Mavi ekran hatası

İşletim sistemi
Windows 10

ramokan

Femtopat
Katılım
14 Ekim 2020
Mesajlar
11
Daha fazla  
Cinsiyet
Erkek
Arkadaşlar, birkaç kez mavi ekran hatası aldım ama hiç anlamıyorum bu işten. Aşağıdaki linkte minidump dosyaları var, YouTube videosundan geldim. Yardımcı olursanız sevinirim.

 
Untitledd.png


İsterseniz Mediafire, Yandex Disk gibi sitelere yükleyin dosyayı.
 
Açıkçası ben de Google Drive'dan erişimin nasıl açılacağını tam olarak bilmiyorum. Siz en iyisi direkt olarak MediaFire'a yükleyin dosyayı.
mediafireyi yapıyorum suanda google driveyi tekrar kontol eder misin
Açıkçası ben de Google Drive'dan erişimin nasıl açılacağını tam olarak bilmiyorum. Siz en iyisi direkt olarak MediaFire'a yükleyin dosyayı.
 
  • MemTest86 ile belleklerde tarama yapın. Sorununuz bellek kaynaklı gibi duruyor.
  • Sesi USB'den alıyorsanız bir süre ilgili cihazı kullanmayınız.
  • Çipset sürücülerinizi güncelleyin.
  • HD Tune ile disklerinizde "Error Scan" yaparsanız iyi olur, ayrıca HDD Sentinel yazılımından tüm disklerinizin ekran görüntüsünü paylaşın.
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: fffffe86935b5a90, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffe86935b59e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5000

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10454

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 1e

BUGCHECK_P2: fffffe86935b5a90

BUGCHECK_P3: fffffe86935b59e8

BUGCHECK_P4: 0

IMAGE_NAME:  ntkrnlmp.exe

MODULE_NAME: ntkrnlmp

FAULTING_MODULE: fffff80559800000 nt

TRAP_FRAME:  fffffe86935b5a90 -- (.trap 0xfffffe86935b5a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000b rbx=0000000000000000 rcx=000000000000001e
rdx=fffff8055a4fdc80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80559c6b58d rsp=fffffe86935b5c20 rbp=ffffe600201de180
 r8=0000000000000000  r9=fffffe86935b5fb0 r10=0000000000000000
r11=0000000000000029 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeQueryValuesThread+0x1957dd:
fffff805`59c6b58d cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffffe86935b59e8 -- (.exr 0xfffffe86935b59e8)
ExceptionAddress: fffff80559c6b58d (nt!KeQueryValuesThread+0x00000000001957dd)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001e
Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001e

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffffe86`935b5768 fffff805`59c06569     : 00000000`00000139 00000000`0000001e fffffe86`935b5a90 fffffe86`935b59e8 : nt!KeBugCheckEx
fffffe86`935b5770 fffff805`59c06990     : ffffe600`207d5180 fffff805`59bfb7b2 000f8067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffe86`935b58b0 fffff805`59c04d23     : 00000000`00000000 00000000`000000ff 00000000`00000001 00000000`000001f0 : nt!KiFastFailDispatch+0xd0
fffffe86`935b5a90 fffff805`59c6b58d     : ffff8b81`100125c0 01f000d0`000000d0 00740073`00000000 00320033`006d0065 : nt!KiRaiseSecurityCheckFailure+0x323
fffffe86`935b5c20 fffff805`59edb3e1     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x1957dd
fffffe86`935b5ca0 fffff805`59edb072     : ffff8b81`1e31e660 ffff8b81`1e31e8e0 ffff8b81`1ca21080 00000000`00000002 : nt!PsQueryStatisticsProcess+0x111
fffffe86`935b5d20 fffff805`59eeeca1     : 00000000`00000002 ffff8b81`1e31e080 00000000`ffffffff 00000000`00000000 : nt!ExpCopyProcessInfo+0x42
fffffe86`935b5da0 fffff805`59ef21e3     : ffffe0f0`783c1e08 00000000`00047328 00000000`01440000 00000000`00000000 : nt!ExpGetProcessInformation+0x9f1
fffffe86`935b6400 fffff805`59ef18c7     : ffff8b81`1ca21080 00000000`00000000 00000000`00000000 00000000`09aef820 : nt!ExpQuerySystemInformation+0x7d3
fffffe86`935b6ac0 fffff805`59c05fb8     : 00000000`03ea0000 00000000`00000000 fffffe86`935b6b18 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37
fffffe86`935b6b00 00007ffb`8ba4c454     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`099ee448 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8ba4c454


IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {64929928-a824-2134-285e-71128496d311}

Followup:     MachineOwner
---------

INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 00000000000000f0, The system failed to complete(suspend) a power transition in a timely manner.
Arg2: 0000000000000005, The system power state in transition.
Arg3: 000000000000000d, The sleep checkpoint most recently reached.
Arg4: ffffac8ba5c96040, A pointer to the thread currently processing the request.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8720

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a0

BUGCHECK_P1: f0

BUGCHECK_P2: 5

BUGCHECK_P3: d

BUGCHECK_P4: ffffac8ba5c96040

FAULTING_THREAD:  ffffac8ba5c96040

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffff8188`f7b510d0 fffff802`100dffa0     : ffff9800`00000000 00000000`00000000 00000000`00000200 fffff802`00000000 : nt!KiSwapContext+0x76
ffff8188`f7b51210 fffff802`100df4cf     : ffffac8b`00000004 00000000`00000008 ffff8188`f7b513d0 ffff8188`00000000 : nt!KiSwapThread+0x500
ffff8188`f7b512c0 fffff802`100ded73     : 00000000`00000000 00000000`00000000 ffffac8b`a57f4000 ffffac8b`a5c96180 : nt!KiCommitThreadWait+0x14f
ffff8188`f7b51360 fffff802`10099f96     : ffff8188`f7b51480 fffff802`00000005 ffff8188`f7b51500 ffffac8b`a57f4000 : nt!KeWaitForSingleObject+0x233
ffff8188`f7b51450 fffff802`14a0329a     : ffff8188`f7b51830 00000000`00000000 00000000`00000200 00000000`00000000 : nt!IoSynchronousCallDriver+0x76
ffff8188`f7b514b0 fffff802`149e9cae     : ffff8188`f7b515f0 00000000`00000000 ffff8188`00000000 fffff802`149e9d06 : partmgr!PM_DISK::Read+0x6a
ffff8188`f7b514f0 fffff802`149e9bf8     : ffff8188`f7b515f0 00000000`00000001 ffff8188`f7b51701 ffff8188`00000000 : partmgr!SC_DISK::ReadSectors+0x36
ffff8188`f7b51530 fffff802`149e9bc6     : ffff8188`f7b515f0 ffff8188`00000018 00000000`00000000 ffffac8b`a6f97990 : partmgr!SC_DISK::ResetPartitionCache+0x1c
ffff8188`f7b51560 fffff802`14a02146     : ffffac8b`9cbe08d0 ffff8188`f7b51701 00000000`00000000 ffffac8b`a6f97901 : partmgr!SC_DISK::InitializePartitionCache+0x32
ffff8188`f7b51590 fffff802`14a017ae     : ffffac8b`9c1b31b0 ffff8188`f7b517e8 ffffac8b`a6f977a0 fffff802`100ceb87 : partmgr!PM_DISK::Initialize+0x4e
ffff8188`f7b515c0 fffff802`149e1581     : ffffac8b`a06981b8 ffffac8b`9c1b31b0 ffffac8b`9c1b31b0 ffffac8b`a06981b8 : partmgr!PmReadPartitionTable+0x4e
ffff8188`f7b51780 fffff802`14a05554     : ffffac8b`9cbe0a00 00000000`00000000 ffffac8b`9cbe0a58 fffff802`100c2f00 : partmgr!PmGetDriveLayoutEx+0x195
ffff8188`f7b517e0 fffff802`149ec9f9     : 00000000`00000000 ffffac8b`a0698010 ffffac8b`9cbe08d0 ffffac8b`a804a740 : partmgr!PmIoctlGetDriveLayout+0x64
ffff8188`f7b51830 fffff802`149e3cff     : 00000000`00000000 ffffac8b`a0698010 ffffac8b`a0698200 ffff8188`f7b519a0 : partmgr!PmFilterDeviceControl+0xa8b9
ffff8188`f7b51880 fffff802`100cd805     : 00000000`00000880 fffff802`10002223 00000000`00000000 fffff802`100cb06f : partmgr!PmGlobalDispatch+0x1f
ffff8188`f7b518b0 fffff802`103cfee8     : ffff8188`f7b519a0 ffff8188`f7b51934 00000000`00000000 ffffac8b`a5e14000 : nt!IofCallDriver+0x55
ffff8188`f7b518f0 fffff802`103cfcb8     : ffffac8b`a0698010 00000000`00000002 ffffac8b`a575ce10 fffff802`10ae0340 : nt!RawReadWriteDeviceControl+0xa0
ffff8188`f7b51920 fffff802`100cd805     : ffffac8b`a608fda0 00000000`00000001 ffffac8b`a0698010 ffffac8b`a0698010 : nt!RawDispatch+0x78
ffff8188`f7b51970 fffff802`0ecf4906     : 00000000`00000000 ffffac8b`a8545170 00000000`00000000 fffff802`104efe11 : nt!IofCallDriver+0x55
ffff8188`f7b519b0 fffff802`100cd805     : ffffac8b`a0698010 00000000`00000000 ffff8188`20206f49 00000000`00000000 : FLTMGR!FltpDispatch+0xd6
ffff8188`f7b51a10 fffff802`104c2528     : ffff8188`f7b51d90 ffffac8b`a0698010 00000000`00000001 ffffac8b`99aa0040 : nt!IofCallDriver+0x55
ffff8188`f7b51a50 fffff802`104c1df5     : 00000000`0007400c ffff8188`f7b51d90 00000000`00000000 ffff8188`f7b51d90 : nt!IopSynchronousServiceTail+0x1a8
ffff8188`f7b51af0 fffff802`104c17f6     : 00000004`0000000f 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff8188`f7b51c30 fffff802`10205fb8     : ffff8188`f7b51d84 ffffdd83`895ec748 00000000`00000000 fffff802`10070ffa : nt!NtDeviceIoControlFile+0x56
ffff8188`f7b51ca0 fffff802`101f8400     : fffff802`10645474 00000000`c0000185 00000000`00000808 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffff8188`f7b51ea8 fffff802`10645474     : 00000000`c0000185 00000000`00000808 00000000`00000000 ffff8188`00000000 : nt!KiServiceLinkage
ffff8188`f7b51eb0 fffff802`10569023     : 00000000`00000000 ffff8188`f7b51fb0 ffff8188`f7b52068 ffff8188`f7b52068 : nt!BiIssueGetDriveLayoutIoctl+0xdc420
ffff8188`f7b51f30 fffff802`105666f5     : ffffdd83`8a777908 ffff8188`f7b52130 ffffffff`80004d10 ffffdd83`8afe4000 : nt!BiGetDriveLayoutInformation+0x97
ffff8188`f7b51fc0 fffff802`1056630b     : ffffdd83`8a777908 00000000`00000000 ffff8188`f7b520f0 00000000`00000000 : nt!BiGetDriveLayoutBlock+0x3d
ffff8188`f7b51ff0 fffff802`10565fff     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!BiGetNtPartitionPath+0x243
ffff8188`f7b521a0 fffff802`10568812     : ffff8188`00000000 ffff8188`11000001 00000000`00000000 ffff8188`f7b52270 : nt!BiConvertBootEnvironmentDeviceToNt+0xab
ffff8188`f7b52240 fffff802`10567cd1     : 00000000`00000000 ffffffff`800018d0 ffffdd83`8888bf30 ffff8188`00000000 : nt!BiConvertRegistryDataToElement+0xe2
ffff8188`f7b522c0 fffff802`10566e25     : ffff8188`c0000034 ffff8188`f7b52508 ffff8188`f7b527a8 00000000`00000000 : nt!BcdGetElementDataWithFlags+0x191
ffff8188`f7b523d0 fffff802`105668dd     : ffffffff`80001990 ffff8188`f7b52490 00000000`00000000 ffffffff`80001990 : nt!PopBcdReadElement+0x39
ffff8188`f7b52420 fffff802`10565d31     : ffffffff`80001990 ffffffff`800019a0 00000000`00000000 00000000`00000000 : nt!PopBcdSetDefaultResumeObjectElements+0x69
ffff8188`f7b524c0 fffff802`1055b5df     : ffffac8b`9ccf4230 fffff802`0000352c ffffac8b`9ccf4230 ffffd8ee`c1c10150 : nt!PopBcdEstablishResumeObject+0x131
ffff8188`f7b52560 fffff802`1078df89     : ffff8188`f7b50000 00000000`00000000 ffffffff`800019a0 00000000`00000000 : nt!PopAllocateHiberContext+0x20b
ffff8188`f7b525e0 fffff802`107947dc     : ffffac8b`a4b5d000 ffffac8b`00000006 00000000`00000002 00000000`00000070 : nt!PopTransitionSystemPowerStateEx+0x4b5
ffff8188`f7b526a0 fffff802`10205fb8     : 7ffff802`10a24fd0 00000000`ffffffff 00000000`00000000 ffffac8b`a5c966e0 : nt!NtSetSystemPowerState+0x4c
ffff8188`f7b52880 fffff802`101f8400     : fffff802`10559f0e 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffff8188`f7b52a18 fffff802`10559f0e     : 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
ffff8188`f7b52a20 fffff802`10559bd9     : 00000000`00000000 ffffac8b`99a6aac0 00000000`00000000 00000000`00000000 : nt!PopIssueActionRequest+0x216
ffff8188`f7b52ac0 fffff802`100a0e74     : 00000000`00000001 00000000`00000000 ffffffff`ffffffff fffff802`10a23b00 : nt!PopPolicyWorkerAction+0x79
ffff8188`f7b52b30 fffff802`101035f5     : ffffac8b`00000001 ffffac8b`a5c96040 fffff802`100a0de0 ffffac8b`00000000 : nt!PopPolicyWorkerThread+0x94
ffff8188`f7b52b70 fffff802`100a2ae5     : ffffac8b`a5c96040 00000000`00000080 ffffac8b`99aa0040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8188`f7b52c10 fffff802`101fbbf8     : ffff9800`4f4cf180 ffffac8b`a5c96040 fffff802`100a2a90 80002400`b7a89faf : nt!PspSystemThreadStartup+0x55
ffff8188`f7b52c60 00000000`00000000     : ffff8188`f7b53000 ffff8188`f7b4d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  .thread 0xffffac8ba5c96040 ; kb

SYMBOL_NAME:  partmgr!PM_DISK::Read+6a

MODULE_NAME: partmgr

IMAGE_NAME:  partmgr.sys

IMAGE_VERSION:  10.0.19041.1030

BUCKET_ID_FUNC_OFFSET:  6a

FAILURE_BUCKET_ID:  0xa0_f0_partmgr!PM_DISK::Read

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fe745222-5d88-a69e-f077-955bb15cd442}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8028161a876, Address of the instruction which caused the bugcheck
Arg3: ffffca0062ff5920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4515

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10722

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8028161a876

BUGCHECK_P3: ffffca0062ff5920

BUGCHECK_P4: 0

CONTEXT:  ffffca0062ff5920 -- (.cxr 0xffffca0062ff5920)
rax=ffff9a05545d9ee8 rbx=ffff9a05513e3080 rcx=9a05545d9eb03a5d
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff9a05545d9ee0
rip=fffff8028161a876 rsp=ffffda03be5b8940 rbp=ffffda03be5b8a01
 r8=0000000000000000  r9=000001152a550b14 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=9a05545d9eb03a5d
r14=0000000000000000 r15=ffff9a05513e31c0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!KeAbPreWait+0x6:
fffff802`8161a876 0fb64120        movzx   eax,byte ptr [rcx+20h] ds:002b:9a05545d`9eb03a7d=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

BAD_STACK_POINTER:  ffffca0062ff5018

STACK_TEXT: 
ffffda03`be5b8940 fffff802`8186e51b     : ffffca00`000000c4 fffff802`81aefe11 000f8067`b4bbbd01 ffff9a05`513e31c0 : nt!KeAbPreWait+0x6
ffffda03`be5b8970 fffff802`81af1531     : ffff9a05`545d9ee0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18f9db
ffffda03`be5b8a60 fffff802`81af15da     : ffff9a05`513e3080 00000082`bb16fca8 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffffda03`be5b8ac0 fffff802`81805fb8     : 00000000`00000000 00000000`00000000 ffffda03`be5b8b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffda03`be5b8b00 00007ffd`10febe14     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000082`bb16fc78 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`10febe14


SYMBOL_NAME:  nt!KeAbPreWait+6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffca0062ff5920 ; kb

BUCKET_ID_FUNC_OFFSET:  6

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!KeAbPreWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ddcb9656-083d-2ea8-831a-b13145df4ef7}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffa4cb2be14
Arg3: 000000000000001d
Arg4: fffff10fb1dfeb00

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3671

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3705

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 7ffa4cb2be14

BUGCHECK_P3: 1d

BUGCHECK_P4: fffff10fb1dfeb00

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

STACK_TEXT: 
fffff10f`b1dfe958 fffff801`83473a20     : 00000000`0000001a 00000000`00061941 00007ffa`4cb2be14 00000000`0000001d : nt!KeBugCheckEx
fffff10f`b1dfe960 fffff801`8340275e     : 000001f0`982f8a40 00000000`00000000 fffff10f`b1dfeb18 ffffffff`fffe7960 : nt!MmAccessFault+0x189840
fffff10f`b1dfeb00 00007ffa`4cb2be14     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000a3`9176f648 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4cb2be14


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: fffff80352e6b8f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80352e6b848, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4108

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12014

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 1e

BUGCHECK_P2: fffff80352e6b8f0

BUGCHECK_P3: fffff80352e6b848

BUGCHECK_P4: 0

IMAGE_NAME:  ntkrnlmp.exe

MODULE_NAME: ntkrnlmp

FAULTING_MODULE: fffff8034c800000 nt

TRAP_FRAME:  fffff80352e6b8f0 -- (.trap 0xfffff80352e6b8f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001e
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034ca5719a rsp=fffff80352e6ba80 rbp=0000000000000000
 r8=00000000ffffffff  r9=0000000000000fff r10=00000000fffffffe
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiGroupSchedulingGenerationEnd+0xfa:
fffff803`4ca5719a cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff80352e6b848 -- (.exr 0xfffff80352e6b848)
ExceptionAddress: fffff8034ca5719a (nt!KiGroupSchedulingGenerationEnd+0x00000000000000fa)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001e
Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001e

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffff803`52e6b5c8 fffff803`4cc06569     : 00000000`00000139 00000000`0000001e fffff803`52e6b8f0 fffff803`52e6b848 : nt!KeBugCheckEx
fffff803`52e6b5d0 fffff803`4cc06990     : 00000000`00000000 00000000`00000fff 00000000`00000000 00000fd5`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`52e6b710 fffff803`4cc04d23     : ffffac87`c51b71f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff803`52e6b8f0 fffff803`4ca5719a     : fffff803`fffffffe fffff803`ffffffff 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff803`52e6ba80 fffff803`4ca58c3e     : fffff803`4af54180 00000000`00000000 00000000`0008095a 00000000`00000000 : nt!KiGroupSchedulingGenerationEnd+0xfa
fffff803`52e6bad0 fffff803`4ca581c8     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`52e6bb80 : nt!KiGroupSchedulingQuantumEnd+0xce
fffff803`52e6bb60 fffff803`4cbf8124     : 00000000`00000000 fffff803`4af54180 fffff803`4d527600 ffffac87`c94c5080 : nt!KiQuantumEnd+0x148
fffff803`52e6bc60 00000000`00000000     : fffff803`52e6c000 fffff803`52e66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0xb4


IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {64929928-a824-2134-285e-71128496d311}

Followup:     MachineOwner
---------
 
  • MemTest86 ile belleklerde tarama yapın. Sorununuz bellek kaynaklı gibi duruyor.
  • Sesi USB'den alıyorsanız bir süre ilgili cihazı kullanmayınız.
  • Çipset sürücülerinizi güncelleyin.
  • HD Tune ile disklerinizde "Error Scan" yaparsanız iyi olur, ayrıca HDD Sentinel yazılımından tüm disklerinizin ekran görüntüsünü paylaşın.
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: fffffe86935b5a90, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffe86935b59e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5000

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10454

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 1e

BUGCHECK_P2: fffffe86935b5a90

BUGCHECK_P3: fffffe86935b59e8

BUGCHECK_P4: 0

IMAGE_NAME:  ntkrnlmp.exe

MODULE_NAME: ntkrnlmp

FAULTING_MODULE: fffff80559800000 nt

TRAP_FRAME:  fffffe86935b5a90 -- (.trap 0xfffffe86935b5a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000b rbx=0000000000000000 rcx=000000000000001e
rdx=fffff8055a4fdc80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80559c6b58d rsp=fffffe86935b5c20 rbp=ffffe600201de180
r8=0000000000000000  r9=fffffe86935b5fb0 r10=0000000000000000
r11=0000000000000029 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeQueryValuesThread+0x1957dd:
fffff805`59c6b58d cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffffe86935b59e8 -- (.exr 0xfffffe86935b59e8)
ExceptionAddress: fffff80559c6b58d (nt!KeQueryValuesThread+0x00000000001957dd)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001e
Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001e

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffffe86`935b5768 fffff805`59c06569     : 00000000`00000139 00000000`0000001e fffffe86`935b5a90 fffffe86`935b59e8 : nt!KeBugCheckEx
fffffe86`935b5770 fffff805`59c06990     : ffffe600`207d5180 fffff805`59bfb7b2 000f8067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffe86`935b58b0 fffff805`59c04d23     : 00000000`00000000 00000000`000000ff 00000000`00000001 00000000`000001f0 : nt!KiFastFailDispatch+0xd0
fffffe86`935b5a90 fffff805`59c6b58d     : ffff8b81`100125c0 01f000d0`000000d0 00740073`00000000 00320033`006d0065 : nt!KiRaiseSecurityCheckFailure+0x323
fffffe86`935b5c20 fffff805`59edb3e1     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x1957dd
fffffe86`935b5ca0 fffff805`59edb072     : ffff8b81`1e31e660 ffff8b81`1e31e8e0 ffff8b81`1ca21080 00000000`00000002 : nt!PsQueryStatisticsProcess+0x111
fffffe86`935b5d20 fffff805`59eeeca1     : 00000000`00000002 ffff8b81`1e31e080 00000000`ffffffff 00000000`00000000 : nt!ExpCopyProcessInfo+0x42
fffffe86`935b5da0 fffff805`59ef21e3     : ffffe0f0`783c1e08 00000000`00047328 00000000`01440000 00000000`00000000 : nt!ExpGetProcessInformation+0x9f1
fffffe86`935b6400 fffff805`59ef18c7     : ffff8b81`1ca21080 00000000`00000000 00000000`00000000 00000000`09aef820 : nt!ExpQuerySystemInformation+0x7d3
fffffe86`935b6ac0 fffff805`59c05fb8     : 00000000`03ea0000 00000000`00000000 fffffe86`935b6b18 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37
fffffe86`935b6b00 00007ffb`8ba4c454     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`099ee448 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8ba4c454


IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {64929928-a824-2134-285e-71128496d311}

Followup:     MachineOwner
---------

INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 00000000000000f0, The system failed to complete(suspend) a power transition in a timely manner.
Arg2: 0000000000000005, The system power state in transition.
Arg3: 000000000000000d, The sleep checkpoint most recently reached.
Arg4: ffffac8ba5c96040, A pointer to the thread currently processing the request.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8720

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a0

BUGCHECK_P1: f0

BUGCHECK_P2: 5

BUGCHECK_P3: d

BUGCHECK_P4: ffffac8ba5c96040

FAULTING_THREAD:  ffffac8ba5c96040

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffff8188`f7b510d0 fffff802`100dffa0     : ffff9800`00000000 00000000`00000000 00000000`00000200 fffff802`00000000 : nt!KiSwapContext+0x76
ffff8188`f7b51210 fffff802`100df4cf     : ffffac8b`00000004 00000000`00000008 ffff8188`f7b513d0 ffff8188`00000000 : nt!KiSwapThread+0x500
ffff8188`f7b512c0 fffff802`100ded73     : 00000000`00000000 00000000`00000000 ffffac8b`a57f4000 ffffac8b`a5c96180 : nt!KiCommitThreadWait+0x14f
ffff8188`f7b51360 fffff802`10099f96     : ffff8188`f7b51480 fffff802`00000005 ffff8188`f7b51500 ffffac8b`a57f4000 : nt!KeWaitForSingleObject+0x233
ffff8188`f7b51450 fffff802`14a0329a     : ffff8188`f7b51830 00000000`00000000 00000000`00000200 00000000`00000000 : nt!IoSynchronousCallDriver+0x76
ffff8188`f7b514b0 fffff802`149e9cae     : ffff8188`f7b515f0 00000000`00000000 ffff8188`00000000 fffff802`149e9d06 : partmgr!PM_DISK::Read+0x6a
ffff8188`f7b514f0 fffff802`149e9bf8     : ffff8188`f7b515f0 00000000`00000001 ffff8188`f7b51701 ffff8188`00000000 : partmgr!SC_DISK::ReadSectors+0x36
ffff8188`f7b51530 fffff802`149e9bc6     : ffff8188`f7b515f0 ffff8188`00000018 00000000`00000000 ffffac8b`a6f97990 : partmgr!SC_DISK::ResetPartitionCache+0x1c
ffff8188`f7b51560 fffff802`14a02146     : ffffac8b`9cbe08d0 ffff8188`f7b51701 00000000`00000000 ffffac8b`a6f97901 : partmgr!SC_DISK::InitializePartitionCache+0x32
ffff8188`f7b51590 fffff802`14a017ae     : ffffac8b`9c1b31b0 ffff8188`f7b517e8 ffffac8b`a6f977a0 fffff802`100ceb87 : partmgr!PM_DISK::Initialize+0x4e
ffff8188`f7b515c0 fffff802`149e1581     : ffffac8b`a06981b8 ffffac8b`9c1b31b0 ffffac8b`9c1b31b0 ffffac8b`a06981b8 : partmgr!PmReadPartitionTable+0x4e
ffff8188`f7b51780 fffff802`14a05554     : ffffac8b`9cbe0a00 00000000`00000000 ffffac8b`9cbe0a58 fffff802`100c2f00 : partmgr!PmGetDriveLayoutEx+0x195
ffff8188`f7b517e0 fffff802`149ec9f9     : 00000000`00000000 ffffac8b`a0698010 ffffac8b`9cbe08d0 ffffac8b`a804a740 : partmgr!PmIoctlGetDriveLayout+0x64
ffff8188`f7b51830 fffff802`149e3cff     : 00000000`00000000 ffffac8b`a0698010 ffffac8b`a0698200 ffff8188`f7b519a0 : partmgr!PmFilterDeviceControl+0xa8b9
ffff8188`f7b51880 fffff802`100cd805     : 00000000`00000880 fffff802`10002223 00000000`00000000 fffff802`100cb06f : partmgr!PmGlobalDispatch+0x1f
ffff8188`f7b518b0 fffff802`103cfee8     : ffff8188`f7b519a0 ffff8188`f7b51934 00000000`00000000 ffffac8b`a5e14000 : nt!IofCallDriver+0x55
ffff8188`f7b518f0 fffff802`103cfcb8     : ffffac8b`a0698010 00000000`00000002 ffffac8b`a575ce10 fffff802`10ae0340 : nt!RawReadWriteDeviceControl+0xa0
ffff8188`f7b51920 fffff802`100cd805     : ffffac8b`a608fda0 00000000`00000001 ffffac8b`a0698010 ffffac8b`a0698010 : nt!RawDispatch+0x78
ffff8188`f7b51970 fffff802`0ecf4906     : 00000000`00000000 ffffac8b`a8545170 00000000`00000000 fffff802`104efe11 : nt!IofCallDriver+0x55
ffff8188`f7b519b0 fffff802`100cd805     : ffffac8b`a0698010 00000000`00000000 ffff8188`20206f49 00000000`00000000 : FLTMGR!FltpDispatch+0xd6
ffff8188`f7b51a10 fffff802`104c2528     : ffff8188`f7b51d90 ffffac8b`a0698010 00000000`00000001 ffffac8b`99aa0040 : nt!IofCallDriver+0x55
ffff8188`f7b51a50 fffff802`104c1df5     : 00000000`0007400c ffff8188`f7b51d90 00000000`00000000 ffff8188`f7b51d90 : nt!IopSynchronousServiceTail+0x1a8
ffff8188`f7b51af0 fffff802`104c17f6     : 00000004`0000000f 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff8188`f7b51c30 fffff802`10205fb8     : ffff8188`f7b51d84 ffffdd83`895ec748 00000000`00000000 fffff802`10070ffa : nt!NtDeviceIoControlFile+0x56
ffff8188`f7b51ca0 fffff802`101f8400     : fffff802`10645474 00000000`c0000185 00000000`00000808 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffff8188`f7b51ea8 fffff802`10645474     : 00000000`c0000185 00000000`00000808 00000000`00000000 ffff8188`00000000 : nt!KiServiceLinkage
ffff8188`f7b51eb0 fffff802`10569023     : 00000000`00000000 ffff8188`f7b51fb0 ffff8188`f7b52068 ffff8188`f7b52068 : nt!BiIssueGetDriveLayoutIoctl+0xdc420
ffff8188`f7b51f30 fffff802`105666f5     : ffffdd83`8a777908 ffff8188`f7b52130 ffffffff`80004d10 ffffdd83`8afe4000 : nt!BiGetDriveLayoutInformation+0x97
ffff8188`f7b51fc0 fffff802`1056630b     : ffffdd83`8a777908 00000000`00000000 ffff8188`f7b520f0 00000000`00000000 : nt!BiGetDriveLayoutBlock+0x3d
ffff8188`f7b51ff0 fffff802`10565fff     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!BiGetNtPartitionPath+0x243
ffff8188`f7b521a0 fffff802`10568812     : ffff8188`00000000 ffff8188`11000001 00000000`00000000 ffff8188`f7b52270 : nt!BiConvertBootEnvironmentDeviceToNt+0xab
ffff8188`f7b52240 fffff802`10567cd1     : 00000000`00000000 ffffffff`800018d0 ffffdd83`8888bf30 ffff8188`00000000 : nt!BiConvertRegistryDataToElement+0xe2
ffff8188`f7b522c0 fffff802`10566e25     : ffff8188`c0000034 ffff8188`f7b52508 ffff8188`f7b527a8 00000000`00000000 : nt!BcdGetElementDataWithFlags+0x191
ffff8188`f7b523d0 fffff802`105668dd     : ffffffff`80001990 ffff8188`f7b52490 00000000`00000000 ffffffff`80001990 : nt!PopBcdReadElement+0x39
ffff8188`f7b52420 fffff802`10565d31     : ffffffff`80001990 ffffffff`800019a0 00000000`00000000 00000000`00000000 : nt!PopBcdSetDefaultResumeObjectElements+0x69
ffff8188`f7b524c0 fffff802`1055b5df     : ffffac8b`9ccf4230 fffff802`0000352c ffffac8b`9ccf4230 ffffd8ee`c1c10150 : nt!PopBcdEstablishResumeObject+0x131
ffff8188`f7b52560 fffff802`1078df89     : ffff8188`f7b50000 00000000`00000000 ffffffff`800019a0 00000000`00000000 : nt!PopAllocateHiberContext+0x20b
ffff8188`f7b525e0 fffff802`107947dc     : ffffac8b`a4b5d000 ffffac8b`00000006 00000000`00000002 00000000`00000070 : nt!PopTransitionSystemPowerStateEx+0x4b5
ffff8188`f7b526a0 fffff802`10205fb8     : 7ffff802`10a24fd0 00000000`ffffffff 00000000`00000000 ffffac8b`a5c966e0 : nt!NtSetSystemPowerState+0x4c
ffff8188`f7b52880 fffff802`101f8400     : fffff802`10559f0e 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffff8188`f7b52a18 fffff802`10559f0e     : 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
ffff8188`f7b52a20 fffff802`10559bd9     : 00000000`00000000 ffffac8b`99a6aac0 00000000`00000000 00000000`00000000 : nt!PopIssueActionRequest+0x216
ffff8188`f7b52ac0 fffff802`100a0e74     : 00000000`00000001 00000000`00000000 ffffffff`ffffffff fffff802`10a23b00 : nt!PopPolicyWorkerAction+0x79
ffff8188`f7b52b30 fffff802`101035f5     : ffffac8b`00000001 ffffac8b`a5c96040 fffff802`100a0de0 ffffac8b`00000000 : nt!PopPolicyWorkerThread+0x94
ffff8188`f7b52b70 fffff802`100a2ae5     : ffffac8b`a5c96040 00000000`00000080 ffffac8b`99aa0040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8188`f7b52c10 fffff802`101fbbf8     : ffff9800`4f4cf180 ffffac8b`a5c96040 fffff802`100a2a90 80002400`b7a89faf : nt!PspSystemThreadStartup+0x55
ffff8188`f7b52c60 00000000`00000000     : ffff8188`f7b53000 ffff8188`f7b4d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  .thread 0xffffac8ba5c96040 ; kb

SYMBOL_NAME:  partmgr!PM_DISK::Read+6a

MODULE_NAME: partmgr

IMAGE_NAME:  partmgr.sys

IMAGE_VERSION:  10.0.19041.1030

BUCKET_ID_FUNC_OFFSET:  6a

FAILURE_BUCKET_ID:  0xa0_f0_partmgr!PM_DISK::Read

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fe745222-5d88-a69e-f077-955bb15cd442}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8028161a876, Address of the instruction which caused the bugcheck
Arg3: ffffca0062ff5920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4515

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10722

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8028161a876

BUGCHECK_P3: ffffca0062ff5920

BUGCHECK_P4: 0

CONTEXT:  ffffca0062ff5920 -- (.cxr 0xffffca0062ff5920)
rax=ffff9a05545d9ee8 rbx=ffff9a05513e3080 rcx=9a05545d9eb03a5d
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff9a05545d9ee0
rip=fffff8028161a876 rsp=ffffda03be5b8940 rbp=ffffda03be5b8a01
r8=0000000000000000  r9=000001152a550b14 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=9a05545d9eb03a5d
r14=0000000000000000 r15=ffff9a05513e31c0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!KeAbPreWait+0x6:
fffff802`8161a876 0fb64120        movzx   eax,byte ptr [rcx+20h] ds:002b:9a05545d`9eb03a7d=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

BAD_STACK_POINTER:  ffffca0062ff5018

STACK_TEXT:
ffffda03`be5b8940 fffff802`8186e51b     : ffffca00`000000c4 fffff802`81aefe11 000f8067`b4bbbd01 ffff9a05`513e31c0 : nt!KeAbPreWait+0x6
ffffda03`be5b8970 fffff802`81af1531     : ffff9a05`545d9ee0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18f9db
ffffda03`be5b8a60 fffff802`81af15da     : ffff9a05`513e3080 00000082`bb16fca8 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffffda03`be5b8ac0 fffff802`81805fb8     : 00000000`00000000 00000000`00000000 ffffda03`be5b8b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffda03`be5b8b00 00007ffd`10febe14     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000082`bb16fc78 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`10febe14


SYMBOL_NAME:  nt!KeAbPreWait+6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffca0062ff5920 ; kb

BUCKET_ID_FUNC_OFFSET:  6

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!KeAbPreWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ddcb9656-083d-2ea8-831a-b13145df4ef7}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffa4cb2be14
Arg3: 000000000000001d
Arg4: fffff10fb1dfeb00

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3671

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3705

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 7ffa4cb2be14

BUGCHECK_P3: 1d

BUGCHECK_P4: fffff10fb1dfeb00

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

STACK_TEXT:
fffff10f`b1dfe958 fffff801`83473a20     : 00000000`0000001a 00000000`00061941 00007ffa`4cb2be14 00000000`0000001d : nt!KeBugCheckEx
fffff10f`b1dfe960 fffff801`8340275e     : 000001f0`982f8a40 00000000`00000000 fffff10f`b1dfeb18 ffffffff`fffe7960 : nt!MmAccessFault+0x189840
fffff10f`b1dfeb00 00007ffa`4cb2be14     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000a3`9176f648 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4cb2be14


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: fffff80352e6b8f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80352e6b848, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4108

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12014

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 1e

BUGCHECK_P2: fffff80352e6b8f0

BUGCHECK_P3: fffff80352e6b848

BUGCHECK_P4: 0

IMAGE_NAME:  ntkrnlmp.exe

MODULE_NAME: ntkrnlmp

FAULTING_MODULE: fffff8034c800000 nt

TRAP_FRAME:  fffff80352e6b8f0 -- (.trap 0xfffff80352e6b8f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001e
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034ca5719a rsp=fffff80352e6ba80 rbp=0000000000000000
r8=00000000ffffffff  r9=0000000000000fff r10=00000000fffffffe
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiGroupSchedulingGenerationEnd+0xfa:
fffff803`4ca5719a cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff80352e6b848 -- (.exr 0xfffff80352e6b848)
ExceptionAddress: fffff8034ca5719a (nt!KiGroupSchedulingGenerationEnd+0x00000000000000fa)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001e
Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001e

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffff803`52e6b5c8 fffff803`4cc06569     : 00000000`00000139 00000000`0000001e fffff803`52e6b8f0 fffff803`52e6b848 : nt!KeBugCheckEx
fffff803`52e6b5d0 fffff803`4cc06990     : 00000000`00000000 00000000`00000fff 00000000`00000000 00000fd5`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`52e6b710 fffff803`4cc04d23     : ffffac87`c51b71f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff803`52e6b8f0 fffff803`4ca5719a     : fffff803`fffffffe fffff803`ffffffff 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff803`52e6ba80 fffff803`4ca58c3e     : fffff803`4af54180 00000000`00000000 00000000`0008095a 00000000`00000000 : nt!KiGroupSchedulingGenerationEnd+0xfa
fffff803`52e6bad0 fffff803`4ca581c8     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`52e6bb80 : nt!KiGroupSchedulingQuantumEnd+0xce
fffff803`52e6bb60 fffff803`4cbf8124     : 00000000`00000000 fffff803`4af54180 fffff803`4d527600 ffffac87`c94c5080 : nt!KiQuantumEnd+0x148
fffff803`52e6bc60 00000000`00000000     : fffff803`52e6c000 fffff803`52e66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0xb4


IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {64929928-a824-2134-285e-71128496d311}

Followup:     MachineOwner
---------
Kral bilgisayarı kuralı 1 hafta olmadı memtesti geçen cuma yaptım hata çıkmadı rampage drop plus kulaklık kullanıyorum 2 gün önce aldım usb ils kullanıyorum bunun dışında hdd almıştım onu d diski olarak tanımlamaya çalıştım ama yapamadım biçimlendirme sırasında hata oluştu bunlardan kaynaklı olabilir mi
 
MemTest'i geçen cuma yaptım, hata çıkmadı.
Yeniden yapın.

Bunun dışında HDD, almıştım onu D diski olarak tanımlamaya çalıştım ama yapamadım. Biçimlendirme sırasında hata oluştu. Bunlardan kaynaklı olabilir mi?
Diskten kaynaklı olabilme ihtimali de var.

HD Tune ile test yapabiliyor musunuz? Bir de mümkünse HD Tune yazılımının "Health" sekmesinden ve HDD Sentinel'den ekran görüntüsü atabilir misiniz?
 
  • MemTest86 ile belleklerde tarama yapın. Sorununuz bellek kaynaklı gibi duruyor.
  • Sesi USB'den alıyorsanız bir süre ilgili cihazı kullanmayınız.
  • Çipset sürücülerinizi güncelleyin.
  • HD Tune ile disklerinizde "Error Scan" yaparsanız iyi olur, ayrıca HDD Sentinel yazılımından tüm disklerinizin ekran görüntüsünü paylaşın.
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: fffffe86935b5a90, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffe86935b59e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5000

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10454

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 1e

BUGCHECK_P2: fffffe86935b5a90

BUGCHECK_P3: fffffe86935b59e8

BUGCHECK_P4: 0

IMAGE_NAME:  ntkrnlmp.exe

MODULE_NAME: ntkrnlmp

FAULTING_MODULE: fffff80559800000 nt

TRAP_FRAME:  fffffe86935b5a90 -- (.trap 0xfffffe86935b5a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000b rbx=0000000000000000 rcx=000000000000001e
rdx=fffff8055a4fdc80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80559c6b58d rsp=fffffe86935b5c20 rbp=ffffe600201de180
r8=0000000000000000  r9=fffffe86935b5fb0 r10=0000000000000000
r11=0000000000000029 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeQueryValuesThread+0x1957dd:
fffff805`59c6b58d cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffffe86935b59e8 -- (.exr 0xfffffe86935b59e8)
ExceptionAddress: fffff80559c6b58d (nt!KeQueryValuesThread+0x00000000001957dd)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001e
Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001e

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffffe86`935b5768 fffff805`59c06569     : 00000000`00000139 00000000`0000001e fffffe86`935b5a90 fffffe86`935b59e8 : nt!KeBugCheckEx
fffffe86`935b5770 fffff805`59c06990     : ffffe600`207d5180 fffff805`59bfb7b2 000f8067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffe86`935b58b0 fffff805`59c04d23     : 00000000`00000000 00000000`000000ff 00000000`00000001 00000000`000001f0 : nt!KiFastFailDispatch+0xd0
fffffe86`935b5a90 fffff805`59c6b58d     : ffff8b81`100125c0 01f000d0`000000d0 00740073`00000000 00320033`006d0065 : nt!KiRaiseSecurityCheckFailure+0x323
fffffe86`935b5c20 fffff805`59edb3e1     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x1957dd
fffffe86`935b5ca0 fffff805`59edb072     : ffff8b81`1e31e660 ffff8b81`1e31e8e0 ffff8b81`1ca21080 00000000`00000002 : nt!PsQueryStatisticsProcess+0x111
fffffe86`935b5d20 fffff805`59eeeca1     : 00000000`00000002 ffff8b81`1e31e080 00000000`ffffffff 00000000`00000000 : nt!ExpCopyProcessInfo+0x42
fffffe86`935b5da0 fffff805`59ef21e3     : ffffe0f0`783c1e08 00000000`00047328 00000000`01440000 00000000`00000000 : nt!ExpGetProcessInformation+0x9f1
fffffe86`935b6400 fffff805`59ef18c7     : ffff8b81`1ca21080 00000000`00000000 00000000`00000000 00000000`09aef820 : nt!ExpQuerySystemInformation+0x7d3
fffffe86`935b6ac0 fffff805`59c05fb8     : 00000000`03ea0000 00000000`00000000 fffffe86`935b6b18 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37
fffffe86`935b6b00 00007ffb`8ba4c454     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`099ee448 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8ba4c454


IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {64929928-a824-2134-285e-71128496d311}

Followup:     MachineOwner
---------

INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 00000000000000f0, The system failed to complete(suspend) a power transition in a timely manner.
Arg2: 0000000000000005, The system power state in transition.
Arg3: 000000000000000d, The sleep checkpoint most recently reached.
Arg4: ffffac8ba5c96040, A pointer to the thread currently processing the request.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8720

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a0

BUGCHECK_P1: f0

BUGCHECK_P2: 5

BUGCHECK_P3: d

BUGCHECK_P4: ffffac8ba5c96040

FAULTING_THREAD:  ffffac8ba5c96040

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffff8188`f7b510d0 fffff802`100dffa0     : ffff9800`00000000 00000000`00000000 00000000`00000200 fffff802`00000000 : nt!KiSwapContext+0x76
ffff8188`f7b51210 fffff802`100df4cf     : ffffac8b`00000004 00000000`00000008 ffff8188`f7b513d0 ffff8188`00000000 : nt!KiSwapThread+0x500
ffff8188`f7b512c0 fffff802`100ded73     : 00000000`00000000 00000000`00000000 ffffac8b`a57f4000 ffffac8b`a5c96180 : nt!KiCommitThreadWait+0x14f
ffff8188`f7b51360 fffff802`10099f96     : ffff8188`f7b51480 fffff802`00000005 ffff8188`f7b51500 ffffac8b`a57f4000 : nt!KeWaitForSingleObject+0x233
ffff8188`f7b51450 fffff802`14a0329a     : ffff8188`f7b51830 00000000`00000000 00000000`00000200 00000000`00000000 : nt!IoSynchronousCallDriver+0x76
ffff8188`f7b514b0 fffff802`149e9cae     : ffff8188`f7b515f0 00000000`00000000 ffff8188`00000000 fffff802`149e9d06 : partmgr!PM_DISK::Read+0x6a
ffff8188`f7b514f0 fffff802`149e9bf8     : ffff8188`f7b515f0 00000000`00000001 ffff8188`f7b51701 ffff8188`00000000 : partmgr!SC_DISK::ReadSectors+0x36
ffff8188`f7b51530 fffff802`149e9bc6     : ffff8188`f7b515f0 ffff8188`00000018 00000000`00000000 ffffac8b`a6f97990 : partmgr!SC_DISK::ResetPartitionCache+0x1c
ffff8188`f7b51560 fffff802`14a02146     : ffffac8b`9cbe08d0 ffff8188`f7b51701 00000000`00000000 ffffac8b`a6f97901 : partmgr!SC_DISK::InitializePartitionCache+0x32
ffff8188`f7b51590 fffff802`14a017ae     : ffffac8b`9c1b31b0 ffff8188`f7b517e8 ffffac8b`a6f977a0 fffff802`100ceb87 : partmgr!PM_DISK::Initialize+0x4e
ffff8188`f7b515c0 fffff802`149e1581     : ffffac8b`a06981b8 ffffac8b`9c1b31b0 ffffac8b`9c1b31b0 ffffac8b`a06981b8 : partmgr!PmReadPartitionTable+0x4e
ffff8188`f7b51780 fffff802`14a05554     : ffffac8b`9cbe0a00 00000000`00000000 ffffac8b`9cbe0a58 fffff802`100c2f00 : partmgr!PmGetDriveLayoutEx+0x195
ffff8188`f7b517e0 fffff802`149ec9f9     : 00000000`00000000 ffffac8b`a0698010 ffffac8b`9cbe08d0 ffffac8b`a804a740 : partmgr!PmIoctlGetDriveLayout+0x64
ffff8188`f7b51830 fffff802`149e3cff     : 00000000`00000000 ffffac8b`a0698010 ffffac8b`a0698200 ffff8188`f7b519a0 : partmgr!PmFilterDeviceControl+0xa8b9
ffff8188`f7b51880 fffff802`100cd805     : 00000000`00000880 fffff802`10002223 00000000`00000000 fffff802`100cb06f : partmgr!PmGlobalDispatch+0x1f
ffff8188`f7b518b0 fffff802`103cfee8     : ffff8188`f7b519a0 ffff8188`f7b51934 00000000`00000000 ffffac8b`a5e14000 : nt!IofCallDriver+0x55
ffff8188`f7b518f0 fffff802`103cfcb8     : ffffac8b`a0698010 00000000`00000002 ffffac8b`a575ce10 fffff802`10ae0340 : nt!RawReadWriteDeviceControl+0xa0
ffff8188`f7b51920 fffff802`100cd805     : ffffac8b`a608fda0 00000000`00000001 ffffac8b`a0698010 ffffac8b`a0698010 : nt!RawDispatch+0x78
ffff8188`f7b51970 fffff802`0ecf4906     : 00000000`00000000 ffffac8b`a8545170 00000000`00000000 fffff802`104efe11 : nt!IofCallDriver+0x55
ffff8188`f7b519b0 fffff802`100cd805     : ffffac8b`a0698010 00000000`00000000 ffff8188`20206f49 00000000`00000000 : FLTMGR!FltpDispatch+0xd6
ffff8188`f7b51a10 fffff802`104c2528     : ffff8188`f7b51d90 ffffac8b`a0698010 00000000`00000001 ffffac8b`99aa0040 : nt!IofCallDriver+0x55
ffff8188`f7b51a50 fffff802`104c1df5     : 00000000`0007400c ffff8188`f7b51d90 00000000`00000000 ffff8188`f7b51d90 : nt!IopSynchronousServiceTail+0x1a8
ffff8188`f7b51af0 fffff802`104c17f6     : 00000004`0000000f 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff8188`f7b51c30 fffff802`10205fb8     : ffff8188`f7b51d84 ffffdd83`895ec748 00000000`00000000 fffff802`10070ffa : nt!NtDeviceIoControlFile+0x56
ffff8188`f7b51ca0 fffff802`101f8400     : fffff802`10645474 00000000`c0000185 00000000`00000808 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffff8188`f7b51ea8 fffff802`10645474     : 00000000`c0000185 00000000`00000808 00000000`00000000 ffff8188`00000000 : nt!KiServiceLinkage
ffff8188`f7b51eb0 fffff802`10569023     : 00000000`00000000 ffff8188`f7b51fb0 ffff8188`f7b52068 ffff8188`f7b52068 : nt!BiIssueGetDriveLayoutIoctl+0xdc420
ffff8188`f7b51f30 fffff802`105666f5     : ffffdd83`8a777908 ffff8188`f7b52130 ffffffff`80004d10 ffffdd83`8afe4000 : nt!BiGetDriveLayoutInformation+0x97
ffff8188`f7b51fc0 fffff802`1056630b     : ffffdd83`8a777908 00000000`00000000 ffff8188`f7b520f0 00000000`00000000 : nt!BiGetDriveLayoutBlock+0x3d
ffff8188`f7b51ff0 fffff802`10565fff     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!BiGetNtPartitionPath+0x243
ffff8188`f7b521a0 fffff802`10568812     : ffff8188`00000000 ffff8188`11000001 00000000`00000000 ffff8188`f7b52270 : nt!BiConvertBootEnvironmentDeviceToNt+0xab
ffff8188`f7b52240 fffff802`10567cd1     : 00000000`00000000 ffffffff`800018d0 ffffdd83`8888bf30 ffff8188`00000000 : nt!BiConvertRegistryDataToElement+0xe2
ffff8188`f7b522c0 fffff802`10566e25     : ffff8188`c0000034 ffff8188`f7b52508 ffff8188`f7b527a8 00000000`00000000 : nt!BcdGetElementDataWithFlags+0x191
ffff8188`f7b523d0 fffff802`105668dd     : ffffffff`80001990 ffff8188`f7b52490 00000000`00000000 ffffffff`80001990 : nt!PopBcdReadElement+0x39
ffff8188`f7b52420 fffff802`10565d31     : ffffffff`80001990 ffffffff`800019a0 00000000`00000000 00000000`00000000 : nt!PopBcdSetDefaultResumeObjectElements+0x69
ffff8188`f7b524c0 fffff802`1055b5df     : ffffac8b`9ccf4230 fffff802`0000352c ffffac8b`9ccf4230 ffffd8ee`c1c10150 : nt!PopBcdEstablishResumeObject+0x131
ffff8188`f7b52560 fffff802`1078df89     : ffff8188`f7b50000 00000000`00000000 ffffffff`800019a0 00000000`00000000 : nt!PopAllocateHiberContext+0x20b
ffff8188`f7b525e0 fffff802`107947dc     : ffffac8b`a4b5d000 ffffac8b`00000006 00000000`00000002 00000000`00000070 : nt!PopTransitionSystemPowerStateEx+0x4b5
ffff8188`f7b526a0 fffff802`10205fb8     : 7ffff802`10a24fd0 00000000`ffffffff 00000000`00000000 ffffac8b`a5c966e0 : nt!NtSetSystemPowerState+0x4c
ffff8188`f7b52880 fffff802`101f8400     : fffff802`10559f0e 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffff8188`f7b52a18 fffff802`10559f0e     : 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
ffff8188`f7b52a20 fffff802`10559bd9     : 00000000`00000000 ffffac8b`99a6aac0 00000000`00000000 00000000`00000000 : nt!PopIssueActionRequest+0x216
ffff8188`f7b52ac0 fffff802`100a0e74     : 00000000`00000001 00000000`00000000 ffffffff`ffffffff fffff802`10a23b00 : nt!PopPolicyWorkerAction+0x79
ffff8188`f7b52b30 fffff802`101035f5     : ffffac8b`00000001 ffffac8b`a5c96040 fffff802`100a0de0 ffffac8b`00000000 : nt!PopPolicyWorkerThread+0x94
ffff8188`f7b52b70 fffff802`100a2ae5     : ffffac8b`a5c96040 00000000`00000080 ffffac8b`99aa0040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8188`f7b52c10 fffff802`101fbbf8     : ffff9800`4f4cf180 ffffac8b`a5c96040 fffff802`100a2a90 80002400`b7a89faf : nt!PspSystemThreadStartup+0x55
ffff8188`f7b52c60 00000000`00000000     : ffff8188`f7b53000 ffff8188`f7b4d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  .thread 0xffffac8ba5c96040 ; kb

SYMBOL_NAME:  partmgr!PM_DISK::Read+6a

MODULE_NAME: partmgr

IMAGE_NAME:  partmgr.sys

IMAGE_VERSION:  10.0.19041.1030

BUCKET_ID_FUNC_OFFSET:  6a

FAILURE_BUCKET_ID:  0xa0_f0_partmgr!PM_DISK::Read

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fe745222-5d88-a69e-f077-955bb15cd442}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8028161a876, Address of the instruction which caused the bugcheck
Arg3: ffffca0062ff5920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4515

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10722

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8028161a876

BUGCHECK_P3: ffffca0062ff5920

BUGCHECK_P4: 0

CONTEXT:  ffffca0062ff5920 -- (.cxr 0xffffca0062ff5920)
rax=ffff9a05545d9ee8 rbx=ffff9a05513e3080 rcx=9a05545d9eb03a5d
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff9a05545d9ee0
rip=fffff8028161a876 rsp=ffffda03be5b8940 rbp=ffffda03be5b8a01
r8=0000000000000000  r9=000001152a550b14 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=9a05545d9eb03a5d
r14=0000000000000000 r15=ffff9a05513e31c0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!KeAbPreWait+0x6:
fffff802`8161a876 0fb64120        movzx   eax,byte ptr [rcx+20h] ds:002b:9a05545d`9eb03a7d=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

BAD_STACK_POINTER:  ffffca0062ff5018

STACK_TEXT:
ffffda03`be5b8940 fffff802`8186e51b     : ffffca00`000000c4 fffff802`81aefe11 000f8067`b4bbbd01 ffff9a05`513e31c0 : nt!KeAbPreWait+0x6
ffffda03`be5b8970 fffff802`81af1531     : ffff9a05`545d9ee0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18f9db
ffffda03`be5b8a60 fffff802`81af15da     : ffff9a05`513e3080 00000082`bb16fca8 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffffda03`be5b8ac0 fffff802`81805fb8     : 00000000`00000000 00000000`00000000 ffffda03`be5b8b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffda03`be5b8b00 00007ffd`10febe14     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000082`bb16fc78 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`10febe14


SYMBOL_NAME:  nt!KeAbPreWait+6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffca0062ff5920 ; kb

BUCKET_ID_FUNC_OFFSET:  6

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!KeAbPreWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ddcb9656-083d-2ea8-831a-b13145df4ef7}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffa4cb2be14
Arg3: 000000000000001d
Arg4: fffff10fb1dfeb00

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3671

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3705

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 7ffa4cb2be14

BUGCHECK_P3: 1d

BUGCHECK_P4: fffff10fb1dfeb00

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

STACK_TEXT:
fffff10f`b1dfe958 fffff801`83473a20     : 00000000`0000001a 00000000`00061941 00007ffa`4cb2be14 00000000`0000001d : nt!KeBugCheckEx
fffff10f`b1dfe960 fffff801`8340275e     : 000001f0`982f8a40 00000000`00000000 fffff10f`b1dfeb18 ffffffff`fffe7960 : nt!MmAccessFault+0x189840
fffff10f`b1dfeb00 00007ffa`4cb2be14     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000a3`9176f648 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4cb2be14


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: fffff80352e6b8f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80352e6b848, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4108

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12014

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 1e

BUGCHECK_P2: fffff80352e6b8f0

BUGCHECK_P3: fffff80352e6b848

BUGCHECK_P4: 0

IMAGE_NAME:  ntkrnlmp.exe

MODULE_NAME: ntkrnlmp

FAULTING_MODULE: fffff8034c800000 nt

TRAP_FRAME:  fffff80352e6b8f0 -- (.trap 0xfffff80352e6b8f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001e
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034ca5719a rsp=fffff80352e6ba80 rbp=0000000000000000
r8=00000000ffffffff  r9=0000000000000fff r10=00000000fffffffe
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiGroupSchedulingGenerationEnd+0xfa:
fffff803`4ca5719a cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff80352e6b848 -- (.exr 0xfffff80352e6b848)
ExceptionAddress: fffff8034ca5719a (nt!KiGroupSchedulingGenerationEnd+0x00000000000000fa)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001e
Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001e

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffff803`52e6b5c8 fffff803`4cc06569     : 00000000`00000139 00000000`0000001e fffff803`52e6b8f0 fffff803`52e6b848 : nt!KeBugCheckEx
fffff803`52e6b5d0 fffff803`4cc06990     : 00000000`00000000 00000000`00000fff 00000000`00000000 00000fd5`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`52e6b710 fffff803`4cc04d23     : ffffac87`c51b71f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff803`52e6b8f0 fffff803`4ca5719a     : fffff803`fffffffe fffff803`ffffffff 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff803`52e6ba80 fffff803`4ca58c3e     : fffff803`4af54180 00000000`00000000 00000000`0008095a 00000000`00000000 : nt!KiGroupSchedulingGenerationEnd+0xfa
fffff803`52e6bad0 fffff803`4ca581c8     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`52e6bb80 : nt!KiGroupSchedulingQuantumEnd+0xce
fffff803`52e6bb60 fffff803`4cbf8124     : 00000000`00000000 fffff803`4af54180 fffff803`4d527600 ffffac87`c94c5080 : nt!KiQuantumEnd+0x148
fffff803`52e6bc60 00000000`00000000     : fffff803`52e6c000 fffff803`52e66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0xb4


IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {64929928-a824-2134-285e-71128496d311}

Followup:     MachineOwner
---------
Dediğim gibi bilgisayar yeni olduğu için güncel driverlerin hepsi şuan sadece m2 ssd mevcut dediğiniz gibi fotoğraflarını paylaşırım şuan internet bağlantısında sorun var bilgisayarda teşekkür ederim yardımınız için
Yeniden yapın.


Diskten kaynaklı olabilme ihtimali de var.

HD Tune ile test yapabiliyor musunuz? Bir de mümkünse HD Tune yazılımının "Health" sekmesinden ve HDD Sentinel'den ekran görüntüsü atabilir misiniz?
hocam hdd şuan yok pc de m2 ssd kullanıyorum sadece sanırım hd tune sadece hdd için
Yeniden yapın.


Diskten kaynaklı olabilme ihtimali de var.

HD Tune ile test yapabiliyor musunuz? Bir de mümkünse HD Tune yazılımının "Health" sekmesinden ve HDD Sentinel'den ekran görüntüsü atabilir misiniz?
günaydın gece memtest86 yı yaptım hata bulamadı . Geriye usb ile kullandığım kulaklık ve depolama ihtimali kalıyor m2 ssd kullanıyorum ne yapmalıyım
 
Son düzenleme:

Geri
Yukarı