Merhaba, yeni sistemde bilgisayar boştayken mavi ekrana düşüyor. Oyun vs oynarken mavi ekran olmuyor. Minidump dosyasını bırakıyorum;
Minidump.zip
drive.google.com
Sorun bunlardan kaynaklı mı hocam?
Tamamdır hocam deneyeceğim birazdan.Evet deneyip sonuçları paylaşın beklemedeyim.
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff800192917770, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8001929176c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3249
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-AF2QT03
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 65418
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff800192917770
BUGCHECK_P3: ffff8001929176c8
BUGCHECK_P4: 0
TRAP_FRAME: ffff800192917770 -- (.trap 0xffff800192917770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9580eadbea80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe185f2b99158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80618435ff8 rsp=ffff800192917900 rbp=ffff9580eadb9180
r8=0000000000000002 r9=000000750a625e15 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x528:
fffff806`18435ff8 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff8001929176c8 -- (.exr 0xffff8001929176c8)
ExceptionAddress: fffff80618435ff8 (nt!KiCommitThreadWait+0x0000000000000528)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff8001`92917448 fffff806`185d4b29 : 00000000`00000139 00000000`00000003 ffff8001`92917770 ffff8001`929176c8 : nt!KeBugCheckEx
ffff8001`92917450 fffff806`185d4f50 : ffff8001`00000000 fffff806`00000000 ffff8001`92917900 ffffcb0d`399f8910 : nt!KiBugCheckDispatch+0x69
ffff8001`92917590 fffff806`185d32e3 : 00000000`00000000 00000000`00000000 00000000`0000000a 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8001`92917770 fffff806`18435ff8 : 00000001`0000000a 00000000`00000000 00000000`00000fff 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8001`92917900 fffff806`184353b5 : 00000000`00000000 00000000`00000000 ffff9580`eadb9180 00000000`00000000 : nt!KiCommitThreadWait+0x528
ffff8001`929179a0 fffff806`189dc0cb : ffffe185`e9571fe0 ffffe185`00000006 00000000`00000001 ffff8001`92917b00 : nt!KeWaitForSingleObject+0x255
ffff8001`92917a80 fffff806`185d4558 : ffffe185`eaa7a080 00000027`967fee28 ffff8001`92917b18 ffffffff`ff776f10 : nt!NtWaitForSingleObject+0x10b
ffff8001`92917b00 00007ff9`3e83c144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000027`967fedf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`3e83c144
SYMBOL_NAME: nt!KiCommitThreadWait+528
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1139
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 528
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {369b7001-cfef-011b-6243-985c04f34d42}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80070c5aace, Address of the instruction which caused the bugcheck
Arg3: ffffd2026ad24dd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2733
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-AF2QT03
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10436
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80070c5aace
BUGCHECK_P3: ffffd2026ad24dd0
BUGCHECK_P4: 0
CONTEXT: ffffd2026ad24dd0 -- (.cxr 0xffffd2026ad24dd0)
rax=0000000000000001 rbx=ffffd40dd782c240 rcx=0000000000000034
rdx=000000000000002f rsi=ffffd40dd53d4380 rdi=0000000000000000
rip=fffff80070c5aace rsp=ffffd2026ad257c0 rbp=ffffd2026ad25b80
r8=ffffd40dd3dfa042 r9=0000000000000002 r10=00000000ffffffff
r11=0000000000000009 r12=ffffd40dda908080 r13=ffffd40dd53d4380
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!IopCompleteRequest+0x8e:
fffff800`70c5aace 8327cf and dword ptr [rdi],0FFFFFFCFh ds:002b:00000000`00000000=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
IRP_ADDRESS: ffffd40dd782c1d8
STACK_TEXT:
ffffd202`6ad257c0 fffff800`70c39e3d : ffffd40d`d782c250 fffff800`70c2c401 ffffd40d`d782c200 0000020d`82133320 : nt!IopCompleteRequest+0x8e
ffffd202`6ad258b0 fffff800`711e1ec0 : ffffd202`6ad25a20 000000a5`325ffa28 00000000`00000401 fffff312`59dd93ff : nt!IoRemoveIoCompletion+0x26d
ffffd202`6ad259d0 fffff800`70dd4558 : ffffd40d`da908080 000000a5`325ffa08 ffffd202`6ad25aa8 0000020d`82133320 : nt!NtRemoveIoCompletion+0x140
ffffd202`6ad25a90 00007ff9`9221c1e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a5`325ff9e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`9221c1e4
SYMBOL_NAME: nt!IoRemoveIoCompletion+26d
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1139
STACK_COMMAND: .cxr 0xffffd2026ad24dd0 ; kb
BUCKET_ID_FUNC_OFFSET: 26d
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IoRemoveIoCompletion
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {19a77e32-9f31-c0b5-5bc2-0cf9083a3833}
Followup: MachineOwner
---------
FAST_ERESOURCE_PRECONDITION_VIOLATION (1c6)
The current thread is performing an invalid call to a fast resource routine.
Arguments:
Arg1: 0000000000000014, A thread exited with outstanding lock acquisitions.
Arg2: ffff9e09282f0080, The thread.
Arg3: fffff80507a368bc, Pointer to one of the outstanding owner entries.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2358
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-AF2QT03
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21296
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1c6
BUGCHECK_P1: 14
BUGCHECK_P2: ffff9e09282f0080
BUGCHECK_P3: fffff80507a368bc
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
STACK_TEXT:
ffffb788`1e3d9388 fffff805`081d4c57 : 00000000`000001c6 00000000`00000014 ffff9e09`282f0080 fffff805`07a368bc : nt!KeBugCheckEx
ffffb788`1e3d9390 fffff805`07fe63b0 : 00000000`00000000 ffff9e09`282f0050 ffffb788`1e3d9589 00000000`00000000 : nt!PspThreadDelete+0x14e7c7
ffffb788`1e3d9400 fffff805`07a34f79 : 00000000`00000000 00000000`00000000 ffffb788`1e3d9589 ffff9e09`282f0080 : nt!ObpRemoveObjectRoutine+0x80
ffffb788`1e3d9460 fffff805`07fd48c7 : 00000000`00000000 ffff9e09`282f0050 ffff9e09`00000000 ffff9e09`273165e0 : nt!ObfDereferenceObjectWithTag+0xc9
ffffb788`1e3d94a0 fffff805`080ae725 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7
ffffb788`1e3d95e0 fffff805`0809496d : 00000000`00000000 ffff9e09`2744f080 ffffffff`ffffff01 ffff9e09`280e6380 : nt!ExSweepHandleTable+0xd5
ffffb788`1e3d9690 fffff805`07fb9d2d : ffffffff`ffffffff ffff9e09`280e6080 ffffb788`1e3d96e0 ffff9e09`00000000 : nt!ObKillProcess+0x35
ffffb788`1e3d96c0 fffff805`08084753 : ffff9e09`280e6080 ffffbe08`d270a060 ffffb788`1e3d98e9 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffffb788`1e3d9740 fffff805`080c7ee3 : 00000000`40010004 00000000`00000001 000000c7`e6506000 00000000`00000000 : nt!PspExitThread+0x60b
ffffb788`1e3d9850 fffff805`07a38b21 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffb788`1e3d9890 fffff805`07bc7240 : 00000000`00000001 ffffb788`1e3d9950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffffb788`1e3d9950 fffff805`07bd45ff : ffff9e09`2744f080 000000c7`e845f6f8 ffff9e09`ffffffff fffff805`00001cff : nt!KiInitiateUserApc+0x70
ffffb788`1e3d9a90 00007ffa`50609a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c7`e845f6d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`50609a84
SYMBOL_NAME: nt!PspThreadDelete+14e7c7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1139
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14e7c7
FAILURE_BUCKET_ID: 0x1C6_nt!PspThreadDelete
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {15db6b61-555f-1f75-80be-2c230fa0518a}
Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ff87245c144, Address of system call function or worker routine
Arg2: 0000000000000001, Thread->ApcStateIndex
Arg3: 0000000000000000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffd70494b39b80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1609
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-AF2QT03
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6263
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1
BUGCHECK_P1: 7ff87245c144
BUGCHECK_P2: 1
BUGCHECK_P3: 0
BUGCHECK_P4: ffffd70494b39b80
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
BAD_STACK_POINTER: ffffd70494b399b8
STACK_TEXT:
ffffd704`94b399b8 fffff801`637d4b29 : 00000000`00000001 00007ff8`7245c144 00000000`00000001 00000000`00000000 : nt!KeBugCheckEx
ffffd704`94b399c0 fffff801`637d49d3 : ffff870d`b1ddf080 0000004a`a42cfd18 ffffd704`94b39b18 ffffffff`fffe7960 : nt!KiBugCheckDispatch+0x69
ffffd704`94b39b00 00007ff8`7245c144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000004a`a42cfce8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`7245c144
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1139
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: 0x1_SysCallNum_0_STACKPTR_ERROR_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {29841e22-ca67-b63d-5b1c-3557be9f186c}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffc09ecfa1770, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffc09ecfa16c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 46
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-AF2QT03
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 51
Key : Analysis.Memory.CommitPeak.Mb
Value: 44
Key : Analysis.System
Value: CreateObject
Key : WER.CorruptModuleList
Value: 1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffffc09ecfa1770
BUGCHECK_P3: fffffc09ecfa16c8
BUGCHECK_P4: 0
TRAP_FRAME: fffffc09ecfa1770 -- (.trap 0xfffffc09ecfa1770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc81713c5a80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffdf8b4228f158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80536435ff8 rsp=fffffc09ecfa1900 rbp=ffffcc81713c0180
r8=0000000000000002 r9=000000020ee74fa6 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
fffff805`36435ff8 ?? ???
Resetting default scope
EXCEPTION_RECORD: fffffc09ecfa16c8 -- (.exr 0xfffffc09ecfa16c8)
ExceptionAddress: fffff80536435ff8
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CUSTOMER_CRASH_COUNT: 1
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffc09`ecfa1900 ffffdf8b`42290080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff805`36435ff8
fffffc09`ecfa1908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffcc81`71080180 : 0xffffdf8b`42290080
STACK_COMMAND: .trap 0xfffffc09ecfa1770 ; kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_0x139
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bec1bc00-1c8a-a417-55b2-9f8b67cbb1c5}
Followup: MachineOwner
---------
Sonuçları bekliyorum kral. Kolay gelsin.Tamamdır hocam deneyeceğim birazdan.
Cevabınız için teşekkürler tamamdır.MemTest86 ile belleklerinizi test eder misiniz?Kod:KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: ffff800192917770, Address of the trap frame for the exception that caused the bugcheck Arg3: ffff8001929176c8, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3249 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-AF2QT03 Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 65418 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: 19h1_release Key : WER.OS.Timestamp Value: 2019-03-18T12:02:00Z Key : WER.OS.Version Value: 10.0.18362.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 139 BUGCHECK_P1: 3 BUGCHECK_P2: ffff800192917770 BUGCHECK_P3: ffff8001929176c8 BUGCHECK_P4: 0 TRAP_FRAME: ffff800192917770 -- (.trap 0xffff800192917770) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffff9580eadbea80 rbx=0000000000000000 rcx=0000000000000003 rdx=ffffe185f2b99158 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80618435ff8 rsp=ffff800192917900 rbp=ffff9580eadb9180 r8=0000000000000002 r9=000000750a625e15 r10=0000000000000002 r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po cy nt!KiCommitThreadWait+0x528: fffff806`18435ff8 cd29 int 29h Resetting default scope EXCEPTION_RECORD: ffff8001929176c8 -- (.exr 0xffff8001929176c8) ExceptionAddress: fffff80618435ff8 (nt!KiCommitThreadWait+0x0000000000000528) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000003 Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: chrome.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000003 EXCEPTION_STR: 0xc0000409 STACK_TEXT: ffff8001`92917448 fffff806`185d4b29 : 00000000`00000139 00000000`00000003 ffff8001`92917770 ffff8001`929176c8 : nt!KeBugCheckEx ffff8001`92917450 fffff806`185d4f50 : ffff8001`00000000 fffff806`00000000 ffff8001`92917900 ffffcb0d`399f8910 : nt!KiBugCheckDispatch+0x69 ffff8001`92917590 fffff806`185d32e3 : 00000000`00000000 00000000`00000000 00000000`0000000a 00000000`00000000 : nt!KiFastFailDispatch+0xd0 ffff8001`92917770 fffff806`18435ff8 : 00000001`0000000a 00000000`00000000 00000000`00000fff 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323 ffff8001`92917900 fffff806`184353b5 : 00000000`00000000 00000000`00000000 ffff9580`eadb9180 00000000`00000000 : nt!KiCommitThreadWait+0x528 ffff8001`929179a0 fffff806`189dc0cb : ffffe185`e9571fe0 ffffe185`00000006 00000000`00000001 ffff8001`92917b00 : nt!KeWaitForSingleObject+0x255 ffff8001`92917a80 fffff806`185d4558 : ffffe185`eaa7a080 00000027`967fee28 ffff8001`92917b18 ffffffff`ff776f10 : nt!NtWaitForSingleObject+0x10b ffff8001`92917b00 00007ff9`3e83c144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000027`967fedf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`3e83c144 SYMBOL_NAME: nt!KiCommitThreadWait+528 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.18362.1139 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 528 FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {369b7001-cfef-011b-6243-985c04f34d42} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80070c5aace, Address of the instruction which caused the bugcheck Arg3: ffffd2026ad24dd0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2733 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-AF2QT03 Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 10436 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: 19h1_release Key : WER.OS.Timestamp Value: 2019-03-18T12:02:00Z Key : WER.OS.Version Value: 10.0.18362.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80070c5aace BUGCHECK_P3: ffffd2026ad24dd0 BUGCHECK_P4: 0 CONTEXT: ffffd2026ad24dd0 -- (.cxr 0xffffd2026ad24dd0) rax=0000000000000001 rbx=ffffd40dd782c240 rcx=0000000000000034 rdx=000000000000002f rsi=ffffd40dd53d4380 rdi=0000000000000000 rip=fffff80070c5aace rsp=ffffd2026ad257c0 rbp=ffffd2026ad25b80 r8=ffffd40dd3dfa042 r9=0000000000000002 r10=00000000ffffffff r11=0000000000000009 r12=ffffd40dda908080 r13=ffffd40dd53d4380 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286 nt!IopCompleteRequest+0x8e: fffff800`70c5aace 8327cf and dword ptr [rdi],0FFFFFFCFh ds:002b:00000000`00000000=???????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: opera.exe IRP_ADDRESS: ffffd40dd782c1d8 STACK_TEXT: ffffd202`6ad257c0 fffff800`70c39e3d : ffffd40d`d782c250 fffff800`70c2c401 ffffd40d`d782c200 0000020d`82133320 : nt!IopCompleteRequest+0x8e ffffd202`6ad258b0 fffff800`711e1ec0 : ffffd202`6ad25a20 000000a5`325ffa28 00000000`00000401 fffff312`59dd93ff : nt!IoRemoveIoCompletion+0x26d ffffd202`6ad259d0 fffff800`70dd4558 : ffffd40d`da908080 000000a5`325ffa08 ffffd202`6ad25aa8 0000020d`82133320 : nt!NtRemoveIoCompletion+0x140 ffffd202`6ad25a90 00007ff9`9221c1e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000a5`325ff9e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`9221c1e4 SYMBOL_NAME: nt!IoRemoveIoCompletion+26d MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.18362.1139 STACK_COMMAND: .cxr 0xffffd2026ad24dd0 ; kb BUCKET_ID_FUNC_OFFSET: 26d FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IoRemoveIoCompletion OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {19a77e32-9f31-c0b5-5bc2-0cf9083a3833} Followup: MachineOwner --------- FAST_ERESOURCE_PRECONDITION_VIOLATION (1c6) The current thread is performing an invalid call to a fast resource routine. Arguments: Arg1: 0000000000000014, A thread exited with outstanding lock acquisitions. Arg2: ffff9e09282f0080, The thread. Arg3: fffff80507a368bc, Pointer to one of the outstanding owner entries. Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2358 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-AF2QT03 Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 21296 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: 19h1_release Key : WER.OS.Timestamp Value: 2019-03-18T12:02:00Z Key : WER.OS.Version Value: 10.0.18362.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1c6 BUGCHECK_P1: 14 BUGCHECK_P2: ffff9e09282f0080 BUGCHECK_P3: fffff80507a368bc BUGCHECK_P4: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: NVIDIA Share.exe STACK_TEXT: ffffb788`1e3d9388 fffff805`081d4c57 : 00000000`000001c6 00000000`00000014 ffff9e09`282f0080 fffff805`07a368bc : nt!KeBugCheckEx ffffb788`1e3d9390 fffff805`07fe63b0 : 00000000`00000000 ffff9e09`282f0050 ffffb788`1e3d9589 00000000`00000000 : nt!PspThreadDelete+0x14e7c7 ffffb788`1e3d9400 fffff805`07a34f79 : 00000000`00000000 00000000`00000000 ffffb788`1e3d9589 ffff9e09`282f0080 : nt!ObpRemoveObjectRoutine+0x80 ffffb788`1e3d9460 fffff805`07fd48c7 : 00000000`00000000 ffff9e09`282f0050 ffff9e09`00000000 ffff9e09`273165e0 : nt!ObfDereferenceObjectWithTag+0xc9 ffffb788`1e3d94a0 fffff805`080ae725 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7 ffffb788`1e3d95e0 fffff805`0809496d : 00000000`00000000 ffff9e09`2744f080 ffffffff`ffffff01 ffff9e09`280e6380 : nt!ExSweepHandleTable+0xd5 ffffb788`1e3d9690 fffff805`07fb9d2d : ffffffff`ffffffff ffff9e09`280e6080 ffffb788`1e3d96e0 ffff9e09`00000000 : nt!ObKillProcess+0x35 ffffb788`1e3d96c0 fffff805`08084753 : ffff9e09`280e6080 ffffbe08`d270a060 ffffb788`1e3d98e9 00000000`00000000 : nt!PspRundownSingleProcess+0x131 ffffb788`1e3d9740 fffff805`080c7ee3 : 00000000`40010004 00000000`00000001 000000c7`e6506000 00000000`00000000 : nt!PspExitThread+0x60b ffffb788`1e3d9850 fffff805`07a38b21 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33 ffffb788`1e3d9890 fffff805`07bc7240 : 00000000`00000001 ffffb788`1e3d9950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481 ffffb788`1e3d9950 fffff805`07bd45ff : ffff9e09`2744f080 000000c7`e845f6f8 ffff9e09`ffffffff fffff805`00001cff : nt!KiInitiateUserApc+0x70 ffffb788`1e3d9a90 00007ffa`50609a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 000000c7`e845f6d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`50609a84 SYMBOL_NAME: nt!PspThreadDelete+14e7c7 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.18362.1139 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 14e7c7 FAILURE_BUCKET_ID: 0x1C6_nt!PspThreadDelete OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {15db6b61-555f-1f75-80be-2c230fa0518a} Followup: MachineOwner ---------
Sizi bilgilendireceğim hocam mavi ekrana hemen düşmüyor biraz zaman geçmesi lazım. Şuan verdiğiniz linklerde ki işlemleri yapacağız. Ondan sonra test edeceğim.Durum nedir?
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.