Çözüldü IRQL_NOT_LESS_OR_EQUAL Mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10
Çözüm
LAN sürücünüzü aşağıdan güncelleyin. Aynı zamanda Windows güncelleştirmelerini de yapın.

Sanırım Wi-Fi adaptörü kullanıyorsunuz, donanım kimliklerini paylaşın adaptörün.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa48303ab29f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8048222c0e0, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8390

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11800

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffa48303ab29f0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8048222c0e0

WRITE_ADDRESS: fffff80482cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80482c0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80482c0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffa48303ab29f0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

DPC_STACK_BASE:  FFFFEF8B85868FB0

TRAP_FRAME:  ffffef8b85868810 -- (.trap 0xffffef8b85868810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffef8b85868a10 rbx=0000000000000000 rcx=ffffb50151989180
rdx=ffffef8b85868a30 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8048222c0e0 rsp=ffffef8b858689a0 rbp=ffffef8b85868a50
 r8=0000000000000000  r9=0000000000000001 r10=fffff8048222c0a0
r11=ffffa48b084bba70 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x40:
fffff804`8222c0e0 488713          xchg    rdx,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT: 
ffffef8b`858686c8 fffff804`82407769     : 00000000`0000000a ffffa483`03ab29f0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffef8b`858686d0 fffff804`82403a69     : 00000000`00000000 00000000`00000005 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffef8b`85868810 fffff804`8222c0e0     : 00000000`0000bd20 fffff804`8699c08c ffffa48b`03abd800 ffffa48b`03abd960 : nt!KiPageFault+0x469
ffffef8b`858689a0 fffff804`869413a7     : fffff804`86b09230 fffff804`8697c93a ffffa48b`0302e8a0 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x40
ffffef8b`858689d0 fffff804`86940f8d     : fffff804`86b09230 ffffa48b`03abd8c0 00000000`0000bd20 ffffa48b`03aee370 : tcpip+0x313a7
ffffef8b`85868a70 fffff804`82244f12     : 00000000`00000002 ffffb501`51989180 00000000`00000080 ffffa48b`00000002 : tcpip+0x30f8d
ffffef8b`85868c30 fffff804`82206eed     : ffffb501`51989180 00000000`00000000 00000000`00000008 00000000`000e175e : nt!KiProcessExpiredTimerList+0x172
ffffef8b`85868d20 fffff804`823fc7c5     : 00000000`00000000 ffffb501`51989180 ffffa48b`012c6720 00000197`8d95b988 : nt!KiRetireDpcList+0x5dd
ffffef8b`85868fb0 fffff804`823fc5b0     : fffff804`823f1870 fffff804`822ec5ca 00000000`ffffffff 0000005a`944cf600 : nt!KxRetireDpcList+0x5
ffffef8b`89cb5ac0 fffff804`823fbe65     : 00000197`8d95b988 fffff804`823f7811 00000197`8d95b980 ffffa48b`0b293660 : nt!KiDispatchInterruptContinue
ffffef8b`89cb5af0 fffff804`823f7811     : 00000197`8d95b980 ffffa48b`0b293660 ffffffff`fffc7d90 ffffa48b`00000000 : nt!KiDpcInterruptBypass+0x25
ffffef8b`89cb5b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1


SYMBOL_NAME:  tcpip+313a7

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  313a7

FAILURE_BUCKET_ID:  AV_tcpip!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c94484cf-8655-07ec-34a0-1379f617a790}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffff, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8046ec1d0a7, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5796

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17460

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffffffffff

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8046ec1d0a7

BUGCHECK_P4: 2

READ_ADDRESS: fffff8046f2fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8046f20f330: Unable to get Flags value from nt!KdVersionBlock
fffff8046f20f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

TRAP_FRAME:  fffff503e0613d70 -- (.trap 0xfffff503e0613d70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8e0bf90d1000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffff8e0bf90d5640 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046ec1d0a7 rsp=fffff503e0613f00 rbp=ffffffffffffffff
 r8=fffff503e0613ee0  r9=ffff8e0c01de1102 r10=0000000000000000
r11=000000000000004c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!CmpGetNameControlBlock+0xc7:
fffff804`6ec1d0a7 3b5d00          cmp     ebx,dword ptr [rbp] ss:0018:ffffffff`ffffffff=????????
Resetting default scope

STACK_TEXT: 
fffff503`e0613ac8 fffff804`6ea1e8bb     : 00000000`00000050 ffffffff`ffffffff 00000000`00000000 fffff503`e0613d70 : nt!KeBugCheckEx
fffff503`e0613ad0 fffff804`6e80c960     : fffff503`e0613e58 00000000`00000000 fffff503`e0613df0 00000000`00000000 : nt!MiSystemFault+0x1f40ab
fffff503`e0613bd0 fffff804`6ea0395e     : 00000000`00000000 00000000`00000100 00000000`0000090d 00000000`00000000 : nt!MmAccessFault+0x400
fffff503`e0613d70 fffff804`6ec1d0a7     : 00000000`00054750 00000000`00000000 00000000`a2e549fc fffff804`6ec1d3bc : nt!KiPageFault+0x35e
fffff503`e0613f00 fffff804`6ec1cb6c     : 00000000`a2e54901 fffff503`e0610026 00000000`00000000 ffff8e0c`088b3510 : nt!CmpGetNameControlBlock+0xc7
fffff503`e0613f60 fffff804`6ec21969     : 00000000`ffffffff 00000000`a2e549fc 00000000`0000000d 00000000`00000000 : nt!CmpCreateKeyControlBlock+0x14c
fffff503`e0613fd0 fffff804`6ec24b69     : ffff8e0c`088b3510 00000000`00000002 fffff503`e06141d0 fffff503`e0614250 : nt!CmpWalkOneLevel+0x639
fffff503`e06140d0 fffff804`6ec23453     : ffff9e8d`0000001c fffff503`e0614420 fffff503`e06143d8 ffff9e8d`1a0c0010 : nt!CmpDoParseKey+0x849
fffff503`e0614370 fffff804`6ec2751e     : fffff804`6ec23101 00000000`00000000 ffff9e8d`1a0c0010 ffff8e0c`00000001 : nt!CmpParseKey+0x2c3
fffff503`e0614510 fffff804`6ebeb19a     : ffff9e8d`1a0c0000 fffff503`e0614778 00000000`00000040 ffff9e8d`10afb980 : nt!ObpLookupObjectName+0x3fe
fffff503`e06146e0 fffff804`6ebeaf7c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9e8d`10afb980 : nt!ObOpenObjectByNameEx+0x1fa
fffff503`e0614810 fffff804`6ebeaaa1     : 000000d2`f547e8c8 fffff503`e0614b80 00000000`00000001 fffff804`6e86119e : nt!ObOpenObjectByName+0x5c
fffff503`e0614860 fffff804`6ebea7cf     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmOpenKey+0x2c1
fffff503`e0614ac0 fffff804`6ea071b8     : ffff9e8d`1a5eb000 00000000`00000000 fffff503`e0614b80 00000000`00000000 : nt!NtOpenKeyEx+0xf
fffff503`e0614b00 00007ffe`52a4e3a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d2`f547e7e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`52a4e3a4


SYMBOL_NAME:  nt!CmpGetNameControlBlock+c7

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  c7

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!CmpGetNameControlBlock

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {129643fd-a2da-2fa3-d944-9f90b810063f}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc288d1258eb0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8046e2e0cf8, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4609

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10780

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffc288d1258eb0

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8046e2e0cf8

BUGCHECK_P4: 2

READ_ADDRESS: fffff8046e8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8046e80f340: Unable to get Flags value from nt!KdVersionBlock
fffff8046e80f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffc288d1258eb0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

TRAP_FRAME:  ffffe88fe4fe9860 -- (.trap 0xffffe88fe4fe9860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc288d1258e90
rdx=ffffe88fe4fe9a88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046e2e0cf8 rsp=ffffe88fe4fe99f0 rbp=0000000000000000
 r8=ffffc280d03874d8  r9=0000000000000011 r10=ffffc280c55ce000
r11=ffffc280d03874d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!CmpDelayDerefKeyControlBlock+0x4:
fffff804`6e2e0cf8 4c8b5920        mov     r11,qword ptr [rcx+20h] ds:ffffc288`d1258eb0=????????????????
Resetting default scope

STACK_TEXT: 
ffffe88f`e4fe95b8 fffff804`6e07a665     : 00000000`00000050 ffffc288`d1258eb0 00000000`00000000 ffffe88f`e4fe9860 : nt!KeBugCheckEx
ffffe88f`e4fe95c0 fffff804`6deea4a0     : 00000000`00000000 00000000`00000000 ffffe88f`e4fe98e0 00000000`00000000 : nt!MiSystemFault+0x172315
ffffe88f`e4fe96c0 fffff804`6e00335e     : ffff8002`48b6d180 fffff804`6dec012a 00000000`00000150 00000000`0000093f : nt!MmAccessFault+0x400
ffffe88f`e4fe9860 fffff804`6e2e0cf8     : 00000000`00005b30 fffff804`6e1df120 ffffc280`c67a9848 00000000`00000002 : nt!KiPageFault+0x35e
ffffe88f`e4fe99f0 fffff804`6e2e0c62     : ffffc280`d03874c0 ffffe88f`e4fe9a88 fffff804`00000000 ffffe88f`e4fe9ad0 : nt!CmpDelayDerefKeyControlBlock+0x4
ffffe88f`e4fe9a30 fffff804`6e1e12bf     : ffffe88f`e4fe9ad8 00000000`00000000 ffffe88f`e4fe9ad0 00000000`00000001 : nt!CmpCleanUpKcbCacheWithLock+0x96
ffffe88f`e4fe9a60 fffff804`6df034b5     : ffff8002`4deb7040 fffff804`6e1e1180 ffff8002`3e68acc0 ffff8002`00000000 : nt!CmpDelayCloseWorker+0x13f
ffffe88f`e4fe9b70 fffff804`6dea29a5     : ffff8002`4deb7040 00000000`00000080 ffff8002`3e66e040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffe88f`e4fe9c10 fffff804`6dffc868     : ffff9880`e1d5c180 ffff8002`4deb7040 fffff804`6dea2950 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffe88f`e4fe9c60 00000000`00000000     : ffffe88f`e4fea000 ffffe88f`e4fe4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!CmpDelayDerefKeyControlBlock+4

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!CmpDelayDerefKeyControlBlock

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {38608f9f-16b9-8e55-f794-a117612f2514}

Followup:     MachineOwner
---------



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8e0adc6f4180, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8e0adc6f40d8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7327

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10889

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff8e0adc6f4180

BUGCHECK_P3: ffff8e0adc6f40d8

BUGCHECK_P4: 0

TRAP_FRAME:  ffff8e0adc6f4180 -- (.trap 0xffff8e0adc6f4180)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd99437705d10 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd9cd807c6a88 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd9943884219d rsp=ffff8e0adc6f4310 rbp=ffff8e0adc6f45d0
 r8=ffff8e0adc6f4290  r9=0000000000000005 r10=0000ffffd9943879
r11=ffffcc7c71400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
win32kfull!UnreferenceUndispatchedFrameList+0xada5d:
ffffd994`3884219d cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff8e0adc6f40d8 -- (.exr 0xffff8e0adc6f40d8)
ExceptionAddress: ffffd9943884219d (win32kfull!UnreferenceUndispatchedFrameList+0x00000000000ada5d)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LogonUI.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff8e0a`dc6f3e58 fffff804`6b607169     : 00000000`00000139 00000000`00000003 ffff8e0a`dc6f4180 ffff8e0a`dc6f40d8 : nt!KeBugCheckEx
ffff8e0a`dc6f3e60 fffff804`6b607590     : ffffdc82`00fc51c0 fffff804`6b4ec806 00000000`00008000 ffff8e0a`dc6f4180 : nt!KiBugCheckDispatch+0x69
ffff8e0a`dc6f3fa0 fffff804`6b605923     : 00000000`00000001 ffff8f8f`ededc180 00000000`00000002 ffffdc81`ff0cf180 : nt!KiFastFailDispatch+0xd0
ffff8e0a`dc6f4180 ffffd994`3884219d     : 00000000`00001ef8 00000000`00000000 ffff8e0a`dc6f4450 ffffce1c`fe79b3cd : nt!KiRaiseSecurityCheckFailure+0x323
ffff8e0a`dc6f4310 ffffd994`3750ea69     : ffffd9cd`807c6620 ffffd9cd`807c6620 ffffd9cd`807c6620 00000000`00000000 : win32kfull!UnreferenceUndispatchedFrameList+0xada5d
ffff8e0a`dc6f4340 ffffd994`375085a3     : ffffd9cd`807c6620 00000000`00000000 ffff8f8f`ededc080 ffffd994`377082b0 : win32kbase!xxxDestroyThreadInfo+0x205
ffff8e0a`dc6f44d0 ffffd994`386b9bdb     : 00000000`00000001 00000000`00000001 ffff8f8f`ededc080 00000000`00000000 : win32kbase!UserThreadCallout+0x553
ffff8e0a`dc6f46c0 ffffd994`3752c0ec     : 00000000`00000001 ffff8e0a`dc6f47f0 00000000`c000001c fffff804`6b4db39b : win32kfull!W32pThreadCallout+0x7b
ffff8e0a`dc6f46f0 ffffd994`372010d0     : 00000000`c000001c ffff8e0a`dc6f49b0 00000000`00000000 ffff8e0a`dc6f4a08 : win32kbase!W32CalloutDispatch+0x44c
ffff8e0a`dc6f4900 fffff804`6b9056e5     : 00000000`00000001 fffff804`6be1df60 ffff8f8f`e99d18b0 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x30
ffff8e0a`dc6f4940 fffff804`6b7e6e55     : ffff8f8f`ee678090 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PsInvokeWin32Callout+0x55
ffff8e0a`dc6f4970 fffff804`6b7e99b3     : 00000000`00000000 ffff8f8f`f5fdd700 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x4b5
ffff8e0a`dc6f4a70 fffff804`6b7e993a     : 00000000`00000000 00000000`00000000 ffff8f8f`ededc080 ffff8f8f`f5fdd760 : nt!PspTerminateThreadByPointer+0x53
ffff8e0a`dc6f4ab0 fffff804`6b606bb8     : 00000000`00000000 ffff8f8f`ededc080 ffff8e0a`dc6f4b80 ffff8f8f`00000000 : nt!NtTerminateThread+0x4a
ffff8e0a`dc6f4b00 00007ffd`44a8c804     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000079`4ef7f838 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`44a8c804


SYMBOL_NAME:  win32kfull!UnreferenceUndispatchedFrameList+ada5d

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  ada5d

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_win32kfull!UnreferenceUndispatchedFrameList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1f1e0a5c-2c46-5af5-8998-40810405a236}

Followup:     MachineOwner
---------



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffac04b78f3938, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8006c3c469e, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5171

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10277

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 99

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffac04b78f3938

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8006c3c469e

READ_ADDRESS: fffff800682fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8006820f340: Unable to get Flags value from nt!KdVersionBlock
fffff8006820f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffac04b78f3938

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8a81acf5c810 -- (.trap 0xffff8a81acf5c810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffac04b78f3920 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffac0cbaab89f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8006c3c469e rsp=ffff8a81acf5c9a0 rbp=ffff8a81acf5ca69
 r8=0000000000000001  r9=0000000000000000 r10=fffff8006c3c4300
r11=ffffac0cb78f3e61 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ndis!NdisReturnNetBufferLists+0x2ce:
fffff800`6c3c469e 4c8b4018        mov     r8,qword ptr [rax+18h] ds:ffffac04`b78f3938=????????????????
Resetting default scope

STACK_TEXT: 
ffff8a81`acf5c6c8 fffff800`67a07169     : 00000000`0000000a ffffac04`b78f3938 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8a81`acf5c6d0 fffff800`67a03469     : fffff800`6cb18230 00000000`00000001 00000000`00000010 ffff8a81`acf5c9a0 : nt!KiBugCheckDispatch+0x69
ffff8a81`acf5c810 fffff800`6c3c469e     : ffffac0c`c073b450 ffffac0c`c0774010 ffffac0c`bcf70330 00000000`00000000 : nt!KiPageFault+0x469
ffff8a81`acf5c9a0 fffff800`6c991b24     : 00000000`00000002 00000000`00000000 00000000`00000001 00000000`00000002 : ndis!NdisReturnNetBufferLists+0x2ce
ffff8a81`acf5cad0 fffff800`6c535b63     : ffffac0c`baadf9f0 00000000`00000000 ffffac0c`00000001 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xd4
ffff8a81`acf5cb30 fffff800`6c933172     : ffffac0c`b7bb1660 00000000`00000001 ffffac0c`baab89f0 ffffac0c`b58732e0 : NETIO!NetioDereferenceNetBufferListChain+0x103
ffff8a81`acf5cbb0 fffff800`6c93174e     : ffffac0c`b5a3ed00 ffffac0c`c49ff040 ffffac0c`00000002 00000000`00000000 : tcpip!TcpReceive+0x442
ffff8a81`acf5cca0 fffff800`6c943999     : 00000000`00000000 00000000`00000001 ffffac0c`baab9510 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
ffff8a81`acf5cce0 fffff800`6c99e57e     : ffffac0c`b97f8210 ffffac0c`b7bb1660 fffff800`6c991a06 ffff8a81`acf5d200 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
ffff8a81`acf5cf70 fffff800`6780d468     : ffffac0c`b5a76de0 00000000`00000002 ffffac0c`b71b4040 ffff8a81`acf5d268 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
ffff8a81`acf5d0c0 fffff800`6780d3dd     : fffff800`6c99e450 ffff8a81`acf5d268 ffffac0c`b586e1a0 fffff800`6c5323af : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8a81`acf5d130 fffff800`6c9915ed     : 00000000`00000000 00000000`00000000 ffffac0c`beb0c2c0 fffff800`6cc1142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff8a81`acf5d170 fffff800`6c990ccd     : 00000000`00000001 ffff8a81`acf5d2d0 ffffac0c`b7bb1660 ffffac0c`baadf9f0 : tcpip!NetioExpandKernelStackAndCallout+0x8d
ffff8a81`acf5d1d0 fffff800`6c3c1eb0     : ffffac0c`b78f3921 00000000`00000002 ffffac0c`bacd3e30 ffff8a81`acf5d5e0 : tcpip!FlReceiveNetBufferListChain+0x46d
ffff8a81`acf5d480 fffff800`6c3c1ccb     : ffffac0c`b7962460 00000000`00000001 ffff8a81`00000000 33333333`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
ffff8a81`acf5d560 fffff800`6c3c7ef0     : ffffac0c`b78d91a0 ffffac0c`baab8901 ffffac0c`b78d91a0 ffffffff`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
ffff8a81`acf5d5e0 fffff800`6c3fdee3     : ffffac0c`baab89f0 ffff8a81`acf5d6b1 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
ffff8a81`acf5d630 fffff800`6c3c4a94     : 00000000`006c5aa2 00000000`00000001 ffffac0c`b78d91a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
ffff8a81`acf5d700 fffff800`75878017     : fffff800`6bbb2b30 fffff800`6bbb2b30 ffff8a81`acf5d890 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffff8a81`acf5d790 fffff800`6bbb2b2f     : fffff800`6bbb2b30 ffff8a81`acf5d890 00000000`00000000 00000000`00000001 : rt640x64+0x28017
ffff8a81`acf5d798 fffff800`6bbb2b2f     : ffff8a81`acf5d890 00000000`00000000 00000000`00000001 00000000`00000000 : Wdf01000!imp_WdfSpinLockAcquire+0xbf
ffff8a81`acf5d7a0 ffff8a81`acf5d890     : 00000000`00000000 00000000`00000001 00000000`00000000 00000002`00000001 : Wdf01000!imp_WdfSpinLockAcquire+0xbf
ffff8a81`acf5d7a8 00000000`00000000     : 00000000`00000001 00000000`00000000 00000002`00000001 80000000`00000002 : 0xffff8a81`acf5d890


SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferListChain+103

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  103

FAILURE_BUCKET_ID:  AV_NETIO!NetioDereferenceNetBufferListChain

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b14cf127-5933-4e45-71a8-f23e2243d43b}

Followup:     MachineOwner
---------
LAN sürücünüzü aşağıdan güncelleyin. Aynı zamanda Windows güncelleştirmelerini de yapın.

Sanırım Wi-Fi adaptörü kullanıyorsunuz, donanım kimliklerini paylaşın adaptörün.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa48303ab29f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8048222c0e0, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8390

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11800

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffa48303ab29f0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8048222c0e0

WRITE_ADDRESS: fffff80482cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80482c0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80482c0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffa48303ab29f0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

DPC_STACK_BASE:  FFFFEF8B85868FB0

TRAP_FRAME:  ffffef8b85868810 -- (.trap 0xffffef8b85868810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffef8b85868a10 rbx=0000000000000000 rcx=ffffb50151989180
rdx=ffffef8b85868a30 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8048222c0e0 rsp=ffffef8b858689a0 rbp=ffffef8b85868a50
 r8=0000000000000000  r9=0000000000000001 r10=fffff8048222c0a0
r11=ffffa48b084bba70 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x40:
fffff804`8222c0e0 488713          xchg    rdx,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT: 
ffffef8b`858686c8 fffff804`82407769     : 00000000`0000000a ffffa483`03ab29f0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffef8b`858686d0 fffff804`82403a69     : 00000000`00000000 00000000`00000005 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffef8b`85868810 fffff804`8222c0e0     : 00000000`0000bd20 fffff804`8699c08c ffffa48b`03abd800 ffffa48b`03abd960 : nt!KiPageFault+0x469
ffffef8b`858689a0 fffff804`869413a7     : fffff804`86b09230 fffff804`8697c93a ffffa48b`0302e8a0 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x40
ffffef8b`858689d0 fffff804`86940f8d     : fffff804`86b09230 ffffa48b`03abd8c0 00000000`0000bd20 ffffa48b`03aee370 : tcpip+0x313a7
ffffef8b`85868a70 fffff804`82244f12     : 00000000`00000002 ffffb501`51989180 00000000`00000080 ffffa48b`00000002 : tcpip+0x30f8d
ffffef8b`85868c30 fffff804`82206eed     : ffffb501`51989180 00000000`00000000 00000000`00000008 00000000`000e175e : nt!KiProcessExpiredTimerList+0x172
ffffef8b`85868d20 fffff804`823fc7c5     : 00000000`00000000 ffffb501`51989180 ffffa48b`012c6720 00000197`8d95b988 : nt!KiRetireDpcList+0x5dd
ffffef8b`85868fb0 fffff804`823fc5b0     : fffff804`823f1870 fffff804`822ec5ca 00000000`ffffffff 0000005a`944cf600 : nt!KxRetireDpcList+0x5
ffffef8b`89cb5ac0 fffff804`823fbe65     : 00000197`8d95b988 fffff804`823f7811 00000197`8d95b980 ffffa48b`0b293660 : nt!KiDispatchInterruptContinue
ffffef8b`89cb5af0 fffff804`823f7811     : 00000197`8d95b980 ffffa48b`0b293660 ffffffff`fffc7d90 ffffa48b`00000000 : nt!KiDpcInterruptBypass+0x25
ffffef8b`89cb5b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1


SYMBOL_NAME:  tcpip+313a7

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  313a7

FAILURE_BUCKET_ID:  AV_tcpip!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c94484cf-8655-07ec-34a0-1379f617a790}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffff, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8046ec1d0a7, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5796

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17460

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffffffffff

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8046ec1d0a7

BUGCHECK_P4: 2

READ_ADDRESS: fffff8046f2fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8046f20f330: Unable to get Flags value from nt!KdVersionBlock
fffff8046f20f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

TRAP_FRAME:  fffff503e0613d70 -- (.trap 0xfffff503e0613d70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8e0bf90d1000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffff8e0bf90d5640 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046ec1d0a7 rsp=fffff503e0613f00 rbp=ffffffffffffffff
 r8=fffff503e0613ee0  r9=ffff8e0c01de1102 r10=0000000000000000
r11=000000000000004c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!CmpGetNameControlBlock+0xc7:
fffff804`6ec1d0a7 3b5d00          cmp     ebx,dword ptr [rbp] ss:0018:ffffffff`ffffffff=????????
Resetting default scope

STACK_TEXT: 
fffff503`e0613ac8 fffff804`6ea1e8bb     : 00000000`00000050 ffffffff`ffffffff 00000000`00000000 fffff503`e0613d70 : nt!KeBugCheckEx
fffff503`e0613ad0 fffff804`6e80c960     : fffff503`e0613e58 00000000`00000000 fffff503`e0613df0 00000000`00000000 : nt!MiSystemFault+0x1f40ab
fffff503`e0613bd0 fffff804`6ea0395e     : 00000000`00000000 00000000`00000100 00000000`0000090d 00000000`00000000 : nt!MmAccessFault+0x400
fffff503`e0613d70 fffff804`6ec1d0a7     : 00000000`00054750 00000000`00000000 00000000`a2e549fc fffff804`6ec1d3bc : nt!KiPageFault+0x35e
fffff503`e0613f00 fffff804`6ec1cb6c     : 00000000`a2e54901 fffff503`e0610026 00000000`00000000 ffff8e0c`088b3510 : nt!CmpGetNameControlBlock+0xc7
fffff503`e0613f60 fffff804`6ec21969     : 00000000`ffffffff 00000000`a2e549fc 00000000`0000000d 00000000`00000000 : nt!CmpCreateKeyControlBlock+0x14c
fffff503`e0613fd0 fffff804`6ec24b69     : ffff8e0c`088b3510 00000000`00000002 fffff503`e06141d0 fffff503`e0614250 : nt!CmpWalkOneLevel+0x639
fffff503`e06140d0 fffff804`6ec23453     : ffff9e8d`0000001c fffff503`e0614420 fffff503`e06143d8 ffff9e8d`1a0c0010 : nt!CmpDoParseKey+0x849
fffff503`e0614370 fffff804`6ec2751e     : fffff804`6ec23101 00000000`00000000 ffff9e8d`1a0c0010 ffff8e0c`00000001 : nt!CmpParseKey+0x2c3
fffff503`e0614510 fffff804`6ebeb19a     : ffff9e8d`1a0c0000 fffff503`e0614778 00000000`00000040 ffff9e8d`10afb980 : nt!ObpLookupObjectName+0x3fe
fffff503`e06146e0 fffff804`6ebeaf7c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9e8d`10afb980 : nt!ObOpenObjectByNameEx+0x1fa
fffff503`e0614810 fffff804`6ebeaaa1     : 000000d2`f547e8c8 fffff503`e0614b80 00000000`00000001 fffff804`6e86119e : nt!ObOpenObjectByName+0x5c
fffff503`e0614860 fffff804`6ebea7cf     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmOpenKey+0x2c1
fffff503`e0614ac0 fffff804`6ea071b8     : ffff9e8d`1a5eb000 00000000`00000000 fffff503`e0614b80 00000000`00000000 : nt!NtOpenKeyEx+0xf
fffff503`e0614b00 00007ffe`52a4e3a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d2`f547e7e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`52a4e3a4


SYMBOL_NAME:  nt!CmpGetNameControlBlock+c7

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  c7

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!CmpGetNameControlBlock

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {129643fd-a2da-2fa3-d944-9f90b810063f}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc288d1258eb0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8046e2e0cf8, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4609

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10780

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffc288d1258eb0

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8046e2e0cf8

BUGCHECK_P4: 2

READ_ADDRESS: fffff8046e8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8046e80f340: Unable to get Flags value from nt!KdVersionBlock
fffff8046e80f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffc288d1258eb0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

TRAP_FRAME:  ffffe88fe4fe9860 -- (.trap 0xffffe88fe4fe9860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc288d1258e90
rdx=ffffe88fe4fe9a88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046e2e0cf8 rsp=ffffe88fe4fe99f0 rbp=0000000000000000
 r8=ffffc280d03874d8  r9=0000000000000011 r10=ffffc280c55ce000
r11=ffffc280d03874d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!CmpDelayDerefKeyControlBlock+0x4:
fffff804`6e2e0cf8 4c8b5920        mov     r11,qword ptr [rcx+20h] ds:ffffc288`d1258eb0=????????????????
Resetting default scope

STACK_TEXT: 
ffffe88f`e4fe95b8 fffff804`6e07a665     : 00000000`00000050 ffffc288`d1258eb0 00000000`00000000 ffffe88f`e4fe9860 : nt!KeBugCheckEx
ffffe88f`e4fe95c0 fffff804`6deea4a0     : 00000000`00000000 00000000`00000000 ffffe88f`e4fe98e0 00000000`00000000 : nt!MiSystemFault+0x172315
ffffe88f`e4fe96c0 fffff804`6e00335e     : ffff8002`48b6d180 fffff804`6dec012a 00000000`00000150 00000000`0000093f : nt!MmAccessFault+0x400
ffffe88f`e4fe9860 fffff804`6e2e0cf8     : 00000000`00005b30 fffff804`6e1df120 ffffc280`c67a9848 00000000`00000002 : nt!KiPageFault+0x35e
ffffe88f`e4fe99f0 fffff804`6e2e0c62     : ffffc280`d03874c0 ffffe88f`e4fe9a88 fffff804`00000000 ffffe88f`e4fe9ad0 : nt!CmpDelayDerefKeyControlBlock+0x4
ffffe88f`e4fe9a30 fffff804`6e1e12bf     : ffffe88f`e4fe9ad8 00000000`00000000 ffffe88f`e4fe9ad0 00000000`00000001 : nt!CmpCleanUpKcbCacheWithLock+0x96
ffffe88f`e4fe9a60 fffff804`6df034b5     : ffff8002`4deb7040 fffff804`6e1e1180 ffff8002`3e68acc0 ffff8002`00000000 : nt!CmpDelayCloseWorker+0x13f
ffffe88f`e4fe9b70 fffff804`6dea29a5     : ffff8002`4deb7040 00000000`00000080 ffff8002`3e66e040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffe88f`e4fe9c10 fffff804`6dffc868     : ffff9880`e1d5c180 ffff8002`4deb7040 fffff804`6dea2950 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffe88f`e4fe9c60 00000000`00000000     : ffffe88f`e4fea000 ffffe88f`e4fe4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!CmpDelayDerefKeyControlBlock+4

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!CmpDelayDerefKeyControlBlock

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {38608f9f-16b9-8e55-f794-a117612f2514}

Followup:     MachineOwner
---------



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8e0adc6f4180, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8e0adc6f40d8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7327

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10889

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff8e0adc6f4180

BUGCHECK_P3: ffff8e0adc6f40d8

BUGCHECK_P4: 0

TRAP_FRAME:  ffff8e0adc6f4180 -- (.trap 0xffff8e0adc6f4180)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd99437705d10 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd9cd807c6a88 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd9943884219d rsp=ffff8e0adc6f4310 rbp=ffff8e0adc6f45d0
 r8=ffff8e0adc6f4290  r9=0000000000000005 r10=0000ffffd9943879
r11=ffffcc7c71400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
win32kfull!UnreferenceUndispatchedFrameList+0xada5d:
ffffd994`3884219d cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff8e0adc6f40d8 -- (.exr 0xffff8e0adc6f40d8)
ExceptionAddress: ffffd9943884219d (win32kfull!UnreferenceUndispatchedFrameList+0x00000000000ada5d)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LogonUI.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff8e0a`dc6f3e58 fffff804`6b607169     : 00000000`00000139 00000000`00000003 ffff8e0a`dc6f4180 ffff8e0a`dc6f40d8 : nt!KeBugCheckEx
ffff8e0a`dc6f3e60 fffff804`6b607590     : ffffdc82`00fc51c0 fffff804`6b4ec806 00000000`00008000 ffff8e0a`dc6f4180 : nt!KiBugCheckDispatch+0x69
ffff8e0a`dc6f3fa0 fffff804`6b605923     : 00000000`00000001 ffff8f8f`ededc180 00000000`00000002 ffffdc81`ff0cf180 : nt!KiFastFailDispatch+0xd0
ffff8e0a`dc6f4180 ffffd994`3884219d     : 00000000`00001ef8 00000000`00000000 ffff8e0a`dc6f4450 ffffce1c`fe79b3cd : nt!KiRaiseSecurityCheckFailure+0x323
ffff8e0a`dc6f4310 ffffd994`3750ea69     : ffffd9cd`807c6620 ffffd9cd`807c6620 ffffd9cd`807c6620 00000000`00000000 : win32kfull!UnreferenceUndispatchedFrameList+0xada5d
ffff8e0a`dc6f4340 ffffd994`375085a3     : ffffd9cd`807c6620 00000000`00000000 ffff8f8f`ededc080 ffffd994`377082b0 : win32kbase!xxxDestroyThreadInfo+0x205
ffff8e0a`dc6f44d0 ffffd994`386b9bdb     : 00000000`00000001 00000000`00000001 ffff8f8f`ededc080 00000000`00000000 : win32kbase!UserThreadCallout+0x553
ffff8e0a`dc6f46c0 ffffd994`3752c0ec     : 00000000`00000001 ffff8e0a`dc6f47f0 00000000`c000001c fffff804`6b4db39b : win32kfull!W32pThreadCallout+0x7b
ffff8e0a`dc6f46f0 ffffd994`372010d0     : 00000000`c000001c ffff8e0a`dc6f49b0 00000000`00000000 ffff8e0a`dc6f4a08 : win32kbase!W32CalloutDispatch+0x44c
ffff8e0a`dc6f4900 fffff804`6b9056e5     : 00000000`00000001 fffff804`6be1df60 ffff8f8f`e99d18b0 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x30
ffff8e0a`dc6f4940 fffff804`6b7e6e55     : ffff8f8f`ee678090 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PsInvokeWin32Callout+0x55
ffff8e0a`dc6f4970 fffff804`6b7e99b3     : 00000000`00000000 ffff8f8f`f5fdd700 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x4b5
ffff8e0a`dc6f4a70 fffff804`6b7e993a     : 00000000`00000000 00000000`00000000 ffff8f8f`ededc080 ffff8f8f`f5fdd760 : nt!PspTerminateThreadByPointer+0x53
ffff8e0a`dc6f4ab0 fffff804`6b606bb8     : 00000000`00000000 ffff8f8f`ededc080 ffff8e0a`dc6f4b80 ffff8f8f`00000000 : nt!NtTerminateThread+0x4a
ffff8e0a`dc6f4b00 00007ffd`44a8c804     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000079`4ef7f838 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`44a8c804


SYMBOL_NAME:  win32kfull!UnreferenceUndispatchedFrameList+ada5d

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  ada5d

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_win32kfull!UnreferenceUndispatchedFrameList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1f1e0a5c-2c46-5af5-8998-40810405a236}

Followup:     MachineOwner
---------



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffac04b78f3938, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8006c3c469e, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5171

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10277

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 99

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffac04b78f3938

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8006c3c469e

READ_ADDRESS: fffff800682fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8006820f340: Unable to get Flags value from nt!KdVersionBlock
fffff8006820f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffac04b78f3938

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8a81acf5c810 -- (.trap 0xffff8a81acf5c810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffac04b78f3920 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffac0cbaab89f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8006c3c469e rsp=ffff8a81acf5c9a0 rbp=ffff8a81acf5ca69
 r8=0000000000000001  r9=0000000000000000 r10=fffff8006c3c4300
r11=ffffac0cb78f3e61 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ndis!NdisReturnNetBufferLists+0x2ce:
fffff800`6c3c469e 4c8b4018        mov     r8,qword ptr [rax+18h] ds:ffffac04`b78f3938=????????????????
Resetting default scope

STACK_TEXT: 
ffff8a81`acf5c6c8 fffff800`67a07169     : 00000000`0000000a ffffac04`b78f3938 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8a81`acf5c6d0 fffff800`67a03469     : fffff800`6cb18230 00000000`00000001 00000000`00000010 ffff8a81`acf5c9a0 : nt!KiBugCheckDispatch+0x69
ffff8a81`acf5c810 fffff800`6c3c469e     : ffffac0c`c073b450 ffffac0c`c0774010 ffffac0c`bcf70330 00000000`00000000 : nt!KiPageFault+0x469
ffff8a81`acf5c9a0 fffff800`6c991b24     : 00000000`00000002 00000000`00000000 00000000`00000001 00000000`00000002 : ndis!NdisReturnNetBufferLists+0x2ce
ffff8a81`acf5cad0 fffff800`6c535b63     : ffffac0c`baadf9f0 00000000`00000000 ffffac0c`00000001 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xd4
ffff8a81`acf5cb30 fffff800`6c933172     : ffffac0c`b7bb1660 00000000`00000001 ffffac0c`baab89f0 ffffac0c`b58732e0 : NETIO!NetioDereferenceNetBufferListChain+0x103
ffff8a81`acf5cbb0 fffff800`6c93174e     : ffffac0c`b5a3ed00 ffffac0c`c49ff040 ffffac0c`00000002 00000000`00000000 : tcpip!TcpReceive+0x442
ffff8a81`acf5cca0 fffff800`6c943999     : 00000000`00000000 00000000`00000001 ffffac0c`baab9510 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
ffff8a81`acf5cce0 fffff800`6c99e57e     : ffffac0c`b97f8210 ffffac0c`b7bb1660 fffff800`6c991a06 ffff8a81`acf5d200 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
ffff8a81`acf5cf70 fffff800`6780d468     : ffffac0c`b5a76de0 00000000`00000002 ffffac0c`b71b4040 ffff8a81`acf5d268 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
ffff8a81`acf5d0c0 fffff800`6780d3dd     : fffff800`6c99e450 ffff8a81`acf5d268 ffffac0c`b586e1a0 fffff800`6c5323af : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8a81`acf5d130 fffff800`6c9915ed     : 00000000`00000000 00000000`00000000 ffffac0c`beb0c2c0 fffff800`6cc1142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff8a81`acf5d170 fffff800`6c990ccd     : 00000000`00000001 ffff8a81`acf5d2d0 ffffac0c`b7bb1660 ffffac0c`baadf9f0 : tcpip!NetioExpandKernelStackAndCallout+0x8d
ffff8a81`acf5d1d0 fffff800`6c3c1eb0     : ffffac0c`b78f3921 00000000`00000002 ffffac0c`bacd3e30 ffff8a81`acf5d5e0 : tcpip!FlReceiveNetBufferListChain+0x46d
ffff8a81`acf5d480 fffff800`6c3c1ccb     : ffffac0c`b7962460 00000000`00000001 ffff8a81`00000000 33333333`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
ffff8a81`acf5d560 fffff800`6c3c7ef0     : ffffac0c`b78d91a0 ffffac0c`baab8901 ffffac0c`b78d91a0 ffffffff`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
ffff8a81`acf5d5e0 fffff800`6c3fdee3     : ffffac0c`baab89f0 ffff8a81`acf5d6b1 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
ffff8a81`acf5d630 fffff800`6c3c4a94     : 00000000`006c5aa2 00000000`00000001 ffffac0c`b78d91a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
ffff8a81`acf5d700 fffff800`75878017     : fffff800`6bbb2b30 fffff800`6bbb2b30 ffff8a81`acf5d890 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffff8a81`acf5d790 fffff800`6bbb2b2f     : fffff800`6bbb2b30 ffff8a81`acf5d890 00000000`00000000 00000000`00000001 : rt640x64+0x28017
ffff8a81`acf5d798 fffff800`6bbb2b2f     : ffff8a81`acf5d890 00000000`00000000 00000000`00000001 00000000`00000000 : Wdf01000!imp_WdfSpinLockAcquire+0xbf
ffff8a81`acf5d7a0 ffff8a81`acf5d890     : 00000000`00000000 00000000`00000001 00000000`00000000 00000002`00000001 : Wdf01000!imp_WdfSpinLockAcquire+0xbf
ffff8a81`acf5d7a8 00000000`00000000     : 00000000`00000001 00000000`00000000 00000002`00000001 80000000`00000002 : 0xffff8a81`acf5d890


SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferListChain+103

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  103

FAILURE_BUCKET_ID:  AV_NETIO!NetioDereferenceNetBufferListChain

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b14cf127-5933-4e45-71a8-f23e2243d43b}

Followup:     MachineOwner
---------
 
Çözüm
Windows güncel değil, 2004 sürümünü kullanıyorsunuz. İsteğe bağlı güncelleştirmeler altında "Windows 10 sürüm 20H2 güncellemesi" tarzı bir şey olacak, onu yapın. Wi-Fi kullanmıyorsanız adaptörü çıkarın. Ethernet sürücüsü kilit nokta, attığım linkten güncelleyin.
 
Windows güncel değil, 2004 sürümünü kullanıyorsunuz. İsteğe bağlı güncelleştirmeler altında "Windows 10 sürüm 20H2 güncellemesi" tarzı bir şey olacak, onu yapın. Wi-Fi kullanmıyorsanız adaptörü çıkarın. Ethernet sürücüsü kilit nokta, attığım linkten güncelleyin.

20H2 sürücüne güncelledim. ekran kartı sürücüsünü güncelledim. Wi-Fi adaptörü çıkarmak ne oluyor tam olarak, ben bu cihazı Wi-Fi'yle internete bağla miyim? Donanım kimliği ile sürücü bulmayı tam anlayamadım.
 
Son düzenleme:
Sorularıma verdiğiniz cevaplardan Wi-Fi adaptörünüzün olduğunu ama kullanmadığınızı çıkarmıştım. Yoksa, sorun da yok. Yalnız ekran kartının sürücüsünün ne alaka olduğunu anlayabilmiş değilim, ben ethernet sürücüsü için link vermiştim. Kurmadıysanız onu da kurun.

Dediğim her şeyi tamamladığınızda sistemi birkaç gün kullanın, yine mavi ekran alacak mısınız diye bakın. Alırsanız, oluşan yeni dosyaları paylaşın. Almazsanız sorun çözülmüştür.
 

Geri
Yukarı