start end module name
fffff801`445f0000 fffff801`445fd000 amdgpio2 (deferred)
Image path: \SystemRoot\System32\drivers\amdgpio2.sys
Image name: amdgpio2.sys
Browse all global symbols functions data
Timestamp: Wed Mar 11 14:15:48 2020 (5E68C864)
CheckSum: 0001C48D
ImageSize: 0000D000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
start end module name
fffff801`443a0000 fffff801`4444f000 UcmCxUcsiNvppc (deferred)
Image path: \SystemRoot\System32\DriverStore\FileRepository\nvppc.inf_amd64_b9ce8a54d5a31e95\UcmCxUcsiNvppc.sys
Image name: UcmCxUcsiNvppc.sys
Browse all global symbols functions data
Timestamp: Thu Apr 28 21:36:36 2022 (626ADEB4)
CheckSum: 000B7812
ImageSize: 000AF000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
chkdsk /f /r
komutunu girin. %100 olmasını bekleyin. Ardından bir soru çıkacak ona " Y " ile onay verin ve PC yeniden başlatın ilk açılış uzun sürecektir bir tarama gerçekleştirecek SSD varsa genellikle 5 dakikayı geçmez.2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb60a0ecff250, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffb60a0ecff1a8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3765
Key : Analysis.Elapsed.mSec
Value: 17634
Key : Analysis.IO.Other.Mb
Value: 3
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 4
Key : Analysis.Init.CPU.mSec
Value: 389
Key : Analysis.Init.Elapsed.mSec
Value: 6125
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
Key : Failure.Hash
Value: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffb60a0ecff250
BUGCHECK_P3: ffffb60a0ecff1a8
BUGCHECK_P4: 0
FILE_IN_CAB: 070723-9281-01.dmp
TRAP_FRAME: ffffb60a0ecff250 -- (.trap 0xffffb60a0ecff250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa30cd913e738 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa30cd913e748 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801203d8773 rsp=ffffb60a0ecff3e0 rbp=0000000000000705
r8=ffffb60a0ecff3f0 r9=0000000000000000 r10=fffff801203d8660
r11=ffffb60a0ecff410 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!FsRtlTeardownPerStreamContexts+0x113:
fffff801`203d8773 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffb60a0ecff1a8 -- (.exr 0xffffb60a0ecff1a8)
ExceptionAddress: fffff801203d8773 (nt!FsRtlTeardownPerStreamContexts+0x0000000000000113)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffb60a`0ecfef28 fffff801`20210029 : 00000000`00000139 00000000`00000003 ffffb60a`0ecff250 ffffb60a`0ecff1a8 : nt!KeBugCheckEx
ffffb60a`0ecfef30 fffff801`20210590 : ffffcb04`19f87d70 ffffb60a`0ecff139 ffff941a`9fa302ed ffffb60a`0ecff210 : nt!KiBugCheckDispatch+0x69
ffffb60a`0ecff070 fffff801`2020e55d : 00000000`00000003 00000000`6f725346 00000000`000000b0 00000000`00000e0b : nt!KiFastFailDispatch+0xd0
ffffb60a`0ecff250 fffff801`203d8773 : ffffa30c`d913e738 fffff801`00000000 00000000`00000000 ffffb60a`0ecff8b0 : nt!KiRaiseSecurityCheckFailure+0x31d
ffffb60a`0ecff3e0 fffff801`2373376b : ffffa30c`d913e700 ffffb60a`0ecff528 ffffb60a`0ecff8b0 00000000`00000705 : nt!FsRtlTeardownPerStreamContexts+0x113
ffffb60a`0ecff420 fffff801`237334f6 : ffffa30c`d913e700 025000a0`0ecff8b0 ffffcb04`00000000 ffffa30c`00000000 : Ntfs!NtfsDeleteScb+0x17b
ffffb60a`0ecff4c0 fffff801`236197b5 : ffffa30c`79a00100 ffffa30c`d913e700 ffffa30c`79a00340 fffff801`200223ff : Ntfs!NtfsRemoveScb+0x66
ffffb60a`0ecff520 fffff801`2373328c : ffffb60a`0ecff8b0 00000000`00000000 ffffa30c`d913e5a0 ffffcb04`10168100 : Ntfs!NtfsPrepareFcbForRemoval+0x75
ffffb60a`0ecff560 fffff801`23618f76 : ffffb60a`0ecff8b0 ffffa30c`d913e700 ffffa30c`d913e9f8 ffffa30c`d913e5a0 : Ntfs!NtfsTeardownStructures+0x9c
ffffb60a`0ecff5e0 fffff801`236f56c2 : ffffb60a`0ecff8b0 fffff801`2370a150 00000000`00000000 ffffa30c`d913e500 : Ntfs!NtfsDecrementCloseCounts+0xf6
ffffb60a`0ecff640 fffff801`2370b4f4 : ffffb60a`0ecff8b0 ffffa30c`d913e700 ffffa30c`d913e5a0 ffffcb04`10168180 : Ntfs!NtfsCommonClose+0xac2
ffffb60a`0ecff710 fffff801`2370a1d8 : 00000000`0000001c fffff801`20b25440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x244
ffffb60a`0ecff870 fffff801`2008e5c5 : ffffcb04`169ce040 fffff801`2370a150 ffffcb04`0b0e3c70 ffffcb04`00000000 : Ntfs!NtfsFspClose+0x88
ffffb60a`0ecffb30 fffff801`201268f5 : ffffcb04`169ce040 00000000`00000080 ffffcb04`0b0cf200 ffffcb04`1f247178 : nt!ExpWorkerThread+0x105
ffffb60a`0ecffbd0 fffff801`20204c68 : ffffe000`5d443180 ffffcb04`169ce040 fffff801`201268a0 ffffcb04`1aa6d700 : nt!PspSystemThreadStartup+0x55
ffffb60a`0ecffc20 00000000`00000000 : ffffb60a`0ed00000 ffffb60a`0ecf9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3086
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
Müsait bir zamanda paylaşacağım, yardımınız için teşekkürler.BIOS güncel lakin chipset ve Realtek Ethernet sürücüsü güncel değil.
Chipset sürücüsünü Denetim Masası'ndan kaldırın en güncel sürücüyü yükleyin.
Kod:start end module name fffff801`445f0000 fffff801`445fd000 amdgpio2 (deferred) Image path: \SystemRoot\System32\drivers\amdgpio2.sys Image name: amdgpio2.sys Browse all global symbols functions data Timestamp: Wed Mar 11 14:15:48 2020 (5E68C864) CheckSum: 0001C48D ImageSize: 0000D000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Realtek sürücüsünü güncelleyin.
Kod:start end module name fffff801`443a0000 fffff801`4444f000 UcmCxUcsiNvppc (deferred) Image path: \SystemRoot\System32\DriverStore\FileRepository\nvppc.inf_amd64_b9ce8a54d5a31e95\UcmCxUcsiNvppc.sys Image name: UcmCxUcsiNvppc.sys Browse all global symbols functions data Timestamp: Thu Apr 28 21:36:36 2022 (626ADEB4) CheckSum: 000B7812 ImageSize: 000AF000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Sorunun kaynağının SSD veya HDD olduğunu düşünüyorum.
CMD yönetici olarak çalıştırıpchkdsk /f /r
komutunu girin. %100 olmasını bekleyin. Ardından bir soru çıkacak ona " Y " ile onay verin ve PC yeniden başlatın ilk açılış uzun sürecektir bir tarama gerçekleştirecek SSD varsa genellikle 5 dakikayı geçmez.
F kısmı düzeltmeyi ve r kısmı Bad Sector taraması yapar.
Son olarak disk testi yapıp sonuçları buraya gönderin.
Disk testi yapmak
Sizden disk testi istediğim zaman bu rehbere göre disk testi yapıp sonucu gönderebilirsiniz. SSD için aşağıdaki 2 aracı kullanın. https://www.hdsentinel.com/ > Sağlık durumunu gönderin. https://www.guru3d.com/files-details/as-ssd-benchmark.html > Okuma yazma hızını gönderin. HDD için ise health...www.technopat.net
Kod:2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: ffffb60a0ecff250, Address of the trap frame for the exception that caused the BugCheck Arg3: ffffb60a0ecff1a8, Address of the exception record for the exception that caused the BugCheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3765 Key : Analysis.Elapsed.mSec Value: 17634 Key : Analysis.IO.Other.Mb Value: 3 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 4 Key : Analysis.Init.CPU.mSec Value: 389 Key : Analysis.Init.Elapsed.mSec Value: 6125 Key : Analysis.Memory.CommitPeak.Mb Value: 95 Key : Bugcheck.Code.LegacyAPI Value: 0x139 Key : FailFast.Name Value: CORRUPT_LIST_ENTRY Key : FailFast.Type Value: 3 Key : Failure.Bucket Value: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch Key : Failure.Hash Value: {3aede96a-54dd-40d6-d4cb-2a161a843851} Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 139 BUGCHECK_P1: 3 BUGCHECK_P2: ffffb60a0ecff250 BUGCHECK_P3: ffffb60a0ecff1a8 BUGCHECK_P4: 0 FILE_IN_CAB: 070723-9281-01.dmp TRAP_FRAME: ffffb60a0ecff250 -- (.trap 0xffffb60a0ecff250) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffa30cd913e738 rbx=0000000000000000 rcx=0000000000000003 rdx=ffffa30cd913e748 rsi=0000000000000000 rdi=0000000000000000 rip=fffff801203d8773 rsp=ffffb60a0ecff3e0 rbp=0000000000000705 r8=ffffb60a0ecff3f0 r9=0000000000000000 r10=fffff801203d8660 r11=ffffb60a0ecff410 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!FsRtlTeardownPerStreamContexts+0x113: fffff801`203d8773 cd29 int 29h Resetting default scope EXCEPTION_RECORD: ffffb60a0ecff1a8 -- (.exr 0xffffb60a0ecff1a8) ExceptionAddress: fffff801203d8773 (nt!FsRtlTeardownPerStreamContexts+0x0000000000000113) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000003 Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000003 EXCEPTION_STR: 0xc0000409 STACK_TEXT: ffffb60a`0ecfef28 fffff801`20210029 : 00000000`00000139 00000000`00000003 ffffb60a`0ecff250 ffffb60a`0ecff1a8 : nt!KeBugCheckEx ffffb60a`0ecfef30 fffff801`20210590 : ffffcb04`19f87d70 ffffb60a`0ecff139 ffff941a`9fa302ed ffffb60a`0ecff210 : nt!KiBugCheckDispatch+0x69 ffffb60a`0ecff070 fffff801`2020e55d : 00000000`00000003 00000000`6f725346 00000000`000000b0 00000000`00000e0b : nt!KiFastFailDispatch+0xd0 ffffb60a`0ecff250 fffff801`203d8773 : ffffa30c`d913e738 fffff801`00000000 00000000`00000000 ffffb60a`0ecff8b0 : nt!KiRaiseSecurityCheckFailure+0x31d ffffb60a`0ecff3e0 fffff801`2373376b : ffffa30c`d913e700 ffffb60a`0ecff528 ffffb60a`0ecff8b0 00000000`00000705 : nt!FsRtlTeardownPerStreamContexts+0x113 ffffb60a`0ecff420 fffff801`237334f6 : ffffa30c`d913e700 025000a0`0ecff8b0 ffffcb04`00000000 ffffa30c`00000000 : Ntfs!NtfsDeleteScb+0x17b ffffb60a`0ecff4c0 fffff801`236197b5 : ffffa30c`79a00100 ffffa30c`d913e700 ffffa30c`79a00340 fffff801`200223ff : Ntfs!NtfsRemoveScb+0x66 ffffb60a`0ecff520 fffff801`2373328c : ffffb60a`0ecff8b0 00000000`00000000 ffffa30c`d913e5a0 ffffcb04`10168100 : Ntfs!NtfsPrepareFcbForRemoval+0x75 ffffb60a`0ecff560 fffff801`23618f76 : ffffb60a`0ecff8b0 ffffa30c`d913e700 ffffa30c`d913e9f8 ffffa30c`d913e5a0 : Ntfs!NtfsTeardownStructures+0x9c ffffb60a`0ecff5e0 fffff801`236f56c2 : ffffb60a`0ecff8b0 fffff801`2370a150 00000000`00000000 ffffa30c`d913e500 : Ntfs!NtfsDecrementCloseCounts+0xf6 ffffb60a`0ecff640 fffff801`2370b4f4 : ffffb60a`0ecff8b0 ffffa30c`d913e700 ffffa30c`d913e5a0 ffffcb04`10168180 : Ntfs!NtfsCommonClose+0xac2 ffffb60a`0ecff710 fffff801`2370a1d8 : 00000000`0000001c fffff801`20b25440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x244 ffffb60a`0ecff870 fffff801`2008e5c5 : ffffcb04`169ce040 fffff801`2370a150 ffffcb04`0b0e3c70 ffffcb04`00000000 : Ntfs!NtfsFspClose+0x88 ffffb60a`0ecffb30 fffff801`201268f5 : ffffcb04`169ce040 00000000`00000080 ffffcb04`0b0cf200 ffffcb04`1f247178 : nt!ExpWorkerThread+0x105 ffffb60a`0ecffbd0 fffff801`20204c68 : ffffe000`5d443180 ffffcb04`169ce040 fffff801`201268a0 ffffcb04`1aa6d700 : nt!PspSystemThreadStartup+0x55 ffffb60a`0ecffc20 00000000`00000000 : ffffb60a`0ed00000 ffffb60a`0ecf9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: nt!KiFastFailDispatch+d0 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.3086 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: d0 FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851} Followup: MachineOwner ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.