SSD taktıktan sonra gelen IRQL_NOT_LESS_OR_EQUAL mavi ekran hatası

İşletim sistemi
Windows 10

ultraslan123

Decapat
Katılım
5 Mart 2020
Mesajlar
69
Herkese selamlar iyi forumlar dilerim.
Öncelikle şöyle başlayayım yaklaşık 9 ay önce aldığım bilgisayarımı sorunsuz kullanıyordum tek bir mavi ekran hatasız ve XMP açık halde, ayrıca OC'de yapmıyordum. Aldığım PC'nin taksiti bitmesiyle yeni bir SSD aldım. Aldığım SSD'yi sistemedeki M.2 slotuna sorunsuz montajlayıp kasadaki CPU fanı ve ön fanları çıkartıp temizledim ve sorunsuz yerine taktım. Sonra temiz bir format ile Windows 10'u kurdum.
Daha sonrasında video izlerken mavi ekran almaya başladım, hata kodları değişiklik gösteriyor.
10 kere falan mavi ekran yedim.
Bütün sürücüler güncel, BIOS güncel, DDU ile ekran kartını kaldırıp yeniden yükledim, xpm kapalı.
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY
IRQL_NOT_LESS_OR_EQUAL

MSI B450M-A Pro Max.
Ryzen 5 3500X.
GTX 1650 Super Gaming X
XPG 8x2 3600MHz RAM.
1TB HDD.
MP600 Core NVMe M.2 SSD 1 TB

 
Son düzenleme:
BIOS'unuz güncel mi? Yeni SSD takıldıktan sonra oluşan mavi ekran hataları BIOS güncellemesi ile düzeltilebiliyor. Daha önce aynı şekilde m.2 slotundan taktığım SSD mavi ekrana neden oluyordu. BIOS güncellemesi sonrası problemi gidermiştim.
Minidump dosyası ise paylaştığınız, herkese açık yapmanız gerekiyor. Dosyayı göremiyorum.
 
Artı -1 Eksi
BIOS'unuz güncel mi? Yeni SSD takıldıktan sonra oluşan mavi ekran hataları BIOS güncellemesi ile düzeltilebiliyor. Daha önce aynı şekilde M.2 slotundan taktığım SSD mavi ekrana neden oluyordu. BIOS güncellemesi sonrası problemi gider miştim.
Minidump dosyası ise paylaştığınız, herkese açık yapmanız gerekiyor. Dosyayı göremiyorum.

BIOS'um güncel, 2 ay içinde yeni güncelleme gelmediyse.
Herkese açık yaptım buyurun yardımınız için teşekkür ederim.rar

++​

Sadece IRQL_NOT_LESS_OR_EQUAL'diye hata almıyorum daha farklı kodlarla karşılaşıyorum fakat hiç bakamadım.​

 
Memtest86 ile RAM'lerinizi test ettiniz mi?
SSD'yi sistemden çıkarınca aynı mavi ekran hataları devam ediyor mu?
Ayrıca sisteminizde geniş çaplı bir virüs taraması yapabilir misiniz?
 
SSD'yi sistemden çıkarıp tekrar deneyin.
DMP dosyalarının çoğunda ntkrnlmp.exe var. Genellikle belleğe suç atan dosya bu. (Mavi ekran hatalarında tabii ki.) Memtest86 ile test edin.
Sisteminizde zararlı var ise o da sorun çıkarıyor olabilir. Sisteminizde tam tarama yapın. (Kaspersky ile.)
 
Memtest86 ile Recep abinin bu videodaki yaptığı gibi mi yapacağım?

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

++
BIOS güncelmiş, Kaspersky ile yaptığım tam tarama da herhangi bir virüse rastlamadım.
Ayrıca birkaç yerde BIOS'taki AHCI'den kaynaklı olduğunu gördüm. Fakat bir de RAID var.
++
Ayrıca sorun sadece video izlerken mavi ekran almamdı ama şimdi mavi ekran değil birden kilitlenme var görüntü tamamen donuyor ve kilitleniyor.

Arkadaşlar PC'yi aldığımdan beri RAM slotlarına hiç dokunmadım, yani 9 ay kadar bu RAM'lerle sorun yaşamadım.
Şimdi hiçbir şekilde yerinden bile sökmeden ramlarden kaynaklı olacağını düşünmüyorum.
Beni asıl düşündüren şey BIOS'daki AHCI ve RAID seçenekleri, bence AHCI'den kaynaklı ve demin RAID'e çektim. Sorun devam ederse ekleme yapacağım.
++ Ek olarak.
Böyle bir sorunun çözümünde yardımcı olduğunuzu gördüm rica etsem bana da yardımcı olur musunuz?
@Enes3078 ve @Yener K.
 
Son düzenleyen: Moderatör:
1) Sanırım HyperX Cloud II kulaklığa sahipsiniz. Kulaklığı farklı bir USB portuna takın ve kulaklığa ait bir sürücü/kontrol yazılımı varsa bunu kaldırın.

2) BattlEye Anti-Cheat'i kaldırın.

3) Hızlı Başlat özelliğini kapatın.

Sorun çözülürse de belirtirseniz sevinirim.


[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffef0cf569ff50, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffef0cf569fea8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8358

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 23123

Key : Analysis.Init.CPU.mSec
Value: 984

Key : Analysis.Init.Elapsed.mSec
Value: 2201

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffef0cf569ff50

BUGCHECK_P3: ffffef0cf569fea8

BUGCHECK_P4: 0

TRAP_FRAME: ffffef0cf569ff50 -- (.trap 0xffffef0cf569ff50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8a0fc55076e0 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff8046f49b399 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046f61a5e1 rsp=ffffef0cf56a00e0 rbp=00000300c55c63f4
r8=0016ec27e8cc8b49 r9=fffff8046f200000 r10=fffff8046a66aac0
r11=ffffef0cf56a0100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!KiInsertTimerTable+0x20c841:
fffff804`6f61a5e1 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffef0cf569fea8 -- (.exr 0xffffef0cf569fea8)
ExceptionAddress: fffff8046f61a5e1 (nt!KiInsertTimerTable+0x000000000020c841)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffef0c`f569fc28 fffff804`6f609069 : 00000000`00000139 00000000`00000003 ffffef0c`f569ff50 ffffef0c`f569fea8 : nt!KeBugCheckEx
ffffef0c`f569fc30 fffff804`6f609490 : 00000000`00000000 ffff8a0f`c55075c0 00000001`ffffffff fffffff6`00000007 : nt!KiBugCheckDispatch+0x69
ffffef0c`f569fd70 fffff804`6f607823 : 00000000`00000000 ffffef0c`f56a0200 00000000`00000000 fffff804`6f5fdeb6 : nt!KiFastFailDispatch+0xd0
ffffef0c`f569ff50 fffff804`6f61a5e1 : 00000000`00000000 00000000`00000000 00000000`00000000 43300000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffef0c`f56a00e0 fffff804`6f40c10d : ffff8a0f`c55075c0 fffff804`00000003 ffffef0c`f56a02a0 fffff804`00000000 : nt!KiInsertTimerTable+0x20c841
ffffef0c`f56a0160 fffff804`6f4805ce : 40e77000`00000057 43300000`00000000 40e77000`00000001 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
ffffef0c`f56a0200 fffff804`6f86f7b0 : ffffef0c`f56a05c0 00000000`00000001 ffff8a0f`ca819730 00000000`00000000 : nt!KeWaitForMultipleObjects+0x2be
ffffef0c`f56a0310 fffff804`6f8e333b : 0000000e`60124d00 fffff804`6f4879e6 00000000`00000002 00000000`00000000 : nt!ObWaitForMultipleObjects+0x2f0
ffffef0c`f56a0810 fffff804`6f608ab8 : 00000000`00000000 ffff8a0f`c55075c0 00000000`14a3f2c8 ffffef0c`f56a0aa8 : nt!NtWaitForMultipleObjects32+0x11b
ffffef0c`f56a0a90 00000000`77b41cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`14a3f2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b41cfc


SYMBOL_NAME: nt!KiInsertTimerTable+20c841

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1151

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 20c841

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and BugCheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 80f68f0527cbce41, Actual security check cookie from the stack
Arg2: 0000cdff27cbce41, Expected security check cookie
Arg3: ffff3200d83431be, Complement of the expected security check cookie
Arg4: 0000000000000000, zero

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6031

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 7867

Key : Analysis.Init.CPU.mSec
Value: 952

Key : Analysis.Init.Elapsed.mSec
Value: 2069

Key : Analysis.Memory.CommitPeak.Mb
Value: 71

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: f7

BUGCHECK_P1: 80f68f0527cbce41

BUGCHECK_P2: cdff27cbce41

BUGCHECK_P3: ffff3200d83431be

BUGCHECK_P4: 0

SECURITY_COOKIE: Expected 0000cdff27cbce41 found 80f68f0527cbce41

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

STACK_TEXT:
ffff830c`709b8668 fffff803`192b10f5 : 00000000`000000f7 80f68f05`27cbce41 0000cdff`27cbce41 ffff3200`d83431be : nt!KeBugCheckEx
ffff830c`709b8670 fffff803`1931a7d9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!_report_gsfailure+0x25
ffff830c`709b86b0 4b4b4a49`48484747 : 41434445`47484a4b 00000000`00000042 ffff830c`709b87b9 00000000`00000000 : nt!KiSelectProcessorToPreempt+0x191
ffff830c`709b8750 41434445`47484a4b : 00000000`00000042 ffff830c`709b87b9 00000000`00000000 ffff830c`709b8790 : 0x4b4b4a49`48484747
ffff830c`709b8758 00000000`00000042 : ffff830c`709b87b9 00000000`00000000 ffff830c`709b8790 ffff830c`709b8788 : 0x41434445`47484a4b
ffff830c`709b8760 ffff830c`709b87b9 : 00000000`00000000 ffff830c`709b8790 ffff830c`709b8788 00000000`0000003f : 0x42
ffff830c`709b8768 00000000`00000000 : ffff830c`709b8790 ffff830c`709b8788 00000000`0000003f 00000000`0000003f : 0xffff830c`709b87b9


SYMBOL_NAME: nt!_report_gsfailure+25

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1110

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 25

FAILURE_BUCKET_ID: 0xF7_MISSING_GSFRAME_nt!_report_gsfailure

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {82d2c1b5-b0cb-60a5-9a5d-78c8c4284f84}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80fbee7c740, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80425c729e8, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7640

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 13219

Key : Analysis.Init.CPU.mSec
Value: 812

Key : Analysis.Init.Elapsed.mSec
Value: 2181

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: a

BUGCHECK_P1: fffff80fbee7c740

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80425c729e8

READ_ADDRESS: fffff804264fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80fbee7c740

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: nvcontainer.exe

TRAP_FRAME: ffffb78921df6e20 -- (.trap 0xffffb78921df6e20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000007bb0e56d rbx=0000000000000000 rcx=000000017312b047
rdx=fffff80426524440 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80425c729e8 rsp=ffffb78921df6fb0 rbp=000000000000003f
r8=0000000000000000 r9=0000000000000000 r10=0000000000000037
r11=fffff804215ec180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiFindReadyThread+0x146f78:
fffff804`25c729e8 488b84cac8000000 mov rax,qword ptr [rdx+rcx*8+0C8h] ds:fffff80f`bee7c740=????????????????
Resetting default scope

STACK_TEXT:
ffffb789`21df6cd8 fffff804`25c08e69 : 00000000`0000000a fffff80f`bee7c740 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb789`21df6ce0 fffff804`25c05169 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb789`21df6e20 fffff804`25c729e8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffb789`21df6fb0 fffff804`25a0d364 : fffff804`215ec180 00000000`00000000 ffffdb80`cdfa5a00 00000000`00000008 : nt!KiFindReadyThread+0x146f78
ffffb789`21df7020 fffff804`25a0ca5c : fffff804`215ec180 00000000`ffffffff 00000000`00000000 ffffcb81`2ee5a158 : nt!KiSearchForNewThreadOnProcessor+0x254
ffffb789`21df70a0 fffff804`25a0be9f : 00000000`00000000 ffffcb81`00000003 ffffb789`21df7290 fffff804`00000000 : nt!KiSwapThread+0x5ec
ffffb789`21df7150 fffff804`25a805ce : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffffb789`21df71f0 fffff804`25e6f7b0 : ffffb789`21df75b0 00000000`00000001 ffffcb81`30e424f0 ffffdb80`ce18e180 : nt!KeWaitForMultipleObjects+0x2be
ffffb789`21df7300 fffff804`25e6f489 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForMultipleObjects+0x2f0
ffffb789`21df7800 fffff804`25c088b8 : ffffb789`21df7b18 00000000`00000000 ffffcb81`3191c080 ffffcb81`30d70120 : nt!NtWaitForMultipleObjects+0x119
ffffb789`21df7a90 00007ffa`0608d974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000086`07cff828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`0608d974


SYMBOL_NAME: nt!KiFindReadyThread+146f78

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1110

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 146f78

FAILURE_BUCKET_ID: AV_nt!KiFindReadyThread

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {341c56c9-f4c9-259d-2aa4-c94d6f156edb}

Followup: MachineOwner
---------[/CODE]
 
1) sanırım HyperX Cloud II kulaklığa sahipsiniz. Kulaklığı farklı bir USB portuna takın ve kulaklığa ait bir sürücü/kontrol yazılımı varsa bunu kaldırın.

2) BattlEye anti-cheat'i kaldırın.

3) hızlı başlat özelliğini kapatın.

Sorun çözülürse de belirtirseniz sevinirim.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffef0cf569ff50, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffffef0cf569fea8, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8358.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 23123.

Key : Analysis.Init.CPU.mSec
Value: 984.

Key : Analysis.Init.Elapsed.mSec
Value: 2201.

Key : Analysis.Memory.CommitPeak.Mb
Value: 73.

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffffef0cf569ff50.

BUGCHECK_P3: ffffef0cf569fea8.

BUGCHECK_P4: 0

TRAP_FRAME: ffffef0cf569ff50 -- (.trap 0xffffef0cf569ff50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8a0fc55076e0 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff8046f49b399 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046f61a5e1 rsp=ffffef0cf56a00e0 rbp=00000300c55c63f4
r8=0016ec27e8cc8b49 r9=fffff8046f200000 r10=fffff8046a66aac0
r11=ffffef0cf56a0100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy.
nt!KiInsertTimerTable+0x20c841:
fffff804`6f61a5e1 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffffef0cf569fea8 -- (.exr 0xffffef0cf569fea8)
ExceptionAddress: fffff8046f61a5e1 (nt!KiInsertTimerTable+0x000000000020c841)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffffef0c`f569fc28 fffff804`6f609069 : 00000000`00000139 00000000`00000003 ffffef0c`f569ff50 ffffef0c`f569fea8 : nt!KeBugCheckEx
ffffef0c`f569fc30 fffff804`6f609490 : 00000000`00000000 ffff8a0f`c55075c0 00000001`ffffffff fffffff6`00000007 : nt!KiBugCheckDispatch+0x69
ffffef0c`f569fd70 fffff804`6f607823 : 00000000`00000000 ffffef0c`f56a0200 00000000`00000000 fffff804`6f5fdeb6 : nt!KiFastFailDispatch+0xd0
ffffef0c`f569ff50 fffff804`6f61a5e1 : 00000000`00000000 00000000`00000000 00000000`00000000 43300000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffef0c`f56a00e0 fffff804`6f40c10d : ffff8a0f`c55075c0 fffff804`00000003 ffffef0c`f56a02a0 fffff804`00000000 : nt!KiInsertTimerTable+0x20c841
ffffef0c`f56a0160 fffff804`6f4805ce : 40e77000`00000057 43300000`00000000 40e77000`00000001 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
ffffef0c`f56a0200 fffff804`6f86f7b0 : ffffef0c`f56a05c0 00000000`00000001 ffff8a0f`ca819730 00000000`00000000 : nt!KeWaitForMultipleObjects+0x2be
ffffef0c`f56a0310 fffff804`6f8e333b : 0000000e`60124d00 fffff804`6f4879e6 00000000`00000002 00000000`00000000 : nt!ObWaitForMultipleObjects+0x2f0
ffffef0c`f56a0810 fffff804`6f608ab8 : 00000000`00000000 ffff8a0f`c55075c0 00000000`14a3f2c8 ffffef0c`f56a0aa8 : nt!NtWaitForMultipleObjects32+0x11b
ffffef0c`f56a0a90 00000000`77b41cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`14a3f2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b41cfc.

SYMBOL_NAME: nt!KiInsertTimerTable+20c841

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1151

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 20c841.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially.
allow a malicious user to gain control of this machine.
DESCRIPTION.
A driver overran a stack-based buffer (or local variable) in a way that would.
have overwritten the function's return address and jumped back to an arbitrary.
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user.
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the.
buffer overrun handlers and BugCheck call is the one that overran its local.
variable(s).
Arguments:
Arg1: 80f68f0527cbce41, Actual security check cookie from the stack.
Arg2: 0000cdff27cbce41, Expected security check cookie.
Arg3: ffff3200d83431be, Complement of the expected security check cookie.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6031.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 7867.

Key : Analysis.Init.CPU.mSec
Value: 952.

Key : Analysis.Init.Elapsed.mSec
Value: 2069.

Key : Analysis.Memory.CommitPeak.Mb
Value: 71.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: f7.

BUGCHECK_P1: 80f68f0527cbce41.

BUGCHECK_P2: cdff27cbce41.

BUGCHECK_P3: ffff3200d83431be.

BUGCHECK_P4: 0

SECURITY_COOKIE: Expected 0000cdff27cbce41 found 80f68f0527cbce41.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

STACK_TEXT:
ffff830c`709b8668 fffff803`192b10f5 : 00000000`000000f7 80f68f05`27cbce41 0000cdff`27cbce41 ffff3200`d83431be : nt!KeBugCheckEx
ffff830c`709b8670 fffff803`1931a7d9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!_report_gsfailure+0x25
ffff830c`709b86b0 4b4b4a49`48484747 : 41434445`47484a4b 00000000`00000042 ffff830c`709b87b9 00000000`00000000 : nt!KiSelectProcessorToPreempt+0x191
ffff830c`709b8750 41434445`47484a4b : 00000000`00000042 ffff830c`709b87b9 00000000`00000000 ffff830c`709b8790 : 0x4b4b4a49`48484747
ffff830c`709b8758 00000000`00000042 : ffff830c`709b87b9 00000000`00000000 ffff830c`709b8790 ffff830c`709b8788 : 0x41434445`47484a4b
ffff830c`709b8760 ffff830c`709b87b9 : 00000000`00000000 ffff830c`709b8790 ffff830c`709b8788 00000000`0000003f : 0x42.
ffff830c`709b8768 00000000`00000000 : ffff830c`709b8790 ffff830c`709b8788 00000000`0000003f 00000000`0000003f : 0xffff830c`709b87b9

SYMBOL_NAME: nt!_report_gsfailure+25

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1110

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 25.

FAILURE_BUCKET_ID: 0xF7_MISSING_GSFRAME_nt!_report_gsfailure

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {82d2c1b5-b0cb-60a5-9a5d-78c8c4284f84}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80fbee7c740, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80425c729e8, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7640.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 13219.

Key : Analysis.Init.CPU.mSec
Value: 812.

Key : Analysis.Init.Elapsed.mSec
Value: 2181.

Key : Analysis.Memory.CommitPeak.Mb
Value: 74.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: a

BUGCHECK_P1: fffff80fbee7c740.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80425c729e8.

READ_ADDRESS: fffff804264fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
fffff80fbee7c740.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: nvcontainer.exe

TRAP_FRAME: ffffb78921df6e20 -- (.trap 0xffffb78921df6e20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000007bb0e56d rbx=0000000000000000 rcx=000000017312b047
rdx=fffff80426524440 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80425c729e8 rsp=ffffb78921df6fb0 rbp=000000000000003f
r8=0000000000000000 r9=0000000000000000 r10=0000000000000037
r11=fffff804215ec180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
nt!KiFindReadyThread+0x146f78:
fffff804`25c729e8 488b84cac8000000 mov rax,qword ptr [rdx+rcx*8+0C8h] ds:fffff80f`bee7c740=????????????????
Resetting default scope.

STACK_TEXT:
ffffb789`21df6cd8 fffff804`25c08e69 : 00000000`0000000a fffff80f`bee7c740 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb789`21df6ce0 fffff804`25c05169 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb789`21df6e20 fffff804`25c729e8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffb789`21df6fb0 fffff804`25a0d364 : fffff804`215ec180 00000000`00000000 ffffdb80`cdfa5a00 00000000`00000008 : nt!KiFindReadyThread+0x146f78
ffffb789`21df7020 fffff804`25a0ca5c : fffff804`215ec180 00000000`ffffffff 00000000`00000000 ffffcb81`2ee5a158 : nt!KiSearchForNewThreadOnProcessor+0x254
ffffb789`21df70a0 fffff804`25a0be9f : 00000000`00000000 ffffcb81`00000003 ffffb789`21df7290 fffff804`00000000 : nt!KiSwapThread+0x5ec
ffffb789`21df7150 fffff804`25a805ce : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffffb789`21df71f0 fffff804`25e6f7b0 : ffffb789`21df75b0 00000000`00000001 ffffcb81`30e424f0 ffffdb80`ce18e180 : nt!KeWaitForMultipleObjects+0x2be
ffffb789`21df7300 fffff804`25e6f489 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForMultipleObjects+0x2f0
ffffb789`21df7800 fffff804`25c088b8 : ffffb789`21df7b18 00000000`00000000 ffffcb81`3191c080 ffffcb81`30d70120 : nt!NtWaitForMultipleObjects+0x119
ffffb789`21df7a90 00007ffa`0608d974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000086`07cff828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`0608d974

SYMBOL_NAME: nt!KiFindReadyThread+146f78

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1110

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 146f78.

FAILURE_BUCKET_ID: AV_nt!KiFindReadyThread

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {341c56c9-f4c9-259d-2aa4-c94d6f156edb}

Followup: MachineOwner.
---------[/CODE]

Şu an AHCI'den RAID'e geçtim. Bu test bittikten hemen sonra sizin dediğinize bakacağım, çok teşekkür ederim.
++
Ek olarak sorunun çözümünü ararken aygıt yöneticisinden kulaklığımla ilgili bir bölümde ünlem işareti oldugunu gördüm. Bu arada evet HyperX Cloud 2 kullanıyorum.
 
Evet, anladım. Dediğim gibi farklı bir porta takın ve sürücüsü varsa kaldırın. Bir şey bilmeden yazmayız ya :D

Artık sorunun çözülüp çözülmediğini belirtmenizi bekliyor olacağım.
 
Merhaba @Enes3078 Yaklaşık 1 aydır test sürecindeydim fakat hala düzelmedi ve bugün 3. mavi ekran aldım. Sadece video izlerken bu mavi ekranı aldığımı teyit etmek isterim.
Minidump dosyalarını yükleyemiyorum, "Bu nesnenin özelliklerini görüntülemek için okuma izinlerine sahip olmanız gerekir" diye bir hata alıyorum.

Sizi de bu konu da tecrübeli olduğunuz için etiketliyorum belki yardım edebilirsiniz. @Yener K.
Ek olarak Windows sorun gidericisinde böyle bir problem ile karşılaşdım.

1631557898956.png
 
Son düzenleme:

Geri
Yukarı