KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: fffffe86935b5a90, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffe86935b59e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5000
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10454
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1e
BUGCHECK_P2: fffffe86935b5a90
BUGCHECK_P3: fffffe86935b59e8
BUGCHECK_P4: 0
IMAGE_NAME: ntkrnlmp.exe
MODULE_NAME: ntkrnlmp
FAULTING_MODULE: fffff80559800000 nt
TRAP_FRAME: fffffe86935b5a90 -- (.trap 0xfffffe86935b5a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000b rbx=0000000000000000 rcx=000000000000001e
rdx=fffff8055a4fdc80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80559c6b58d rsp=fffffe86935b5c20 rbp=ffffe600201de180
r8=0000000000000000 r9=fffffe86935b5fb0 r10=0000000000000000
r11=0000000000000029 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeQueryValuesThread+0x1957dd:
fffff805`59c6b58d cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffe86935b59e8 -- (.exr 0xfffffe86935b59e8)
ExceptionAddress: fffff80559c6b58d (nt!KeQueryValuesThread+0x00000000001957dd)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001e
Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001e
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffe86`935b5768 fffff805`59c06569 : 00000000`00000139 00000000`0000001e fffffe86`935b5a90 fffffe86`935b59e8 : nt!KeBugCheckEx
fffffe86`935b5770 fffff805`59c06990 : ffffe600`207d5180 fffff805`59bfb7b2 000f8067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffe86`935b58b0 fffff805`59c04d23 : 00000000`00000000 00000000`000000ff 00000000`00000001 00000000`000001f0 : nt!KiFastFailDispatch+0xd0
fffffe86`935b5a90 fffff805`59c6b58d : ffff8b81`100125c0 01f000d0`000000d0 00740073`00000000 00320033`006d0065 : nt!KiRaiseSecurityCheckFailure+0x323
fffffe86`935b5c20 fffff805`59edb3e1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x1957dd
fffffe86`935b5ca0 fffff805`59edb072 : ffff8b81`1e31e660 ffff8b81`1e31e8e0 ffff8b81`1ca21080 00000000`00000002 : nt!PsQueryStatisticsProcess+0x111
fffffe86`935b5d20 fffff805`59eeeca1 : 00000000`00000002 ffff8b81`1e31e080 00000000`ffffffff 00000000`00000000 : nt!ExpCopyProcessInfo+0x42
fffffe86`935b5da0 fffff805`59ef21e3 : ffffe0f0`783c1e08 00000000`00047328 00000000`01440000 00000000`00000000 : nt!ExpGetProcessInformation+0x9f1
fffffe86`935b6400 fffff805`59ef18c7 : ffff8b81`1ca21080 00000000`00000000 00000000`00000000 00000000`09aef820 : nt!ExpQuerySystemInformation+0x7d3
fffffe86`935b6ac0 fffff805`59c05fb8 : 00000000`03ea0000 00000000`00000000 fffffe86`935b6b18 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37
fffffe86`935b6b00 00007ffb`8ba4c454 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`099ee448 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8ba4c454
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {64929928-a824-2134-285e-71128496d311}
Followup: MachineOwner
---------
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 00000000000000f0, The system failed to complete(suspend) a power transition in a timely manner.
Arg2: 0000000000000005, The system power state in transition.
Arg3: 000000000000000d, The sleep checkpoint most recently reached.
Arg4: ffffac8ba5c96040, A pointer to the thread currently processing the request.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4343
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8720
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a0
BUGCHECK_P1: f0
BUGCHECK_P2: 5
BUGCHECK_P3: d
BUGCHECK_P4: ffffac8ba5c96040
FAULTING_THREAD: ffffac8ba5c96040
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff8188`f7b510d0 fffff802`100dffa0 : ffff9800`00000000 00000000`00000000 00000000`00000200 fffff802`00000000 : nt!KiSwapContext+0x76
ffff8188`f7b51210 fffff802`100df4cf : ffffac8b`00000004 00000000`00000008 ffff8188`f7b513d0 ffff8188`00000000 : nt!KiSwapThread+0x500
ffff8188`f7b512c0 fffff802`100ded73 : 00000000`00000000 00000000`00000000 ffffac8b`a57f4000 ffffac8b`a5c96180 : nt!KiCommitThreadWait+0x14f
ffff8188`f7b51360 fffff802`10099f96 : ffff8188`f7b51480 fffff802`00000005 ffff8188`f7b51500 ffffac8b`a57f4000 : nt!KeWaitForSingleObject+0x233
ffff8188`f7b51450 fffff802`14a0329a : ffff8188`f7b51830 00000000`00000000 00000000`00000200 00000000`00000000 : nt!IoSynchronousCallDriver+0x76
ffff8188`f7b514b0 fffff802`149e9cae : ffff8188`f7b515f0 00000000`00000000 ffff8188`00000000 fffff802`149e9d06 : partmgr!PM_DISK::Read+0x6a
ffff8188`f7b514f0 fffff802`149e9bf8 : ffff8188`f7b515f0 00000000`00000001 ffff8188`f7b51701 ffff8188`00000000 : partmgr!SC_DISK::ReadSectors+0x36
ffff8188`f7b51530 fffff802`149e9bc6 : ffff8188`f7b515f0 ffff8188`00000018 00000000`00000000 ffffac8b`a6f97990 : partmgr!SC_DISK::ResetPartitionCache+0x1c
ffff8188`f7b51560 fffff802`14a02146 : ffffac8b`9cbe08d0 ffff8188`f7b51701 00000000`00000000 ffffac8b`a6f97901 : partmgr!SC_DISK::InitializePartitionCache+0x32
ffff8188`f7b51590 fffff802`14a017ae : ffffac8b`9c1b31b0 ffff8188`f7b517e8 ffffac8b`a6f977a0 fffff802`100ceb87 : partmgr!PM_DISK::Initialize+0x4e
ffff8188`f7b515c0 fffff802`149e1581 : ffffac8b`a06981b8 ffffac8b`9c1b31b0 ffffac8b`9c1b31b0 ffffac8b`a06981b8 : partmgr!PmReadPartitionTable+0x4e
ffff8188`f7b51780 fffff802`14a05554 : ffffac8b`9cbe0a00 00000000`00000000 ffffac8b`9cbe0a58 fffff802`100c2f00 : partmgr!PmGetDriveLayoutEx+0x195
ffff8188`f7b517e0 fffff802`149ec9f9 : 00000000`00000000 ffffac8b`a0698010 ffffac8b`9cbe08d0 ffffac8b`a804a740 : partmgr!PmIoctlGetDriveLayout+0x64
ffff8188`f7b51830 fffff802`149e3cff : 00000000`00000000 ffffac8b`a0698010 ffffac8b`a0698200 ffff8188`f7b519a0 : partmgr!PmFilterDeviceControl+0xa8b9
ffff8188`f7b51880 fffff802`100cd805 : 00000000`00000880 fffff802`10002223 00000000`00000000 fffff802`100cb06f : partmgr!PmGlobalDispatch+0x1f
ffff8188`f7b518b0 fffff802`103cfee8 : ffff8188`f7b519a0 ffff8188`f7b51934 00000000`00000000 ffffac8b`a5e14000 : nt!IofCallDriver+0x55
ffff8188`f7b518f0 fffff802`103cfcb8 : ffffac8b`a0698010 00000000`00000002 ffffac8b`a575ce10 fffff802`10ae0340 : nt!RawReadWriteDeviceControl+0xa0
ffff8188`f7b51920 fffff802`100cd805 : ffffac8b`a608fda0 00000000`00000001 ffffac8b`a0698010 ffffac8b`a0698010 : nt!RawDispatch+0x78
ffff8188`f7b51970 fffff802`0ecf4906 : 00000000`00000000 ffffac8b`a8545170 00000000`00000000 fffff802`104efe11 : nt!IofCallDriver+0x55
ffff8188`f7b519b0 fffff802`100cd805 : ffffac8b`a0698010 00000000`00000000 ffff8188`20206f49 00000000`00000000 : FLTMGR!FltpDispatch+0xd6
ffff8188`f7b51a10 fffff802`104c2528 : ffff8188`f7b51d90 ffffac8b`a0698010 00000000`00000001 ffffac8b`99aa0040 : nt!IofCallDriver+0x55
ffff8188`f7b51a50 fffff802`104c1df5 : 00000000`0007400c ffff8188`f7b51d90 00000000`00000000 ffff8188`f7b51d90 : nt!IopSynchronousServiceTail+0x1a8
ffff8188`f7b51af0 fffff802`104c17f6 : 00000004`0000000f 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff8188`f7b51c30 fffff802`10205fb8 : ffff8188`f7b51d84 ffffdd83`895ec748 00000000`00000000 fffff802`10070ffa : nt!NtDeviceIoControlFile+0x56
ffff8188`f7b51ca0 fffff802`101f8400 : fffff802`10645474 00000000`c0000185 00000000`00000808 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffff8188`f7b51ea8 fffff802`10645474 : 00000000`c0000185 00000000`00000808 00000000`00000000 ffff8188`00000000 : nt!KiServiceLinkage
ffff8188`f7b51eb0 fffff802`10569023 : 00000000`00000000 ffff8188`f7b51fb0 ffff8188`f7b52068 ffff8188`f7b52068 : nt!BiIssueGetDriveLayoutIoctl+0xdc420
ffff8188`f7b51f30 fffff802`105666f5 : ffffdd83`8a777908 ffff8188`f7b52130 ffffffff`80004d10 ffffdd83`8afe4000 : nt!BiGetDriveLayoutInformation+0x97
ffff8188`f7b51fc0 fffff802`1056630b : ffffdd83`8a777908 00000000`00000000 ffff8188`f7b520f0 00000000`00000000 : nt!BiGetDriveLayoutBlock+0x3d
ffff8188`f7b51ff0 fffff802`10565fff : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!BiGetNtPartitionPath+0x243
ffff8188`f7b521a0 fffff802`10568812 : ffff8188`00000000 ffff8188`11000001 00000000`00000000 ffff8188`f7b52270 : nt!BiConvertBootEnvironmentDeviceToNt+0xab
ffff8188`f7b52240 fffff802`10567cd1 : 00000000`00000000 ffffffff`800018d0 ffffdd83`8888bf30 ffff8188`00000000 : nt!BiConvertRegistryDataToElement+0xe2
ffff8188`f7b522c0 fffff802`10566e25 : ffff8188`c0000034 ffff8188`f7b52508 ffff8188`f7b527a8 00000000`00000000 : nt!BcdGetElementDataWithFlags+0x191
ffff8188`f7b523d0 fffff802`105668dd : ffffffff`80001990 ffff8188`f7b52490 00000000`00000000 ffffffff`80001990 : nt!PopBcdReadElement+0x39
ffff8188`f7b52420 fffff802`10565d31 : ffffffff`80001990 ffffffff`800019a0 00000000`00000000 00000000`00000000 : nt!PopBcdSetDefaultResumeObjectElements+0x69
ffff8188`f7b524c0 fffff802`1055b5df : ffffac8b`9ccf4230 fffff802`0000352c ffffac8b`9ccf4230 ffffd8ee`c1c10150 : nt!PopBcdEstablishResumeObject+0x131
ffff8188`f7b52560 fffff802`1078df89 : ffff8188`f7b50000 00000000`00000000 ffffffff`800019a0 00000000`00000000 : nt!PopAllocateHiberContext+0x20b
ffff8188`f7b525e0 fffff802`107947dc : ffffac8b`a4b5d000 ffffac8b`00000006 00000000`00000002 00000000`00000070 : nt!PopTransitionSystemPowerStateEx+0x4b5
ffff8188`f7b526a0 fffff802`10205fb8 : 7ffff802`10a24fd0 00000000`ffffffff 00000000`00000000 ffffac8b`a5c966e0 : nt!NtSetSystemPowerState+0x4c
ffff8188`f7b52880 fffff802`101f8400 : fffff802`10559f0e 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffff8188`f7b52a18 fffff802`10559f0e : 00000000`00000008 ffff8188`f7b52a78 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
ffff8188`f7b52a20 fffff802`10559bd9 : 00000000`00000000 ffffac8b`99a6aac0 00000000`00000000 00000000`00000000 : nt!PopIssueActionRequest+0x216
ffff8188`f7b52ac0 fffff802`100a0e74 : 00000000`00000001 00000000`00000000 ffffffff`ffffffff fffff802`10a23b00 : nt!PopPolicyWorkerAction+0x79
ffff8188`f7b52b30 fffff802`101035f5 : ffffac8b`00000001 ffffac8b`a5c96040 fffff802`100a0de0 ffffac8b`00000000 : nt!PopPolicyWorkerThread+0x94
ffff8188`f7b52b70 fffff802`100a2ae5 : ffffac8b`a5c96040 00000000`00000080 ffffac8b`99aa0040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8188`f7b52c10 fffff802`101fbbf8 : ffff9800`4f4cf180 ffffac8b`a5c96040 fffff802`100a2a90 80002400`b7a89faf : nt!PspSystemThreadStartup+0x55
ffff8188`f7b52c60 00000000`00000000 : ffff8188`f7b53000 ffff8188`f7b4d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
STACK_COMMAND: .thread 0xffffac8ba5c96040 ; kb
SYMBOL_NAME: partmgr!PM_DISK::Read+6a
MODULE_NAME: partmgr
IMAGE_NAME: partmgr.sys
IMAGE_VERSION: 10.0.19041.1030
BUCKET_ID_FUNC_OFFSET: 6a
FAILURE_BUCKET_ID: 0xa0_f0_partmgr!PM_DISK::Read
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fe745222-5d88-a69e-f077-955bb15cd442}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8028161a876, Address of the instruction which caused the bugcheck
Arg3: ffffca0062ff5920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4515
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10722
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8028161a876
BUGCHECK_P3: ffffca0062ff5920
BUGCHECK_P4: 0
CONTEXT: ffffca0062ff5920 -- (.cxr 0xffffca0062ff5920)
rax=ffff9a05545d9ee8 rbx=ffff9a05513e3080 rcx=9a05545d9eb03a5d
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff9a05545d9ee0
rip=fffff8028161a876 rsp=ffffda03be5b8940 rbp=ffffda03be5b8a01
r8=0000000000000000 r9=000001152a550b14 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=9a05545d9eb03a5d
r14=0000000000000000 r15=ffff9a05513e31c0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!KeAbPreWait+0x6:
fffff802`8161a876 0fb64120 movzx eax,byte ptr [rcx+20h] ds:002b:9a05545d`9eb03a7d=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
BAD_STACK_POINTER: ffffca0062ff5018
STACK_TEXT:
ffffda03`be5b8940 fffff802`8186e51b : ffffca00`000000c4 fffff802`81aefe11 000f8067`b4bbbd01 ffff9a05`513e31c0 : nt!KeAbPreWait+0x6
ffffda03`be5b8970 fffff802`81af1531 : ffff9a05`545d9ee0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18f9db
ffffda03`be5b8a60 fffff802`81af15da : ffff9a05`513e3080 00000082`bb16fca8 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffffda03`be5b8ac0 fffff802`81805fb8 : 00000000`00000000 00000000`00000000 ffffda03`be5b8b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffda03`be5b8b00 00007ffd`10febe14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000082`bb16fc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`10febe14
SYMBOL_NAME: nt!KeAbPreWait+6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffca0062ff5920 ; kb
BUCKET_ID_FUNC_OFFSET: 6
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KeAbPreWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ddcb9656-083d-2ea8-831a-b13145df4ef7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffa4cb2be14
Arg3: 000000000000001d
Arg4: fffff10fb1dfeb00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3671
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3705
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: 7ffa4cb2be14
BUGCHECK_P3: 1d
BUGCHECK_P4: fffff10fb1dfeb00
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
STACK_TEXT:
fffff10f`b1dfe958 fffff801`83473a20 : 00000000`0000001a 00000000`00061941 00007ffa`4cb2be14 00000000`0000001d : nt!KeBugCheckEx
fffff10f`b1dfe960 fffff801`8340275e : 000001f0`982f8a40 00000000`00000000 fffff10f`b1dfeb18 ffffffff`fffe7960 : nt!MmAccessFault+0x189840
fffff10f`b1dfeb00 00007ffa`4cb2be14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000a3`9176f648 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4cb2be14
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: fffff80352e6b8f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80352e6b848, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4108
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12014
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1e
BUGCHECK_P2: fffff80352e6b8f0
BUGCHECK_P3: fffff80352e6b848
BUGCHECK_P4: 0
IMAGE_NAME: ntkrnlmp.exe
MODULE_NAME: ntkrnlmp
FAULTING_MODULE: fffff8034c800000 nt
TRAP_FRAME: fffff80352e6b8f0 -- (.trap 0xfffff80352e6b8f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001e
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034ca5719a rsp=fffff80352e6ba80 rbp=0000000000000000
r8=00000000ffffffff r9=0000000000000fff r10=00000000fffffffe
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiGroupSchedulingGenerationEnd+0xfa:
fffff803`4ca5719a cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff80352e6b848 -- (.exr 0xfffff80352e6b848)
ExceptionAddress: fffff8034ca5719a (nt!KiGroupSchedulingGenerationEnd+0x00000000000000fa)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001e
Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001e
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff803`52e6b5c8 fffff803`4cc06569 : 00000000`00000139 00000000`0000001e fffff803`52e6b8f0 fffff803`52e6b848 : nt!KeBugCheckEx
fffff803`52e6b5d0 fffff803`4cc06990 : 00000000`00000000 00000000`00000fff 00000000`00000000 00000fd5`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`52e6b710 fffff803`4cc04d23 : ffffac87`c51b71f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff803`52e6b8f0 fffff803`4ca5719a : fffff803`fffffffe fffff803`ffffffff 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff803`52e6ba80 fffff803`4ca58c3e : fffff803`4af54180 00000000`00000000 00000000`0008095a 00000000`00000000 : nt!KiGroupSchedulingGenerationEnd+0xfa
fffff803`52e6bad0 fffff803`4ca581c8 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`52e6bb80 : nt!KiGroupSchedulingQuantumEnd+0xce
fffff803`52e6bb60 fffff803`4cbf8124 : 00000000`00000000 fffff803`4af54180 fffff803`4d527600 ffffac87`c94c5080 : nt!KiQuantumEnd+0x148
fffff803`52e6bc60 00000000`00000000 : fffff803`52e6c000 fffff803`52e66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0xb4
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {64929928-a824-2134-285e-71128496d311}
Followup: MachineOwner
---------