Son kullanma tarihi geçmiş, bayatlamış bir tarayıcı kullanıyorsanız, Mercedes kullanmak yerine tosbağaya binmek gibi... Web sitelerini düzgün görüntüleyemiyorsanız eh, bi' zahmet tarayıcınızı güncelleyiniz. Modern Web standartlarını karşılayan bir tarayıcı alternatifine göz atın.
Sistemimde mavi ekran hatası yaşıyorum, daha önceden yoktu. Sorunun temelini bilmiyorum, bu sebepten Minidump dosyasını paylaşacağım. Şimdiden teşekkür ederim.
Her hatanın sebebi ve çözümü aynı değil!
RAM bellek rezalet durumda. Debugger bile 50 tane buldum dedi
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\hazar\AppData\Local\Temp\7zO0DC5AEBF\051521-6468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`10400000 PsLoadedModuleList = 0xfffff805`1102a3d0
Debug session time: Sat May 15 15:18:24.901 2021 (UTC + 3:00)
System Uptime: 6 days 21:07:39.890
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`107f5e40 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff18a`ffa2ee90=0000000000000139
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff18affa2f1b0, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff18affa2f108, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
TRAP_FRAME: fffff18affa2f1b0 -- (.trap 0xfffff18affa2f1b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8c0e0aff4000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff8c0e062048c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805108264b5 rsp=fffff18affa2f340 rbp=0000000000000000
r8=ffff8c0e062048e8 r9=0000000000000000 r10=0000000000000000
r11=0000000000000018 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!RtlpHpLfhSubsegmentFreeBlock+0x1edd65:
fffff805`108264b5 cd29 int 29h
Resetting default scope
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hataları genelde bozuk RAM kaynaklı oluyor. Bozuk bellek modüllerini tespit etmenin de ... Devamı: Memtest86 ile Bozuk RAM Testi Kaynak Technopat Devamı...
Her hatanın sebebi ve çözümü aynı değil!
RAM bellek rezalet durumda. Debugger bile 50 tane buldum dedi
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\hazar\AppData\Local\Temp\7zO0DC5AEBF\051521-6468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`10400000 PsLoadedModuleList = 0xfffff805`1102a3d0
Debug session time: Sat May 15 15:18:24.901 2021 (UTC + 3:00)
System Uptime: 6 days 21:07:39.890
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`107f5e40 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff18a`ffa2ee90=0000000000000139
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff18affa2f1b0, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff18affa2f108, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
TRAP_FRAME: fffff18affa2f1b0 -- (.trap 0xfffff18affa2f1b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8c0e0aff4000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff8c0e062048c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805108264b5 rsp=fffff18affa2f340 rbp=0000000000000000
r8=ffff8c0e062048e8 r9=0000000000000000 r10=0000000000000000
r11=0000000000000018 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!RtlpHpLfhSubsegmentFreeBlock+0x1edd65:
fffff805`108264b5 cd29 int 29h
Resetting default scope
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hataları genelde bozuk RAM kaynaklı oluyor. Bozuk bellek modüllerini tespit etmenin de ... Devamı: Memtest86 ile Bozuk RAM Testi Kaynak Technopat Devamı...
Testi başlatıyorum hocam. @KojiroHyuga04 Tüm yöntemleri denesem de dosyayı Boot edemedim, test işi yattı. RAM'lerden başka sorun gözükmüyor ise RAM'leri değiştireceğim.