minidumpMinidump dosyalarını paylaş.
Minidump Dosyalarını Paylaşın | Technopat Sosyal
@Enes3078
@Bora Dere
@PanzerTR
@Ma'at
Ben az sonra bilgisayarı kapatacağım. Siz konuyla ilgilenirsiniz.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff8015edf0ca2, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffff9a8e3a5cfcd0, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8406
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 47103
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffff80000003
BUGCHECK_P2: fffff8015edf0ca2
BUGCHECK_P3: 0
BUGCHECK_P4: ffff9a8e3a5cfcd0
EXCEPTION_PARAMETER2: ffff9a8e3a5cfcd0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
BAD_STACK_POINTER: fffff80153c81158
STACK_TEXT:
fffff801`53c81158 fffff801`4dcf4b0e : 00000000`0000001e ffffffff`80000003 fffff801`5edf0ca2 00000000`00000000 : nt!KeBugCheckEx
fffff801`53c81160 fffff801`4dbfe642 : fffff801`4dcf4aec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff801`53c811a0 fffff801`4db2bf97 : fffff801`53c81710 00000000`00000000 fffff801`53c6cc60 fffff801`4dbf92ee : nt!RtlpExecuteHandlerForException+0x12
fffff801`53c811d0 fffff801`4db2ab86 : fffff801`53c6c018 fffff801`53c81e20 fffff801`53c6c018 fffff801`53c6c2e4 : nt!RtlDispatchException+0x297
fffff801`53c818f0 fffff801`4dbf6612 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff801`53c81fb0 fffff801`4dbf65e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff801`53c6bed8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
SYMBOL_NAME: nvlddmkm+6d0ca2
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 6d0ca2
FAILURE_BUCKET_ID: 0x1E_80000003_STACKPTR_ERROR_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {190d579c-5762-fb1d-d0aa-ccf876db757e}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008886, The subtype of the bugcheck.
Arg2: ffff9f7ffffeedb0
Arg3: ffff9f7fffe5ab00
Arg4: 0000000000000500
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8733
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 22478
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 8886
BUGCHECK_P2: ffff9f7ffffeedb0
BUGCHECK_P3: ffff9f7fffe5ab00
BUGCHECK_P4: 500
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff808a`6d33f928 fffff800`7d817ef0 : 00000000`0000001a 00000000`00008886 ffff9f7f`fffeedb0 ffff9f7f`ffe5ab00 : nt!KeBugCheckEx
ffff808a`6d33f930 fffff800`7d83f273 : ffff808a`00000002 fffff800`00000000 0000000f`fffffa49 00000000`00000000 : nt!MiUnlinkPageFromList+0xcb0
ffff808a`6d33f9c0 fffff800`7d83f1cb : 00000000`00000005 ffff9f7f`fffeedb0 ffff9f80`0000818a ffff9f80`0000818a : nt!MiRelinkStandbyPage+0x3f
ffff808a`6d33f9f0 fffff800`7d8404d5 : fffff800`00000000 fffff800`7e250b40 00000000`00000000 ffffe208`6c04b010 : nt!MiEmptyDecayClusterTimers+0x16f
ffff808a`6d33fa60 fffff800`7d9b4e37 : 00000000`00000005 00000000`00000005 00000000`ffffffff ffff8780`e7790180 : nt!MiWorkingSetManager+0x85
ffff808a`6d33fb20 fffff800`7d917e25 : ffffe208`6c0ad040 00000000`00000080 fffff800`7d9b4ce0 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffff808a`6d33fc10 fffff800`7d9fcdd8 : ffff8780`e7790180 ffffe208`6c0ad040 fffff800`7d917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff808a`6d33fc60 00000000`00000000 : ffff808a`6d340000 ffff808a`6d33a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiUnlinkPageFromList+cb0
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: cb0
FAILURE_BUCKET_ID: 0x1a_8886_nt!MiUnlinkPageFromList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff948384cd11c0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff948384cd1118, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 14468
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 82779
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff948384cd11c0
BUGCHECK_P3: ffff948384cd1118
BUGCHECK_P4: 0
TRAP_FRAME: ffff948384cd11c0 -- (.trap 0xffff948384cd11c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdd83e6df0188 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffdd83e6decbe8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076d712b51 rsp=ffff948384cd1350 rbp=0000000000000000
r8=ffff948384cd1330 r9=0000000000000044 r10=fffff80761340d40
r11=ffff948384cd1370 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85:
fffff807`6d712b51 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff948384cd1118 -- (.exr 0xffff948384cd1118)
ExceptionAddress: fffff8076d712b51 (dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x0000000000000085)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff9483`84cd0e98 fffff807`61407769 : 00000000`00000139 00000000`00000003 ffff9483`84cd11c0 ffff9483`84cd1118 : nt!KeBugCheckEx
ffff9483`84cd0ea0 fffff807`61407b90 : 00000000`00000000 00000000`38616956 ffff6abc`87de61d3 fffff807`6123c5b9 : nt!KiBugCheckDispatch+0x69
ffff9483`84cd0fe0 fffff807`61405f23 : 00000000`00000000 00000000`00000000 00000000`00000103 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9483`84cd11c0 fffff807`6d712b51 : 00000000`00000060 fffff807`61260913 ffffdd83`e5a11080 ffffdd83`e0a53160 : nt!KiRaiseSecurityCheckFailure+0x323
ffff9483`84cd1350 fffff807`6d712c5b : ffffdd83`e6df0cc0 ffffdd83`e6df0cc0 00000000`40001dc0 ffff8106`beed6ed0 : dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85
ffff9483`84cd1380 fffff807`6d7135d5 : ffffdd83`e0a53160 ffff9483`84cd1430 ffff8106`beed6de0 ffff8106`beed6de0 : dxgkrnl!DXGSYNCOBJECT::Destroy+0xff
ffff9483`84cd13c0 fffff807`6d7186b0 : ffffdd83`e6df0cc0 ffff8106`be4d2720 ffffdd83`e6df0cc0 ffff8106`be4d2720 : dxgkrnl!DXGGLOBAL::DestroySyncObject+0x285
ffff9483`84cd1470 fffff807`6d7138e5 : ffff8106`beed6de0 00000000`000020d0 ffff8106`beed6de0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x328
ffff9483`84cd16e0 fffff807`6d606b67 : 00000000`00000000 ffff8106`beed6de0 ffffdd83`dda80350 fffff807`66ae4713 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff9483`84cd1830 fffff807`6163759f : 00000000`00000000 ffffdd83`e5905080 00000000`0000ff00 ffffdd83`e5b76050 : dxgkrnl!DxgkProcessNotify+0xf7
ffff9483`84cd1890 fffff807`61662894 : ffffdd83`e5905000 ffffdd83`e5905080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff9483`84cd1960 fffff807`61706552 : ffffdd83`e5a114b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
ffff9483`84cd1990 fffff807`61709a8e : ffffdd83`00000000 00000000`00000001 00000000`00000000 00000005`dd770000 : nt!PspExitThread+0x5b2
ffff9483`84cd1a90 fffff807`614071b8 : ffffdd83`e5905080 ffffdd83`e5a11080 ffff9483`84cd1b80 ffffdd83`e5905080 : nt!NtTerminateProcess+0xde
ffff9483`84cd1b00 00007fff`2364c534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000005`dd54fbb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2364c534
SYMBOL_NAME: dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+85
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 85
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!DXGADAPTERSYNCOBJECT::_DXGADAPTERSYNCOBJECT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {45500ca4-091f-73c0-5a5a-21a7c0e5a624}
Followup: MachineOwner
---------
hocam xmp açıksa kapatın yazmışsınız da. Bios'a girdiğimde ram frekansı 1860 mhz gözüküyordu. Benim Ramlerim zaten 3200 mhz. Bunu 3200 mhz e çıkarttığımda xmp mi yapmış oluyorum. Yoksa kendi ayarlarında 1860 mhz de mi dediklerinizi yapıyım ?1) Ekran kartı sürücünüzü aşağıdaki linkten indirin. Daha sonra DDU ile eski sürücüyü kaldırıp PC yeniden başladığında indirdiğiniz sürücüyü kurun.
Sürücü: Grafik Sürücüsü - GeForce Game Ready Driver | NVIDIA
Rehber: DDU ile Sürücü Kaldırma Rehberi
2) Bilgisayara bağlı Sandisk Cruzer Blade USB aygıtını çıkartın.
3) Aşağıdaki rehberi uygulayın ve sonucun ekran alıntısını paylaşın.
4) XMP modu açıksa kapatın ve sonra da Memtest86 testi uygulayın. En sonunda da sonuçları bizimle paylaşın.
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffff80000003, The exception code that was not handled Arg2: fffff8015edf0ca2, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffff9a8e3a5cfcd0, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 8406 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-70T822T Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 47103 Key : Analysis.Memory.CommitPeak.Mb Value: 82 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffff80000003 BUGCHECK_P2: fffff8015edf0ca2 BUGCHECK_P3: 0 BUGCHECK_P4: ffff9a8e3a5cfcd0 EXCEPTION_PARAMETER2: ffff9a8e3a5cfcd0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System BAD_STACK_POINTER: fffff80153c81158 STACK_TEXT: fffff801`53c81158 fffff801`4dcf4b0e : 00000000`0000001e ffffffff`80000003 fffff801`5edf0ca2 00000000`00000000 : nt!KeBugCheckEx fffff801`53c81160 fffff801`4dbfe642 : fffff801`4dcf4aec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22 fffff801`53c811a0 fffff801`4db2bf97 : fffff801`53c81710 00000000`00000000 fffff801`53c6cc60 fffff801`4dbf92ee : nt!RtlpExecuteHandlerForException+0x12 fffff801`53c811d0 fffff801`4db2ab86 : fffff801`53c6c018 fffff801`53c81e20 fffff801`53c6c018 fffff801`53c6c2e4 : nt!RtlDispatchException+0x297 fffff801`53c818f0 fffff801`4dbf6612 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186 fffff801`53c81fb0 fffff801`4dbf65e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12 fffff801`53c6bed8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue SYMBOL_NAME: nvlddmkm+6d0ca2 MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 6d0ca2 FAILURE_BUCKET_ID: 0x1E_80000003_STACKPTR_ERROR_nvlddmkm!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {190d579c-5762-fb1d-d0aa-ccf876db757e} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000008886, The subtype of the bugcheck. Arg2: ffff9f7ffffeedb0 Arg3: ffff9f7fffe5ab00 Arg4: 0000000000000500 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 8733 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-70T822T Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 22478 Key : Analysis.Memory.CommitPeak.Mb Value: 83 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 8886 BUGCHECK_P2: ffff9f7ffffeedb0 BUGCHECK_P3: ffff9f7fffe5ab00 BUGCHECK_P4: 500 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: ffff808a`6d33f928 fffff800`7d817ef0 : 00000000`0000001a 00000000`00008886 ffff9f7f`fffeedb0 ffff9f7f`ffe5ab00 : nt!KeBugCheckEx ffff808a`6d33f930 fffff800`7d83f273 : ffff808a`00000002 fffff800`00000000 0000000f`fffffa49 00000000`00000000 : nt!MiUnlinkPageFromList+0xcb0 ffff808a`6d33f9c0 fffff800`7d83f1cb : 00000000`00000005 ffff9f7f`fffeedb0 ffff9f80`0000818a ffff9f80`0000818a : nt!MiRelinkStandbyPage+0x3f ffff808a`6d33f9f0 fffff800`7d8404d5 : fffff800`00000000 fffff800`7e250b40 00000000`00000000 ffffe208`6c04b010 : nt!MiEmptyDecayClusterTimers+0x16f ffff808a`6d33fa60 fffff800`7d9b4e37 : 00000000`00000005 00000000`00000005 00000000`ffffffff ffff8780`e7790180 : nt!MiWorkingSetManager+0x85 ffff808a`6d33fb20 fffff800`7d917e25 : ffffe208`6c0ad040 00000000`00000080 fffff800`7d9b4ce0 00000000`00000000 : nt!KeBalanceSetManager+0x157 ffff808a`6d33fc10 fffff800`7d9fcdd8 : ffff8780`e7790180 ffffe208`6c0ad040 fffff800`7d917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffff808a`6d33fc60 00000000`00000000 : ffff808a`6d340000 ffff808a`6d33a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: nt!MiUnlinkPageFromList+cb0 MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.685 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: cb0 FAILURE_BUCKET_ID: 0x1a_8886_nt!MiUnlinkPageFromList OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: ffff948384cd11c0, Address of the trap frame for the exception that caused the bugcheck Arg3: ffff948384cd1118, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 14468 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-70T822T Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 82779 Key : Analysis.Memory.CommitPeak.Mb Value: 80 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 139 BUGCHECK_P1: 3 BUGCHECK_P2: ffff948384cd11c0 BUGCHECK_P3: ffff948384cd1118 BUGCHECK_P4: 0 TRAP_FRAME: ffff948384cd11c0 -- (.trap 0xffff948384cd11c0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffdd83e6df0188 rbx=0000000000000000 rcx=0000000000000003 rdx=ffffdd83e6decbe8 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8076d712b51 rsp=ffff948384cd1350 rbp=0000000000000000 r8=ffff948384cd1330 r9=0000000000000044 r10=fffff80761340d40 r11=ffff948384cd1370 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac po cy dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85: fffff807`6d712b51 cd29 int 29h Resetting default scope EXCEPTION_RECORD: ffff948384cd1118 -- (.exr 0xffff948384cd1118) ExceptionAddress: fffff8076d712b51 (dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x0000000000000085) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000003 Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: NVIDIA Share.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000003 EXCEPTION_STR: 0xc0000409 STACK_TEXT: ffff9483`84cd0e98 fffff807`61407769 : 00000000`00000139 00000000`00000003 ffff9483`84cd11c0 ffff9483`84cd1118 : nt!KeBugCheckEx ffff9483`84cd0ea0 fffff807`61407b90 : 00000000`00000000 00000000`38616956 ffff6abc`87de61d3 fffff807`6123c5b9 : nt!KiBugCheckDispatch+0x69 ffff9483`84cd0fe0 fffff807`61405f23 : 00000000`00000000 00000000`00000000 00000000`00000103 00000000`00000000 : nt!KiFastFailDispatch+0xd0 ffff9483`84cd11c0 fffff807`6d712b51 : 00000000`00000060 fffff807`61260913 ffffdd83`e5a11080 ffffdd83`e0a53160 : nt!KiRaiseSecurityCheckFailure+0x323 ffff9483`84cd1350 fffff807`6d712c5b : ffffdd83`e6df0cc0 ffffdd83`e6df0cc0 00000000`40001dc0 ffff8106`beed6ed0 : dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85 ffff9483`84cd1380 fffff807`6d7135d5 : ffffdd83`e0a53160 ffff9483`84cd1430 ffff8106`beed6de0 ffff8106`beed6de0 : dxgkrnl!DXGSYNCOBJECT::Destroy+0xff ffff9483`84cd13c0 fffff807`6d7186b0 : ffffdd83`e6df0cc0 ffff8106`be4d2720 ffffdd83`e6df0cc0 ffff8106`be4d2720 : dxgkrnl!DXGGLOBAL::DestroySyncObject+0x285 ffff9483`84cd1470 fffff807`6d7138e5 : ffff8106`beed6de0 00000000`000020d0 ffff8106`beed6de0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x328 ffff9483`84cd16e0 fffff807`6d606b67 : 00000000`00000000 ffff8106`beed6de0 ffffdd83`dda80350 fffff807`66ae4713 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105 ffff9483`84cd1830 fffff807`6163759f : 00000000`00000000 ffffdd83`e5905080 00000000`0000ff00 ffffdd83`e5b76050 : dxgkrnl!DxgkProcessNotify+0xf7 ffff9483`84cd1890 fffff807`61662894 : ffffdd83`e5905000 ffffdd83`e5905080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213 ffff9483`84cd1960 fffff807`61706552 : ffffdd83`e5a114b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70 ffff9483`84cd1990 fffff807`61709a8e : ffffdd83`00000000 00000000`00000001 00000000`00000000 00000005`dd770000 : nt!PspExitThread+0x5b2 ffff9483`84cd1a90 fffff807`614071b8 : ffffdd83`e5905080 ffffdd83`e5a11080 ffff9483`84cd1b80 ffffdd83`e5905080 : nt!NtTerminateProcess+0xde ffff9483`84cd1b00 00007fff`2364c534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000005`dd54fbb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2364c534 SYMBOL_NAME: dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+85 MODULE_NAME: dxgkrnl IMAGE_NAME: dxgkrnl.sys IMAGE_VERSION: 10.0.19041.685 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 85 FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!DXGADAPTERSYNCOBJECT::_DXGADAPTERSYNCOBJECT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {45500ca4-091f-73c0-5a5a-21a7c0e5a624} Followup: MachineOwner ---------
İlk 2 seçeneği uyguladım . 3. seçenekteki sonuç böyle1) Ekran kartı sürücünüzü aşağıdaki linkten indirin. Daha sonra DDU ile eski sürücüyü kaldırıp PC yeniden başladığında indirdiğiniz sürücüyü kurun.
Sürücü: Grafik Sürücüsü - GeForce Game Ready Driver | NVIDIA
Rehber: DDU ile Sürücü Kaldırma Rehberi
2) Bilgisayara bağlı Sandisk Cruzer Blade USB aygıtını çıkartın.
3) Aşağıdaki rehberi uygulayın ve sonucun ekran alıntısını paylaşın.
4) XMP modu açıksa kapatın ve sonra da Memtest86 testi uygulayın. En sonunda da sonuçları bizimle paylaşın.
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffff80000003, The exception code that was not handled Arg2: fffff8015edf0ca2, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffff9a8e3a5cfcd0, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 8406 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-70T822T Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 47103 Key : Analysis.Memory.CommitPeak.Mb Value: 82 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffff80000003 BUGCHECK_P2: fffff8015edf0ca2 BUGCHECK_P3: 0 BUGCHECK_P4: ffff9a8e3a5cfcd0 EXCEPTION_PARAMETER2: ffff9a8e3a5cfcd0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System BAD_STACK_POINTER: fffff80153c81158 STACK_TEXT: fffff801`53c81158 fffff801`4dcf4b0e : 00000000`0000001e ffffffff`80000003 fffff801`5edf0ca2 00000000`00000000 : nt!KeBugCheckEx fffff801`53c81160 fffff801`4dbfe642 : fffff801`4dcf4aec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22 fffff801`53c811a0 fffff801`4db2bf97 : fffff801`53c81710 00000000`00000000 fffff801`53c6cc60 fffff801`4dbf92ee : nt!RtlpExecuteHandlerForException+0x12 fffff801`53c811d0 fffff801`4db2ab86 : fffff801`53c6c018 fffff801`53c81e20 fffff801`53c6c018 fffff801`53c6c2e4 : nt!RtlDispatchException+0x297 fffff801`53c818f0 fffff801`4dbf6612 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186 fffff801`53c81fb0 fffff801`4dbf65e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12 fffff801`53c6bed8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue SYMBOL_NAME: nvlddmkm+6d0ca2 MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 6d0ca2 FAILURE_BUCKET_ID: 0x1E_80000003_STACKPTR_ERROR_nvlddmkm!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {190d579c-5762-fb1d-d0aa-ccf876db757e} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000008886, The subtype of the bugcheck. Arg2: ffff9f7ffffeedb0 Arg3: ffff9f7fffe5ab00 Arg4: 0000000000000500 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 8733 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-70T822T Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 22478 Key : Analysis.Memory.CommitPeak.Mb Value: 83 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 8886 BUGCHECK_P2: ffff9f7ffffeedb0 BUGCHECK_P3: ffff9f7fffe5ab00 BUGCHECK_P4: 500 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: ffff808a`6d33f928 fffff800`7d817ef0 : 00000000`0000001a 00000000`00008886 ffff9f7f`fffeedb0 ffff9f7f`ffe5ab00 : nt!KeBugCheckEx ffff808a`6d33f930 fffff800`7d83f273 : ffff808a`00000002 fffff800`00000000 0000000f`fffffa49 00000000`00000000 : nt!MiUnlinkPageFromList+0xcb0 ffff808a`6d33f9c0 fffff800`7d83f1cb : 00000000`00000005 ffff9f7f`fffeedb0 ffff9f80`0000818a ffff9f80`0000818a : nt!MiRelinkStandbyPage+0x3f ffff808a`6d33f9f0 fffff800`7d8404d5 : fffff800`00000000 fffff800`7e250b40 00000000`00000000 ffffe208`6c04b010 : nt!MiEmptyDecayClusterTimers+0x16f ffff808a`6d33fa60 fffff800`7d9b4e37 : 00000000`00000005 00000000`00000005 00000000`ffffffff ffff8780`e7790180 : nt!MiWorkingSetManager+0x85 ffff808a`6d33fb20 fffff800`7d917e25 : ffffe208`6c0ad040 00000000`00000080 fffff800`7d9b4ce0 00000000`00000000 : nt!KeBalanceSetManager+0x157 ffff808a`6d33fc10 fffff800`7d9fcdd8 : ffff8780`e7790180 ffffe208`6c0ad040 fffff800`7d917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffff808a`6d33fc60 00000000`00000000 : ffff808a`6d340000 ffff808a`6d33a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: nt!MiUnlinkPageFromList+cb0 MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.685 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: cb0 FAILURE_BUCKET_ID: 0x1a_8886_nt!MiUnlinkPageFromList OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: ffff948384cd11c0, Address of the trap frame for the exception that caused the bugcheck Arg3: ffff948384cd1118, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 14468 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-70T822T Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 82779 Key : Analysis.Memory.CommitPeak.Mb Value: 80 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 139 BUGCHECK_P1: 3 BUGCHECK_P2: ffff948384cd11c0 BUGCHECK_P3: ffff948384cd1118 BUGCHECK_P4: 0 TRAP_FRAME: ffff948384cd11c0 -- (.trap 0xffff948384cd11c0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffdd83e6df0188 rbx=0000000000000000 rcx=0000000000000003 rdx=ffffdd83e6decbe8 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8076d712b51 rsp=ffff948384cd1350 rbp=0000000000000000 r8=ffff948384cd1330 r9=0000000000000044 r10=fffff80761340d40 r11=ffff948384cd1370 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac po cy dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85: fffff807`6d712b51 cd29 int 29h Resetting default scope EXCEPTION_RECORD: ffff948384cd1118 -- (.exr 0xffff948384cd1118) ExceptionAddress: fffff8076d712b51 (dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x0000000000000085) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000003 Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: NVIDIA Share.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000003 EXCEPTION_STR: 0xc0000409 STACK_TEXT: ffff9483`84cd0e98 fffff807`61407769 : 00000000`00000139 00000000`00000003 ffff9483`84cd11c0 ffff9483`84cd1118 : nt!KeBugCheckEx ffff9483`84cd0ea0 fffff807`61407b90 : 00000000`00000000 00000000`38616956 ffff6abc`87de61d3 fffff807`6123c5b9 : nt!KiBugCheckDispatch+0x69 ffff9483`84cd0fe0 fffff807`61405f23 : 00000000`00000000 00000000`00000000 00000000`00000103 00000000`00000000 : nt!KiFastFailDispatch+0xd0 ffff9483`84cd11c0 fffff807`6d712b51 : 00000000`00000060 fffff807`61260913 ffffdd83`e5a11080 ffffdd83`e0a53160 : nt!KiRaiseSecurityCheckFailure+0x323 ffff9483`84cd1350 fffff807`6d712c5b : ffffdd83`e6df0cc0 ffffdd83`e6df0cc0 00000000`40001dc0 ffff8106`beed6ed0 : dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85 ffff9483`84cd1380 fffff807`6d7135d5 : ffffdd83`e0a53160 ffff9483`84cd1430 ffff8106`beed6de0 ffff8106`beed6de0 : dxgkrnl!DXGSYNCOBJECT::Destroy+0xff ffff9483`84cd13c0 fffff807`6d7186b0 : ffffdd83`e6df0cc0 ffff8106`be4d2720 ffffdd83`e6df0cc0 ffff8106`be4d2720 : dxgkrnl!DXGGLOBAL::DestroySyncObject+0x285 ffff9483`84cd1470 fffff807`6d7138e5 : ffff8106`beed6de0 00000000`000020d0 ffff8106`beed6de0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x328 ffff9483`84cd16e0 fffff807`6d606b67 : 00000000`00000000 ffff8106`beed6de0 ffffdd83`dda80350 fffff807`66ae4713 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105 ffff9483`84cd1830 fffff807`6163759f : 00000000`00000000 ffffdd83`e5905080 00000000`0000ff00 ffffdd83`e5b76050 : dxgkrnl!DxgkProcessNotify+0xf7 ffff9483`84cd1890 fffff807`61662894 : ffffdd83`e5905000 ffffdd83`e5905080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213 ffff9483`84cd1960 fffff807`61706552 : ffffdd83`e5a114b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70 ffff9483`84cd1990 fffff807`61709a8e : ffffdd83`00000000 00000000`00000001 00000000`00000000 00000005`dd770000 : nt!PspExitThread+0x5b2 ffff9483`84cd1a90 fffff807`614071b8 : ffffdd83`e5905080 ffffdd83`e5a11080 ffff9483`84cd1b80 ffffdd83`e5905080 : nt!NtTerminateProcess+0xde ffff9483`84cd1b00 00007fff`2364c534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000005`dd54fbb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2364c534 SYMBOL_NAME: dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+85 MODULE_NAME: dxgkrnl IMAGE_NAME: dxgkrnl.sys IMAGE_VERSION: 10.0.19041.685 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 85 FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!DXGADAPTERSYNCOBJECT::_DXGADAPTERSYNCOBJECT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {45500ca4-091f-73c0-5a5a-21a7c0e5a624} Followup: MachineOwner ---------
"sfc /scannow" komutu eksik veya bozuk dosya bulmamış.