ElivdGeest
Gebruiker
- Lid geworden
- 5 mei 2015
- Berichten
- 282
ok stuur ik hem nu op....
Bekijk de onderstaande video om te zien hoe je onze site als een web app op je startscherm installeert.
Opmerking: Deze functie is mogelijk niet beschikbaar in sommige browsers.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {3, ffffd0007345f5d0, ffffd0007345f528, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiFastFailDispatch+d0 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd0007345f5d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd0007345f528, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8025c3e1de9 to fffff8025c3d62a0
STACK_TEXT:
ffffd000`7345f2a8 fffff802`5c3e1de9 : 00000000`00000139 00000000`00000003 ffffd000`7345f5d0 ffffd000`7345f528 : nt!KeBugCheckEx
ffffd000`7345f2b0 fffff802`5c3e2110 : 00000000`00000000 fffff6e0`002f32e9 ffffe001`775748c0 ffffe001`80461880 : nt!KiBugCheckDispatch+0x69
ffffd000`7345f3f0 fffff802`5c3e1334 : ffffc000`5e5c9000 fffff802`5c30fa8a ffffc000`5e5c9000 fffff802`5c548e00 : nt!KiFastFailDispatch+0xd0
ffffd000`7345f5d0 fffff802`5c3ebdf1 : 00000000`00000004 ffffc000`5df63030 ffffe001`774f85d0 ffffc000`5df63060 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`7345f760 fffff802`5c620ab5 : ffffc000`5df63060 ffffe001`774f85d0 ffffc000`5df63030 00000000`00000009 : nt! ?? ::FNODOBFM::`string'+0x5631
ffffd000`7345f790 fffff802`5c62b32c : 00000000`00000000 ffffc000`5df63060 ffffe001`774f85d0 00000000`00000000 : nt!SepTokenDeleteMethod+0xe1
ffffd000`7345f7c0 fffff802`5c2f96cf : 00000000`00000000 ffffd000`7345f8e0 ffffc000`5df63060 ffffe001`7ff098c0 : nt!ObpRemoveObjectRoutine+0x64
ffffd000`7345f820 fffff802`5c61fc4d : ffffe001`80461880 ffffe001`7ff09ba8 ffffd000`7345f8e0 ffffe001`7ff098c0 : nt!ObfDereferenceObject+0x8f
ffffd000`7345f860 fffff802`5c62b32c : 00000000`00000000 00000000`00000000 ffffe001`77500af0 ffffe001`7ff09890 : nt!PspProcessDelete+0x219
ffffd000`7345f910 fffff802`5c2f96cf : 00000000`00000000 ffffd000`7345fa60 ffffe001`7ff098c0 ffffe001`77c19000 : nt!ObpRemoveObjectRoutine+0x64
ffffd000`7345f970 fffff802`5c345c76 : ffffe001`77c19000 ffffe001`77c19e98 ffffe001`77c19ff8 ffffe001`77c19048 : nt!ObfDereferenceObject+0x8f
ffffd000`7345f9b0 fffff802`5c6a41e0 : ffffe001`77c4c000 ffffe001`77c4c000 ffffd000`7345fa60 ffffe001`77c19e98 : nt!MmFreeAccessPfnBuffer+0x22
ffffd000`7345f9e0 fffff802`5c885dc2 : 00000000`00000000 fffff802`5c5347a8 00000000`00000001 fffff802`00000000 : nt!PfpFlushBuffers+0x24c
ffffd000`7345fa90 fffff802`5c383778 : ffffd000`75f8e3c0 ffffe001`80461880 ffffe001`80461880 ffffe001`775748c0 : nt!PfTLoggingWorker+0x156
ffffd000`7345fc00 fffff802`5c3dc8c6 : ffffd000`75f82180 ffffe001`80461880 ffffd000`75f8e3c0 00000000`08004336 : nt!PspSystemThreadStartup+0x58
ffffd000`7345fc60 00000000`00000000 : ffffd000`73460000 ffffd000`7345a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff802`5c3e2110 c644242000 mov byte ptr [rsp+20h],0
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5683ef14
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
Followup: MachineOwner
---------
We gebruiken essentiële cookies om deze site te laten werken, en optionele cookies om de ervaring te verbeteren.