KB4598291 güncellemesi sonrası mavi ekran

 
3 tane vardı. ilk defa yaptım. Umarım olmuştur.
Minidump dosyalarıma yardımcı olabilecek var mı?
 
Son düzenleme:
Hocam yardımcı olur musunuz arkadaşa? @Ted Kaczynski
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffab8053b95500, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffffab8053b95458, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2734.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9AAJGT7

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 15928.

Key : Analysis.Memory.CommitPeak.Mb
Value: 76.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffffab8053b95500.

BUGCHECK_P3: ffffab8053b95458.

BUGCHECK_P4: 0

TRAP_FRAME: ffffab8053b95500 -- (.trap 0xffffab8053b95500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc38405e77000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc383f7205348 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042e62607f rsp=ffffab8053b95690 rbp=0000000000000000
r8=ffffc383f9fec000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy.
nt!RtlpHpLfhSubsegmentFreeBlock+0x1ed92f:
fffff804`2e62607f cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffffab8053b95458 -- (.exr 0xffffab8053b95458)
ExceptionAddress: fffff8042e62607f (nt!RtlpHpLfhSubsegmentFreeBlock+0x00000000001ed92f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffffab80`53b951d8 fffff804`2e607769 : 00000000`00000139 00000000`00000003 ffffab80`53b95500 ffffab80`53b95458 : nt!KeBugCheckEx
ffffab80`53b951e0 fffff804`2e607b90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffab80`53b95320 fffff804`2e605f23 : ffffab80`53b95590 fffff804`2e4117f2 ffffab80`53b95610 ffffab80`53b95649 : nt!KiFastFailDispatch+0xd0
ffffab80`53b95500 fffff804`2e62607f : 00000000`00000000 ffffc384`04dde700 ffffc384`02869df0 fffff804`2ee50b80 : nt!KiRaiseSecurityCheckFailure+0x323
ffffab80`53b95690 fffff804`2e44caf2 : ffffc383`f7202340 ffffa552`a94fff00 fffff200`0627e7f0 ffffab80`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x1ed92f
ffffab80`53b95740 fffff804`2ebb1019 : 00000000`00000000 ffffc383`f9cfe060 00000000`000000d8 01000000`00100000 : nt!ExFreeHeapPool+0x362
ffffab80`53b95820 fffff804`2e7fb0e4 : ffffc383`f9cfe090 ffffc383`f9cfe090 ffffc383`f7bac6c0 fffff804`2ee53880 : nt!ExFreePool+0x9
ffffab80`53b95850 fffff804`2e7faef8 : ffffc383`f9cfe080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194
ffffab80`53b958b0 fffff804`2e461277 : 00000000`00000000 00000000`00000000 ffffab80`53b95a39 ffffc383`f9cfe0c0 : nt!ObpRemoveObjectRoutine+0x88
ffffab80`53b95910 fffff804`2e82887e : ffffc383`f7bac6c0 00000000`00000000 ffffffff`00000000 ffffffff`ffffffff : nt!ObfDereferenceObjectWithTag+0xc7
ffffab80`53b95950 fffff804`2e82c4fc : 00000000`0000017c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
ffffab80`53b95a90 fffff804`2e6071b8 : ffffc384`04dde000 ffffc384`01b93480 ffffab80`53b95b80 ffffc384`00000000 : nt!NtClose+0xec
ffffab80`53b95b00 00007fff`355cc194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000099`3e47f268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`355cc194

SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption.

IMAGE_VERSION: 10.0.19041.746

MODULE_NAME: Pool_Corruption.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!ExFreePool

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {909fba96-793b-fcdd-307f-f96f328d53ad}

Followup: Pool_corruption.
---------

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff868b0ffcd060, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffff868b0ffccfb8, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4030.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9AAJGT7

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 11817.

Key : Analysis.Memory.CommitPeak.Mb
Value: 76.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffff868b0ffcd060.

BUGCHECK_P3: ffff868b0ffccfb8.

BUGCHECK_P4: 0

TRAP_FRAME: ffff868b0ffcd060 -- (.trap 0xffff868b0ffcd060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcf01e4fda000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffcf01e2605348 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8074e22637f rsp=ffff868b0ffcd1f0 rbp=0000000000000000
r8=ffffcf01f5a64000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000031 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy.
nt!RtlpHpLfhSubsegmentFreeBlock+0x1edc2f:
fffff807`4e22637f cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffff868b0ffccfb8 -- (.exr 0xffff868b0ffccfb8)
ExceptionAddress: fffff8074e22637f (nt!RtlpHpLfhSubsegmentFreeBlock+0x00000000001edc2f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: SynTPEnh.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffff868b`0ffccd38 fffff807`4e207a69 : 00000000`00000139 00000000`00000003 ffff868b`0ffcd060 ffff868b`0ffccfb8 : nt!KeBugCheckEx
ffff868b`0ffccd40 fffff807`4e207e90 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`536059ef : nt!KiBugCheckDispatch+0x69
ffff868b`0ffcce80 fffff807`4e206223 : 00000000`00000000 fffff807`4e048727 ffffe281`1b7f9920 fffff807`00000001 : nt!KiFastFailDispatch+0xd0
ffff868b`0ffcd060 fffff807`4e22637f : 00000000`00000000 fffff807`4d3b5b37 00000000`00000000 ffffcf01`f44c4440 : nt!KiRaiseSecurityCheckFailure+0x323
ffff868b`0ffcd1f0 fffff807`4e04caf2 : ffffcf01`e2602340 ffffcf01`e46a7400 00000000`00000000 ffffcf01`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x1edc2f
ffff868b`0ffcd2a0 fffff807`4e7b1019 : 00000000`00000000 ffffcf01`f5669c00 00000000`000000d8 01000000`00100000 : nt!ExFreeHeapPool+0x362
ffff868b`0ffcd380 fffff807`4e3fb384 : ffffcf01`f5669c30 ffffcf01`f5669c30 ffffcf01`e2ef77a0 ffffcf01`f46eec80 : nt!ExFreePool+0x9
ffff868b`0ffcd3b0 fffff807`4e3fb198 : ffffcf01`f5669c20 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194
ffff868b`0ffcd410 fffff807`4e061277 : 00000000`00000000 00000000`00000000 ffff868b`0ffcd599 ffffcf01`f5669c60 : nt!ObpRemoveObjectRoutine+0x88
ffff868b`0ffcd470 fffff807`4e428b1e : ffffcf01`e2ef77a0 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!ObfDereferenceObjectWithTag+0xc7
ffff868b`0ffcd4b0 fffff807`4e3d5f55 : 00000000`00000004 ffffe281`1bc03c18 00000000`00000103 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
ffff868b`0ffcd5f0 fffff807`4e3d823d : ffffcf01`f6543080 ffffcf01`f6543080 ffffffff`ffffff01 ffffcf01`f76df4d8 : nt!ExSweepHandleTable+0xd5
ffff868b`0ffcd6a0 fffff807`4e45d97c : ffffffff`ffffffff ffffcf01`f76df080 ffff868b`0ffcd6f0 fffff807`4e46587c : nt!ObKillProcess+0x35
ffff868b`0ffcd6d0 fffff807`4e506976 : ffffcf01`f76df080 ffffe281`1e06f930 ffff868b`0ffcd920 00000000`00000000 : nt!PspRundownSingleProcess+0x204
ffff868b`0ffcd760 fffff807`4e4d26c8 : 00000000`40010004 00000000`00000001 00000000`00000000 00000000`0031d000 : nt!PspExitThread+0x5f6
ffff868b`0ffcd860 fffff807`4e067fb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff868b`0ffcd8a0 fffff807`4e1fa020 : 00000000`00000000 ffff868b`0ffcd950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffff868b`0ffcd950 fffff807`4e20755f : 00000000`00000000 ffff868b`0ffcdb80 ffffcf01`f6543080 00000000`0336f338 : nt!KiInitiateUserApc+0x70
ffff868b`0ffcda90 00007fff`e87ed174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0336fb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`e87ed174

SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption.

IMAGE_VERSION: 10.0.19041.789

MODULE_NAME: Pool_Corruption.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!ExFreePool

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {909fba96-793b-fcdd-307f-f96f328d53ad}

Followup: Pool_corruption.
---------

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000002d, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8023823919b, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3031.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9AAJGT7

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 17742.

Key : Analysis.Memory.CommitPeak.Mb
Value: 76.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: a

BUGCHECK_P1: 2d.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8023823919b.

READ_ADDRESS: fffff80238cfb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80238c0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80238c0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000002d.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: fffffd06f44a07f0 -- (.trap 0xfffffd06f44a07f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000004ff rbx=0000000000000000 rcx=ffffa48d8a002340
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8023823919b rsp=fffffd06f44a0980 rbp=0000000000000001
r8=00000000ffffffff r9=0000000000000001 r10=0000000000000001
r11=ffffa48d963f7050 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
nt!RtlpHpLfhSubsegmentDecommitPages+0xcb:
fffff802`3823919b 410fb6472d movzx eax,byte ptr [r15+2Dh] ds:00000000`0000002d=??
Resetting default scope.

STACK_TEXT:
fffffd06`f44a06a8 fffff802`38407a69 : 00000000`0000000a 00000000`0000002d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffd06`f44a06b0 fffff802`38403d69 : ffffa48d`90e5d040 fffff802`3864fb63 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffd06`f44a07f0 fffff802`3823919b : fffff802`38c58100 00000000`00000000 ffffa48d`8a006618 ffffa48d`8a002340 : nt!KiPageFault+0x469
fffffd06`f44a0980 fffff802`38238644 : 00000000`00000002 ffffa48d`8a002280 ffffa48d`8a0023ff 00000000`00000001 : nt!RtlpHpLfhSubsegmentDecommitPages+0xcb
fffffd06`f44a0a10 fffff802`3823857b : ffffa48d`8a002448 ffffcc89`935042c0 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhOwnerCompact+0x90
fffffd06`f44a0a70 fffff802`3835dbd2 : ffffa48d`8a002000 00000000`00000001 ffffa48d`8a002280 ffffa48d`8a002280 : nt!RtlpHpLfhContextCompact+0xaf
fffffd06`f44a0ab0 fffff802`382ac637 : 00000000`00000001 ffffa48d`8a002000 ffffa48d`00000000 ffffffff`00000000 : nt!RtlpHpHeapCompact+0x76
fffffd06`f44a0ae0 fffff802`38225975 : 00000000`00000001 fffff802`0000003f ffffa48d`00000000 00000000`00000000 : nt!ExpHpCompactionRoutine+0x207
fffffd06`f44a0b70 fffff802`38317e25 : ffffa48d`9a6aa040 00000000`00000080 ffffa48d`8a674040 00000000`00000001 : nt!ExpWorkerThread+0x105
fffffd06`f44a0c10 fffff802`383fd0d8 : ffffdd00`28c00180 ffffa48d`9a6aa040 fffff802`38317dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffd06`f44a0c60 00000000`00000000 : fffffd06`f44a1000 fffffd06`f449b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: nt!RtlpHpLfhSubsegmentDecommitPages+cb

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.789

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: cb.

FAILURE_BUCKET_ID: AV_nt!RtlpHpLfhSubsegmentDecommitPages

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {3ea916f4-98f1-2e2d-978b-851f95bd1f17}

Followup: MachineOwner.
---------

Ben kodları ekledim hocam bir bakarsınız.
Sfc komudunu uygula
Bir de bellek hatasi var gibi arastirdigima gire RAM testi yapilcak ama hocam dogrulasin ondan sonra yaparsın.
Hocam yardımcı olur musunuz arkadaşa? @Ted Kaczynski
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffab8053b95500, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffffab8053b95458, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2734.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9AAJGT7

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 15928.

Key : Analysis.Memory.CommitPeak.Mb
Value: 76.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffffab8053b95500.

BUGCHECK_P3: ffffab8053b95458.

BUGCHECK_P4: 0

TRAP_FRAME: ffffab8053b95500 -- (.trap 0xffffab8053b95500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc38405e77000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc383f7205348 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042e62607f rsp=ffffab8053b95690 rbp=0000000000000000
r8=ffffc383f9fec000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy.
nt!RtlpHpLfhSubsegmentFreeBlock+0x1ed92f:
fffff804`2e62607f cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffffab8053b95458 -- (.exr 0xffffab8053b95458)
ExceptionAddress: fffff8042e62607f (nt!RtlpHpLfhSubsegmentFreeBlock+0x00000000001ed92f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffffab80`53b951d8 fffff804`2e607769 : 00000000`00000139 00000000`00000003 ffffab80`53b95500 ffffab80`53b95458 : nt!KeBugCheckEx
ffffab80`53b951e0 fffff804`2e607b90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffab80`53b95320 fffff804`2e605f23 : ffffab80`53b95590 fffff804`2e4117f2 ffffab80`53b95610 ffffab80`53b95649 : nt!KiFastFailDispatch+0xd0
ffffab80`53b95500 fffff804`2e62607f : 00000000`00000000 ffffc384`04dde700 ffffc384`02869df0 fffff804`2ee50b80 : nt!KiRaiseSecurityCheckFailure+0x323
ffffab80`53b95690 fffff804`2e44caf2 : ffffc383`f7202340 ffffa552`a94fff00 fffff200`0627e7f0 ffffab80`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x1ed92f
ffffab80`53b95740 fffff804`2ebb1019 : 00000000`00000000 ffffc383`f9cfe060 00000000`000000d8 01000000`00100000 : nt!ExFreeHeapPool+0x362
ffffab80`53b95820 fffff804`2e7fb0e4 : ffffc383`f9cfe090 ffffc383`f9cfe090 ffffc383`f7bac6c0 fffff804`2ee53880 : nt!ExFreePool+0x9
ffffab80`53b95850 fffff804`2e7faef8 : ffffc383`f9cfe080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194
ffffab80`53b958b0 fffff804`2e461277 : 00000000`00000000 00000000`00000000 ffffab80`53b95a39 ffffc383`f9cfe0c0 : nt!ObpRemoveObjectRoutine+0x88
ffffab80`53b95910 fffff804`2e82887e : ffffc383`f7bac6c0 00000000`00000000 ffffffff`00000000 ffffffff`ffffffff : nt!ObfDereferenceObjectWithTag+0xc7
ffffab80`53b95950 fffff804`2e82c4fc : 00000000`0000017c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
ffffab80`53b95a90 fffff804`2e6071b8 : ffffc384`04dde000 ffffc384`01b93480 ffffab80`53b95b80 ffffc384`00000000 : nt!NtClose+0xec
ffffab80`53b95b00 00007fff`355cc194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000099`3e47f268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`355cc194

SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption.

IMAGE_VERSION: 10.0.19041.746

MODULE_NAME: Pool_Corruption.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!ExFreePool

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {909fba96-793b-fcdd-307f-f96f328d53ad}

Followup: Pool_corruption.
---------

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff868b0ffcd060, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffff868b0ffccfb8, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4030.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9AAJGT7

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 11817.

Key : Analysis.Memory.CommitPeak.Mb
Value: 76.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffff868b0ffcd060.

BUGCHECK_P3: ffff868b0ffccfb8.

BUGCHECK_P4: 0

TRAP_FRAME: ffff868b0ffcd060 -- (.trap 0xffff868b0ffcd060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcf01e4fda000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffcf01e2605348 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8074e22637f rsp=ffff868b0ffcd1f0 rbp=0000000000000000
r8=ffffcf01f5a64000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000031 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy.
nt!RtlpHpLfhSubsegmentFreeBlock+0x1edc2f:
fffff807`4e22637f cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffff868b0ffccfb8 -- (.exr 0xffff868b0ffccfb8)
ExceptionAddress: fffff8074e22637f (nt!RtlpHpLfhSubsegmentFreeBlock+0x00000000001edc2f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: SynTPEnh.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffff868b`0ffccd38 fffff807`4e207a69 : 00000000`00000139 00000000`00000003 ffff868b`0ffcd060 ffff868b`0ffccfb8 : nt!KeBugCheckEx
ffff868b`0ffccd40 fffff807`4e207e90 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`536059ef : nt!KiBugCheckDispatch+0x69
ffff868b`0ffcce80 fffff807`4e206223 : 00000000`00000000 fffff807`4e048727 ffffe281`1b7f9920 fffff807`00000001 : nt!KiFastFailDispatch+0xd0
ffff868b`0ffcd060 fffff807`4e22637f : 00000000`00000000 fffff807`4d3b5b37 00000000`00000000 ffffcf01`f44c4440 : nt!KiRaiseSecurityCheckFailure+0x323
ffff868b`0ffcd1f0 fffff807`4e04caf2 : ffffcf01`e2602340 ffffcf01`e46a7400 00000000`00000000 ffffcf01`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x1edc2f
ffff868b`0ffcd2a0 fffff807`4e7b1019 : 00000000`00000000 ffffcf01`f5669c00 00000000`000000d8 01000000`00100000 : nt!ExFreeHeapPool+0x362
ffff868b`0ffcd380 fffff807`4e3fb384 : ffffcf01`f5669c30 ffffcf01`f5669c30 ffffcf01`e2ef77a0 ffffcf01`f46eec80 : nt!ExFreePool+0x9
ffff868b`0ffcd3b0 fffff807`4e3fb198 : ffffcf01`f5669c20 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194
ffff868b`0ffcd410 fffff807`4e061277 : 00000000`00000000 00000000`00000000 ffff868b`0ffcd599 ffffcf01`f5669c60 : nt!ObpRemoveObjectRoutine+0x88
ffff868b`0ffcd470 fffff807`4e428b1e : ffffcf01`e2ef77a0 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!ObfDereferenceObjectWithTag+0xc7
ffff868b`0ffcd4b0 fffff807`4e3d5f55 : 00000000`00000004 ffffe281`1bc03c18 00000000`00000103 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
ffff868b`0ffcd5f0 fffff807`4e3d823d : ffffcf01`f6543080 ffffcf01`f6543080 ffffffff`ffffff01 ffffcf01`f76df4d8 : nt!ExSweepHandleTable+0xd5
ffff868b`0ffcd6a0 fffff807`4e45d97c : ffffffff`ffffffff ffffcf01`f76df080 ffff868b`0ffcd6f0 fffff807`4e46587c : nt!ObKillProcess+0x35
ffff868b`0ffcd6d0 fffff807`4e506976 : ffffcf01`f76df080 ffffe281`1e06f930 ffff868b`0ffcd920 00000000`00000000 : nt!PspRundownSingleProcess+0x204
ffff868b`0ffcd760 fffff807`4e4d26c8 : 00000000`40010004 00000000`00000001 00000000`00000000 00000000`0031d000 : nt!PspExitThread+0x5f6
ffff868b`0ffcd860 fffff807`4e067fb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff868b`0ffcd8a0 fffff807`4e1fa020 : 00000000`00000000 ffff868b`0ffcd950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffff868b`0ffcd950 fffff807`4e20755f : 00000000`00000000 ffff868b`0ffcdb80 ffffcf01`f6543080 00000000`0336f338 : nt!KiInitiateUserApc+0x70
ffff868b`0ffcda90 00007fff`e87ed174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0336fb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`e87ed174

SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption.

IMAGE_VERSION: 10.0.19041.789

MODULE_NAME: Pool_Corruption.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!ExFreePool

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {909fba96-793b-fcdd-307f-f96f328d53ad}

Followup: Pool_corruption.
---------

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000002d, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8023823919b, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3031.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9AAJGT7

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 17742.

Key : Analysis.Memory.CommitPeak.Mb
Value: 76.

Key : Analysis.System
Value: CreateObject.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: a

BUGCHECK_P1: 2d.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8023823919b.

READ_ADDRESS: fffff80238cfb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80238c0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80238c0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000002d.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: fffffd06f44a07f0 -- (.trap 0xfffffd06f44a07f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000004ff rbx=0000000000000000 rcx=ffffa48d8a002340
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8023823919b rsp=fffffd06f44a0980 rbp=0000000000000001
r8=00000000ffffffff r9=0000000000000001 r10=0000000000000001
r11=ffffa48d963f7050 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
nt!RtlpHpLfhSubsegmentDecommitPages+0xcb:
fffff802`3823919b 410fb6472d movzx eax,byte ptr [r15+2Dh] ds:00000000`0000002d=??
Resetting default scope.

STACK_TEXT:
fffffd06`f44a06a8 fffff802`38407a69 : 00000000`0000000a 00000000`0000002d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffd06`f44a06b0 fffff802`38403d69 : ffffa48d`90e5d040 fffff802`3864fb63 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffd06`f44a07f0 fffff802`3823919b : fffff802`38c58100 00000000`00000000 ffffa48d`8a006618 ffffa48d`8a002340 : nt!KiPageFault+0x469
fffffd06`f44a0980 fffff802`38238644 : 00000000`00000002 ffffa48d`8a002280 ffffa48d`8a0023ff 00000000`00000001 : nt!RtlpHpLfhSubsegmentDecommitPages+0xcb
fffffd06`f44a0a10 fffff802`3823857b : ffffa48d`8a002448 ffffcc89`935042c0 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhOwnerCompact+0x90
fffffd06`f44a0a70 fffff802`3835dbd2 : ffffa48d`8a002000 00000000`00000001 ffffa48d`8a002280 ffffa48d`8a002280 : nt!RtlpHpLfhContextCompact+0xaf
fffffd06`f44a0ab0 fffff802`382ac637 : 00000000`00000001 ffffa48d`8a002000 ffffa48d`00000000 ffffffff`00000000 : nt!RtlpHpHeapCompact+0x76
fffffd06`f44a0ae0 fffff802`38225975 : 00000000`00000001 fffff802`0000003f ffffa48d`00000000 00000000`00000000 : nt!ExpHpCompactionRoutine+0x207
fffffd06`f44a0b70 fffff802`38317e25 : ffffa48d`9a6aa040 00000000`00000080 ffffa48d`8a674040 00000000`00000001 : nt!ExpWorkerThread+0x105
fffffd06`f44a0c10 fffff802`383fd0d8 : ffffdd00`28c00180 ffffa48d`9a6aa040 fffff802`38317dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffd06`f44a0c60 00000000`00000000 : fffffd06`f44a1000 fffffd06`f449b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: nt!RtlpHpLfhSubsegmentDecommitPages+cb

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.789

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: cb.

FAILURE_BUCKET_ID: AV_nt!RtlpHpLfhSubsegmentDecommitPages

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {3ea916f4-98f1-2e2d-978b-851f95bd1f17}

Followup: MachineOwner.
---------

Ben kodları ekledim hocam bir bakarsınız.
Sfc komudunu uygula
Bir de bellek hatasi var gibi arastirdigima göre RAM testi yapilcak ama hocam dogrulasin ondan sonra yaparsın.
@Bora Dere hocam konuyla ilgilenir misiniz? Benim pek deneyimim yok da.
 
Son düzenleme:
Driver Booster kullanıyor musun?

USB portuna sadece klavye ve fara takılı kalsın. Diğer USB portları boşta kalsın. Klavye ve farenin USB çıkışlarını tak çıkart yap.

"sfc /scannow" rehberini uygula.

Memtest86 testi yap. Sonuçlarını paylaş.

Ekran kartı sürücün güncelliğini kontrol et. Güncel değil ise güncelle.

BlueStacks kaldır.
 
Driver Booster kullanıyor musun?

USB portuna sadece klavye ve fara takılı kalsın. Diğer USB portları boşta kalsın. Klavye ve farenin USB çıkışlarını tak çıkart yap.

"sfc /scannow" rehberini uygula.

Memtest86 testi yap. Sonuçlarını paylaş.

Ekran kartı sürücün güncelliğini kontrol et. Güncel değil ise güncelle.

BlueStacks kaldır.
Driver Booster kullanmıyorum. Manuel olarak driver yükledim. Sadece harici USB fara bağlı bilgisayarıma. CMD komutunu çalıştırdım. Sadece 'CBS.log' adlı dosya onarıldı dedi. Ekran kartım da son sürüm. BlueStacks'ı adlı programı kullanmak durumundayım. Eğer ondan dolayı mavi ekran veriyorsa razıyım. Bir tek ram'i test etmedim. BİOS olayları felan olduğundan gözüm korktu. Ama bilgisayarımda tek ram var. Sıkıntı olsa devamlı olmaz mı? Bilmediğimden soruyorum. Bu arada yardımcı olmaya çalıştığın için teşekkür ederim.
 
BlueStacks yüzüne değildi galiba.

Sürücülerini güncel tutmaya çalış her zaman.

Memtest86 testi yapmaya çalışın. Yaparsanız sonucunu paylaşırsınız.

Tekrar mavi ekran alırsan minidump dosyasını paylaşırsın.
Tekrar mavi ekran yedim. Sorun ne bakabilir misin?
 
Fare yazılımı varsa kaldır.

Memtest86 testi yapın. Sonuçlarını paylaşın.

HD Tune yazılımı ile "error scan" tesi yapın ve "health" sekmesini paylaşın.

USB portuna sadece klavye ve fara takılı kalsın. Diğer USB portları boşta kalsın. Klavye ve farenin USB çıkışlarını tak çıkart yap.

"DISM" rehberini uygula.

Test sonuçlarını paylaşırsınız.
 

Geri
Yukarı