BEDaisy.sys KERNEL_SECURITY_CHECK_FAILURE hatası

Emir351

Decapat
Katılım
20 Haziran 2020
Mesajlar
26
Herkese merhaba. Tom Clancy's Rainbow Six: Siege, Fortnite gibi oyunlarda mavi ekran hatası alıyorum.

Kod:
Microsoft (R) Windows Debugger Version 10.0.22415.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\emirp\OneDrive\Desktop\minidump technopatt\100921-16734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`62400000 PsLoadedModuleList = 0xfffff801`6302a230
Debug session time: Sat Oct  9 12:27:41.167 2021 (UTC + 3:00)
System Uptime: 0 days 2:14:50.905
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`627f71c0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffe0c`61776f60=0000000000000139
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffe0c61777280, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffffe0c617771d8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4140

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 53130

    Key  : Analysis.Init.CPU.mSec
    Value: 937

    Key  : Analysis.Init.Elapsed.mSec
    Value: 72991

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffffe0c61777280

BUGCHECK_P3: fffffe0c617771d8

BUGCHECK_P4: 0

TRAP_FRAME:  fffffe0c61777280 -- (.trap 0xfffffe0c61777280)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff970813df4370 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016268722d rsp=fffffe0c61777410 rbp=ffff970814141280
 r8=0000000000000001  r9=0000000000000002 r10=ffff97080aff8300
r11=fffff8015acd6180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
nt!KiExitDispatcher+0x1ad:
fffff801`6268722d cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffffe0c617771d8 -- (.exr 0xfffffe0c617771d8)
ExceptionAddress: fffff8016268722d (nt!KiExitDispatcher+0x00000000000001ad)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffffe0c`61776f58 fffff801`62809169     : 00000000`00000139 00000000`00000003 fffffe0c`61777280 fffffe0c`617771d8 : nt!KeBugCheckEx
fffffe0c`61776f60 fffff801`62809590     : 00000000`00000000 fffff801`62723b80 00000000`000000ff 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffe0c`617770a0 fffff801`62807923     : 00000000`000000ff 00000000`00000000 00000000`00000000 55555555`55555555 : nt!KiFastFailDispatch+0xd0
fffffe0c`61777280 fffff801`6268722d     : 00000000`00000000 fffffe0c`617774c1 ffff9708`24544000 fffff801`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffffe0c`61777410 fffff801`626fb651     : fffff801`5acd6180 00000000`00000000 fffff801`5acd6101 fffff801`62db21c4 : nt!KiExitDispatcher+0x1ad
fffffe0c`61777480 fffff801`bc502042     : 00000000`00000200 ffff9708`28664068 ffffad0d`5a013050 00000000`00000002 : nt!KeInsertQueueApc+0x151
fffffe0c`61777520 00000000`00000200     : ffff9708`28664068 ffffad0d`5a013050 00000000`00000002 00000000`00000000 : BEDaisy+0x332042
fffffe0c`61777528 ffff9708`28664068     : ffffad0d`5a013050 00000000`00000002 00000000`00000000 00000000`00000000 : 0x200
fffffe0c`61777530 ffffad0d`5a013050     : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff9708`28664068
fffffe0c`61777538 00000000`00000002     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffad0d`5a013050
fffffe0c`61777540 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff102c`bce90d01 : 0x2


SYMBOL_NAME:  BEDaisy+332042

MODULE_NAME: BEDaisy

IMAGE_NAME:  BEDaisy.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  332042

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_BEDaisy!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {59d8eb10-b2e4-7df6-f6a5-49968226dbb8}

Followup:     MachineOwner
---------
 

Geri
Yukarı