffff8106`beed6de0 ffff8106`beed6de0 : dxgkrnl!DXGSYNCOBJECT::Destroy+0xff
ffff9483`84cd13c0 fffff807`6d7186b0     : ffffdd83`e6df0cc0 ffff8106`be4d2720 ffffdd83`e6df0cc0 ffff8106`be4d2720 : dxgkrnl!DXGGLOBAL::DestroySyncObject+0x285
ffff9483`84cd1470 fffff807`6d7138e5     : ffff8106`beed6de0 00000000`000020d0 ffff8106`beed6de0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x328
ffff9483`84cd16e0 fffff807`6d606b67     : 00000000`00000000 ffff8106`beed6de0 ffffdd83`dda80350 fffff807`66ae4713 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff9483`84cd1830 fffff807`6163759f     : 00000000`00000000 ffffdd83`e5905080 00000000`0000ff00 ffffdd83`e5b76050 : dxgkrnl!DxgkProcessNotify+0xf7
ffff9483`84cd1890 fffff807`61662894     : ffffdd83`e5905000 ffffdd83`e5905080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff9483`84cd1960 fffff807`61706552     : ffffdd83`e5a114b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
ffff9483`84cd1990 fffff807`61709a8e     : ffffdd83`00000000 00000000`00000001 00000000`00000000 00000005`dd770000 : nt!PspExitThread+0x5b2
ffff9483`84cd1a90 fffff807`614071b8     : ffffdd83`e5905080 ffffdd83`e5a11080 ffff9483`84cd1b80 ffffdd83`e5905080 : nt!NtTerminateProcess+0xde
ffff9483`84cd1b00 00007fff`2364c534     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000005`dd54fbb8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2364c534


SYMBOL_NAME:  dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+85

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  85

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!DXGADAPTERSYNCOBJECT::_DXGADAPTERSYNCOBJECT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {45500ca4-091f-73c0-5a5a-21a7c0e5a624}

Followup:     MachineOwner
---------
İlk 2 seçeneği uyguladım . 3. seçenekteki sonuç böyle
 

Dosya Ekleri

  • Adsız.jpg
    Adsız.jpg
    60,8 KB · Görüntüleme: 21
Son düzenleme:
"sfc /scannow" komutu eksik veya bozuk dosya bulmamış.

Memtest için biosa girip xmp yi kaldırmak istediğimde Biosun default ayarlarında ram frekansının 1866mhz olduğunu gördüm. Bu işte bi iş var diyip anakartın minimum desteklediği frekans hızına baktım. 2133 mhz olarak yazıyordu ve pcnin içini açtığımda ramlerin birinin siyaha birinin griye takıldığını gördüm. İkisini de siyaha takıp biosu açtığımda 2133 mhz olarak değişti default ayarı. Oyuna girdim 1.5 saate yakın atma veya kapanma olmadı. Bununla alakalı olabilir mi sorunum ?
 

Geri
Yukarı