KERNEL_SECURITY_CHECK_FAILURE hatası

Olay görüntüleyicisinden ekran paylaşabilir misiniz hangi saatte olduysa.
Temiz kurulum yaptığına emin misin en son ne zaman format attın, Driver'ler güncel mi?
 
RAM arızası olması muhtemel zira Pool Corruption yazmakta. Hem RAM testi yapın hem de HD Tune ile Health kısmından sabit disk sağlığınızı kontrol edin.



Hatalardan birisi de Ağ kaynaklı gibi gözüküyor, kesin olmamakla birlikte.

NETIO.SYS, Windows Ağ G/Ç Alt Sistemi oluyor. Ağ kartı sürücünüzü güncel değilse güncelleyin. Ama öncelik RAM testi.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb102491beeb0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffb102491bee08, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63al.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2749

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6306

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffb102491beeb0

BUGCHECK_P3: ffffb102491bee08

BUGCHECK_P4: 0

TRAP_FRAME:  ffffb102491beeb0 -- (.trap 0xffffb102491beeb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc501291a0000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc50122e03748 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042342803f rsp=ffffb102491bf040 rbp=0000000000000000
 r8=ffffc50127723000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000016 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!RtlpHpLfhSubsegmentFreeBlock+0x1c1e6f:
fffff804`2342803f cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffb102491bee08 -- (.exr 0xffffb102491bee08)
ExceptionAddress: fffff8042342803f (nt!RtlpHpLfhSubsegmentFreeBlock+0x00000000001c1e6f)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffb102`491beb88 fffff804`233efe29     : 00000000`00000139 00000000`00000003 ffffb102`491beeb0 ffffb102`491bee08 : nt!KeBugCheckEx
ffffb102`491beb90 fffff804`233f0250     : 00000000`00000001 00000000`00000002 ffffc501`29c2d950 ffffc501`2a146c20 : nt!KiBugCheckDispatch+0x69
ffffb102`491becd0 fffff804`233ee5e3     : ffffc501`2a0e7a60 fffff804`26ea804d ffffc501`2a0e7a60 ffffc501`369decb0 : nt!KiFastFailDispatch+0xd0
ffffb102`491beeb0 fffff804`2342803f     : 00000000`00000001 00000000`00000002 ffffc501`29c2c390 ffffc501`2a0e7a60 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb102`491bf040 fffff804`23240a92     : ffffc501`22e02340 00000000`ffffff00 00000000`00000000 ffffc501`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x1c1e6f
ffffb102`491bf0f0 fffff804`239c2019     : ffffc501`00000000 fffff804`20e03dec 00000000`00000002 01000000`00100000 : nt!ExFreeHeapPool+0x362
ffffb102`491bf1d0 fffff804`26ea8a5e     : ffffc501`2a0d9ac0 ffffc501`299ba3c0 00000000`00000000 00000000`00000001 : nt!ExFreePool+0x9
ffffb102`491bf200 fffff804`26ea83b4     : ffffc501`299ba3e0 00470080`00000000 fffff804`0000156c ffffc501`29e798b8 : ndis!ndisFreeToNPagedPool+0x5e
ffffb102`491bf230 fffff804`2dc9e93a     : ffffc501`3364f430 00000000`00000000 ffffc501`2e77d030 00000000`00000056 : ndis!NdisFreeNetBuffer+0xe4
ffffb102`491bf260 fffff804`2dc997ba     : ffffc501`35ce11c0 ffffc501`35ce11c0 00000000`0000004f 00000000`00000000 : nwifi!Dot11PrepareEthernetPayloadPacketComplete+0x1a
ffffb102`491bf290 fffff804`2dc9d8dd     : 00000000`00000000 ffffb102`491bf4b9 ffffb102`491bf4a0 fffff804`270290b7 : nwifi!Dot11SendCompletion+0x4a
ffffb102`491bf2d0 fffff804`26ea5a92     : 00000000`000001b0 00000000`00000793 00000000`00000002 fffff804`232372d1 : nwifi!Pt6SendComplete+0x1d
ffffb102`491bf300 fffff804`26eb839d     : ffffc501`22e02340 fffff804`2323f0ff 00000000`00000000 00000000`00000000 : ndis!ndisCallSendCompleteHandler+0x32
ffffb102`491bf340 fffff804`23237218     : ffffb102`491bf4b9 ffffc501`2e77d030 00000000`00000000 ffffc501`2a0e2a20 : ndis!ndisDataPathExpandStackCallback+0x3d
ffffb102`491bf390 fffff804`2323718d     : fffff804`26eb8360 ffffb102`491bf4a0 ffffc501`2a0e7a60 fffff804`239c2019 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffb102`491bf400 fffff804`26f0896a     : ffffc501`35ce11c0 fffff804`26ea7f80 ffffc501`2a0dbb40 ffffc501`35ce11c0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffb102`491bf440 fffff804`26ee1fa5     : ffffc501`2a0e2a20 ffffc501`2e77d030 00000000`00000001 00000000`00000000 : ndis!ndisInvokeNextSendCompleteHandler+0x1d2
ffffb102`491bf510 fffff804`2cab65d7     : ffffc501`2a0e2a01 ffffc501`2a0e2a20 ffffc501`00000000 ffffc501`29fe9e31 : ndis!NdisFSendNetBufferListsComplete+0x3c9c5
ffffb102`491bf5b0 fffff804`2cab6422     : ffffc501`2a145010 ffffc501`2e77d030 0000097b`00000000 fffff804`2cab6400 : vwififlt!DllInitialize+0x4847
ffffb102`491bf620 fffff804`26ea5a92     : 00000000`00000000 fffff804`23d24440 ffffc501`00000000 fffff804`232372d1 : vwififlt!DllInitialize+0x4692
ffffb102`491bf650 fffff804`26eb839d     : 00000000`00000000 ffffc501`2798f780 00000000`00000000 00000000`00000000 : ndis!ndisCallSendCompleteHandler+0x32
ffffb102`491bf690 fffff804`23237218     : ffffb102`491bf809 ffffc501`35ce11c0 ffffc501`00000000 00000000`00000000 : ndis!ndisDataPathExpandStackCallback+0x3d
ffffb102`491bf6e0 fffff804`2323718d     : fffff804`26eb8360 ffffb102`491bf7f0 ffffc501`2a0f2aa0 ffffc501`2f6d1260 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffb102`491bf750 fffff804`26f0896a     : ffffb102`491bf918 ffffc501`2798f094 00000000`0000ffff 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffb102`491bf790 fffff804`26ee1fa5     : ffffc501`35ce11c0 ffffc501`35ce11c0 ffffc501`2a0f5aa0 fffff804`2f87b64d : ndis!ndisInvokeNextSendCompleteHandler+0x1d2
ffffb102`491bf860 fffff804`27461858     : ffffc501`35ce1101 ffffc501`35ce11c0 00000000`00000000 ffffc501`29fe9d11 : ndis!NdisFSendNetBufferListsComplete+0x3c9c5
ffffb102`491bf900 fffff804`26ee0c49     : ffffb102`491bf9d9 ffffc501`35ce11c0 ffffc501`2a0f5aa0 00000000`00000000 : wfplwfs!LwfLowerSendNetBufferListsComplete+0xc8
ffffb102`491bf950 fffff804`2f998b5f     : ffffc501`278a8002 ffffc501`278a8000 00000000`00000000 ffffc501`27682050 : ndis!NdisMSendNetBufferListsComplete+0x3dd39
ffffb102`491bfa40 ffffc501`278a8002     : ffffc501`278a8000 00000000`00000000 ffffc501`27682050 00000000`00000000 : bcmwl63al+0x198b5f
ffffb102`491bfa48 ffffc501`278a8000     : 00000000`00000000 ffffc501`27682050 00000000`00000000 fffff804`2f8166fc : 0xffffc501`278a8002
ffffb102`491bfa50 00000000`00000000     : ffffc501`27682050 00000000`00000000 fffff804`2f8166fc ffffc501`27682050 : 0xffffc501`278a8000


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.450

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!ExFreePool

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {909fba96-793b-fcdd-307f-f96f328d53ad}

Followup:     Pool_corruption
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802336272db, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for afd.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3593

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11599

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802336272db

READ_ADDRESS: fffff802306fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8023060f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8023060f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

TRAP_FRAME:  ffffcc0cccf47950 -- (.trap 0xffffcc0cccf47950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8d84989b3020
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802336272db rsp=ffffcc0cccf47ae0 rbp=0000000000000000
 r8=000000000002625a  r9=ffff8d849a7792e0 r10=fffff8022fd16cb0
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
NETIO!FsbAllocate+0x3bb:
fffff802`336272db 488b2b          mov     rbp,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT: 
ffffcc0c`ccf47808 fffff802`2fdefe29     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffcc0c`ccf47810 fffff802`2fdec129     : ffff8d84`9a61a510 00000000`00000000 00000000`00000000 0000000e`00000002 : nt!KiBugCheckDispatch+0x69
ffffcc0c`ccf47950 fffff802`336272db     : 00000000`0000000c ffffcc0c`ccf479c8 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffcc0c`ccf47ae0 fffff802`336271d3     : 00000000`0133d9ea ffff8d84`95d1c010 ffff8d84`95cddc40 ffff8d84`95cddc40 : NETIO!FsbAllocate+0x3bb
ffffcc0c`ccf47b10 fffff802`3362705f     : 00000000`00000500 ffff8d84`95cddc40 ffff8d84`95d1c010 ffff8d84`95cddb80 : NETIO!FsbAllocate+0x2b3
ffffcc0c`ccf47b50 fffff802`33717d0b     : fffff802`338ea230 00000000`00000000 00000000`00000000 ffff8d84`95d1c010 : NETIO!FsbAllocate+0x13f
ffffcc0c`ccf47b90 fffff802`337217fe     : 00000000`00000000 00000000`00000000 ffff8d84`a83ddc04 ffff8d84`9a7792e0 : tcpip!IppAllocatePathUnderLock+0x3b
ffffcc0c`ccf47c20 fffff802`337203e8     : ffffffff`ffffffff ffffcc0c`00000008 ffffcc0c`ccf47fc0 00000000`00000060 : tcpip!IppFindOrCreatePath+0xc5e
ffffcc0c`ccf47ec0 fffff802`337201dc     : 00000000`00000000 ffff8d84`94a02000 ffff8d84`a83ddc04 ffff8d84`a83ddc04 : tcpip!IppJoinPath+0x1f8
ffffcc0c`ccf47fd0 fffff802`337768ec     : ffffcc0c`ccf480f1 fffff802`2fc44161 ffff8d84`94a02340 ffff8d84`94a05900 : tcpip!IpNlpJoinPath+0xc
ffffcc0c`ccf48000 fffff802`33776823     : 00000000`00000000 ffffcc0c`ccf481b8 ffff8d84`95ce2170 ffff8d84`95d1c010 : tcpip!InetJoinPathAf+0x94
ffffcc0c`ccf480d0 fffff802`33776406     : 00000000`00000000 ffffcc0c`ccf48250 00000000`00000000 ffff8d84`a0482ae0 : tcpip!InetResolveLocalAddressAndSockAddrToPathAndAf+0x107
ffffcc0c`ccf48150 fffff802`337055eb     : 00000000`00000000 fffff802`39b1df70 00000000`00000000 ffffe60b`6b800340 : tcpip!UdpSetDestinationEndpoint+0x126
ffffcc0c`ccf48320 fffff802`337048dd     : 00000000`00000000 ffff8d84`94a02000 ffff8d84`a0482ae0 ffff8d84`94a02340 : tcpip!UdpIoControlEndpoint+0x4bb
ffffcc0c`ccf48480 fffff802`39b53a08     : ffff8d84`00000000 00000000`00000000 ffffe60b`878aa120 ffff8d84`a9264b70 : tcpip!UdpTlProviderIoControlEndpoint+0x5d
ffffcc0c`ccf484e0 ffff8d84`00000000     : 00000000`00000000 ffffe60b`878aa120 ffff8d84`a9264b70 00000000`00000001 : afd+0x53a08
ffffcc0c`ccf484e8 00000000`00000000     : ffffe60b`878aa120 ffff8d84`a9264b70 00000000`00000001 ffff8d84`9e08c270 : 0xffff8d84`00000000


SYMBOL_NAME:  NETIO!FsbAllocate+3bb

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.208

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  3bb

FAILURE_BUCKET_ID:  AV_NETIO!FsbAllocate

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {78cce68b-070e-f2e8-31e7-7993e4d915cc}

Followup:     MachineOwner
---------

2: kd> lmvm NETIO
Browse full module list
start             end                 module name
fffff802`33610000 fffff802`336a8000   NETIO    # (export symbols)       NETIO.SYS
    Loaded symbol image file: NETIO.SYS
    Mapped memory image file: C:\ProgramData\Dbg\sym\NETIO.SYS\06E89BCC98000\NETIO.SYS
    Image path: NETIO.SYS
    Image name: NETIO.SYS
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        06E89BCC (This is a reproducible build file hash, not a timestamp)
    CheckSum:         000991F6
    ImageSize:        00098000
    File version:     10.0.19041.208
    Product version:  10.0.19041.208
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.6 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     netio.sys
        OriginalFilename: netio.sys
        ProductVersion:   10.0.19041.208
        FileVersion:      10.0.19041.208 (WinBuild.160101.0800)
        FileDescription:  Network I/O Subsystem
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
 
RAM hatası olduğunu düşünüyorum.
Test sonuçlarını bizimle paylaşın.

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802336272db, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for NETIO.SYS

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3093

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5DL7M86

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 24156

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802336272db

READ_ADDRESS: fffff802306fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8023060f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8023060f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

TRAP_FRAME: ffffcc0cccf47950 -- (.trap 0xffffcc0cccf47950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8d84989b3020
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802336272db rsp=ffffcc0cccf47ae0 rbp=0000000000000000
r8=000000000002625a r9=ffff8d849a7792e0 r10=fffff8022fd16cb0
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
NETIO+0x172db:
fffff802`336272db 488b2b mov rbp,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffffcc0c`ccf47808 fffff802`2fdefe29 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffcc0c`ccf47810 fffff802`2fdec129 : ffff8d84`9a61a510 00000000`00000000 00000000`00000000 0000000e`00000002 : nt!KiBugCheckDispatch+0x69
ffffcc0c`ccf47950 fffff802`336272db : 00000000`0000000c ffffcc0c`ccf479c8 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffcc0c`ccf47ae0 00000000`0000000c : ffffcc0c`ccf479c8 00000000`00000000 00000000`00000000 ffff8d84`95cddc40 : NETIO+0x172db
ffffcc0c`ccf47ae8 ffffcc0c`ccf479c8 : 00000000`00000000 00000000`00000000 ffff8d84`95cddc40 fffff802`336271d3 : 0xc
ffffcc0c`ccf47af0 00000000`00000000 : 00000000`00000000 ffff8d84`95cddc40 fffff802`336271d3 00000000`0133d9ea : 0xffffcc0c`ccf479c8


SYMBOL_NAME: NETIO+172db

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 172db

FAILURE_BUCKET_ID: AV_NETIO!unknown_function

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {977f9440-ca16-6cb7-4da9-311b2639b250}

Followup: MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb102491beeb0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffb102491bee08, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for vwififlt.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2686

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5DL7M86

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 13896

Key : Analysis.Memory.CommitPeak.Mb
Value: 88

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffb102491beeb0

BUGCHECK_P3: ffffb102491bee08

BUGCHECK_P4: 0

TRAP_FRAME: ffffb102491beeb0 -- (.trap 0xffffb102491beeb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc501291a0000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc50122e03748 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042342803f rsp=ffffb102491bf040 rbp=0000000000000000
r8=ffffc50127723000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000016 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!RtlpHpLfhSubsegmentFreeBlock+0x1c1e6f:
fffff804`2342803f cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffb102491bee08 -- (.exr 0xffffb102491bee08)
ExceptionAddress: fffff8042342803f (nt!RtlpHpLfhSubsegmentFreeBlock+0x00000000001c1e6f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffb102`491beb88 fffff804`233efe29 : 00000000`00000139 00000000`00000003 ffffb102`491beeb0 ffffb102`491bee08 : nt!KeBugCheckEx
ffffb102`491beb90 fffff804`233f0250 : 00000000`00000001 00000000`00000002 ffffc501`29c2d950 ffffc501`2a146c20 : nt!KiBugCheckDispatch+0x69
ffffb102`491becd0 fffff804`233ee5e3 : ffffc501`2a0e7a60 fffff804`26ea804d ffffc501`2a0e7a60 ffffc501`369decb0 : nt!KiFastFailDispatch+0xd0
ffffb102`491beeb0 fffff804`2342803f : 00000000`00000001 00000000`00000002 ffffc501`29c2c390 ffffc501`2a0e7a60 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb102`491bf040 fffff804`23240a92 : ffffc501`22e02340 00000000`ffffff00 00000000`00000000 ffffc501`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x1c1e6f
ffffb102`491bf0f0 fffff804`239c2019 : ffffc501`00000000 fffff804`20e03dec 00000000`00000002 01000000`00100000 : nt!ExFreeHeapPool+0x362
ffffb102`491bf1d0 fffff804`26ea8a5e : ffffc501`2a0d9ac0 ffffc501`299ba3c0 00000000`00000000 00000000`00000001 : nt!ExFreePool+0x9
ffffb102`491bf200 fffff804`26ea83b4 : ffffc501`299ba3e0 00470080`00000000 fffff804`0000156c ffffc501`29e798b8 : ndis!NdisCurrentProcessorIndex+0xee
ffffb102`491bf230 fffff804`2dc9e93a : ffffc501`3364f430 00000000`00000000 ffffc501`2e77d030 00000000`00000056 : ndis!NdisFreeNetBuffer+0xe4
ffffb102`491bf260 fffff804`2dc997ba : ffffc501`35ce11c0 ffffc501`35ce11c0 00000000`0000004f 00000000`00000000 : nwifi!Dot11PrepareEthernetPayloadPacketComplete+0x1a
ffffb102`491bf290 fffff804`2dc9d8dd : 00000000`00000000 ffffb102`491bf4b9 ffffb102`491bf4a0 fffff804`270290b7 : nwifi!Dot11SendCompletion+0x4a
ffffb102`491bf2d0 fffff804`26ea5a92 : 00000000`000001b0 00000000`00000793 00000000`00000002 fffff804`232372d1 : nwifi!Pt6SendComplete+0x1d
ffffb102`491bf300 fffff804`26eb839d : ffffc501`22e02340 fffff804`2323f0ff 00000000`00000000 00000000`00000000 : ndis!NdisReleaseRWLock+0xc2
ffffb102`491bf340 fffff804`23237218 : ffffb102`491bf4b9 ffffc501`2e77d030 00000000`00000000 ffffc501`2a0e2a20 : ndis!NdisRequestEx+0x23d
ffffb102`491bf390 fffff804`2323718d : fffff804`26eb8360 ffffb102`491bf4a0 ffffc501`2a0e7a60 fffff804`239c2019 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffb102`491bf400 fffff804`26f0896a : ffffc501`35ce11c0 fffff804`26ea7f80 ffffc501`2a0dbb40 ffffc501`35ce11c0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffb102`491bf440 fffff804`26ee1fa5 : ffffc501`2a0e2a20 ffffc501`2e77d030 00000000`00000001 00000000`00000000 : ndis!NdisMSynchronizeWithInterruptEx+0x1d7a
ffffb102`491bf510 fffff804`2cab65d7 : ffffc501`2a0e2a01 ffffc501`2a0e2a20 ffffc501`00000000 ffffc501`29fe9e31 : ndis!NdisGetDeviceReservedExtension+0x4b45
ffffb102`491bf5b0 ffffc501`2a0e2a01 : ffffc501`2a0e2a20 ffffc501`00000000 ffffc501`29fe9e31 00000000`00000001 : vwififlt+0x65d7
ffffb102`491bf5b8 ffffc501`2a0e2a20 : ffffc501`00000000 ffffc501`29fe9e31 00000000`00000001 fffff804`2f99b866 : 0xffffc501`2a0e2a01
ffffb102`491bf5c0 ffffc501`00000000 : ffffc501`29fe9e31 00000000`00000001 fffff804`2f99b866 00000000`00000000 : 0xffffc501`2a0e2a20
ffffb102`491bf5c8 ffffc501`29fe9e31 : 00000000`00000001 fffff804`2f99b866 00000000`00000000 fffff804`26eb8360 : 0xffffc501`00000000
ffffb102`491bf5d0 00000000`00000001 : fffff804`2f99b866 00000000`00000000 fffff804`26eb8360 00000000`00000000 : 0xffffc501`29fe9e31
ffffb102`491bf5d8 fffff804`2f99b866 : 00000000`00000000 fffff804`26eb8360 00000000`00000000 00000000`00000000 : 0x1
ffffb102`491bf5e0 00000000`00000000 : ffffc501`00000000 fffff804`00000000 00000000`00000000 ffffb102`491bf7f0 : bcmwl63al!wl_sendup+0x506


SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption

IMAGE_VERSION: 10.0.19041.450

MODULE_NAME: Pool_Corruption

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!ExFreePool

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {909fba96-793b-fcdd-307f-f96f328d53ad}

Followup: Pool_corruption
---------
 

Geri
Yukarı