KMODE_EXCEPTION_NOT_HANDLED mavi ekran hatası

Kaiwaos

Kilopat
Katılım
5 Mayıs 2017
Mesajlar
222
Makaleler
1
Daha fazla  
Cinsiyet
Erkek
Meslek
Aşçı
Bugün LoL'deyken bir anda bu mavi ekran geldi daha önce hiç karşılaşmadım ondan ne yapacağımı bilmiyorum. Altta dump dosyası var:

.
 
Son düzenleyen: Moderatör:
MSI Live Update programını kaldırın ve format atın, bir daha da sürücü yükleme programı kullanmayın. BIOS güncelleyin ve Memtest86 ile USB üzerinden RAM testi yapın.


Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8046c4569a4, The address that the exception occurred at
Arg3: ffffeb02600e59e8, Parameter 0 of the exception
Arg4: ffff8000c4d3a930, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 5

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 29

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8046c4569a4

BUGCHECK_P3: ffffeb02600e59e8

BUGCHECK_P4: ffff8000c4d3a930

WRITE_ADDRESS: fffff8046c9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8046c82a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8046c82a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8000c4d3a930

EXCEPTION_PARAMETER1:  ffffeb02600e59e8

EXCEPTION_PARAMETER2:  ffff8000c4d3a930

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

DEVICE_OBJECT: ffffa30300000000

TRAP_FRAME:  fffff804199c3202 -- (.trap 0xfffff804199c3202)
Unable to read trap frame at fffff804`199c3202

BAD_STACK_POINTER:  ffff8000c4d3a088

STACK_TEXT:
ffff8000`c4d3a088 fffff804`6c6a6987 : 00000000`0000001e ffffffff`c0000005 fffff804`6c4569a4 ffffeb02`600e59e8 : nt!KeBugCheckEx
ffff8000`c4d3a090 fffff804`6c5dcd56 : fffff804`6c4569a4 fffff804`6c45a1ab ffffeb02`600e5c28 ffff8000`c4d3a930 : nt!KiFatalFilter+0x1f
ffff8000`c4d3a0d0 fffff804`6c59d36c : fffff804`00000002 ffffeb02`600e66a0 ffffeb02`600e1000 ffffeb02`600e7000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffff8000`c4d3a110 fffff804`6c5cb1b2 : ffffeb02`600e66a0 ffff8000`c4d3a6f0 00000000`00000000 00000000`00000000 : nt!_C_specific_handler+0xac
ffff8000`c4d3a180 fffff804`6c4fa2d5 : 00000000`00000000 00000000`00000000 ffff8000`c4d3a6f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffff8000`c4d3a1b0 fffff804`6c4fe86e : ffffeb02`600e59e8 ffff8000`c4d3ae30 ffffeb02`600e59e8 ffffa303`53dbc3c8 : nt!RtlDispatchException+0x4a5
ffff8000`c4d3a900 fffff804`6c5c3202 : fffff804`198ca17f fffff600`84180328 fffff804`199c3202 fffff804`19800000 : nt!KiDispatchException+0x16e
ffff8000`c4d3afb0 fffff804`6c5c31d0 : fffff804`6c5d4316 00000000`00000001 00000000`00000000 ffff8000`c4d14180 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffeb02`600e58a8 fffff804`6c5d4316 : 00000000`00000001 00000000`00000000 ffff8000`c4d14180 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffeb02`600e58b0 fffff804`6c5d00a2 : ffff900b`927f6980 ffff900b`927f69e3 fffff804`70f5ec00 fffff804`70ee3645 : nt!KiExceptionDispatch+0x116
ffffeb02`600e5a90 fffff804`6c4569a4 : fffff804`6c491d7d ffffa303`5a641730 ffffa303`562cd400 ffffa303`568b7598 : nt!KiGeneralProtectionFault+0x322
ffffeb02`600e5c28 fffff804`6c491d7d : ffffa303`5a641730 ffffa303`562cd400 ffffa303`568b7598 00000000`00000003 : nt!CcInsertIntoDirtySharedCacheMapList+0x3c
ffffeb02`600e5c30 fffff804`70fba7d1 : 00000000`00000000 ffffeb02`600e5d90 ffffa303`00000000 00000000`00000001 : nt!CcSetDirtyPinnedData+0x51d
ffffeb02`600e5ce0 fffff804`70fb78f6 : ffffa303`568b7598 ffffeb02`600e5fd0 ffff900b`00001000 00000000`00000001 : Ntfs!NtfsWriteLog+0x551
ffffeb02`600e5f50 fffff804`70fb6dc9 : 00000000`00000040 00000000`00000038 ffffeb02`600e64c8 00000000`00000008 : Ntfs!NtfsUpdateFileNameInIndex+0x236
ffffeb02`600e61d0 fffff804`70fb67ff : 00000000`00000000 00000000`00000000 00000000`00000010 00000000`00000000 : Ntfs!NtfsUpdateFileNameInParent+0x179
ffffeb02`600e63b0 fffff804`70ffa201 : ffffa303`568b7598 ffff900b`947c05a0 ffffeb02`600e65f8 ffffeb02`600e65d8 : Ntfs!NtfsUpdateDuplicateInfo+0x18f
ffffeb02`600e6550 fffff804`70ff9e09 : ffffa303`568b7598 ffffa303`58e3e010 fffff804`70ff9d01 ffffeb02`600e6780 : Ntfs!NtfsCommonFlushBuffers+0x3b1
ffffeb02`600e6670 fffff804`6c4c00f8 : ffffeb02`600e6780 ffffa303`568b7598 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonFlushBuffersCallout+0x19
ffffeb02`600e66a0 fffff804`6c4c006d : fffff804`70ff9df0 ffffeb02`600e6780 00000000`00000000 fffff804`704e4bea : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffeb02`600e6710 fffff804`710128ae : ffffeb02`600e7000 00000000`00000000 ffffeb02`600e6770 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffeb02`600e6750 fffff804`710127dd : 00000000`00000000 ffffa303`58e3e010 ffffa303`568b7598 ffffeb02`600e67e8 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x66
ffffeb02`600e67c0 fffff804`6c50a939 : ffffa303`507d0010 ffffa303`58e3e010 ffffa303`568b7598 ffffeb02`600e67e8 : Ntfs!NtfsFsdFlushBuffers+0xdd
ffffeb02`600e6830 fffff804`704e55de : 00000000`00000000 ffffeb02`600e6910 ffffa303`58e3e010 ffffeb02`600e6920 : nt!IofCallDriver+0x59
ffffeb02`600e6870 fffff804`704e3f16 : ffffeb02`600e6910 ffffa303`55d7d520 ffffa303`562cd001 ffffa303`4b8aa800 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffffeb02`600e68f0 fffff804`6c50a939 : ffffa303`58e3e010 0000001a`273fee01 00000201`f39196a0 00000000`00000000 : FLTMGR!FltpDispatch+0xb6
ffffeb02`600e6950 fffff804`6cab2bd5 : ffffeb02`600e6b80 ffffa303`58e3e010 00000000`00000001 ffffa303`55d7d520 : nt!IofCallDriver+0x59
ffffeb02`600e6990 fffff804`6ca3137c : ffffa303`00000000 00000000`00000000 ffffa303`55d7d520 ffffeb02`600e6b80 : nt!IopSynchronousServiceTail+0x1a5
ffffeb02`600e6a30 fffff804`6ca31166 : ffffa303`562cd080 00000201`f39196a0 ffffa303`4b97cb30 00000201`f71dcff0 : nt!NtFlushBuffersFileEx+0x1fc
ffffeb02`600e6ac0 fffff804`6c5d3c18 : ffffa303`562cd080 ffffa303`574525e0 ffffeb02`600e6b18 ffffffff`ec549980 : nt!NtFlushBuffersFile+0x16
ffffeb02`600e6b00 00007ffb`a6a9ca24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001a`273fed18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a6a9ca24


SYMBOL_NAME:  nt!CcInsertIntoDirtySharedCacheMapList+3c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  3c

FAILURE_BUCKET_ID:  0x1E_c0000005_STACKPTR_ERROR_nt!CcInsertIntoDirtySharedCacheMapList

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1101cc0e-8b84-e4ea-739e-fc5bdbd873bc}

Followup:     MachineOwner
---------
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8036dca5048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80351a9e182, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 17

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: fffff8036dca5048

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80351a9e182

WRITE_ADDRESS: fffff80351f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80351e2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80351e2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff8036dca5048

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MSI_LiveUpdate_Service.exe

DPC_STACK_BASE:  FFFFA98AFFE30FB0

TRAP_FRAME:  ffffa98affe309e0 -- (.trap 0xffffa98affe309e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000057 rbx=0000000000000000 rcx=00000000000035de
rdx=000000000000274b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80351a9e182 rsp=ffffa98affe30b70 rbp=0000000000024a16
r8=ffff900c73ddf6a0  r9=ffff900c73c11b50 r10=0000000000000014
r11=0000000000417d6e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!PpmPerfSnapUtility+0x192:
fffff803`51a9e182 4801bbc85e0000  add     qword ptr [rbx+5EC8h],rdi ds:00000000`00005ec8=????????????????
Resetting default scope

STACK_TEXT:
ffffa98a`ffe30898 fffff803`51bd41e9 : 00000000`0000000a fffff803`6dca5048 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffa98a`ffe308a0 fffff803`51bd052b : 00000000`00000000 00000000`00000002 00000000`01eca04f ffffa98a`ffe30e70 : nt!KiBugCheckDispatch+0x69
ffffa98a`ffe309e0 fffff803`51a9e182 : 00000000`0000000e fffff803`51a9dfb0 00000000`00000000 fffff803`51a00000 : nt!KiPageFault+0x46b
ffffa98a`ffe30b70 fffff803`51a9dfb0 : 00000000`00000000 fffff803`51a00000 00000000`00000000 ffffa98a`ffe30e80 : nt!PpmPerfSnapUtility+0x192
ffffa98a`ffe30b80 fffff803`51a43bc0 : ffffd700`6d98df80 ffffa98a`ffe30d40 fffff803`51e3b540 0000e0b8`e5ccd0e8 : nt!PpmCheckSnapAllUtility+0x70
ffffa98a`ffe30bb0 fffff803`51ac116a : ffffd700`6d98df80 ffff900c`732a3000 ffffd700`6d990f90 ffffd700`00000002 : nt!PpmCheckRun+0x40
ffffa98a`ffe30c40 fffff803`51ac07bf : 00000000`00000000 00000000`00989680 00000000`006bb282 00000000`0000009a : nt!KiExecuteAllDpcs+0x30a
ffffa98a`ffe30d80 fffff803`51bc93c5 : 00000000`00000000 ffffd700`6d98b180 00000000`00000000 ffffc2de`42c1c240 : nt!KiRetireDpcList+0x1ef
ffffa98a`ffe30fb0 fffff803`51bc91b0 : 00000000`00000001 ffffc2bf`737c5987 ffff900c`78046790 00000000`00989680 : nt!KxRetireDpcList+0x5
ffffa98b`03139df0 fffff803`51bc8880 : 00000000`00000020 ffffc2de`40200000 00000000`00000000 ffffffff`ffffffff : nt!KiDispatchInterruptContinue
ffffa98b`03139e20 fffff803`51b1e65d : ffffc2de`40200000 00000000`00000000 ffff900c`777c2d90 fffff803`51b1109a : nt!KiDpcInterrupt+0x2f0
ffffa98b`03139fb0 fffff803`51d6f019 : ffff900c`7e3b6005 ffffc2bf`737c1900 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x20d
ffffa98b`0313a0d0 ffffc2bf`72668e82 : 00000000`00000000 ffffc2de`42866680 00000000`00000000 ffffc6fc`ef200000 : nt!ExFreePool+0x9
ffffa98b`0313a100 00000000`00000000 : ffffc2de`42866680 00000000`00000000 ffffc6fc`ef200000 00000000`0b07e711 : win32kfull+0x68e82


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.18362.720

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_nt!ExFreePool

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}

Followup:     Pool_corruption
---------
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000030, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8042f539e29, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 9

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 30

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8042f539e29

WRITE_ADDRESS: fffff8042f9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8042f82a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8042f82a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000030

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WmiPrvSE.exe

TRAP_FRAME:  ffffc305c5586f20 -- (.trap 0xffffc305c5586f20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000001020401 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8042f975ac0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042f539e29 rsp=ffffc305c55870b0 rbp=0000000000000000
r8=0000000000000000  r9=0000000000000211 r10=0000000000000204
r11=ffff86019bec9d80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeQueryValuesThread+0x369:
fffff804`2f539e29 f0480fba6d3000  lock bts qword ptr [rbp+30h],0 ss:0018:00000000`00000030=????????????????
Resetting default scope

STACK_TEXT:
ffffc305`c5586dd8 fffff804`2f5d41e9 : 00000000`0000000a 00000000`00000030 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffc305`c5586de0 fffff804`2f5d052b : 00000000`0000006d 00000000`00000001 ffffc305`c5587050 00000000`0000000e : nt!KiBugCheckDispatch+0x69
ffffc305`c5586f20 fffff804`2f539e29 : 00000000`000000a0 00000000`00000001 00000000`00000e8a ffff9c01`f3d43a70 : nt!KiPageFault+0x46b
ffffc305`c55870b0 fffff804`2fad5d71 : ffffc305`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x369
ffffc305`c5587130 fffff804`2fad5b94 : ffff9c01`f3194700 00000000`00000000 ffff8601`9bec9c40 00000000`00000000 : nt!PsQueryStatisticsProcess+0xf1
ffffc305`c55871a0 fffff804`2fab966a : 00000000`00000002 000001e8`dbf441a8 ffff9c01`f5e37480 fffff804`2f838b00 : nt!ExpCopyProcessInfo+0x274
ffffc305`c5587240 fffff804`2faab458 : 00000000`00000000 00000000`00028000 00000000`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0x9ca
ffffc305`c55878b0 fffff804`2faaab1b : 000001e8`dbc6a8f0 00000000`00000001 000001e8`dbf4e7d0 00000000`00000000 : nt!ExpQuerySystemInformation+0x818
ffffc305`c5587ac0 fffff804`2f5d3c18 : ffff9c01`f3194700 00000000`00000001 ffffc305`c5587b80 ffff9c01`f135ade0 : nt!NtQuerySystemInformation+0x2b
ffffc305`c5587b00 00007ff9`691bc784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000094`f2c7ce48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`691bc784


SYMBOL_NAME:  nt!KeQueryValuesThread+369

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  369

FAILURE_BUCKET_ID:  AV_nt!KeQueryValuesThread

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c895ca60-5a6a-dc6e-0d58-a13309871622}

Followup:     MachineOwner
---------
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: fffff8038109eff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff8038109ef48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 8

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 4

BUGCHECK_P2: fffff8038109eff0

BUGCHECK_P3: fffff8038109ef48

BUGCHECK_P4: 0

TRAP_FRAME:  fffff8038109eff0 -- (.trap 0xfffff8038109eff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff98206c55000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffff98206c5b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037a8002f1 rsp=fffff8038109f180 rbp=fffff8038109f6f0
r8=fffff98206c5b000  r9=fffff8038109f710 r10=ffffe48d4aab0080
r11=0000008c9d1fa408 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlpGetStackLimitsEx+0x19e355:
fffff803`7a8002f1 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff8038109ef48 -- (.exr 0xfffff8038109ef48)
ExceptionAddress: fffff8037a8002f1 (nt!RtlpGetStackLimitsEx+0x000000000019e355)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

EXCEPTION_STR:  0xc0000409

BAD_STACK_POINTER:  fffff8038109ecc8

STACK_TEXT:
fffff803`8109ecc8 fffff803`7a7d41e9 : 00000000`00000139 00000000`00000004 fffff803`8109eff0 fffff803`8109ef48 : nt!KeBugCheckEx
fffff803`8109ecd0 fffff803`7a7d4610 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`8109ee10 fffff803`7a7d29a5 : fffff803`7a669048 fffff803`7aa0e8ac fffff803`8109f7d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff803`8109eff0 fffff803`7a8002f1 : 00000000`00000000 00000000`00000360 0005e38c`00ab7000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x325
fffff803`8109f180 fffff803`7a85982a : 00000000`00000000 00000000`00000000 fffff803`8109f6f0 00007fff`00000003 : nt!RtlpGetStackLimitsEx+0x19e355
fffff803`8109f1b0 fffff803`7a6fe86e : fffff982`06c5a0e8 fffff803`8109fe30 fffff982`06c5a0e8 00000000`00000000 : nt!RtlDispatchException+0x15f9fa
fffff803`8109f900 fffff803`7a7c3202 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
fffff803`8109ffb0 fffff803`7a7c31d0 : fffff803`7a7d4316 00000000`00000861 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff982`06c59fa8 fffff803`7a7d4316 : 00000000`00000861 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff982`06c59fb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7b0febb5-6007-4f2b-3d38-57fef278d8d5}

Followup:     MachineOwner
---------
 
MSI Live Update programını kaldırın ve format atın, bir daha da sürücü yükleme programı kullanmayın. BIOS güncelleyin ve Memtest86 ile USB üzerinden RAM testi yapın.


Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff8046c4569a4, The address that the exception occurred at.
Arg3: ffffeb02600e59e8, Parameter 0 of the exception.
Arg4: ffff8000c4d3a930, Parameter 1 of the exception.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 5.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-JC78BRD.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 29.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: 1e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff8046c4569a4.

BUGCHECK_P3: ffffeb02600e59e8.

BUGCHECK_P4: ffff8000c4d3a930.

WRITE_ADDRESS: fffff8046c9733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8046c82a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff8046c82a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffff8000c4d3a930.

EXCEPTION_PARAMETER1: ffffeb02600e59e8.

EXCEPTION_PARAMETER2: ffff8000c4d3a930.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

DEVICE_OBJECT: ffffa30300000000.

TRAP_FRAME: fffff804199c3202 -- (.trap 0xfffff804199c3202)
Unable to read trap frame at fffff804`199c3202.

BAD_STACK_POINTER: ffff8000c4d3a088.

STACK_TEXT:
ffff8000`c4d3a088 fffff804`6c6a6987 : 00000000`0000001e ffffffff`c0000005 fffff804`6c4569a4 ffffeb02`600e59e8 : nt!KeBugCheckEx.
ffff8000`c4d3a090 fffff804`6c5dcd56 : fffff804`6c4569a4 fffff804`6c45a1ab ffffeb02`600e5c28 ffff8000`c4d3a930 : nt!KiFatalFilter+0x1f.
ffff8000`c4d3a0d0 fffff804`6c59d36c : fffff804`00000002 ffffeb02`600e66a0 ffffeb02`600e1000 ffffeb02`600e7000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16.
ffff8000`c4d3a110 fffff804`6c5cb1b2 : ffffeb02`600e66a0 ffff8000`c4d3a6f0 00000000`00000000 00000000`00000000 : nt!_C_specific_handler+0xac.
ffff8000`c4d3a180 fffff804`6c4fa2d5 : 00000000`00000000 00000000`00000000 ffff8000`c4d3a6f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12.
ffff8000`c4d3a1b0 fffff804`6c4fe86e : ffffeb02`600e59e8 ffff8000`c4d3ae30 ffffeb02`600e59e8 ffffa303`53dbc3c8 : nt!RtlDispatchException+0x4a5.
ffff8000`c4d3a900 fffff804`6c5c3202 : fffff804`198ca17f fffff600`84180328 fffff804`199c3202 fffff804`19800000 : nt!KiDispatchException+0x16e.
ffff8000`c4d3afb0 fffff804`6c5c31d0 : fffff804`6c5d4316 00000000`00000001 00000000`00000000 ffff8000`c4d14180 : nt!KxExceptionDispatchOnExceptionStack+0x12.
ffffeb02`600e58a8 fffff804`6c5d4316 : 00000000`00000001 00000000`00000000 ffff8000`c4d14180 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue.
ffffeb02`600e58b0 fffff804`6c5d00a2 : ffff900b`927f6980 ffff900b`927f69e3 fffff804`70f5ec00 fffff804`70ee3645 : nt!KiExceptionDispatch+0x116.
ffffeb02`600e5a90 fffff804`6c4569a4 : fffff804`6c491d7d ffffa303`5a641730 ffffa303`562cd400 ffffa303`568b7598 : nt!KiGeneralProtectionFault+0x322.
ffffeb02`600e5c28 fffff804`6c491d7d : ffffa303`5a641730 ffffa303`562cd400 ffffa303`568b7598 00000000`00000003 : nt!CcInsertIntoDirtySharedCacheMapList+0x3c.
ffffeb02`600e5c30 fffff804`70fba7d1 : 00000000`00000000 ffffeb02`600e5d90 ffffa303`00000000 00000000`00000001 : nt!CcSetDirtyPinnedData+0x51d.
ffffeb02`600e5ce0 fffff804`70fb78f6 : ffffa303`568b7598 ffffeb02`600e5fd0 ffff900b`00001000 00000000`00000001 : Ntfs!NtfsWriteLog+0x551.
ffffeb02`600e5f50 fffff804`70fb6dc9 : 00000000`00000040 00000000`00000038 ffffeb02`600e64c8 00000000`00000008 : Ntfs!NtfsUpdateFileNameInIndex+0x236.
ffffeb02`600e61d0 fffff804`70fb67ff : 00000000`00000000 00000000`00000000 00000000`00000010 00000000`00000000 : Ntfs!NtfsUpdateFileNameInParent+0x179.
ffffeb02`600e63b0 fffff804`70ffa201 : ffffa303`568b7598 ffff900b`947c05a0 ffffeb02`600e65f8 ffffeb02`600e65d8 : Ntfs!NtfsUpdateDuplicateInfo+0x18f.
ffffeb02`600e6550 fffff804`70ff9e09 : ffffa303`568b7598 ffffa303`58e3e010 fffff804`70ff9d01 ffffeb02`600e6780 : Ntfs!NtfsCommonFlushBuffers+0x3b1.
ffffeb02`600e6670 fffff804`6c4c00f8 : ffffeb02`600e6780 ffffa303`568b7598 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonFlushBuffersCallout+0x19.
ffffeb02`600e66a0 fffff804`6c4c006d : fffff804`70ff9df0 ffffeb02`600e6780 00000000`00000000 fffff804`704e4bea : nt!KeExpandKernelStackAndCalloutInternal+0x78.
ffffeb02`600e6710 fffff804`710128ae : ffffeb02`600e7000 00000000`00000000 ffffeb02`600e6770 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0x1d.
ffffeb02`600e6750 fffff804`710127dd : 00000000`00000000 ffffa303`58e3e010 ffffa303`568b7598 ffffeb02`600e67e8 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x66.
ffffeb02`600e67c0 fffff804`6c50a939 : ffffa303`507d0010 ffffa303`58e3e010 ffffa303`568b7598 ffffeb02`600e67e8 : Ntfs!NtfsFsdFlushBuffers+0xdd.
ffffeb02`600e6830 fffff804`704e55de : 00000000`00000000 ffffeb02`600e6910 ffffa303`58e3e010 ffffeb02`600e6920 : nt!IofCallDriver+0x59.
ffffeb02`600e6870 fffff804`704e3f16 : ffffeb02`600e6910 ffffa303`55d7d520 ffffa303`562cd001 ffffa303`4b8aa800 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e.
ffffeb02`600e68f0 fffff804`6c50a939 : ffffa303`58e3e010 0000001a`273fee01 00000201`f39196a0 00000000`00000000 : FLTMGR!FltpDispatch+0xb6.
ffffeb02`600e6950 fffff804`6cab2bd5 : ffffeb02`600e6b80 ffffa303`58e3e010 00000000`00000001 ffffa303`55d7d520 : nt!IofCallDriver+0x59.
ffffeb02`600e6990 fffff804`6ca3137c : ffffa303`00000000 00000000`00000000 ffffa303`55d7d520 ffffeb02`600e6b80 : nt!IopSynchronousServiceTail+0x1a5.
ffffeb02`600e6a30 fffff804`6ca31166 : ffffa303`562cd080 00000201`f39196a0 ffffa303`4b97cb30 00000201`f71dcff0 : nt!NtFlushBuffersFileEx+0x1fc.
ffffeb02`600e6ac0 fffff804`6c5d3c18 : ffffa303`562cd080 ffffa303`574525e0 ffffeb02`600e6b18 ffffffff`ec549980 : nt!NtFlushBuffersFile+0x16.
ffffeb02`600e6b00 00007ffb`a6a9ca24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
0000001a`273fed18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a6a9ca24.

SYMBOL_NAME: nt!CcInsertIntoDirtySharedCacheMapList+3c.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.18362.720.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 3c.

FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_nt!CcInsertIntoDirtySharedCacheMapList.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {1101cc0e-8b84-e4ea-739e-fc5bdbd873bc}

Followup: MachineOwner.
---------
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8036dca5048, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80351a9e182, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 4.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-JC78BRD.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 17.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 71.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: fffff8036dca5048.

BUGCHECK_P2: 2.

BUGCHECK_P3: 1.

BUGCHECK_P4: fffff80351a9e182.

WRITE_ADDRESS: fffff80351f733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80351e2a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff80351e2a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
fffff8036dca5048.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: MSI_LiveUpdate_Service.exe.

DPC_STACK_BASE: FFFFA98AFFE30FB0.

TRAP_FRAME: ffffa98affe309e0 -- (.trap 0xffffa98affe309e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000057 rbx=0000000000000000 rcx=00000000000035de.
rdx=000000000000274b rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80351a9e182 rsp=ffffa98affe30b70 rbp=0000000000024a16.
r8=ffff900c73ddf6a0 r9=ffff900c73c11b50 r10=0000000000000014.
r11=0000000000417d6e r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na pe nc.
nt!PpmPerfSnapUtility+0x192:
fffff803`51a9e182 4801bbc85e0000 add qword ptr [rbx+5EC8h],rdi ds:00000000`00005ec8=????????????????
Resetting default scope.

STACK_TEXT:
ffffa98a`ffe30898 fffff803`51bd41e9 : 00000000`0000000a fffff803`6dca5048 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
ffffa98a`ffe308a0 fffff803`51bd052b : 00000000`00000000 00000000`00000002 00000000`01eca04f ffffa98a`ffe30e70 : nt!KiBugCheckDispatch+0x69.
ffffa98a`ffe309e0 fffff803`51a9e182 : 00000000`0000000e fffff803`51a9dfb0 00000000`00000000 fffff803`51a00000 : nt!KiPageFault+0x46b.
ffffa98a`ffe30b70 fffff803`51a9dfb0 : 00000000`00000000 fffff803`51a00000 00000000`00000000 ffffa98a`ffe30e80 : nt!PpmPerfSnapUtility+0x192.
ffffa98a`ffe30b80 fffff803`51a43bc0 : ffffd700`6d98df80 ffffa98a`ffe30d40 fffff803`51e3b540 0000e0b8`e5ccd0e8 : nt!PpmCheckSnapAllUtility+0x70.
ffffa98a`ffe30bb0 fffff803`51ac116a : ffffd700`6d98df80 ffff900c`732a3000 ffffd700`6d990f90 ffffd700`00000002 : nt!PpmCheckRun+0x40.
ffffa98a`ffe30c40 fffff803`51ac07bf : 00000000`00000000 00000000`00989680 00000000`006bb282 00000000`0000009a : nt!KiExecuteAllDpcs+0x30a.
ffffa98a`ffe30d80 fffff803`51bc93c5 : 00000000`00000000 ffffd700`6d98b180 00000000`00000000 ffffc2de`42c1c240 : nt!KiRetireDpcList+0x1ef.
ffffa98a`ffe30fb0 fffff803`51bc91b0 : 00000000`00000001 ffffc2bf`737c5987 ffff900c`78046790 00000000`00989680 : nt!KxRetireDpcList+0x5.
ffffa98b`03139df0 fffff803`51bc8880 : 00000000`00000020 ffffc2de`40200000 00000000`00000000 ffffffff`ffffffff : nt!KiDispatchInterruptContinue.
ffffa98b`03139e20 fffff803`51b1e65d : ffffc2de`40200000 00000000`00000000 ffff900c`777c2d90 fffff803`51b1109a : nt!KiDpcInterrupt+0x2f0.
ffffa98b`03139fb0 fffff803`51d6f019 : ffff900c`7e3b6005 ffffc2bf`737c1900 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x20d.
ffffa98b`0313a0d0 ffffc2bf`72668e82 : 00000000`00000000 ffffc2de`42866680 00000000`00000000 ffffc6fc`ef200000 : nt!ExFreePool+0x9.
ffffa98b`0313a100 00000000`00000000 : ffffc2de`42866680 00000000`00000000 ffffc6fc`ef200000 00000000`0b07e711 : win32kfull+0x68e82.

SYMBOL_NAME: nt!ExFreePool+9.

IMAGE_NAME: Pool_Corruption.

IMAGE_VERSION: 10.0.18362.720.

MODULE_NAME: Pool_Corruption.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 9.

FAILURE_BUCKET_ID: AV_nt!ExFreePool.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}

Followup: Pool_corruption.
---------
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000030, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8042f539e29, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 4.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-JC78BRD.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 9.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 69.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 30.

BUGCHECK_P2: 2.

BUGCHECK_P3: 1.

BUGCHECK_P4: fffff8042f539e29.

WRITE_ADDRESS: fffff8042f9733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8042f82a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff8042f82a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000030.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: WmiPrvSE.exe.

TRAP_FRAME: ffffc305c5586f20 -- (.trap 0xffffc305c5586f20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000001020401 rbx=0000000000000000 rcx=0000000000000000.
rdx=fffff8042f975ac0 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8042f539e29 rsp=ffffc305c55870b0 rbp=0000000000000000.
r8=0000000000000000 r9=0000000000000211 r10=0000000000000204.
r11=ffff86019bec9d80 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!KeQueryValuesThread+0x369:
fffff804`2f539e29 f0480fba6d3000 lock bts qword ptr [rbp+30h],0 ss:0018:00000000`00000030=????????????????
Resetting default scope.

STACK_TEXT:
ffffc305`c5586dd8 fffff804`2f5d41e9 : 00000000`0000000a 00000000`00000030 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
ffffc305`c5586de0 fffff804`2f5d052b : 00000000`0000006d 00000000`00000001 ffffc305`c5587050 00000000`0000000e : nt!KiBugCheckDispatch+0x69.
ffffc305`c5586f20 fffff804`2f539e29 : 00000000`000000a0 00000000`00000001 00000000`00000e8a ffff9c01`f3d43a70 : nt!KiPageFault+0x46b.
ffffc305`c55870b0 fffff804`2fad5d71 : ffffc305`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x369.
ffffc305`c5587130 fffff804`2fad5b94 : ffff9c01`f3194700 00000000`00000000 ffff8601`9bec9c40 00000000`00000000 : nt!PsQueryStatisticsProcess+0xf1.
ffffc305`c55871a0 fffff804`2fab966a : 00000000`00000002 000001e8`dbf441a8 ffff9c01`f5e37480 fffff804`2f838b00 : nt!ExpCopyProcessInfo+0x274.
ffffc305`c5587240 fffff804`2faab458 : 00000000`00000000 00000000`00028000 00000000`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0x9ca.
ffffc305`c55878b0 fffff804`2faaab1b : 000001e8`dbc6a8f0 00000000`00000001 000001e8`dbf4e7d0 00000000`00000000 : nt!ExpQuerySystemInformation+0x818.
ffffc305`c5587ac0 fffff804`2f5d3c18 : ffff9c01`f3194700 00000000`00000001 ffffc305`c5587b80 ffff9c01`f135ade0 : nt!NtQuerySystemInformation+0x2b.
ffffc305`c5587b00 00007ff9`691bc784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000094`f2c7ce48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`691bc784.

SYMBOL_NAME: nt!KeQueryValuesThread+369.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.18362.720.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 369.

FAILURE_BUCKET_ID: AV_nt!KeQueryValuesThread.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {c895ca60-5a6a-dc6e-0d58-a13309871622}

Followup: MachineOwner.
---------
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack.
extents for the thread.
Arg2: fffff8038109eff0, Address of the trap frame for the exception that caused the bugcheck.
Arg3: fffff8038109ef48, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 3.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-JC78BRD.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 8.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 69.

Key : Analysis.System.
Value: CreateObject.

ADDITIONAL_XML: 1.

BUGCHECK_CODE: 139.

BUGCHECK_P1: 4.

BUGCHECK_P2: fffff8038109eff0.

BUGCHECK_P3: fffff8038109ef48.

BUGCHECK_P4: 0.

TRAP_FRAME: fffff8038109eff0 -- (.trap 0xfffff8038109eff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff98206c55000 rbx=0000000000000000 rcx=0000000000000004.
rdx=fffff98206c5b000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8037a8002f1 rsp=fffff8038109f180 rbp=fffff8038109f6f0.
r8=fffff98206c5b000 r9=fffff8038109f710 r10=ffffe48d4aab0080.
r11=0000008c9d1fa408 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!RtlpGetStackLimitsEx+0x19e355:
fffff803`7a8002f1 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: fffff8038109ef48 -- (.exr 0xfffff8038109ef48)
ExceptionAddress: fffff8037a8002f1 (nt!RtlpGetStackLimitsEx+0x000000000019e355)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1.
Parameter[0]: 0000000000000004.
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

WATSON_BKT_EVENT: BEX.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000004.

EXCEPTION_STR: 0xc0000409.

BAD_STACK_POINTER: fffff8038109ecc8.

STACK_TEXT:
fffff803`8109ecc8 fffff803`7a7d41e9 : 00000000`00000139 00000000`00000004 fffff803`8109eff0 fffff803`8109ef48 : nt!KeBugCheckEx.
fffff803`8109ecd0 fffff803`7a7d4610 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69.
fffff803`8109ee10 fffff803`7a7d29a5 : fffff803`7a669048 fffff803`7aa0e8ac fffff803`8109f7d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0.
fffff803`8109eff0 fffff803`7a8002f1 : 00000000`00000000 00000000`00000360 0005e38c`00ab7000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x325.
fffff803`8109f180 fffff803`7a85982a : 00000000`00000000 00000000`00000000 fffff803`8109f6f0 00007fff`00000003 : nt!RtlpGetStackLimitsEx+0x19e355.
fffff803`8109f1b0 fffff803`7a6fe86e : fffff982`06c5a0e8 fffff803`8109fe30 fffff982`06c5a0e8 00000000`00000000 : nt!RtlDispatchException+0x15f9fa.
fffff803`8109f900 fffff803`7a7c3202 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e.
fffff803`8109ffb0 fffff803`7a7c31d0 : fffff803`7a7d4316 00000000`00000861 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12.
fffff982`06c59fa8 fffff803`7a7d4316 : 00000000`00000861 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue.
fffff982`06c59fb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116.

SYMBOL_NAME: nt!KiFastFailDispatch+d0.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.18362.720.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: d0.

FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch.

OS_VERSION: 10.0.18362.1.

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}

Followup: MachineOwner.
---------

MSI Update programı yok Driver güncelleme programı kullanmadım @marcel'o adlı arkadaş güncellemede yardım etmişti. BIOS güncellemesi sizin verdiğiniz link mi?
 
MSI Update programı yok Driver güncelleme programı kullanmadım @marcel'o adlı arkadaş güncellemede yardım etmişti. BIOS güncellemesi sizin verdiğiniz link mi?
MSI Live Update kalıntıları var o zaman onları silmeniz lazım. BIOS güncellemesi için attığım linkten son sürümü indirip kuracaksınız.
 
Bu farklı bir bilgisayar mı? Benim güncelleştirmelerini yaptığım Lenovo laptoptu çünkü.

Evet Lenovo laptop da aldım hatayı belki ekran kartı vermiştir. Ekran kartını Windows 2017 versiyonunu indirdi bir de böyle deniyim eğer yine aynı hatayı verirse sizin indirdiğinize döneceğim.
 
Formata gerek yok yazılımı kaldırsan yeterli. Memtest ve HDSentinel ile testleri yapıp sonuçlarını paylaşın görsel olarak.
BIOS'u da güncelleyin yukarıda denildiği gibi.
MSI Live Update programını kaldırın ve format atın.
Üreticilerin verdiği güncelleme yazılımları legal olduğu için formata gerek yok. Üreticileri dışında yüklenenlere format istiyoruz. Hatalı yazılım veya sürücü yüklenmişse en fazla onları kaldırmak istenebilir.
 

Geri
Yukarı