1) sanırım HyperX Cloud II kulaklığa sahipsiniz. Kulaklığı farklı bir USB portuna takın ve kulaklığa ait bir sürücü/kontrol yazılımı varsa bunu kaldırın.
2) BattlEye anti-cheat'i kaldırın.
3) hızlı başlat özelliğini kapatın.
Microsoft'un Windows 8 ile birlikte kullanıcılara sunduÄu hızlı baÅlat özelliÄini nasıl devre dıÅı bırakacaÄınızı anlatıyoruz Windows 8 ve 8.
www.technopat.net
Sorun çözülürse de belirtirseniz sevinirim.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffef0cf569ff50, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffffef0cf569fea8, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8358.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 23123.
Key : Analysis.Init.CPU.mSec
Value: 984.
Key : Analysis.Init.Elapsed.mSec
Value: 2201.
Key : Analysis.Memory.CommitPeak.Mb
Value: 73.
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139.
BUGCHECK_P1: 3
BUGCHECK_P2: ffffef0cf569ff50.
BUGCHECK_P3: ffffef0cf569fea8.
BUGCHECK_P4: 0
TRAP_FRAME: ffffef0cf569ff50 -- (.trap 0xffffef0cf569ff50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8a0fc55076e0 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff8046f49b399 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046f61a5e1 rsp=ffffef0cf56a00e0 rbp=00000300c55c63f4
r8=0016ec27e8cc8b49 r9=fffff8046f200000 r10=fffff8046a66aac0
r11=ffffef0cf56a0100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy.
nt!KiInsertTimerTable+0x20c841:
fffff804`6f61a5e1 cd29 int 29h.
Resetting default scope.
EXCEPTION_RECORD: ffffef0cf569fea8 -- (.exr 0xffffef0cf569fea8)
ExceptionAddress: fffff8046f61a5e1 (nt!KiInsertTimerTable+0x000000000020c841)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409.
EXCEPTION_PARAMETER1: 0000000000000003.
EXCEPTION_STR: 0xc0000409.
STACK_TEXT:
ffffef0c`f569fc28 fffff804`6f609069 : 00000000`00000139 00000000`00000003 ffffef0c`f569ff50 ffffef0c`f569fea8 : nt!KeBugCheckEx
ffffef0c`f569fc30 fffff804`6f609490 : 00000000`00000000 ffff8a0f`c55075c0 00000001`ffffffff fffffff6`00000007 : nt!KiBugCheckDispatch+0x69
ffffef0c`f569fd70 fffff804`6f607823 : 00000000`00000000 ffffef0c`f56a0200 00000000`00000000 fffff804`6f5fdeb6 : nt!KiFastFailDispatch+0xd0
ffffef0c`f569ff50 fffff804`6f61a5e1 : 00000000`00000000 00000000`00000000 00000000`00000000 43300000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffef0c`f56a00e0 fffff804`6f40c10d : ffff8a0f`c55075c0 fffff804`00000003 ffffef0c`f56a02a0 fffff804`00000000 : nt!KiInsertTimerTable+0x20c841
ffffef0c`f56a0160 fffff804`6f4805ce : 40e77000`00000057 43300000`00000000 40e77000`00000001 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
ffffef0c`f56a0200 fffff804`6f86f7b0 : ffffef0c`f56a05c0 00000000`00000001 ffff8a0f`ca819730 00000000`00000000 : nt!KeWaitForMultipleObjects+0x2be
ffffef0c`f56a0310 fffff804`6f8e333b : 0000000e`60124d00 fffff804`6f4879e6 00000000`00000002 00000000`00000000 : nt!ObWaitForMultipleObjects+0x2f0
ffffef0c`f56a0810 fffff804`6f608ab8 : 00000000`00000000 ffff8a0f`c55075c0 00000000`14a3f2c8 ffffef0c`f56a0aa8 : nt!NtWaitForMultipleObjects32+0x11b
ffffef0c`f56a0a90 00000000`77b41cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`14a3f2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b41cfc.
SYMBOL_NAME: nt!KiInsertTimerTable+20c841
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1151
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 20c841.
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}
Followup: MachineOwner.
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially.
allow a malicious user to gain control of this machine.
DESCRIPTION.
A driver overran a stack-based buffer (or local variable) in a way that would.
have overwritten the function's return address and jumped back to an arbitrary.
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user.
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the.
buffer overrun handlers and BugCheck call is the one that overran its local.
variable(s).
Arguments:
Arg1: 80f68f0527cbce41, Actual security check cookie from the stack.
Arg2: 0000cdff27cbce41, Expected security check cookie.
Arg3: ffff3200d83431be, Complement of the expected security check cookie.
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6031.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 7867.
Key : Analysis.Init.CPU.mSec
Value: 952.
Key : Analysis.Init.Elapsed.mSec
Value: 2069.
Key : Analysis.Memory.CommitPeak.Mb
Value: 71.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: f7.
BUGCHECK_P1: 80f68f0527cbce41.
BUGCHECK_P2: cdff27cbce41.
BUGCHECK_P3: ffff3200d83431be.
BUGCHECK_P4: 0
SECURITY_COOKIE: Expected 0000cdff27cbce41 found 80f68f0527cbce41.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffff830c`709b8668 fffff803`192b10f5 : 00000000`000000f7 80f68f05`27cbce41 0000cdff`27cbce41 ffff3200`d83431be : nt!KeBugCheckEx
ffff830c`709b8670 fffff803`1931a7d9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!_report_gsfailure+0x25
ffff830c`709b86b0 4b4b4a49`48484747 : 41434445`47484a4b 00000000`00000042 ffff830c`709b87b9 00000000`00000000 : nt!KiSelectProcessorToPreempt+0x191
ffff830c`709b8750 41434445`47484a4b : 00000000`00000042 ffff830c`709b87b9 00000000`00000000 ffff830c`709b8790 : 0x4b4b4a49`48484747
ffff830c`709b8758 00000000`00000042 : ffff830c`709b87b9 00000000`00000000 ffff830c`709b8790 ffff830c`709b8788 : 0x41434445`47484a4b
ffff830c`709b8760 ffff830c`709b87b9 : 00000000`00000000 ffff830c`709b8790 ffff830c`709b8788 00000000`0000003f : 0x42.
ffff830c`709b8768 00000000`00000000 : ffff830c`709b8790 ffff830c`709b8788 00000000`0000003f 00000000`0000003f : 0xffff830c`709b87b9
SYMBOL_NAME: nt!_report_gsfailure+25
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1110
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 25.
FAILURE_BUCKET_ID: 0xF7_MISSING_GSFRAME_nt!_report_gsfailure
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {82d2c1b5-b0cb-60a5-9a5d-78c8c4284f84}
Followup: MachineOwner.
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80fbee7c740, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80425c729e8, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7640.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 13219.
Key : Analysis.Init.CPU.mSec
Value: 812.
Key : Analysis.Init.Elapsed.mSec
Value: 2181.
Key : Analysis.Memory.CommitPeak.Mb
Value: 74.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: fffff80fbee7c740.
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80425c729e8.
READ_ADDRESS: fffff804264fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
fffff80fbee7c740.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvcontainer.exe
TRAP_FRAME: ffffb78921df6e20 -- (.trap 0xffffb78921df6e20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000007bb0e56d rbx=0000000000000000 rcx=000000017312b047
rdx=fffff80426524440 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80425c729e8 rsp=ffffb78921df6fb0 rbp=000000000000003f
r8=0000000000000000 r9=0000000000000000 r10=0000000000000037
r11=fffff804215ec180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
nt!KiFindReadyThread+0x146f78:
fffff804`25c729e8 488b84cac8000000 mov rax,qword ptr [rdx+rcx*8+0C8h] ds:fffff80f`bee7c740=????????????????
Resetting default scope.
STACK_TEXT:
ffffb789`21df6cd8 fffff804`25c08e69 : 00000000`0000000a fffff80f`bee7c740 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb789`21df6ce0 fffff804`25c05169 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb789`21df6e20 fffff804`25c729e8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffb789`21df6fb0 fffff804`25a0d364 : fffff804`215ec180 00000000`00000000 ffffdb80`cdfa5a00 00000000`00000008 : nt!KiFindReadyThread+0x146f78
ffffb789`21df7020 fffff804`25a0ca5c : fffff804`215ec180 00000000`ffffffff 00000000`00000000 ffffcb81`2ee5a158 : nt!KiSearchForNewThreadOnProcessor+0x254
ffffb789`21df70a0 fffff804`25a0be9f : 00000000`00000000 ffffcb81`00000003 ffffb789`21df7290 fffff804`00000000 : nt!KiSwapThread+0x5ec
ffffb789`21df7150 fffff804`25a805ce : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffffb789`21df71f0 fffff804`25e6f7b0 : ffffb789`21df75b0 00000000`00000001 ffffcb81`30e424f0 ffffdb80`ce18e180 : nt!KeWaitForMultipleObjects+0x2be
ffffb789`21df7300 fffff804`25e6f489 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForMultipleObjects+0x2f0
ffffb789`21df7800 fffff804`25c088b8 : ffffb789`21df7b18 00000000`00000000 ffffcb81`3191c080 ffffcb81`30d70120 : nt!NtWaitForMultipleObjects+0x119
ffffb789`21df7a90 00007ffa`0608d974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000086`07cff828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`0608d974
SYMBOL_NAME: nt!KiFindReadyThread+146f78
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1110
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 146f78.
FAILURE_BUCKET_ID: AV_nt!KiFindReadyThread
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {341c56c9-f4c9-259d-2aa4-c94d6f156edb}
Followup: MachineOwner.
---------[/CODE]