RX 570 sistemde mavi ekran hatası

Dosyayı herkese açık yapabiliyorsanız yapın, yoksa MediaFire'ye yükleyin.

Ek Açıklama 2020-07-29 131407.png

Ek Açıklama 2020-07-29 131454.png

Ek Açıklama 2020-09-07 223707.png
 
  • MemTest86 ile belleklerde tarama yapın, sonucunu buraya atın.
  • HD Tune ile disklerinizde "Error Scan" yapın, "Quick Scan" kapalı olsun. HDD Sentinel yazılımından da tüm sürücülerinizin ekran görüntüsünü atın.
  • DDU ile GPU sürücülerini kaldırıp yeniden kurun.
  • Realtek ağ sürücülerinizi güncelleyin.
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: ffff9482d6e13a90, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9482d6e139e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6265

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 14470

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 1e

BUGCHECK_P2: ffff9482d6e13a90

BUGCHECK_P3: ffff9482d6e139e8

BUGCHECK_P4: 0

IMAGE_NAME:  ntkrnlmp.exe

MODULE_NAME: ntkrnlmp

FAULTING_MODULE: fffff80035800000 nt

TRAP_FRAME:  ffff9482d6e13a90 -- (.trap 0xffff9482d6e13a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000003 rbx=0000000000000000 rcx=000000000000001e
rdx=fffff800364fdc80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80035c6b58d rsp=ffff9482d6e13c20 rbp=ffff8000f8500180
 r8=0000000000000000  r9=ffff9482d6e13fb0 r10=0000000000000000
r11=0000000000000053 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeQueryValuesThread+0x1957dd:
fffff800`35c6b58d cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff9482d6e139e8 -- (.exr 0xffff9482d6e139e8)
ExceptionAddress: fffff80035c6b58d (nt!KeQueryValuesThread+0x00000000001957dd)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001e
Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001e

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff9482`d6e13768 fffff800`35c06569     : 00000000`00000139 00000000`0000001e ffff9482`d6e13a90 ffff9482`d6e139e8 : nt!KeBugCheckEx
ffff9482`d6e13770 fffff800`35c06990     : 00000000`00000000 00000000`00000002 ffffbb8f`72209701 ffff9482`d6e13d68 : nt!KiBugCheckDispatch+0x69
ffff9482`d6e138b0 fffff800`35c04d23     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000070 : nt!KiFastFailDispatch+0xd0
ffff9482`d6e13a90 fffff800`35c6b58d     : ffffcc83`5b013e80 007000b0`000000b0 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff9482`d6e13c20 fffff800`35edb3e1     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x1957dd
ffff9482`d6e13ca0 fffff800`35edb072     : ffffcc83`65de6660 ffffcc83`65de68e0 ffffcc83`65153080 00000000`00000001 : nt!PsQueryStatisticsProcess+0x111
ffff9482`d6e13d20 fffff800`35eeeca1     : 00000000`00000001 ffffcc83`65de6080 00000000`ffffffff 00000000`00000000 : nt!ExpCopyProcessInfo+0x42
ffff9482`d6e13da0 fffff800`35ef21e3     : 00000000`00000000 00000000`0003ac4e 00000000`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0x9f1
ffff9482`d6e14400 fffff800`35ef18c7     : 00000000`00000000 00000000`00000008 00000000`0003ac4e 00000000`0003ac4e : nt!ExpQuerySystemInformation+0x7d3
ffff9482`d6e14ac0 fffff800`35c05fb8     : ffffcc83`65150000 00007ffa`ee2c3fa4 ffff9482`d6e14b80 ffffcc83`638c9de0 : nt!NtQuerySystemInformation+0x37
ffff9482`d6e14b00 00007ffa`ee64c454     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ff`b99fef58 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ee64c454


IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {64929928-a824-2134-285e-71128496d311}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffb58c830fe7a8, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80749d60bc5, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4437

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15023

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffb58c830fe7a8

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80749d60bc5

READ_ADDRESS: fffff8074a4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8074a40f340: Unable to get Flags value from nt!KdVersionBlock
fffff8074a40f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffb58c830fe7a8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8074e66b550 -- (.trap 0xfffff8074e66b550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000cff3826c1 rbx=0000000000000000 rcx=0000000000000aa6
rdx=0000000cff383167 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80749d60bc5 rsp=fffff8074e66b6e0 rbp=0000000000000001
 r8=0000000000000000  r9=00000000ffffffff r10=0000fffff80749b6
r11=ffff7c7b17200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz ac po nc
nt!PpmIdleUpdateConcurrency+0x55:
fffff807`49d60bc5 4a014ccb20      add     qword ptr [rbx+r9*8+20h],rcx ds:00000008`00000018=????????????????
Resetting default scope

STACK_TEXT: 
fffff807`4e66b408 fffff807`49c06569     : 00000000`0000000a ffffb58c`830fe7a8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff807`4e66b410 fffff807`49c02869     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`4e66b550 fffff807`49d60bc5     : 00000000`00000200 fffff807`5a8e18e3 00000000`00000000 ffffb584`836d3010 : nt!KiPageFault+0x469
fffff807`4e66b6e0 fffff807`49c872ba     : 00001244`df814740 00000000`00000000 ffffb584`836d3010 00000000`00000000 : nt!PpmIdleUpdateConcurrency+0x55
fffff807`4e66b720 fffff807`49b28884     : 00000000`00000000 00001f80`00000000 00000000`00000000 00000000`00000002 : nt!PpmIdleExecuteTransition+0x15e8ba
fffff807`4e66baf0 fffff807`49bf80c4     : 00000000`00000000 fffff807`4a527600 ffffb584`87a1b080 00000000`00000da4 : nt!PoIdle+0x374
fffff807`4e66bc60 00000000`00000000     : fffff807`4e66c000 fffff807`4e666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!PpmIdleUpdateConcurrency+55

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  55

FAILURE_BUCKET_ID:  AV_nt!PpmIdleUpdateConcurrency

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1e521b51-d14a-dc59-37c3-c21c0b8ec9a6}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffdfd3b7ef2088, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000b8, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80575f2860c, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4812

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11733

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffdfd3b7ef2088

BUGCHECK_P2: ff

BUGCHECK_P3: b8

BUGCHECK_P4: fffff80575f2860c

READ_ADDRESS: fffff805768fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057680f340: Unable to get Flags value from nt!KdVersionBlock
fffff8057680f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffdfd3b7ef2088

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff890526e29960 -- (.trap 0xffff890526e29960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000f952f1de rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8057681eda0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80575f2860c rsp=ffff890526e29af0 rbp=ffff890526e29bf0
 r8=0000000000009acc  r9=ffffdfd3b7ef2060 r10=ffffdc05cbee5010
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na po nc
nt!PoIdle+0xfc:
fffff805`75f2860c 4d014128        add     qword ptr [r9+28h],r8 ds:ffffdfd3`b7ef2088=????????????????
Resetting default scope

STACK_TEXT: 
ffff8905`26e29818 fffff805`76006569     : 00000000`0000000a ffffdfd3`b7ef2088 00000000`000000ff 00000000`000000b8 : nt!KeBugCheckEx
ffff8905`26e29820 fffff805`76002869     : ffffdc05`cbee5010 ffffffff`ffffffff ffffffff`a12a4e25 ffffdc05`cbee51f8 : nt!KiBugCheckDispatch+0x69
ffff8905`26e29960 fffff805`75f2860c     : 00000000`00000000 00001f80`00e5003b 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
ffff8905`26e29af0 fffff805`75ff80c4     : ffffffff`00000000 ffffca01`03b8b240 ffffdc05`d020c080 00000000`000007e0 : nt!PoIdle+0xfc
ffff8905`26e29c60 00000000`00000000     : ffff8905`26e2a000 ffff8905`26e24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!PoIdle+fc

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  fc

FAILURE_BUCKET_ID:  AV_nt!PoIdle

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0f00f4f4-fc66-441c-10bf-8ccc2952f11b}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8024b41a876, Address of the instruction which caused the bugcheck
Arg3: ffffa101b33d9920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4015

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7749

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8024b41a876

BUGCHECK_P3: ffffa101b33d9920

BUGCHECK_P4: 0

CONTEXT:  ffffa101b33d9920 -- (.cxr 0xffffa101b33d9920)
rax=ffffcf01344ea068 rbx=ffffcf01330c7080 rcx=cf01344ea03073c7
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffcf01344ea060
rip=fffff8024b41a876 rsp=ffff8c0c9fce4940 rbp=ffff8c0c9fce4a01
 r8=0000000000000000  r9=00000003a92e45a9 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=cf01344ea03073c7
r14=0000000000000000 r15=ffffcf01330c71c0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!KeAbPreWait+0x6:
fffff802`4b41a876 0fb64120        movzx   eax,byte ptr [rcx+20h] ds:002b:cf01344e`a03073e7=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

BAD_STACK_POINTER:  ffffa101b33d9018

STACK_TEXT: 
ffff8c0c`9fce4940 fffff802`4b66e51b     : 00000000`000000f3 fffff802`4b8efe11 00000000`00000001 ffffcf01`330c71c0 : nt!KeAbPreWait+0x6
ffff8c0c`9fce4970 fffff802`4b8f1531     : ffffcf01`344ea060 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18f9db
ffff8c0c`9fce4a60 fffff802`4b8f15da     : ffffcf01`330c7080 00000014`ea6ff648 00000000`00000000 fffff802`4b605e18 : nt!ObWaitForSingleObject+0x91
ffff8c0c`9fce4ac0 fffff802`4b605fb8     : 00000000`00000000 00000000`00000000 ffff8c0c`9fce4b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffff8c0c`9fce4b00 00007ffd`aebcbe14     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000014`ea6ff618 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`aebcbe14


SYMBOL_NAME:  nt!KeAbPreWait+6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffa101b33d9920 ; kb

BUCKET_ID_FUNC_OFFSET:  6

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!KeAbPreWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ddcb9656-083d-2ea8-831a-b13145df4ef7}

Followup:     MachineOwner
---------

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8025eafb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5858

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9253

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff8025eafb320

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff80260c6b570 -- (.trap 0xfffff80260c6b570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000060081 rbx=0000000000000000 rcx=fffff8025ea23b48
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025e0be212 rsp=fffff80260c6b700 rbp=fffff80258e0b180
 r8=0000000000000000  r9=ffffa80f728ff390 r10=0000fffff8025e09
r11=ffffa8fa4b400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiAcquireKobjectLockSafe+0x32:
fffff802`5e0be212 8b03            mov     eax,dword ptr [rbx] ds:00000000`00000000=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
fffff802`60c79c88 fffff802`5e287a14     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff802`60c79c90 fffff802`5e12b7cd     : 000018d0`3c6451dc fffff802`58e0b180 00000000`00000246 00000000`00076668 : nt!KeAccumulateTicks+0x15dd24
fffff802`60c79cf0 fffff802`5e12bd71     : 00000513`ff00007b 00000000`00046927 fffff802`58e0b180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff802`60c79d40 fffff802`5e126823     : fffff802`58e0b180 00000000`00000000 fffff802`5ea31990 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff802`60c79e80 fffff802`5e12e382     : fffff802`60c6b570 fffff802`60c6b5f0 fffff802`60c6b500 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff802`60c79f30 fffff802`5e02ecd5     : 00000011`a4c1fb7d fffff802`5eaf39e0 fffff802`5eaf3a90 ffff45f0`24f6edc5 : nt!HalpTimerClockInterrupt+0xe2
fffff802`60c79f60 fffff802`5e1f604a     : fffff802`60c6b5f0 fffff802`5eaf39e0 00000000`00000002 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff802`60c79fb0 fffff802`5e1f65b7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff802`60c6b570 fffff802`5e0be212     : 00000000`00140001 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff802`60c6b700 fffff802`5e0c4b4f     : fffff802`5ea23b48 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiAcquireKobjectLockSafe+0x32
fffff802`60c6b730 fffff802`5e12e82b     : fffff802`00000000 fffff802`60c6b960 00000000`00000001 fffff802`58e0e240 : nt!KeSetEvent+0x6f
fffff802`60c6b7c0 fffff802`5e12e7c6     : fffff802`60c6bb40 fffff802`58e0b180 000018bf`7cf0d08c ffffa80f`6fcf9000 : nt!PpmReleaseLock+0x1b
fffff802`60c6b7f0 fffff802`5e0e549e     : fffff802`58e0e240 ffffa80f`72004000 fffff802`60c6bb30 ffffa80f`00000002 : nt!PpmCheckRun+0x66
fffff802`60c6b860 fffff802`5e0e4784     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00046643 : nt!KiExecuteAllDpcs+0x30e
fffff802`60c6b9d0 fffff802`5e1f810e     : 00000000`00000000 fffff802`58e0b180 fffff802`5eb27600 ffffa80f`72c85040 : nt!KiRetireDpcList+0x1f4
fffff802`60c6bc60 00000000`00000000     : fffff802`60c6c000 fffff802`60c66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KeAccumulateTicks+15dd24

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  15dd24

FAILURE_BUCKET_ID:  0x133_DPC_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {88dc98ce-f842-4daa-98d0-858621db6b0f}

Followup:     MachineOwner
---------

Tüm adımları yapana kadar cevap yazmayın, yaptıktan sonra bilgilendirin.
 

Geri
Yukarı