KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffff8032c4efd610, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8032c4efd568, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 4
BUGCHECK_P2: ffff8032c4efd610
BUGCHECK_P3: ffff8032c4efd568
BUGCHECK_P4: 0
TRAP_FRAME: ffff5fcbfbc52cb0 -- (.trap 0xffff5fcbfbc52cb0)
Unable to read trap frame at ffff5fcb`fbc52cb0
EXCEPTION_RECORD: ffff8032c4efe0c0 -- (.exr 0xffff8032c4efe0c0)
ExceptionAddress: ffff8032c4efe0c0
ExceptionCode: c4efe330
ExceptionFlags: ffff8032
NumberParameters: 16
Parameter[0]: ffff5fcbfbc52cb0
Parameter[1]: 0000000000000098
Parameter[2]: 0000000000000001
Parameter[3]: 0000000000000000
Parameter[4]: 0000000041000000
Parameter[5]: 0000000000000000
Parameter[6]: 0000000041000000
Parameter[7]: 0000000000000000
Parameter[8]: 0000000000000000
Parameter[9]: 0000000000000000
Parameter[10]: 0000000000000000
Parameter[11]: 0000000000000000
Parameter[12]: 0000000000000000
Parameter[13]: 0000000000000000
Parameter[14]: 0000000000000000
CPU_COUNT: 4
CPU_MHZ: d40
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: csgo.exe
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: FAIL_FAST_INCORRECT_STACK
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 04-05-2020 00:42:44.0040
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
BAD_STACK_POINTER: ffff8032c4efd2e8
LAST_CONTROL_TRANSFER: from fffff8046c9d41e9 to fffff8046c9c2380
STACK_TEXT:
ffff8032`c4efd2e8 fffff804`6c9d41e9 : 00000000`00000139 00000000`00000004 ffff8032`c4efd610 ffff8032`c4efd568 : nt!KeBugCheckEx
ffff8032`c4efd2f0 fffff804`6c9d4610 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8032`c4efd430 fffff804`6c9d29a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000078`00000001 : nt!KiFastFailDispatch+0xd0
ffff8032`c4efd610 fffff804`6ca002f1 : ffff8032`c4efda50 ffff8032`c4efe208 ffff8032`c4efd7b0 ffff8032`c4efd7b0 : nt!KiRaiseSecurityCheckFailure+0x325
ffff8032`c4efd7a0 fffff804`6c8f9ef1 : ffff8032`c4efda50 ffff8032`c4efe208 0000004b`00000014 ff76b9ed`00000003 : nt!RtlpGetStackLimitsEx+0x19e355
ffff8032`c4efd7d0 fffff804`6c8fe86e : ffff8032`c4efe208 ffff8032`c4efdf50 ffff8032`c4efe208 00000000`00000000 : nt!RtlDispatchException+0xc1
ffff8032`c4efda20 fffff804`6c9d431d : ffff8032`c4efe0c0 00000000`00000010 ffff5fcb`fbc52cb0 00000000`00000098 : nt!KiDispatchException+0x16e
ffff8032`c4efe0d0 fffff804`6c9d0505 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffff8032`c4efe2b0 ffff8009`e2795d42 : 00760065`0044005c 005c0065`00630069 00650064`00690056 00000000`0030006f : nt!KiPageFault+0x445
ffff8032`c4efe440 ffffbe0b`37b16b50 : ffffbe0b`3409a060 00000000`00000000 00000002`40900005 00000000`00094e40 : win32kbase!DrvEnumDisplaySettings+0x3f2
ffff8032`c4efe4d0 ffffbe0b`3409a060 : 00000000`00000000 00000002`40900005 00000000`00094e40 00000000`00000000 : 0xffffbe0b`37b16b50
ffff8032`c4efe4d8 00000000`00000000 : 00000002`40900005 00000000`00094e40 00000000`00000000 00000000`00000000 : 0xffffbe0b`3409a060
THREAD_SHA1_HASH_MOD_FUNC: 4ab34289b8024e337d8b262458832ca233cd7f73
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5e736a3ec8e8bfd7f57ed3ae9c652d4a93b70468
THREAD_SHA1_HASH_MOD: 641c351476accb4991abc72c3dc17635c4e68e91
FOLLOWUP_IP:
win32kbase!DrvEnumDisplaySettings+3f2
ffff8009`e2795d42 0000 add byte ptr [rax],al
FAULT_INSTR_CODE: e9000000
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: win32kbase!DrvEnumDisplaySettings+3f2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 3f2
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_win32kbase!DrvEnumDisplaySettings
BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_win32kbase!DrvEnumDisplaySettings
PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_win32kbase!DrvEnumDisplaySettings
TARGET_TIME: 2020-04-04T21:26:22.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 24b4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_stackptr_error_win32kbase!drvenumdisplaysettings
FAILURE_ID_HASH: {e4931a7a-d084-18c6-6d72-655192375475}
Followup: MachineOwner
---------
Aygıtı kaldır dedim aygıt yöneticisinden yöntemi nedir kaldırmanın?Intel grafik sürücüleri hala sistemde yüklü gözüküyor, temiz kurulum yapar mısın?
Kod:KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack extents for the thread. Arg2: ffff8032c4efd610, Address of the trap frame for the exception that caused the bugcheck Arg3: ffff8032c4efd568, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 4 BUGCHECK_P2: ffff8032c4efd610 BUGCHECK_P3: ffff8032c4efd568 BUGCHECK_P4: 0 TRAP_FRAME: ffff5fcbfbc52cb0 -- (.trap 0xffff5fcbfbc52cb0) Unable to read trap frame at ffff5fcb`fbc52cb0 EXCEPTION_RECORD: ffff8032c4efe0c0 -- (.exr 0xffff8032c4efe0c0) ExceptionAddress: ffff8032c4efe0c0 ExceptionCode: c4efe330 ExceptionFlags: ffff8032 NumberParameters: 16 Parameter[0]: ffff5fcbfbc52cb0 Parameter[1]: 0000000000000098 Parameter[2]: 0000000000000001 Parameter[3]: 0000000000000000 Parameter[4]: 0000000041000000 Parameter[5]: 0000000000000000 Parameter[6]: 0000000041000000 Parameter[7]: 0000000000000000 Parameter[8]: 0000000000000000 Parameter[9]: 0000000000000000 Parameter[10]: 0000000000000000 Parameter[11]: 0000000000000000 Parameter[12]: 0000000000000000 Parameter[13]: 0000000000000000 Parameter[14]: 0000000000000000 CPU_COUNT: 4 CPU_MHZ: d40 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3c CPU_STEPPING: 3 CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x139 PROCESS_NAME: csgo.exe CURRENT_IRQL: 0 DEFAULT_BUCKET_ID: FAIL_FAST_INCORRECT_STACK WATSON_BKT_EVENT: BEX ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000004 ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E ANALYSIS_SESSION_TIME: 04-05-2020 00:42:44.0040 ANALYSIS_VERSION: 10.0.18362.1 amd64fre BAD_STACK_POINTER: ffff8032c4efd2e8 LAST_CONTROL_TRANSFER: from fffff8046c9d41e9 to fffff8046c9c2380 STACK_TEXT: ffff8032`c4efd2e8 fffff804`6c9d41e9 : 00000000`00000139 00000000`00000004 ffff8032`c4efd610 ffff8032`c4efd568 : nt!KeBugCheckEx ffff8032`c4efd2f0 fffff804`6c9d4610 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffff8032`c4efd430 fffff804`6c9d29a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000078`00000001 : nt!KiFastFailDispatch+0xd0 ffff8032`c4efd610 fffff804`6ca002f1 : ffff8032`c4efda50 ffff8032`c4efe208 ffff8032`c4efd7b0 ffff8032`c4efd7b0 : nt!KiRaiseSecurityCheckFailure+0x325 ffff8032`c4efd7a0 fffff804`6c8f9ef1 : ffff8032`c4efda50 ffff8032`c4efe208 0000004b`00000014 ff76b9ed`00000003 : nt!RtlpGetStackLimitsEx+0x19e355 ffff8032`c4efd7d0 fffff804`6c8fe86e : ffff8032`c4efe208 ffff8032`c4efdf50 ffff8032`c4efe208 00000000`00000000 : nt!RtlDispatchException+0xc1 ffff8032`c4efda20 fffff804`6c9d431d : ffff8032`c4efe0c0 00000000`00000010 ffff5fcb`fbc52cb0 00000000`00000098 : nt!KiDispatchException+0x16e ffff8032`c4efe0d0 fffff804`6c9d0505 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d ffff8032`c4efe2b0 ffff8009`e2795d42 : 00760065`0044005c 005c0065`00630069 00650064`00690056 00000000`0030006f : nt!KiPageFault+0x445 ffff8032`c4efe440 ffffbe0b`37b16b50 : ffffbe0b`3409a060 00000000`00000000 00000002`40900005 00000000`00094e40 : win32kbase!DrvEnumDisplaySettings+0x3f2 ffff8032`c4efe4d0 ffffbe0b`3409a060 : 00000000`00000000 00000002`40900005 00000000`00094e40 00000000`00000000 : 0xffffbe0b`37b16b50 ffff8032`c4efe4d8 00000000`00000000 : 00000002`40900005 00000000`00094e40 00000000`00000000 00000000`00000000 : 0xffffbe0b`3409a060 THREAD_SHA1_HASH_MOD_FUNC: 4ab34289b8024e337d8b262458832ca233cd7f73 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5e736a3ec8e8bfd7f57ed3ae9c652d4a93b70468 THREAD_SHA1_HASH_MOD: 641c351476accb4991abc72c3dc17635c4e68e91 FOLLOWUP_IP: win32kbase!DrvEnumDisplaySettings+3f2 ffff8009`e2795d42 0000 add byte ptr [rax],al FAULT_INSTR_CODE: e9000000 SYMBOL_STACK_INDEX: 9 SYMBOL_NAME: win32kbase!DrvEnumDisplaySettings+3f2 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32kbase IMAGE_NAME: win32kbase.sys DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.719 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 3f2 FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_win32kbase!DrvEnumDisplaySettings BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_win32kbase!DrvEnumDisplaySettings PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_win32kbase!DrvEnumDisplaySettings TARGET_TIME: 2020-04-04T21:26:22.000Z OSBUILD: 18362 OSSERVICEPACK: 720 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 24b4 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_stackptr_error_win32kbase!drvenumdisplaysettings FAILURE_ID_HASH: {e4931a7a-d084-18c6-6d72-655192375475} Followup: MachineOwner ---------
Peki temiz kurulumdan sonra tekrar hatayı alırsam dosyasını paylaşırım.Birkaç gereksiz program daha var, temiz kurulum yapar mısın?
Peki, sonuçları bekliyorum.
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe78566c36da0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe78566c36cf8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffffe78566c36da0
BUGCHECK_P3: ffffe78566c36cf8
BUGCHECK_P4: 0
TRAP_FRAME: ffffe78566c36da0 -- (.trap 0xffffe78566c36da0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcd07f16749b0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffcd07edb916f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80722609434 rsp=ffffe78566c36f30 rbp=ffffe78566c37079
r8=0000000000000002 r9=0000000000000000 r10=ffffcd07e6d57e50
r11=ffffcd07f02c1870 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!IopCompleteRequest+0x1941b4:
fffff807`22609434 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffe78566c36cf8 -- (.exr 0xffffe78566c36cf8)
ExceptionAddress: fffff80722609434 (nt!IopCompleteRequest+0x00000000001941b4)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 4
CPU_MHZ: d40
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-17-2020 01:00:20.0433
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
IRP_ADDRESS: ffffffffffffff89
LAST_CONTROL_TRANSFER: from fffff807225cf869 to fffff807225be040
STACK_TEXT:
ffffe785`66c36a78 fffff807`225cf869 : 00000000`00000139 00000000`00000003 ffffe785`66c36da0 ffffe785`66c36cf8 : nt!KeBugCheckEx
ffffe785`66c36a80 fffff807`225cfc10 : 00000048`0012007e 00000000`00000004 00000048`0012007e 00000000`00000004 : nt!KiBugCheckDispatch+0x69
ffffe785`66c36bc0 fffff807`225ce008 : 4ec39bc2`6a3d76cd ffffcd07`f09e8c80 00000000`00000050 00000000`00000001 : nt!KiFastFailDispatch+0xd0
ffffe785`66c36da0 fffff807`22609434 : ffffcd07`f1674990 ffffcd07`ee7bcbb0 ffffcd07`f1674990 ffffcd07`0000000a : nt!KiRaiseSecurityCheckFailure+0x308
ffffe785`66c36f30 fffff807`224d3f6d : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0x1941b4
ffffe785`66c37020 fffff807`224d201e : ffffcd07`edb91000 00000000`00000000 ffffa800`00000000 55555555`55555555 : nt!KiDeliverApc+0x19d
ffffe785`66c370e0 fffff807`224d1989 : 00000000`00000000 00000000`00000000 ffffcd07`edb91180 00000000`00000000 : nt!KiSwapThread+0x49e
ffffe785`66c371a0 fffff807`224cf652 : ffffe785`66c37200 ffffe785`00000000 ffffcd07`00000000 ffffe785`66c372c9 : nt!KiCommitThreadWait+0x549
ffffe785`66c37240 fffff807`229f33aa : ffffe785`00000002 ffffe785`66c373c0 ffffcd07`eeff80f0 3fffffff`00000006 : nt!KeWaitForMultipleObjects+0x582
ffffe785`66c37310 fffff807`229f30c7 : ffffcd07`ec59dcc0 00000000`ffffffff 00000000`00000000 fffff807`229b2322 : nt!ObWaitForMultipleObjects+0x2aa
ffffe785`66c37810 fffff807`225cf285 : ffffcd07`00000000 ffffe785`00000001 ffffcd07`edb91080 000000fe`0bbff4b8 : nt!NtWaitForMultipleObjects+0xf7
ffffe785`66c37a90 00007ffe`f958f0e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000fe`0bbff498 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`f958f0e4
THREAD_SHA1_HASH_MOD_FUNC: 34df5851ceb2ea5436be1bf35f1082a1b5c31a06
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 76878569429688b4b241d0e68b76484b4ea8c2d6
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!KiSwapThread+49e
fffff807`224d201e e91bfeffff jmp nt!KiSwapThread+0x2be (fffff807`224d1e3e)
FAULT_INSTR_CODE: fffe1be9
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: nt!KiSwapThread+49e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.107
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 49e
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
TARGET_TIME: 2020-04-16T21:50:20.000Z
OSBUILD: 17763
OSSERVICEPACK: 107
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: a7ab
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiswapthread
FAILURE_ID_HASH: {364d2a10-fb5b-e8e9-9b5b-39c85a1b5a41}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8071fbde1a3, Address of the instruction which caused the BugCheck
Arg3: fffff9061392bc40, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2702
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 33978
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 249
Key : Analysis.Init.Elapsed.mSec
Value: 1143
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 042720-7578-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8071fbde1a3
BUGCHECK_P3: fffff9061392bc40
BUGCHECK_P4: 0
CONTEXT: fffff9061392bc40 -- (.cxr 0xfffff9061392bc40)
rax=ffffd989cbe11c10 rbx=ffff960c68137d80 rcx=ffffd989cbe115c0
rdx=ffff960c68137d80 rsi=ffff960c68137d40 rdi=bfff960c54a5f490
rip=fffff8071fbde1a3 rsp=fffff9061392c640 rbp=0000000000000000
r8=fffff9061392c618 r9=d989cc384bb00000 r10=ffffd989cbe11c10
r11=7fffd989cc384bc0 r12=0000000000004000 r13=fffff9061392c6e8
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!ExpAllocateHandleTableEntry+0x7b:
fffff807`1fbde1a3 488b4708 mov rax,qword ptr [rdi+8] ds:002b:bfff960c`54a5f498=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csgo.exe
STACK_TEXT:
fffff906`1392c640 fffff807`1fbde0bd : 00000000`00000004 00000000`00000000 fffff906`1392c6c0 00000000`00000001 : nt!ExpAllocateHandleTableEntry+0x7b
fffff906`1392c690 fffff807`1fbdd8ab : 00000000`00000000 00000000`00000000 00000000`00000001 00000331`27132620 : nt!ExCreateHandleEx+0x69
fffff906`1392c6e0 fffff807`1fbec024 : 00000000`00000000 00000000`00000000 00000000`001f0003 fffff807`00000002 : nt!ObpCreateHandle+0x24b
fffff906`1392c7d0 fffff807`1fb6fdf9 : 00000000`0031e5f8 fffff906`1392cb80 00000000`00000000 00000000`0031e5f8 : nt!ObInsertObjectEx+0x148
fffff906`1392ca20 fffff807`1f9af278 : ffffd989`cbe115c0 00000000`0031e598 fffff906`1392caa8 00000000`00000001 : nt!NtCreateEvent+0xd9
fffff906`1392ca90 00007ffe`bf50b694 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0031e578 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`bf50b694
SYMBOL_NAME: nt!ExpAllocateHandleTableEntry+7b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.207
STACK_COMMAND: .cxr 0xfffff9061392bc40 ; kb
BUCKET_ID_FUNC_OFFSET: 7b
FAILURE_BUCKET_ID: AV_nt!ExpAllocateHandleTableEntry
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {06b053e1-37ae-2c47-cd47-50945cd43626}