R5 3500X 1660 Ti Sistem Mavi Ekran

İşletim sistemi
Windows 10
Katılım
24 Kasım 2018
Mesajlar
130
RAM
8gb 3200mhz 16cl
SSD veya HDD modeli
Seagate 1tb harddisk
Ekran kartı
GTX 1660ti
Anakart
Gigabyte b450m s2h
İşlemci
Ryzen 5 3500x
Bilgisayar mavi ekrandan dolayı açılmıyordu ve bilgisayarcıdan yardım almıştım her türlü parçayı denemiş ama format atamamisti bilgisayarcı hard diski hazır kurup taktığın da çalışmıştı sadece ve 1-2 gün sorun olmadı sonra günde bir kez hata vermeye başladı ve şu an 8-9 kez veriyor "minidump dosyaları. RAR" dosyasını görüntüle veya indir minidump dosyaları.rar
 
Ekran kartı sürücüleri, USB aygıtlarından biri veya sürücüsü, HD Audio sürücüsü vb. ile alakalı problemler var gibi görünüyor.

- İşletim sisteminizi Windows Update üzerinden son çıkan sürüme güncelleyin.

- Realtek HD Audio sürücüsünü güncelleyin: Realtek HD Audio Driver - [6.0.9225.1]

- Chipset sürücülerinizi AMD sitesinden indirip güncelleyin: B450 Drivers & Support

- Aşağıdaki adımları takip ederek ekran kartı sürücülerinizi DDU ile kaldırın ve tekrar yükleyin.

  • - Güncel sürücüyü indirin: GTX 1660 Ti - 517.48 WHQL sürücüsü
    - İndirdikten sonra başlattaki arama yerine Aygıt yükleme ayarlarını değiştir yazın.
    - Çıkan pencereyi Hayır olarak seçin ve kapatın.
    - Daha sonra DDU ile Sürücü Kaldırma rehberini takip edin.
    - Sürücüyü kaldırdıktan sonra bilgisayar yeniden başlayacak.
    - Bilgisayar açılınca indirdiğiniz sürücüyü kurun.
    - Kurduktan sonra tekrar Aygıt yükleme ayarlarını değiştir yazıp o kısmı "Evet" seçebilirsiniz.

- Gigabyte B450M S2H destek sayfasından indirdiğiniz USB Charger sürücüsünü şimdilik kaldırın. Yüklenemeyen modüller listesinde görünüyor hem de tüm mavi ekran dökümlerinde.

- CMD'yi yönetici olarak çalıştırıp aşağıdaki üç komutu sırayla girin. Biri bitince diğerini girin ve sonuçları paylaşın.

SFC /scannow DISM /Online /Cleanup-Image /RestoreHealth chkdsk /f /r

Aygıt yöneticisinde ünlem işareti olan herhangi bir aygıt veya sürücü var mı diye kontrol edin. Fare ve diğer işaret aygıtları vb. hepsine bakın. Örnek olarak:

1.png



Hatalar devam ederse:

- Dökümlerden birinde HIDCLASS.SYS sürücüsü ile ilgili hata almışsınız. Güncel olmayan aygıt sürücüleri ile alakalı gibi. Klavye ve fare dışında tüm USB aygıtlarını şimdilik sökün. Hatta klavye ve fare ikilisinden biriyle bile alakalı olabilir.

- HD Tune indirip disk sağlığını "Quick scan" kapalı olacak şekilde kontrol edip sonucu paylaşırsınız.


Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8057f470010, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff8057f46ff68, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1890

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9406

    Key  : Analysis.Init.CPU.mSec
    Value: 92

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7366

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 141

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x139

    Key  : Bugcheck.Code.Register
    Value: 0x139

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  092822-23078-01.dmp

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff8057f470010

BUGCHECK_P3: fffff8057f46ff68

BUGCHECK_P4: 0

TRAP_FRAME:  fffff8057f470010 -- (.trap 0xfffff8057f470010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8f0dac65fac8 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff8057f470250 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80579a6aefc rsp=fffff8057f4701a0 rbp=0000000000000002
 r8=0000000000000009  r9=ffff8f0dac3d1250 r10=fffff8057c51b9f0
r11=fffff8057f470170 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
HIDCLASS!HidpDistributeInterruptReport+0x3fc:
fffff805`79a6aefc cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff8057f46ff68 -- (.exr 0xfffff8057f46ff68)
ExceptionAddress: fffff80579a6aefc (HIDCLASS!HidpDistributeInterruptReport+0x00000000000003fc)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffff805`7f46fce8 fffff805`7c60af69     : 00000000`00000139 00000000`00000003 fffff805`7f470010 fffff805`7f46ff68 : nt!KeBugCheckEx
fffff805`7f46fcf0 fffff805`7c60b390     : ffff8f0d`a8599de0 ffff8f0d`a858c010 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`7f46fe30 fffff805`7c609723     : fffff55f`409d5bc8 fffff57a`afa04ea8 fffff57a`bd57d020 fffff57a`bd5eabe8 : nt!KiFastFailDispatch+0xd0
fffff805`7f470010 fffff805`79a6aefc     : ffff8f0d`a3852358 ffff8f0d`af0f5102 00000000`00000002 00000000`00000009 : nt!KiRaiseSecurityCheckFailure+0x323
fffff805`7f4701a0 fffff805`79a6a7ed     : ffff8f0d`af0f51d0 ffff8f0d`af0f5102 ffff8f0d`af0f51d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3fc
fffff805`7f4702a0 fffff805`7c41fe6e     : ffff8f0d`aee8d010 ffff8f0d`aee8d010 fffff805`7f470301 ffff8f0d`aee8d3fb : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff805`7f470340 fffff805`7c41fd37     : 00000000`00000001 00000000`00000000 ffff8f0d`adff3630 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff805`7f470430 fffff805`7ddb811a     : 00000000`00000000 ffff8f0d`a3019cb0 ffff8f0d`aee8d010 fffff805`7f470510 : nt!IofCompleteRequest+0x17
fffff805`7f470460 fffff805`7ddb5bbf     : ffff8f0d`aa939102 ffff8f0d`aee77050 ffff8f0d`aee8d010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff805`7f4704f0 fffff805`810ecb4c     : 00000000`ffffff02 ffff8f0d`aa939020 ffff8f0d`adff3a10 ffff8f0d`adff3a10 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff805`7f470550 fffff805`810eca11     : ffff8f0d`aa9391c0 00000000`00000008 ffff8f0d`aa939250 fffff805`7f470768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff805`7f4705b0 fffff805`810ec800     : 00000000`00000004 fffff805`7f470720 00000000`00000000 ffff8f0d`aab0b660 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff805`7f470660 fffff805`810e7100     : 00000000`00000004 fffff805`7f470738 00000000`00000008 fffff805`7f470740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff805`7f470690 fffff805`810e6c35     : 00000000`00000780 000070f2`5c3dff00 ffff8f0d`a76fd1d0 ffff8f0d`af2f9cf0 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff805`7f4706f0 fffff805`810e690c     : ffff8f0d`a15f72d0 ffff8f0d`a14de5c0 000070f2`5c8849b8 ffff8f0d`a15f7000 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff805`7f4707f0 fffff805`7ddb38f5     : 00000000`00000f44 00000000`00400a02 00000000`00000000 00004359`0b60f35c : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff805`7f470820 fffff805`7c43489e     : fffff805`7748d240 ffff8f0d`a14da000 fffff805`7f470b40 fffff805`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff805`7f470860 fffff805`7c433b84     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff805`7f4709d0 fffff805`7c5fcb3e     : 00000000`00000000 fffff805`7748a180 fffff805`7cf27a00 ffff8f0d`ac7ea080 : nt!KiRetireDpcList+0x1f4
fffff805`7f470c60 00000000`00000000     : fffff805`7f471000 fffff805`7f46b000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  HIDCLASS!HidpDistributeInterruptReport+3fc

MODULE_NAME: HIDCLASS

IMAGE_NAME:  HIDCLASS.SYS

IMAGE_VERSION:  10.0.19041.868

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  3fc

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_HIDCLASS!HidpDistributeInterruptReport

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {bb453199-d75e-af6d-39db-a19f4a74367d}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80648470010, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff8064846ff68, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1765

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6150

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5651

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 142

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x139

    Key  : Bugcheck.Code.Register
    Value: 0x139

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  092922-21390-01.dmp

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff80648470010

BUGCHECK_P3: fffff8064846ff68

BUGCHECK_P4: 0

TRAP_FRAME:  fffff80648470010 -- (.trap 0xfffff80648470010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd0811c1a3ac8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806531caefc rsp=fffff806484701a0 rbp=0000000000000003
 r8=01d8d42e86ad8a3f  r9=ffffd0811c553b10 r10=fffff8064331b9f0
r11=fffff80648470170 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
HIDCLASS!HidpDistributeInterruptReport+0x3fc:
fffff806`531caefc cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff8064846ff68 -- (.exr 0xfffff8064846ff68)
ExceptionAddress: fffff806531caefc (HIDCLASS!HidpDistributeInterruptReport+0x00000000000003fc)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffff806`4846fce8 fffff806`4340af69     : 00000000`00000139 00000000`00000003 fffff806`48470010 fffff806`4846ff68 : nt!KeBugCheckEx
fffff806`4846fcf0 fffff806`4340b390     : ffffd081`1c7b3e10 ffffd081`1c802050 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff806`4846fe30 fffff806`43409723     : ffff8547`c0392e60 ffff8542`a3e01c90 ffff8542`a151f008 ffff8542`a150a8f8 : nt!KiFastFailDispatch+0xd0
fffff806`48470010 fffff806`531caefc     : ffffd081`238672e8 ffffd081`1c80b102 00000000`00000002 00000000`00000009 : nt!KiRaiseSecurityCheckFailure+0x323
fffff806`484701a0 fffff806`531ca7ed     : ffffd081`1c80b1d0 ffffd081`1c80b102 ffffd081`1c80b1d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3fc
fffff806`484702a0 fffff806`4321fe6e     : ffffd081`1c8025a0 ffffd081`1c8025a0 fffff806`48470301 ffffd081`1c80298b : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff806`48470340 fffff806`4321fd37     : 00000000`00000001 00000000`00000000 ffffd081`1c80e570 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff806`48470430 fffff806`46db811a     : 00000000`00000000 ffffd081`16c9fcb0 ffffd081`1c8025a0 fffff806`48470510 : nt!IofCompleteRequest+0x17
fffff806`48470460 fffff806`46db5bbf     : ffffd081`227d1c02 ffffd081`22130820 ffffd081`1c8025a0 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff806`484704f0 fffff806`4860cb4c     : 00000000`ffffff02 ffffd081`227d1b30 ffffd081`1c80e950 ffffd081`1c80e950 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff806`48470550 fffff806`4860ca11     : ffffd081`227d1cd0 00000000`00000008 ffffd081`227d1d60 fffff806`48470768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff806`484705b0 fffff806`4860c800     : 00000000`00000004 fffff806`48470720 00000000`00000000 ffffd081`1c7ee660 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff806`48470660 fffff806`48607100     : 00000000`00000004 fffff806`48470738 00000000`00000008 fffff806`48470740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff806`48470690 fffff806`48606c35     : 00000000`00000780 00002f7e`e99a2300 ffffd081`1b6ff220 ffffd081`1c57dce0 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff806`484706f0 fffff806`4860690c     : ffffd081`1b99c328 fffff806`4047f180 00002f7e`e9356338 fffff806`48470810 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff806`484707f0 fffff806`46db38f5     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff806`48470820 fffff806`4323489e     : fffff806`40482240 00000000`00000000 fffff806`48470b20 fffff806`4047f180 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff806`48470860 fffff806`43233b84     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff806`484709d0 fffff806`433fcb3e     : 00000000`00000000 fffff806`4047f180 fffff806`43d27a00 ffffd081`213fd080 : nt!KiRetireDpcList+0x1f4
fffff806`48470c60 00000000`00000000     : fffff806`48471000 fffff806`4846b000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  HIDCLASS!HidpDistributeInterruptReport+3fc

MODULE_NAME: HIDCLASS

IMAGE_NAME:  HIDCLASS.SYS

IMAGE_VERSION:  10.0.19041.868

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  3fc

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_HIDCLASS!HidpDistributeInterruptReport

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {bb453199-d75e-af6d-39db-a19f4a74367d}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8004bc70310, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff8004bc70268, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1875

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 51555

    Key  : Analysis.Init.CPU.mSec
    Value: 125

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4142

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 135

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x139

    Key  : Bugcheck.Code.Register
    Value: 0x139

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  092922-21531-01.dmp

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff8004bc70310

BUGCHECK_P3: fffff8004bc70268

BUGCHECK_P4: 0

TRAP_FRAME:  fffff8004bc70310 -- (.trap 0xfffff8004bc70310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb68f46702000 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8005686b884 rsp=fffff8004bc704a0 rbp=ffffb68f4a067010
 r8=ffffb68f461c7ec0  r9=0000000000000000 r10=0000000000000002
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
dxgmms2!VidSchDdiNotifyDpc+0x14694:
fffff800`5686b884 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff8004bc70268 -- (.exr 0xfffff8004bc70268)
ExceptionAddress: fffff8005686b884 (dxgmms2!VidSchDdiNotifyDpc+0x0000000000014694)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffff800`4bc6ffe8 fffff800`45e0af69     : 00000000`00000139 00000000`00000003 fffff800`4bc70310 fffff800`4bc70268 : nt!KeBugCheckEx
fffff800`4bc6fff0 fffff800`45e0b390     : 00000000`00055302 fffff800`463b2000 00000000`00000000 ffffb68f`4a08c6d0 : nt!KiBugCheckDispatch+0x69
fffff800`4bc70130 fffff800`45e09723     : ffffb68f`4a08c658 ffffb68f`4a08c658 ffffb68f`4a106910 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff800`4bc70310 fffff800`5686b884     : 00000000`00000000 00000000`00989680 00000000`00000101 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff800`4bc704a0 fffff800`4bf9d5d1     : fffff800`4bc70599 00000000`00000000 ffffb68f`46705520 00000457`c5b0a780 : dxgmms2!VidSchDdiNotifyDpc+0x14694
fffff800`4bc70550 fffff800`56ae2a69     : ffffb68f`46683030 00000000`00000000 ffffb68f`46683030 ffffb68f`46702000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff800`4bc70600 ffffb68f`46683030     : 00000000`00000000 ffffb68f`46683030 ffffb68f`46702000 fffff800`56ae29ee : nvlddmkm+0x62a69
fffff800`4bc70608 00000000`00000000     : ffffb68f`46683030 ffffb68f`46702000 fffff800`56ae29ee ffffb68f`46702000 : 0xffffb68f`46683030


SYMBOL_NAME:  dxgmms2!VidSchDdiNotifyDpc+14694

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.1940

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  14694

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchDdiNotifyDpc

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2680cc95-c3eb-4ecf-e7af-fb371282c295}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80300000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80300000000, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5757

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1831

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 137

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  092822-24000-01.dmp

BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff80300000000

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff80300000000

READ_ADDRESS: fffff80328efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff80300000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffffcb839e25a550 -- (.trap 0xffffcb839e25a550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000234376f000 rbx=0000000000000000 rcx=00000000c0000102
rdx=0000000000000023 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80300000000 rsp=ffffcb839e25a6e0 rbp=0000000000000000
 r8=0000000000000020  r9=0000000000000001 r10=00000000000003a8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
fffff803`00000000 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
fffff803`00000000 ??              ???

STACK_TEXT:
ffffcb83`9e25a408 fffff803`2860af69     : 00000000`0000000a fffff803`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffcb83`9e25a410 fffff803`28607269     : 00000000`00000000 fffff803`28422816 ffffb480`00000000 ffff8e83`e53da080 : nt!KiBugCheckDispatch+0x69
ffffcb83`9e25a550 fffff803`00000000     : 00000000`00000000 ffff8e83`e2956870 ffff9706`736f6455 00000000`00000000 : nt!KiPageFault+0x469
ffffcb83`9e25a6e0 00000000`00000000     : ffff8e83`e2956870 ffff9706`736f6455 00000000`00000000 00000000`00000000 : 0xfffff803`00000000


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup:     MachineOwner
---------
 
Ekran kartı sürücüleri, USB aygıtlarından biri veya sürücüsü, HD Audio sürücüsü vb. ile alakalı problemler var gibi görünüyor.

- İşletim sisteminizi Windows Update üzerinden son çıkan sürüme güncelleyin.

- Realtek HD Audio sürücüsünü güncelleyin: Realtek HD Audio Driver - [6.0.9225.1]

- Chipset sürücülerinizi AMD sitesinden indirip güncelleyin: B450 Drivers & Support

- Aşağıdaki adımları takip ederek ekran kartı sürücülerinizi DDU ile kaldırın ve tekrar yükleyin.

  • - güncel sürücüyü indirin: GTX 1660 Ti - 517.48 WHQL sürücüsü
    - İndirdikten sonra başlattaki arama yerine aygıt yükleme ayarlarını değiştir yazın.
    - Çıkan pencereyi hayır olarak seçin ve kapatın.
    - Daha sonra DDU ile Sürücü Kaldırma rehberini takip edin.
    - Sürücüyü kaldırdıktan sonra bilgisayar yeniden başlayacak.
    - Bilgisayar açılınca indirdiğiniz sürücüyü kurun.
    - Kurduktan sonra tekrar aygıt yükleme ayarlarını değiştir yazıp o kısmı "evet" seçebilirsiniz.

- Gigabyte B450M S2H destek sayfasından indirdiğiniz USB charger sürücüsünü şimdilik kaldırın. Yüklenemeyen modüller listesinde görünüyor hem de tüm mavi ekran dökümlerinde.

- CMD'yi yönetici olarak çalıştırıp aşağıdaki üç komutu sırayla girin. Biri bitince diğerini girin ve sonuçları paylaşın.

SFC /scannow DISM /Online /Cleanup-Image /RestoreHealth chkdsk /f /r

Aygıt yöneticisinde ünlem işareti olan herhangi bir aygıt veya sürücü var mı diye kontrol edin. fare ve diğer işaret aygıtları vb. hepsine bakın. Örnek olarak:

Eki Görüntüle 1531865

hatalar devam ederse:

- Dökümlerden birinde HIDCLASS.SYS sürücüsü ile ilgili hata almışsınız. Güncel olmayan aygıt sürücüleri ile alakalı gibi. Klavye ve fare dışında tüm USB aygıtlarını şimdilik sökün. Hatta klavye ve fare ikilisinden biriyle bile alakalı olabilir.

- HD Tune indirip disk sağlığını "quick scan" kapalı olacak şekilde kontrol edip sonucu paylaşırsınız.

Dökümler:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8057f470010, Address of the trap frame for the exception that caused the BugCheck.
Arg3: fffff8057f46ff68, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1890.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 9406.

 Key : Analysis.Init.CPU.mSec
 Value: 92.

 Key : Analysis.Init.Elapsed.mSec
 Value: 7366.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 141.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x139.

 Key : Bugcheck.Code.Register
 Value: 0x139.

 Key : FailFast.Name
 Value: CORRUPT_LIST_ENTRY.

 Key : FailFast.Type
 Value: 3

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 092822-23078-01.dmp

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: fffff8057f470010.

BUGCHECK_P3: fffff8057f46ff68.

BUGCHECK_P4: 0

TRAP_FRAME: fffff8057f470010 -- (.trap 0xfffff8057f470010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8f0dac65fac8 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff8057f470250 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80579a6aefc rsp=fffff8057f4701a0 rbp=0000000000000002
 r8=0000000000000009 r9=ffff8f0dac3d1250 r10=fffff8057c51b9f0
r11=fffff8057f470170 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy.
HIDCLASS!HidpDistributeInterruptReport+0x3fc:
fffff805`79a6aefc cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: fffff8057f46ff68 -- (.exr 0xfffff8057f46ff68)
ExceptionAddress: fffff80579a6aefc (HIDCLASS!HidpDistributeInterruptReport+0x00000000000003fc)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
fffff805`7f46fce8 fffff805`7c60af69 : 00000000`00000139 00000000`00000003 fffff805`7f470010 fffff805`7f46ff68 : nt!KeBugCheckEx
fffff805`7f46fcf0 fffff805`7c60b390 : ffff8f0d`a8599de0 ffff8f0d`a858c010 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`7f46fe30 fffff805`7c609723 : fffff55f`409d5bc8 fffff57a`afa04ea8 fffff57a`bd57d020 fffff57a`bd5eabe8 : nt!KiFastFailDispatch+0xd0
fffff805`7f470010 fffff805`79a6aefc : ffff8f0d`a3852358 ffff8f0d`af0f5102 00000000`00000002 00000000`00000009 : nt!KiRaiseSecurityCheckFailure+0x323
fffff805`7f4701a0 fffff805`79a6a7ed : ffff8f0d`af0f51d0 ffff8f0d`af0f5102 ffff8f0d`af0f51d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3fc
fffff805`7f4702a0 fffff805`7c41fe6e : ffff8f0d`aee8d010 ffff8f0d`aee8d010 fffff805`7f470301 ffff8f0d`aee8d3fb : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff805`7f470340 fffff805`7c41fd37 : 00000000`00000001 00000000`00000000 ffff8f0d`adff3630 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff805`7f470430 fffff805`7ddb811a : 00000000`00000000 ffff8f0d`a3019cb0 ffff8f0d`aee8d010 fffff805`7f470510 : nt!IofCompleteRequest+0x17
fffff805`7f470460 fffff805`7ddb5bbf : ffff8f0d`aa939102 ffff8f0d`aee77050 ffff8f0d`aee8d010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff805`7f4704f0 fffff805`810ecb4c : 00000000`ffffff02 ffff8f0d`aa939020 ffff8f0d`adff3a10 ffff8f0d`adff3a10 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff805`7f470550 fffff805`810eca11 : ffff8f0d`aa9391c0 00000000`00000008 ffff8f0d`aa939250 fffff805`7f470768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff805`7f4705b0 fffff805`810ec800 : 00000000`00000004 fffff805`7f470720 00000000`00000000 ffff8f0d`aab0b660 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff805`7f470660 fffff805`810e7100 : 00000000`00000004 fffff805`7f470738 00000000`00000008 fffff805`7f470740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff805`7f470690 fffff805`810e6c35 : 00000000`00000780 000070f2`5c3dff00 ffff8f0d`a76fd1d0 ffff8f0d`af2f9cf0 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff805`7f4706f0 fffff805`810e690c : ffff8f0d`a15f72d0 ffff8f0d`a14de5c0 000070f2`5c8849b8 ffff8f0d`a15f7000 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff805`7f4707f0 fffff805`7ddb38f5 : 00000000`00000f44 00000000`00400a02 00000000`00000000 00004359`0b60f35c : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff805`7f470820 fffff805`7c43489e : fffff805`7748d240 ffff8f0d`a14da000 fffff805`7f470b40 fffff805`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff805`7f470860 fffff805`7c433b84 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff805`7f4709d0 fffff805`7c5fcb3e : 00000000`00000000 fffff805`7748a180 fffff805`7cf27a00 ffff8f0d`ac7ea080 : nt!KiRetireDpcList+0x1f4
fffff805`7f470c60 00000000`00000000 : fffff805`7f471000 fffff805`7f46b000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: HIDCLASS!HidpDistributeInterruptReport+3fc

MODULE_NAME: HIDCLASS.

IMAGE_NAME: HIDCLASS.SYS

IMAGE_VERSION: 10.0.19041.868

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 3fc.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_HIDCLASS!HidpDistributeInterruptReport

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {bb453199-d75e-af6d-39db-a19f4a74367d}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80648470010, Address of the trap frame for the exception that caused the BugCheck.
Arg3: fffff8064846ff68, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1765.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 6150.

 Key : Analysis.Init.CPU.mSec
 Value: 93.

 Key : Analysis.Init.Elapsed.mSec
 Value: 5651.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 142.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x139.

 Key : Bugcheck.Code.Register
 Value: 0x139.

 Key : FailFast.Name
 Value: CORRUPT_LIST_ENTRY.

 Key : FailFast.Type
 Value: 3

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 092922-21390-01.dmp

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: fffff80648470010.

BUGCHECK_P3: fffff8064846ff68.

BUGCHECK_P4: 0

TRAP_FRAME: fffff80648470010 -- (.trap 0xfffff80648470010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd0811c1a3ac8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806531caefc rsp=fffff806484701a0 rbp=0000000000000003
 r8=01d8d42e86ad8a3f r9=ffffd0811c553b10 r10=fffff8064331b9f0
r11=fffff80648470170 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy.
HIDCLASS!HidpDistributeInterruptReport+0x3fc:
fffff806`531caefc cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: fffff8064846ff68 -- (.exr 0xfffff8064846ff68)
ExceptionAddress: fffff806531caefc (HIDCLASS!HidpDistributeInterruptReport+0x00000000000003fc)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
fffff806`4846fce8 fffff806`4340af69 : 00000000`00000139 00000000`00000003 fffff806`48470010 fffff806`4846ff68 : nt!KeBugCheckEx
fffff806`4846fcf0 fffff806`4340b390 : ffffd081`1c7b3e10 ffffd081`1c802050 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff806`4846fe30 fffff806`43409723 : ffff8547`c0392e60 ffff8542`a3e01c90 ffff8542`a151f008 ffff8542`a150a8f8 : nt!KiFastFailDispatch+0xd0
fffff806`48470010 fffff806`531caefc : ffffd081`238672e8 ffffd081`1c80b102 00000000`00000002 00000000`00000009 : nt!KiRaiseSecurityCheckFailure+0x323
fffff806`484701a0 fffff806`531ca7ed : ffffd081`1c80b1d0 ffffd081`1c80b102 ffffd081`1c80b1d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3fc
fffff806`484702a0 fffff806`4321fe6e : ffffd081`1c8025a0 ffffd081`1c8025a0 fffff806`48470301 ffffd081`1c80298b : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff806`48470340 fffff806`4321fd37 : 00000000`00000001 00000000`00000000 ffffd081`1c80e570 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff806`48470430 fffff806`46db811a : 00000000`00000000 ffffd081`16c9fcb0 ffffd081`1c8025a0 fffff806`48470510 : nt!IofCompleteRequest+0x17
fffff806`48470460 fffff806`46db5bbf : ffffd081`227d1c02 ffffd081`22130820 ffffd081`1c8025a0 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff806`484704f0 fffff806`4860cb4c : 00000000`ffffff02 ffffd081`227d1b30 ffffd081`1c80e950 ffffd081`1c80e950 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff806`48470550 fffff806`4860ca11 : ffffd081`227d1cd0 00000000`00000008 ffffd081`227d1d60 fffff806`48470768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff806`484705b0 fffff806`4860c800 : 00000000`00000004 fffff806`48470720 00000000`00000000 ffffd081`1c7ee660 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff806`48470660 fffff806`48607100 : 00000000`00000004 fffff806`48470738 00000000`00000008 fffff806`48470740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff806`48470690 fffff806`48606c35 : 00000000`00000780 00002f7e`e99a2300 ffffd081`1b6ff220 ffffd081`1c57dce0 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff806`484706f0 fffff806`4860690c : ffffd081`1b99c328 fffff806`4047f180 00002f7e`e9356338 fffff806`48470810 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff806`484707f0 fffff806`46db38f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff806`48470820 fffff806`4323489e : fffff806`40482240 00000000`00000000 fffff806`48470b20 fffff806`4047f180 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff806`48470860 fffff806`43233b84 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff806`484709d0 fffff806`433fcb3e : 00000000`00000000 fffff806`4047f180 fffff806`43d27a00 ffffd081`213fd080 : nt!KiRetireDpcList+0x1f4
fffff806`48470c60 00000000`00000000 : fffff806`48471000 fffff806`4846b000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: HIDCLASS!HidpDistributeInterruptReport+3fc

MODULE_NAME: HIDCLASS.

IMAGE_NAME: HIDCLASS.SYS

IMAGE_VERSION: 10.0.19041.868

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 3fc.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_HIDCLASS!HidpDistributeInterruptReport

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {bb453199-d75e-af6d-39db-a19f4a74367d}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8004bc70310, Address of the trap frame for the exception that caused the BugCheck.
Arg3: fffff8004bc70268, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1875.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 51555.

 Key : Analysis.Init.CPU.mSec
 Value: 125.

 Key : Analysis.Init.Elapsed.mSec
 Value: 4142.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 135.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x139.

 Key : Bugcheck.Code.Register
 Value: 0x139.

 Key : FailFast.Name
 Value: CORRUPT_LIST_ENTRY.

 Key : FailFast.Type
 Value: 3

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 092922-21531-01.dmp

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: fffff8004bc70310.

BUGCHECK_P3: fffff8004bc70268.

BUGCHECK_P4: 0

TRAP_FRAME: fffff8004bc70310 -- (.trap 0xfffff8004bc70310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb68f46702000 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8005686b884 rsp=fffff8004bc704a0 rbp=ffffb68f4a067010
 r8=ffffb68f461c7ec0 r9=0000000000000000 r10=0000000000000002
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
dxgmms2!VidSchDdiNotifyDpc+0x14694:
fffff800`5686b884 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: fffff8004bc70268 -- (.exr 0xfffff8004bc70268)
ExceptionAddress: fffff8005686b884 (dxgmms2!VidSchDdiNotifyDpc+0x0000000000014694)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
fffff800`4bc6ffe8 fffff800`45e0af69 : 00000000`00000139 00000000`00000003 fffff800`4bc70310 fffff800`4bc70268 : nt!KeBugCheckEx
fffff800`4bc6fff0 fffff800`45e0b390 : 00000000`00055302 fffff800`463b2000 00000000`00000000 ffffb68f`4a08c6d0 : nt!KiBugCheckDispatch+0x69
fffff800`4bc70130 fffff800`45e09723 : ffffb68f`4a08c658 ffffb68f`4a08c658 ffffb68f`4a106910 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff800`4bc70310 fffff800`5686b884 : 00000000`00000000 00000000`00989680 00000000`00000101 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff800`4bc704a0 fffff800`4bf9d5d1 : fffff800`4bc70599 00000000`00000000 ffffb68f`46705520 00000457`c5b0a780 : dxgmms2!VidSchDdiNotifyDpc+0x14694
fffff800`4bc70550 fffff800`56ae2a69 : ffffb68f`46683030 00000000`00000000 ffffb68f`46683030 ffffb68f`46702000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff800`4bc70600 ffffb68f`46683030 : 00000000`00000000 ffffb68f`46683030 ffffb68f`46702000 fffff800`56ae29ee : nvlddmkm+0x62a69
fffff800`4bc70608 00000000`00000000 : ffffb68f`46683030 ffffb68f`46702000 fffff800`56ae29ee ffffb68f`46702000 : 0xffffb68f`46683030

SYMBOL_NAME: dxgmms2!VidSchDdiNotifyDpc+14694

MODULE_NAME: dxgmms2.

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.19041.1940

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 14694.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchDdiNotifyDpc

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {2680cc95-c3eb-4ecf-e7af-fb371282c295}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80300000000, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg4: fffff80300000000, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1499.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 5757.

 Key : Analysis.Init.CPU.mSec
 Value: 93.

 Key : Analysis.Init.Elapsed.mSec
 Value: 1831.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 137.

 Key : Bugcheck.Code.DumpHeader
 Value: 0xd1.

 Key : Bugcheck.Code.Register
 Value: 0xa.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 092822-24000-01.dmp

BUGCHECK_CODE: d1.

BUGCHECK_P1: fffff80300000000.

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff80300000000.

READ_ADDRESS: fffff80328efb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 fffff80300000000.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: ffffcb839e25a550 -- (.trap 0xffffcb839e25a550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000234376f000 rbx=0000000000000000 rcx=00000000c0000102
rdx=0000000000000023 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80300000000 rsp=ffffcb839e25a6e0 rbp=0000000000000000
 r8=0000000000000020 r9=0000000000000001 r10=00000000000003a8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
fffff803`00000000 ?? ???
Resetting default scope.

FAILED_INSTRUCTION_ADDRESS:
+0
fffff803`00000000 ?? ???

STACK_TEXT:
ffffcb83`9e25a408 fffff803`2860af69 : 00000000`0000000a fffff803`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffcb83`9e25a410 fffff803`28607269 : 00000000`00000000 fffff803`28422816 ffffb480`00000000 ffff8e83`e53da080 : nt!KiBugCheckDispatch+0x69
ffffcb83`9e25a550 fffff803`00000000 : 00000000`00000000 ffff8e83`e2956870 ffff9706`736f6455 00000000`00000000 : nt!KiPageFault+0x469
ffffcb83`9e25a6e0 00000000`00000000 : ffff8e83`e2956870 ffff9706`736f6455 00000000`00000000 00000000`00000000 : 0xfffff803`00000000

SYMBOL_NAME: nt!KiPageFault+469

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.2006

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 469.

FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup: MachineOwner.
---------

Çok teşekkür ederim hepsini deneyip buraya yazarım 🙂

Ekran kartı sürücüleri, USB aygıtlarından biri veya sürücüsü, HD Audio sürücüsü vb. ile alakalı problemler var gibi görünüyor.

- İşletim sisteminizi Windows Update üzerinden son çıkan sürüme güncelleyin.

- Realtek HD Audio sürücüsünü güncelleyin: Realtek HD Audio Driver - [6.0.9225.1]

- Chipset sürücülerinizi AMD sitesinden indirip güncelleyin: B450 Drivers & Support

- Aşağıdaki adımları takip ederek ekran kartı sürücülerinizi DDU ile kaldırın ve tekrar yükleyin.

  • - güncel sürücüyü indirin: GTX 1660 Ti - 517.48 WHQL sürücüsü
    - İndirdikten sonra başlattaki arama yerine aygıt yükleme ayarlarını değiştir yazın.
    - Çıkan pencereyi hayır olarak seçin ve kapatın.
    - Daha sonra DDU ile Sürücü Kaldırma rehberini takip edin.
    - Sürücüyü kaldırdıktan sonra bilgisayar yeniden başlayacak.
    - Bilgisayar açılınca indirdiğiniz sürücüyü kurun.
    - Kurduktan sonra tekrar aygıt yükleme ayarlarını değiştir yazıp o kısmı "evet" seçebilirsiniz.

- Gigabyte B450M S2H destek sayfasından indirdiğiniz USB charger sürücüsünü şimdilik kaldırın. Yüklenemeyen modüller listesinde görünüyor hem de tüm mavi ekran dökümlerinde.

- CMD'yi yönetici olarak çalıştırıp aşağıdaki üç komutu sırayla girin. Biri bitince diğerini girin ve sonuçları paylaşın.

SFC /scannow DISM /Online /Cleanup-Image /RestoreHealth chkdsk /f /r

Aygıt yöneticisinde ünlem işareti olan herhangi bir aygıt veya sürücü var mı diye kontrol edin. fare ve diğer işaret aygıtları vb. hepsine bakın. Örnek olarak:

Eki Görüntüle 1531865

hatalar devam ederse:

- Dökümlerden birinde HIDCLASS.SYS sürücüsü ile ilgili hata almışsınız. Güncel olmayan aygıt sürücüleri ile alakalı gibi. Klavye ve fare dışında tüm USB aygıtlarını şimdilik sökün. Hatta klavye ve fare ikilisinden biriyle bile alakalı olabilir.

- HD Tune indirip disk sağlığını "quick scan" kapalı olacak şekilde kontrol edip sonucu paylaşırsınız.

Dökümler:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8057f470010, Address of the trap frame for the exception that caused the BugCheck.
Arg3: fffff8057f46ff68, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1890.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 9406.

 Key : Analysis.Init.CPU.mSec
 Value: 92.

 Key : Analysis.Init.Elapsed.mSec
 Value: 7366.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 141.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x139.

 Key : Bugcheck.Code.Register
 Value: 0x139.

 Key : FailFast.Name
 Value: CORRUPT_LIST_ENTRY.

 Key : FailFast.Type
 Value: 3

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 092822-23078-01.dmp

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: fffff8057f470010.

BUGCHECK_P3: fffff8057f46ff68.

BUGCHECK_P4: 0

TRAP_FRAME: fffff8057f470010 -- (.trap 0xfffff8057f470010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8f0dac65fac8 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff8057f470250 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80579a6aefc rsp=fffff8057f4701a0 rbp=0000000000000002
 r8=0000000000000009 r9=ffff8f0dac3d1250 r10=fffff8057c51b9f0
r11=fffff8057f470170 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy.
HIDCLASS!HidpDistributeInterruptReport+0x3fc:
fffff805`79a6aefc cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: fffff8057f46ff68 -- (.exr 0xfffff8057f46ff68)
ExceptionAddress: fffff80579a6aefc (HIDCLASS!HidpDistributeInterruptReport+0x00000000000003fc)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
fffff805`7f46fce8 fffff805`7c60af69 : 00000000`00000139 00000000`00000003 fffff805`7f470010 fffff805`7f46ff68 : nt!KeBugCheckEx
fffff805`7f46fcf0 fffff805`7c60b390 : ffff8f0d`a8599de0 ffff8f0d`a858c010 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`7f46fe30 fffff805`7c609723 : fffff55f`409d5bc8 fffff57a`afa04ea8 fffff57a`bd57d020 fffff57a`bd5eabe8 : nt!KiFastFailDispatch+0xd0
fffff805`7f470010 fffff805`79a6aefc : ffff8f0d`a3852358 ffff8f0d`af0f5102 00000000`00000002 00000000`00000009 : nt!KiRaiseSecurityCheckFailure+0x323
fffff805`7f4701a0 fffff805`79a6a7ed : ffff8f0d`af0f51d0 ffff8f0d`af0f5102 ffff8f0d`af0f51d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3fc
fffff805`7f4702a0 fffff805`7c41fe6e : ffff8f0d`aee8d010 ffff8f0d`aee8d010 fffff805`7f470301 ffff8f0d`aee8d3fb : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff805`7f470340 fffff805`7c41fd37 : 00000000`00000001 00000000`00000000 ffff8f0d`adff3630 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff805`7f470430 fffff805`7ddb811a : 00000000`00000000 ffff8f0d`a3019cb0 ffff8f0d`aee8d010 fffff805`7f470510 : nt!IofCompleteRequest+0x17
fffff805`7f470460 fffff805`7ddb5bbf : ffff8f0d`aa939102 ffff8f0d`aee77050 ffff8f0d`aee8d010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff805`7f4704f0 fffff805`810ecb4c : 00000000`ffffff02 ffff8f0d`aa939020 ffff8f0d`adff3a10 ffff8f0d`adff3a10 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff805`7f470550 fffff805`810eca11 : ffff8f0d`aa9391c0 00000000`00000008 ffff8f0d`aa939250 fffff805`7f470768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff805`7f4705b0 fffff805`810ec800 : 00000000`00000004 fffff805`7f470720 00000000`00000000 ffff8f0d`aab0b660 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff805`7f470660 fffff805`810e7100 : 00000000`00000004 fffff805`7f470738 00000000`00000008 fffff805`7f470740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff805`7f470690 fffff805`810e6c35 : 00000000`00000780 000070f2`5c3dff00 ffff8f0d`a76fd1d0 ffff8f0d`af2f9cf0 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff805`7f4706f0 fffff805`810e690c : ffff8f0d`a15f72d0 ffff8f0d`a14de5c0 000070f2`5c8849b8 ffff8f0d`a15f7000 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff805`7f4707f0 fffff805`7ddb38f5 : 00000000`00000f44 00000000`00400a02 00000000`00000000 00004359`0b60f35c : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff805`7f470820 fffff805`7c43489e : fffff805`7748d240 ffff8f0d`a14da000 fffff805`7f470b40 fffff805`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff805`7f470860 fffff805`7c433b84 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff805`7f4709d0 fffff805`7c5fcb3e : 00000000`00000000 fffff805`7748a180 fffff805`7cf27a00 ffff8f0d`ac7ea080 : nt!KiRetireDpcList+0x1f4
fffff805`7f470c60 00000000`00000000 : fffff805`7f471000 fffff805`7f46b000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: HIDCLASS!HidpDistributeInterruptReport+3fc

MODULE_NAME: HIDCLASS.

IMAGE_NAME: HIDCLASS.SYS

IMAGE_VERSION: 10.0.19041.868

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 3fc.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_HIDCLASS!HidpDistributeInterruptReport

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {bb453199-d75e-af6d-39db-a19f4a74367d}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80648470010, Address of the trap frame for the exception that caused the BugCheck.
Arg3: fffff8064846ff68, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1765.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 6150.

 Key : Analysis.Init.CPU.mSec
 Value: 93.

 Key : Analysis.Init.Elapsed.mSec
 Value: 5651.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 142.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x139.

 Key : Bugcheck.Code.Register
 Value: 0x139.

 Key : FailFast.Name
 Value: CORRUPT_LIST_ENTRY.

 Key : FailFast.Type
 Value: 3

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 092922-21390-01.dmp

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: fffff80648470010.

BUGCHECK_P3: fffff8064846ff68.

BUGCHECK_P4: 0

TRAP_FRAME: fffff80648470010 -- (.trap 0xfffff80648470010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd0811c1a3ac8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806531caefc rsp=fffff806484701a0 rbp=0000000000000003
 r8=01d8d42e86ad8a3f r9=ffffd0811c553b10 r10=fffff8064331b9f0
r11=fffff80648470170 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy.
HIDCLASS!HidpDistributeInterruptReport+0x3fc:
fffff806`531caefc cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: fffff8064846ff68 -- (.exr 0xfffff8064846ff68)
ExceptionAddress: fffff806531caefc (HIDCLASS!HidpDistributeInterruptReport+0x00000000000003fc)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
fffff806`4846fce8 fffff806`4340af69 : 00000000`00000139 00000000`00000003 fffff806`48470010 fffff806`4846ff68 : nt!KeBugCheckEx
fffff806`4846fcf0 fffff806`4340b390 : ffffd081`1c7b3e10 ffffd081`1c802050 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff806`4846fe30 fffff806`43409723 : ffff8547`c0392e60 ffff8542`a3e01c90 ffff8542`a151f008 ffff8542`a150a8f8 : nt!KiFastFailDispatch+0xd0
fffff806`48470010 fffff806`531caefc : ffffd081`238672e8 ffffd081`1c80b102 00000000`00000002 00000000`00000009 : nt!KiRaiseSecurityCheckFailure+0x323
fffff806`484701a0 fffff806`531ca7ed : ffffd081`1c80b1d0 ffffd081`1c80b102 ffffd081`1c80b1d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3fc
fffff806`484702a0 fffff806`4321fe6e : ffffd081`1c8025a0 ffffd081`1c8025a0 fffff806`48470301 ffffd081`1c80298b : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff806`48470340 fffff806`4321fd37 : 00000000`00000001 00000000`00000000 ffffd081`1c80e570 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff806`48470430 fffff806`46db811a : 00000000`00000000 ffffd081`16c9fcb0 ffffd081`1c8025a0 fffff806`48470510 : nt!IofCompleteRequest+0x17
fffff806`48470460 fffff806`46db5bbf : ffffd081`227d1c02 ffffd081`22130820 ffffd081`1c8025a0 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff806`484704f0 fffff806`4860cb4c : 00000000`ffffff02 ffffd081`227d1b30 ffffd081`1c80e950 ffffd081`1c80e950 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff806`48470550 fffff806`4860ca11 : ffffd081`227d1cd0 00000000`00000008 ffffd081`227d1d60 fffff806`48470768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff806`484705b0 fffff806`4860c800 : 00000000`00000004 fffff806`48470720 00000000`00000000 ffffd081`1c7ee660 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff806`48470660 fffff806`48607100 : 00000000`00000004 fffff806`48470738 00000000`00000008 fffff806`48470740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff806`48470690 fffff806`48606c35 : 00000000`00000780 00002f7e`e99a2300 ffffd081`1b6ff220 ffffd081`1c57dce0 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff806`484706f0 fffff806`4860690c : ffffd081`1b99c328 fffff806`4047f180 00002f7e`e9356338 fffff806`48470810 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff806`484707f0 fffff806`46db38f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff806`48470820 fffff806`4323489e : fffff806`40482240 00000000`00000000 fffff806`48470b20 fffff806`4047f180 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff806`48470860 fffff806`43233b84 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff806`484709d0 fffff806`433fcb3e : 00000000`00000000 fffff806`4047f180 fffff806`43d27a00 ffffd081`213fd080 : nt!KiRetireDpcList+0x1f4
fffff806`48470c60 00000000`00000000 : fffff806`48471000 fffff806`4846b000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: HIDCLASS!HidpDistributeInterruptReport+3fc

MODULE_NAME: HIDCLASS.

IMAGE_NAME: HIDCLASS.SYS

IMAGE_VERSION: 10.0.19041.868

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 3fc.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_HIDCLASS!HidpDistributeInterruptReport

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {bb453199-d75e-af6d-39db-a19f4a74367d}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8004bc70310, Address of the trap frame for the exception that caused the BugCheck.
Arg3: fffff8004bc70268, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1875.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 51555.

 Key : Analysis.Init.CPU.mSec
 Value: 125.

 Key : Analysis.Init.Elapsed.mSec
 Value: 4142.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 135.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x139.

 Key : Bugcheck.Code.Register
 Value: 0x139.

 Key : FailFast.Name
 Value: CORRUPT_LIST_ENTRY.

 Key : FailFast.Type
 Value: 3

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 092922-21531-01.dmp

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: fffff8004bc70310.

BUGCHECK_P3: fffff8004bc70268.

BUGCHECK_P4: 0

TRAP_FRAME: fffff8004bc70310 -- (.trap 0xfffff8004bc70310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb68f46702000 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8005686b884 rsp=fffff8004bc704a0 rbp=ffffb68f4a067010
 r8=ffffb68f461c7ec0 r9=0000000000000000 r10=0000000000000002
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
dxgmms2!VidSchDdiNotifyDpc+0x14694:
fffff800`5686b884 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: fffff8004bc70268 -- (.exr 0xfffff8004bc70268)
ExceptionAddress: fffff8005686b884 (dxgmms2!VidSchDdiNotifyDpc+0x0000000000014694)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
fffff800`4bc6ffe8 fffff800`45e0af69 : 00000000`00000139 00000000`00000003 fffff800`4bc70310 fffff800`4bc70268 : nt!KeBugCheckEx
fffff800`4bc6fff0 fffff800`45e0b390 : 00000000`00055302 fffff800`463b2000 00000000`00000000 ffffb68f`4a08c6d0 : nt!KiBugCheckDispatch+0x69
fffff800`4bc70130 fffff800`45e09723 : ffffb68f`4a08c658 ffffb68f`4a08c658 ffffb68f`4a106910 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff800`4bc70310 fffff800`5686b884 : 00000000`00000000 00000000`00989680 00000000`00000101 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff800`4bc704a0 fffff800`4bf9d5d1 : fffff800`4bc70599 00000000`00000000 ffffb68f`46705520 00000457`c5b0a780 : dxgmms2!VidSchDdiNotifyDpc+0x14694
fffff800`4bc70550 fffff800`56ae2a69 : ffffb68f`46683030 00000000`00000000 ffffb68f`46683030 ffffb68f`46702000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff800`4bc70600 ffffb68f`46683030 : 00000000`00000000 ffffb68f`46683030 ffffb68f`46702000 fffff800`56ae29ee : nvlddmkm+0x62a69
fffff800`4bc70608 00000000`00000000 : ffffb68f`46683030 ffffb68f`46702000 fffff800`56ae29ee ffffb68f`46702000 : 0xffffb68f`46683030

SYMBOL_NAME: dxgmms2!VidSchDdiNotifyDpc+14694

MODULE_NAME: dxgmms2.

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.19041.1940

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 14694.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchDdiNotifyDpc

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {2680cc95-c3eb-4ecf-e7af-fb371282c295}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80300000000, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg4: fffff80300000000, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1499.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 5757.

 Key : Analysis.Init.CPU.mSec
 Value: 93.

 Key : Analysis.Init.Elapsed.mSec
 Value: 1831.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 137.

 Key : Bugcheck.Code.DumpHeader
 Value: 0xd1.

 Key : Bugcheck.Code.Register
 Value: 0xa.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 092822-24000-01.dmp

BUGCHECK_CODE: d1.

BUGCHECK_P1: fffff80300000000.

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff80300000000.

READ_ADDRESS: fffff80328efb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 fffff80300000000.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: ffffcb839e25a550 -- (.trap 0xffffcb839e25a550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000234376f000 rbx=0000000000000000 rcx=00000000c0000102
rdx=0000000000000023 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80300000000 rsp=ffffcb839e25a6e0 rbp=0000000000000000
 r8=0000000000000020 r9=0000000000000001 r10=00000000000003a8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
fffff803`00000000 ?? ???
Resetting default scope.

FAILED_INSTRUCTION_ADDRESS:
+0
fffff803`00000000 ?? ???

STACK_TEXT:
ffffcb83`9e25a408 fffff803`2860af69 : 00000000`0000000a fffff803`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffcb83`9e25a410 fffff803`28607269 : 00000000`00000000 fffff803`28422816 ffffb480`00000000 ffff8e83`e53da080 : nt!KiBugCheckDispatch+0x69
ffffcb83`9e25a550 fffff803`00000000 : 00000000`00000000 ffff8e83`e2956870 ffff9706`736f6455 00000000`00000000 : nt!KiPageFault+0x469
ffffcb83`9e25a6e0 00000000`00000000 : ffff8e83`e2956870 ffff9706`736f6455 00000000`00000000 00000000`00000000 : 0xfffff803`00000000

SYMBOL_NAME: nt!KiPageFault+469

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.2006

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 469.

FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup: MachineOwner.
---------

USB charger hariç hepsini yasptım hocam ama hala düzelmedi maalesef.
 
Son düzenleme:

Yeni konular

Geri
Yukarı