Harun aslan33
Hectopat
- Katılım
- 1 Aralık 2021
- Mesajlar
- 2
Daha fazla  
				
					
						
						
							
	
		
	
		
			
			
				
			
			
		
		
	- Cinsiyet
- Erkek
************* Preparing the environment for debugger extensions gallery repositories **************
Extensionrepository : Implicit.
Useexperimentalfeaturefornugetshare : True.
Allownugetexeupdate : True.
Nonınteractivenuget : True.
Allownugetmscredentialproviderınstall : True.
Allowparallelınitializationoflocalrepositories : True.
Enableredirecttochakrajsprovider : False.
-- Configuring repositories.
----> Repository : Localınstalled, enabled: True.
----> Repository : Userextensions, enabled: True.
************* Waiting for debugger extensions gallery to ınitialize **************
----> Repository : Userextensions, enabled: True, packages count: 0
----> Repository : Localınstalled, enabled: True, packages count: 45.
Microsoft (r) Windows debugger version 10.0.27871.1001 AMD64.
Copyright (C) Microsoft Corporation. All rights reserved.
Loading dump file [C:\Users\harun\OneDrive\Desktop\072225-4781-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 26100 MP (12 procs) free X64.
Product: Winnt, Suite: Terminalserver singleuserts personal.
Edition Build lab: 26100.1.AMD64fre.ge_release.240331-1435
Kernel base = 0xfffff800`8ce00000 psloadedmodulelist = 0xfffff800`8dcf4c40
Debug session time: Tue jul 22 16:34:21.365 2025 (utc + 3:00)
System uptime: 0 days 2:34:10.104
Loading kernel symbols.
...............................................................
................................................................
.........................................................
Loading user symbols.
Unable to read ldr_data_table_entry at 00000136'8E1055E0 - Win32 error 0N30.
Loading unloaded module list.
.........
Warnıng: .reload failed, module list may be incomplete.
For analysis of this file, run !analyze -v
NT!kebugcheckex:
Fffff800'8D3005D0 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffff887'C76D8280 = 0000000000000139.
3: Kd> !analyze -v
Loading kernel symbols.
...............................................................
................................................................
.........................................................
Loading user symbols.
Unable to read ldr_data_table_entry at 00000136'8E1055E0 - Win32 error 0N30.
Loading unloaded module list.
.........
Warnıng: .reload failed, module list may be incomplete.
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
Could potentially allow a malicious user to gain Control of this machine.
Arguments:
Arg1: 0000000000000003, a lıst_entry has been corrupted (i.e. Double remove).
Arg2: FffFF887C76D85a0, address of the trap frame for the exception that caused the bugcheck.
Arg3: FffFF887C76D84F8, address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, reserved.
Debugging details:
------------------
Key_values_strıng: 1
Key : Analysis.CPU.msec
Value: 2078.
Key : Analysis.elapsed.msec
Value: 5760.
Key : Analysis.I:Xther.MB
Value: 0
Key : Analysis.IO.read.MB
Value: 1
Key : Analysis.IO.write.MB
Value: 0
Key : Analysis.ınit.CPU.msec
Value: 609.
Key : Analysis.ınit.elapsed.msec
Value: 4435.
Key : Analysis.Memory.commitpeak.MB
Value: 107.
Key : Analysis.version.dbgeng
Value: 10.0.27871.1001
Key : Analysis.version.description
Value: 10.2505.01.02 AMD64fre.
Key : Analysis.version.ext
Value: 1.2505.1.2
Key : Bugcheck.code.legacyapı
Value: 0x139.
Key : Bugcheck.code.targetmodel
Value: 0x139.
Key : Failfast.name
Value: Corrupt_lıst_entry.
Key : Failfast.type
Value: 3
Key : Failure.bucket
Value: 0x139_3_corrupt_lıst_entry_nt!kifastfaildispatch
Key : Failure.exception.code
Value: 0xc0000409.
Key : Failure.exception.record
Value: 0xfffff887c76d84f8.
Key : Failure.hash
Value: {3aede96A-54DD-40D6-D4CB-2A161A843851}
Key : Wer.OS.branch
Value: Ge_release.
Key : Wer.OS.version
Value: 10.0.26100.1
Bugcheck_code: 139.
Bugcheck_p1: 3
Bugcheck_p2: FffFF887C76D85a0.
Bugcheck_p3: FffFF887C76D84F8.
Bugcheck_p4: 0
Fıle_ın_cab: 072225-4781-01.dmp
Faultıng_thread: FffFA888DA5D30C0.
Trap_frame: FffFF887C76D85a0 -- (.trap 0xfffff887c76d85a0)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = FFFFA888D2BB4158 rbx = 0000000000000000 rcx = 0000000000000003.
Rdx = FFFFA888D7488158 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = FFFFF8008D160D28 rsp = FFFFF887C76D8730 rbp = fffFA888D2Bb41C0.
R8 = fffFA888C914cca0 R9 = fffFA888DA5D30C0 R10 = fffFA888DA5D39e0.
R11 = fffFA888DA5D30C0 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei pl nz AC pe NC.
NT!kiwakequeuewaiter+0x58:
Fffff800'8D160D28 CD29 int 29h.
Resetting default scope.
Exceptıon_record: FffFF887C76D84F8 -- (.exr 0xfffff887c76d84f8)
Exceptionaddress: FFFFF8008D160D28 (NT!kiwakequeuewaiter+0x0000000000000058)
Exceptioncode: C0000409 (Security check failure or stack buffer overrun)
Exceptionflags: 00000001.
Numberparameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 fast_faıl_corrupt_lıst_entry
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: svchost.exe
Error_code: (ntstatus) 0xc0000409 - sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan C n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
Exceptıon_code_str: C0000409.
Exceptıon_parameter1: 0000000000000003.
Exceptıon_str: 0xc0000409.
Stack_text:
Fffff887'C76D8278 fffff800'8D4b96e9 : 00000000'00000139 00000000'00000003 fffff887'C76D85a0 fffff887'C76D84F8 : NT!kebugcheckex
Fffff887'C76D8280 fffff800'8D4b9CF2 : Ffff808e'00000001 00000000'00000000 00000000'00000000 7fffffff'00008810 : NT!kibugcheckdispatch+0x69
Fffff887'C76D83C0 fffff800'8D4b7928 : Ffff808e'49282A40 ffffa888'D0deb090 7fffffff'fffffffc 00000000'00000000 : NT!kifastfaildispatch+0xb2
Fffff887'C76D85a0 fffff800'8D160D28 : Ffffa888'C914CCA0 fffff800'8D123F41 ffffa888'D0deb1F0 ffffa888'D0deb090 : NT!kiraisesecuritycheckfailure+0x368
Fffff887'C76D8730 fffff800'8D1611AB : 00000000'00000000 ffffd001'ecd61180 fffff887'C76D8900 00000000'00000000 : NT!kiwakequeuewaiter+0x58
Fffff887'C76D8780 fffff800'8D6D4048 : 00000000'00000000 ffffa888'DA5D35D8 00000000'00020000 ffffb1e6'F4e7F15D : NT!alpcpsignalandwait+0x1fb
Fffff887'C76D8820 fffff800'8D7e2290 : 00000000'00000157 00000000'00020000 ffffa888'D234ADF0 ffffa888'D234ADF0 : NT!alpcpreceivesynchronousreply+0x58
Fffff887'C76D8880 fffff800'8D65518E : Ffffa888'D234ADF0 00000000'00020000 00000136'8E8b6280 00000136'8E993BC8 : NT!alpcpprocesssynchronousrequest+0x2D0
Fffff887'C76D89a0 fffff800'8D4b8D58 : Fffff887'C76D8b60 ffffa888'DA5D30C0 00000022'6F87C698 00000022'6F87D248 : NT!ntalpcsendwaitreceiveport+0x1FE
Fffff887'C76D8A70 00007FF9'DF202F84 : 00007FF9'def81344 00000022'6F87C780 00000022'6F87CB70 00000000'00000000 : NT!kisystemservicecopyend+0x28
00000022'6F87C678 00007FF9'def81344 : 00000022'6F87C780 00000022'6F87CB70 00000000'00000000 00000022'6F87C7A0 : 0x00007ff9`df202f84
00000022'6F87C680 00000022'6F87C780 : 00000022'6F87CB70 00000000'00000000 00000022'6F87C7A0 00000136'8E8b6280 : 0x00007ff9`def81344
00000022'6F87C688 00000022'6F87CB70 : 00000000'00000000 00000022'6F87C7A0 00000136'8E8b6280 00000022'6F87C6E8 : 0x00000022`6f87c780
00000022'6F87C690 00000000'00000000 : 00000022'6F87C7A0 00000136'8E8b6280 00000022'6F87C6E8 00000136'8E993BC8 : 0x00000022`6f87cb70
Symbol_name: NT!kifastfaildispatch+b2
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.26100.4652
Stack_command: .process /r /p 0xffffa888d21f1080; .thread 0xffffa888da5d30c0 ; KB.
Bucket_ıd_func_offset: B2.
Faılure_bucket_ıd: 0x139_3_corrupt_lıst_entry_nt!kifastfaildispatch
Os_versıon: 10.0.26100.1
Buıldlab_str: Ge_release.
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {3aede96A-54DD-40D6-D4CB-2A161A843851}
Followup: Machineowner.
Minidump bu, ekran kartı RTX 4060 daha önce nvlddmkm.sys hatasından mavi ekran alıyordum şimdi de bu çıktı. Sistem Ryzen 5 2600 8x2 16 GB 3200 MHz RAM XPG B450 Aorus Elite anakart galac RTX 4060, işlemci odaklı oyun oynadığım için darboğaz sorunum yok. Yardımcı olur musunuz?
	
		
			
		
		
	
				
			Extensionrepository : Implicit.
Useexperimentalfeaturefornugetshare : True.
Allownugetexeupdate : True.
Nonınteractivenuget : True.
Allownugetmscredentialproviderınstall : True.
Allowparallelınitializationoflocalrepositories : True.
Enableredirecttochakrajsprovider : False.
-- Configuring repositories.
----> Repository : Localınstalled, enabled: True.
----> Repository : Userextensions, enabled: True.
>>>>>>>>>>> Preparing the environment for debugger extensions gallery repositories completed, duration 0.000 seconds.
************* Waiting for debugger extensions gallery to ınitialize **************
>>>>>>>>>>> Waiting for debugger extensions gallery to ınitialize completed, duration 0.344 seconds.
----> Repository : Userextensions, enabled: True, packages count: 0
----> Repository : Localınstalled, enabled: True, packages count: 45.
Microsoft (r) Windows debugger version 10.0.27871.1001 AMD64.
Copyright (C) Microsoft Corporation. All rights reserved.
Loading dump file [C:\Users\harun\OneDrive\Desktop\072225-4781-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 26100 MP (12 procs) free X64.
Product: Winnt, Suite: Terminalserver singleuserts personal.
Edition Build lab: 26100.1.AMD64fre.ge_release.240331-1435
Kernel base = 0xfffff800`8ce00000 psloadedmodulelist = 0xfffff800`8dcf4c40
Debug session time: Tue jul 22 16:34:21.365 2025 (utc + 3:00)
System uptime: 0 days 2:34:10.104
Loading kernel symbols.
...............................................................
................................................................
.........................................................
Loading user symbols.
Unable to read ldr_data_table_entry at 00000136'8E1055E0 - Win32 error 0N30.
Loading unloaded module list.
.........
Warnıng: .reload failed, module list may be incomplete.
For analysis of this file, run !analyze -v
NT!kebugcheckex:
Fffff800'8D3005D0 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffff887'C76D8280 = 0000000000000139.
3: Kd> !analyze -v
Loading kernel symbols.
...............................................................
................................................................
.........................................................
Loading user symbols.
Unable to read ldr_data_table_entry at 00000136'8E1055E0 - Win32 error 0N30.
Loading unloaded module list.
.........
Warnıng: .reload failed, module list may be incomplete.
*******************************************************************************
- *
- Bugcheck analysis *
- *
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
Could potentially allow a malicious user to gain Control of this machine.
Arguments:
Arg1: 0000000000000003, a lıst_entry has been corrupted (i.e. Double remove).
Arg2: FffFF887C76D85a0, address of the trap frame for the exception that caused the bugcheck.
Arg3: FffFF887C76D84F8, address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, reserved.
Debugging details:
------------------
Key_values_strıng: 1
Key : Analysis.CPU.msec
Value: 2078.
Key : Analysis.elapsed.msec
Value: 5760.
Key : Analysis.I:Xther.MB
Value: 0
Key : Analysis.IO.read.MB
Value: 1
Key : Analysis.IO.write.MB
Value: 0
Key : Analysis.ınit.CPU.msec
Value: 609.
Key : Analysis.ınit.elapsed.msec
Value: 4435.
Key : Analysis.Memory.commitpeak.MB
Value: 107.
Key : Analysis.version.dbgeng
Value: 10.0.27871.1001
Key : Analysis.version.description
Value: 10.2505.01.02 AMD64fre.
Key : Analysis.version.ext
Value: 1.2505.1.2
Key : Bugcheck.code.legacyapı
Value: 0x139.
Key : Bugcheck.code.targetmodel
Value: 0x139.
Key : Failfast.name
Value: Corrupt_lıst_entry.
Key : Failfast.type
Value: 3
Key : Failure.bucket
Value: 0x139_3_corrupt_lıst_entry_nt!kifastfaildispatch
Key : Failure.exception.code
Value: 0xc0000409.
Key : Failure.exception.record
Value: 0xfffff887c76d84f8.
Key : Failure.hash
Value: {3aede96A-54DD-40D6-D4CB-2A161A843851}
Key : Wer.OS.branch
Value: Ge_release.
Key : Wer.OS.version
Value: 10.0.26100.1
Bugcheck_code: 139.
Bugcheck_p1: 3
Bugcheck_p2: FffFF887C76D85a0.
Bugcheck_p3: FffFF887C76D84F8.
Bugcheck_p4: 0
Fıle_ın_cab: 072225-4781-01.dmp
Faultıng_thread: FffFA888DA5D30C0.
Trap_frame: FffFF887C76D85a0 -- (.trap 0xfffff887c76d85a0)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = FFFFA888D2BB4158 rbx = 0000000000000000 rcx = 0000000000000003.
Rdx = FFFFA888D7488158 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = FFFFF8008D160D28 rsp = FFFFF887C76D8730 rbp = fffFA888D2Bb41C0.
R8 = fffFA888C914cca0 R9 = fffFA888DA5D30C0 R10 = fffFA888DA5D39e0.
R11 = fffFA888DA5D30C0 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei pl nz AC pe NC.
NT!kiwakequeuewaiter+0x58:
Fffff800'8D160D28 CD29 int 29h.
Resetting default scope.
Exceptıon_record: FffFF887C76D84F8 -- (.exr 0xfffff887c76d84f8)
Exceptionaddress: FFFFF8008D160D28 (NT!kiwakequeuewaiter+0x0000000000000058)
Exceptioncode: C0000409 (Security check failure or stack buffer overrun)
Exceptionflags: 00000001.
Numberparameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 fast_faıl_corrupt_lıst_entry
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: svchost.exe
Error_code: (ntstatus) 0xc0000409 - sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan C n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
Exceptıon_code_str: C0000409.
Exceptıon_parameter1: 0000000000000003.
Exceptıon_str: 0xc0000409.
Stack_text:
Fffff887'C76D8278 fffff800'8D4b96e9 : 00000000'00000139 00000000'00000003 fffff887'C76D85a0 fffff887'C76D84F8 : NT!kebugcheckex
Fffff887'C76D8280 fffff800'8D4b9CF2 : Ffff808e'00000001 00000000'00000000 00000000'00000000 7fffffff'00008810 : NT!kibugcheckdispatch+0x69
Fffff887'C76D83C0 fffff800'8D4b7928 : Ffff808e'49282A40 ffffa888'D0deb090 7fffffff'fffffffc 00000000'00000000 : NT!kifastfaildispatch+0xb2
Fffff887'C76D85a0 fffff800'8D160D28 : Ffffa888'C914CCA0 fffff800'8D123F41 ffffa888'D0deb1F0 ffffa888'D0deb090 : NT!kiraisesecuritycheckfailure+0x368
Fffff887'C76D8730 fffff800'8D1611AB : 00000000'00000000 ffffd001'ecd61180 fffff887'C76D8900 00000000'00000000 : NT!kiwakequeuewaiter+0x58
Fffff887'C76D8780 fffff800'8D6D4048 : 00000000'00000000 ffffa888'DA5D35D8 00000000'00020000 ffffb1e6'F4e7F15D : NT!alpcpsignalandwait+0x1fb
Fffff887'C76D8820 fffff800'8D7e2290 : 00000000'00000157 00000000'00020000 ffffa888'D234ADF0 ffffa888'D234ADF0 : NT!alpcpreceivesynchronousreply+0x58
Fffff887'C76D8880 fffff800'8D65518E : Ffffa888'D234ADF0 00000000'00020000 00000136'8E8b6280 00000136'8E993BC8 : NT!alpcpprocesssynchronousrequest+0x2D0
Fffff887'C76D89a0 fffff800'8D4b8D58 : Fffff887'C76D8b60 ffffa888'DA5D30C0 00000022'6F87C698 00000022'6F87D248 : NT!ntalpcsendwaitreceiveport+0x1FE
Fffff887'C76D8A70 00007FF9'DF202F84 : 00007FF9'def81344 00000022'6F87C780 00000022'6F87CB70 00000000'00000000 : NT!kisystemservicecopyend+0x28
00000022'6F87C678 00007FF9'def81344 : 00000022'6F87C780 00000022'6F87CB70 00000000'00000000 00000022'6F87C7A0 : 0x00007ff9`df202f84
00000022'6F87C680 00000022'6F87C780 : 00000022'6F87CB70 00000000'00000000 00000022'6F87C7A0 00000136'8E8b6280 : 0x00007ff9`def81344
00000022'6F87C688 00000022'6F87CB70 : 00000000'00000000 00000022'6F87C7A0 00000136'8E8b6280 00000022'6F87C6E8 : 0x00000022`6f87c780
00000022'6F87C690 00000000'00000000 : 00000022'6F87C7A0 00000136'8E8b6280 00000022'6F87C6E8 00000136'8E993BC8 : 0x00000022`6f87cb70
Symbol_name: NT!kifastfaildispatch+b2
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.26100.4652
Stack_command: .process /r /p 0xffffa888d21f1080; .thread 0xffffa888da5d30c0 ; KB.
Bucket_ıd_func_offset: B2.
Faılure_bucket_ıd: 0x139_3_corrupt_lıst_entry_nt!kifastfaildispatch
Os_versıon: 10.0.26100.1
Buıldlab_str: Ge_release.
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {3aede96A-54DD-40D6-D4CB-2A161A843851}
Followup: Machineowner.
Minidump bu, ekran kartı RTX 4060 daha önce nvlddmkm.sys hatasından mavi ekran alıyordum şimdi de bu çıktı. Sistem Ryzen 5 2600 8x2 16 GB 3200 MHz RAM XPG B450 Aorus Elite anakart galac RTX 4060, işlemci odaklı oyun oynadığım için darboğaz sorunum yok. Yardımcı olur musunuz?
 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		