Aşağıdaki ağ ve Bluetooth sürücülerini indirip kurun ve 3 gün sistemi gözlemleyin. Sorun çözülürse belirtirseniz sevinirim.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd28e86291b20, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffffd28e86291a78, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for Netwbw02.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 16578.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 41374.
Key : Analysis.Init.CPU.mSec
Value: 1124.
Key : Analysis.Init.Elapsed.mSec
Value: 5660.
Key : Analysis.Memory.CommitPeak.Mb
Value: 81.
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 012022-24359-01.dmp
BUGCHECK_CODE: 139.
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd28e86291b20.
BUGCHECK_P3: ffffd28e86291a78.
BUGCHECK_P4: 0
TRAP_FRAME: ffffd28e86291b20 -- (.trap 0xffffd28e86291b20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff8d8f6d7c4b78 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80686268a6a rsp=ffffd28e86291cb0 rbp=ffff8d8f5dcf5640
r8=fffff80686343048 r9=ffff8d8f6ba0c800 r10=fffff80683cd7a50
r11=ffff9b7901800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
ndis!ndisFreeToNPagedPool+0x6a:
fffff806`86268a6a cd29 int 29h.
Resetting default scope.
EXCEPTION_RECORD: ffffd28e86291a78 -- (.exr 0xffffd28e86291a78)
ExceptionAddress: fffff80686268a6a (ndis!ndisFreeToNPagedPool+0x000000000000006a)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409.
EXCEPTION_PARAMETER1: 0000000000000003.
EXCEPTION_STR: 0xc0000409.
STACK_TEXT:
ffffd28e`862917f8 fffff806`83e09269 : 00000000`00000139 00000000`00000003 ffffd28e`86291b20 ffffd28e`86291a78 : nt!KeBugCheckEx
ffffd28e`86291800 fffff806`83e09690 : 00000000`00000103 00000000`00000000 00000000`00000000 ffff8d8f`76b78cf0 : nt!KiBugCheckDispatch+0x69
ffffd28e`86291940 fffff806`83e07a23 : ffffd28e`00000000 ffff8d8f`6ba0c800 00000000`00000051 01000000`00100000 : nt!KiFastFailDispatch+0xd0
ffffd28e`86291b20 fffff806`86268a6a : ffff8d8f`5dcf58c0 ffff8d8f`6d7c4b70 fffff806`864e92f0 fffff806`862c933a : nt!KiRaiseSecurityCheckFailure+0x323
ffffd28e`86291cb0 fffff806`862683b4 : ffff8d8f`71d88c80 ffff8d8f`6ba0c800 00000000`00000000 fffff806`83dd26a5 : ndis!ndisFreeToNPagedPool+0x6a
ffffd28e`86291ce0 fffff806`862b5805 : 00000000`00000000 ffffd28e`86291d80 ffff8d8f`6d7c4b90 00000000`00000001 : ndis!NdisFreeNetBuffer+0xe4
ffffd28e`86291d10 fffff806`91dd6577 : ffff8d8f`6c7c5c70 00000000`00000002 ffff8d8f`6ba0c800 00000000`00000001 : ndis!NdisFreeCloneNetBufferList+0x424a5
ffffd28e`86291e40 fffff806`91dd6422 : ffff8d8f`72de6260 ffff8d8f`6abac640 ffffab81`00000000 fffff806`91dd6400 : vwififlt!FilterSendNetBufferListsCompleteLegacy+0x147
ffffd28e`86291eb0 fffff806`86265a92 : 00000000`00000000 ffff8d8f`6d531040 00000000`00000246 fffff806`83cf8651 : vwififlt!FilterSendNetBufferListsComplete+0x22
ffffd28e`86291ee0 fffff806`8627837d : ffffffff`ffffff00 ffffd28e`00000022 00000000`00000000 00000000`00000000 : ndis!ndisCallSendCompleteHandler+0x32
ffffd28e`86291f20 fffff806`83cf8598 : ffffd28e`86292099 ffff8d8f`6ba0c800 000000c0`00000000 00000000`00000000 : ndis!ndisDataPathExpandStackCallback+0x3d
ffffd28e`86291f70 fffff806`83cf850d : fffff806`86278340 ffffd28e`86292080 ffff8d8f`6a38b2c0 00000000`00000aa4 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffd28e`86291fe0 fffff806`862c933a : 00000000`00000000 00000000`000000c0 00000000`00000000 ffff8d8f`5cc02000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffd28e`86292020 fffff806`862a29e5 : ffff8d8f`6ba0c800 ffff8d8f`6ba0c800 ffff8d8f`6ff448a0 fffff806`83ec3231 : ndis!ndisInvokeNextSendCompleteHandler+0x1d2
ffffd28e`862920f0 fffff806`867e1858 : ffff8d8f`6ba0c801 ffff8d8f`6ba0c800 00000000`00000000 ffff8d8f`76fb80a1 : ndis!NdisFSendNetBufferListsComplete+0x3d405
ffffd28e`86292190 fffff806`862a1689 : ffffd28e`86292269 ffff8d8f`6ba0c800 ffff8d8f`6ff448a0 00000000`00000000 : wfplwfs!LwfLowerSendNetBufferListsComplete+0xc8
ffffd28e`862921e0 fffff806`97c5ee0d : ffff8d8f`6ba0c802 00000000`c0000001 00000000`00000000 ffff8d8f`6d7c4b90 : ndis!NdisMSendNetBufferListsComplete+0x3e779
ffffd28e`862922d0 ffff8d8f`6ba0c802 : 00000000`c0000001 00000000`00000000 ffff8d8f`6d7c4b90 ffff8d8f`72660b20 : Netwbw02+0x8ee0d
ffffd28e`862922d8 00000000`c0000001 : 00000000`00000000 ffff8d8f`6d7c4b90 ffff8d8f`72660b20 fffff806`97c633c4 : 0xffff8d8f`6ba0c802
ffffd28e`862922e0 00000000`00000000 : ffff8d8f`6d7c4b90 ffff8d8f`72660b20 fffff806`97c633c4 00000000`00005ff9 : 0xc0000001.
SYMBOL_NAME: vwififlt!FilterSendNetBufferListsCompleteLegacy+147
MODULE_NAME: vwififlt.
IMAGE_NAME: vwififlt.sys
IMAGE_VERSION: 10.0.19041.1320
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: 147.
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_vwififlt!FilterSendNetBufferListsCompleteLegacy
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {bd04991e-89f4-22cc-ae98-cb5e183876c4}
Followup: MachineOwner.
---------[/CODE]