Son olarak hızlı başlatmayı kapatın derim. Onun da rehberi aşağıda yer almaktadır. Yine alırsanız ya da almazsanız belirtirseniz sevinirim.
Microsoft'un Windows 8 ile birlikte kullanıcılara sunduÄu hızlı baÅlat özelliÄini nasıl devre dıÅı bırakacaÄınızı anlatıyoruz Windows 8 ve 8.
www.technopat.net
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff589a2414880, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff589a24147d8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8984
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 22782
Key : Analysis.Init.CPU.mSec
Value: 875
Key : Analysis.Init.Elapsed.mSec
Value: 2981
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 022222-9515-01.dmp
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff589a2414880
BUGCHECK_P3: fffff589a24147d8
BUGCHECK_P4: 0
TRAP_FRAME: fffff589a2414880 -- (.trap 0xfffff589a2414880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff868d975df038 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80413a1993d rsp=fffff589a2414a10 rbp=fffff589a2414aa1
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nt!KeWaitForSingleObject+0x20e59d:
fffff804`13a1993d cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff589a24147d8 -- (.exr 0xfffff589a24147d8)
ExceptionAddress: fffff80413a1993d (nt!KeWaitForSingleObject+0x000000000020e59d)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff589`a2414558 fffff804`13a09569 : 00000000`00000139 00000000`00000003 fffff589`a2414880 fffff589`a24147d8 : nt!KeBugCheckEx
fffff589`a2414560 fffff804`13a09990 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff589`a24146a0 fffff804`13a07d23 : fffff804`108e0100 fffff804`14326a00 ffff868d`97bb4040 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff589`a2414880 fffff804`13a1993d : 00000000`0000001a fffff589`a2414a68 00000000`00000008 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff589`a2414a10 fffff804`17fd8711 : ffff868d`975df030 fffff804`00000000 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x20e59d
fffff589`a2414b00 fffff804`17f37c27 : ffff868d`975df010 ffff868d`975df010 fffff589`a2414ba9 fffff804`17f17100 : ndis!ndisWaitForKernelObject+0x21
fffff589`a2414b40 fffff804`13955a05 : ffff868d`97bb4040 ffff868d`97bb4040 fffff804`17f17130 00000000`00000000 : ndis!ndisReceiveWorkerThread+0x20af7
fffff589`a2414c10 fffff804`139fec68 : ffffb700`b8ca2180 ffff868d`97bb4040 fffff804`139559b0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff589`a2414c60 00000000`00000000 : fffff589`a2415000 fffff589`a240f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: ndis!ndisWaitForKernelObject+21
MODULE_NAME: ndis
IMAGE_NAME: ndis.sys
IMAGE_VERSION: 10.0.19041.1173
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 21
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_ndis!ndisWaitForKernelObject
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2962b9d2-f992-275a-c6bd-ede01b778f2f}
Followup: MachineOwner
---------[/CODE]