Windows 10 sistemde mavi ekran hatası

İşletim sistemi
Windows 10
MSI Afterburner kaldırın.

Ses sürücsünde bariz bir sorun var. Bağırıyor resmen. DDU ile kaldırıp tekrar kurun. B450M S2H | Anakart | GIGABYTE DDU ile Sürücü Kaldırma Rehberi Realtek olanı kuracaksınız.

Ayrıca şunu fark ettim beta sürüm BIOS kullanıyorsunuz. Bir an önce F60 sürümüne downgrade etmenizi öneririm.

Ağ sürücülerinizi de güncelleyin. DISM Aracıyla Windows 10 Onarma Rehberi - Technopat DISM komutlarını da uygulayın.

Hocam kusura bakmayın beğenemiyorum. İfade yasağım var. O yüzden yazdım.
 
1) Samsung Android cihazınızı bilgisayara bağlamışsınız ve bir sorun bundan kaynaklanmış. Sorun çözülene dek herhangi bir telefonu bilgisayara takmayın.

2) Vanguard'ı kaldırın.

3) IObit Uninstaller yazılımını kaldırın. (Tavsiyem o şirketin hiçbir yazılımını kullanmamanızdan yanadır.)

4) Ses sürücünüzü güncelleyin. Güncel ses sürücüsü aşağıda yer alıyor.

5) HD Tune 5.75 indirin ve tüm sisteme takılı disklerin Health sekmesinin ekran alıntısını paylaşın.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000096, The exception code that was not handled
Arg2: fffff80537870da4, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7171

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 21742

    Key  : Analysis.Init.CPU.mSec
    Value: 843

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2292

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000096

BUGCHECK_P2: fffff80537870da4

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  5b30c48348fffe55 -- (.trap 0x5b30c48348fffe55)
Unable to read trap frame at 5b30c483`48fffe55

STACK_TEXT:
ffff9c01`33cff158 fffff805`37af52ce     : 00000000`0000001e ffffffff`c0000096 fffff805`37870da4 00000000`00000000 : nt!KeBugCheckEx
ffff9c01`33cff160 fffff805`379fed02     : fffff805`37af52ac 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffff9c01`33cff1a0 fffff805`3792bff7     : ffff9c01`33cff710 00000000`00000000 ffff9904`3587dc60 fffff805`379f9964 : nt!RtlpExecuteHandlerForException+0x12
ffff9c01`33cff1d0 fffff805`3792abe6     : ffff9904`3587d4b8 ffff9c01`33cffe20 ffff9904`3587d4b8 0000bba1`8458cc5f : nt!RtlDispatchException+0x297
ffff9c01`33cff8f0 fffff805`379f6cd2     : 79c085ff`9770bbe8 5de8cb8b`48c4eb0a 5b30c483`48fffe55 cccccccc`ccccccc3 : nt!KiDispatchException+0x186
ffff9c01`33cfffb0 fffff805`379f6ca0     : fffff805`37a07ea5 ffff9c01`33cad100 ffff9904`3587d400 ffffffff`ffffffff : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff9904`3587d378 fffff805`37a07ea5     : ffff9c01`33cad100 ffff9904`3587d400 ffffffff`ffffffff fffff805`37959b77 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff9904`3587d380 fffff805`37a03be0     : fffff805`379626c0 fffff805`3790520b fffff805`379626a0 fffff805`378fd6b7 : nt!KiExceptionDispatch+0x125
ffff9904`3587d560 fffff805`37870da4     : ffffe002`f24c7010 00000000`00000000 ffffe002`f24c7010 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffff9904`3587d6f0 fffff805`37870154     : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xad4
ffff9904`3587daf0 fffff805`379f9964     : ffffffff`00000000 ffff9c01`33cb0240 ffffe002`f4528080 00000000`00000990 : nt!PoIdle+0x374
ffff9904`3587dc60 00000000`00000000     : ffff9904`3587e000 ffff9904`35878000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!PpmIdleExecuteTransition+ad4

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.928

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  ad4

FAILURE_BUCKET_ID:  0x1E_c0000096_nt!PpmIdleExecuteTransition

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fb93349e-0bea-ae2d-3a7a-47e59649fd8e}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb685598ca600, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffb685598ca558, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6468

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12783

    Key  : Analysis.Init.CPU.mSec
    Value: 921

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3077

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffb685598ca600

BUGCHECK_P3: ffffb685598ca558

BUGCHECK_P4: 0

TRAP_FRAME:  ffffb685598ca600 -- (.trap 0xffffb685598ca600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8d06f9b73158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff8d06f4b51158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80538c35de3 rsp=ffffb685598ca790 rbp=0000000000000001
r8=0000000000000001  r9=00000000000000ff r10=0000000000000037
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiSelectReadyThread+0x1cf863:
fffff805`38c35de3 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffb685598ca558 -- (.exr 0xffffb685598ca558)
ExceptionAddress: fffff80538c35de3 (nt!KiSelectReadyThread+0x00000000001cf863)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffb685`598ca2d8 fffff805`38c07d69     : 00000000`00000139 00000000`00000003 ffffb685`598ca600 ffffb685`598ca558 : nt!KeBugCheckEx
ffffb685`598ca2e0 fffff805`38c08190     : 00000000`00000000 00000000`00000000 fffff805`38aed580 fffff805`38ae8fe0 : nt!KiBugCheckDispatch+0x69
ffffb685`598ca420 fffff805`38c06523     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb685`598ca600 fffff805`38c35de3     : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb685`598ca790 fffff805`38a65570     : ffffc901`00000008 00000000`ffffffff 00000000`0000000b ffff8d06`f4b51158 : nt!KiSelectReadyThread+0x1cf863
ffffb685`598ca820 fffff805`38a64d7f     : ffff8d06`f3bdf080 00000000`00000000 ffffb685`598ca9e0 00000000`00000000 : nt!KiSwapThread+0x220
ffffb685`598ca8d0 fffff805`38a64623     : ffff8d06`000000a8 fffff805`00000000 fffff805`37035101 ffff8d06`f3bdf1c0 : nt!KiCommitThreadWait+0x14f
ffffb685`598ca970 fffff805`38e2cb91     : ffff8d06`f5071260 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffffb685`598caa60 fffff805`38e2cc3a     : ffff8d06`f3bdf080 000000bd`9b8ffa88 00000000`00000000 fffff805`38c077de : nt!ObWaitForSingleObject+0x91
ffffb685`598caac0 fffff805`38c077b8     : 00000255`1e31dd20 00000000`00000000 ffffb685`598cab18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffb685`598cab00 00007ff8`c1aacda4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bd`9b8ffa58 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c1aacda4


SYMBOL_NAME:  nt!KiSwapThread+220

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.928

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  220

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiSwapThread

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {364d2a10-fb5b-e8e9-9b5b-39c85a1b5a41}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8034a4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7640

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13848

    Key  : Analysis.Init.CPU.mSec
    Value: 1062

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3161

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8034a4fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffff810523984860 -- (.trap 0xffff810523984860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c0000001 rbx=0000000000000000 rcx=00000000c0000001
rdx=ffffc40f97e056ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80349a3c840 rsp=ffff8105239849f0 rbp=7ffffffffffffffc
r8=0000000000000000  r9=0000000000000001 r10=000000000000018c
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!ExpWaitForSpinLockExclusiveAndAcquire+0x50:
fffff803`49a3c840 4080ffff        cmp     dil,0FFh
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.925_none_e76d4f6f260a6

STACK_TEXT:
ffff8105`239849f0 fffff803`49aa3849     : fffff803`4a4e2950 7fffffff`fffffffc ffffc40f`97e05690 ffff9980`e89d8180 : nt!ExpWaitForSpinLockExclusiveAndAcquire+0x50
ffff8105`23984a20 fffff803`49b41192     : 00000000`00000001 ffffc40f`00000000 ffff8105`23984ab0 fffff803`46b9b7ce : nt!ExAcquireSpinLockExclusiveAtDpcLevel+0x79
ffff8105`23984a50 fffff803`49a603dd     : ffffc40f`97e05040 00000000`00000000 ffffc40f`97455b38 fffff803`46b7d440 : nt!KiAbEntryRemoveFromTree+0xb2
ffff8105`23984ae0 fffff803`49b59df8     : ffffc40f`97455b38 00000000`00000003 00000000`00000002 fffff803`00000000 : nt!KeAbPreAcquire+0x15d
ffff8105`23984b30 fffff803`49a60232     : 00000000`00000000 00000000`00000000 ffffc40f`97455b38 fffff803`49af6391 : nt!ExpAcquireFastMutexContended+0x98
ffff8105`23984b70 fffff803`46b984e6     : 00000000`00000000 ffffc40f`00000000 ffffc40f`00000000 ffffc40f`952d63f8 : nt!ExAcquireFastMutex+0x162
ffff8105`23984bc0 fffff803`46b9bfa0     : ffffc40f`976b6010 ffffc40f`976ecbf0 ffffc40f`952d6010 ffffc40f`a7f6ec50 : FLTMGR!TargetedIOCtrlAttachAsFoCtx+0xe6
ffff8105`23984c00 fffff803`46b66d57     : 00000000`00000060 ffffc40f`a7ebb5e8 ffff8609`059e0c40 fffff803`46b65b37 : FLTMGR!FltpSetIoTargetInFileObject+0xc0
ffff8105`23984c50 fffff803`46b9bbd4     : ffff8105`23984d00 ffffc40f`a7f6eca8 ffffc40f`976ecbf0 ffffc40f`976ecbf0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x317
ffff8105`23984cc0 fffff803`49a52f55     : 00000000`00000001 ffffc40f`975948f0 00000000`00000060 ffffc40f`a7ebb5e8 : FLTMGR!FltpCreate+0x324
ffff8105`23984d70 fffff803`49a54544     : 00000000`00000003 ffffc40f`952d6010 ffffc40f`6d4e6f49 fffff803`49b0ade2 : nt!IofCallDriver+0x55
ffff8105`23984db0 fffff803`49dff03d     : ffff8105`23985000 ffffc40f`975948f0 ffffc40f`a7f6ece8 ffff8105`00000000 : nt!IoCallDriverWithTracing+0x34
ffff8105`23984e00 fffff803`49ec5dc7     : ffffc40f`976ecbf0 00000000`00000000 ffffc40f`a5ecfae0 00000000`00120000 : nt!IopParseDevice+0x117d
ffff8105`23984f70 fffff803`49e27a0e     : fffff803`49ec5d00 ffff8105`239850e0 ffffc40f`a5ecfae0 ffffc40f`a7f694a0 : nt!IopParseFile+0xc7
ffff8105`23984fe0 fffff803`49deb30a     : ffffc40f`a5ecfa00 ffff8105`23985248 ffffc40f`00000240 ffffc40f`952f5220 : nt!ObpLookupObjectName+0x3fe
ffff8105`239851b0 fffff803`49e6d63f     : 00000000`00000000 ffff8105`23985830 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1fa
ffff8105`239852e0 fffff803`49e6d0fd     : ffff8105`239856f8 ffff8105`23985458 ffff8105`23985830 ffff8105`23985750 : nt!IopCreateFile+0x40f
ffff8105`23985380 fffff803`46b9d453     : 00000000`00000000 ffff8105`239854d9 ffffc40f`a7ebb5e8 00000000`00000000 : nt!IoCreateFileEx+0x11d
ffff8105`23985420 fffff803`46b9d6b7     : 00000000`00000000 ffff8105`23985760 ffff8105`23985830 fffff803`49b59e5f : FLTMGR!FltpCreateFile+0x16f
ffff8105`23985510 fffff803`4c9becc3     : ffffc40f`97455980 00000000`00000000 ffff8105`239856f8 ffff8105`239856d8 : FLTMGR!FltCreateFileEx2+0xe7
ffff8105`23985640 fffff803`49e3a998     : ffffc40f`a48f8030 ffffc40f`a6e37a00 ffff8608`efed9b30 ffff8105`23985930 : fileinfo!FIPfInterfaceOpen+0x3e3
ffff8105`23985800 fffff803`49e3a074     : ffff8609`062d5818 ffffffff`fffdb610 ffff8105`23985ac0 ffffffff`80004638 : nt!PfpOpenHandleCreate+0xdc
ffff8105`239858d0 fffff803`49e39cd5     : 00000000`0000006c ffff8105`23985b00 ffff8609`0630d8e2 ffff8609`00000000 : nt!PfSnGetSectionObject+0x11c
ffff8105`23985a00 fffff803`49a25975     : ffffc40f`97e05040 ffffc40f`97e05040 ffffc40f`9527ece0 00000000`00000000 : nt!PfSnPopulateReadList+0x2b5
ffff8105`23985b70 fffff803`49b17e85     : ffffc40f`97e05040 00000000`00000080 ffffc40f`95287040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8105`23985c10 fffff803`49bfd498     : ffff9980`e89d8180 ffffc40f`97e05040 fffff803`49b17e30 0d1e0d8d`4c302444 : nt!PspSystemThreadStartup+0x55
ffff8105`23985c60 00000000`00000000     : ffff8105`23986000 ffff8105`23980000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  .trap 0xffff810523984860 ; kb

SYMBOL_NAME:  fileinfo!FIPfInterfaceOpen+3e3

MODULE_NAME: fileinfo

IMAGE_NAME:  fileinfo.sys

IMAGE_VERSION:  10.0.19041.1030

BUCKET_ID_FUNC_OFFSET:  3e3

FAILURE_BUCKET_ID:  0x133_ISR_fileinfo!FIPfInterfaceOpen

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fba07f51-4d5a-1de2-5d4a-3f60ef2056ae}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff898142f08a70, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff898142f089c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8749

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 39010

    Key  : Analysis.Init.CPU.mSec
    Value: 1015

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3346

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff898142f08a70

BUGCHECK_P3: ffff898142f089c8

BUGCHECK_P4: 0

TRAP_FRAME:  ffff898142f08a70 -- (.trap 0xffff898142f08a70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbf8b30713d48 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffbf8b370cdbb8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80170bb1296 rsp=ffff898142f08c00 rbp=ffffbf8b30713d40
r8=ffff898142f08c78  r9=ffffbf8b370cda20 r10=0000000000000000
r11=ffffbf8b33e9d080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
FLTMGR!FltpLinkCompletionNodeToInstance+0xa9d6:
fffff801`70bb1296 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff898142f089c8 -- (.exr 0xffff898142f089c8)
ExceptionAddress: fffff80170bb1296 (FLTMGR!FltpLinkCompletionNodeToInstance+0x000000000000a9d6)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffff8981`42f08748 fffff801`71a07d69     : 00000000`00000139 00000000`00000003 ffff8981`42f08a70 ffff8981`42f089c8 : nt!KeBugCheckEx
ffff8981`42f08750 fffff801`71a08190     : 00000000`00000012 00000000`00000000 00000000`00000000 ffffbf8b`21ef6400 : nt!KiBugCheckDispatch+0x69
ffff8981`42f08890 fffff801`71a06523     : 00000000`00000000 ffffbf8b`21ef6400 ffffbf8b`22010100 fffff801`7184caf2 : nt!KiFastFailDispatch+0xd0
ffff8981`42f08a70 fffff801`70bb1296     : ffffbf8b`370cdba8 00000000`00000000 00000000`00000000 fffff801`71860725 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8981`42f08c00 fffff801`70ba638f     : ffff8981`42f08d29 ffffbf8b`27fb9ba0 ffffbf8b`370cda20 00000000`00000000 : FLTMGR!FltpLinkCompletionNodeToInstance+0xa9d6
ffff8981`42f08c70 fffff801`70ba5b37     : ffff8981`42f08e00 00320065`006d0005 00000000`00000000 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x66f
ffff8981`42f08d90 fffff801`70ba4b46     : ffff8981`42f0a000 ffff8981`42f04000 00000000`00000000 ffff8981`42f08eb0 : FLTMGR!FltpPassThroughInternal+0xc7
ffff8981`42f08de0 fffff801`70ba48bb     : ffffa809`e2200100 00000000`00000000 ffffa809`e2200340 ffffa809`e22003ff : FLTMGR!FltpPassThrough+0x1d6
ffff8981`42f08e80 fffff801`71852f55     : ffffbf8b`34e063b0 fffff801`71852f97 00000000`0000000d ffff8981`00000004 : FLTMGR!FltpDispatch+0x8b
ffff8981`42f08ee0 fffff801`71bdb1d6     : ffffa80a`17edf4b0 ffffbf8b`34e063b0 ffffbf8b`272eace0 00000000`000000d0 : nt!IofCallDriver+0x55
ffff8981`42f08f20 fffff801`71bdae00     : 00000000`00000000 ffffbf8b`32a800c0 ffffa80a`17edf4b0 ffffa80a`17edf4a0 : nt!IopGetFileInformation+0xe2
ffff8981`42f08fa0 fffff801`71bdab9e     : ffffbf8b`32a800c0 ffffbf8b`00000000 ffff8981`42f09101 ffffa80a`17edf4a0 : nt!IopQueryNameInternal+0x21c
ffff8981`42f09050 fffff801`71bdbfb1     : ffffbf8b`32a800c0 ffff8981`42f09b80 ffffbf8b`000000d0 00000000`119dec90 : nt!IoQueryFileDosDeviceName+0x5e
ffff8981`42f090a0 fffff801`71a077b8     : 00000000`119dfda0 00000000`0a3e9000 00000000`00000000 00000000`11adf0cc : nt!NtQueryInformationProcess+0x491
ffff8981`42f09a90 00007ffa`319ed044     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`119de378 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`319ed044


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.928

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------

Hocam kusura bakmayın beğenemiyorum. İfade yasağım var. O yüzden yazdım.

Sorun yok fakat amaç hız değil. Biraz daha dikkatli olursan tam yazabilirsin. Kimse kimseyle yarışmıyor burada. :)
 
MSI Afterburner kaldırın.

Ses sürücsünde bariz bir sorun var. Bağırıyor resmen. DDU ile kaldırıp tekrar kurun. B450M S2H | Anakart | GIGABYTE DDU ile Sürücü Kaldırma Rehberi Realtek olanı kuracaksınız.

Ayrıca şunu fark ettim beta sürüm BIOS kullanıyorsunuz. Bir an önce F60 sürümüne downgrade etmenizi öneririm.

Ağ sürücülerinizi de güncelleyin. DISM Aracıyla Windows 10 Onarma Rehberi - Technopat DISM komutlarını da uygulayın.

hocam kusura bakmayın beğenemiyorum. İfade yasağım var. O yüzden yazdım.

1) Samsung Android cihazınızı bilgisayara bağlamışsınız ve bir sorun bundan kaynaklanmış. Sorun çözülene dek herhangi bir telefonu bilgisayara takmayın.

2) Vanguard'ı kaldırın.

3) IObit uninstaller yazılımını kaldırın. (tavsiyem o şirketin hiçbir yazılımını kullanmamanızdan yanadır.)

4) ses sürücünüzü güncelleyin. Güncel ses sürücüsü aşağıda yer alıyor.

5) HD Tune 5.75 indirin ve tüm sisteme takılı disklerin health sekmesinin ekran alıntısını paylaşın.

Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000096, The exception code that was not handled.
Arg2: fffff80537870da4, The address that the exception occurred at.
Arg3: 0000000000000000, Parameter 0 of the exception.
Arg4: 0000000000000000, Parameter 1 of the exception.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7171.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 21742.

Key : Analysis.Init.CPU.mSec
Value: 843.

Key : Analysis.Init.Elapsed.mSec
Value: 2292.

Key : Analysis.Memory.CommitPeak.Mb
Value: 72.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 1e.

BUGCHECK_P1: ffffffffc0000096.

BUGCHECK_P2: fffff80537870da4.

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: 5b30c48348fffe55 -- (.trap 0x5b30c48348fffe55)
Unable to read trap frame at 5b30c483`48fffe55

STACK_TEXT:
ffff9c01`33cff158 fffff805`37af52ce : 00000000`0000001e ffffffff`c0000096 fffff805`37870da4 00000000`00000000 : nt!KeBugCheckEx
ffff9c01`33cff160 fffff805`379fed02 : fffff805`37af52ac 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffff9c01`33cff1a0 fffff805`3792bff7 : ffff9c01`33cff710 00000000`00000000 ffff9904`3587dc60 fffff805`379f9964 : nt!RtlpExecuteHandlerForException+0x12
ffff9c01`33cff1d0 fffff805`3792abe6 : ffff9904`3587d4b8 ffff9c01`33cffe20 ffff9904`3587d4b8 0000bba1`8458cc5f : nt!RtlDispatchException+0x297
ffff9c01`33cff8f0 fffff805`379f6cd2 : 79c085ff`9770bbe8 5de8cb8b`48c4eb0a 5b30c483`48fffe55 cccccccc`ccccccc3 : nt!KiDispatchException+0x186
ffff9c01`33cfffb0 fffff805`379f6ca0 : fffff805`37a07ea5 ffff9c01`33cad100 ffff9904`3587d400 ffffffff`ffffffff : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff9904`3587d378 fffff805`37a07ea5 : ffff9c01`33cad100 ffff9904`3587d400 ffffffff`ffffffff fffff805`37959b77 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff9904`3587d380 fffff805`37a03be0 : fffff805`379626c0 fffff805`3790520b fffff805`379626a0 fffff805`378fd6b7 : nt!KiExceptionDispatch+0x125
ffff9904`3587d560 fffff805`37870da4 : ffffe002`f24c7010 00000000`00000000 ffffe002`f24c7010 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffff9904`3587d6f0 fffff805`37870154 : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xad4
ffff9904`3587daf0 fffff805`379f9964 : ffffffff`00000000 ffff9c01`33cb0240 ffffe002`f4528080 00000000`00000990 : nt!PoIdle+0x374
ffff9904`3587dc60 00000000`00000000 : ffff9904`3587e000 ffff9904`35878000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54

SYMBOL_NAME: nt!PpmIdleExecuteTransition+ad4

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.928

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: ad4.

FAILURE_BUCKET_ID: 0x1E_c0000096_nt!PpmIdleExecuteTransition

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {fb93349e-0bea-ae2d-3a7a-47e59649fd8e}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb685598ca600, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffffb685598ca558, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6468.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 12783.

Key : Analysis.Init.CPU.mSec
Value: 921.

Key : Analysis.Init.Elapsed.mSec
Value: 3077.

Key : Analysis.Memory.CommitPeak.Mb
Value: 72.

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffffb685598ca600.

BUGCHECK_P3: ffffb685598ca558.

BUGCHECK_P4: 0

TRAP_FRAME: ffffb685598ca600 -- (.trap 0xffffb685598ca600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8d06f9b73158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff8d06f4b51158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80538c35de3 rsp=ffffb685598ca790 rbp=0000000000000001
r8=0000000000000001 r9=00000000000000ff r10=0000000000000037
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
nt!KiSelectReadyThread+0x1cf863:
fffff805`38c35de3 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffffb685598ca558 -- (.exr 0xffffb685598ca558)
ExceptionAddress: fffff80538c35de3 (nt!KiSelectReadyThread+0x00000000001cf863)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: EpicGamesLauncher.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffffb685`598ca2d8 fffff805`38c07d69 : 00000000`00000139 00000000`00000003 ffffb685`598ca600 ffffb685`598ca558 : nt!KeBugCheckEx
ffffb685`598ca2e0 fffff805`38c08190 : 00000000`00000000 00000000`00000000 fffff805`38aed580 fffff805`38ae8fe0 : nt!KiBugCheckDispatch+0x69
ffffb685`598ca420 fffff805`38c06523 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb685`598ca600 fffff805`38c35de3 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb685`598ca790 fffff805`38a65570 : ffffc901`00000008 00000000`ffffffff 00000000`0000000b ffff8d06`f4b51158 : nt!KiSelectReadyThread+0x1cf863
ffffb685`598ca820 fffff805`38a64d7f : ffff8d06`f3bdf080 00000000`00000000 ffffb685`598ca9e0 00000000`00000000 : nt!KiSwapThread+0x220
ffffb685`598ca8d0 fffff805`38a64623 : ffff8d06`000000a8 fffff805`00000000 fffff805`37035101 ffff8d06`f3bdf1c0 : nt!KiCommitThreadWait+0x14f
ffffb685`598ca970 fffff805`38e2cb91 : ffff8d06`f5071260 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffffb685`598caa60 fffff805`38e2cc3a : ffff8d06`f3bdf080 000000bd`9b8ffa88 00000000`00000000 fffff805`38c077de : nt!ObWaitForSingleObject+0x91
ffffb685`598caac0 fffff805`38c077b8 : 00000255`1e31dd20 00000000`00000000 ffffb685`598cab18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffb685`598cab00 00007ff8`c1aacda4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bd`9b8ffa58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c1aacda4

SYMBOL_NAME: nt!KiSwapThread+220

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.928

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 220.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiSwapThread

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {364d2a10-fb5b-e8e9-9b5b-39c85a1b5a41}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL.
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at.
DISPATCH_LEVEL or above. The offending component can usually be.
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8034a4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains.
additional information regarding the cumulative timeout.
Arg4: 0000000000000000.

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7640.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 13848.

Key : Analysis.Init.CPU.mSec
Value: 1062.

Key : Analysis.Init.Elapsed.mSec
Value: 3161.

Key : Analysis.Memory.CommitPeak.Mb
Value: 77.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 133.

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00.

BUGCHECK_P3: fffff8034a4fb320.

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffff810523984860 -- (.trap 0xffff810523984860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c0000001 rbx=0000000000000000 rcx=00000000c0000001
rdx=ffffc40f97e056ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80349a3c840 rsp=ffff8105239849f0 rbp=7ffffffffffffffc
r8=0000000000000000 r9=0000000000000001 r10=000000000000018c
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
nt!ExpWaitForSpinLockExclusiveAndAcquire+0x50:
fffff803`49a3c840 4080ffff cmp dil,0FFh
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.925_none_e76d4f6f260a6

STACK_TEXT:
ffff8105`239849f0 fffff803`49aa3849 : fffff803`4a4e2950 7fffffff`fffffffc ffffc40f`97e05690 ffff9980`e89d8180 : nt!ExpWaitForSpinLockExclusiveAndAcquire+0x50
ffff8105`23984a20 fffff803`49b41192 : 00000000`00000001 ffffc40f`00000000 ffff8105`23984ab0 fffff803`46b9b7ce : nt!ExAcquireSpinLockExclusiveAtDpcLevel+0x79
ffff8105`23984a50 fffff803`49a603dd : ffffc40f`97e05040 00000000`00000000 ffffc40f`97455b38 fffff803`46b7d440 : nt!KiAbEntryRemoveFromTree+0xb2
ffff8105`23984ae0 fffff803`49b59df8 : ffffc40f`97455b38 00000000`00000003 00000000`00000002 fffff803`00000000 : nt!KeAbPreAcquire+0x15d
ffff8105`23984b30 fffff803`49a60232 : 00000000`00000000 00000000`00000000 ffffc40f`97455b38 fffff803`49af6391 : nt!ExpAcquireFastMutexContended+0x98
ffff8105`23984b70 fffff803`46b984e6 : 00000000`00000000 ffffc40f`00000000 ffffc40f`00000000 ffffc40f`952d63f8 : nt!ExAcquireFastMutex+0x162
ffff8105`23984bc0 fffff803`46b9bfa0 : ffffc40f`976b6010 ffffc40f`976ecbf0 ffffc40f`952d6010 ffffc40f`a7f6ec50 : FLTMGR!TargetedIOCtrlAttachAsFoCtx+0xe6
ffff8105`23984c00 fffff803`46b66d57 : 00000000`00000060 ffffc40f`a7ebb5e8 ffff8609`059e0c40 fffff803`46b65b37 : FLTMGR!FltpSetIoTargetInFileObject+0xc0
ffff8105`23984c50 fffff803`46b9bbd4 : ffff8105`23984d00 ffffc40f`a7f6eca8 ffffc40f`976ecbf0 ffffc40f`976ecbf0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x317
ffff8105`23984cc0 fffff803`49a52f55 : 00000000`00000001 ffffc40f`975948f0 00000000`00000060 ffffc40f`a7ebb5e8 : FLTMGR!FltpCreate+0x324
ffff8105`23984d70 fffff803`49a54544 : 00000000`00000003 ffffc40f`952d6010 ffffc40f`6d4e6f49 fffff803`49b0ade2 : nt!IofCallDriver+0x55
ffff8105`23984db0 fffff803`49dff03d : ffff8105`23985000 ffffc40f`975948f0 ffffc40f`a7f6ece8 ffff8105`00000000 : nt!IoCallDriverWithTracing+0x34
ffff8105`23984e00 fffff803`49ec5dc7 : ffffc40f`976ecbf0 00000000`00000000 ffffc40f`a5ecfae0 00000000`00120000 : nt!IopParseDevice+0x117d
ffff8105`23984f70 fffff803`49e27a0e : fffff803`49ec5d00 ffff8105`239850e0 ffffc40f`a5ecfae0 ffffc40f`a7f694a0 : nt!IopParseFile+0xc7
ffff8105`23984fe0 fffff803`49deb30a : ffffc40f`a5ecfa00 ffff8105`23985248 ffffc40f`00000240 ffffc40f`952f5220 : nt!ObpLookupObjectName+0x3fe
ffff8105`239851b0 fffff803`49e6d63f : 00000000`00000000 ffff8105`23985830 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1fa
ffff8105`239852e0 fffff803`49e6d0fd : ffff8105`239856f8 ffff8105`23985458 ffff8105`23985830 ffff8105`23985750 : nt!IopCreateFile+0x40f
ffff8105`23985380 fffff803`46b9d453 : 00000000`00000000 ffff8105`239854d9 ffffc40f`a7ebb5e8 00000000`00000000 : nt!IoCreateFileEx+0x11d
ffff8105`23985420 fffff803`46b9d6b7 : 00000000`00000000 ffff8105`23985760 ffff8105`23985830 fffff803`49b59e5f : FLTMGR!FltpCreateFile+0x16f
ffff8105`23985510 fffff803`4c9becc3 : ffffc40f`97455980 00000000`00000000 ffff8105`239856f8 ffff8105`239856d8 : FLTMGR!FltCreateFileEx2+0xe7
ffff8105`23985640 fffff803`49e3a998 : ffffc40f`a48f8030 ffffc40f`a6e37a00 ffff8608`efed9b30 ffff8105`23985930 : fileinfo!FIPfInterfaceOpen+0x3e3
ffff8105`23985800 fffff803`49e3a074 : ffff8609`062d5818 ffffffff`fffdb610 ffff8105`23985ac0 ffffffff`80004638 : nt!PfpOpenHandleCreate+0xdc
ffff8105`239858d0 fffff803`49e39cd5 : 00000000`0000006c ffff8105`23985b00 ffff8609`0630d8e2 ffff8609`00000000 : nt!PfSnGetSectionObject+0x11c
ffff8105`23985a00 fffff803`49a25975 : ffffc40f`97e05040 ffffc40f`97e05040 ffffc40f`9527ece0 00000000`00000000 : nt!PfSnPopulateReadList+0x2b5
ffff8105`23985b70 fffff803`49b17e85 : ffffc40f`97e05040 00000000`00000080 ffffc40f`95287040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8105`23985c10 fffff803`49bfd498 : ffff9980`e89d8180 ffffc40f`97e05040 fffff803`49b17e30 0d1e0d8d`4c302444 : nt!PspSystemThreadStartup+0x55
ffff8105`23985c60 00000000`00000000 : ffff8105`23986000 ffff8105`23980000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

STACK_COMMAND: .trap 0xffff810523984860 ; kb.

SYMBOL_NAME: fileinfo!FIPfInterfaceOpen+3e3

MODULE_NAME: fileinfo.

IMAGE_NAME: fileinfo.sys

IMAGE_VERSION: 10.0.19041.1030

BUCKET_ID_FUNC_OFFSET: 3e3.

FAILURE_BUCKET_ID: 0x133_ISR_fileinfo!FIPfInterfaceOpen

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {fba07f51-4d5a-1de2-5d4a-3f60ef2056ae}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff898142f08a70, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffff898142f089c8, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8749.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 39010.

Key : Analysis.Init.CPU.mSec
Value: 1015.

Key : Analysis.Init.Elapsed.mSec
Value: 3346.

Key : Analysis.Memory.CommitPeak.Mb
Value: 74.

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffff898142f08a70.

BUGCHECK_P3: ffff898142f089c8.

BUGCHECK_P4: 0

TRAP_FRAME: ffff898142f08a70 -- (.trap 0xffff898142f08a70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbf8b30713d48 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffbf8b370cdbb8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80170bb1296 rsp=ffff898142f08c00 rbp=ffffbf8b30713d40
r8=ffff898142f08c78 r9=ffffbf8b370cda20 r10=0000000000000000
r11=ffffbf8b33e9d080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy.
FLTMGR!FltpLinkCompletionNodeToInstance+0xa9d6:
fffff801`70bb1296 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffff898142f089c8 -- (.exr 0xffff898142f089c8)
ExceptionAddress: fffff80170bb1296 (FLTMGR!FltpLinkCompletionNodeToInstance+0x000000000000a9d6)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffff8981`42f08748 fffff801`71a07d69 : 00000000`00000139 00000000`00000003 ffff8981`42f08a70 ffff8981`42f089c8 : nt!KeBugCheckEx
ffff8981`42f08750 fffff801`71a08190 : 00000000`00000012 00000000`00000000 00000000`00000000 ffffbf8b`21ef6400 : nt!KiBugCheckDispatch+0x69
ffff8981`42f08890 fffff801`71a06523 : 00000000`00000000 ffffbf8b`21ef6400 ffffbf8b`22010100 fffff801`7184caf2 : nt!KiFastFailDispatch+0xd0
ffff8981`42f08a70 fffff801`70bb1296 : ffffbf8b`370cdba8 00000000`00000000 00000000`00000000 fffff801`71860725 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8981`42f08c00 fffff801`70ba638f : ffff8981`42f08d29 ffffbf8b`27fb9ba0 ffffbf8b`370cda20 00000000`00000000 : FLTMGR!FltpLinkCompletionNodeToInstance+0xa9d6
ffff8981`42f08c70 fffff801`70ba5b37 : ffff8981`42f08e00 00320065`006d0005 00000000`00000000 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x66f
ffff8981`42f08d90 fffff801`70ba4b46 : ffff8981`42f0a000 ffff8981`42f04000 00000000`00000000 ffff8981`42f08eb0 : FLTMGR!FltpPassThroughInternal+0xc7
ffff8981`42f08de0 fffff801`70ba48bb : ffffa809`e2200100 00000000`00000000 ffffa809`e2200340 ffffa809`e22003ff : FLTMGR!FltpPassThrough+0x1d6
ffff8981`42f08e80 fffff801`71852f55 : ffffbf8b`34e063b0 fffff801`71852f97 00000000`0000000d ffff8981`00000004 : FLTMGR!FltpDispatch+0x8b
ffff8981`42f08ee0 fffff801`71bdb1d6 : ffffa80a`17edf4b0 ffffbf8b`34e063b0 ffffbf8b`272eace0 00000000`000000d0 : nt!IofCallDriver+0x55
ffff8981`42f08f20 fffff801`71bdae00 : 00000000`00000000 ffffbf8b`32a800c0 ffffa80a`17edf4b0 ffffa80a`17edf4a0 : nt!IopGetFileInformation+0xe2
ffff8981`42f08fa0 fffff801`71bdab9e : ffffbf8b`32a800c0 ffffbf8b`00000000 ffff8981`42f09101 ffffa80a`17edf4a0 : nt!IopQueryNameInternal+0x21c
ffff8981`42f09050 fffff801`71bdbfb1 : ffffbf8b`32a800c0 ffff8981`42f09b80 ffffbf8b`000000d0 00000000`119dec90 : nt!IoQueryFileDosDeviceName+0x5e
ffff8981`42f090a0 fffff801`71a077b8 : 00000000`119dfda0 00000000`0a3e9000 00000000`00000000 00000000`11adf0cc : nt!NtQueryInformationProcess+0x491
ffff8981`42f09a90 00007ffa`319ed044 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`119de378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`319ed044

SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.928

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: d0.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner.
---------

Sorun yok fakat amaç hız değil. Biraz daha dikkatli olursan tam yazabilirsin. Kimse kimseyle yarışmıyor burada. :)

Dediklerinizi uyguladım bakalım mavi ekran gelecek mi diye bekleyeceğim saygılarımla teşekkürler.
 
Teşekkür ederim sizlere de iyi akşamlar :)

Çözülüp çözülmediğini bildirdiğinizde mesajın bildiriminin gelmesi için bu mesajı yazıyorum. Bu saatten sonra artık sorun çözüldüyse yazın ve çözülmediyse de dump dosyasını bizimle paylaşın.
 
Sorun belli bariz ses sürücüsü. DDU ile ses sürücüsünü kaldırın. Aşağıdaki linkten Realtek olanı kurun. Ayrıca hala F61a sürüm BIOS kullanıyorsunuz. F60 sürümüne düşürmenizi tavsiye ederim.
 
Sorun belli bariz ses sürücüsü. DDU ile ses sürücüsünü kaldırın. Aşağıdaki linkten Realtek olanı kurun. Ayrıca hala F61a sürüm BIOS kullanıyorsunuz. F60 sürümüne düşürmenizi tavsiye ederim.

Ses sürücülerini kaldırdım Realtek sürücüsünü yükledim fakat sorun yine var ayrıca BIOS düşürme nasıl yapılır?
Sorun belli bariz ses sürücüsü. DDU ile ses sürücüsünü kaldırın. Aşağıdaki linkten Realtek olanı kurun. Ayrıca hala F61a sürüm BIOS kullanıyorsunuz. F60 sürümüne düşürmenizi tavsiye ederim.

Ayrıca vaktiniz varsa teamwieverdan bana yardımcı olur musunuz?
 

Geri
Yukarı