TlhTsdmr
Hectopat
- Katılım
- 29 Eylül 2019
- Mesajlar
- 777
- Çözümler
- 7
Daha fazla
- Cinsiyet
- Erkek
Aşağıdaki ağ ve Bluetooth sürücülerini indirip kurun ve 3 gün sistemi gözlemleyin. Sorun çözülürse belirtirseniz sevinirim.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd28e86291b20, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffffd28e86291a78, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for Netwbw02.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 16578.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 41374.
Key : Analysis.Init.CPU.mSec
Value: 1124.
Key : Analysis.Init.Elapsed.mSec
Value: 5660.
Key : Analysis.Memory.CommitPeak.Mb
Value: 81.
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 012022-24359-01.dmp
BUGCHECK_CODE: 139.
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd28e86291b20.
BUGCHECK_P3: ffffd28e86291a78.
BUGCHECK_P4: 0
TRAP_FRAME: ffffd28e86291b20 -- (.trap 0xffffd28e86291b20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff8d8f6d7c4b78 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80686268a6a rsp=ffffd28e86291cb0 rbp=ffff8d8f5dcf5640
r8=fffff80686343048 r9=ffff8d8f6ba0c800 r10=fffff80683cd7a50
r11=ffff9b7901800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
ndis!ndisFreeToNPagedPool+0x6a:
fffff806`86268a6a cd29 int 29h.
Resetting default scope.
EXCEPTION_RECORD: ffffd28e86291a78 -- (.exr 0xffffd28e86291a78)
ExceptionAddress: fffff80686268a6a (ndis!ndisFreeToNPagedPool+0x000000000000006a)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409.
EXCEPTION_PARAMETER1: 0000000000000003.
EXCEPTION_STR: 0xc0000409.
STACK_TEXT:
ffffd28e`862917f8 fffff806`83e09269 : 00000000`00000139 00000000`00000003 ffffd28e`86291b20 ffffd28e`86291a78 : nt!KeBugCheckEx
ffffd28e`86291800 fffff806`83e09690 : 00000000`00000103 00000000`00000000 00000000`00000000 ffff8d8f`76b78cf0 : nt!KiBugCheckDispatch+0x69
ffffd28e`86291940 fffff806`83e07a23 : ffffd28e`00000000 ffff8d8f`6ba0c800 00000000`00000051 01000000`00100000 : nt!KiFastFailDispatch+0xd0
ffffd28e`86291b20 fffff806`86268a6a : ffff8d8f`5dcf58c0 ffff8d8f`6d7c4b70 fffff806`864e92f0 fffff806`862c933a : nt!KiRaiseSecurityCheckFailure+0x323
ffffd28e`86291cb0 fffff806`862683b4 : ffff8d8f`71d88c80 ffff8d8f`6ba0c800 00000000`00000000 fffff806`83dd26a5 : ndis!ndisFreeToNPagedPool+0x6a
ffffd28e`86291ce0 fffff806`862b5805 : 00000000`00000000 ffffd28e`86291d80 ffff8d8f`6d7c4b90 00000000`00000001 : ndis!NdisFreeNetBuffer+0xe4
ffffd28e`86291d10 fffff806`91dd6577 : ffff8d8f`6c7c5c70 00000000`00000002 ffff8d8f`6ba0c800 00000000`00000001 : ndis!NdisFreeCloneNetBufferList+0x424a5
ffffd28e`86291e40 fffff806`91dd6422 : ffff8d8f`72de6260 ffff8d8f`6abac640 ffffab81`00000000 fffff806`91dd6400 : vwififlt!FilterSendNetBufferListsCompleteLegacy+0x147
ffffd28e`86291eb0 fffff806`86265a92 : 00000000`00000000 ffff8d8f`6d531040 00000000`00000246 fffff806`83cf8651 : vwififlt!FilterSendNetBufferListsComplete+0x22
ffffd28e`86291ee0 fffff806`8627837d : ffffffff`ffffff00 ffffd28e`00000022 00000000`00000000 00000000`00000000 : ndis!ndisCallSendCompleteHandler+0x32
ffffd28e`86291f20 fffff806`83cf8598 : ffffd28e`86292099 ffff8d8f`6ba0c800 000000c0`00000000 00000000`00000000 : ndis!ndisDataPathExpandStackCallback+0x3d
ffffd28e`86291f70 fffff806`83cf850d : fffff806`86278340 ffffd28e`86292080 ffff8d8f`6a38b2c0 00000000`00000aa4 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffd28e`86291fe0 fffff806`862c933a : 00000000`00000000 00000000`000000c0 00000000`00000000 ffff8d8f`5cc02000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffd28e`86292020 fffff806`862a29e5 : ffff8d8f`6ba0c800 ffff8d8f`6ba0c800 ffff8d8f`6ff448a0 fffff806`83ec3231 : ndis!ndisInvokeNextSendCompleteHandler+0x1d2
ffffd28e`862920f0 fffff806`867e1858 : ffff8d8f`6ba0c801 ffff8d8f`6ba0c800 00000000`00000000 ffff8d8f`76fb80a1 : ndis!NdisFSendNetBufferListsComplete+0x3d405
ffffd28e`86292190 fffff806`862a1689 : ffffd28e`86292269 ffff8d8f`6ba0c800 ffff8d8f`6ff448a0 00000000`00000000 : wfplwfs!LwfLowerSendNetBufferListsComplete+0xc8
ffffd28e`862921e0 fffff806`97c5ee0d : ffff8d8f`6ba0c802 00000000`c0000001 00000000`00000000 ffff8d8f`6d7c4b90 : ndis!NdisMSendNetBufferListsComplete+0x3e779
ffffd28e`862922d0 ffff8d8f`6ba0c802 : 00000000`c0000001 00000000`00000000 ffff8d8f`6d7c4b90 ffff8d8f`72660b20 : Netwbw02+0x8ee0d
ffffd28e`862922d8 00000000`c0000001 : 00000000`00000000 ffff8d8f`6d7c4b90 ffff8d8f`72660b20 fffff806`97c633c4 : 0xffff8d8f`6ba0c802
ffffd28e`862922e0 00000000`00000000 : ffff8d8f`6d7c4b90 ffff8d8f`72660b20 fffff806`97c633c4 00000000`00005ff9 : 0xc0000001.
SYMBOL_NAME: vwififlt!FilterSendNetBufferListsCompleteLegacy+147
MODULE_NAME: vwififlt.
IMAGE_NAME: vwififlt.sys
IMAGE_VERSION: 10.0.19041.1320
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: 147.
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_vwififlt!FilterSendNetBufferListsCompleteLegacy
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {bd04991e-89f4-22cc-ae98-cb5e183876c4}
Followup: MachineOwner.
---------[/CODE]
Baktım tekrardan Intel Wi-Fi kartı kullanıyorum tüm sürücüler güncel Windows güncelleme iniyordu fazla yüklenmeden dolayı çökme durumu olabilir mi?
Şu anlık çözüldü gibi duruyor driver ve Windows kalite güncellemesi yükleyince.
Evet, çözülmeliydi zaten. Sizden ricam 2-3 gün daha sistemi test edip sonrasında mavi ekran alıp almadığınızı bildirmeniz. 3 gün içinde çözülürse konuya bunu mesaj yoluyla yazarsanız sevinirim.
Evet, çözülmeliydi zaten. sizden ricam 2-3 gün daha sistemi test edip sonrasında mavi ekran alıp almadığınızı bildirmeniz. 3 gün içinde çözülürse konuya bunu mesaj yoluyla yazarsanız sevinirim.
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.