*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8036eafb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
Unable to load image \SystemRoot\System32\drivers\amdkmpfd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdkmpfd.sys
Unable to load image \SystemRoot\System32\drivers\amd_sata.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amd_sata.sys
Unable to load image \SystemRoot\System32\drivers\amd_xata.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amd_xata.sys
Unable to load image \SystemRoot\system32\drivers\wd\WdFilter.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for WdFilter.sys
Unable to load image \SystemRoot\System32\drivers\amdpsp.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdpsp.sys
Unable to load image \SystemRoot\System32\drivers\amdxe.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdxe.sys
Unable to load image \SystemRoot\System32\drivers\amdfendr.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdfendr.sys
Unable to load image \SystemRoot\system32\drivers\peauth.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for peauth.sys
Unable to load image \SystemRoot\system32\drivers\wd\WdNisDrv.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for WdNisDrv.sys
Unable to load image \SystemRoot\System32\drivers\rt640x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for rt640x64.sys
Unable to load image \SystemRoot\system32\drivers\RTKVHD64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for RTKVHD64.sys
Unable to load image \SystemRoot\System32\drivers\drmk.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for drmk.sys
Unable to load image \SystemRoot\System32\DriverStore\FileRepository\nvppc.inf_amd64_51dcd2a6fae8e495\UcmCxUcsiNvppc.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for UcmCxUcsiNvppc.sys
Unable to load image \SystemRoot\System32\drivers\AMDPCIDev.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for AMDPCIDev.sys
Unable to load image \SystemRoot\System32\drivers\amdgpio2.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdgpio2.sys
Unable to load image \SystemRoot\System32\drivers\amdgpio3.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdgpio3.sys
Unable to load image \SystemRoot\system32\drivers\nvvad64v.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvvad64v.sys
Unable to load image \SystemRoot\System32\drivers\NvModuleTracker.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for NvModuleTracker.sys
Unable to load image \SystemRoot\System32\drivers\nvvhci.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvvhci.sys
Unable to load image \SystemRoot\system32\drivers\nvhda64v.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvhda64v.sys
Unable to load image \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_8e1b465b962975a0\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11405
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 146517
Key : Analysis.Memory.CommitPeak.Mb
Value: 486
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8036eafb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff50d466a75e0 -- (.trap 0xfffff50d466a75e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000005a9e201b rbx=0000000000000000 rcx=fffff50d466a7808
rdx=ffffa78c9e4f2b88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036e0becd7 rsp=fffff50d466a7770 rbp=ffffa78c9bc4ccc0
r8=fffff50d466a7a00 r9=000000000000002f r10=0000fffff8036e07
r11=ffffd4f9f4400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff803`6e0becd7 4883c420 add rsp,20h
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffe500`eb2bae18 fffff803`6e2873f6 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`6eafb320 : nt!KeBugCheckEx
ffffe500`eb2bae20 fffff803`6e126853 : 000008b3`b913244c ffffe500`eb2a1180 00000000`00000000 ffffe500`eb2a1180 : nt!KeAccumulateTicks+0x15e346
ffffe500`eb2bae80 fffff803`6e12633a : ffffa78c`924c9480 fffff50d`466a7660 ffffa78c`9c4e2100 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffffe500`eb2baf30 fffff803`6e02ecd5 : ffffa78c`924c9480 fffff803`6e09f937 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
ffffe500`eb2baf60 fffff803`6e1f6cba : fffff50d`466a7660 ffffa78c`924c9480 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffe500`eb2bafb0 fffff803`6e1f7227 : fffff50d`466a7808 ffffe500`eb2a1180 ffffa78c`924c9480 ffffa78c`9e4f2b88 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff50d`466a75e0 fffff803`6e0becd7 : ffffffff`ffffffd2 fffff803`6e0c5efe 00000000`00000010 00000000`00040286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff50d`466a7770 fffff803`6e0c5efa : ffffe500`00000000 ffffa78c`9c4e2080 00000000`0000000c fffff50d`466a77dc : nt!KeYieldProcessorEx+0x17
fffff50d`466a77a0 fffff803`6e0c5001 : ffff73bf`f1fa4f24 ffffa78c`00000002 00000000`00000000 fffff803`6e4efe11 : nt!KiDeferredReadySingleThread+0xc3a
fffff50d`466a7990 fffff803`6e0c4a8a : 00000000`00060001 00000000`00000000 ffffa78c`9e4f2c60 00000000`00000000 : nt!KiExitDispatcher+0x141
fffff50d`466a7a00 fffff803`6e4bfe2d : ffffa78c`00000000 fffff50d`466a7b80 fffff50d`466a7aa8 ffffa78c`9c4e21c0 : nt!KeSetEvent+0xea
fffff50d`466a7a90 fffff803`6e206bb8 : ffffa78c`9e771280 ffffa78c`9e34d0c0 00000000`00000000 ffffa78c`00000000 : nt!NtSetEvent+0xbd
fffff50d`466a7b00 00007ffd`7440bf64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000002e`e83feb18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`7440bf64
SYMBOL_NAME: nt!KeAccumulateTicks+15e346
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 15e346
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------
1: kd> !blackboxntfs
NTFS Blackbox Data
Record 0:
Record type: 1 (Slow I/O Timeout)
Record length: 32
Irp: ffffa78c99096a20
Scb: ffffa78c93e4ed30
Thread: ffffa78c9d692040
Record 1:
Record type: 1 (Slow I/O Timeout)
Record length: 32
Irp: ffffa78c9d6e2a20
Scb: ffffcf09929c4700
Thread: ffffa78c9c584040
Record 2:
Record type: 1 (Slow I/O Timeout)
Record length: 32
Irp: ffffa78c9ed7a010
Scb: ffffcf098fd04700
Thread: ffffa78c976b5040
3 Slow I/O Timeout Records Found
0 Oplock Break Timeout Records Found
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: fffff80515281010, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80515280f68, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5467
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11623
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 4
BUGCHECK_P2: fffff80515281010
BUGCHECK_P3: fffff80515280f68
BUGCHECK_P4: 0
TRAP_FRAME: fffff80515281010 -- (.trap 0xfffff80515281010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8182b9e000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffffa8182ba4000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8050fc3111f rsp=fffff805152811a0 rbp=fffff80515281710
r8=fffffa8182ba4000 r9=fffff80515281728 r10=fffffa8182ba3e40
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlpGetStackLimitsEx+0x1de6ef:
fffff805`0fc3111f cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff80515280f68 -- (.exr 0xfffff80515280f68)
ExceptionAddress: fffff8050fc3111f (nt!RtlpGetStackLimitsEx+0x00000000001de6ef)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: setup.exe
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
EXCEPTION_STR: 0xc0000409
BAD_STACK_POINTER: fffff80515280ce8
STACK_TEXT:
fffff805`15280ce8 fffff805`0fc07169 : 00000000`00000139 00000000`00000004 fffff805`15281010 fffff805`15280f68 : nt!KeBugCheckEx
fffff805`15280cf0 fffff805`0fc07590 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`15280e30 fffff805`0fc05923 : fffff805`152817c0 00000000`00000000 fffff805`15280a60 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff805`15281010 fffff805`0fc3111f : 00000000`097dc1c8 00007ffd`70e11f4c fffff805`15281710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff805`152811a0 fffff805`0fc312ed : fffff805`15281710 00000000`00000000 fffffa81`82ba3e40 fffff805`00000004 : nt!RtlpGetStackLimitsEx+0x1de6ef
fffff805`152811d0 fffff805`0fa519a6 : fffffa81`82ba3438 fffff805`15281e20 fffffa81`82ba3438 ffff973f`feb87088 : nt!RtlDispatchException+0x1de7cd
fffff805`152818f0 fffff805`0fbf60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff805`15281fb0 fffff805`0fbf6070 : fffff805`0fc072a5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffa81`82ba32f8 fffff805`0fc072a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffa81`82ba3300 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8468
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 20130
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: 0
READ_ADDRESS: fffff8076c8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8076c80f340: Unable to get Flags value from nt!KdVersionBlock
fffff8076c80f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
PROCESS_NAME: System
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
TRAP_FRAME: fffff8077086ba30 -- (.trap 0xfffff8077086ba30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd98129189180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff8077086bbc0 rbp=0000000100981600
r8=0000000000000000 r9=0000000000000020 r10=0000000000000007
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
00000000`00000000 ?? ???
Resetting default scope
IP_IN_FREE_BLOCK: 0
FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000000 ?? ???
STACK_TEXT:
fffff807`7086b8e8 fffff807`6c007169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff807`7086b8f0 fffff807`6c003469 : ffffa303`d9816d50 00000000`00000000 00000000`00000200 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`7086ba30 00000000`00000000 : fffff807`68964180 ffffa303`d9844200 ffffa303`00000004 fffff807`7086bbfc : nt!KiPageFault+0x469
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffb823d8c2f40, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffb823d8c2e98, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7312
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 43337
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffffb823d8c2f40
BUGCHECK_P3: fffffb823d8c2e98
BUGCHECK_P4: 0
TRAP_FRAME: fffffb823d8c2f40 -- (.trap 0xfffffb823d8c2f40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd50f56d981a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd50f5a6321a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8055e47048d rsp=fffffb823d8c30d0 rbp=00000000e05f5899
r8=00000000e05cb013 r9=fffff80558fccfb0 r10=fffff80558fcaac0
r11=fffffb823d8c3100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiInsertTimerTable+0x18f1fd:
fffff805`5e47048d cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffb823d8c2e98 -- (.exr 0xfffffb823d8c2e98)
ExceptionAddress: fffff8055e47048d (nt!KiInsertTimerTable+0x000000000018f1fd)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffb82`3d8c2c18 fffff805`5e407169 : 00000000`00000139 00000000`00000003 fffffb82`3d8c2f40 fffffb82`3d8c2e98 : nt!KeBugCheckEx
fffffb82`3d8c2c20 fffff805`5e407590 : ffffe501`39a8fe70 ffffe501`00000003 ffffe501`00000000 ffffe501`3a0e3db0 : nt!KiBugCheckDispatch+0x69
fffffb82`3d8c2d60 fffff805`5e405923 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffb82`3d8c2f40 fffff805`5e47048d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffffb82`3d8c30d0 fffff805`5e2df5fd : ffffd50f`56d98080 00000000`00000000 fffffb82`3d8c3251 fffff805`5e2ca900 : nt!KiInsertTimerTable+0x18f1fd
fffffb82`3d8c3150 fffff805`5e2be4ce : ffffd50f`00000017 fffff805`00000000 00000000`00000001 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
fffffb82`3d8c31f0 fffff805`5e6bc750 : fffffb82`3d8c35b0 00000000`00000001 ffffd50f`56378830 fffff805`00000000 : nt!KeWaitForMultipleObjects+0x2be
fffffb82`3d8c3300 fffff805`5e6bc429 : 00000000`00000000 ffffd50f`560dc008 fffffb82`3d8c3848 00000000`00000000 : nt!ObWaitForMultipleObjects+0x2f0
fffffb82`3d8c3800 fffff805`5e406bb8 : 00000000`00000020 fffff805`6913c0f6 ffffd50f`56d98080 ffffd50f`5a5c1460 : nt!NtWaitForMultipleObjects+0x119
fffffb82`3d8c3a90 00007ffe`3ec8c8f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000028`7ccff3d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3ec8c8f4
SYMBOL_NAME: nt!KiInsertTimerTable+18f1fd
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 18f1fd
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}
Followup: MachineOwner
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80124338a19, Address of the instruction which caused the bugcheck
Arg3: ffffe58a32be86e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7796
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 22872
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80124338a19
BUGCHECK_P3: ffffe58a32be86e0
BUGCHECK_P4: 0
CONTEXT: ffffe58a32be86e0 -- (.cxr 0xffffe58a32be86e0)
rax=0000000000000023 rbx=0000000000004765 rcx=ffffe58a32be9190
rdx=0000000000000198 rsi=fffffb00000d62f0 rdi=0000000000000007
rip=fffff80124338a19 rsp=ffffe58a32be90e0 rbp=ffffab89ebc34d60
r8=fffff08000000000 r9=0000007ffffffff8 r10=0000000fffffffff
r11=fffff0f87c3e1fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffff0fffffffff8
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!MmCheckCachedPageStates+0x3e9:
fffff801`24338a19 488b5218 mov rdx,qword ptr [rdx+18h] ds:002b:00000000`000001b0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffffe58a`32be90e0 fffff801`2431f6b5 : ffffab89`00000000 00000000`00000000 ffffe58a`32be9320 ffffe58a`32be9304 : nt!MmCheckCachedPageStates+0x3e9
ffffe58a`32be92b0 fffff801`2431e63a : ffffab89`f6bd0af0 0000026d`5e20f070 ffffe58a`32be94a8 00000000`00000000 : nt!CcMapAndCopyInToCache+0x605
ffffe58a`32be9450 fffff801`25f098eb : ffffe58a`32be95c0 00000000`00001000 00000000`0089487b 00000000`00001000 : nt!CcCopyWriteEx+0xea
ffffe58a`32be94d0 fffff801`1fcd73fb : 00000000`00000000 ffffe58a`32be98e8 ffffe58a`32be98a8 0000026d`5e20f070 : Ntfs!NtfsCopyWriteA+0x44b
ffffe58a`32be9800 fffff801`1fcd44d7 : ffffe58a`32be9910 ffffe58a`32be98a8 ffffab89`f31e3b20 ffffab89`f31e3a20 : FLTMGR!FltpPerformFastIoCall+0x16b
ffffe58a`32be9860 fffff801`1fd0b215 : ffffe58a`32bea000 ffffe58a`32be4000 ffffab89`f7848c00 00000000`00000000 : FLTMGR!FltpPassThroughFastIo+0x107
ffffe58a`32be98e0 fffff801`246b8c4d : ffffab89`f6e5a5c0 000000a9`885fee90 000000a9`885fee90 00000000`00000000 : FLTMGR!FltpFastIoWrite+0x165
ffffe58a`32be9990 fffff801`24406bb8 : 00000000`00000000 00000000`00000000 00000000`00000000 000000a9`885feed0 : nt!NtWriteFile+0x43d
ffffe58a`32be9a90 00007ffa`fa58bea4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a9`885fee18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`fa58bea4
SYMBOL_NAME: nt!MmCheckCachedPageStates+3e9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .cxr 0xffffe58a32be86e0 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 3e9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!MmCheckCachedPageStates
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {95c8cd5e-ad74-738f-240d-7e0daa1b3116}
Followup: MachineOwner
---------