LM3O4LKAD3
Öğrenci
- Katılım
- 4 Haziran 2020
- Mesajlar
- 46
- Reaksiyon puanı
- 26
- Puanları
- 18
- Yaş
- 24
Arkadaşlar bu anakartla ram uyumlu ram kutusunun üzerinde intel yazıyor acaba o yüzden mi mavi ekran alıyorum bilen varsa yazsın lütfen ryzen 5 2600 işlemci kullanıyorum.
Microsoft (R) Windows Debugger Version 10.0.19041.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows.old\Windows\minidump\071020-5718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff806`26200000 PsLoadedModuleList = 0xfffff806`26648210
Debug session time: Fri Jul 10 08:41:05.389 2020 (UTC + 3:00)
System Uptime: 0 days 16:31:06.062
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
................................
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: fffff80629c67770, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80629c676c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-R0U6OFQ
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: fffff80629c67770
BUGCHECK_P3: fffff80629c676c8
BUGCHECK_P4: 0
TRAP_FRAME: fffff80629c67770 -- (.trap 0xfffff80629c67770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff8c81ef74de40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806263fa945 rsp=fffff80629c67908 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=ffff8c81ed77d4c0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!RtlRbRemoveNode+0x1b6345:
fffff806`263fa945 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff80629c676c8 -- (.exr 0xfffff80629c676c8)
ExceptionAddress: fffff806263fa945 (nt!RtlRbRemoveNode+0x00000000001b6345)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff806`29c67448 fffff806`263d30e9 : 00000000`00000139 00000000`0000001d fffff806`29c67770 fffff806`29c676c8 : nt!KeBugCheckEx
fffff806`29c67450 fffff806`263d3510 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff806`29c67590 fffff806`263d18a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff806`29c67770 fffff806`263fa945 : 00000000`00000048 ffff8c81`eee34e28 fffff806`26268452 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
fffff806`29c67908 fffff806`26268452 : 00000000`00000000 ffff8c81`eee34eaa 00000000`00000000 fffff806`2664fa40 : nt!RtlRbRemoveNode+0x1b6345
fffff806`29c67920 fffff806`26268965 : ffff8c81`eee34e40 ffff8c81`eee34e40 00000000`00000000 00000000`00000000 : nt!KiRemoveTimer2+0x92
fffff806`29c67970 fffff806`2626a9b7 : 00000000`0000000c 00000000`00989680 fffff806`29c67b30 00000000`0000003a : nt!KiTimer2Expiration+0x205
fffff806`29c67a30 fffff806`263c4d64 : 00000000`00000000 fffff806`22568180 fffff806`26791400 ffff8c81`f49c9080 : nt!KiRetireDpcList+0x6c7
fffff806`29c67c60 00000000`00000000 : fffff806`29c68000 fffff806`29c62000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {67ec97ad-ad0b-071e-ab87-6dc661e22d1b}
Followup: MachineOwner
---------
B450M S2H (rev. 1.x) Key Features | Motherboard - GIGABYTE Global
Lasting Quality from GIGABYTE.GIGABYTE Ultra Durable™ motherboards bring together a unique blend of features and technologies that offer users the absolute ...
www.gigabyte.com
Kingston HyperX Fury 8GB DDR4 3200MHz Ram HX432C18FB2/8 Fiyatı
Kingston HyperX Fury 8GB DDR4 3200MHz Ram HX432C18FB2/8 en iyi fiyatla Hepsiburada'dan satın alın! Şimdi indirimli fiyatla sipariş verin, ayağınıza gelsin!
www.hepsiburada.com
Mesaj otomatik birleştirildi:
Microsoft (R) Windows Debugger Version 10.0.19041.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows.old\Windows\minidump\071020-5718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff806`26200000 PsLoadedModuleList = 0xfffff806`26648210
Debug session time: Fri Jul 10 08:41:05.389 2020 (UTC + 3:00)
System Uptime: 0 days 16:31:06.062
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
................................
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: fffff80629c67770, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80629c676c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-R0U6OFQ
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: fffff80629c67770
BUGCHECK_P3: fffff80629c676c8
BUGCHECK_P4: 0
TRAP_FRAME: fffff80629c67770 -- (.trap 0xfffff80629c67770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff8c81ef74de40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806263fa945 rsp=fffff80629c67908 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=ffff8c81ed77d4c0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!RtlRbRemoveNode+0x1b6345:
fffff806`263fa945 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff80629c676c8 -- (.exr 0xfffff80629c676c8)
ExceptionAddress: fffff806263fa945 (nt!RtlRbRemoveNode+0x00000000001b6345)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff806`29c67448 fffff806`263d30e9 : 00000000`00000139 00000000`0000001d fffff806`29c67770 fffff806`29c676c8 : nt!KeBugCheckEx
fffff806`29c67450 fffff806`263d3510 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff806`29c67590 fffff806`263d18a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff806`29c67770 fffff806`263fa945 : 00000000`00000048 ffff8c81`eee34e28 fffff806`26268452 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
fffff806`29c67908 fffff806`26268452 : 00000000`00000000 ffff8c81`eee34eaa 00000000`00000000 fffff806`2664fa40 : nt!RtlRbRemoveNode+0x1b6345
fffff806`29c67920 fffff806`26268965 : ffff8c81`eee34e40 ffff8c81`eee34e40 00000000`00000000 00000000`00000000 : nt!KiRemoveTimer2+0x92
fffff806`29c67970 fffff806`2626a9b7 : 00000000`0000000c 00000000`00989680 fffff806`29c67b30 00000000`0000003a : nt!KiTimer2Expiration+0x205
fffff806`29c67a30 fffff806`263c4d64 : 00000000`00000000 fffff806`22568180 fffff806`26791400 ffff8c81`f49c9080 : nt!KiRetireDpcList+0x6c7
fffff806`29c67c60 00000000`00000000 : fffff806`29c68000 fffff806`29c62000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {67ec97ad-ad0b-071e-ab87-6dc661e22d1b}
Followup: MachineOwner
---------