SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8013f73430b, Address of the instruction which caused the bugcheck
Arg3: ffffb7016e3860e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5281
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14108
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8013f73430b
BUGCHECK_P3: ffffb7016e3860e0
BUGCHECK_P4: 0
CONTEXT: ffffb7016e3860e0 -- (.cxr 0xffffb7016e3860e0)
rax=fffff8014001af88 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000100c rsi=ffffe58f4dc72000 rdi=ffffbf08b5fd2cb0
rip=fffff8013f73430b rsp=ffffb7016e386ae0 rbp=ffffb7016e386c10
r8=0000000000000001 r9=0000000000000000 r10=0000000000000004
r11=fffff8014001bc6c r12=ffffe58f4dc72000 r13=ffffe58f5ac5d030
r14=ffffbf08b5fd2cb0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nvlddmkm+0xf430b:
fffff801`3f73430b 488b8b18040000 mov rcx,qword ptr [rbx+418h] ds:002b:00000000`00000418=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csgo.exe
STACK_TEXT:
ffffb701`6e386ae0 ffffe58f`5add7010 : ffffe58f`4dc72000 ffffb701`6e386e08 ffffe509`c6f41f70 ffffb701`6e387288 : nvlddmkm+0xf430b
ffffb701`6e386ae8 ffffe58f`4dc72000 : ffffb701`6e386e08 ffffe509`c6f41f70 ffffb701`6e387288 fffff801`401ea5d3 : 0xffffe58f`5add7010
ffffb701`6e386af0 ffffb701`6e386e08 : ffffe509`c6f41f70 ffffb701`6e387288 fffff801`401ea5d3 00000000`00000001 : 0xffffe58f`4dc72000
ffffb701`6e386af8 ffffe509`c6f41f70 : ffffb701`6e387288 fffff801`401ea5d3 00000000`00000001 ffffb701`6e387200 : 0xffffb701`6e386e08
ffffb701`6e386b00 ffffb701`6e387288 : fffff801`401ea5d3 00000000`00000001 ffffb701`6e387200 00000000`00000000 : 0xffffe509`c6f41f70
ffffb701`6e386b08 fffff801`401ea5d3 : 00000000`00000001 ffffb701`6e387200 00000000`00000000 00000000`00000000 : 0xffffb701`6e387288
ffffb701`6e386b10 00000000`00000001 : ffffb701`6e387200 00000000`00000000 00000000`00000000 ffffe58f`52829000 : nvlddmkm+0xbaa5d3
ffffb701`6e386b18 ffffb701`6e387200 : 00000000`00000000 00000000`00000000 ffffe58f`52829000 00000000`00000000 : 0x1
ffffb701`6e386b20 00000000`00000000 : 00000000`00000000 ffffe58f`52829000 00000000`00000000 00000000`000000c0 : 0xffffb701`6e387200
SYMBOL_NAME: nvlddmkm+f430b
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffffb7016e3860e0 ; kb
BUCKET_ID_FUNC_OFFSET: f430b
FAILURE_BUCKET_ID: 0x3B_c0000005_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {63c41bff-3ea4-15a0-a72c-26a548d17abe}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000000e, Type of memory safety violation
Arg2: fffff30db6a8b170, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff30db6a8b0c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4156
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5991
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: e
BUGCHECK_P2: fffff30db6a8b170
BUGCHECK_P3: fffff30db6a8b0c8
BUGCHECK_P4: 0
TRAP_FRAME: fffff30db6a8b170 -- (.trap 0xfffff30db6a8b170)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8608270b1848 rbx=0000000000000000 rcx=000000000000000e
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8030883a184 rsp=fffff30db6a8b300 rbp=fffff30db6a8b420
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=ffff8608270b14e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ObpCreateHandle+0x149f44:
fffff803`0883a184 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff30db6a8b0c8 -- (.exr 0xfffff30db6a8b0c8)
ExceptionAddress: fffff8030883a184 (nt!ObpCreateHandle+0x0000000000149f44)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000000e
Subcode: 0xe FAST_FAIL_INVALID_REFERENCE_COUNT
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MRT.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000000e
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff30d`b6a8ae48 fffff803`08406569 : 00000000`00000139 00000000`0000000e fffff30d`b6a8b170 fffff30d`b6a8b0c8 : nt!KeBugCheckEx
fffff30d`b6a8ae50 fffff803`08406990 : 00000000`79517350 fffff30d`b6a8b000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff30d`b6a8af90 fffff803`08404d23 : 00000000`00000000 fffff30d`b6a8b408 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff30d`b6a8b170 fffff803`0883a184 : ffff8608`270b14e0 00000000`00000001 00000000`00000000 ffff8608`270b14e0 : nt!KiRaiseSecurityCheckFailure+0x323
fffff30d`b6a8b300 fffff803`086afbf9 : fffff30d`b6a8b820 ffffdb81`02964040 ffffdb81`0e4fa2d8 fffff803`082d8c7a : nt!ObpCreateHandle+0x149f44
fffff30d`b6a8b4f0 fffff803`086ad0d3 : 00000000`00000000 00000000`00000000 00000000`00000000 00007fff`b963b4e0 : nt!ObOpenObjectByPointer+0x1b9
fffff30d`b6a8b770 fffff803`086aceb3 : 00000000`00000066 00000000`00000040 00000000`00000000 00000009`5607db10 : nt!PsOpenThread+0x213
fffff30d`b6a8bac0 fffff803`08405fb8 : 00000000`00000300 000001e5`a50e6160 fffff30d`b6a8bb80 000001e5`a5392300 : nt!NtOpenThread+0x23
fffff30d`b6a8bb00 00007fff`b956e344 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000009`5607d798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b956e344
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_e_INVALID_REFERENCE_COUNT_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e78067c0-c86e-2475-7d94-d283b49f461b}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008886, The subtype of the bugcheck.
Arg2: ffff91000482c220
Arg3: ffff91000a82c1f0
Arg4: 0000000000000400
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3078
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3811
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 8886
BUGCHECK_P2: ffff91000482c220
BUGCHECK_P3: ffff91000a82c1f0
BUGCHECK_P4: 400
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SearchApp.exe
STACK_TEXT:
ffffe308`4cfb8548 fffff800`15ef5b70 : 00000000`0000001a 00000000`00008886 ffff9100`0482c220 ffff9100`0a82c1f0 : nt!KeBugCheckEx
ffffe308`4cfb8550 fffff800`15ef4be0 : ffffe308`00000002 fffff800`00000000 00000000`00180eb6 ffffe308`4cfb8b80 : nt!MiUnlinkPageFromList+0xcb0
ffffe308`4cfb85e0 fffff800`15ef41c4 : ffffe308`4cfb8880 ffffe308`4cfb8920 0000000f`ffffffff 00000001`80eb6820 : nt!MiHandleTransitionFault+0x180
ffffe308`4cfb8660 fffff800`15ef3c16 : ffffe308`4cfb8880 00000000`00000000 ffff9100`03e22d50 00000000`00000000 : nt!MiResolveTransitionFault+0x424
ffffe308`4cfb8720 fffff800`15eec425 : ffffe308`4cfb8880 00000000`00000000 ffffe308`4cfb8860 ffffe308`4cfb8a20 : nt!MiResolveProtoPteFault+0x1236
ffffe308`4cfb8820 fffff800`15eea369 : 00000000`00000000 00000000`00000100 00000000`c0000016 ffffd28f`4d80e058 : nt!MiDispatchFault+0x3d5
ffffe308`4cfb8960 fffff800`1600275e : ffff8003`6f3a8000 ffff8003`6f3a8080 00000258`c815c8a0 00000000`00000000 : nt!MmAccessFault+0x189
ffffe308`4cfb8b00 00007ff9`4ceb7d66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000b7`729ed6e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`4ceb7d66
SYMBOL_NAME: nt!MiUnlinkPageFromList+cb0
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: cb0
FAILURE_BUCKET_ID: 0x1a_8886_nt!MiUnlinkPageFromList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf}
Followup: MachineOwner
---------