Arkadaşlar, birkaç kez mavi ekran hatası aldım ama hiç anlamıyorum bu işten. Aşağıdaki linkte minidump dosyaları var, YouTube videosundan geldim. Yardımcı olursanız sevinirim.
minidump.rar
drive.google.com
hocam yandex falan hiç kullanmadım da dosya erişimini nasıl açabilirim yardımcı olur musun
mediafireyi yapıyorum suanda google driveyi tekrar kontol eder misinAçıkçası ben de Google Drive'dan erişimin nasıl açılacağını tam olarak bilmiyorum. Siz en iyisi direkt olarak MediaFire'a yükleyin dosyayı.
Açıkçası ben de Google Drive'dan erişimin nasıl açılacağını tam olarak bilmiyorum. Siz en iyisi direkt olarak MediaFire'a yükleyin dosyayı.
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: fffffe86935b5a90, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffe86935b59e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5000
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10454
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1e
BUGCHECK_P2: fffffe86935b5a90
BUGCHECK_P3: fffffe86935b59e8
BUGCHECK_P4: 0
IMAGE_NAME: ntkrnlmp.exe
MODULE_NAME: ntkrnlmp
FAULTING_MODULE: fffff80559800000 nt
TRAP_FRAME: fffffe86935b5a90 -- (.trap 0xfffffe86935b5a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000b rbx=0000000000000000 rcx=000000000000001e
rdx=fffff8055a4fdc80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80559c6b58d rsp=fffffe86935b5c20 rbp=ffffe600201de180
r8=0000000000000000 r9=fffffe86935b5fb0 r10=0000000000000000
r11=0000000000000029 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeQueryValuesThread+0x1957dd:
fffff805`59c6b58d cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffe86935b59e8 -- (.exr 0xfffffe86935b59e8)
ExceptionAddress: fffff80559c6b58d (nt!KeQueryValuesThread+0x00000000001957dd)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001e
Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001e
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffe86`935b5768 fffff805`59c06569 : 00000000`00000139 00000000`0000001e fffffe86`935b5a90 fffffe86`935b59e8 : nt!KeBugCheckEx
fffffe86`935b5770 fffff805`59c06990 : ffffe600`207d5180 fffff805`59bfb7b2 000f8067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffe86`935b58b0 fffff805`59c04d23 : 00000000`00000000 00000000`000000ff 00000000`00000001 00000000`000001f0 : nt!KiFastFailDispatch+0xd0
fffffe86`935b5a90 fffff805`59c6b58d : ffff8b81`100125c0 01f000d0`000000d0 00740073`00000000 00320033`006d0065 : nt!KiRaiseSecurityCheckFailure+0x323
fffffe86`935b5c20 fffff805`59edb3e1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x1957dd
fffffe86`935b5ca0 fffff805`59edb072 : ffff8b81`1e31e660 ffff8b81`1e31e8e0 ffff8b81`1ca21080 00000000`00000002 : nt!PsQueryStatisticsProcess+0x111
fffffe86`935b5d20 fffff805`59eeeca1 : 00000000`00000002 ffff8b81`1e31e080 00000000`ffffffff 00000000`00000000 : nt!ExpCopyProcessInfo+0x42
fffffe86`935b5da0 fffff805`59ef21e3 : ffffe0f0`783c1e08 00000000`00047328 00000000`01440000 00000000`00000000 : nt!ExpGetProcessInformation+0x9f1
fffffe86`935b6400 fffff805`59ef18c7 : ffff8b81`1ca21080 00000000`00000000 00000000`00000000 00000000`09aef820 : nt!ExpQuerySystemInformation+0x7d3
fffffe86`935b6ac0 fffff805`59c05fb8 : 00000000`03ea0000 00000000`00000000 fffffe86`935b6b18 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37
fffffe86`935b6b00 00007ffb`8ba4c454 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`099ee448 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8ba4c454
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {64929928-a824-2134-285e-71128496d311}
Followup: MachineOwner
---------
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 00000000000000f0, The system failed to complete(suspend) a power transition in a timely manner.
Arg2: 0000000000000005, The system power state in transition.
Arg3: 000000000000000d, The sleep checkpoint most recently reached.
Arg4: ffffac8ba5c96040, A pointer to the thread currently processing the request.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4343
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8720
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a0
BUGCHECK_P1: f0
BUGCHECK_P2: 5
BUGCHECK_P3: d
BUGCHECK_P4: ffffac8ba5c96040
FAULTING_THREAD: ffffac8ba5c96040
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff8188`f7b510d0 fffff802`100dffa0 : ffff9800`00000000 00000000`00000000 00000000`00000200 fffff802`00000000 : nt!KiSwapContext+0x76
ffff8188`f7b51210 fffff802`100df4cf : ffffac8b`00000004 00000000`00000008 ffff8188`f7b513d0 ffff8188`00000000 : nt!KiSwapThread+0x500
ffff8188`f7b512c0 fffff802`100ded73 : 00000000`00000000 00000000`00000000 ffffac8b`a57f4000 ffffac8b`a5c96180 : nt!KiCommitThreadWait+0x14f
ffff8188`f7b51360 fffff802`10099f96 : ffff8188`f7b51480 fffff802`00000005 ffff8188`f7b51500 ffffac8b`a57f4000 : nt!KeWaitForSingleObject+0x233
ffff8188`f7b51450 fffff802`14a0329a : ffff8188`f7b51830 00000000`00000000 00000000`00000200 00000000`00000000 : nt!IoSynchronousCallDriver+0x76
ffff8188`f7b514b0 fffff802`149e9cae : ffff8188`f7b515f0 00000000`00000000 ffff8188`00000000 fffff802`149e9d06 : partmgr!PM_DISK::Read+0x6a
ffff8188`f7b514f0 fffff802`149e9bf8 : ffff8188`f7b515f0 00000000`00000001 ffff8188`f7b51701 ffff8188`00000000 : partmgr!SC_DISK::ReadSectors+0x36
ffff8188`f7b51530 fffff802`149e9bc6 : ffff8188`f7b515f0 ffff8188`00000018 00000000`00000000 ffffac8b`a6f97990 : partmgr!SC_DISK::ResetPartitionCache+0x1c
ffff8188`f7b51560 fffff802`14a02146 : ffffac8b`9cbe08d0 ffff8188`f7b51701 00000000`00000000 ffffac8b`a6f97901 : partmgr!SC_DISK::InitializePartitionCache+0x32
ffff8188`f7b51590 fffff802`14a017ae : ffffac8b`9c1b31b0 ffff8188`f7b517e8 ffffac8b`a6f977a0 fffff802`100ceb87 : partmgr!PM_DISK::Initialize+0x4e
ffff8188`f7b515c0 fffff802`149e1581 : ffffac8b`a06981b8 ffffac8b`9c1b31b0 ffffac8b`9c1b31b0 ffffac8b`a06981b8 : partmgr!PmReadPartitionTable+0x4e
ffff8188`f7b51780 fffff802`14a05554 : ffffac8b`9cbe0a00 00000000`00000000 ffffac8b`9cbe0a58 fffff802`100c2f00 : partmgr!PmGetDriveLayoutEx+0x195
ffff8188`f7b517e0 fffff802`149ec9f9 : 00000000`00000000 ffffac8b`a0698010 ffffac8b`9cbe08d0 ffffac8b`a804a740 : partmgr!PmIoctlGetDriveLayout+0x64
ffff8188`f7b51830 fffff802`149e3cff : 00000000`00000000 ffffac8b`a0698010 ffffac8b`a0698200 ffff8188`f7b519a0 : partmgr!PmFilterDeviceControl+0xa8b9
ffff8188`f7b51880 fffff802`100cd805 : 00000000`00000880 fffff802`10002223 00000000`00000000 fffff802`100cb06f : partmgr!PmGlobalDispatch+0x1f
ffff8188`f7b518b0 fffff802`103cfee8 : ffff8188`f7b519a0 ffff8188`f7b51934 00000000`00000000 ffffac8b`a5e14000 : nt!IofCallDriver+0x55
ffff8188`f7b518f0 fffff802`103cfcb8 : ffffac8b`a0698010 00000000`00000002 ffffac8b`a575ce10 fffff802`10ae0340 : nt!RawReadWriteDeviceControl+0xa0
ffff8188`f7b51920 fffff802`100cd805 : ffffac8b`a608fda0 00000000`00000001 ffffac8b`a0698010 ffffac8b`a0698010 : nt!RawDispatch+0x78
ffff8188`f7b51970 fffff802`0ecf4906 : 00000000`00000000 ffffac8b`a8545170 00000000`00000000 fffff802`104efe11 : nt!IofCallDriver+0x55
ffff8188`f7b519b0 fffff802`100cd805 : ffffac8b`a0698010 00000000`00000000 ffff8188`20206f49 00000000`00000000 : FLTMGR!FltpDispatch+0xd6
ffff8188`f7b51a10 fffff802`104c2528 : ffff8188`f7b51d90 ffffac8b`a0698010 00000000`00000001 ffffac8b`99aa0040 : nt!IofCallDriver+0x55
ffff8188`f7b51a50 fffff802`104c1df5 : 00000000`0007400c ffff8188`f7b51d90 00000000`00000000 ffff8188`f7b51d90 : nt!IopSynchronousServiceTail+0x1a8
ffff8188`f7b51af0 fffff802`104c17f6 : 00000004`0000000f 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff8188`f7b51c30 fffff802`10205fb8 : ffff8188`f7b51d84 ffffdd83`895ec748 00000000`00000000 fffff802`10070ffa : nt!NtDeviceIoControlFile+0x56
ffff8188`f7b51ca0 fffff802`101f8400 : fffff802`10645474 00000000`c0000185 00000000`00000808 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffff8188`f7b51ea8 fffff802`10645474 : 00000000`c0000185 00000000`00000808 00000000`00000000 ffff8188`00000000 : nt!KiServiceLinkage
ffff8188`f7b51eb0 fffff802`10569023 : 00000000`00000000 ffff8188`f7b51fb0 ffff8188`f7b52068 ffff8188`f7b52068 : nt!BiIssueGetDriveLayoutIoctl+0xdc420
ffff8188`f7b51f30 fffff802`105666f5 : ffffdd83`8a777908 ffff8188`f7b52130 ffffffff`80004d10 ffffdd83`8afe4000 : nt!BiGetDriveLayoutInformation+0x97
ffff8188`f7b51fc0 fffff802`1056630b : ffffdd83`8a777908 00000000`00000000 ffff8188`f7b520f0 00000000`00000000 : nt!BiGetDriveLayoutBlock+0x3d
ffff8188`f7b51ff0 fffff802`10565fff : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!BiGetNtPartitionPath+0x243
ffff8188`f7b521a0 fffff802`10568812 : ffff8188`00000000 ffff8188`11000001 00000000`00000000 ffff8188`f7b52270 : nt!BiConvertBootEnvironmentDeviceToNt+0xab
ffff8188`f7b52240 fffff802`10567cd1 : 00000000`00000000 ffffffff`800018d0 ffffdd83`8888bf30 ffff8188`00000000 : nt!BiConvertRegistryDataToElement+0xe2
ffff8188`f7b522c0 fffff802`10566e25 : ffff8188`c0000034 ffff8188`f7b52508 ffff8188`f7b527a8 00000000`00000000 : nt!BcdGetElementDataWithFlags+0x191
ffff8188`f7b523d0 fffff802`105668dd : ffffffff`80001990 ffff8188`f7b52490 00000000`00000000 ffffffff`80001990 : nt!PopBcdReadElement+0x39
ffff8188`f7b52420 fffff802`10565d31 : ffffffff`80001990 ffffffff`800019a0 00000000`00000000 00000000`00000000 : nt!PopBcdSetDefaultResumeObjectElements+0x69
ffff8188`f7b524c0 fffff802`1055b5df : ffffac8b`9ccf4230 fffff802`0000352c ffffac8b`9ccf4230 ffffd8ee`c1c10150 : nt!PopBcdEstablishResumeObject+0x131
ffff8188`f7b52560 fffff802`1078df89 : ffff8188`f7b50000 00000000`00000000 ffffffff`800019a0 00000000`00000000 : nt!PopAllocateHiberContext+0x20b
ffff8188`f7b525e0 fffff802`107947dc : ffffac8b`a4b5d000 ffffac8b`00000006 00000000`00000002 00000000`00000070 : nt!PopTransitionSystemPowerStateEx+0x4b5
ffff8188`f7b526a0 fffff802`10205fb8 : 7ffff802`10a24fd0 00000000`ffffffff 00000000`00000000 ffffac8b`a5c966e0 : nt!NtSetSystemPowerState+0x4c
ffff8188`f7b52880 fffff802`101f8400 : fffff802`10559f0e 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffff8188`f7b52a18 fffff802`10559f0e : 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
ffff8188`f7b52a20 fffff802`10559bd9 : 00000000`00000000 ffffac8b`99a6aac0 00000000`00000000 00000000`00000000 : nt!PopIssueActionRequest+0x216
ffff8188`f7b52ac0 fffff802`100a0e74 : 00000000`00000001 00000000`00000000 ffffffff`ffffffff fffff802`10a23b00 : nt!PopPolicyWorkerAction+0x79
ffff8188`f7b52b30 fffff802`101035f5 : ffffac8b`00000001 ffffac8b`a5c96040 fffff802`100a0de0 ffffac8b`00000000 : nt!PopPolicyWorkerThread+0x94
ffff8188`f7b52b70 fffff802`100a2ae5 : ffffac8b`a5c96040 00000000`00000080 ffffac8b`99aa0040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8188`f7b52c10 fffff802`101fbbf8 : ffff9800`4f4cf180 ffffac8b`a5c96040 fffff802`100a2a90 80002400`b7a89faf : nt!PspSystemThreadStartup+0x55
ffff8188`f7b52c60 00000000`00000000 : ffff8188`f7b53000 ffff8188`f7b4d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
STACK_COMMAND: .thread 0xffffac8ba5c96040 ; kb
SYMBOL_NAME: partmgr!PM_DISK::Read+6a
MODULE_NAME: partmgr
IMAGE_NAME: partmgr.sys
IMAGE_VERSION: 10.0.19041.1030
BUCKET_ID_FUNC_OFFSET: 6a
FAILURE_BUCKET_ID: 0xa0_f0_partmgr!PM_DISK::Read
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fe745222-5d88-a69e-f077-955bb15cd442}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8028161a876, Address of the instruction which caused the bugcheck
Arg3: ffffca0062ff5920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4515
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10722
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8028161a876
BUGCHECK_P3: ffffca0062ff5920
BUGCHECK_P4: 0
CONTEXT: ffffca0062ff5920 -- (.cxr 0xffffca0062ff5920)
rax=ffff9a05545d9ee8 rbx=ffff9a05513e3080 rcx=9a05545d9eb03a5d
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff9a05545d9ee0
rip=fffff8028161a876 rsp=ffffda03be5b8940 rbp=ffffda03be5b8a01
r8=0000000000000000 r9=000001152a550b14 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=9a05545d9eb03a5d
r14=0000000000000000 r15=ffff9a05513e31c0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!KeAbPreWait+0x6:
fffff802`8161a876 0fb64120 movzx eax,byte ptr [rcx+20h] ds:002b:9a05545d`9eb03a7d=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
BAD_STACK_POINTER: ffffca0062ff5018
STACK_TEXT:
ffffda03`be5b8940 fffff802`8186e51b : ffffca00`000000c4 fffff802`81aefe11 000f8067`b4bbbd01 ffff9a05`513e31c0 : nt!KeAbPreWait+0x6
ffffda03`be5b8970 fffff802`81af1531 : ffff9a05`545d9ee0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18f9db
ffffda03`be5b8a60 fffff802`81af15da : ffff9a05`513e3080 00000082`bb16fca8 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffffda03`be5b8ac0 fffff802`81805fb8 : 00000000`00000000 00000000`00000000 ffffda03`be5b8b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffda03`be5b8b00 00007ffd`10febe14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000082`bb16fc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`10febe14
SYMBOL_NAME: nt!KeAbPreWait+6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffca0062ff5920 ; kb
BUCKET_ID_FUNC_OFFSET: 6
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KeAbPreWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ddcb9656-083d-2ea8-831a-b13145df4ef7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffa4cb2be14
Arg3: 000000000000001d
Arg4: fffff10fb1dfeb00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3671
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3705
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: 7ffa4cb2be14
BUGCHECK_P3: 1d
BUGCHECK_P4: fffff10fb1dfeb00
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
STACK_TEXT:
fffff10f`b1dfe958 fffff801`83473a20 : 00000000`0000001a 00000000`00061941 00007ffa`4cb2be14 00000000`0000001d : nt!KeBugCheckEx
fffff10f`b1dfe960 fffff801`8340275e : 000001f0`982f8a40 00000000`00000000 fffff10f`b1dfeb18 ffffffff`fffe7960 : nt!MmAccessFault+0x189840
fffff10f`b1dfeb00 00007ffa`4cb2be14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000a3`9176f648 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4cb2be14
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: fffff80352e6b8f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80352e6b848, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4108
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12014
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1e
BUGCHECK_P2: fffff80352e6b8f0
BUGCHECK_P3: fffff80352e6b848
BUGCHECK_P4: 0
IMAGE_NAME: ntkrnlmp.exe
MODULE_NAME: ntkrnlmp
FAULTING_MODULE: fffff8034c800000 nt
TRAP_FRAME: fffff80352e6b8f0 -- (.trap 0xfffff80352e6b8f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001e
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034ca5719a rsp=fffff80352e6ba80 rbp=0000000000000000
r8=00000000ffffffff r9=0000000000000fff r10=00000000fffffffe
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiGroupSchedulingGenerationEnd+0xfa:
fffff803`4ca5719a cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff80352e6b848 -- (.exr 0xfffff80352e6b848)
ExceptionAddress: fffff8034ca5719a (nt!KiGroupSchedulingGenerationEnd+0x00000000000000fa)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001e
Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001e
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff803`52e6b5c8 fffff803`4cc06569 : 00000000`00000139 00000000`0000001e fffff803`52e6b8f0 fffff803`52e6b848 : nt!KeBugCheckEx
fffff803`52e6b5d0 fffff803`4cc06990 : 00000000`00000000 00000000`00000fff 00000000`00000000 00000fd5`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`52e6b710 fffff803`4cc04d23 : ffffac87`c51b71f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff803`52e6b8f0 fffff803`4ca5719a : fffff803`fffffffe fffff803`ffffffff 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff803`52e6ba80 fffff803`4ca58c3e : fffff803`4af54180 00000000`00000000 00000000`0008095a 00000000`00000000 : nt!KiGroupSchedulingGenerationEnd+0xfa
fffff803`52e6bad0 fffff803`4ca581c8 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`52e6bb80 : nt!KiGroupSchedulingQuantumEnd+0xce
fffff803`52e6bb60 fffff803`4cbf8124 : 00000000`00000000 fffff803`4af54180 fffff803`4d527600 ffffac87`c94c5080 : nt!KiQuantumEnd+0x148
fffff803`52e6bc60 00000000`00000000 : fffff803`52e6c000 fffff803`52e66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0xb4
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {64929928-a824-2134-285e-71128496d311}
Followup: MachineOwner
---------
Kral bilgisayarı kuralı 1 hafta olmadı memtesti geçen cuma yaptım hata çıkmadı rampage drop plus kulaklık kullanıyorum 2 gün önce aldım usb ils kullanıyorum bunun dışında hdd almıştım onu d diski olarak tanımlamaya çalıştım ama yapamadım biçimlendirme sırasında hata oluştu bunlardan kaynaklı olabilir mi
- MemTest86 ile belleklerde tarama yapın. Sorununuz bellek kaynaklı gibi duruyor.
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net- Sesi USB'den alıyorsanız bir süre ilgili cihazı kullanmayınız.
- Çipset sürücülerinizi güncelleyin.
B450 Drivers & Support | AMD
www.amd.com- HD Tune ile disklerinizde "Error Scan" yaparsanız iyi olur, ayrıca HDD Sentinel yazılımından tüm disklerinizin ekran görüntüsünü paylaşın.
Kod:KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 000000000000001e, Type of memory safety violation Arg2: fffffe86935b5a90, Address of the trap frame for the exception that caused the bugcheck Arg3: fffffe86935b59e8, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5000 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 10454 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 139 BUGCHECK_P1: 1e BUGCHECK_P2: fffffe86935b5a90 BUGCHECK_P3: fffffe86935b59e8 BUGCHECK_P4: 0 IMAGE_NAME: ntkrnlmp.exe MODULE_NAME: ntkrnlmp FAULTING_MODULE: fffff80559800000 nt TRAP_FRAME: fffffe86935b5a90 -- (.trap 0xfffffe86935b5a90) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000000000000000b rbx=0000000000000000 rcx=000000000000001e rdx=fffff8055a4fdc80 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80559c6b58d rsp=fffffe86935b5c20 rbp=ffffe600201de180 r8=0000000000000000 r9=fffffe86935b5fb0 r10=0000000000000000 r11=0000000000000029 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!KeQueryValuesThread+0x1957dd: fffff805`59c6b58d cd29 int 29h Resetting default scope EXCEPTION_RECORD: fffffe86935b59e8 -- (.exr 0xfffffe86935b59e8) ExceptionAddress: fffff80559c6b58d (nt!KeQueryValuesThread+0x00000000001957dd) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 000000000000001e Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: steam.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 000000000000001e EXCEPTION_STR: 0xc0000409 STACK_TEXT: fffffe86`935b5768 fffff805`59c06569 : 00000000`00000139 00000000`0000001e fffffe86`935b5a90 fffffe86`935b59e8 : nt!KeBugCheckEx fffffe86`935b5770 fffff805`59c06990 : ffffe600`207d5180 fffff805`59bfb7b2 000f8067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69 fffffe86`935b58b0 fffff805`59c04d23 : 00000000`00000000 00000000`000000ff 00000000`00000001 00000000`000001f0 : nt!KiFastFailDispatch+0xd0 fffffe86`935b5a90 fffff805`59c6b58d : ffff8b81`100125c0 01f000d0`000000d0 00740073`00000000 00320033`006d0065 : nt!KiRaiseSecurityCheckFailure+0x323 fffffe86`935b5c20 fffff805`59edb3e1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x1957dd fffffe86`935b5ca0 fffff805`59edb072 : ffff8b81`1e31e660 ffff8b81`1e31e8e0 ffff8b81`1ca21080 00000000`00000002 : nt!PsQueryStatisticsProcess+0x111 fffffe86`935b5d20 fffff805`59eeeca1 : 00000000`00000002 ffff8b81`1e31e080 00000000`ffffffff 00000000`00000000 : nt!ExpCopyProcessInfo+0x42 fffffe86`935b5da0 fffff805`59ef21e3 : ffffe0f0`783c1e08 00000000`00047328 00000000`01440000 00000000`00000000 : nt!ExpGetProcessInformation+0x9f1 fffffe86`935b6400 fffff805`59ef18c7 : ffff8b81`1ca21080 00000000`00000000 00000000`00000000 00000000`09aef820 : nt!ExpQuerySystemInformation+0x7d3 fffffe86`935b6ac0 fffff805`59c05fb8 : 00000000`03ea0000 00000000`00000000 fffffe86`935b6b18 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37 fffffe86`935b6b00 00007ffb`8ba4c454 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`099ee448 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8ba4c454 IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {64929928-a824-2134-285e-71128496d311} Followup: MachineOwner --------- INTERNAL_POWER_ERROR (a0) The power policy manager experienced a fatal error. Arguments: Arg1: 00000000000000f0, The system failed to complete(suspend) a power transition in a timely manner. Arg2: 0000000000000005, The system power state in transition. Arg3: 000000000000000d, The sleep checkpoint most recently reached. Arg4: ffffac8ba5c96040, A pointer to the thread currently processing the request. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4343 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 8720 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: a0 BUGCHECK_P1: f0 BUGCHECK_P2: 5 BUGCHECK_P3: d BUGCHECK_P4: ffffac8ba5c96040 FAULTING_THREAD: ffffac8ba5c96040 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: ffff8188`f7b510d0 fffff802`100dffa0 : ffff9800`00000000 00000000`00000000 00000000`00000200 fffff802`00000000 : nt!KiSwapContext+0x76 ffff8188`f7b51210 fffff802`100df4cf : ffffac8b`00000004 00000000`00000008 ffff8188`f7b513d0 ffff8188`00000000 : nt!KiSwapThread+0x500 ffff8188`f7b512c0 fffff802`100ded73 : 00000000`00000000 00000000`00000000 ffffac8b`a57f4000 ffffac8b`a5c96180 : nt!KiCommitThreadWait+0x14f ffff8188`f7b51360 fffff802`10099f96 : ffff8188`f7b51480 fffff802`00000005 ffff8188`f7b51500 ffffac8b`a57f4000 : nt!KeWaitForSingleObject+0x233 ffff8188`f7b51450 fffff802`14a0329a : ffff8188`f7b51830 00000000`00000000 00000000`00000200 00000000`00000000 : nt!IoSynchronousCallDriver+0x76 ffff8188`f7b514b0 fffff802`149e9cae : ffff8188`f7b515f0 00000000`00000000 ffff8188`00000000 fffff802`149e9d06 : partmgr!PM_DISK::Read+0x6a ffff8188`f7b514f0 fffff802`149e9bf8 : ffff8188`f7b515f0 00000000`00000001 ffff8188`f7b51701 ffff8188`00000000 : partmgr!SC_DISK::ReadSectors+0x36 ffff8188`f7b51530 fffff802`149e9bc6 : ffff8188`f7b515f0 ffff8188`00000018 00000000`00000000 ffffac8b`a6f97990 : partmgr!SC_DISK::ResetPartitionCache+0x1c ffff8188`f7b51560 fffff802`14a02146 : ffffac8b`9cbe08d0 ffff8188`f7b51701 00000000`00000000 ffffac8b`a6f97901 : partmgr!SC_DISK::InitializePartitionCache+0x32 ffff8188`f7b51590 fffff802`14a017ae : ffffac8b`9c1b31b0 ffff8188`f7b517e8 ffffac8b`a6f977a0 fffff802`100ceb87 : partmgr!PM_DISK::Initialize+0x4e ffff8188`f7b515c0 fffff802`149e1581 : ffffac8b`a06981b8 ffffac8b`9c1b31b0 ffffac8b`9c1b31b0 ffffac8b`a06981b8 : partmgr!PmReadPartitionTable+0x4e ffff8188`f7b51780 fffff802`14a05554 : ffffac8b`9cbe0a00 00000000`00000000 ffffac8b`9cbe0a58 fffff802`100c2f00 : partmgr!PmGetDriveLayoutEx+0x195 ffff8188`f7b517e0 fffff802`149ec9f9 : 00000000`00000000 ffffac8b`a0698010 ffffac8b`9cbe08d0 ffffac8b`a804a740 : partmgr!PmIoctlGetDriveLayout+0x64 ffff8188`f7b51830 fffff802`149e3cff : 00000000`00000000 ffffac8b`a0698010 ffffac8b`a0698200 ffff8188`f7b519a0 : partmgr!PmFilterDeviceControl+0xa8b9 ffff8188`f7b51880 fffff802`100cd805 : 00000000`00000880 fffff802`10002223 00000000`00000000 fffff802`100cb06f : partmgr!PmGlobalDispatch+0x1f ffff8188`f7b518b0 fffff802`103cfee8 : ffff8188`f7b519a0 ffff8188`f7b51934 00000000`00000000 ffffac8b`a5e14000 : nt!IofCallDriver+0x55 ffff8188`f7b518f0 fffff802`103cfcb8 : ffffac8b`a0698010 00000000`00000002 ffffac8b`a575ce10 fffff802`10ae0340 : nt!RawReadWriteDeviceControl+0xa0 ffff8188`f7b51920 fffff802`100cd805 : ffffac8b`a608fda0 00000000`00000001 ffffac8b`a0698010 ffffac8b`a0698010 : nt!RawDispatch+0x78 ffff8188`f7b51970 fffff802`0ecf4906 : 00000000`00000000 ffffac8b`a8545170 00000000`00000000 fffff802`104efe11 : nt!IofCallDriver+0x55 ffff8188`f7b519b0 fffff802`100cd805 : ffffac8b`a0698010 00000000`00000000 ffff8188`20206f49 00000000`00000000 : FLTMGR!FltpDispatch+0xd6 ffff8188`f7b51a10 fffff802`104c2528 : ffff8188`f7b51d90 ffffac8b`a0698010 00000000`00000001 ffffac8b`99aa0040 : nt!IofCallDriver+0x55 ffff8188`f7b51a50 fffff802`104c1df5 : 00000000`0007400c ffff8188`f7b51d90 00000000`00000000 ffff8188`f7b51d90 : nt!IopSynchronousServiceTail+0x1a8 ffff8188`f7b51af0 fffff802`104c17f6 : 00000004`0000000f 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5 ffff8188`f7b51c30 fffff802`10205fb8 : ffff8188`f7b51d84 ffffdd83`895ec748 00000000`00000000 fffff802`10070ffa : nt!NtDeviceIoControlFile+0x56 ffff8188`f7b51ca0 fffff802`101f8400 : fffff802`10645474 00000000`c0000185 00000000`00000808 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 ffff8188`f7b51ea8 fffff802`10645474 : 00000000`c0000185 00000000`00000808 00000000`00000000 ffff8188`00000000 : nt!KiServiceLinkage ffff8188`f7b51eb0 fffff802`10569023 : 00000000`00000000 ffff8188`f7b51fb0 ffff8188`f7b52068 ffff8188`f7b52068 : nt!BiIssueGetDriveLayoutIoctl+0xdc420 ffff8188`f7b51f30 fffff802`105666f5 : ffffdd83`8a777908 ffff8188`f7b52130 ffffffff`80004d10 ffffdd83`8afe4000 : nt!BiGetDriveLayoutInformation+0x97 ffff8188`f7b51fc0 fffff802`1056630b : ffffdd83`8a777908 00000000`00000000 ffff8188`f7b520f0 00000000`00000000 : nt!BiGetDriveLayoutBlock+0x3d ffff8188`f7b51ff0 fffff802`10565fff : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!BiGetNtPartitionPath+0x243 ffff8188`f7b521a0 fffff802`10568812 : ffff8188`00000000 ffff8188`11000001 00000000`00000000 ffff8188`f7b52270 : nt!BiConvertBootEnvironmentDeviceToNt+0xab ffff8188`f7b52240 fffff802`10567cd1 : 00000000`00000000 ffffffff`800018d0 ffffdd83`8888bf30 ffff8188`00000000 : nt!BiConvertRegistryDataToElement+0xe2 ffff8188`f7b522c0 fffff802`10566e25 : ffff8188`c0000034 ffff8188`f7b52508 ffff8188`f7b527a8 00000000`00000000 : nt!BcdGetElementDataWithFlags+0x191 ffff8188`f7b523d0 fffff802`105668dd : ffffffff`80001990 ffff8188`f7b52490 00000000`00000000 ffffffff`80001990 : nt!PopBcdReadElement+0x39 ffff8188`f7b52420 fffff802`10565d31 : ffffffff`80001990 ffffffff`800019a0 00000000`00000000 00000000`00000000 : nt!PopBcdSetDefaultResumeObjectElements+0x69 ffff8188`f7b524c0 fffff802`1055b5df : ffffac8b`9ccf4230 fffff802`0000352c ffffac8b`9ccf4230 ffffd8ee`c1c10150 : nt!PopBcdEstablishResumeObject+0x131 ffff8188`f7b52560 fffff802`1078df89 : ffff8188`f7b50000 00000000`00000000 ffffffff`800019a0 00000000`00000000 : nt!PopAllocateHiberContext+0x20b ffff8188`f7b525e0 fffff802`107947dc : ffffac8b`a4b5d000 ffffac8b`00000006 00000000`00000002 00000000`00000070 : nt!PopTransitionSystemPowerStateEx+0x4b5 ffff8188`f7b526a0 fffff802`10205fb8 : 7ffff802`10a24fd0 00000000`ffffffff 00000000`00000000 ffffac8b`a5c966e0 : nt!NtSetSystemPowerState+0x4c ffff8188`f7b52880 fffff802`101f8400 : fffff802`10559f0e 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 ffff8188`f7b52a18 fffff802`10559f0e : 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage ffff8188`f7b52a20 fffff802`10559bd9 : 00000000`00000000 ffffac8b`99a6aac0 00000000`00000000 00000000`00000000 : nt!PopIssueActionRequest+0x216 ffff8188`f7b52ac0 fffff802`100a0e74 : 00000000`00000001 00000000`00000000 ffffffff`ffffffff fffff802`10a23b00 : nt!PopPolicyWorkerAction+0x79 ffff8188`f7b52b30 fffff802`101035f5 : ffffac8b`00000001 ffffac8b`a5c96040 fffff802`100a0de0 ffffac8b`00000000 : nt!PopPolicyWorkerThread+0x94 ffff8188`f7b52b70 fffff802`100a2ae5 : ffffac8b`a5c96040 00000000`00000080 ffffac8b`99aa0040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105 ffff8188`f7b52c10 fffff802`101fbbf8 : ffff9800`4f4cf180 ffffac8b`a5c96040 fffff802`100a2a90 80002400`b7a89faf : nt!PspSystemThreadStartup+0x55 ffff8188`f7b52c60 00000000`00000000 : ffff8188`f7b53000 ffff8188`f7b4d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 STACK_COMMAND: .thread 0xffffac8ba5c96040 ; kb SYMBOL_NAME: partmgr!PM_DISK::Read+6a MODULE_NAME: partmgr IMAGE_NAME: partmgr.sys IMAGE_VERSION: 10.0.19041.1030 BUCKET_ID_FUNC_OFFSET: 6a FAILURE_BUCKET_ID: 0xa0_f0_partmgr!PM_DISK::Read OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {fe745222-5d88-a69e-f077-955bb15cd442} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8028161a876, Address of the instruction which caused the bugcheck Arg3: ffffca0062ff5920, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4515 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 10722 Key : Analysis.Memory.CommitPeak.Mb Value: 83 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8028161a876 BUGCHECK_P3: ffffca0062ff5920 BUGCHECK_P4: 0 CONTEXT: ffffca0062ff5920 -- (.cxr 0xffffca0062ff5920) rax=ffff9a05545d9ee8 rbx=ffff9a05513e3080 rcx=9a05545d9eb03a5d rdx=0000000000000000 rsi=0000000000000000 rdi=ffff9a05545d9ee0 rip=fffff8028161a876 rsp=ffffda03be5b8940 rbp=ffffda03be5b8a01 r8=0000000000000000 r9=000001152a550b14 r10=0000000000000002 r11=fffff780000003b0 r12=0000000000000000 r13=9a05545d9eb03a5d r14=0000000000000000 r15=ffff9a05513e31c0 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282 nt!KeAbPreWait+0x6: fffff802`8161a876 0fb64120 movzx eax,byte ptr [rcx+20h] ds:002b:9a05545d`9eb03a7d=?? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: EpicGamesLauncher.exe BAD_STACK_POINTER: ffffca0062ff5018 STACK_TEXT: ffffda03`be5b8940 fffff802`8186e51b : ffffca00`000000c4 fffff802`81aefe11 000f8067`b4bbbd01 ffff9a05`513e31c0 : nt!KeAbPreWait+0x6 ffffda03`be5b8970 fffff802`81af1531 : ffff9a05`545d9ee0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18f9db ffffda03`be5b8a60 fffff802`81af15da : ffff9a05`513e3080 00000082`bb16fca8 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91 ffffda03`be5b8ac0 fffff802`81805fb8 : 00000000`00000000 00000000`00000000 ffffda03`be5b8b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a ffffda03`be5b8b00 00007ffd`10febe14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000082`bb16fc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`10febe14 SYMBOL_NAME: nt!KeAbPreWait+6 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .cxr 0xffffca0062ff5920 ; kb BUCKET_ID_FUNC_OFFSET: 6 FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KeAbPreWait OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {ddcb9656-083d-2ea8-831a-b13145df4ef7} Followup: MachineOwner --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000061941, The subtype of the bugcheck. Arg2: 00007ffa4cb2be14 Arg3: 000000000000001d Arg4: fffff10fb1dfeb00 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3671 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 3705 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 61941 BUGCHECK_P2: 7ffa4cb2be14 BUGCHECK_P3: 1d BUGCHECK_P4: fffff10fb1dfeb00 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: EpicGamesLauncher.exe STACK_TEXT: fffff10f`b1dfe958 fffff801`83473a20 : 00000000`0000001a 00000000`00061941 00007ffa`4cb2be14 00000000`0000001d : nt!KeBugCheckEx fffff10f`b1dfe960 fffff801`8340275e : 000001f0`982f8a40 00000000`00000000 fffff10f`b1dfeb18 ffffffff`fffe7960 : nt!MmAccessFault+0x189840 fffff10f`b1dfeb00 00007ffa`4cb2be14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e 000000a3`9176f648 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4cb2be14 MODULE_NAME: hardware IMAGE_NAME: hardware_ram STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0} Followup: MachineOwner --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 000000000000001e, Type of memory safety violation Arg2: fffff80352e6b8f0, Address of the trap frame for the exception that caused the bugcheck Arg3: fffff80352e6b848, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4108 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 12014 Key : Analysis.Memory.CommitPeak.Mb Value: 82 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 139 BUGCHECK_P1: 1e BUGCHECK_P2: fffff80352e6b8f0 BUGCHECK_P3: fffff80352e6b848 BUGCHECK_P4: 0 IMAGE_NAME: ntkrnlmp.exe MODULE_NAME: ntkrnlmp FAULTING_MODULE: fffff8034c800000 nt TRAP_FRAME: fffff80352e6b8f0 -- (.trap 0xfffff80352e6b8f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001e rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8034ca5719a rsp=fffff80352e6ba80 rbp=0000000000000000 r8=00000000ffffffff r9=0000000000000fff r10=00000000fffffffe r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!KiGroupSchedulingGenerationEnd+0xfa: fffff803`4ca5719a cd29 int 29h Resetting default scope EXCEPTION_RECORD: fffff80352e6b848 -- (.exr 0xfffff80352e6b848) ExceptionAddress: fffff8034ca5719a (nt!KiGroupSchedulingGenerationEnd+0x00000000000000fa) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 000000000000001e Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 000000000000001e EXCEPTION_STR: 0xc0000409 STACK_TEXT: fffff803`52e6b5c8 fffff803`4cc06569 : 00000000`00000139 00000000`0000001e fffff803`52e6b8f0 fffff803`52e6b848 : nt!KeBugCheckEx fffff803`52e6b5d0 fffff803`4cc06990 : 00000000`00000000 00000000`00000fff 00000000`00000000 00000fd5`00000000 : nt!KiBugCheckDispatch+0x69 fffff803`52e6b710 fffff803`4cc04d23 : ffffac87`c51b71f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0 fffff803`52e6b8f0 fffff803`4ca5719a : fffff803`fffffffe fffff803`ffffffff 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323 fffff803`52e6ba80 fffff803`4ca58c3e : fffff803`4af54180 00000000`00000000 00000000`0008095a 00000000`00000000 : nt!KiGroupSchedulingGenerationEnd+0xfa fffff803`52e6bad0 fffff803`4ca581c8 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`52e6bb80 : nt!KiGroupSchedulingQuantumEnd+0xce fffff803`52e6bb60 fffff803`4cbf8124 : 00000000`00000000 fffff803`4af54180 fffff803`4d527600 ffffac87`c94c5080 : nt!KiQuantumEnd+0x148 fffff803`52e6bc60 00000000`00000000 : fffff803`52e6c000 fffff803`52e66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0xb4 IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {64929928-a824-2134-285e-71128496d311} Followup: MachineOwner ---------
Yeniden yapın.MemTest'i geçen cuma yaptım, hata çıkmadı.
Diskten kaynaklı olabilme ihtimali de var.Bunun dışında HDD, almıştım onu D diski olarak tanımlamaya çalıştım ama yapamadım. Biçimlendirme sırasında hata oluştu. Bunlardan kaynaklı olabilir mi?
Dediğim gibi bilgisayar yeni olduğu için güncel driverlerin hepsi şuan sadece m2 ssd mevcut dediğiniz gibi fotoğraflarını paylaşırım şuan internet bağlantısında sorun var bilgisayarda teşekkür ederim yardımınız için
- MemTest86 ile belleklerde tarama yapın. Sorununuz bellek kaynaklı gibi duruyor.
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net- Sesi USB'den alıyorsanız bir süre ilgili cihazı kullanmayınız.
- Çipset sürücülerinizi güncelleyin.
B450 Drivers & Support | AMD
www.amd.com- HD Tune ile disklerinizde "Error Scan" yaparsanız iyi olur, ayrıca HDD Sentinel yazılımından tüm disklerinizin ekran görüntüsünü paylaşın.
Kod:KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 000000000000001e, Type of memory safety violation Arg2: fffffe86935b5a90, Address of the trap frame for the exception that caused the bugcheck Arg3: fffffe86935b59e8, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5000 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 10454 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 139 BUGCHECK_P1: 1e BUGCHECK_P2: fffffe86935b5a90 BUGCHECK_P3: fffffe86935b59e8 BUGCHECK_P4: 0 IMAGE_NAME: ntkrnlmp.exe MODULE_NAME: ntkrnlmp FAULTING_MODULE: fffff80559800000 nt TRAP_FRAME: fffffe86935b5a90 -- (.trap 0xfffffe86935b5a90) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000000000000000b rbx=0000000000000000 rcx=000000000000001e rdx=fffff8055a4fdc80 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80559c6b58d rsp=fffffe86935b5c20 rbp=ffffe600201de180 r8=0000000000000000 r9=fffffe86935b5fb0 r10=0000000000000000 r11=0000000000000029 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!KeQueryValuesThread+0x1957dd: fffff805`59c6b58d cd29 int 29h Resetting default scope EXCEPTION_RECORD: fffffe86935b59e8 -- (.exr 0xfffffe86935b59e8) ExceptionAddress: fffff80559c6b58d (nt!KeQueryValuesThread+0x00000000001957dd) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 000000000000001e Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: steam.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 000000000000001e EXCEPTION_STR: 0xc0000409 STACK_TEXT: fffffe86`935b5768 fffff805`59c06569 : 00000000`00000139 00000000`0000001e fffffe86`935b5a90 fffffe86`935b59e8 : nt!KeBugCheckEx fffffe86`935b5770 fffff805`59c06990 : ffffe600`207d5180 fffff805`59bfb7b2 000f8067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69 fffffe86`935b58b0 fffff805`59c04d23 : 00000000`00000000 00000000`000000ff 00000000`00000001 00000000`000001f0 : nt!KiFastFailDispatch+0xd0 fffffe86`935b5a90 fffff805`59c6b58d : ffff8b81`100125c0 01f000d0`000000d0 00740073`00000000 00320033`006d0065 : nt!KiRaiseSecurityCheckFailure+0x323 fffffe86`935b5c20 fffff805`59edb3e1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x1957dd fffffe86`935b5ca0 fffff805`59edb072 : ffff8b81`1e31e660 ffff8b81`1e31e8e0 ffff8b81`1ca21080 00000000`00000002 : nt!PsQueryStatisticsProcess+0x111 fffffe86`935b5d20 fffff805`59eeeca1 : 00000000`00000002 ffff8b81`1e31e080 00000000`ffffffff 00000000`00000000 : nt!ExpCopyProcessInfo+0x42 fffffe86`935b5da0 fffff805`59ef21e3 : ffffe0f0`783c1e08 00000000`00047328 00000000`01440000 00000000`00000000 : nt!ExpGetProcessInformation+0x9f1 fffffe86`935b6400 fffff805`59ef18c7 : ffff8b81`1ca21080 00000000`00000000 00000000`00000000 00000000`09aef820 : nt!ExpQuerySystemInformation+0x7d3 fffffe86`935b6ac0 fffff805`59c05fb8 : 00000000`03ea0000 00000000`00000000 fffffe86`935b6b18 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37 fffffe86`935b6b00 00007ffb`8ba4c454 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`099ee448 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8ba4c454 IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {64929928-a824-2134-285e-71128496d311} Followup: MachineOwner --------- INTERNAL_POWER_ERROR (a0) The power policy manager experienced a fatal error. Arguments: Arg1: 00000000000000f0, The system failed to complete(suspend) a power transition in a timely manner. Arg2: 0000000000000005, The system power state in transition. Arg3: 000000000000000d, The sleep checkpoint most recently reached. Arg4: ffffac8ba5c96040, A pointer to the thread currently processing the request. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4343 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 8720 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: a0 BUGCHECK_P1: f0 BUGCHECK_P2: 5 BUGCHECK_P3: d BUGCHECK_P4: ffffac8ba5c96040 FAULTING_THREAD: ffffac8ba5c96040 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: ffff8188`f7b510d0 fffff802`100dffa0 : ffff9800`00000000 00000000`00000000 00000000`00000200 fffff802`00000000 : nt!KiSwapContext+0x76 ffff8188`f7b51210 fffff802`100df4cf : ffffac8b`00000004 00000000`00000008 ffff8188`f7b513d0 ffff8188`00000000 : nt!KiSwapThread+0x500 ffff8188`f7b512c0 fffff802`100ded73 : 00000000`00000000 00000000`00000000 ffffac8b`a57f4000 ffffac8b`a5c96180 : nt!KiCommitThreadWait+0x14f ffff8188`f7b51360 fffff802`10099f96 : ffff8188`f7b51480 fffff802`00000005 ffff8188`f7b51500 ffffac8b`a57f4000 : nt!KeWaitForSingleObject+0x233 ffff8188`f7b51450 fffff802`14a0329a : ffff8188`f7b51830 00000000`00000000 00000000`00000200 00000000`00000000 : nt!IoSynchronousCallDriver+0x76 ffff8188`f7b514b0 fffff802`149e9cae : ffff8188`f7b515f0 00000000`00000000 ffff8188`00000000 fffff802`149e9d06 : partmgr!PM_DISK::Read+0x6a ffff8188`f7b514f0 fffff802`149e9bf8 : ffff8188`f7b515f0 00000000`00000001 ffff8188`f7b51701 ffff8188`00000000 : partmgr!SC_DISK::ReadSectors+0x36 ffff8188`f7b51530 fffff802`149e9bc6 : ffff8188`f7b515f0 ffff8188`00000018 00000000`00000000 ffffac8b`a6f97990 : partmgr!SC_DISK::ResetPartitionCache+0x1c ffff8188`f7b51560 fffff802`14a02146 : ffffac8b`9cbe08d0 ffff8188`f7b51701 00000000`00000000 ffffac8b`a6f97901 : partmgr!SC_DISK::InitializePartitionCache+0x32 ffff8188`f7b51590 fffff802`14a017ae : ffffac8b`9c1b31b0 ffff8188`f7b517e8 ffffac8b`a6f977a0 fffff802`100ceb87 : partmgr!PM_DISK::Initialize+0x4e ffff8188`f7b515c0 fffff802`149e1581 : ffffac8b`a06981b8 ffffac8b`9c1b31b0 ffffac8b`9c1b31b0 ffffac8b`a06981b8 : partmgr!PmReadPartitionTable+0x4e ffff8188`f7b51780 fffff802`14a05554 : ffffac8b`9cbe0a00 00000000`00000000 ffffac8b`9cbe0a58 fffff802`100c2f00 : partmgr!PmGetDriveLayoutEx+0x195 ffff8188`f7b517e0 fffff802`149ec9f9 : 00000000`00000000 ffffac8b`a0698010 ffffac8b`9cbe08d0 ffffac8b`a804a740 : partmgr!PmIoctlGetDriveLayout+0x64 ffff8188`f7b51830 fffff802`149e3cff : 00000000`00000000 ffffac8b`a0698010 ffffac8b`a0698200 ffff8188`f7b519a0 : partmgr!PmFilterDeviceControl+0xa8b9 ffff8188`f7b51880 fffff802`100cd805 : 00000000`00000880 fffff802`10002223 00000000`00000000 fffff802`100cb06f : partmgr!PmGlobalDispatch+0x1f ffff8188`f7b518b0 fffff802`103cfee8 : ffff8188`f7b519a0 ffff8188`f7b51934 00000000`00000000 ffffac8b`a5e14000 : nt!IofCallDriver+0x55 ffff8188`f7b518f0 fffff802`103cfcb8 : ffffac8b`a0698010 00000000`00000002 ffffac8b`a575ce10 fffff802`10ae0340 : nt!RawReadWriteDeviceControl+0xa0 ffff8188`f7b51920 fffff802`100cd805 : ffffac8b`a608fda0 00000000`00000001 ffffac8b`a0698010 ffffac8b`a0698010 : nt!RawDispatch+0x78 ffff8188`f7b51970 fffff802`0ecf4906 : 00000000`00000000 ffffac8b`a8545170 00000000`00000000 fffff802`104efe11 : nt!IofCallDriver+0x55 ffff8188`f7b519b0 fffff802`100cd805 : ffffac8b`a0698010 00000000`00000000 ffff8188`20206f49 00000000`00000000 : FLTMGR!FltpDispatch+0xd6 ffff8188`f7b51a10 fffff802`104c2528 : ffff8188`f7b51d90 ffffac8b`a0698010 00000000`00000001 ffffac8b`99aa0040 : nt!IofCallDriver+0x55 ffff8188`f7b51a50 fffff802`104c1df5 : 00000000`0007400c ffff8188`f7b51d90 00000000`00000000 ffff8188`f7b51d90 : nt!IopSynchronousServiceTail+0x1a8 ffff8188`f7b51af0 fffff802`104c17f6 : 00000004`0000000f 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5 ffff8188`f7b51c30 fffff802`10205fb8 : ffff8188`f7b51d84 ffffdd83`895ec748 00000000`00000000 fffff802`10070ffa : nt!NtDeviceIoControlFile+0x56 ffff8188`f7b51ca0 fffff802`101f8400 : fffff802`10645474 00000000`c0000185 00000000`00000808 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 ffff8188`f7b51ea8 fffff802`10645474 : 00000000`c0000185 00000000`00000808 00000000`00000000 ffff8188`00000000 : nt!KiServiceLinkage ffff8188`f7b51eb0 fffff802`10569023 : 00000000`00000000 ffff8188`f7b51fb0 ffff8188`f7b52068 ffff8188`f7b52068 : nt!BiIssueGetDriveLayoutIoctl+0xdc420 ffff8188`f7b51f30 fffff802`105666f5 : ffffdd83`8a777908 ffff8188`f7b52130 ffffffff`80004d10 ffffdd83`8afe4000 : nt!BiGetDriveLayoutInformation+0x97 ffff8188`f7b51fc0 fffff802`1056630b : ffffdd83`8a777908 00000000`00000000 ffff8188`f7b520f0 00000000`00000000 : nt!BiGetDriveLayoutBlock+0x3d ffff8188`f7b51ff0 fffff802`10565fff : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!BiGetNtPartitionPath+0x243 ffff8188`f7b521a0 fffff802`10568812 : ffff8188`00000000 ffff8188`11000001 00000000`00000000 ffff8188`f7b52270 : nt!BiConvertBootEnvironmentDeviceToNt+0xab ffff8188`f7b52240 fffff802`10567cd1 : 00000000`00000000 ffffffff`800018d0 ffffdd83`8888bf30 ffff8188`00000000 : nt!BiConvertRegistryDataToElement+0xe2 ffff8188`f7b522c0 fffff802`10566e25 : ffff8188`c0000034 ffff8188`f7b52508 ffff8188`f7b527a8 00000000`00000000 : nt!BcdGetElementDataWithFlags+0x191 ffff8188`f7b523d0 fffff802`105668dd : ffffffff`80001990 ffff8188`f7b52490 00000000`00000000 ffffffff`80001990 : nt!PopBcdReadElement+0x39 ffff8188`f7b52420 fffff802`10565d31 : ffffffff`80001990 ffffffff`800019a0 00000000`00000000 00000000`00000000 : nt!PopBcdSetDefaultResumeObjectElements+0x69 ffff8188`f7b524c0 fffff802`1055b5df : ffffac8b`9ccf4230 fffff802`0000352c ffffac8b`9ccf4230 ffffd8ee`c1c10150 : nt!PopBcdEstablishResumeObject+0x131 ffff8188`f7b52560 fffff802`1078df89 : ffff8188`f7b50000 00000000`00000000 ffffffff`800019a0 00000000`00000000 : nt!PopAllocateHiberContext+0x20b ffff8188`f7b525e0 fffff802`107947dc : ffffac8b`a4b5d000 ffffac8b`00000006 00000000`00000002 00000000`00000070 : nt!PopTransitionSystemPowerStateEx+0x4b5 ffff8188`f7b526a0 fffff802`10205fb8 : 7ffff802`10a24fd0 00000000`ffffffff 00000000`00000000 ffffac8b`a5c966e0 : nt!NtSetSystemPowerState+0x4c ffff8188`f7b52880 fffff802`101f8400 : fffff802`10559f0e 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 ffff8188`f7b52a18 fffff802`10559f0e : 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage ffff8188`f7b52a20 fffff802`10559bd9 : 00000000`00000000 ffffac8b`99a6aac0 00000000`00000000 00000000`00000000 : nt!PopIssueActionRequest+0x216 ffff8188`f7b52ac0 fffff802`100a0e74 : 00000000`00000001 00000000`00000000 ffffffff`ffffffff fffff802`10a23b00 : nt!PopPolicyWorkerAction+0x79 ffff8188`f7b52b30 fffff802`101035f5 : ffffac8b`00000001 ffffac8b`a5c96040 fffff802`100a0de0 ffffac8b`00000000 : nt!PopPolicyWorkerThread+0x94 ffff8188`f7b52b70 fffff802`100a2ae5 : ffffac8b`a5c96040 00000000`00000080 ffffac8b`99aa0040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105 ffff8188`f7b52c10 fffff802`101fbbf8 : ffff9800`4f4cf180 ffffac8b`a5c96040 fffff802`100a2a90 80002400`b7a89faf : nt!PspSystemThreadStartup+0x55 ffff8188`f7b52c60 00000000`00000000 : ffff8188`f7b53000 ffff8188`f7b4d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 STACK_COMMAND: .thread 0xffffac8ba5c96040 ; kb SYMBOL_NAME: partmgr!PM_DISK::Read+6a MODULE_NAME: partmgr IMAGE_NAME: partmgr.sys IMAGE_VERSION: 10.0.19041.1030 BUCKET_ID_FUNC_OFFSET: 6a FAILURE_BUCKET_ID: 0xa0_f0_partmgr!PM_DISK::Read OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {fe745222-5d88-a69e-f077-955bb15cd442} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8028161a876, Address of the instruction which caused the bugcheck Arg3: ffffca0062ff5920, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4515 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 10722 Key : Analysis.Memory.CommitPeak.Mb Value: 83 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8028161a876 BUGCHECK_P3: ffffca0062ff5920 BUGCHECK_P4: 0 CONTEXT: ffffca0062ff5920 -- (.cxr 0xffffca0062ff5920) rax=ffff9a05545d9ee8 rbx=ffff9a05513e3080 rcx=9a05545d9eb03a5d rdx=0000000000000000 rsi=0000000000000000 rdi=ffff9a05545d9ee0 rip=fffff8028161a876 rsp=ffffda03be5b8940 rbp=ffffda03be5b8a01 r8=0000000000000000 r9=000001152a550b14 r10=0000000000000002 r11=fffff780000003b0 r12=0000000000000000 r13=9a05545d9eb03a5d r14=0000000000000000 r15=ffff9a05513e31c0 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282 nt!KeAbPreWait+0x6: fffff802`8161a876 0fb64120 movzx eax,byte ptr [rcx+20h] ds:002b:9a05545d`9eb03a7d=?? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: EpicGamesLauncher.exe BAD_STACK_POINTER: ffffca0062ff5018 STACK_TEXT: ffffda03`be5b8940 fffff802`8186e51b : ffffca00`000000c4 fffff802`81aefe11 000f8067`b4bbbd01 ffff9a05`513e31c0 : nt!KeAbPreWait+0x6 ffffda03`be5b8970 fffff802`81af1531 : ffff9a05`545d9ee0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18f9db ffffda03`be5b8a60 fffff802`81af15da : ffff9a05`513e3080 00000082`bb16fca8 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91 ffffda03`be5b8ac0 fffff802`81805fb8 : 00000000`00000000 00000000`00000000 ffffda03`be5b8b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a ffffda03`be5b8b00 00007ffd`10febe14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000082`bb16fc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`10febe14 SYMBOL_NAME: nt!KeAbPreWait+6 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .cxr 0xffffca0062ff5920 ; kb BUCKET_ID_FUNC_OFFSET: 6 FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KeAbPreWait OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {ddcb9656-083d-2ea8-831a-b13145df4ef7} Followup: MachineOwner --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000061941, The subtype of the bugcheck. Arg2: 00007ffa4cb2be14 Arg3: 000000000000001d Arg4: fffff10fb1dfeb00 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3671 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 3705 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 61941 BUGCHECK_P2: 7ffa4cb2be14 BUGCHECK_P3: 1d BUGCHECK_P4: fffff10fb1dfeb00 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: EpicGamesLauncher.exe STACK_TEXT: fffff10f`b1dfe958 fffff801`83473a20 : 00000000`0000001a 00000000`00061941 00007ffa`4cb2be14 00000000`0000001d : nt!KeBugCheckEx fffff10f`b1dfe960 fffff801`8340275e : 000001f0`982f8a40 00000000`00000000 fffff10f`b1dfeb18 ffffffff`fffe7960 : nt!MmAccessFault+0x189840 fffff10f`b1dfeb00 00007ffa`4cb2be14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e 000000a3`9176f648 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4cb2be14 MODULE_NAME: hardware IMAGE_NAME: hardware_ram STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0} Followup: MachineOwner --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 000000000000001e, Type of memory safety violation Arg2: fffff80352e6b8f0, Address of the trap frame for the exception that caused the bugcheck Arg3: fffff80352e6b848, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4108 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 12014 Key : Analysis.Memory.CommitPeak.Mb Value: 82 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 139 BUGCHECK_P1: 1e BUGCHECK_P2: fffff80352e6b8f0 BUGCHECK_P3: fffff80352e6b848 BUGCHECK_P4: 0 IMAGE_NAME: ntkrnlmp.exe MODULE_NAME: ntkrnlmp FAULTING_MODULE: fffff8034c800000 nt TRAP_FRAME: fffff80352e6b8f0 -- (.trap 0xfffff80352e6b8f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001e rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8034ca5719a rsp=fffff80352e6ba80 rbp=0000000000000000 r8=00000000ffffffff r9=0000000000000fff r10=00000000fffffffe r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!KiGroupSchedulingGenerationEnd+0xfa: fffff803`4ca5719a cd29 int 29h Resetting default scope EXCEPTION_RECORD: fffff80352e6b848 -- (.exr 0xfffff80352e6b848) ExceptionAddress: fffff8034ca5719a (nt!KiGroupSchedulingGenerationEnd+0x00000000000000fa) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 000000000000001e Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 000000000000001e EXCEPTION_STR: 0xc0000409 STACK_TEXT: fffff803`52e6b5c8 fffff803`4cc06569 : 00000000`00000139 00000000`0000001e fffff803`52e6b8f0 fffff803`52e6b848 : nt!KeBugCheckEx fffff803`52e6b5d0 fffff803`4cc06990 : 00000000`00000000 00000000`00000fff 00000000`00000000 00000fd5`00000000 : nt!KiBugCheckDispatch+0x69 fffff803`52e6b710 fffff803`4cc04d23 : ffffac87`c51b71f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0 fffff803`52e6b8f0 fffff803`4ca5719a : fffff803`fffffffe fffff803`ffffffff 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323 fffff803`52e6ba80 fffff803`4ca58c3e : fffff803`4af54180 00000000`00000000 00000000`0008095a 00000000`00000000 : nt!KiGroupSchedulingGenerationEnd+0xfa fffff803`52e6bad0 fffff803`4ca581c8 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`52e6bb80 : nt!KiGroupSchedulingQuantumEnd+0xce fffff803`52e6bb60 fffff803`4cbf8124 : 00000000`00000000 fffff803`4af54180 fffff803`4d527600 ffffac87`c94c5080 : nt!KiQuantumEnd+0x148 fffff803`52e6bc60 00000000`00000000 : fffff803`52e6c000 fffff803`52e66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0xb4 IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {64929928-a824-2134-285e-71128496d311} Followup: MachineOwner ---------
hocam hdd şuan yok pc de m2 ssd kullanıyorum sadece sanırım hd tune sadece hdd içinYeniden yapın.
Diskten kaynaklı olabilme ihtimali de var.
HD Tune ile test yapabiliyor musunuz? Bir de mümkünse HD Tune yazılımının "Health" sekmesinden ve HDD Sentinel'den ekran görüntüsü atabilir misiniz?
günaydın gece memtest86 yı yaptım hata bulamadı . Geriye usb ile kullandığım kulaklık ve depolama ihtimali kalıyor m2 ssd kullanıyorum ne yapmalıyımYeniden yapın.
Diskten kaynaklı olabilme ihtimali de var.
HD Tune ile test yapabiliyor musunuz? Bir de mümkünse HD Tune yazılımının "Health" sekmesinden ve HDD Sentinel'den ekran görüntüsü atabilir misiniz?
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.