Çözüldü FX 6100 sistemde KERNEL_SECURITY_CHECK_FAILURE hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10

Cankka

Decapat
Katılım
8 Şubat 2022
Mesajlar
4
Daha fazla  
Cinsiyet
Erkek
Merhaba. Ara sıra mavi ekran hatası alıyorum. Sebebini çözemediğimden buradayım, yardımcı olabilirseniz sevinirim.
Geçenlerde 24 saat stres testi yaptım ve hiç hata almadım.
Sistem bazen 10 dakika içinde, bazen saatler sonra hata veriyor.
Kasamda soğutma sorunu yok. 2 fanlı kule tipi soğutucu ve
8x120mm fan kullanıyorum.
Minidump dosyaları

Sistem özellikleri.
  • AMD FX 6100.
  • ASUS M5A97 le r2.0
  • Kingston 4x2GB DDR3 1333MHz.
  • ASUS 210 silent.
  • Aerocool VX Plus 400W.
  • 240GB SSD.
  • 1TB HDD.
 
Son düzenleme:
Çözüm
Öncelikle Technopat Sosyal'e hoş geldiniz, bu hatayı çözme yolunda bugün size ben yardımcı olmaya çalışacağım. Sizden ricam aşağıda maddelendirdiğim işlemleri uygulayıp işlemler sonrasındaki 3-5 gün boyunca sistemi gözlemleyip sonucu bize bildirmenizdir.

1) Wi-Fi aygıtınızın sürücüsünü güncelleyin. Hatta önce sürücüyü indirip daha sonra Aygıt Yöneticisi üzerinden Wi-Fi aygıtının sürücüsünü kaldırıp en sonunda sürücüyü tekrar kurabilirsiniz. Wi-Fi'a ihtiyacınız olmuyorsa direkt aygıtı sistemden de çıkarabilirsiniz, bilginize.

2) Hızlı başlatma seçeneğini kapatın. Bu özelliği nasıl kapatacağınız hakkında detaylı bilgi için aşağıdaki rehbere ilerleyebilirsiniz.


3) Sisteme taktığınız Kingston USB cihaz/aygıt varsa çıkarın. Bir mavi ekranda o da sorunlar arasına dahil olmuş.

4) SSD'nizin tam olarak modeli nedir? CrystalDiskInfo indirip diskin sağlık durumunun ekran alıntısını bizimle paylaşırsanız sevinirim.

Kolay gelsin, en yakın zamanda 4. maddedeki görseli paylaşabilirseniz güzel olur. İyi günler dilerim. :)

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8002987f616, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9187

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 18297

Key : Analysis.Init.CPU.mSec
Value: 842

Key : Analysis.Init.Elapsed.mSec
Value: 4467

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020822-15375-01.dmp

BUGCHECK_CODE: a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8002987f616

WRITE_ADDRESS: fffff8002a2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: SearchApp.exe

DPC_STACK_BASE: FFFFDA8465C68FB0

TRAP_FRAME: ffffda8465c68ac0 -- (.trap 0xffffda8465c68ac0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffda8465c68c98 rbx=0000000000000000 rcx=0000000000000000
rdx=0000002d77015364 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8002987f616 rsp=ffffda8465c68c58 rbp=0000000000000005
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiTimer2Expiration+0xb6:
fffff800`2987f616 ff0f dec dword ptr [rdi] ds:00000000`00000000=????????
Resetting default scope

MISALIGNED_IP:
nt!KiTimer2Expiration+b6
fffff800`2987f616 ff0f dec dword ptr [rdi]

STACK_TEXT:
ffffda84`65c68978 fffff800`29a09269 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffda84`65c68980 fffff800`29a05569 : 0000002d`7701a196 00000000`00000000 00000000`00000010 ffffc989`2fe0f5c0 : nt!KiBugCheckDispatch+0x69
ffffda84`65c68ac0 fffff800`2987f616 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffda84`65c68c58 ffffc989`3e325080 : fffff800`29899cf4 ffff8c00`88d89180 0000f8ff`00000000 00000000`00000008 : nt!KiTimer2Expiration+0xb6
ffffda84`65c68d18 fffff800`29899cf4 : ffff8c00`88d89180 0000f8ff`00000000 00000000`00000008 00000000`000b5dd8 : 0xffffc989`3e325080
ffffda84`65c68d20 fffff800`299fe325 : 00000000`00000000 ffff8c00`88d89180 ffffc989`2fcbe720 00000000`000028cf : nt!KiRetireDpcList+0x874
ffffda84`65c68fb0 fffff800`299fe110 : fffff800`299f33d0 fffff800`29925f5a 000001eb`33f88a80 000001eb`33f87970 : nt!KxRetireDpcList+0x5
ffffda84`69552ac0 fffff800`299fd9c5 : 00000000`000028cf fffff800`299f9371 000001eb`33f90de8 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffda84`69552af0 fffff800`299f9371 : 000001eb`33f90de8 00000000`00000000 ffffc989`3ec8ad90 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffda84`69552b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1


SYMBOL_NAME: nt!KiTimer2Expiration+b6

IMAGE_NAME: hardware

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr; .ecxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID: IP_MISALIGNED

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff804659527f6, Address of the instruction which caused the BugCheck
Arg3: ffffa708e66fa600, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klif.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9499

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 42163

Key : Analysis.Init.CPU.mSec
Value: 999

Key : Analysis.Init.Elapsed.mSec
Value: 5864

Key : Analysis.Memory.CommitPeak.Mb
Value: 82

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020622-9687-01.dmp

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff804659527f6

BUGCHECK_P3: ffffa708e66fa600

BUGCHECK_P4: 0

CONTEXT: ffffa708e66fa600 -- (.cxr 0xffffa708e66fa600)
rax=ffff7905fc7faa28 rbx=ffffad0609f85710 rcx=ffff7905fc7faa28
rdx=ffffad05f3cc9238 rsi=ffffad0609f85728 rdi=ffffad05f3cc91e0
rip=fffff804659527f6 rsp=ffffa708e66fb000 rbp=ffffad05f6154a20
r8=ffffad0604307960 r9=ffffad0609f85728 r10=ffffad05f6154a20
r11=0000000000000000 r12=0000000000000000 r13=ffffad05f3cc9228
r14=0000000000000000 r15=ffffad05f6154a28
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
FLTMGR!SetContextIntoStreamList+0x246:
fffff804`659527f6 488b4020 mov rax,qword ptr [rax+20h] ds:002b:ffff7905`fc7faa48=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
ffffa708`e66fb000 fffff804`659522a8 : ffffad05`f3cc91e0 ffffad06`04307960 ffffad06`00000000 ffffad06`09f85770 : FLTMGR!SetContextIntoStreamList+0x246
ffffa708`e66fb0a0 fffff804`6fb7a60f : ffffa708`e66fb1e8 ffffd602`25a0c010 ffffad06`071c70f8 fffff804`6fb7a0b2 : FLTMGR!FltSetStreamHandleContext+0x28
ffffa708`e66fb0f0 ffffa708`e66fb1e8 : ffffd602`25a0c010 ffffad06`071c70f8 fffff804`6fb7a0b2 00000000`00000000 : klif+0xaa60f
ffffa708`e66fb0f8 ffffd602`25a0c010 : ffffad06`071c70f8 fffff804`6fb7a0b2 00000000`00000000 ffffd602`25a0c010 : 0xffffa708`e66fb1e8
ffffa708`e66fb100 ffffad06`071c70f8 : fffff804`6fb7a0b2 00000000`00000000 ffffd602`25a0c010 ffffad06`071c7198 : 0xffffd602`25a0c010
ffffa708`e66fb108 fffff804`6fb7a0b2 : 00000000`00000000 ffffd602`25a0c010 ffffad06`071c7198 ffffad06`071c70f8 : 0xffffad06`071c70f8
ffffa708`e66fb110 00000000`00000000 : ffffd602`25a0c010 ffffad06`071c7198 ffffad06`071c70f8 ffffa708`e66fb1e8 : klif+0xaa0b2


SYMBOL_NAME: klif+aa60f

MODULE_NAME: klif

IMAGE_NAME: klif.sys

STACK_COMMAND: .cxr 0xffffa708e66fa600 ; kb

BUCKET_ID_FUNC_OFFSET: aa60f

FAILURE_BUCKET_ID: 0x3B_c0000005_klif!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {88ec5ace-ad5e-6436-33e5-ad5d9a297d7b}

Followup: MachineOwner
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132886282323369565
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot3
VetoString :


*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff905a57c6250, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff905a57c61a8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8108

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 12442

Key : Analysis.Init.CPU.mSec
Value: 1014

Key : Analysis.Init.Elapsed.mSec
Value: 4440

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 013022-9953-01.dmp

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff905a57c6250

BUGCHECK_P3: fffff905a57c61a8

BUGCHECK_P4: 0

TRAP_FRAME: fffff905a57c6250 -- (.trap 0xfffff905a57c6250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff958b81b64080 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff958b7911e938 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80252c701e2 rsp=fffff905a57c63e0 rbp=fffff905a57c6609
r8=fffff905a57c63f0 r9=0000000000000000 r10=0000fffff80252c6
r11=ffffcdfaf4200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!EtwpDeleteRegistrationObject+0x252:
fffff802`52c701e2 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffff905a57c61a8 -- (.exr 0xfffff905a57c61a8)
ExceptionAddress: fffff80252c701e2 (nt!EtwpDeleteRegistrationObject+0x0000000000000252)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steamwebhelper.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
fffff905`a57c5f28 fffff802`52a09269 : 00000000`00000139 00000000`00000003 fffff905`a57c6250 fffff905`a57c61a8 : nt!KeBugCheckEx
fffff905`a57c5f30 fffff802`52a09690 : ffff958b`866e45c8 00000000`00000000 ffff958b`78e0b000 ffff958b`81b64080 : nt!KiBugCheckDispatch+0x69
fffff905`a57c6070 fffff802`52a07a23 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff905`a57c6250 fffff802`52c701e2 : ffff958b`7911e938 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff905`a57c63e0 fffff802`52c733e0 : ffff958b`88ee2160 fffff905`a57c6609 00000000`00000000 ffff958b`78cfc220 : nt!EtwpDeleteRegistrationObject+0x252
fffff905`a57c6480 fffff802`52808357 : 00000000`00000000 00000000`00000000 fffff905`a57c6609 ffff958b`88ee2190 : nt!ObpRemoveObjectRoutine+0x80
fffff905`a57c64e0 fffff802`52bf3b79 : ffff958b`88ee2160 00000000`00000000 00000000`00000000 ffff8509`44dda350 : nt!ObfDereferenceObjectWithTag+0xc7
fffff905`a57c6520 fffff802`52c5c855 : ffff958b`8bf16098 fffff802`52808649 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x6c9
fffff905`a57c6660 fffff802`52c5e6ad : ffff958b`8bf16060 ffff958b`81b64080 ffffffff`ffffff01 ffff958b`7facc4d8 : nt!ExSweepHandleTable+0xd5
fffff905`a57c6710 fffff802`52c5c5a0 : ffffffff`ffffffff ffff958b`7facc080 fffff905`a57c6760 fffff802`52c203ac : nt!ObKillProcess+0x35
fffff905`a57c6740 fffff802`52cb0fe6 : ffff958b`7facc080 ffff8509`4901c060 fffff905`a57c6990 00000000`00000000 : nt!PspRundownSingleProcess+0x204
fffff905`a57c67d0 fffff802`52cf5b88 : 00000001`40010004 00000000`00000001 fffff905`a57c69e0 000000bc`b9906000 : nt!PspExitThread+0x5f6
fffff905`a57c68d0 fffff802`5280ef67 : 00000000`40910088 00000000`00000000 00000000`00000000 fffff802`528a1836 : nt!KiSchedulerApcTerminate+0x38
fffff905`a57c6910 fffff802`529fb880 : 000000bc`b9afea58 fffff905`a57c69c0 fffff905`a57c6b80 7fffffff`00000000 : nt!KiDeliverApc+0x487
fffff905`a57c69c0 fffff802`52a08d5f : 000000bc`b9afdd98 000002b2`fd0dc6a8 fffff905`a57c6b18 fffffffe`9a5f4400 : nt!KiInitiateUserApc+0x70
fffff905`a57c6b00 00007ffa`98eccdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000bc`b9afea28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`98eccdf4


SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132879533853304565
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : SWD\RADIO\{5B315CD4-D58A-4E2C-91EC-4E66E2315F07}
VetoString :


*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffdf00164ef010, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffdf00164eef68, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8015

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 15744

Key : Analysis.Init.CPU.mSec
Value: 984

Key : Analysis.Init.Elapsed.mSec
Value: 4580

Key : Analysis.Memory.CommitPeak.Mb
Value: 91

Key : FailFast.Name
Value: INCORRECT_STACK

Key : FailFast.Type
Value: 4

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020622-11406-01.dmp

BUGCHECK_CODE: 139

BUGCHECK_P1: 4

BUGCHECK_P2: ffffdf00164ef010

BUGCHECK_P3: ffffdf00164eef68

BUGCHECK_P4: 0

TRAP_FRAME: 8200000198592847 -- (.trap 0x8200000198592847)
Unable to read trap frame at 82000001`98592847

EXCEPTION_RECORD: ffffdf00164eef68 -- (.exr 0xffffdf00164eef68)
ExceptionAddress: fffff80677a5a3e5 (nt!RtlpGetStackLimitsEx+0x0000000000173855)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000004

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffdf00`164eece8 fffff806`77a09269 : 00000000`00000139 00000000`00000004 ffffdf00`164ef010 ffffdf00`164eef68 : nt!KeBugCheckEx
ffffdf00`164eecf0 fffff806`77a09690 : ffffa708`e74e6220 e9b9bfbe`000004f7 00000001`ffffffff fffffff6`00000007 : nt!KiBugCheckDispatch+0x69
ffffdf00`164eee30 fffff806`77a07a23 : ffffdf00`164ef7c0 00000000`00000000 ffffdf00`164eea60 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffdf00`164ef010 fffff806`77a5a3e5 : ffff9783`71ef1500 fffff806`779fab7c ffffdf00`164ef710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffdf00`164ef1a0 fffff806`77a5a5b3 : ffffdf00`164ef710 00000000`00000000 ffff9783`71bdbf80 fffff806`00000002 : nt!RtlpGetStackLimitsEx+0x173855
ffffdf00`164ef1d0 fffff806`778e5b16 : ffff9783`71bda408 ffffdf00`164efe20 ffff9783`71bda408 ffffbc8f`465b88e0 : nt!RtlDispatchException+0x173933
ffffdf00`164ef8f0 fffff806`779f8172 : 00000000`00000000 00000000`00000000 82000001`98592847 82000001`6c517847 : nt!KiDispatchException+0x186
ffffdf00`164effb0 fffff806`779f8140 : fffff806`77a093a5 ffffbc8f`490cb910 00000000`00000000 ffffbc8f`44f62db0 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff9783`71bda2c8 fffff806`77a093a5 : ffffbc8f`490cb910 00000000`00000000 ffffbc8f`44f62db0 ffffbc8f`490cb910 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff9783`71bda2d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125


SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {1971a9b0-b7ec-89bf-0a51-10ac52818da5}

Followup: MachineOwner
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132886367301858085
PnpEventInformation: 2
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : USB\VID_0951&PID_1666\E0D55E6D6637E440A9548D61
VetoString :


*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa40615b60470, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8014bd929b9, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 11733

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 52022

Key : Analysis.Init.CPU.mSec
Value: 1077

Key : Analysis.Init.Elapsed.mSec
Value: 10808

Key : Analysis.Memory.CommitPeak.Mb
Value: 85

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020822-14890-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: ffffa40615b60470

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8014bd929b9

READ_ADDRESS: fffff8013f8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa40615b60470

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

DPC_STACK_BASE: FFFFF80144C75FB0

TRAP_FRAME: fffff80144c75600 -- (.trap 0xfffff80144c75600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffff840615b603b0
rdx=ffff8406152171a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8014bd929b9 rsp=fffff80144c75790 rbp=fffff80144c75890
r8=0000000000000002 r9=8000000000000001 r10=fffff8013eed7a50
r11=ffff8406171b4db0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
USBPORT!USBPORT_IsControllerInHibernatePath+0xae09:
fffff801`4bd929b9 488b5620 mov rdx,qword ptr [rsi+20h] ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT:
fffff801`44c754b8 fffff801`3f009269 : 00000000`0000000a ffffa406`15b60470 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`44c754c0 fffff801`3f005569 : 00000000`00000000 fffff801`3f84bc78 00000000`00000002 ffff8406`1566e048 : nt!KiBugCheckDispatch+0x69
fffff801`44c75600 fffff801`4bd929b9 : ffff8406`15b601a0 ffff8406`15caf05c ffff8406`152171a0 ffffffff`ffffffff : nt!KiPageFault+0x469
fffff801`44c75790 fffff801`4bd922ae : ffff8406`152171a0 ffff8406`15caf05c ffff8406`152171a0 00000000`00000000 : USBPORT!USBPORT_IsControllerInHibernatePath+0xae09
fffff801`44c75a60 fffff801`4bd8f98d : ffff8406`15caf194 ffff8406`15218180 ffff8406`152171a0 ffff8406`11ff25c0 : USBPORT!USBPORT_IsControllerInHibernatePath+0xa6fe
fffff801`44c75ac0 fffff801`4bd9781b : ffff8406`152180e8 ffff8406`15217050 ffff8406`121c7002 ffff8406`11ff25c0 : USBPORT!USBPORT_IsControllerInHibernatePath+0x7ddd
fffff801`44c75b30 fffff801`3ee9a38e : fffff801`44c75cb0 ffff8406`11fee000 fffff801`44c75ea0 fffff801`3ca26180 : USBPORT!USBPORT_IsControllerInHibernatePath+0xfc6b
fffff801`44c75bb0 fffff801`3ee99674 : fffff801`3ca26180 00000000`00000000 00000000`00000008 00000000`0000d68c : nt!KiExecuteAllDpcs+0x30e
fffff801`44c75d20 fffff801`3effe325 : 00000000`00000000 fffff801`3ca26180 ffffab00`1c860b40 00000000`00000028 : nt!KiRetireDpcList+0x1f4
fffff801`44c75fb0 fffff801`3effe110 : fffff801`3eff33d0 fffff801`3ef25f5a 00002bca`00154000 00000042`275fcb44 : nt!KxRetireDpcList+0x5
ffffd70b`8ce84ac0 fffff801`3effd9c5 : 00000000`00000028 fffff801`3eff8631 00000042`275fda00 00000000`000002d4 : nt!KiDispatchInterruptContinue
ffffd70b`8ce84af0 fffff801`3eff8631 : 00000042`275fda00 00000000`000002d4 ffffd70b`8ce84b80 00004448`000541e0 : nt!KiDpcInterruptBypass+0x25
ffffd70b`8ce84b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1


SYMBOL_NAME: USBPORT!USBPORT_IsControllerInHibernatePath+ae09

MODULE_NAME: USBPORT

IMAGE_NAME: USBPORT.SYS

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: ae09

FAILURE_BUCKET_ID: AV_USBPORT!USBPORT_IsControllerInHibernatePath

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {5eff176c-158d-38f4-3901-8a5ca115760d}

Followup: MachineOwner
---------[/CODE]
Öncelikle Technopat Sosyal'e hoş geldiniz, bu hatayı çözme yolunda bugün size ben yardımcı olmaya çalışacağım. Sizden ricam aşağıda maddelendirdiğim işlemleri uygulayıp işlemler sonrasındaki 3-5 gün boyunca sistemi gözlemleyip sonucu bize bildirmenizdir.

1) Wi-Fi aygıtınızın sürücüsünü güncelleyin. Hatta önce sürücüyü indirip daha sonra Aygıt Yöneticisi üzerinden Wi-Fi aygıtının sürücüsünü kaldırıp en sonunda sürücüyü tekrar kurabilirsiniz. Wi-Fi'a ihtiyacınız olmuyorsa direkt aygıtı sistemden de çıkarabilirsiniz, bilginize.

2) Hızlı başlatma seçeneğini kapatın. Bu özelliği nasıl kapatacağınız hakkında detaylı bilgi için aşağıdaki rehbere ilerleyebilirsiniz.


3) Sisteme taktığınız Kingston USB cihaz/aygıt varsa çıkarın. Bir mavi ekranda o da sorunlar arasına dahil olmuş.

4) SSD'nizin tam olarak modeli nedir? CrystalDiskInfo indirip diskin sağlık durumunun ekran alıntısını bizimle paylaşırsanız sevinirim.

Kolay gelsin, en yakın zamanda 4. maddedeki görseli paylaşabilirseniz güzel olur. İyi günler dilerim. :)

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8002987f616, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9187

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 18297

Key : Analysis.Init.CPU.mSec
Value: 842

Key : Analysis.Init.Elapsed.mSec
Value: 4467

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020822-15375-01.dmp

BUGCHECK_CODE: a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8002987f616

WRITE_ADDRESS: fffff8002a2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: SearchApp.exe

DPC_STACK_BASE: FFFFDA8465C68FB0

TRAP_FRAME: ffffda8465c68ac0 -- (.trap 0xffffda8465c68ac0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffda8465c68c98 rbx=0000000000000000 rcx=0000000000000000
rdx=0000002d77015364 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8002987f616 rsp=ffffda8465c68c58 rbp=0000000000000005
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiTimer2Expiration+0xb6:
fffff800`2987f616 ff0f dec dword ptr [rdi] ds:00000000`00000000=????????
Resetting default scope

MISALIGNED_IP:
nt!KiTimer2Expiration+b6
fffff800`2987f616 ff0f dec dword ptr [rdi]

STACK_TEXT:
ffffda84`65c68978 fffff800`29a09269 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffda84`65c68980 fffff800`29a05569 : 0000002d`7701a196 00000000`00000000 00000000`00000010 ffffc989`2fe0f5c0 : nt!KiBugCheckDispatch+0x69
ffffda84`65c68ac0 fffff800`2987f616 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffda84`65c68c58 ffffc989`3e325080 : fffff800`29899cf4 ffff8c00`88d89180 0000f8ff`00000000 00000000`00000008 : nt!KiTimer2Expiration+0xb6
ffffda84`65c68d18 fffff800`29899cf4 : ffff8c00`88d89180 0000f8ff`00000000 00000000`00000008 00000000`000b5dd8 : 0xffffc989`3e325080
ffffda84`65c68d20 fffff800`299fe325 : 00000000`00000000 ffff8c00`88d89180 ffffc989`2fcbe720 00000000`000028cf : nt!KiRetireDpcList+0x874
ffffda84`65c68fb0 fffff800`299fe110 : fffff800`299f33d0 fffff800`29925f5a 000001eb`33f88a80 000001eb`33f87970 : nt!KxRetireDpcList+0x5
ffffda84`69552ac0 fffff800`299fd9c5 : 00000000`000028cf fffff800`299f9371 000001eb`33f90de8 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffda84`69552af0 fffff800`299f9371 : 000001eb`33f90de8 00000000`00000000 ffffc989`3ec8ad90 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffda84`69552b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1


SYMBOL_NAME: nt!KiTimer2Expiration+b6

IMAGE_NAME: hardware

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr; .ecxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID: IP_MISALIGNED

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff804659527f6, Address of the instruction which caused the BugCheck
Arg3: ffffa708e66fa600, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klif.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9499

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 42163

Key : Analysis.Init.CPU.mSec
Value: 999

Key : Analysis.Init.Elapsed.mSec
Value: 5864

Key : Analysis.Memory.CommitPeak.Mb
Value: 82

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020622-9687-01.dmp

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff804659527f6

BUGCHECK_P3: ffffa708e66fa600

BUGCHECK_P4: 0

CONTEXT: ffffa708e66fa600 -- (.cxr 0xffffa708e66fa600)
rax=ffff7905fc7faa28 rbx=ffffad0609f85710 rcx=ffff7905fc7faa28
rdx=ffffad05f3cc9238 rsi=ffffad0609f85728 rdi=ffffad05f3cc91e0
rip=fffff804659527f6 rsp=ffffa708e66fb000 rbp=ffffad05f6154a20
r8=ffffad0604307960 r9=ffffad0609f85728 r10=ffffad05f6154a20
r11=0000000000000000 r12=0000000000000000 r13=ffffad05f3cc9228
r14=0000000000000000 r15=ffffad05f6154a28
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
FLTMGR!SetContextIntoStreamList+0x246:
fffff804`659527f6 488b4020 mov rax,qword ptr [rax+20h] ds:002b:ffff7905`fc7faa48=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
ffffa708`e66fb000 fffff804`659522a8 : ffffad05`f3cc91e0 ffffad06`04307960 ffffad06`00000000 ffffad06`09f85770 : FLTMGR!SetContextIntoStreamList+0x246
ffffa708`e66fb0a0 fffff804`6fb7a60f : ffffa708`e66fb1e8 ffffd602`25a0c010 ffffad06`071c70f8 fffff804`6fb7a0b2 : FLTMGR!FltSetStreamHandleContext+0x28
ffffa708`e66fb0f0 ffffa708`e66fb1e8 : ffffd602`25a0c010 ffffad06`071c70f8 fffff804`6fb7a0b2 00000000`00000000 : klif+0xaa60f
ffffa708`e66fb0f8 ffffd602`25a0c010 : ffffad06`071c70f8 fffff804`6fb7a0b2 00000000`00000000 ffffd602`25a0c010 : 0xffffa708`e66fb1e8
ffffa708`e66fb100 ffffad06`071c70f8 : fffff804`6fb7a0b2 00000000`00000000 ffffd602`25a0c010 ffffad06`071c7198 : 0xffffd602`25a0c010
ffffa708`e66fb108 fffff804`6fb7a0b2 : 00000000`00000000 ffffd602`25a0c010 ffffad06`071c7198 ffffad06`071c70f8 : 0xffffad06`071c70f8
ffffa708`e66fb110 00000000`00000000 : ffffd602`25a0c010 ffffad06`071c7198 ffffad06`071c70f8 ffffa708`e66fb1e8 : klif+0xaa0b2


SYMBOL_NAME: klif+aa60f

MODULE_NAME: klif

IMAGE_NAME: klif.sys

STACK_COMMAND: .cxr 0xffffa708e66fa600 ; kb

BUCKET_ID_FUNC_OFFSET: aa60f

FAILURE_BUCKET_ID: 0x3B_c0000005_klif!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {88ec5ace-ad5e-6436-33e5-ad5d9a297d7b}

Followup: MachineOwner
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132886282323369565
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot3
VetoString :


*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff905a57c6250, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff905a57c61a8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8108

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 12442

Key : Analysis.Init.CPU.mSec
Value: 1014

Key : Analysis.Init.Elapsed.mSec
Value: 4440

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 013022-9953-01.dmp

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff905a57c6250

BUGCHECK_P3: fffff905a57c61a8

BUGCHECK_P4: 0

TRAP_FRAME: fffff905a57c6250 -- (.trap 0xfffff905a57c6250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff958b81b64080 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff958b7911e938 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80252c701e2 rsp=fffff905a57c63e0 rbp=fffff905a57c6609
r8=fffff905a57c63f0 r9=0000000000000000 r10=0000fffff80252c6
r11=ffffcdfaf4200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!EtwpDeleteRegistrationObject+0x252:
fffff802`52c701e2 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffff905a57c61a8 -- (.exr 0xfffff905a57c61a8)
ExceptionAddress: fffff80252c701e2 (nt!EtwpDeleteRegistrationObject+0x0000000000000252)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steamwebhelper.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
fffff905`a57c5f28 fffff802`52a09269 : 00000000`00000139 00000000`00000003 fffff905`a57c6250 fffff905`a57c61a8 : nt!KeBugCheckEx
fffff905`a57c5f30 fffff802`52a09690 : ffff958b`866e45c8 00000000`00000000 ffff958b`78e0b000 ffff958b`81b64080 : nt!KiBugCheckDispatch+0x69
fffff905`a57c6070 fffff802`52a07a23 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff905`a57c6250 fffff802`52c701e2 : ffff958b`7911e938 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff905`a57c63e0 fffff802`52c733e0 : ffff958b`88ee2160 fffff905`a57c6609 00000000`00000000 ffff958b`78cfc220 : nt!EtwpDeleteRegistrationObject+0x252
fffff905`a57c6480 fffff802`52808357 : 00000000`00000000 00000000`00000000 fffff905`a57c6609 ffff958b`88ee2190 : nt!ObpRemoveObjectRoutine+0x80
fffff905`a57c64e0 fffff802`52bf3b79 : ffff958b`88ee2160 00000000`00000000 00000000`00000000 ffff8509`44dda350 : nt!ObfDereferenceObjectWithTag+0xc7
fffff905`a57c6520 fffff802`52c5c855 : ffff958b`8bf16098 fffff802`52808649 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x6c9
fffff905`a57c6660 fffff802`52c5e6ad : ffff958b`8bf16060 ffff958b`81b64080 ffffffff`ffffff01 ffff958b`7facc4d8 : nt!ExSweepHandleTable+0xd5
fffff905`a57c6710 fffff802`52c5c5a0 : ffffffff`ffffffff ffff958b`7facc080 fffff905`a57c6760 fffff802`52c203ac : nt!ObKillProcess+0x35
fffff905`a57c6740 fffff802`52cb0fe6 : ffff958b`7facc080 ffff8509`4901c060 fffff905`a57c6990 00000000`00000000 : nt!PspRundownSingleProcess+0x204
fffff905`a57c67d0 fffff802`52cf5b88 : 00000001`40010004 00000000`00000001 fffff905`a57c69e0 000000bc`b9906000 : nt!PspExitThread+0x5f6
fffff905`a57c68d0 fffff802`5280ef67 : 00000000`40910088 00000000`00000000 00000000`00000000 fffff802`528a1836 : nt!KiSchedulerApcTerminate+0x38
fffff905`a57c6910 fffff802`529fb880 : 000000bc`b9afea58 fffff905`a57c69c0 fffff905`a57c6b80 7fffffff`00000000 : nt!KiDeliverApc+0x487
fffff905`a57c69c0 fffff802`52a08d5f : 000000bc`b9afdd98 000002b2`fd0dc6a8 fffff905`a57c6b18 fffffffe`9a5f4400 : nt!KiInitiateUserApc+0x70
fffff905`a57c6b00 00007ffa`98eccdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000bc`b9afea28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`98eccdf4


SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132879533853304565
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : SWD\RADIO\{5B315CD4-D58A-4E2C-91EC-4E66E2315F07}
VetoString :


*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffdf00164ef010, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffdf00164eef68, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8015

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 15744

Key : Analysis.Init.CPU.mSec
Value: 984

Key : Analysis.Init.Elapsed.mSec
Value: 4580

Key : Analysis.Memory.CommitPeak.Mb
Value: 91

Key : FailFast.Name
Value: INCORRECT_STACK

Key : FailFast.Type
Value: 4

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020622-11406-01.dmp

BUGCHECK_CODE: 139

BUGCHECK_P1: 4

BUGCHECK_P2: ffffdf00164ef010

BUGCHECK_P3: ffffdf00164eef68

BUGCHECK_P4: 0

TRAP_FRAME: 8200000198592847 -- (.trap 0x8200000198592847)
Unable to read trap frame at 82000001`98592847

EXCEPTION_RECORD: ffffdf00164eef68 -- (.exr 0xffffdf00164eef68)
ExceptionAddress: fffff80677a5a3e5 (nt!RtlpGetStackLimitsEx+0x0000000000173855)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000004

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffdf00`164eece8 fffff806`77a09269 : 00000000`00000139 00000000`00000004 ffffdf00`164ef010 ffffdf00`164eef68 : nt!KeBugCheckEx
ffffdf00`164eecf0 fffff806`77a09690 : ffffa708`e74e6220 e9b9bfbe`000004f7 00000001`ffffffff fffffff6`00000007 : nt!KiBugCheckDispatch+0x69
ffffdf00`164eee30 fffff806`77a07a23 : ffffdf00`164ef7c0 00000000`00000000 ffffdf00`164eea60 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffdf00`164ef010 fffff806`77a5a3e5 : ffff9783`71ef1500 fffff806`779fab7c ffffdf00`164ef710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffdf00`164ef1a0 fffff806`77a5a5b3 : ffffdf00`164ef710 00000000`00000000 ffff9783`71bdbf80 fffff806`00000002 : nt!RtlpGetStackLimitsEx+0x173855
ffffdf00`164ef1d0 fffff806`778e5b16 : ffff9783`71bda408 ffffdf00`164efe20 ffff9783`71bda408 ffffbc8f`465b88e0 : nt!RtlDispatchException+0x173933
ffffdf00`164ef8f0 fffff806`779f8172 : 00000000`00000000 00000000`00000000 82000001`98592847 82000001`6c517847 : nt!KiDispatchException+0x186
ffffdf00`164effb0 fffff806`779f8140 : fffff806`77a093a5 ffffbc8f`490cb910 00000000`00000000 ffffbc8f`44f62db0 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff9783`71bda2c8 fffff806`77a093a5 : ffffbc8f`490cb910 00000000`00000000 ffffbc8f`44f62db0 ffffbc8f`490cb910 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff9783`71bda2d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125


SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {1971a9b0-b7ec-89bf-0a51-10ac52818da5}

Followup: MachineOwner
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132886367301858085
PnpEventInformation: 2
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : USB\VID_0951&PID_1666\E0D55E6D6637E440A9548D61
VetoString :


*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa40615b60470, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8014bd929b9, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 11733

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 52022

Key : Analysis.Init.CPU.mSec
Value: 1077

Key : Analysis.Init.Elapsed.mSec
Value: 10808

Key : Analysis.Memory.CommitPeak.Mb
Value: 85

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020822-14890-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: ffffa40615b60470

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8014bd929b9

READ_ADDRESS: fffff8013f8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa40615b60470

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

DPC_STACK_BASE: FFFFF80144C75FB0

TRAP_FRAME: fffff80144c75600 -- (.trap 0xfffff80144c75600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffff840615b603b0
rdx=ffff8406152171a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8014bd929b9 rsp=fffff80144c75790 rbp=fffff80144c75890
r8=0000000000000002 r9=8000000000000001 r10=fffff8013eed7a50
r11=ffff8406171b4db0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
USBPORT!USBPORT_IsControllerInHibernatePath+0xae09:
fffff801`4bd929b9 488b5620 mov rdx,qword ptr [rsi+20h] ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT:
fffff801`44c754b8 fffff801`3f009269 : 00000000`0000000a ffffa406`15b60470 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`44c754c0 fffff801`3f005569 : 00000000`00000000 fffff801`3f84bc78 00000000`00000002 ffff8406`1566e048 : nt!KiBugCheckDispatch+0x69
fffff801`44c75600 fffff801`4bd929b9 : ffff8406`15b601a0 ffff8406`15caf05c ffff8406`152171a0 ffffffff`ffffffff : nt!KiPageFault+0x469
fffff801`44c75790 fffff801`4bd922ae : ffff8406`152171a0 ffff8406`15caf05c ffff8406`152171a0 00000000`00000000 : USBPORT!USBPORT_IsControllerInHibernatePath+0xae09
fffff801`44c75a60 fffff801`4bd8f98d : ffff8406`15caf194 ffff8406`15218180 ffff8406`152171a0 ffff8406`11ff25c0 : USBPORT!USBPORT_IsControllerInHibernatePath+0xa6fe
fffff801`44c75ac0 fffff801`4bd9781b : ffff8406`152180e8 ffff8406`15217050 ffff8406`121c7002 ffff8406`11ff25c0 : USBPORT!USBPORT_IsControllerInHibernatePath+0x7ddd
fffff801`44c75b30 fffff801`3ee9a38e : fffff801`44c75cb0 ffff8406`11fee000 fffff801`44c75ea0 fffff801`3ca26180 : USBPORT!USBPORT_IsControllerInHibernatePath+0xfc6b
fffff801`44c75bb0 fffff801`3ee99674 : fffff801`3ca26180 00000000`00000000 00000000`00000008 00000000`0000d68c : nt!KiExecuteAllDpcs+0x30e
fffff801`44c75d20 fffff801`3effe325 : 00000000`00000000 fffff801`3ca26180 ffffab00`1c860b40 00000000`00000028 : nt!KiRetireDpcList+0x1f4
fffff801`44c75fb0 fffff801`3effe110 : fffff801`3eff33d0 fffff801`3ef25f5a 00002bca`00154000 00000042`275fcb44 : nt!KxRetireDpcList+0x5
ffffd70b`8ce84ac0 fffff801`3effd9c5 : 00000000`00000028 fffff801`3eff8631 00000042`275fda00 00000000`000002d4 : nt!KiDispatchInterruptContinue
ffffd70b`8ce84af0 fffff801`3eff8631 : 00000042`275fda00 00000000`000002d4 ffffd70b`8ce84b80 00004448`000541e0 : nt!KiDpcInterruptBypass+0x25
ffffd70b`8ce84b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1


SYMBOL_NAME: USBPORT!USBPORT_IsControllerInHibernatePath+ae09

MODULE_NAME: USBPORT

IMAGE_NAME: USBPORT.SYS

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: ae09

FAILURE_BUCKET_ID: AV_USBPORT!USBPORT_IsControllerInHibernatePath

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {5eff176c-158d-38f4-3901-8a5ca115760d}

Followup: MachineOwner
---------[/CODE]
 
Çözüm
Öncelikle teşekkür ederim. En kısa sürede sonuçları paylaşacağım
Sonuçlar
Sorunun Wi-Fi sürücüsünden kaynaklandığını düşünüyorum.
Sürücüyü kurup bir süre gözlemleyeceğim. Yardımın için teşekkürler
 
Son düzenleme:

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Geri
Yukarı