Çözüldü Lenovo ideapad 500-15ISK çeşitli mavi ekran hataları veriyor

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

DeRochefort

Femtopat
Katılım
25 Ekim 2021
Mesajlar
5
Daha fazla  
Cinsiyet
Erkek
Herkese selamlar, laptopum çok çeşitli şekilde mavi ekran hataları veriyor. Minidump dosyalarını paylaşmam durumuda yardımcı olacak müsait birisi var mı?
 
Çözüm
Bahsettiğiniz hileyi kapayıp dener misiniz mavi ekran verip vermediğini? Eğer öyleyse hile kullanmamanız gerekmekte ki hile zaten bildiğiniz üzere yasal bir şey değil. O oyunda yasak değil mi bilmiyorum fakat değilse farklı hile varsa onu kullanmayı deneyebilirsiniz.
Ben dosyaları paylaşmanız durumunda gerekli desteği veririm. Dosyaları nasıl bulacağınızı ve nerelere yükleyebileceğinizi anlatan aşağıdaki rehberi okursanız sevinirim. Kolay gelsin.

 
İnceledim ve bana kalırsa sorunun kaynağı Metin 2 Launcher'ı. Hep o process açıkken mavi ekranları almışsınız. Bu Launcher'ın güvenilirliğinden emin misiniz? Farklı bir Launcher kullanıyorsanız orijinal Launcher'ı kullanın.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc4806268f160, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffc4806268f0b8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8061

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 23651

Key : Analysis.Init.CPU.mSec
Value: 921

Key : Analysis.Init.Elapsed.mSec
Value: 5850

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc4806268f160

BUGCHECK_P3: ffffc4806268f0b8

BUGCHECK_P4: 0

TRAP_FRAME: ffffc4806268f160 -- (.trap 0xffffc4806268f160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff8037ef2e748 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037e9e8caf rsp=ffffc4806268f2f0 rbp=ffffc4806268f360
r8=ffffc4806268f2d0 r9=0000000000000000 r10=fffff8037e81a610
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!PspProcessDelete+0x1ce69f:
fffff803`7e9e8caf cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffc4806268f0b8 -- (.exr 0xffffc4806268f0b8)
ExceptionAddress: fffff8037e9e8caf (nt!PspProcessDelete+0x00000000001ce69f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: metin2client.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffc480`6268ee38 fffff803`7e609169 : 00000000`00000139 00000000`00000003 ffffc480`6268f160 ffffc480`6268f0b8 : nt!KeBugCheckEx
ffffc480`6268ee40 fffff803`7e609590 : ffffc708`30070980 fffff803`81286231 ffffc480`6268f000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc480`6268ef80 fffff803`7e607923 : 00000000`00000000 fffff803`7b005c55 00000000`00000000 ffffe703`53fc38d8 : nt!KiFastFailDispatch+0xd0
ffffc480`6268f160 fffff803`7e9e8caf : 00000000`00000000 ffffe703`5e2457b0 00000000`00000180 01000000`00100000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc480`6268f2f0 fffff803`7e8732d0 : ffffe703`59f1a050 ffffe703`59f1a050 00000000`00000000 ffffe703`502b5400 : nt!PspProcessDelete+0x1ce69f
ffffc480`6268f380 fffff803`7e408357 : 00000000`00000000 00000000`00000000 ffffc480`6268f509 ffffe703`59f1a080 : nt!ObpRemoveObjectRoutine+0x80
ffffc480`6268f3e0 fffff803`7e7f3b79 : ffffe703`59f1a050 00000000`00000000 00000000`00000000 ffffe703`593540c0 : nt!ObfDereferenceObjectWithTag+0xc7
ffffc480`6268f420 fffff803`7e85c855 : ffffe703`582a37a8 fffff803`7e408649 ffffe703`582a3770 00000000`00000000 : nt!ObCloseHandleTableEntry+0x6c9
ffffc480`6268f560 fffff803`7e85e6ad : ffffe703`582a3770 ffffe703`59a59080 ffffffff`ffffff01 ffffe703`59354518 : nt!ExSweepHandleTable+0xd5
ffffc480`6268f610 fffff803`7e85c5a0 : ffffffff`ffffffff ffffe703`593540c0 ffffc480`6268f660 fffff803`7e8203ac : nt!ObKillProcess+0x35
ffffc480`6268f640 fffff803`7e8b0ab6 : ffffe703`593540c0 ffffc708`2f0eb770 ffffc480`6268f890 00000000`00000000 : nt!PspRundownSingleProcess+0x204
ffffc480`6268f6d0 fffff803`7e8f53c8 : 00000000`00000001 00000000`00000101 00000000`00000000 00000000`003a9000 : nt!PspExitThread+0x5f6
ffffc480`6268f7d0 fffff803`7e40ef67 : ffffe703`5935493a 00000000`2663fd30 00000000`00000000 ffffc480`6268fa00 : nt!KiSchedulerApcTerminate+0x38
ffffc480`6268f810 fffff803`7e5fb750 : 00000000`00000000 ffffc480`6268f8c0 fffff803`79ca3180 fffff803`00000000 : nt!KiDeliverApc+0x487
ffffc480`6268f8c0 fffff803`7e608c5f : 00000000`0308e58a 00000000`00000001 ffffffff`ff676980 ffffc480`6268fa80 : nt!KiInitiateUserApc+0x70
ffffc480`6268fa00 00000000`77891cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`2229f308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77891cfc


SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1288

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8022bfdade6, Address of the instruction which caused the BugCheck
Arg3: ffff860d04b664a0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 21562

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 65150

Key : Analysis.Init.CPU.mSec
Value: 765

Key : Analysis.Init.Elapsed.mSec
Value: 5670

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8022bfdade6

BUGCHECK_P3: ffff860d04b664a0

BUGCHECK_P4: 0

CONTEXT: ffff860d04b664a0 -- (.cxr 0xffff860d04b664a0)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffca86fb643e40
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffca870e8faa80
rip=fffff8022bfdade6 rsp=ffff860d04b66ea0 rbp=0000000000000000
r8=ffffca870e8faa80 r9=00000000000000c8 r10=0000000000000001
r11=fffff8022ba0a368 r12=ffffca86fb641b70 r13=ffff860d04b67210
r14=0000000000000003 r15=ffffca86fb641b70
iopl=0 nv up ei pl zr ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050256
nt!PiDmCacheDataDecode+0x6a:
fffff802`2bfdade6 66391c42 cmp word ptr [rdx+rax*2],bx ds:002b:00000000`00000000=????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: SettingSyncHost.exe

LOCK_ADDRESS: fffff8022c644ba0 -- (!locks fffff8022c644ba0)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff8022c644ba0) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff8022c644ba0
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

STACK_TEXT:
ffff860d`04b66ea0 fffff802`2bfda8a0 : 00000000`c0000016 ffffca86`00000001 00000000`00000000 00000000`00000200 : nt!PiDmCacheDataDecode+0x6a
ffff860d`04b66ee0 fffff802`2bfda2e7 : fffff802`2ba0a368 ffffca87`0e8faa80 ffffca86`fb643dd0 00000000`00000003 : nt!PiDmObjectGetCachedObjectPropertyData+0xcc
ffff860d`04b66f40 fffff802`2bfd9e47 : ffff860d`04b670b0 ffffca86`fb641b70 00000000`00000000 00000000`00000003 : nt!PiDmObjectGetCachedObjectProperty+0xb7
ffff860d`04b66fb0 fffff802`2bfdb569 : ffff860d`04b67218 ffff860d`04b670f1 ffffca86`fb34f010 ffffca87`0c399d00 : nt!PiPnpRtlObjectActionCallback+0xe7
ffff860d`04b67050 fffff802`2bfdb45d : ffff860d`04b67218 00000000`47706e50 ffff928f`3a9c3430 fffff802`00000000 : nt!_PnpGetObjectProperty+0x9d
ffff860d`04b67120 fffff802`2bfd7acd : 00000000`00000000 fffff802`00000000 ffffca86`fb34f010 ffff928f`3a9c3430 : nt!PnpGetObjectProperty+0xd1
ffff860d`04b671b0 fffff802`2bfd7d12 : ffffca86`fb34f010 ffffca86`fb641b70 ffffca86`fb34f010 00000000`00000001 : nt!PiPnpRtlApplyMandatoryDeviceInterfaceFilters+0x69
ffff860d`04b67230 fffff802`2bfd7450 : 00000000`00000000 ffff860d`04b673b9 ffffca86`fb643dd0 ffffca86`fb643dd0 : nt!PiPnpRtlApplyMandatoryFilters+0x8e
ffff860d`04b67290 fffff802`2bfd73e6 : fffff802`2c643d01 ffffca86`fb643dd0 00000000`00000000 fffff802`2c643d60 : nt!PiDqQueryEnumObject+0x5c
ffff860d`04b672d0 fffff802`2bfd8b45 : ffffca86`fb643dd0 00000000`00000000 ffffca86`fb643dd0 fffff802`2c643d60 : nt!PiDqEnumQueryObjectsCallback+0x16
ffff860d`04b67300 fffff802`2bfd1f90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`c0000001 : nt!PiDmEnumObjectsWithCallback+0x10d
ffff860d`04b67420 fffff802`2bfd2d4e : 00000000`00000000 fffff802`00000000 00000000`00000016 00000000`00000000 : nt!PiDqObjectManagerEnumerateAndRegisterQuery+0x314
ffff860d`04b67560 fffff802`2bfd1548 : ffff928f`3a9c3410 00000000`00000000 00000000`00000000 ffff860d`04b676a0 : nt!PiDqQuerySerializeActionQueue+0x9e
ffff860d`04b675f0 fffff802`2bfd2297 : ffff928f`36370190 ffff860d`04b67801 ffff928f`00000000 00000000`00000000 : nt!PiDqIrpQueryGetResult+0x154
ffff860d`04b67690 fffff802`2c0ee61d : ffff928f`36370190 ffff928f`2fb06d80 fffff802`2ba06590 00000000`00000000 : nt!PiDqDispatch+0x1c7
ffff860d`04b676d0 fffff802`2bc8f6f5 : ffff928f`36370190 00000000`00000002 00000000`00000000 00000000`00000001 : nt!PiDaDispatch+0x4d
ffff860d`04b67700 fffff802`2c0758f8 : ffff928f`36370190 00000000`00000000 ffff928f`36370190 00000000`00000000 : nt!IofCallDriver+0x55
ffff860d`04b67740 fffff802`2c0751c5 : 00000000`00000000 ffff860d`04b67a80 00000000`00000000 ffff860d`04b67a80 : nt!IopSynchronousServiceTail+0x1a8
ffff860d`04b677e0 fffff802`2c074bc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000189`f3060a08 : nt!IopXxxControlFile+0x5e5
ffff860d`04b67920 fffff802`2be08bb5 : ffff928f`00000000 ffff860d`04b67a80 0000004e`c2b7f638 ffff928f`3814c1c0 : nt!NtDeviceIoControlFile+0x56
ffff860d`04b67990 00007ff9`dd1ace54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004e`c2b7f618 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`dd1ace54


SYMBOL_NAME: nt!PiDmCacheDataDecode+6a

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1288

STACK_COMMAND: .cxr 0xffff860d04b664a0 ; kb

BUCKET_ID_FUNC_OFFSET: 6a

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!PiDmCacheDataDecode

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {66b0690e-8711-ad19-8b04-0e0cfbf4bb12}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe0007e60f500, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffe0007e60f458, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5561

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 17672

Key : Analysis.Init.CPU.mSec
Value: 827

Key : Analysis.Init.Elapsed.mSec
Value: 6032

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffe0007e60f500

BUGCHECK_P3: ffffe0007e60f458

BUGCHECK_P4: 0

TRAP_FRAME: ffffe0007e60f500 -- (.trap 0xffffe0007e60f500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8052a6e3a90 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffcf8ec5e8b158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8052de1a51f rsp=ffffe0007e60f690 rbp=0000000000000001
r8=0000000000000000 r9=000000000000000f r10=0000000000000003
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiSelectReadyThread+0x20cfef:
fffff805`2de1a51f cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffe0007e60f458 -- (.exr 0xffffe0007e60f458)
ExceptionAddress: fffff8052de1a51f (nt!KiSelectReadyThread+0x000000000020cfef)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: metin2client.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffe000`7e60f1d8 fffff805`2de09169 : 00000000`00000139 00000000`00000003 ffffe000`7e60f500 ffffe000`7e60f458 : nt!KeBugCheckEx
ffffe000`7e60f1e0 fffff805`2de09590 : ffffcf8e`bfa5b240 fffff805`2ddf9215 ffffe101`53be8180 fffff805`2a6df468 : nt!KiBugCheckDispatch+0x69
ffffe000`7e60f320 fffff805`2de07923 : ffffe101`539eb180 00000000`00000002 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffe000`7e60f500 fffff805`2de1a51f : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffe000`7e60f690 fffff805`2dc0c520 : ffffe101`00000008 00000000`ffffffff 00000000`00000000 ffffcf8e`c5e8b158 : nt!KiSelectReadyThread+0x20cfef
ffffe000`7e60f720 fffff805`2dc0bd2f : ffffcf8e`c4148080 00000000`00000000 ffffe000`7e60f8e0 00000000`00000000 : nt!KiSwapThread+0x220
ffffe000`7e60f7d0 fffff805`2dc0b5d3 : ffffe101`0000006a fffff805`00000000 000fa4ef`bd9bbf01 ffffcf8e`c41481c0 : nt!KiCommitThreadWait+0x14f
ffffe000`7e60f870 fffff805`2dff7b51 : ffffcf8e`c35c2260 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffffe000`7e60f960 fffff805`2dff7bfa : ffffcf8e`c4148080 00000000`00000000 00000000`00000000 00000000`00285000 : nt!ObWaitForSingleObject+0x91
ffffe000`7e60f9c0 fffff805`2de08bb5 : 00000000`00000000 00000000`00000001 ffffe000`7e60fa18 ffffffff`fffdb610 : nt!NtWaitForSingleObject+0x6a
ffffe000`7e60fa00 00000000`77b21cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0a24f308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b21cfc


SYMBOL_NAME: nt!KiSwapThread+220

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1288

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 220

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiSwapThread

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {364d2a10-fb5b-e8e9-9b5b-39c85a1b5a41}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000067, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8057064a7dc, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7686

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 23922

Key : Analysis.Init.CPU.mSec
Value: 1093

Key : Analysis.Init.Elapsed.mSec
Value: 6022

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: a

BUGCHECK_P1: 67

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8057064a7dc

WRITE_ADDRESS: fffff805710fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000067

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: metin2client.exe

TRAP_FRAME: ffffaa8ab06a9ef0 -- (.trap 0xffffaa8ab06a9ef0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc58c1d66f9c0 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057064a7dc rsp=ffffaa8ab06aa080 rbp=0000000000000000
r8=ffffea753a9d4000 r9=ffffc58c1ee6a700 r10=ffffea753a9d4fff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExAcquireSpinLockExclusiveAtDpcLevel+0x3c:
fffff805`7064a7dc f00fba2b1f lock bts dword ptr [rbx],1Fh ds:00000000`00000000=????????
Resetting default scope

STACK_TEXT:
ffffaa8a`b06a9da8 fffff805`70809169 : 00000000`0000000a 00000000`00000067 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffaa8a`b06a9db0 fffff805`70805469 : ffffaa8a`b06aa360 fffff805`7062039f ffffaa8a`b06aa460 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffaa8a`b06a9ef0 fffff805`7064a7dc : 00010000`00000000 00000000`00000002 ffffc58c`00000000 ffffaa8a`b06aa4c0 : nt!KiPageFault+0x469
ffffaa8a`b06aa080 fffff805`708446c7 : 00000000`00000000 00000000`00000000 ffffc58c`15202000 00000000`00000600 : nt!ExAcquireSpinLockExclusiveAtDpcLevel+0x3c
ffffaa8a`b06aa0b0 fffff805`7069e4e7 : 00000000`00000001 00000000`00000000 00000000`0000000e 00000000`00000fff : nt!MiLockPageTableInternal+0x1a3cd7
ffffaa8a`b06aa120 fffff805`70604f4b : 00000000`00000002 ffffc58c`1ee6a700 ffffaa8a`00000003 ffffaa8a`b06aa4e0 : nt!MiWalkPageTablesRecursively+0x847
ffffaa8a`b06aa1c0 fffff805`706049e1 : ffffaa8a`b06aa460 00000000`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffaa8a`b06aa2c0 fffff805`706040e9 : 00000000`00000000 00000000`00000000 ffff8200`2032b1c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffaa8a`b06aa7d0 fffff805`706038f7 : 00000000`00000000 ffffaa8a`b06aa980 ffffaa8a`b06aa940 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffaa8a`b06aa8c0 fffff805`706f3780 : fffff805`71050b00 ffffaa8a`b06aa980 00000000`000018ff ffff8200`00000200 : nt!MiProcessWorkingSets+0x227
ffffaa8a`b06aa960 fffff805`707b5c37 : 00000000`00000003 00000000`00000003 00000000`ffffffff ffff8200`1e1e8180 : nt!MiWorkingSetManager+0x110
ffffaa8a`b06aaa20 fffff805`70755855 : ffffc58c`158ab080 00000000`00000080 fffff805`707b5ae0 8b485024`448d4c00 : nt!KeBalanceSetManager+0x157
ffffaa8a`b06aab10 fffff805`707fe808 : ffff8200`1e1e8180 ffffc58c`158ab080 fffff805`70755800 cccccccc`cccccccc : nt!PspSystemThreadStartup+0x55
ffffaa8a`b06aab60 00000000`00000000 : ffffaa8a`b06ab000 ffffaa8a`b06a4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!ExAcquireSpinLockExclusiveAtDpcLevel+3c

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1288

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 3c

FAILURE_BUCKET_ID: AV_nt!ExAcquireSpinLockExclusiveAtDpcLevel

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2d838a6f-0e2e-fbf8-f6b6-d687446804d5}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000096, Exception code that caused the BugCheck
Arg2: fffff80084e0c869, Address of the instruction which caused the BugCheck
Arg3: ffffc600e7886920, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5467

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 11572

Key : Analysis.Init.CPU.mSec
Value: 906

Key : Analysis.Init.Elapsed.mSec
Value: 4200

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000096

BUGCHECK_P2: fffff80084e0c869

BUGCHECK_P3: ffffc600e7886920

BUGCHECK_P4: 0

CONTEXT: ffffc600e7886920 -- (.cxr 0xffffc600e7886920)
rax=0000000000000000 rbx=0000000000000102 rcx=ffffaa03fafd78e0
rdx=0000000000000001 rsi=0000000000000002 rdi=ffffe70b2fb08180
rip=fffff80084e0c869 rsp=ffffaa03fafd7720 rbp=0000000000100000
r8=ffffc600e71eb180 r9=0000000000000000 r10=0000000000000000
r11=fffff80084c00000 r12=0000000000000000 r13=0000000000000000
r14=ffffe70b2fb081c0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!KiSwapThread+0x569:
fffff800`84e0c869 440f22c5 mov tmm,rbp
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: metin2client.exe

STACK_TEXT:
ffffaa03`fafd7720 fffff800`84e0bd2f : ffffe70b`2fb08080 00000000`00000000 ffffaa03`fafd78e0 00000000`00000000 : nt!KiSwapThread+0x569
ffffaa03`fafd77d0 fffff800`84e0b5d3 : ffffe70b`00000071 fffff800`00000000 00000000`00000001 ffffe70b`2fb081c0 : nt!KiCommitThreadWait+0x14f
ffffaa03`fafd7870 fffff800`851f7b51 : ffffe70b`30a47160 fffff800`00000006 ffffc67a`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffffaa03`fafd7960 fffff800`851f7bfa : ffffe70b`2fb08080 00000000`00000000 00000000`00000000 00000000`0af4ff48 : nt!ObWaitForSingleObject+0x91
ffffaa03`fafd79c0 fffff800`85008bb5 : ffffe70b`2fb08080 00000000`00000000 ffffaa03`fafd7a18 ffffffff`ffff3cb0 : nt!NtWaitForSingleObject+0x6a
ffffaa03`fafd7a00 00000000`772f1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0a16f308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772f1cfc


SYMBOL_NAME: nt!KiSwapThread+569

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1288

STACK_COMMAND: .cxr 0xffffc600e7886920 ; kb

BUCKET_ID_FUNC_OFFSET: 569

FAILURE_BUCKET_ID: 0x3B_c0000096_nt!KiSwapThread

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {235bae93-d676-ec58-f7d8-6b4e6f3fed8e}

Followup: MachineOwner
---------[/CODE]
 
Bahsettiğiniz hileyi kapayıp dener misiniz mavi ekran verip vermediğini? Eğer öyleyse hile kullanmamanız gerekmekte ki hile zaten bildiğiniz üzere yasal bir şey değil. O oyunda yasak değil mi bilmiyorum fakat değilse farklı hile varsa onu kullanmayı deneyebilirsiniz.
 
Çözüm
Bildiğiniz gibi hile yazılımları oyunların normal çalışmasının dışında kendi özellikleriyle çalışmasını sağlar. Bu durumda hile yazılımı oyunun ilerleyişi dışında sistemsel etkiler de yapıyor olabilir. Kernel düzeyde çalışan bir hileyse -ki öyle olduğunu düşünüyorum- bu hataların olması çok olası. Ayrıca virüslü bir yazılımsa da aynı durum söz konusu olabilir, bilginize. Madem dediğiniz gibi hile programı kapalıyken sorun çözülüyor o halde sorunun tespitini yapmış bulunmaktayız ve sorunu da çözmüş bulunmaktayız, öyle değil mi? Bu durumda konunuzu çözüldü olarak işaretleyip bu konuyu da burada bitirmemiz gerekmekte. Dediğim gibi, hile kullanmamaya özen gösterin zira hoş bir davranış değil.
 

Geri
Yukarı