4 GB RAM takınca mavi ekran hatası

Mevcut RAM yanına mı takıyorsunuz?

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff968144ea0730, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff968144ea0688, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 656

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16672

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9460

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x139

    Key  : Bugcheck.Code.Register
    Value: 0x139

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: co_release

    Key  : WER.OS.Timestamp
    Value: 2021-06-04T16:28:00Z

    Key  : WER.OS.Version
    Value: 10.0.22000.1


FILE_IN_CAB:  071422-6109-01.dmp

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff968144ea0730

BUGCHECK_P3: ffff968144ea0688

BUGCHECK_P4: 0

TRAP_FRAME:  ffff968144ea0730 -- (.trap 0xffff968144ea0730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff848e85fb3678 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017bfc2d99 rsp=ffff968144ea08c0 rbp=ffff848e8f3dddb8
 r8=0000000000000000  r9=0000000000000000 r10=fffff801784b21c0
r11=0000000000000178 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
Ntfs!NtfsFspDispatch+0x20a59:
fffff801`7bfc2d99 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff968144ea0688 -- (.exr 0xffff968144ea0688)
ExceptionAddress: fffff8017bfc2d99 (Ntfs!NtfsFspDispatch+0x0000000000020a59)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff9681`44ea0408 fffff801`7862a4a9     : 00000000`00000139 00000000`00000003 ffff9681`44ea0730 ffff9681`44ea0688 : nt!KeBugCheckEx
ffff9681`44ea0410 fffff801`7862a8f2     : ffff848e`88f9d080 00000000`00000001 00000000`0020b544 ffff848e`84594a20 : nt!KiBugCheckDispatch+0x69
ffff9681`44ea0550 fffff801`78628bd2     : 00000000`0000000e ffff848e`8a61e040 00000000`0000000e ffff9681`44ea07f0 : nt!KiFastFailDispatch+0xb2
ffff9681`44ea0730 fffff801`7bfc2d99     : ffff848e`89cf5702 ffff848e`8ba79a88 ffff848e`8f3dddb8 ffff848e`8ba799f8 : nt!KiRaiseSecurityCheckFailure+0x312
ffff9681`44ea08c0 fffff801`784365ef     : ffff848e`84525ca0 ffff848e`8a61e040 ffff848e`84525ca0 ffff848e`00000000 : Ntfs!NtfsFspDispatch+0x20a59
ffff9681`44ea0a00 fffff801`784d5ad5     : ffff848e`8a61e040 00000000`00000000 ffff848e`8a61e040 00078404`ad9bbffe : nt!ExpWorkerThread+0x14f
ffff9681`44ea0bf0 fffff801`7861b904     : ffffbd81`46dc0180 ffff848e`8a61e040 fffff801`784d5a80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff9681`44ea0c40 00000000`00000000     : ffff9681`44ea1000 ffff9681`44e9b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34


SYMBOL_NAME:  nt!KiFastFailDispatch+b2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.739

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  b2

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.22000.1

BUILDLAB_STR:  co_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}
 
Mevcut RAM yanına mı takıyorsunuz?

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff968144ea0730, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffff968144ea0688, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 656.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 16672.

 Key : Analysis.Init.CPU.mSec
 Value: 93.

 Key : Analysis.Init.Elapsed.mSec
 Value: 9460.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 93.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x139.

 Key : Bugcheck.Code.Register
 Value: 0x139.

 Key : FailFast.Name
 Value: CORRUPT_LIST_ENTRY.

 Key : FailFast.Type
 Value: 3

 Key : WER.OS.Branch
 Value: co_release.

 Key : WER.OS.Timestamp
 Value: 2021-06-04T16:28:00Z

 Key : WER.OS.Version
 Value: 10.0.22000.1

FILE_IN_CAB: 071422-6109-01.dmp

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffff968144ea0730.

BUGCHECK_P3: ffff968144ea0688.

BUGCHECK_P4: 0

TRAP_FRAME: ffff968144ea0730 -- (.trap 0xffff968144ea0730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff848e85fb3678 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017bfc2d99 rsp=ffff968144ea08c0 rbp=ffff848e8f3dddb8
 r8=0000000000000000 r9=0000000000000000 r10=fffff801784b21c0
r11=0000000000000178 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy.
Ntfs!NtfsFspDispatch+0x20a59:
fffff801`7bfc2d99 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffff968144ea0688 -- (.exr 0xffff968144ea0688)
ExceptionAddress: fffff8017bfc2d99 (Ntfs!NtfsFspDispatch+0x0000000000020a59)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffff9681`44ea0408 fffff801`7862a4a9 : 00000000`00000139 00000000`00000003 ffff9681`44ea0730 ffff9681`44ea0688 : nt!KeBugCheckEx
ffff9681`44ea0410 fffff801`7862a8f2 : ffff848e`88f9d080 00000000`00000001 00000000`0020b544 ffff848e`84594a20 : nt!KiBugCheckDispatch+0x69
ffff9681`44ea0550 fffff801`78628bd2 : 00000000`0000000e ffff848e`8a61e040 00000000`0000000e ffff9681`44ea07f0 : nt!KiFastFailDispatch+0xb2
ffff9681`44ea0730 fffff801`7bfc2d99 : ffff848e`89cf5702 ffff848e`8ba79a88 ffff848e`8f3dddb8 ffff848e`8ba799f8 : nt!KiRaiseSecurityCheckFailure+0x312
ffff9681`44ea08c0 fffff801`784365ef : ffff848e`84525ca0 ffff848e`8a61e040 ffff848e`84525ca0 ffff848e`00000000 : Ntfs!NtfsFspDispatch+0x20a59
ffff9681`44ea0a00 fffff801`784d5ad5 : ffff848e`8a61e040 00000000`00000000 ffff848e`8a61e040 00078404`ad9bbffe : nt!ExpWorkerThread+0x14f
ffff9681`44ea0bf0 fffff801`7861b904 : ffffbd81`46dc0180 ffff848e`8a61e040 fffff801`784d5a80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff9681`44ea0c40 00000000`00000000 : ffff9681`44ea1000 ffff9681`44e9b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34

SYMBOL_NAME: nt!KiFastFailDispatch+b2

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22000.739

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: b2.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.22000.1

BUILDLAB_STR: co_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Evet.
 

Technopat Haberler

Yeni konular

Geri
Yukarı