Çözüldü KERNEL_SECURITY_CHECK_FAILURE hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

Berkay Keleş

Hectopat
Katılım
20 Ocak 2021
Mesajlar
231
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Arkadaşlar, bilgisayarı yeni aldım ve her 1-2 günde bir durduk yere mavi ekran veriyor. Sebebi hakkında bir fikrim yok. Başka mavi ekran hatası alanlara verdiğiniz cevaplara göre minidump dosyalarını istiyormuşsunuz fakat nasıl atacağımı bilmiyorum ama fotoğrafını şöyle bırakayım. (Ekran kartı güncel.)

resim_2021-01-20_144510.png
 
Çözüm
Biraz geç dönüş yapıyorum fakat bu sorunu internetten araştırdığımda sorunu yaşayanları görmüştüm, ama hiçbiri çözüm bulamamıştı. Şimdi ben sizlere sürecimi anlatacağım. GameGaraj garantisine bilgisayarımı 4. sefer gönderişimdeki yetkili bilgisayarımdaki mavi ekran sorununu format atarken yaşadığını söyledi. O da RAM'lerimi değiştirip tekrar format atmış ve yine yaşamış. Ardından CPU'mu değiştirmiş ve 6 kere format atmasına rağmen sorun yaşanmamış. Bilgisayarım şu anda elimde ve 1 aydır sapasağlam çalışmakta. Eğer sizde böyle bir sorun yaşıyorsanız ve garantidekiler biz görmedik hatayı diyorlarsa işlemcinin değiştirilmesi için ısrar edin. 15 sayfalık tartışmamızda bana yardım etmeye çalışan herkese çok çok teşekkür ederim.
1152921505693206924 olanı yükle.

Wifi adaptörünü çıkart kullanma yazılımlarını da sil. Ethernet ile bağlan bundan sonra.

Opera kullanma kaldır. İmzamdan KIS 2021 indir sistemi tam tarama yap. Güvenlik açığı taraması yap sonuçları paylaş.

Hosts dosyasını orj. ile değiştir.

CS GO kaldır, kullanıyorsan yeniden yükle.
 
1152921505693206924 olanı yükle.

Wi-Fi adaptörünü çıkart kullanma yazılımlarını da sil. Ethernet ile bağlan bundan sonra.

Opera kullanma kaldır. İmzamdan kıs 2021 indir sistemi tam tarama yap. Güvenlik açığı taraması yap sonuçları paylaş.

Hosts dosyasını orj. İle değiştir.

CS:GO kaldır, kullanıyorsan yeniden yükle.

Dediğiniz driveri yükledim.
Adaptör ile ilgili dediklerinizi gün içinde deneyeceğim.
Opera'yı kaldırdım. KIS 2021 testi yaptım fotoğrafını koydum.
Hosts dosyasını açtım fakat nasıl orj. İle değiştireceğim anlayamadım tam olarak araştırdım ve bulamadım yine.
CS:GO'yu kaldırdım geri yükleyeceğim.
1152921505693206924 olanı yükle.

Wi-Fi adaptörünü çıkart kullanma yazılımlarını da sil. Ethernet ile bağlan bundan sonra.

Opera kullanma kaldır. İmzamdan kıs 2021 indir sistemi tam tarama yap. Güvenlik açığı taraması yap sonuçları paylaş.

Hosts dosyasını orj. İle değiştir.

CS:GO kaldır, kullanıyorsan yeniden yükle.

@Murat5038 hocam Ethernet kablosuna geçtim. Hosts dosyasını nasıl orj. Yapacağım? Eğer mavi ekran yersem bilgilendiririm.
Hocam ethernet kablosuylayım yine yaşandı. 031721-10140-01.rar

Ethernet kablosuna geçtim yine yaşandı.
Bütün parçalarım testten geçti, sağlamlar.
Bana hosts dosyasını orijinal yapmam önerilmişti ama ne demek, nasıl yapılır bilmiyorum. 2 konuda da yardımcı olursanız sevinirim.
@Murat5038 bakmıştınız hocam.
Not: Şu güne kadar ilk defa şimdi oyun içerisinde mavi ekran yaşadım.
 

Dosya Ekleri

  • foto1.PNG
    foto1.PNG
    20,6 KB · Görüntüleme: 46
Arkadaşım sen bu zamana dediklerimizin birini bile olsa yaptın mı acaba? O kadar yardım ettik, yap dediklerimizi yapmanı istedik ama birini bile demek ki yapmamışsın ki sorun hala devam ediyor.

Hocam gerçekten yardımcı oldunuz fakat nasıl yapacağımı bilmiyorum internette de bulamadım yoksa niye yapmayayım.
Teknoloji konusunda çok aptalım.
Eğer anlatabilirseniz çok mutlu olurum.
Arkadaşım sen bu zamana dediklerimizin birini bile olsa yaptın mı acaba? O kadar yardım ettik, yap dediklerimizi yapmanı istedik ama birini bile demek ki yapmamışsın ki sorun hala devam ediyor.

Hocam ayrıca dediğiniz her şeyi uyguladım dump dosyalarında görünüyor olması gerekli.
Bu sorunun sadece video izlerken 1 saat aralıklarla yaşanması çok garibime gidiyor. Oyun oynarken yaşanmıyor.
 
  • İlk iş başka bir ekran kartı ile dene.
  • İkincisi, güncel Memtest86 9.0 ile bellek testi yap ve sonucu paylaş.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffd01dac4c730, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffd01dac4c688, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2921

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5111

    Key  : Analysis.Init.CPU.mSec
    Value: 531

    Key  : Analysis.Init.Elapsed.mSec
    Value: 6311

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffffd01dac4c730

BUGCHECK_P3: fffffd01dac4c688

BUGCHECK_P4: 0

TRAP_FRAME:  fffffd01dac4c730 -- (.trap 0xfffffd01dac4c730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffd01dac4ca88 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff80774e074b8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80774e5ff9c rsp=fffffd01dac4c8c0 rbp=ffffc4012cf40180
 r8=fffffd01dac4c9c8  r9=0000000000000001 r10=ffff980bb9070110
r11=00007fffffff0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!IopQueueIrpToFileObject+0x171f3c:
fffff807`74e5ff9c cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffffd01dac4c688 -- (.exr 0xfffffd01dac4c688)
ExceptionAddress: fffff80774e5ff9c (nt!IopQueueIrpToFileObject+0x0000000000171f3c)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:  
fffffd01`dac4c408 fffff807`74e07a69     : 00000000`00000139 00000000`00000003 fffffd01`dac4c730 fffffd01`dac4c688 : nt!KeBugCheckEx
fffffd01`dac4c410 fffff807`74e07e90     : ffffc401`00000000 fffff807`74f193ce ffff980b`c989e080 fffffd01`dac4c500 : nt!KiBugCheckDispatch+0x69
fffffd01`dac4c550 fffff807`74e06223     : 00000000`00000008 ffffc401`2cf40180 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffd01`dac4c730 fffff807`74e5ff9c     : 980bc743`5c40b719 00000000`001a019f fffffd01`dac4c8f8 00000175`309368e0 : nt!KiRaiseSecurityCheckFailure+0x323
fffffd01`dac4c8c0 fffff807`74ffd970     : fffffd01`dac4cb80 fffff807`7502b17e ffff980b`d1364b70 00000000`00000000 : nt!IopQueueIrpToFileObject+0x171f3c
fffffd01`dac4c910 fffff807`74fe59b9     : ffff980b`00000000 fffffd01`dac4cb80 00000000`00000000 00000062`871ff7c0 : nt!IopSynchronousServiceTail+0x2a0
fffffd01`dac4c9b0 fffff807`74e074b8     : ffff980b`00000000 00000000`00000000 00000000`00000000 00000175`309368e0 : nt!NtReadFile+0x599
fffffd01`dac4ca90 00007ff8`fa4ec6e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000062`871ff738 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`fa4ec6e4


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffdf0f108dd560, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffdf0f108dd4b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 2431

    Key  : Analysis.Init.CPU.mSec
    Value: 390

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4223

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffdf0f108dd560

BUGCHECK_P3: ffffdf0f108dd4b8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffdf0f108dd560 -- (.trap 0xffffdf0f108dd560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbe864319b1a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffbe864319b1a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80571e35e6f rsp=ffffdf0f108dd6f0 rbp=0000000375f56a41
 r8=0000000375f56a41  r9=fffff80571a00000 r10=fffff8056f9d8ac0
r11=ffffdf0f108dd800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
nt!KiInsertTimerTable+0x1cf1ef:
fffff805`71e35e6f cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffdf0f108dd4b8 -- (.exr 0xffffdf0f108dd4b8)
ExceptionAddress: fffff80571e35e6f (nt!KiInsertTimerTable+0x00000000001cf1ef)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffdf0f`108dd238 fffff805`71e07a69     : 00000000`00000139 00000000`00000003 ffffdf0f`108dd560 ffffdf0f`108dd4b8 : nt!KeBugCheckEx
ffffdf0f`108dd240 fffff805`71e07e90     : 00000000`0000003f 00000000`0000003f 00000000`00000008 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffdf0f`108dd380 fffff805`71e06223     : ffffbe86`3fd41080 ffffdf0f`108dd500 00000000`00000000 fffff805`71dfc806 : nt!KiFastFailDispatch+0xd0
ffffdf0f`108dd560 fffff805`71e35e6f     : ffffdf0f`108dd710 ffffdf0f`108dd708 00000000`0000003f 00000000`0000003f : nt!KiRaiseSecurityCheckFailure+0x323
ffffdf0f`108dd6f0 fffff805`71c64fed     : ffffbe86`4319b080 fffff805`8252d272 00000000`00000000 ffffbe86`00000000 : nt!KiInsertTimerTable+0x1cf1ef
ffffdf0f`108dd770 fffff805`71c686b3     : ffffbe86`0000007d ffffbe86`00000000 00000000`00000001 00000000`00000001 : nt!KiCommitThreadWait+0x3bd
ffffdf0f`108dd810 fffff805`71c680e8     : ffffbe86`40e7fec0 00000000`00000001 ffffbe86`444dea30 fffff805`00000002 : nt!KeRemoveQueueEx+0x263
ffffdf0f`108dd8b0 fffff805`720b7e9d     : 00000000`00000000 00000000`00000000 ffff9480`639ea180 fffff805`71c4a31a : nt!IoRemoveIoCompletion+0x98
ffffdf0f`108dd9e0 fffff805`71e074b8     : ffffbe86`4319b080 000000da`9c9ff618 ffffdf0f`108ddaa8 00000239`4730a960 : nt!NtRemoveIoCompletion+0x13d
ffffdf0f`108dda90 00007ffa`ab46c744     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000da`9c9ff5f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ab46c744


SYMBOL_NAME:  nt!KiInsertTimerTable+1cf1ef

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1cf1ef

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffb18072033158, Virtual address for the attempted execute.
Arg2: 81000001ce712963, PTE contents.
Arg3: ffffeb07f3adf5e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2531

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4224

    Key  : Analysis.Init.CPU.mSec
    Value: 484

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9342

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  fc

BUGCHECK_P1: ffffb18072033158

BUGCHECK_P2: 81000001ce712963

BUGCHECK_P3: ffffeb07f3adf5e0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

TRAP_FRAME:  ffffeb07f3adf5e0 -- (.trap 0xffffeb07f3adf5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffda8c53802228 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000da rsi=0000000000000000 rdi=0000000000000000
rip=ffffb18072033158 rsp=ffffeb07f3adf770 rbp=ffffc480a6140180
 r8=00000001000000ed  r9=ffffc480a6350180 r10=ffffda8c4ea75300
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffffb180`72033158 8831            mov     byte ptr [rcx],dh ds:00000000`00000000=??
Resetting default scope

STACK_TEXT:  
ffffeb07`f3adf2f8 fffff800`232718f0     : 00000000`000000fc ffffb180`72033158 81000001`ce712963 ffffeb07`f3adf5e0 : nt!KeBugCheckEx
ffffeb07`f3adf300 fffff800`2302aed6     : ffffb180`72033158 ffffeb07`f3adf500 00000000`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x159368
ffffeb07`f3adf340 fffff800`2300c960     : 3ed3950e`c7f71438 00000000`00000011 ffffeb07`f3adf660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffeb07`f3adf440 fffff800`23203c5e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffeb07`f3adf5e0 ffffb180`72033158     : ffffb180`00000002 fffff800`00000005 00000000`00000000 ffffda8c`00000000 : nt!KiPageFault+0x35e
ffffeb07`f3adf770 ffffb180`00000002     : fffff800`00000005 00000000`00000000 ffffda8c`00000000 ffffb180`00000000 : 0xffffb180`72033158
ffffeb07`f3adf778 fffff800`00000005     : 00000000`00000000 ffffda8c`00000000 ffffb180`00000000 ffffda8c`534533b0 : 0xffffb180`00000002
ffffeb07`f3adf780 00000000`00000000     : ffffda8c`00000000 ffffb180`00000000 ffffda8c`534533b0 ffffc480`00000000 : 0xfffff800`00000005


SYMBOL_NAME:  nt!MiCheckSystemNxFault+159368

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  159368

FAILURE_BUCKET_ID:  0xFC_nt!MiCheckSystemNxFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup:     MachineOwner
---------

KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000011, Type of corruption detected
Arg2: ffff9902ae010100, Address of the heap that reported the corruption
Arg3: ffff9902b8c0b180, Address at which the corruption was detected
Arg4: 0000000000000000

Debugging Details:
------------------

fffff8015c8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
HeapDbgInitExtension Failed
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5593

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7511

    Key  : Analysis.Init.CPU.mSec
    Value: 468

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2965

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  13a

BUGCHECK_P1: 11

BUGCHECK_P2: ffff9902ae010100

BUGCHECK_P3: ffff9902b8c0b180

BUGCHECK_P4: 0

POOL_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff9902b8c0b180

FREED_POOL_TAG:  NpFR

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

IRP_ADDRESS: ffff9902bc31d788

STACK_TEXT:  
ffffef86`3fe06588 fffff801`5c18da88     : 00000000`0000013a 00000000`00000011 ffff9902`ae010100 ffff9902`b8c0b180 : nt!KeBugCheckEx
ffffef86`3fe06590 fffff801`5c18dae8     : 00000000`00000011 00000000`00000000 ffff9902`ae010100 00000000`00000000 : nt!RtlpHeapHandleError+0x40
ffffef86`3fe065d0 fffff801`5c18d715     : 00000000`00000080 ffff9902`b8c02000 00000000`00000000 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58
ffffef86`3fe06600 fffff801`5c025fae     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
ffffef86`3fe06630 fffff801`5be4caf2     : ffff9902`ae010340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x1ed85e
ffffef86`3fe066e0 fffff801`5c5b1019     : 00000000`00000000 ffff9902`bc4911b0 ffff9902`b6c941c0 01000000`00100000 : nt!ExFreeHeapPool+0x362
ffffef86`3fe067c0 fffff801`5be4984e     : 00000000`00000000 00000000`00000000 ffff9902`b6c94080 fffff801`5be686b3 : nt!ExFreePool+0x9
ffffef86`3fe067f0 fffff801`5be683e3     : ffff9902`bc31d800 00000000`00000001 ffff9902`bcf800d0 ffff9902`bcf800c0 : nt!IopCompleteRequest+0x8e
ffffef86`3fe068b0 fffff801`5c2b7ebd     : 00000000`00000000 00000000`00000000 ffffa900`7adea180 fffff801`5be4a31a : nt!IoRemoveIoCompletion+0x393
ffffef86`3fe069e0 fffff801`5c0075b8     : ffff9902`b6c94080 000000bb`cffff878 ffffef86`3fe06aa8 000066b0`0042a9e8 : nt!NtRemoveIoCompletion+0x13d
ffffef86`3fe06a90 00007ff8`c708cd34     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bb`cffff858 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c708cd34


SYMBOL_NAME:  nt!RtlpHeapHandleError+40

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  40

FAILURE_BUCKET_ID:  0x13a_11_NpFR_nt!RtlpHeapHandleError

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fb64e459-d0f8-9b93-8910-770f3e5ecf0d}

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8003895a266, Address of the instruction which caused the bugcheck
Arg3: ffffc7819a592920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2656

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4752

    Key  : Analysis.Init.CPU.mSec
    Value: 593

    Key  : Analysis.Init.Elapsed.mSec
    Value: 25644

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8003895a266

BUGCHECK_P3: ffffc7819a592920

BUGCHECK_P4: 0

CONTEXT:  ffffc7819a592920 -- (.cxr 0xffffc7819a592920)
rax=ffffa10a44e07be8 rbx=ffffa10a446de080 rcx=a10a44e07bb0b06b
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffa10a44e07be0
rip=fffff8003895a266 rsp=ffffc68d79ef4940 rbp=ffffc68d79ef4a01
 r8=0000000000000000  r9=000000260630757e r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=a10a44e07bb0b06b
r14=0000000000000000 r15=ffffa10a446de1c0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!KeAbPreWait+0x6:
fffff800`3895a266 0fb64120        movzx   eax,byte ptr [rcx+20h] ds:002b:a10a44e0`7bb0b08b=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT:  
ffffc68d`79ef4940 fffff800`38a34951     : 00000000`0000008b fffff800`38c2b3e1 ffffffff`ffffff01 ffffa10a`446de1c0 : nt!KeAbPreWait+0x6
ffffc68d`79ef4970 fffff800`38c2cb01     : ffffa10a`44e07be0 00000000`00000006 00000000`00000001 ffffa10a`00000000 : nt!KeWaitForSingleObject+0x1d0561
ffffc68d`79ef4a60 fffff800`38c2cbaa     : ffffa10a`446de080 00000000`00000000 00000000`00000000 00000000`21eff96c : nt!ObWaitForSingleObject+0x91
ffffc68d`79ef4ac0 fffff800`38a075b8     : ffffa10a`446de080 ffffa10a`44974080 ffffc68d`79ef4b18 ffffffff`ffff3cb0 : nt!NtWaitForSingleObject+0x6a
ffffc68d`79ef4b00 00000000`771f1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1367f218 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771f1cfc


SYMBOL_NAME:  nt!KeAbPreWait+6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .cxr 0xffffc7819a592920 ; kb

BUCKET_ID_FUNC_OFFSET:  6

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!KeAbPreWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9ca4a719-6b4f-fb47-f634-e80e5eda3be8}

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8085e820d560, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8085e820d4b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2515

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6257

    Key  : Analysis.Init.CPU.mSec
    Value: 577

    Key  : Analysis.Init.Elapsed.mSec
    Value: 23311

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff8085e820d560

BUGCHECK_P3: ffff8085e820d4b8

BUGCHECK_P4: 0

TRAP_FRAME:  ffff8085e820d560 -- (.trap 0xffff8085e820d560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd181dbecb1a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd181dbecb1a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80520a35e6f rsp=ffff8085e820d6f0 rbp=000000028c59d294
 r8=000000028c59d294  r9=fffff80520600000 r10=fffff8051dba4ac0
r11=ffff8085e820d800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiInsertTimerTable+0x1cf1ef:
fffff805`20a35e6f cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff8085e820d4b8 -- (.exr 0xffff8085e820d4b8)
ExceptionAddress: fffff80520a35e6f (nt!KiInsertTimerTable+0x00000000001cf1ef)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:  
ffff8085`e820d238 fffff805`20a07a69     : 00000000`00000139 00000000`00000003 ffff8085`e820d560 ffff8085`e820d4b8 : nt!KeBugCheckEx
ffff8085`e820d240 fffff805`20a07e90     : 000de1ba`0000ffff 00000000`000000ff 00000000`ffffffff 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8085`e820d380 fffff805`20a06223     : ffffd181`db9a5080 ffff8085`e820d500 00000000`00000000 fffff805`209fc806 : nt!KiFastFailDispatch+0xd0
ffff8085`e820d560 fffff805`20a35e6f     : ffff8085`e820d710 ffff8085`e820d708 00000000`0000003f 00000000`0000003f : nt!KiRaiseSecurityCheckFailure+0x323
ffff8085`e820d6f0 fffff805`20864fed     : ffffd181`dbecb080 fffff805`3168d272 00000000`00000000 ffffd181`00000000 : nt!KiInsertTimerTable+0x1cf1ef
ffff8085`e820d770 fffff805`208686b3     : ffffd181`00000016 ffffd181`00000000 00000000`00000001 00000000`00000001 : nt!KiCommitThreadWait+0x3bd
ffff8085`e820d810 fffff805`208680e8     : ffffd181`dbe18a00 00000000`00000001 ffffd181`de8161f0 fffff805`00000002 : nt!KeRemoveQueueEx+0x263
ffff8085`e820d8b0 fffff805`20cb7e9d     : 00000000`00000000 00000000`00000000 fffff805`1dba1180 fffff805`2084a31a : nt!IoRemoveIoCompletion+0x98
ffff8085`e820d9e0 fffff805`20a074b8     : ffffd181`dbecb080 00000044`6a25f358 ffff8085`e820daa8 00000237`84172620 : nt!NtRemoveIoCompletion+0x13d
ffff8085`e820da90 00007fff`a92ec744     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000044`6a25f338 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a92ec744


SYMBOL_NAME:  nt!KiInsertTimerTable+1cf1ef

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1cf1ef

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff983c3efb810, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff983c3efb768, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2609

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11020

    Key  : Analysis.Init.CPU.mSec
    Value: 593

    Key  : Analysis.Init.Elapsed.mSec
    Value: 21186

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff983c3efb810

BUGCHECK_P3: fffff983c3efb768

BUGCHECK_P4: 0

TRAP_FRAME:  fffff983c3efb810 -- (.trap 0xfffff983c3efb810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd489e0080158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc20041f47d80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800038127b0 rsp=fffff983c3efb9a0 rbp=fffff80001509180
 r8=0000000000000000  r9=0000000000000000 r10=0000fffff8000300
r11=ffffa2000a10a8c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiTryUnwaitThread+0x1c6460:
fffff800`038127b0 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff983c3efb768 -- (.exr 0xfffff983c3efb768)
ExceptionAddress: fffff800038127b0 (nt!KiTryUnwaitThread+0x00000000001c6460)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:  
fffff983`c3efb4e8 fffff800`03807a69     : 00000000`00000139 00000000`00000003 fffff983`c3efb810 fffff983`c3efb768 : nt!KeBugCheckEx
fffff983`c3efb4f0 fffff800`03807e90     : 00000000`00000000 00000000`00000005 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff983`c3efb630 fffff800`03806223     : 00000000`c3000001 00000001`00000000 ffffd489`dfb19080 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff983`c3efb810 fffff800`038127b0     : 00000000`0000a292 fffff800`03a2b3c1 00000000`00000000 fffff983`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff983`c3efb9a0 fffff800`0364a388     : ffffd489`dac0c5e0 00000000`00000000 fffff800`01509180 00000000`00000000 : nt!KiTryUnwaitThread+0x1c6460
fffff983`c3efba00 fffff800`039fb17d     : 00000000`00000000 fffff983`c3efbb80 00000000`1aa7e798 ffffd489`e00801c0 : nt!KeSetEvent+0x158
fffff983`c3efba90 fffff800`038074b8     : ffffd489`de78a080 ffffd489`e29e2560 fffff983`00000000 ffffd489`00000000 : nt!NtSetEvent+0xbd
fffff983`c3efbb00 00000000`77e41cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1aa7f088 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77e41cfc


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffdf0f108dd560, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffdf0f108dd4b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2531

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7420

    Key  : Analysis.Init.CPU.mSec
    Value: 484

    Key  : Analysis.Init.Elapsed.mSec
    Value: 19118

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffdf0f108dd560

BUGCHECK_P3: ffffdf0f108dd4b8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffdf0f108dd560 -- (.trap 0xffffdf0f108dd560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbe864319b1a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffbe864319b1a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80571e35e6f rsp=ffffdf0f108dd6f0 rbp=0000000375f56a41
 r8=0000000375f56a41  r9=fffff80571a00000 r10=fffff8056f9d8ac0
r11=ffffdf0f108dd800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
nt!KiInsertTimerTable+0x1cf1ef:
fffff805`71e35e6f cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffdf0f108dd4b8 -- (.exr 0xffffdf0f108dd4b8)
ExceptionAddress: fffff80571e35e6f (nt!KiInsertTimerTable+0x00000000001cf1ef)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:  
ffffdf0f`108dd238 fffff805`71e07a69     : 00000000`00000139 00000000`00000003 ffffdf0f`108dd560 ffffdf0f`108dd4b8 : nt!KeBugCheckEx
ffffdf0f`108dd240 fffff805`71e07e90     : 00000000`0000003f 00000000`0000003f 00000000`00000008 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffdf0f`108dd380 fffff805`71e06223     : ffffbe86`3fd41080 ffffdf0f`108dd500 00000000`00000000 fffff805`71dfc806 : nt!KiFastFailDispatch+0xd0
ffffdf0f`108dd560 fffff805`71e35e6f     : ffffdf0f`108dd710 ffffdf0f`108dd708 00000000`0000003f 00000000`0000003f : nt!KiRaiseSecurityCheckFailure+0x323
ffffdf0f`108dd6f0 fffff805`71c64fed     : ffffbe86`4319b080 fffff805`8252d272 00000000`00000000 ffffbe86`00000000 : nt!KiInsertTimerTable+0x1cf1ef
ffffdf0f`108dd770 fffff805`71c686b3     : ffffbe86`0000007d ffffbe86`00000000 00000000`00000001 00000000`00000001 : nt!KiCommitThreadWait+0x3bd
ffffdf0f`108dd810 fffff805`71c680e8     : ffffbe86`40e7fec0 00000000`00000001 ffffbe86`444dea30 fffff805`00000002 : nt!KeRemoveQueueEx+0x263
ffffdf0f`108dd8b0 fffff805`720b7e9d     : 00000000`00000000 00000000`00000000 ffff9480`639ea180 fffff805`71c4a31a : nt!IoRemoveIoCompletion+0x98
ffffdf0f`108dd9e0 fffff805`71e074b8     : ffffbe86`4319b080 000000da`9c9ff618 ffffdf0f`108ddaa8 00000239`4730a960 : nt!NtRemoveIoCompletion+0x13d
ffffdf0f`108dda90 00007ffa`ab46c744     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000da`9c9ff5f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ab46c744


SYMBOL_NAME:  nt!KiInsertTimerTable+1cf1ef

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1cf1ef

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8075ab55a25, Address of the instruction which caused the bugcheck
Arg3: fffff8075e6c4920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3343

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 17879

    Key  : Analysis.Init.CPU.mSec
    Value: 562

    Key  : Analysis.Init.Elapsed.mSec
    Value: 16545

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8075ab55a25

BUGCHECK_P3: fffff8075e6c4920

BUGCHECK_P4: 0

CONTEXT:  fffff8075e6c4920 -- (.cxr 0xfffff8075e6c4920)
rax=ffffc1839dd05378 rbx=ffffc1839dd52080 rcx=ffffc183983f8080
rdx=c1838fe59eb05e65 rsi=ffffc1839dd52378 rdi=ffffc1839dd52080
rip=fffff8075ab55a25 rsp=ffffd30ef7e676d0 rbp=ffffc183983f8080
 r8=0000000000000001  r9=0000000000000000 r10=0000fffff8075ab6
r11=ffff87f934c00000 r12=0000000000000002 r13=0000000000000001
r14=ffffc183983f8080 r15=0000000000000001
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nt!KeTerminateThread+0x9d:
fffff807`5ab55a25 48397208        cmp     qword ptr [rdx+8],rsi ds:002b:c1838fe5`9eb05e6d=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT:  
ffffd30e`f7e676d0 fffff807`5af069a9     : ffffc183`9dd524b8 00000000`00000000 ffffd30e`f7e67920 00000000`00000000 : nt!KeTerminateThread+0x9d
ffffd30e`f7e67760 fffff807`5aed2868     : 00000000`40010004 00000000`00000000 00000000`00004438 00000000`421aa000 : nt!PspExitThread+0x489
ffffd30e`f7e67860 fffff807`5aa67fb7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffd30e`f7e678a0 fffff807`5abfa020     : 00000000`00000002 ffffd30e`f7e67950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffffd30e`f7e67950 fffff807`5ac0755f     : 00000000`4debf310 ffffc183`9dd52080 00000000`4debf328 ffffd30e`f7e67aa8 : nt!KiInitiateUserApc+0x70
ffffd30e`f7e67a90 00000000`77281cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`4debf308 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77281cfc


SYMBOL_NAME:  nt!KeTerminateThread+9d

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .cxr 0xfffff8075e6c4920 ; kb

BUCKET_ID_FUNC_OFFSET:  9d

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!KeTerminateThread

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fda1cdc8-9131-aeee-19ba-1ee82538d84d}
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffc987bf0a98f8, Virtual address for the attempted execute.
Arg2: 81000001d7ea3963, PTE contents.
Arg3: ffffdc8f18aca5e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2937

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12863

    Key  : Analysis.Init.CPU.mSec
    Value: 593

    Key  : Analysis.Init.Elapsed.mSec
    Value: 14105

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  fc

BUGCHECK_P1: ffffc987bf0a98f8

BUGCHECK_P2: 81000001d7ea3963

BUGCHECK_P3: ffffdc8f18aca5e0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

TRAP_FRAME:  ffffdc8f18aca5e0 -- (.trap 0xffffdc8f18aca5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffde098f607138 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000019 rsi=0000000000000000 rdi=0000000000000000
rip=ffffc987bf0a98f8 rsp=ffffdc8f18aca770 rbp=ffff870075140180
 r8=0000000100000143  r9=ffff870075140180 r10=ffffde098a666340
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffffc987`bf0a98f8 28990abf87c9    sub     byte ptr [rcx-367840F6h],bl ds:ffffffff`c987bf0a=??
Resetting default scope

STACK_TEXT:  
ffffdc8f`18aca2f8 fffff806`7b4718f0     : 00000000`000000fc ffffc987`bf0a98f8 81000001`d7ea3963 ffffdc8f`18aca5e0 : nt!KeBugCheckEx
ffffdc8f`18aca300 fffff806`7b22aed6     : ffffc987`bf0a98f8 ffffdc8f`18aca500 ffffdc8f`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x159368
ffffdc8f`18aca340 fffff806`7b20c960     : 00000000`00000000 00000000`00000011 ffffdc8f`18aca660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffdc8f`18aca440 fffff806`7b403c5e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffdc8f`18aca5e0 ffffc987`bf0a98f8     : ffffc987`00000002 fffff806`00000003 00000000`00000000 ffffde09`00000000 : nt!KiPageFault+0x35e
ffffdc8f`18aca770 ffffc987`00000002     : fffff806`00000003 00000000`00000000 ffffde09`00000000 ffffc987`00000000 : 0xffffc987`bf0a98f8
ffffdc8f`18aca778 fffff806`00000003     : 00000000`00000000 ffffde09`00000000 ffffc987`00000000 ffffde09`8f58db00 : 0xffffc987`00000002
ffffdc8f`18aca780 00000000`00000000     : ffffde09`00000000 ffffc987`00000000 ffffde09`8f58db00 ffff8700`00000000 : 0xfffff806`00000003


SYMBOL_NAME:  nt!MiCheckSystemNxFault+159368

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  159368

FAILURE_BUCKET_ID:  0xFC_nt!MiCheckSystemNxFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a6ae5288-6b71-974a-9b09-23f14d998164}
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe585c1909560, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe585c19094b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2577

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6325

    Key  : Analysis.Init.CPU.mSec
    Value: 624

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11490

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffe585c1909560

BUGCHECK_P3: ffffe585c19094b8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffe585c1909560 -- (.trap 0xffffe585c1909560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd586768451e0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd586768451e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80626435e6f rsp=ffffe585c19096f0 rbp=00000007eeb5b724
 r8=00000007eeb5b724  r9=fffff80626000000 r10=fffff80623860ac0
r11=ffffe585c1909800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiInsertTimerTable+0x1cf1ef:
fffff806`26435e6f cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffe585c19094b8 -- (.exr 0xffffe585c19094b8)
ExceptionAddress: fffff80626435e6f (nt!KiInsertTimerTable+0x00000000001cf1ef)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:  
ffffe585`c1909238 fffff806`26407a69     : 00000000`00000139 00000000`00000003 ffffe585`c1909560 ffffe585`c19094b8 : nt!KeBugCheckEx
ffffe585`c1909240 fffff806`26407e90     : 00000000`0000003f 00000000`0000003f 00000000`00000008 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffe585`c1909380 fffff806`26406223     : ffffd586`76841080 ffffe585`c1909500 00000000`00000000 fffff806`263fc806 : nt!KiFastFailDispatch+0xd0
ffffe585`c1909560 fffff806`26435e6f     : 00000000`00000000 00000000`c1909708 00000000`00000000 00000000`0000003f : nt!KiRaiseSecurityCheckFailure+0x323
ffffe585`c19096f0 fffff806`26264fed     : ffffd586`768450c0 fffff806`00000000 00000000`00000000 ffffd586`00000000 : nt!KiInsertTimerTable+0x1cf1ef
ffffe585`c1909770 fffff806`262686b3     : ffffd586`000000ad ffffd586`00000000 00000000`00000001 00000000`00000001 : nt!KiCommitThreadWait+0x3bd
ffffe585`c1909810 fffff806`262680e8     : ffffd586`76476b80 00000000`00000001 ffffd586`7acc29e0 fffff806`00000002 : nt!KeRemoveQueueEx+0x263
ffffe585`c19098b0 fffff806`266b7e9d     : 00000000`00000000 00000000`00000000 ffffc381`f5742180 fffff806`2624a31a : nt!IoRemoveIoCompletion+0x98
ffffe585`c19099e0 fffff806`264074b8     : ffffd586`768450c0 000000b6`46bff8e8 ffffe585`c1909aa8 0000021a`b4d69fa0 : nt!NtRemoveIoCompletion+0x13d
ffffe585`c1909a90 00007ff9`be56c744     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b6`46bff8c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`be56c744


SYMBOL_NAME:  nt!KiInsertTimerTable+1cf1ef

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1cf1ef

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000a297a3f0, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8054de773d0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3015

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 15461

    Key  : Analysis.Init.CPU.mSec
    Value: 561

    Key  : Analysis.Init.Elapsed.mSec
    Value: 32580

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: a297a3f0

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8054de773d0

READ_ADDRESS: fffff8054e8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 00000000a297a3f0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffdd0f216374f0 -- (.trap 0xffffdd0f216374f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a297a3f0 rbx=0000000000000000 rcx=0000000000000000
rdx=00000002f649e8dd rsi=0000000000000000 rdi=0000000000000000
rip=fffff8054de773d0 rsp=ffffdd0f21637680 rbp=0000000000000001
 r8=0000000000000001  r9=ffffde8ea4cc6101 r10=0000fffff8054dee
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!KeAcquireSpinLockAtDpcLevel+0x30:
fffff805`4de773d0 f0480fba2b00    lock bts qword ptr [rbx],0 ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:  
ffffdd0f`216373a8 fffff805`4e007a69     : 00000000`0000000a 00000000`a297a3f0 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffdd0f`216373b0 fffff805`4e003d69     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffdd0f`216374f0 fffff805`4de773d0     : ffff9681`6c940180 fffff805`4de72230 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffdd0f`21637680 fffff805`4e161275     : 00000000`00000200 fffffd17`1b07af70 00000002`f649e89e ffffde8e`a4cc6100 : nt!KeAcquireSpinLockAtDpcLevel+0x30
ffffdd0f`216376b0 fffff805`4de70d62     : ffffde8e`a4cc6010 00000000`00000000 ffffde8e`a4cc6010 00000002`f649e89e : nt!PpmIdleUpdateConcurrency+0x35
ffffdd0f`216376f0 fffff805`4de70154     : 00000000`00000000 00001f80`00f3003b 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xa92
ffffdd0f`21637af0 fffff805`4dff95a4     : ffffffff`00000000 ffff9681`6c94b1c0 ffffde8e`ae16d080 00000000`000006c0 : nt!PoIdle+0x374
ffffdd0f`21637c60 00000000`00000000     : ffffdd0f`21638000 ffffdd0f`21632000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!KeAcquireSpinLockAtDpcLevel+30

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  30

FAILURE_BUCKET_ID:  AV_nt!KeAcquireSpinLockAtDpcLevel

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {83a2e79c-7ee0-6968-f863-105a1ecf5ef5}
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc50c32d4b2a0, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffc50c32d4b2a0, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3140

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 63751

    Key  : Analysis.Init.CPU.mSec
    Value: 687

    Key  : Analysis.Init.Elapsed.mSec
    Value: 412966

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffc50c32d4b2a0

BUGCHECK_P2: 11

BUGCHECK_P3: ffffc50c32d4b2a0

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff80282cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc50c32d4b2a0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffff9001d49fe5e0 -- (.trap 0xffff9001d49fe5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc50c32d131d8 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000005c rsi=0000000000000000 rdi=0000000000000000
rip=ffffc50c32d4b2a0 rsp=ffff9001d49fe770 rbp=ffffb1809ff40180
 r8=00000001000000f0  r9=ffffb1809fbea180 r10=ffffc50c2f9de080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffffc50c`32d4b2a0 a0b2d4320cc5ffffa0 mov   al,byte ptr [A0FFFFC50C32D4B2h] ds:a0ffffc5`0c32d4b2=??
Resetting default scope

STACK_TEXT:  
ffff9001`d49fe338 fffff802`82435de9     : 00000000`00000050 ffffc50c`32d4b2a0 00000000`00000011 ffff9001`d49fe5e0 : nt!KeBugCheckEx
ffff9001`d49fe340 fffff802`82212d00     : ffff9001`d49fe4a0 00000000`00000011 ffff9001`d49fe660 00000000`00000000 : nt!MiSystemFault+0x1ae0e9
ffff9001`d49fe440 fffff802`823ec01e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff9001`d49fe5e0 ffffc50c`32d4b2a0     : ffffc50c`00000002 00000000`00000005 00000000`00000000 ffffb180`00000000 : nt!KiPageFault+0x35e
ffff9001`d49fe770 ffffc50c`00000002     : 00000000`00000005 00000000`00000000 ffffb180`00000000 ffffc50c`2ee2d000 : 0xffffc50c`32d4b2a0
ffff9001`d49fe778 00000000`00000005     : 00000000`00000000 ffffb180`00000000 ffffc50c`2ee2d000 ffffc50c`307b2248 : 0xffffc50c`00000002
ffff9001`d49fe780 00000000`00000000     : ffffb180`00000000 ffffc50c`2ee2d000 ffffc50c`307b2248 ffffc50c`00000000 : 0x5


SYMBOL_NAME:  nt!MiSystemFault+1ae0e9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1ae0e9

FAILURE_BUCKET_ID:  AV_INVALID_nt!MiSystemFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}

Followup:     MachineOwner
---------

3: kd> db ffffc50c32d4b2a0
ffffc50c`32d4b2a0  a0 b2 d4 32 0c c5 ff ff-a0 b2 d4 32 0c c5 ff ff  ...2.......2....
ffffc50c`32d4b2b0  50 1d aa 30 0c c5 ff ff-00 00 00 00 00 00 00 00  P..0............
ffffc50c`32d4b2c0  50 31 d1 32 0c c5 ff ff-50 31 d1 32 0c c5 ff ff  P1.2....P1.2....
ffffc50c`32d4b2d0  00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00  ................
ffffc50c`32d4b2e0  00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00  ................
ffffc50c`32d4b2f0  01 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00  ................
ffffc50c`32d4b300  00 00 00 00 00 00 00 00-ff ff ff ff ff ff ff ff  ................
ffffc50c`32d4b310  00 ff 19 02 46 69 6c 65-ff ff ff ff ff ff ff ff  ....File........
3: kd> !address ffffc50c32d4b2a0
Mapping user range ...
ERROR: !address: extension exception 0x80004005.
    "ExtRemoteTyped::Set from type and offset"
3: kd> u ffffc50c32d4b2a0
ffffc50c`32d4b2a0 a0b2d4320cc5ffffa0 mov   al,byte ptr [A0FFFFC50C32D4B2h]
ffffc50c`32d4b2a9 b2d4            mov     dl,0D4h
ffffc50c`32d4b2ab 320cc5ffff501d  xor     cl,byte ptr [rax*8+1D50FFFFh]
ffffc50c`32d4b2b2 aa              stos    byte ptr [rdi]
ffffc50c`32d4b2b3 300cc5ffff0000  xor     byte ptr [rax*8+0FFFFh],cl
ffffc50c`32d4b2ba 0000            add     byte ptr [rax],al
ffffc50c`32d4b2bc 0000            add     byte ptr [rax],al
ffffc50c`32d4b2be 0000            add     byte ptr [rax],al
3: kd> r
rax=0000000000000000 rbx=ffffc50c32d4b2a0 rcx=0000000000000050
rdx=ffffc50c32d4b2a0 rsi=0000000000000000 rdi=ffff9001d49fe500
rip=fffff802823ddf40 rsp=ffff9001d49fe338 rbp=ffffc50c2ee2d080
 r8=0000000000000011  r9=ffff9001d49fe5e0 r10=0000000000000000
r11=ffff9001d49fe5e0 r12=0000000000000000 r13=ffff800000000000
r14=ffffc50c32d4b2a0 r15=0000000000001000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00040246
nt!KeBugCheckEx:
fffff802`823ddf40 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff9001`d49fe340=0000000000000050

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000018, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000018, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2827

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12097

    Key  : Analysis.Init.CPU.mSec
    Value: 624

    Key  : Analysis.Init.Elapsed.mSec
    Value: 504924

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: 18

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: 18

READ_ADDRESS: fffff80378afa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000018

PROCESS_NAME:  chrome.exe

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  ffffb78f78ab5500 -- (.trap 0xffffb78f78ab5500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd58160140180
rdx=fffff80377e00000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000018 rsp=ffffb78f78ab5690 rbp=0000000000000000
 r8=ffffb78f78ab56c0  r9=ffffd58160140180 r10=000000000000003f
r11=ffffb78f78ab55d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
00000000`00000018 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000018 ??              ???

STACK_TEXT:  
ffffb78f`78ab53b8 fffff803`781efe29     : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffb78f`78ab53c0 fffff803`781ec129     : ffffd581`6014e000 ffffa70c`fd8c2080 00000000`00000000 00000000`00000090 : nt!KiBugCheckDispatch+0x69
ffffb78f`78ab5500 00000000`00000018     : 00000000`00000003 ffffb78f`78ab56c8 ffffb78f`78ab56c0 ffffd581`60140180 : nt!KiPageFault+0x469
ffffb78f`78ab5690 00000000`00000003     : ffffb78f`78ab56c8 ffffb78f`78ab56c0 ffffd581`60140180 ffffd581`60140180 : 0x18
ffffb78f`78ab5698 ffffb78f`78ab56c8     : ffffb78f`78ab56c0 ffffd581`60140180 ffffd581`60140180 fffff803`7820ce76 : 0x3
ffffb78f`78ab56a0 ffffb78f`78ab56c0     : ffffd581`60140180 ffffd581`60140180 fffff803`7820ce76 ffffd581`00000000 : 0xffffb78f`78ab56c8
ffffb78f`78ab56a8 ffffd581`60140180     : ffffd581`60140180 fffff803`7820ce76 ffffd581`00000000 00000000`00000000 : 0xffffb78f`78ab56c0
ffffb78f`78ab56b0 ffffd581`60140180     : fffff803`7820ce76 ffffd581`00000000 00000000`00000000 ffffa70c`fe010100 : 0xffffd581`60140180
ffffb78f`78ab56b8 fffff803`7820ce76     : ffffd581`00000000 00000000`00000000 ffffa70c`fe010100 fffff803`00000000 : 0xffffd581`60140180
ffffb78f`78ab56c0 fffff803`780272cf     : ffffe582`00000002 fffff803`00000004 00000000`00000000 ffffa70d`00000000 : nt!KiSwapThread+0x1e55d6
ffffb78f`78ab5770 fffff803`7802ac03     : ffffa70d`00000000 ffffa70d`00000000 00000000`00000000 00000000`00000001 : nt!KiCommitThreadWait+0x14f
ffffb78f`78ab5810 fffff803`7802a638     : ffffa70d`0b214240 00000000`00000001 ffffa70d`15f72600 fffff803`00000000 : nt!KeRemoveQueueEx+0x263
ffffb78f`78ab58b0 fffff803`784dd26d     : 00000000`00000000 00000000`00000000 ffffd581`60140180 fffff803`7803e2aa : nt!IoRemoveIoCompletion+0x98
ffffb78f`78ab59e0 fffff803`781ef878     : ffffa70d`0ce24080 000000b8`0cfff758 ffffb78f`78ab5aa8 000001f4`cd5518e0 : nt!NtRemoveIoCompletion+0x13d
ffffb78f`78ab5a90 00007fff`365abee4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b8`0cfff738 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`365abee4


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_NULL_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd28282668660, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd282826685b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3014

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6813

    Key  : Analysis.Init.CPU.mSec
    Value: 468

    Key  : Analysis.Init.Elapsed.mSec
    Value: 83598

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd28282668660

BUGCHECK_P3: ffffd282826685b8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd28282668660 -- (.trap 0xffffd28282668660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff990a1d50d6c0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff840170740180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8045722c457 rsp=ffffd282826687f0 rbp=ffffd28282668b80
 r8=0000000000000001  r9=0000000000000000 r10=00000000ffffffff
r11=0000000000000025 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!IopCompleteRequest+0x1e2c97:
fffff804`5722c457 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd282826685b8 -- (.exr 0xffffd282826685b8)
ExceptionAddress: fffff8045722c457 (nt!IopCompleteRequest+0x00000000001e2c97)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

IRP_ADDRESS: ffff990a1c18fb88

EXCEPTION_STR:  0xc0000409

STACK_TEXT:  
ffffd282`82668338 fffff804`57207a69     : 00000000`00000139 00000000`00000003 ffffd282`82668660 ffffd282`826685b8 : nt!KeBugCheckEx
ffffd282`82668340 fffff804`57207e90     : ffffd282`82668571 fffff804`570501c1 ffff990a`0c010340 ffff990a`0c0141c0 : nt!KiBugCheckDispatch+0x69
ffffd282`82668480 fffff804`57206223     : 00000000`00000000 ffff8401`7074b1c0 ffff990a`1c355080 01800080`70740180 : nt!KiFastFailDispatch+0xd0
ffffd282`82668660 fffff804`5722c457     : 00000000`00000001 ffffd282`82668b80 ffff990a`1c355080 fffff804`570686b3 : nt!KiRaiseSecurityCheckFailure+0x323
ffffd282`826687f0 fffff804`570683e3     : ffff990a`1c18fc00 00000000`00000001 ffff990a`1c18fc80 ffff990a`1d50d6a0 : nt!IopCompleteRequest+0x1e2c97
ffffd282`826688b0 fffff804`574b7e9d     : 00000000`00000000 00000000`00000000 ffff8401`703ea180 fffff804`5704a31a : nt!IoRemoveIoCompletion+0x393
ffffd282`826689e0 fffff804`572074b8     : ffff990a`1c355080 000000e1`afdff4f8 ffffd282`82668aa8 000002b2`a1491de0 : nt!NtRemoveIoCompletion+0x13d
ffffd282`82668a90 00007ffa`2106c744     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e1`afdff4d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`2106c744


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000005fbf4930, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8034de773d0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2655

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10883

    Key  : Analysis.Init.CPU.mSec
    Value: 390

    Key  : Analysis.Init.Elapsed.mSec
    Value: 86210

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 5fbf4930

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8034de773d0

READ_ADDRESS: fffff8034e8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 000000005fbf4930

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffcb8e2c2374f0 -- (.trap 0xffffcb8e2c2374f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000005fbf4930 rbx=0000000000000000 rcx=0000000000000000
rdx=0000003f943160d6 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034de773d0 rsp=ffffcb8e2c237680 rbp=0000000000000001
 r8=0000000000000001  r9=ffffe00961be2101 r10=0000fffff8034dee
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!KeAcquireSpinLockAtDpcLevel+0x30:
fffff803`4de773d0 f0480fba2b00    lock bts qword ptr [rbx],0 ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:  
ffffcb8e`2c2373a8 fffff803`4e007a69     : 00000000`0000000a 00000000`5fbf4930 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffcb8e`2c2373b0 fffff803`4e003d69     : 00000000`00140001 00000000`0000003f 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcb8e`2c2374f0 fffff803`4de773d0     : ffffcd00`62140180 fffff803`4de72230 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffcb8e`2c237680 fffff803`4e161275     : 00000000`00000200 ffffb04e`64ca8931 0000003f`943160a2 ffffe009`61be2100 : nt!KeAcquireSpinLockAtDpcLevel+0x30
ffffcb8e`2c2376b0 fffff803`4de70d62     : ffffe009`61be2010 00000000`00000000 ffffe009`61be2010 0000003f`943160a2 : nt!PpmIdleUpdateConcurrency+0x35
ffffcb8e`2c2376f0 fffff803`4de70154     : 00000000`00000000 00001fa0`00f3003b 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xa92
ffffcb8e`2c237af0 fffff803`4dff95a4     : ffffffff`00000000 ffffcd00`6214b1c0 ffffe009`6f2055c0 00000000`00000438 : nt!PoIdle+0x374
ffffcb8e`2c237c60 00000000`00000000     : ffffcb8e`2c238000 ffffcb8e`2c232000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!KeAcquireSpinLockAtDpcLevel+30

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  30

FAILURE_BUCKET_ID:  AV_nt!KeAcquireSpinLockAtDpcLevel

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {83a2e79c-7ee0-6968-f863-105a1ecf5ef5}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80748e645d1, Address of the instruction which caused the bugcheck
Arg3: ffffda80f4fff920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2577

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4660

    Key  : Analysis.Init.CPU.mSec
    Value: 499

    Key  : Analysis.Init.Elapsed.mSec
    Value: 89176

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80748e645d1

BUGCHECK_P3: ffffda80f4fff920

BUGCHECK_P4: 0

CONTEXT:  ffffda80f4fff920 -- (.cxr 0xffffda80f4fff920)
rax=ffffb50cfa4d79e8 rbx=ffffb50cf9bdd080 rcx=ffffb50c05040001
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffb50cfa4d79e0
rip=fffff80748e645d1 rsp=ffffea815f230110 rbp=ffffea815f2301a1
 r8=0000000000000000  r9=00000000e9fe5849 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=ffffda80f4bea180
r14=0000000000000000 r15=ffffb50cf9bdd1c0
iopl=0         nv up ei ng nz na pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050283
nt!KeWaitForSingleObject+0x1e1:
fffff807`48e645d1 483901          cmp     qword ptr [rcx],rax ds:002b:ffffb50c`05040001=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Spotify.exe

STACK_TEXT:  
ffffea81`5f230110 fffff807`48e43efb     : ffffb50c`fa4d79e0 00001f80`00000006 00000000`00000001 ffffda80`f4e80100 : nt!KeWaitForSingleObject+0x1e1
ffffea81`5f230200 fffff807`491f7aa0     : ffffea81`5f2305c0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KeWaitForMultipleObjects+0x45b
ffffea81`5f230310 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForMultipleObjects+0x2f0


SYMBOL_NAME:  nt!KeWaitForSingleObject+1e1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .cxr 0xffffda80f4fff920 ; kb

BUCKET_ID_FUNC_OFFSET:  1e1

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!KeWaitForSingleObject

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5b409308-384c-7d02-5716-ce0af54fd5df}
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc48d1c4a04d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc48d1c4a0428, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3890

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 141349

    Key  : Analysis.Init.CPU.mSec
    Value: 514

    Key  : Analysis.Init.Elapsed.mSec
    Value: 91445

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc48d1c4a04d0

BUGCHECK_P3: ffffc48d1c4a0428

BUGCHECK_P4: 0

TRAP_FRAME:  ffffc48d1c4a04d0 -- (.trap 0xffffc48d1c4a04d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc48d1c4a0960 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80172c43edf rsp=ffffc48d1c4a0660 rbp=ffffc48d1c4a0729
 r8=0000000000000000  r9=0000000000000000 r10=ffffc5812e896180
r11=ffffc48d1c4a0900 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
nt!KeWaitForMultipleObjects+0x43f:
fffff801`72c43edf cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffc48d1c4a0428 -- (.exr 0xffffc48d1c4a0428)
ExceptionAddress: fffff80172c43edf (nt!KeWaitForMultipleObjects+0x000000000000043f)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:  
ffffc48d`1c4a01a8 fffff801`72e07a69     : 00000000`00000139 00000000`00000003 ffffc48d`1c4a04d0 ffffc48d`1c4a0428 : nt!KeBugCheckEx
ffffc48d`1c4a01b0 fffff801`72e07e90     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc48d`1c4a02f0 fffff801`72e06223     : ffffc581`2e740100 ffffc581`2e74b1c0 ffff8e03`e2133080 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc48d`1c4a04d0 fffff801`72c43edf     : 00000000`00000001 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc48d`1c4a0660 fffff801`81eceb81     : 00000000`00000200 00000000`00989680 ffff8e03`e77f2460 ffff8e03`e77f2460 : nt!KeWaitForMultipleObjects+0x43f
ffffc48d`1c4a0770 fffff801`81f0909c     : ffffc581`00000008 ffff8e03`e77f2460 fffff801`81f09060 ffff8e03`e77f2460 : dxgkrnl!BLTQUEUE::BltQueueWorker+0x2dd
ffffc48d`1c4a0be0 fffff801`72d17e25     : ffff8e03`e2133080 fffff801`81f09060 ffff8e03`e77f2460 00000000`00000001 : dxgkrnl!BLTQUEUE::BltQueueWorkerThread+0x3c
ffffc48d`1c4a0c10 fffff801`72dfd0d8     : ffffc581`2e896180 ffff8e03`e2133080 fffff801`72d17dd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffc48d`1c4a0c60 00000000`00000000     : ffffc48d`1c4a1000 ffffc48d`1c49b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgkrnl!BLTQUEUE::BltQueueWorker+2dd

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2dd

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!BLTQUEUE::BltQueueWorker

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c37780bf-65ad-6f36-df59-1976243cb246}
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8042518a967, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3874

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 39925

    Key  : Analysis.Init.CPU.mSec
    Value: 562

    Key  : Analysis.Init.Elapsed.mSec
    Value: 93506

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8042518a967

READ_ADDRESS: fffff80425afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff388bda37480 -- (.trap 0xfffff388bda37480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9a0063d40180 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff388bda37698 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042518a967 rsp=fffff388bda37610 rbp=0000000000000200
 r8=fffff388bda37678  r9=0000000000000000 r10=000000000002d19f
r11=ffffd08e391273e8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!HvlGetPpmStatsForProcessor+0x37:
fffff804`2518a967 4d8b04c9        mov     r8,qword ptr [r9+rcx*8] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:  
fffff388`bda37338 fffff804`25207a69     : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff388`bda37340 fffff804`25203d69     : 00000000`00004d7c 00000000`00000000 0000000d`80ec4391 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff388`bda37480 fffff804`2518a967     : fffff388`bda37680 ffffdbbc`eb7241a7 00000000`00000001 ffffd08e`390bf398 : nt!KiPageFault+0x469
fffff388`bda37610 fffff804`2523ab96     : ffffd08e`390e5330 ffff9a00`63d48218 000000e4`1993d9ac ffff9a00`63d48210 : nt!HvlGetPpmStatsForProcessor+0x37
fffff388`bda37640 fffff804`25070e63     : 00000000`00009558 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PpmUpdatePerformanceFeedback+0x1c8d36
fffff388`bda376f0 fffff804`25070154     : 00000000`00000000 00001f80`0013003b 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xb93
fffff388`bda37af0 fffff804`251f95a4     : ffffffff`00000000 ffff9a00`63d4b1c0 ffffd08e`41a95080 00000000`000007e0 : nt!PoIdle+0x374
fffff388`bda37c60 00000000`00000000     : fffff388`bda38000 fffff388`bda32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!HvlGetPpmStatsForProcessor+37

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  37

FAILURE_BUCKET_ID:  AV_nt!HvlGetPpmStatsForProcessor

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fd5527ca-e73f-b9f5-58be-487b87626f6f}

Followup:     MachineOwner
---------

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff898f46269738, Virtual address for the attempted execute.
Arg2: 81000001b1b1a963, PTE contents.
Arg3: ffffd18dcec305e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2468

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4497

    Key  : Analysis.Init.CPU.mSec
    Value: 577

    Key  : Analysis.Init.Elapsed.mSec
    Value: 96509

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  fc

BUGCHECK_P1: ffff898f46269738

BUGCHECK_P2: 81000001b1b1a963

BUGCHECK_P3: ffffd18dcec305e0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

TRAP_FRAME:  ffffd18dcec305e0 -- (.trap 0xffffd18dcec305e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffac09e30062d8 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000009e rsi=0000000000000000 rdi=0000000000000000
rip=ffff898f46269738 rsp=ffffd18dcec30770 rbp=ffffc10111340180
 r8=00000001000000b7  r9=ffffc10111340180 r10=ffffac09e09ee080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffff898f`46269738 689726468f      push    0FFFFFFFF8F462697h
Resetting default scope

STACK_TEXT:  
ffffd18d`cec302f8 fffff801`416718f0     : 00000000`000000fc ffff898f`46269738 81000001`b1b1a963 ffffd18d`cec305e0 : nt!KeBugCheckEx
ffffd18d`cec30300 fffff801`4142aed6     : ffff898f`46269738 ffffd18d`cec30500 00000000`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x159368
ffffd18d`cec30340 fffff801`4140c960     : ffffd18d`cec30470 00000000`00000011 ffffd18d`cec30660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffd18d`cec30440 fffff801`41603c5e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffd18d`cec305e0 ffff898f`46269738     : ffff898f`00000002 fffff801`00000005 00000000`00000000 ffffac09`00000000 : nt!KiPageFault+0x35e
ffffd18d`cec30770 ffff898f`00000002     : fffff801`00000005 00000000`00000000 ffffac09`00000000 ffff898f`00000000 : 0xffff898f`46269738
ffffd18d`cec30778 fffff801`00000005     : 00000000`00000000 ffffac09`00000000 ffff898f`00000000 ffffac09`e0b75bc0 : 0xffff898f`00000002
ffffd18d`cec30780 00000000`00000000     : ffffac09`00000000 ffff898f`00000000 ffffac09`e0b75bc0 ffffc101`00000000 : 0xfffff801`00000005


SYMBOL_NAME:  nt!MiCheckSystemNxFault+159368

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  159368

FAILURE_BUCKET_ID:  0xFC_nt!MiCheckSystemNxFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffd01dac4c730, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffd01dac4c688, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2890

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4811

    Key  : Analysis.Init.CPU.mSec
    Value: 514

    Key  : Analysis.Init.Elapsed.mSec
    Value: 99443

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffffd01dac4c730

BUGCHECK_P3: fffffd01dac4c688

BUGCHECK_P4: 0

TRAP_FRAME:  fffffd01dac4c730 -- (.trap 0xfffffd01dac4c730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffd01dac4ca88 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff80774e074b8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80774e5ff9c rsp=fffffd01dac4c8c0 rbp=ffffc4012cf40180
 r8=fffffd01dac4c9c8  r9=0000000000000001 r10=ffff980bb9070110
r11=00007fffffff0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!IopQueueIrpToFileObject+0x171f3c:
fffff807`74e5ff9c cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffffd01dac4c688 -- (.exr 0xfffffd01dac4c688)
ExceptionAddress: fffff80774e5ff9c (nt!IopQueueIrpToFileObject+0x0000000000171f3c)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:  
fffffd01`dac4c408 fffff807`74e07a69     : 00000000`00000139 00000000`00000003 fffffd01`dac4c730 fffffd01`dac4c688 : nt!KeBugCheckEx
fffffd01`dac4c410 fffff807`74e07e90     : ffffc401`00000000 fffff807`74f193ce ffff980b`c989e080 fffffd01`dac4c500 : nt!KiBugCheckDispatch+0x69
fffffd01`dac4c550 fffff807`74e06223     : 00000000`00000008 ffffc401`2cf40180 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffd01`dac4c730 fffff807`74e5ff9c     : 980bc743`5c40b719 00000000`001a019f fffffd01`dac4c8f8 00000175`309368e0 : nt!KiRaiseSecurityCheckFailure+0x323
fffffd01`dac4c8c0 fffff807`74ffd970     : fffffd01`dac4cb80 fffff807`7502b17e ffff980b`d1364b70 00000000`00000000 : nt!IopQueueIrpToFileObject+0x171f3c
fffffd01`dac4c910 fffff807`74fe59b9     : ffff980b`00000000 fffffd01`dac4cb80 00000000`00000000 00000062`871ff7c0 : nt!IopSynchronousServiceTail+0x2a0
fffffd01`dac4c9b0 fffff807`74e074b8     : ffff980b`00000000 00000000`00000000 00000000`00000000 00000175`309368e0 : nt!NtReadFile+0x599
fffffd01`dac4ca90 00007ff8`fa4ec6e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000062`871ff738 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`fa4ec6e4


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------

KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffff9905ca010100, Address of the heap that reported the corruption
Arg3: ffff9905dd384000, Address at which the corruption was detected
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 112269

    Key  : Analysis.Init.CPU.mSec
    Value: 686

    Key  : Analysis.Init.Elapsed.mSec
    Value: 209643

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  13a

BUGCHECK_P1: 12

BUGCHECK_P2: ffff9905ca010100

BUGCHECK_P3: ffff9905dd384000

BUGCHECK_P4: 0

CORRUPTING_POOL_ADDRESS: fffff80381efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff9905dd384000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

STACK_TEXT:  
fffff581`8f7a3708 fffff803`8178d1c8     : 00000000`0000013a 00000000`00000012 ffff9905`ca010100 ffff9905`dd384000 : nt!KeBugCheckEx
fffff581`8f7a3710 fffff803`8178d228     : 00000000`00000012 fffff581`8f7a3820 ffff9905`ca010100 00000000`00000000 : nt!RtlpHeapHandleError+0x40
fffff581`8f7a3750 fffff803`8178ce55     : ffff9905`dd384000 ffff9905`ca010280 ffff9905`ca010280 ffff9905`c96f3830 : nt!RtlpHpHeapHandleError+0x58
fffff581`8f7a3780 fffff803`81667dde     : ffff9905`dd3e6b20 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
fffff581`8f7a37b0 fffff803`814c73d4     : ffff9905`00000000 ffff9905`dd3e6a60 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x19f51e
fffff581`8f7a3850 fffff803`81bb1019     : 00000000`000c6060 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffff581`8f7a3930 fffff803`817ff8c8     : 00010268`00000000 00000058`2ebfef70 00000000`00000000 00000000`00000001 : nt!ExFreePool+0x9
fffff581`8f7a3960 fffff803`817ff109     : 00000058`2ebfeee8 00000000`00000000 00000058`2ebfef70 00000058`2ebfef50 : nt!IopCreateFile+0x7a8
fffff581`8f7a3a00 fffff803`81606bb8     : ffff9905`c9b2a080 fffff581`8f7a3b80 00000058`2ebfe4e8 fffff581`8f7a3aa8 : nt!NtCreateFile+0x79
fffff581`8f7a3a90 00007ff9`406ec844     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000058`2ebfee58 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`406ec844


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.631

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x13a_12_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0e8bc89c-9b1f-e697-ed6c-83210db041e2}

Followup:     Pool_corruption
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80233643ca4, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2936

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 38572

    Key  : Analysis.Init.CPU.mSec
    Value: 546

    Key  : Analysis.Init.Elapsed.mSec
    Value: 177207

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80233643ca4

READ_ADDRESS: fffff802340fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  audiodg.exe

TRAP_FRAME:  ffffd40149a92060 -- (.trap 0xffffd40149a92060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000020f618 rbx=0000000000000000 rcx=ffffac00ed928180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80233643ca4 rsp=ffffd40149a921f0 rbp=ffffd40149a922b9
 r8=0000000000000000  r9=0000000000000000 r10=ffffac00ed928180
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeWaitForMultipleObjects+0x204:
fffff802`33643ca4 4b8b1cfb        mov     rbx,qword ptr [r11+r15*8] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:  
ffffd401`49a91f18 fffff802`33807769     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd401`49a91f20 fffff802`33803a69     : 00031902`ed92ffff 00000000`ed9331ff ffff9685`ffffffff 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd401`49a92060 fffff802`33643ca4     : 00000000`00000001 00000000`000000ff ffffd401`49a92200 00000000`00000000 : nt!KiPageFault+0x469
ffffd401`49a921f0 fffff802`339f7740     : 00000000`000000c0 ffffd401`49a92340 ffff9685`3bc68fb0 00000000`00000000 : nt!KeWaitForMultipleObjects+0x204
ffffd401`49a92300 fffff802`339f7419     : 00000000`00000000 00000000`00000774 00000000`00000000 00000000`00000001 : nt!ObWaitForMultipleObjects+0x2f0
ffffd401`49a92800 fffff802`338071b8     : 00000000`00000000 00000000`00000000 ffff9685`34ba2080 fffff802`33ab9c10 : nt!NtWaitForMultipleObjects+0x119
ffffd401`49a92a90 00007ffd`554ecb04     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000052`938ffa18 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`554ecb04


SYMBOL_NAME:  nt!KeWaitForMultipleObjects+204

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.746

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  204

FAILURE_BUCKET_ID:  AV_nt!KeWaitForMultipleObjects

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0d335bc1-87c8-f4ad-8a69-d4d9985e727a}

Followup:     MachineOwner
---------

MULTIPLE_IRP_COMPLETE_REQUESTS (44)
A driver has requested that an IRP be completed (IoCompleteRequest()), but
the packet has already been completed.  This is a tough bug to find because
the easiest case, a driver actually attempted to complete its own packet
twice, is generally not what happened.  Rather, two separate drivers each
believe that they own the packet, and each attempts to complete it.  The
first actually works, and the second fails.  Tracking down which drivers
in the system actually did this is difficult, generally because the trails
of the first driver have been covered by the second.  However, the driver
stack for the current request can be found by examining the DeviceObject
fields in each of the stack locations.
Arguments:
Arg1: ffffbb028e1780a0, Address of the IRP
Arg2: 0000000000001232
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3280

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6612

    Key  : Analysis.Init.CPU.mSec
    Value: 687

    Key  : Analysis.Init.Elapsed.mSec
    Value: 181091

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  44

BUGCHECK_P1: ffffbb028e1780a0

BUGCHECK_P2: 1232

BUGCHECK_P3: 0

BUGCHECK_P4: 0

IRP_ADDRESS: ffffbb028e1780a0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT:  
ffff9588`c24fb678 fffff800`76c2babc     : 00000000`00000044 ffffbb02`8e1780a0 00000000`00001232 00000000`00000000 : nt!KeBugCheckEx
ffff9588`c24fb680 fffff800`76a48727     : ffffbb02`8c6e8080 00000000`00000002 ffffbb02`8c5be9d0 ffffbb02`00000000 : nt!IopfCompleteRequest+0x1e337c
ffff9588`c24fb770 fffff800`82c1d834     : 00000000`00000000 00000000`15f5dd38 ffffbb02`8df64280 ffffbb02`8c6e8080 : nt!IofCompleteRequest+0x17
ffff9588`c24fb7a0 fffff800`76a52f55     : ffffbb02`7d8c5950 ffffbb02`7d8c5950 00000000`00000001 ffffbb02`8df64280 : Npfs!NpFsdWrite+0x94
ffff9588`c24fb810 fffff800`736b4906     : 00000000`00000000 00000000`76aec5ca 00000000`00000000 ffffbb02`8c6e8050 : nt!IofCallDriver+0x55
ffff9588`c24fb850 fffff800`76a52f55     : ffffbb02`8df64280 ffff8581`d9728180 ffffbb02`8c6e8080 fffff800`76a64d7f : FLTMGR!FltpDispatch+0xd6
ffff9588`c24fb8b0 fffff800`76dfd518     : ffffbb02`8df64280 00000000`00000000 ffffbb02`8df64280 00000000`00000000 : nt!IofCallDriver+0x55
ffff9588`c24fb8f0 fffff800`76de448f     : ffffe309`00000000 ffff9588`c24fbb80 00000000`145cf1b4 ffff9588`c24fbb80 : nt!IopSynchronousServiceTail+0x1a8
ffff9588`c24fb990 fffff800`76c071b8     : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`0cc24d78 : nt!NtWriteFile+0x66f
ffff9588`c24fba90 00000000`772d1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`144cebd8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772d1cfc


SYMBOL_NAME:  Npfs!NpFsdWrite+94

MODULE_NAME: Npfs

IMAGE_NAME:  Npfs.SYS

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  94

FAILURE_BUCKET_ID:  0x44_Npfs!NpFsdWrite

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {947b2e94-712f-fbfc-7620-19ee913c5b76}

Followup:     MachineOwner
---------

2: kd> lmvm Npfs
Browse full module list
start             end                 module name
fffff800`82c10000 fffff800`82c2c000   Npfs     # (pdb symbols)          C:\ProgramData\Dbg\sym\npfs.pdb\B6BDF22083B39213E8C6DAA6F39837F41\npfs.pdb
    Loaded symbol image file: Npfs.SYS
    Mapped memory image file: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS
    Image path: \SystemRoot\System32\Drivers\Npfs.SYS
    Image name: Npfs.SYS
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        9E3E4C73 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         000192F7
    ImageSize:        0001C000
    File version:     10.0.19041.1030
    Product version:  10.0.19041.1030
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     npfs.sys
        OriginalFilename: npfs.sys
        ProductVersion:   10.0.19041.1030
        FileVersion:      10.0.19041.1030 (WinBuild.160101.0800)
        FileDescription:  NPFS Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff803712fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4046

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 37825

    Key  : Analysis.Init.CPU.mSec
    Value: 530

    Key  : Analysis.Init.Elapsed.mSec
    Value: 183214

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff803712fa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff803768af610 -- (.trap 0xfffff803768af610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a0490b84 rbx=0000000000000000 rcx=fffff803768af7f0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80370844567 rsp=fffff803768af7a0 rbp=fffff8036e5c7180
 r8=0000000000000102  r9=0000000000000000 r10=fffff8036e5caac0
r11=00000010fadf37aa r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff803`70844567 4883c420        add     rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:  
fffff803`768bdc88 fffff803`70a3aa0c     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`712fa320 : nt!KeBugCheckEx
fffff803`768bdc90 fffff803`7087541d     : 0000184b`f15ab990 fffff803`6e5c7180 00000000`00000246 00000000`00073d35 : nt!KeAccumulateTicks+0x1c880c
fffff803`768bdcf0 fffff803`708759c1     : 00000000`00000000 00000000`00045098 fffff803`6e5c7180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff803`768bdd40 fffff803`7086f833     : fffff803`6e5c7180 00000000`00000000 fffff803`71231650 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff803`768bde80 fffff803`708781f2     : fffff803`768af610 fffff803`768af690 fffff803`768af600 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff803`768bdf30 fffff803`70927ef5     : 00000011`427a9086 fffff803`712f39a0 fffff803`712f3a50 ffff4c5f`cfcfacfc : nt!HalpTimerClockInterrupt+0xe2
fffff803`768bdf60 fffff803`709f722a     : fffff803`768af690 fffff803`712f39a0 00000000`00000102 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`768bdfb0 fffff803`709f7797     : fffff803`768af630 fffff803`768af628 ffff9408`b5d04080 fffff803`709f77a4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff803`768af610 fffff803`70844567     : 00000000`00000010 00000000`00000286 fffff803`768af7c8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff803`768af7a0 fffff803`7084c620     : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KeYieldProcessorEx+0x17
fffff803`768af7d0 fffff803`708452d6     : ffff9408`b5d04188 00000000`00000000 ffff9408`b5d04250 00000000`00000000 : nt!KiTryUnwaitThread+0x2d0
fffff803`768af830 fffff803`70844e7c     : ffff9408`b5d04180 00000000`00000000 fffff803`768afb18 00000000`00000000 : nt!KiTimerWaitTest+0x1e6
fffff803`768af8e0 fffff803`708072e9     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00043ecf : nt!KiProcessExpiredTimerList+0xdc
fffff803`768af9d0 fffff803`709f92ee     : 00000000`00000000 fffff803`6e5c7180 fffff803`71326600 ffff9408`b2fca080 : nt!KiRetireDpcList+0x9d9
fffff803`768afc60 00000000`00000000     : fffff803`768b0000 fffff803`768aa000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KeAccumulateTicks+1c880c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.746

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c880c

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------

0: kd> !pcr
KPCR for Processor 0 at fffff8036e5c7000:
    Major 1 Minor 1
    NtTib.ExceptionList: fffff803768a5fb0
        NtTib.StackBase: fffff803768a4000
       NtTib.StackLimit: 0000000016f0ed78
     NtTib.SubSystemTib: fffff8036e5c7000
          NtTib.Version: 000000006e5c7180
      NtTib.UserPointer: fffff8036e5c7870
          NtTib.SelfTib: 0000000000809000

                SelfPcr: 0000000000000000
                   Prcb: fffff8036e5c7180
                   Irql: 0000000000000000
                    IRR: 0000000000000000
                    IDR: 0000000000000000
          InterruptMode: 0000000000000000
                    IDT: 0000000000000000
                    GDT: 0000000000000000
                    TSS: 0000000000000000

          CurrentThread: fffff80371326600
             NextThread: 0000000000000000
             IdleThread: fffff80371326600

              DpcQueue: Unable to read nt!_KDPC_DATA.DpcListHead.Flink @ fffff8036e5ca240

0: kd> dt nt!_KPRCB fffff8036e5c7180 Dpc*
   +0x3090 DpcRuntimeHistoryHashTable : (null)
   +0x3098 DpcRuntimeHistoryHashTableCleanupDpc : (null)
   +0x30c0 DpcData : [2] _KDPC_DATA
   +0x3110 DpcStack : 0xfffff803`768b6fb0 Void
   +0x311c DpcRequestRate : 0
   +0x3124 DpcLastCount : 0x9e3f55
   +0x312a DpcRoutineActive : 0 ''
   +0x312c DpcRequestSummary : 0n43
   +0x312c DpcRequestSlot : [2] 0n43
   +0x312c DpcNormalProcessingActive : 0y1
   +0x312c DpcNormalProcessingRequested : 0y1
   +0x312c DpcNormalThreadSignal : 0y0
   +0x312c DpcNormalTimerExpiration : 0y1
   +0x312c DpcNormalDpcPresent : 0y0
   +0x312c DpcNormalLocalInterrupt : 0y1
   +0x312c DpcNormalSpare : 0y0000000000 (0)
   +0x312c DpcThreadActive : 0y0
   +0x312c DpcThreadRequested : 0y0
   +0x312c DpcThreadSpare : 0y00000000000000 (0)
   +0x7b80 DpcGate : _KGATE
   +0x7be8 DpcWatchdogPeriod : 0n7680
   +0x7bec DpcWatchdogCount : 0n7680
   +0x7bf4 DpcWatchdogProfileCumulativeDpcThreshold : 0x1b80
   +0x7c2c DpcWatchdogSequenceNumber : 0x6ccf7
   +0x7e8c DpcTime : 0x1b0e
   +0x7e9c DpcTimeCount : 0
   +0x7ea0 DpcTimeLimit : 0x500
   +0x7f00 DpcWatchdogProfileSingleDpcThreshold : 0x496
   +0x8258 DpcWatchdogDpc : _KDPC
   +0x8298 DpcWatchdogTimer : _KTIMER
   +0x84a8 DpcWatchdogProfile : 0xffff9408`a2035000  -> 0x00000000`0000000d Void
   +0x84b0 DpcWatchdogProfileCurrentEmptyCapture : 0xffff9408`a2047c78  -> (null) 
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8064eefa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3890

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10890

    Key  : Analysis.Init.CPU.mSec
    Value: 562

    Key  : Analysis.Init.Elapsed.mSec
    Value: 185419

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8064eefa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffffc58f34837500 -- (.trap 0xffffc58f34837500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a7ab8559 rbx=0000000000000000 rcx=ffffc58f34837728
rdx=ffffdb8c0a2df0c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064e444567 rsp=ffffc58f34837690 rbp=00000025c1d35b20
 r8=ffffc58f348378e8  r9=0000000000000000 r10=0000000000000000
r11=ffffc58f348378c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff806`4e444567 4883c420        add     rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:  
ffff8b01`4a17fc88 fffff806`4e63aa0c     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`4eefa320 : nt!KeBugCheckEx
ffff8b01`4a17fc90 fffff806`4e47541d     : 00003f81`058208b5 ffff8b01`4a128180 00000000`00000246 00000000`0012f5e2 : nt!KeAccumulateTicks+0x1c880c
ffff8b01`4a17fcf0 fffff806`4e4759c1     : 00000000`00000000 00000000`000b4d23 ffff8b01`4a128180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
ffff8b01`4a17fd40 fffff806`4e46f833     : ffff8b01`4a128180 00000000`00000000 fffff806`4ee31530 00000000`00000000 : nt!KiUpdateTime+0x4a1
ffff8b01`4a17fe80 fffff806`4e4781f2     : ffffc58f`34837500 ffffc58f`34837580 ffffc58f`34837500 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
ffff8b01`4a17ff30 fffff806`4e527ef5     : 0000002d`34a5c43e ffffdb8c`00d03200 ffffdb8c`00d032b0 ffffc78c`4a3d79e2 : nt!HalpTimerClockInterrupt+0xe2
ffff8b01`4a17ff60 fffff806`4e5f722a     : ffffc58f`34837580 ffffdb8c`00d03200 ffffc58f`34837b10 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8b01`4a17ffb0 fffff806`4e5f7797     : ffffc58f`34837560 00000000`00000000 ffffdb8c`0a2df0c0 fffff806`4e5f77a4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffc58f`34837500 fffff806`4e444567     : 00000000`00000010 00000000`00000282 ffffc58f`348376b8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffc58f`34837690 fffff806`4e44b78a     : 00000000`00000246 fffff806`4e44a891 00000000`00000000 00000000`00000000 : nt!KeYieldProcessorEx+0x17
ffffc58f`348376c0 fffff806`4e444c4d     : 00000000`000b3b5a ffffc58f`34837b10 00000000`00000080 ffff8b01`4a128180 : nt!KiDeferredReadySingleThread+0xc3a
ffffc58f`348378b0 fffff806`4e445030     : ffff8b01`4a128180 00000000`00000000 ffffdb8c`0a48a260 00000000`00000000 : nt!KiReadyThread+0x4d
ffffc58f`348378e0 fffff806`4e406eed     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000b3b5a : nt!KiProcessExpiredTimerList+0x290
ffffc58f`348379d0 fffff806`4e5f92ee     : ffffffff`00000000 ffff8b01`4a128180 ffff8b01`4a1331c0 ffffdb8c`16fde080 : nt!KiRetireDpcList+0x5dd
ffffc58f`34837c60 00000000`00000000     : ffffc58f`34838000 ffffc58f`34832000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KeAccumulateTicks+1c880c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.746

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c880c

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffbe8093da0e70
Arg3: ffffe3854bca8f40
Arg4: fffff8033560c58d

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2827

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7331

    Key  : Analysis.Init.CPU.mSec
    Value: 483

    Key  : Analysis.Init.Elapsed.mSec
    Value: 187848

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffbe8093da0e70

BUGCHECK_P3: ffffe3854bca8f40

BUGCHECK_P4: fffff8033560c58d

TRAP_FRAME:  ffffbe8093da0e70 -- (.trap 0xffffbe8093da0e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffe3854bca8000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8033560c58d rsp=ffffe3854bca8f40 rbp=ffffe3854bca9160
 r8=ffffe3854bca9200  r9=ffffe3854bca90e0 r10=ffffe3854bca8000
r11=ffffe3854bca90d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MmAccessFault+0x2d:
fffff803`3560c58d 4c89642430      mov     qword ptr [rsp+30h],r12 ss:0018:ffffe385`4bca8f70=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

STACK_OVERFLOW: Stack Limit: ffffe3854bca9000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xfffff8033572ab86 was blamed for the stack overflow. It is using 8640 bytes of stack total in 5 instances (likely recursion).

STACK_TEXT:  
ffffe385`4bca8f40 fffff803`3580395e     : fd37d8da`8d04c865 4141a307`7a78fd2f 2e1c02fc`80b01881 79aa40f5`feef84e0 : nt!MmAccessFault+0x2d
ffffe385`4bca90e0 fffff803`357fe246     : ffffe385`4bca9430 ffffe385`4bca94a0 fffff803`3572be19 ffffe385`4bca94e0 : nt!KiPageFault+0x35e
ffffe385`4bca9278 fffff803`3572be19     : ffffe385`4bca94e0 00000000`00000000 ffffe385`4bca9ca8 555a8e07`000004d0 : nt!_chkstk+0x36
ffffe385`4bca9290 fffff803`3572ab86     : ffffe385`4bca9ca8 ffffe385`4bca99e0 ffffe385`4bca9ca8 fffff803`354b1678 : nt!RtlDispatchException+0x119
ffffe385`4bca94b0 fffff803`358078ac     : 00000000`00001000 ffffe385`4bca9d50 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffe385`4bca9b70 fffff803`35803a43     : 21c3db22`0c97a711 816df942`b57d72e4 eb205c27`757f7e5a 44395c5a`c3ea0e31 : nt!KiExceptionDispatch+0x12c
ffffe385`4bca9d50 fffff803`3572e028     : f0da9290`24527bc7 812d41a3`ffa0505f 0c2f8c7f`fc808c19 0ab75c0c`42d558c4 : nt!KiPageFault+0x443
ffffe385`4bca9ee0 fffff803`3572da94     : fffff803`35400000 fffff803`00000000 00000000`000000e0 00007fff`fffeffff : nt!RtlpUnwindPrologue+0x248
ffffe385`4bca9f40 fffff803`3572c1af     : fffff803`354e38d4 ffffe385`00000000 ffffe385`4bcaaf58 fffff803`354e38d4 : nt!RtlpxVirtualUnwind+0x104
ffffe385`4bca9fc0 fffff803`3572bece     : ffffe385`4bcaa580 00000000`00000000 ffffe385`4bcaea90 fffff803`358071b8 : nt!RtlVirtualUnwind+0x5f
ffffe385`4bcaa040 fffff803`3572ab86     : ffffe385`4bcaaf58 ffffe385`4bcaac90 ffffe385`4bcaaf58 fffff803`354b1678 : nt!RtlDispatchException+0x1ce
ffffe385`4bcaa760 fffff803`358078ac     : 00000000`00001000 ffffe385`4bcab000 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffe385`4bcaae20 fffff803`35803a43     : 00000002`4ee80429 400010a9`25247f75 25248001`4ee80661 40001a81`00000002 : nt!KiExceptionDispatch+0x12c
ffffe385`4bcab000 fffff803`3572e028     : 25246b71`43714f31 4ee80429`00000380 43714f31`0000000a 3ada33c1`50b6a811 : nt!KiPageFault+0x443
ffffe385`4bcab190 fffff803`3572da94     : fffff803`35400000 fffff803`00000000 00000000`000000e0 00007fff`fffeffff : nt!RtlpUnwindPrologue+0x248
ffffe385`4bcab1f0 fffff803`3572c1af     : fffff803`354e38d4 ffffe385`00000000 ffffe385`4bcac208 fffff803`354e38d4 : nt!RtlpxVirtualUnwind+0x104
ffffe385`4bcab270 fffff803`3572bece     : ffffe385`4bcab830 00000000`00000000 ffffe385`4bcaea90 fffff803`358071b8 : nt!RtlVirtualUnwind+0x5f
ffffe385`4bcab2f0 fffff803`3572ab86     : ffffe385`4bcac208 ffffe385`4bcabf40 ffffe385`4bcac208 fffff803`354b1678 : nt!RtlDispatchException+0x1ce
ffffe385`4bcaba10 fffff803`358078ac     : 00000000`00001000 ffffe385`4bcac2b0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffe385`4bcac0d0 fffff803`35803a43     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffe385`4bcac2b0 fffff803`3572e028     : 000000f8`00000001 000001d3`d39e8dc0 000001d3`d39e8dc8 000001d3`d39e8dc8 : nt!KiPageFault+0x443
ffffe385`4bcac440 fffff803`3572da94     : fffff803`35400000 fffff803`00000000 00000000`000000e0 00007fff`fffeffff : nt!RtlpUnwindPrologue+0x248
ffffe385`4bcac4a0 fffff803`3572c1af     : fffff803`354e38d4 ffffe385`00000000 ffffe385`4bcad4b8 fffff803`354e38d4 : nt!RtlpxVirtualUnwind+0x104
ffffe385`4bcac520 fffff803`3572bece     : ffffe385`4bcacae0 00000000`00000000 ffffe385`4bcaea90 fffff803`358071b8 : nt!RtlVirtualUnwind+0x5f
ffffe385`4bcac5a0 fffff803`3572ab86     : ffffe385`4bcad4b8 ffffe385`4bcad1f0 ffffe385`4bcad4b8 00000000`00000000 : nt!RtlDispatchException+0x1ce
ffffe385`4bcaccc0 fffff803`358078ac     : 00000000`00000000 00000006`00020410 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffe385`4bcad380 fffff803`35801216     : fffff803`3540f8f8 ffffaa0c`08cf0990 00000000`00000003 fffff803`35656d89 : nt!KiExceptionDispatch+0x12c
ffffe385`4bcad560 fffff803`35703864     : ffffe385`4bcad758 ffffe385`4bcad798 00000000`00000000 ffffe385`4bcad800 : nt!KiBreakpointTrap+0x316
ffffe385`4bcad6f0 fffff803`357cbecb     : fffff803`359e57e0 fffff803`354fbc88 00000000`00000000 00000000`00000000 : nt!KeCheckStackAndTargetAddress+0x54
ffffe385`4bcad720 fffff803`357fe642     : fffff803`354fbc88 ffffe385`4bcadd00 fffff803`357cbe90 00000000`00000000 : nt!_C_specific_handler+0x3b
ffffe385`4bcad790 fffff803`3572bf97     : ffffe385`4bcadd00 00000000`00000000 ffffe385`4bcae9b0 fffff803`359e57e0 : nt!RtlpExecuteHandlerForException+0x12
ffffe385`4bcad7c0 fffff803`3572ab86     : ffffe385`4bcae6d8 ffffe385`4bcae410 ffffe385`4bcae6d8 ffffbe80`93d40180 : nt!RtlDispatchException+0x297
ffffe385`4bcadee0 fffff803`358078ac     : 00000000`00001000 ffffe385`4bcae780 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffe385`4bcae5a0 fffff803`35803a43     : 00000000`00000002 ffffbe80`93c80180 00000000`00000001 fffff803`3564b0b6 : nt!KiExceptionDispatch+0x12c
ffffe385`4bcae780 00000000`00000000     : ffffaa0c`1e0d6080 fffff803`35a2ad3e ffffaa0c`1ebf4080 00000000`00000001 : nt!KiPageFault+0x443


STACK_COMMAND:  .trap 0xffffbe8093da0e70 ; kb

SYMBOL_NAME:  nt!KiDispatchException+186

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.746

BUCKET_ID_FUNC_OFFSET:  186

FAILURE_BUCKET_ID:  0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {cbb9a1ac-821c-b542-365f-2dd5602e6100}
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80071436c6d, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5155

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 130846

    Key  : Analysis.Init.CPU.mSec
    Value: 577

    Key  : Analysis.Init.Elapsed.mSec
    Value: 190173

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80071436c6d

WRITE_ADDRESS: fffff80071efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffec89752376a0 -- (.trap 0xffffec89752376a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000ffff7f rbx=0000000000000000 rcx=0000000000000005
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80071436c6d rsp=ffffec8975237830 rbp=ffffb30536a42250
 r8=0000000000000102  r9=0000000000000000 r10=fffff8006e220ac0
r11=0000002d129388f7 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         ov up ei ng nz ac po nc
nt!KiTimerWaitTest+0x19d:
fffff800`71436c6d f02107          lock and dword ptr [rdi],eax ds:00000000`00000000=????????
Resetting default scope

STACK_TEXT:  
ffffec89`75237558 fffff800`715efe29     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffec89`75237560 fffff800`715ec129     : 00000000`00000003 00000000`0012e7a1 ffffda81`baf40180 fffff800`714cca80 : nt!KiBugCheckDispatch+0x69
ffffec89`752376a0 fffff800`71436c6d     : ffffb305`36a42188 00000000`00000000 ffffb305`36a42250 00000000`00000000 : nt!KiPageFault+0x469
ffffec89`75237830 fffff800`7143685c     : ffffb305`36a42180 00000000`00000000 ffffec89`75237b18 00000000`00000000 : nt!KiTimerWaitTest+0x19d
ffffec89`752378e0 fffff800`7143a189     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000b44bc : nt!KiProcessExpiredTimerList+0xdc
ffffec89`752379d0 fffff800`715e1aae     : ffffffff`00000000 ffffda81`baf40180 ffffda81`baf4b1c0 ffffb305`385e4080 : nt!KiRetireDpcList+0x9d9
ffffec89`75237c60 00000000`00000000     : ffffec89`75238000 ffffec89`75232000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiTimerWaitTest+19d

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  19d

FAILURE_BUCKET_ID:  AV_nt!KiTimerWaitTest

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8c029a8d-9f29-4bde-2664-6010a6365158}

Followup:     MachineOwner
---------

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff805756fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6593

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 127618

    Key  : Analysis.Init.CPU.mSec
    Value: 734

    Key  : Analysis.Init.Elapsed.mSec
    Value: 193094

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff805756fa320

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff805790ae280 -- (.trap 0xfffff805790ae280)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000044edcb8e rbx=0000000000000000 rcx=fffff805790ae470
rdx=ffffb386673e8958 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80574c333b7 rsp=fffff805790ae410 rbp=ffffcd09005bd050
 r8=0000000000000488  r9=0000000000000000 r10=fffff80574d116a0
r11=ffffd2f905a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff805`74c333b7 4883c420        add     rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:  
fffff805`790bce18 fffff805`74e595ba     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff805`790bce20 fffff805`74cc98bd     : 00001cc1`74f63ecc 00000000`00000000 fffff805`790ae300 fffff805`70f3f180 : nt!KeAccumulateTicks+0x18cb6a
fffff805`790bce80 fffff805`74cc973a     : fffff805`756f37c0 fffff805`790ae300 fffff805`000891f2 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
fffff805`790bcf30 fffff805`74c08725     : fffff805`756f37c0 fffff805`790bcf40 00000000`0000000c ffffd4bd`3b8bdc67 : nt!HalpTimerClockIpiRoutine+0x1a
fffff805`790bcf60 fffff805`74ddf9ea     : fffff805`790ae300 fffff805`756f37c0 ffffcd09`02953000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff805`790bcfb0 fffff805`74ddff57     : 00000000`00000010 fffff805`884e8499 fffff805`790ae4d8 fffff805`74ddff64 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff805`790ae280 fffff805`74c333b7     : ffffffff`ffffffd2 fffff805`74ca7e8e 00000000`00000010 00000000`00000286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff805`790ae410 fffff805`74ca7e8a     : 00000000`00000001 fffff805`790ae4c0 ffffcd08`fe04c300 fffff805`8825b347 : nt!KeYieldProcessorEx+0x17
fffff805`790ae440 fffff805`74d11700     : ffffcd08`44edcb8e 00000000`ffffff00 fffff805`790ae4c0 ffffcd08`fe026000 : nt!KxWaitForLockOwnerShip+0x2a
fffff805`790ae470 fffff805`87c26cef     : 00000000`00000000 ffffcd08`fe04c3f0 00000000`00000001 fffff805`8825f232 : nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x60
fffff805`790ae4a0 fffff805`834a3361     : fffff805`790ae599 00000000`00000000 fffff805`790aeb20 00001cb0`b957dd20 : dxgmms2!VidSchDdiNotifyDpc+0x1df
fffff805`790ae550 fffff805`88209bff     : ffffcd08`fc50c030 00000000`00000000 ffffcd08`fc50c030 ffffcd08`fc593000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff805`790ae600 ffffcd08`fc50c030     : 00000000`00000000 ffffcd08`fc50c030 ffffcd08`fc593000 fffff805`88209b92 : nvlddmkm+0x79bff
fffff805`790ae608 00000000`00000000     : ffffcd08`fc50c030 ffffcd08`fc593000 fffff805`88209b92 ffffcd08`fc593000 : 0xffffcd08`fc50c030


SYMBOL_NAME:  dxgmms2!VidSchDdiNotifyDpc+1df

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1df

FAILURE_BUCKET_ID:  0x133_DPC_dxgmms2!VidSchDdiNotifyDpc

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4e6d2d74-350e-3780-03d1-7dfcf1a310f1}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8d035e0ae560, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8d035e0ae4b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2656

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 21112

    Key  : Analysis.Init.CPU.mSec
    Value: 577

    Key  : Analysis.Init.Elapsed.mSec
    Value: 195477

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff8d035e0ae560

BUGCHECK_P3: ffff8d035e0ae4b8

BUGCHECK_P4: 0

TRAP_FRAME:  ffff8d035e0ae560 -- (.trap 0xffff8d035e0ae560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc08eebbbb1a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc08eebbbb1a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026180d7e7 rsp=ffff8d035e0ae6f0 rbp=000000b19b8b0be5
 r8=000000b19b8b0be5  r9=fffff80261400000 r10=fffff8025d4f9ac0
r11=ffff8d035e0ae800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
nt!KiInsertTimerTable+0x1e4617:
fffff802`6180d7e7 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff8d035e0ae4b8 -- (.exr 0xffff8d035e0ae4b8)
ExceptionAddress: fffff8026180d7e7 (nt!KiInsertTimerTable+0x00000000001e4617)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:  
ffff8d03`5e0ae238 fffff802`617efe29     : 00000000`00000139 00000000`00000003 ffff8d03`5e0ae560 ffff8d03`5e0ae4b8 : nt!KeBugCheckEx
ffff8d03`5e0ae240 fffff802`617f0250     : 00000000`0000003f 00000000`0000003f 00000000`00000008 ffffc08e`00000000 : nt!KiBugCheckDispatch+0x69
ffff8d03`5e0ae380 fffff802`617ee5e3     : ffffc08e`e3596080 ffff8d03`5e0ae500 00000000`00000000 fffff802`617e4cc6 : nt!KiFastFailDispatch+0xd0
ffff8d03`5e0ae560 fffff802`6180d7e7     : ffff8d03`5e0ae710 ffff8d03`5e0ae708 00000000`0000003f 00000000`0000003f : nt!KiRaiseSecurityCheckFailure+0x323
ffff8d03`5e0ae6f0 fffff802`6162753d     : ffffc08e`ebbbb080 fffff802`6fe1d272 00000000`00000000 ffffc08e`00000000 : nt!KiInsertTimerTable+0x1e4617
ffff8d03`5e0ae770 fffff802`6162ac03     : ffffc08e`000000e2 ffffc08e`00000000 00000000`00000001 00000000`00000001 : nt!KiCommitThreadWait+0x3bd
ffff8d03`5e0ae810 fffff802`6162a638     : ffffc08e`e8b3fac0 00000000`00000001 ffffc08e`eb3bb250 fffff802`00000002 : nt!KeRemoveQueueEx+0x263
ffff8d03`5e0ae8b0 fffff802`61add26d     : 00000000`00000000 00000000`00000000 ffffe700`30896180 fffff802`6163e2aa : nt!IoRemoveIoCompletion+0x98
ffff8d03`5e0ae9e0 fffff802`617ef878     : ffffc08e`ebbbb080 00000096`20fff788 ffff8d03`5e0aeaa8 000001f5`28cf1150 : nt!NtRemoveIoCompletion+0x13d
ffff8d03`5e0aea90 00007ffd`0810bee4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`20fff768 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`0810bee4


SYMBOL_NAME:  nt!KiInsertTimerTable+1e4617

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1e4617

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

Followup:     MachineOwner
---------

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff807410fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6093

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 234601

    Key  : Analysis.Init.CPU.mSec
    Value: 515

    Key  : Analysis.Init.Elapsed.mSec
    Value: 197983

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff807410fa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffffef0c93baa5b0 -- (.trap 0xffffef0c93baa5b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a34fc5dd rbx=0000000000000000 rcx=ffffef0c93baa7a8
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807406333b7 rsp=ffffef0c93baa740 rbp=0000000000000000
 r8=0000000000000000  r9=ffffb3802c550180 r10=0000000000000000
r11=fffff80740400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff807`406333b7 4883c420        add     rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

STACK_TEXT:  
ffffb380`2c569e18 fffff807`4085963e     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`410fa320 : nt!KeBugCheckEx
ffffb380`2c569e20 fffff807`406c98bd     : 00012455`e2af7e6e 00000000`00000000 ffffef0c`93baa600 ffffb380`2c550180 : nt!KeAccumulateTicks+0x18cbee
ffffb380`2c569e80 fffff807`406c973a     : ffffdc8c`b5905600 ffffef0c`93baa630 00000000`006b857e 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
ffffb380`2c569f30 fffff807`40608725     : ffffdc8c`b5905600 00000000`00000000 00000000`00000000 ffff21cc`2397026a : nt!HalpTimerClockIpiRoutine+0x1a
ffffb380`2c569f60 fffff807`407df9ea     : ffffef0c`93baa630 ffffdc8c`b5905600 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffb380`2c569fb0 fffff807`407dff57     : ffffef0c`93baa7a8 ffffdc8c`be997180 ffffdc8c`b5905600 ffffdc8c`be997180 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffef0c`93baa5b0 fffff807`406333b7     : ffffffff`ffffffd2 fffff807`4062981c 00000000`00000010 00000000`00040286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffef0c`93baa740 fffff807`4062981a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeYieldProcessorEx+0x17
ffffef0c`93baa770 fffff807`40627f6c     : ffffb380`2c340180 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCancelTimer+0x37a
ffffef0c`93baa820 fffff807`406272cf     : ffffdc8c`00000002 00000000`00000003 ffffef0c`93baa9e0 00000000`00000000 : nt!KiSwapThread+0x6cc
ffffef0c`93baa8d0 fffff807`40626b73     : 00000000`00000097 fffff807`00000000 00000000`00000001 ffffdc8c`be9971c0 : nt!KiCommitThreadWait+0x14f
ffffef0c`93baa970 fffff807`409fb6b1     : ffffdc8c`bfc9abe0 00000000`00000006 ffffdc8c`00000001 00000000`00000c00 : nt!KeWaitForSingleObject+0x233
ffffef0c`93baaa60 fffff807`409fb75a     : ffffdc8c`be997080 000000c9`d51ff758 00000000`00000000 00000296`2fcea800 : nt!ObWaitForSingleObject+0x91
ffffef0c`93baaac0 fffff807`407ef878     : 00000000`00000000 00000000`00000000 ffffef0c`93baab18 ffffffff`ffb38db0 : nt!NtWaitForSingleObject+0x6a
ffffef0c`93baab00 00007ffa`d162be44     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c9`d51ff728 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`d162be44


SYMBOL_NAME:  nt!KeAccumulateTicks+18cbee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  18cbee

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077791cfc, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffad8993d09b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3218

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6442

    Key  : Analysis.Init.CPU.mSec
    Value: 452

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8011

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1

BUGCHECK_P1: 77791cfc

BUGCHECK_P2: 0

BUGCHECK_P3: 1

BUGCHECK_P4: ffffad8993d09b80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

STACK_TEXT:  
ffffad89`93d09948 fffff806`44c07769     : 00000000`00000001 00000000`77791cfc 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
ffffad89`93d09950 fffff806`44c07633     : 00000000`07c3fda0 00000000`77794660 00000000`07e1f7a4 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffad89`93d09a90 00000000`77791cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000000`07c3ed48 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77791cfc


SYMBOL_NAME:  nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1fe

FAILURE_BUCKET_ID:  0x1_SysCallNum_1b0007_nt!KiSystemServiceExitPico

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1d25e8fe-40eb-1b84-9166-c3af30bbaf7e}
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8025e530e36, The address that the exception occurred at
Arg3: fffff909f0775ef8, Exception Record Address
Arg4: fffff909f0775730, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullClassPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 4452

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 103447

    Key  : Analysis.Init.CPU.mSec
    Value: 546

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10200

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8025e530e36

BUGCHECK_P3: fffff909f0775ef8

BUGCHECK_P4: fffff909f0775730

EXCEPTION_RECORD:  fffff909f0775ef8 -- (.exr 0xfffff909f0775ef8)
ExceptionAddress: fffff8025e530e36 (nvlddmkm+0x00000000007c0e36)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048

CONTEXT:  fffff909f0775730 -- (.cxr 0xfffff909f0775730)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc604dfbdc1d8
rdx=0000000000000000 rsi=ffffdb00d1a48c57 rdi=ffffc604dfb46000
rip=fffff8025e530e36 rsp=fffff909f0776130 rbp=ffffc604dfb67f20
 r8=0000000000000003  r9=0000000000000000 r10=0000000000000000
r11=ffffdb00d1a48cc3 r12=0000000000000000 r13=0000000000000000
r14=0000000000000002 r15=ffffc604dfb46180
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nvlddmkm+0x7c0e36:
fffff802`5e530e36 ff5048          call    qword ptr [rax+48h] ds:002b:00000000`00000048=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8024eafa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000048

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000048

EXCEPTION_STR:  0xc0000005

STACK_TEXT:  
fffff909`f0776130 00000000`00000000     : fffff802`5ded9543 00000000`00000001 fffff802`4e1d3608 00000000`000000ff : nvlddmkm+0x7c0e36


SYMBOL_NAME:  nvlddmkm+7c0e36

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffff909f0775730 ; kb

BUCKET_ID_FUNC_OFFSET:  7c0e36

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000011, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8041344a81c, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3218

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4396

    Key  : Analysis.Init.CPU.mSec
    Value: 468

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13061

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 11

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8041344a81c

READ_ADDRESS: fffff80413efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000011

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

TRAP_FRAME:  ffffa78aa6ba3800 -- (.trap 0xffffa78aa6ba3800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000a9 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffdf81a9b28180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041344a81c rsp=ffffa78aa6ba3990 rbp=ffffdf81a9a87ca8
 r8=00000000000008e1  r9=000000000000002f r10=0000fffff804134e
r11=ffffcf7939e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiExitDispatcher+0xcc:
fffff804`1344a81c 0fb64611        movzx   eax,byte ptr [rsi+11h] ds:00000000`00000011=??
Resetting default scope

STACK_TEXT:  
ffffa78a`a6ba36b8 fffff804`13607769     : 00000000`0000000a 00000000`00000011 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa78a`a6ba36c0 fffff804`13603a69     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`13465a1c : nt!KiBugCheckDispatch+0x69
ffffa78a`a6ba3800 fffff804`1344a81c     : ffffa78a`a6ba39e0 00000000`001f0003 ffffa887`f54f0000 fffff804`1382af81 : nt!KiPageFault+0x469
ffffa78a`a6ba3990 fffff804`1344a31a     : 00000000`00000000 00000000`00000000 ffffcd87`308e9760 00000000`00000000 : nt!KiExitDispatcher+0xcc
ffffa78a`a6ba3a00 fffff804`137fae1d     : 00000000`00000000 ffffa78a`a6ba3b80 ffffcd87`00000000 ffffcd87`32c4e440 : nt!KeSetEvent+0xea
ffffa78a`a6ba3a90 fffff804`136071b8     : ffffcd87`2210e080 00000000`00000000 ffffa78a`00000000 ffffcd87`00000000 : nt!NtSetEvent+0xbd
ffffa78a`a6ba3b00 00007ffa`1166c174     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e8`6e5fe008 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`1166c174


SYMBOL_NAME:  nt!KiExitDispatcher+cc

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.746

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  cc

FAILURE_BUCKET_ID:  AV_nt!KiExitDispatcher

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fa0b8b4b-4ad8-a0c3-2a8d-0bdbe49a67e8}
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff803007969e8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80177f1920b, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2889

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4049

    Key  : Analysis.Init.CPU.mSec
    Value: 421

    Key  : Analysis.Init.Elapsed.mSec
    Value: 15547

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: fffff803007969e8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80177f1920b

BUGCHECK_P4: 2

READ_ADDRESS: Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f908
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f918
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f928
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f938
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f948
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f958
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f968
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f978
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f988
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f998
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f9a8
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f9b8
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f9c8
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
GetUlongFromAddress: unable to read from fffff801786168c4
 fffff803007969e8

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

TRAP_FRAME:  ffffef0a3ee30460 -- (.trap 0xffffef0a3ee30460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff801786fa368 rbx=0000000000000000 rcx=ffff958c3122f080
rdx=00000000620271a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80177f1920b rsp=ffffef0a3ee305f0 rbp=ffff8381de728180
 r8=00000000310138d0  r9=00000000310138d0 r10=ffff958c2eb8c080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiConvertDynamicHeteroPolicy+0x4b:
fffff801`77f1920b 8b0490          mov     eax,dword ptr [rax+rdx*4] ds:fffff803`007969e8=????????
Resetting default scope

STACK_TEXT:  
ffffef0a`3ee301b8 fffff801`77e1e8bb     : 00000000`00000050 fffff803`007969e8 00000000`00000000 ffffef0a`3ee30460 : nt!KeBugCheckEx
ffffef0a`3ee301c0 fffff801`77c0c960     : 00000000`00000000 00000000`00000000 ffffef0a`3ee304e0 00000000`00000000 : nt!MiSystemFault+0x1f40ab
ffffef0a`3ee302c0 fffff801`77e0395e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffef0a`3ee30460 fffff801`77f1920b     : ffff958c`00000002 ffffef0a`00000005 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffef0a`3ee305f0 fffff801`77f195c7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiConvertDynamicHeteroPolicy+0x4b
ffffef0a`3ee30620 fffff801`77c4b0b6     : ffff958c`350c0b70 00000000`00000000 000001e8`d130a350 00000000`00000010 : nt!KiHeteroChooseTargetProcessor+0xa7
ffffef0a`3ee306f0 fffff801`77c4a891     : 000001e8`d130a350 00000000`0000038c ffff958c`3194b648 fffff801`77c43a4b : nt!KiDeferredReadySingleThread+0x566
ffffef0a`3ee308e0 00000000`00000000     : 00000000`00000000 000001e8`d130a350 0000007c`f21ffbc8 ffff958c`350c0b70 : nt!KiExitDispatcher+0x141


SYMBOL_NAME:  nt!KiConvertDynamicHeteroPolicy+4b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.746

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!KiConvertDynamicHeteroPolicy

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {82612117-fdf5-7a3e-5637-9d80a974c40f}
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffd0, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80033e611d6, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys

Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2796

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 45610

    Key  : Analysis.Init.CPU.mSec
    Value: 484

    Key  : Analysis.Init.Elapsed.mSec
    Value: 19019

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffffffffd0

BUGCHECK_P2: 2

BUGCHECK_P3: fffff80033e611d6

BUGCHECK_P4: 2

READ_ADDRESS: fffff800348fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffd0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  XboxPcApp.exe

TRAP_FRAME:  ffffe28adddda9a0 -- (.trap 0xffffe28adddda9a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=000000007457624f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80033e611d6 rsp=ffffe28addddab30 rbp=ffffe28addddabb0
 r8=ffffbf8f77374196  r9=0000000000000026 r10=00000000ffffffff
r11=000000000000016e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ObfDereferenceObjectWithTag+0x26:
fffff800`33e611d6 f0480fc15ed0    lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
Resetting default scope

STACK_TEXT:  
ffffe28a`dddda6f8 fffff800`3401e8bb     : 00000000`00000050 ffffffff`ffffffd0 00000000`00000002 ffffe28a`dddda9a0 : nt!KeBugCheckEx
ffffe28a`dddda700 fffff800`33e0c960     : 00000000`00000000 00000000`00000002 ffffe28a`ddddaa20 00000000`00000000 : nt!MiSystemFault+0x1f40ab
ffffe28a`dddda800 fffff800`3400395e     : 00000000`00000000 ffffa900`b3b28180 ffffbf8f`891d4340 fffff800`33e64d7f : nt!MmAccessFault+0x400
ffffe28a`dddda9a0 fffff800`33e611d6     : ffffe28a`ddddae20 fffff800`345b1019 00000000`00000000 ffffbf8f`891d4340 : nt!KiPageFault+0x35e
ffffe28a`ddddab30 fffff800`341f7786     : ffffe28a`ddddae18 00000000`ffffffff ffffbf8f`8b74fe10 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0x26
ffffe28a`ddddab70 ffff8210`87c34fb2     : 00000000`000186a0 00000000`00030d40 ffff8251`472cb530 ffffbf8f`82256970 : nt!ObWaitForMultipleObjects+0x336
ffffe28a`ddddb070 00000000`000186a0     : 00000000`00030d40 ffff8251`472cb530 ffffbf8f`82256970 00000000`00000001 : win32kfull+0x154fb2
ffffe28a`ddddb078 00000000`00030d40     : ffff8251`472cb530 ffffbf8f`82256970 00000000`00000001 ffffe28a`ddddb001 : 0x186a0
ffffe28a`ddddb080 ffff8251`472cb530     : ffffbf8f`82256970 00000000`00000001 ffffe28a`ddddb001 00000000`00000000 : 0x30d40
ffffe28a`ddddb088 ffffbf8f`82256970     : 00000000`00000001 ffffe28a`ddddb001 00000000`00000000 ffff8210`8784d781 : 0xffff8251`472cb530
ffffe28a`ddddb090 00000000`00000001     : ffffe28a`ddddb001 00000000`00000000 ffff8210`8784d781 00000004`00000001 : 0xffffbf8f`82256970
ffffe28a`ddddb098 ffffe28a`ddddb001     : 00000000`00000000 ffff8210`8784d781 00000004`00000001 00000000`00000000 : 0x1
ffffe28a`ddddb0a0 00000000`00000000     : ffff8210`8784d781 00000004`00000001 00000000`00000000 00000000`00000000 : 0xffffe28a`ddddb001


SYMBOL_NAME:  win32kfull+154fb2

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154fb2

FAILURE_BUCKET_ID:  AV_INVALID_win32kfull!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {813dd5ff-825f-5763-1a47-2fbfb9dbb6be}
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000102, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021c86457e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3093

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10685

    Key  : Analysis.Init.CPU.mSec
    Value: 437

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4877

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 102

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8021c86457e

WRITE_ADDRESS: fffff8021d2fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000102

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

TRAP_FRAME:  ffffe402ad1bf7e0 -- (.trap 0xffffe402ad1bf7e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000034d569 rbx=0000000000000000 rcx=ffffa3806e919180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021c86457e rsp=ffffe402ad1bf970 rbp=ffffe402ad1bfa01
 r8=0000000000000001  r9=0000007df719da83 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeWaitForSingleObject+0x18e:
fffff802`1c86457e f00fba2f07      lock bts dword ptr [rdi],7 ds:00000000`00000000=????????
Resetting default scope

STACK_TEXT:  
ffffe402`ad1bf698 fffff802`1ca07769     : 00000000`0000000a 00000000`00000102 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffe402`ad1bf6a0 fffff802`1ca03a69     : ffffa380`6e728100 ffff28e6`a3ede428 00000000`00000000 ffffd104`1f7e9180 : nt!KiBugCheckDispatch+0x69
ffffe402`ad1bf7e0 fffff802`1c86457e     : ffffd104`000000c6 fffff802`00000000 fffff802`1ad41101 ffffd104`1f7e91c0 : nt!KiPageFault+0x469
ffffe402`ad1bf970 fffff802`1cc2c6a1     : 00000000`00000102 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18e
ffffe402`ad1bfa60 fffff802`1cc2c74a     : ffffd104`1f7e9080 000000d0`210bf918 00000000`00000000 00000000`00040213 : nt!ObWaitForSingleObject+0x91
ffffe402`ad1bfac0 fffff802`1ca071b8     : 00000261`f0fbdae0 00000000`00000000 ffffe402`ad1bfb18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffe402`ad1bfb00 00007ffb`3d4cc034     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d0`210bf8e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`3d4cc034


SYMBOL_NAME:  nt!KeWaitForSingleObject+18e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.746

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  18e

FAILURE_BUCKET_ID:  AV_nt!KeWaitForSingleObject

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {505415ce-6277-25db-2465-e86127b1616c}
 
  • İlk iş başka bir ekran kartı ile dene.
  • İkincisi, güncel Memtest86 9.0 ile bellek testi yap ve sonucu paylaş.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffd01dac4c730, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffd01dac4c688, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2921

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 5111

Key : Analysis.Init.CPU.mSec
Value: 531

Key : Analysis.Init.Elapsed.mSec
Value: 6311

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: fffffd01dac4c730

BUGCHECK_P3: fffffd01dac4c688

BUGCHECK_P4: 0

TRAP_FRAME: fffffd01dac4c730 -- (.trap 0xfffffd01dac4c730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffd01dac4ca88 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff80774e074b8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80774e5ff9c rsp=fffffd01dac4c8c0 rbp=ffffc4012cf40180
r8=fffffd01dac4c9c8 r9=0000000000000001 r10=ffff980bb9070110
r11=00007fffffff0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!IopQueueIrpToFileObject+0x171f3c:
fffff807`74e5ff9c cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffffd01dac4c688 -- (.exr 0xfffffd01dac4c688)
ExceptionAddress: fffff80774e5ff9c (nt!IopQueueIrpToFileObject+0x0000000000171f3c)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
fffffd01`dac4c408 fffff807`74e07a69 : 00000000`00000139 00000000`00000003 fffffd01`dac4c730 fffffd01`dac4c688 : nt!KeBugCheckEx
fffffd01`dac4c410 fffff807`74e07e90 : ffffc401`00000000 fffff807`74f193ce ffff980b`c989e080 fffffd01`dac4c500 : nt!KiBugCheckDispatch+0x69
fffffd01`dac4c550 fffff807`74e06223 : 00000000`00000008 ffffc401`2cf40180 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffd01`dac4c730 fffff807`74e5ff9c : 980bc743`5c40b719 00000000`001a019f fffffd01`dac4c8f8 00000175`309368e0 : nt!KiRaiseSecurityCheckFailure+0x323
fffffd01`dac4c8c0 fffff807`74ffd970 : fffffd01`dac4cb80 fffff807`7502b17e ffff980b`d1364b70 00000000`00000000 : nt!IopQueueIrpToFileObject+0x171f3c
fffffd01`dac4c910 fffff807`74fe59b9 : ffff980b`00000000 fffffd01`dac4cb80 00000000`00000000 00000062`871ff7c0 : nt!IopSynchronousServiceTail+0x2a0
fffffd01`dac4c9b0 fffff807`74e074b8 : ffff980b`00000000 00000000`00000000 00000000`00000000 00000175`309368e0 : nt!NtReadFile+0x599
fffffd01`dac4ca90 00007ff8`fa4ec6e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000062`871ff738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`fa4ec6e4

SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffdf0f108dd560, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffdf0f108dd4b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2405

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 2431

Key : Analysis.Init.CPU.mSec
Value: 390

Key : Analysis.Init.Elapsed.mSec
Value: 4223

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffdf0f108dd560

BUGCHECK_P3: ffffdf0f108dd4b8

BUGCHECK_P4: 0

TRAP_FRAME: ffffdf0f108dd560 -- (.trap 0xffffdf0f108dd560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbe864319b1a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffbe864319b1a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80571e35e6f rsp=ffffdf0f108dd6f0 rbp=0000000375f56a41
r8=0000000375f56a41 r9=fffff80571a00000 r10=fffff8056f9d8ac0
r11=ffffdf0f108dd800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!KiInsertTimerTable+0x1cf1ef:
fffff805`71e35e6f cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffdf0f108dd4b8 -- (.exr 0xffffdf0f108dd4b8)
ExceptionAddress: fffff80571e35e6f (nt!KiInsertTimerTable+0x00000000001cf1ef)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

PROCESS_NAME: opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffdf0f`108dd238 fffff805`71e07a69 : 00000000`00000139 00000000`00000003 ffffdf0f`108dd560 ffffdf0f`108dd4b8 : nt!KeBugCheckEx
ffffdf0f`108dd240 fffff805`71e07e90 : 00000000`0000003f 00000000`0000003f 00000000`00000008 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffdf0f`108dd380 fffff805`71e06223 : ffffbe86`3fd41080 ffffdf0f`108dd500 00000000`00000000 fffff805`71dfc806 : nt!KiFastFailDispatch+0xd0
ffffdf0f`108dd560 fffff805`71e35e6f : ffffdf0f`108dd710 ffffdf0f`108dd708 00000000`0000003f 00000000`0000003f : nt!KiRaiseSecurityCheckFailure+0x323
ffffdf0f`108dd6f0 fffff805`71c64fed : ffffbe86`4319b080 fffff805`8252d272 00000000`00000000 ffffbe86`00000000 : nt!KiInsertTimerTable+0x1cf1ef
ffffdf0f`108dd770 fffff805`71c686b3 : ffffbe86`0000007d ffffbe86`00000000 00000000`00000001 00000000`00000001 : nt!KiCommitThreadWait+0x3bd
ffffdf0f`108dd810 fffff805`71c680e8 : ffffbe86`40e7fec0 00000000`00000001 ffffbe86`444dea30 fffff805`00000002 : nt!KeRemoveQueueEx+0x263
ffffdf0f`108dd8b0 fffff805`720b7e9d : 00000000`00000000 00000000`00000000 ffff9480`639ea180 fffff805`71c4a31a : nt!IoRemoveIoCompletion+0x98
ffffdf0f`108dd9e0 fffff805`71e074b8 : ffffbe86`4319b080 000000da`9c9ff618 ffffdf0f`108ddaa8 00000239`4730a960 : nt!NtRemoveIoCompletion+0x13d
ffffdf0f`108dda90 00007ffa`ab46c744 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000da`9c9ff5f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ab46c744

SYMBOL_NAME: nt!KiInsertTimerTable+1cf1ef

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1cf1ef

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffb18072033158, Virtual address for the attempted execute.
Arg2: 81000001ce712963, PTE contents.
Arg3: ffffeb07f3adf5e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2531

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 4224

Key : Analysis.Init.CPU.mSec
Value: 484

Key : Analysis.Init.Elapsed.mSec
Value: 9342

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: fc

BUGCHECK_P1: ffffb18072033158

BUGCHECK_P2: 81000001ce712963

BUGCHECK_P3: ffffeb07f3adf5e0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

TRAP_FRAME: ffffeb07f3adf5e0 -- (.trap 0xffffeb07f3adf5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffda8c53802228 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000da rsi=0000000000000000 rdi=0000000000000000
rip=ffffb18072033158 rsp=ffffeb07f3adf770 rbp=ffffc480a6140180
r8=00000001000000ed r9=ffffc480a6350180 r10=ffffda8c4ea75300
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffb180`72033158 8831 mov byte ptr [rcx],dh ds:00000000`00000000=??
Resetting default scope

STACK_TEXT:
ffffeb07`f3adf2f8 fffff800`232718f0 : 00000000`000000fc ffffb180`72033158 81000001`ce712963 ffffeb07`f3adf5e0 : nt!KeBugCheckEx
ffffeb07`f3adf300 fffff800`2302aed6 : ffffb180`72033158 ffffeb07`f3adf500 00000000`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x159368
ffffeb07`f3adf340 fffff800`2300c960 : 3ed3950e`c7f71438 00000000`00000011 ffffeb07`f3adf660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffeb07`f3adf440 fffff800`23203c5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffeb07`f3adf5e0 ffffb180`72033158 : ffffb180`00000002 fffff800`00000005 00000000`00000000 ffffda8c`00000000 : nt!KiPageFault+0x35e
ffffeb07`f3adf770 ffffb180`00000002 : fffff800`00000005 00000000`00000000 ffffda8c`00000000 ffffb180`00000000 : 0xffffb180`72033158
ffffeb07`f3adf778 fffff800`00000005 : 00000000`00000000 ffffda8c`00000000 ffffb180`00000000 ffffda8c`534533b0 : 0xffffb180`00000002
ffffeb07`f3adf780 00000000`00000000 : ffffda8c`00000000 ffffb180`00000000 ffffda8c`534533b0 ffffc480`00000000 : 0xfffff800`00000005

SYMBOL_NAME: nt!MiCheckSystemNxFault+159368

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 159368

FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup: MachineOwner
---------

KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000011, Type of corruption detected
Arg2: ffff9902ae010100, Address of the heap that reported the corruption
Arg3: ffff9902b8c0b180, Address at which the corruption was detected
Arg4: 0000000000000000

Debugging Details:
------------------

fffff8015c8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
HeapDbgInitExtension Failed
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5593

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 7511

Key : Analysis.Init.CPU.mSec
Value: 468

Key : Analysis.Init.Elapsed.mSec
Value: 2965

Key : Analysis.Memory.CommitPeak.Mb
Value: 72

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 13a

BUGCHECK_P1: 11

BUGCHECK_P2: ffff9902ae010100

BUGCHECK_P3: ffff9902b8c0b180

BUGCHECK_P4: 0

POOL_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9902b8c0b180

FREED_POOL_TAG: NpFR

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

IRP_ADDRESS: ffff9902bc31d788

STACK_TEXT:
ffffef86`3fe06588 fffff801`5c18da88 : 00000000`0000013a 00000000`00000011 ffff9902`ae010100 ffff9902`b8c0b180 : nt!KeBugCheckEx
ffffef86`3fe06590 fffff801`5c18dae8 : 00000000`00000011 00000000`00000000 ffff9902`ae010100 00000000`00000000 : nt!RtlpHeapHandleError+0x40
ffffef86`3fe065d0 fffff801`5c18d715 : 00000000`00000080 ffff9902`b8c02000 00000000`00000000 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58
ffffef86`3fe06600 fffff801`5c025fae : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
ffffef86`3fe06630 fffff801`5be4caf2 : ffff9902`ae010340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x1ed85e
ffffef86`3fe066e0 fffff801`5c5b1019 : 00000000`00000000 ffff9902`bc4911b0 ffff9902`b6c941c0 01000000`00100000 : nt!ExFreeHeapPool+0x362
ffffef86`3fe067c0 fffff801`5be4984e : 00000000`00000000 00000000`00000000 ffff9902`b6c94080 fffff801`5be686b3 : nt!ExFreePool+0x9
ffffef86`3fe067f0 fffff801`5be683e3 : ffff9902`bc31d800 00000000`00000001 ffff9902`bcf800d0 ffff9902`bcf800c0 : nt!IopCompleteRequest+0x8e
ffffef86`3fe068b0 fffff801`5c2b7ebd : 00000000`00000000 00000000`00000000 ffffa900`7adea180 fffff801`5be4a31a : nt!IoRemoveIoCompletion+0x393
ffffef86`3fe069e0 fffff801`5c0075b8 : ffff9902`b6c94080 000000bb`cffff878 ffffef86`3fe06aa8 000066b0`0042a9e8 : nt!NtRemoveIoCompletion+0x13d
ffffef86`3fe06a90 00007ff8`c708cd34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bb`cffff858 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c708cd34

SYMBOL_NAME: nt!RtlpHeapHandleError+40

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.867

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 40

FAILURE_BUCKET_ID: 0x13a_11_NpFR_nt!RtlpHeapHandleError

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {fb64e459-d0f8-9b93-8910-770f3e5ecf0d}

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8003895a266, Address of the instruction which caused the bugcheck
Arg3: ffffc7819a592920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2656

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 4752

Key : Analysis.Init.CPU.mSec
Value: 593

Key : Analysis.Init.Elapsed.mSec
Value: 25644

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8003895a266

BUGCHECK_P3: ffffc7819a592920

BUGCHECK_P4: 0

CONTEXT: ffffc7819a592920 -- (.cxr 0xffffc7819a592920)
rax=ffffa10a44e07be8 rbx=ffffa10a446de080 rcx=a10a44e07bb0b06b
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffa10a44e07be0
rip=fffff8003895a266 rsp=ffffc68d79ef4940 rbp=ffffc68d79ef4a01
r8=0000000000000000 r9=000000260630757e r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=a10a44e07bb0b06b
r14=0000000000000000 r15=ffffa10a446de1c0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!KeAbPreWait+0x6:
fffff800`3895a266 0fb64120 movzx eax,byte ptr [rcx+20h] ds:002b:a10a44e0`7bb0b08b=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

STACK_TEXT:
ffffc68d`79ef4940 fffff800`38a34951 : 00000000`0000008b fffff800`38c2b3e1 ffffffff`ffffff01 ffffa10a`446de1c0 : nt!KeAbPreWait+0x6
ffffc68d`79ef4970 fffff800`38c2cb01 : ffffa10a`44e07be0 00000000`00000006 00000000`00000001 ffffa10a`00000000 : nt!KeWaitForSingleObject+0x1d0561
ffffc68d`79ef4a60 fffff800`38c2cbaa : ffffa10a`446de080 00000000`00000000 00000000`00000000 00000000`21eff96c : nt!ObWaitForSingleObject+0x91
ffffc68d`79ef4ac0 fffff800`38a075b8 : ffffa10a`446de080 ffffa10a`44974080 ffffc68d`79ef4b18 ffffffff`ffff3cb0 : nt!NtWaitForSingleObject+0x6a
ffffc68d`79ef4b00 00000000`771f1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1367f218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771f1cfc

SYMBOL_NAME: nt!KeAbPreWait+6

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.867

STACK_COMMAND: .cxr 0xffffc7819a592920 ; kb

BUCKET_ID_FUNC_OFFSET: 6

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KeAbPreWait

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {9ca4a719-6b4f-fb47-f634-e80e5eda3be8}

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8085e820d560, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8085e820d4b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2515

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 6257

Key : Analysis.Init.CPU.mSec
Value: 577

Key : Analysis.Init.Elapsed.mSec
Value: 23311

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff8085e820d560

BUGCHECK_P3: ffff8085e820d4b8

BUGCHECK_P4: 0

TRAP_FRAME: ffff8085e820d560 -- (.trap 0xffff8085e820d560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd181dbecb1a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd181dbecb1a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80520a35e6f rsp=ffff8085e820d6f0 rbp=000000028c59d294
r8=000000028c59d294 r9=fffff80520600000 r10=fffff8051dba4ac0
r11=ffff8085e820d800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiInsertTimerTable+0x1cf1ef:
fffff805`20a35e6f cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffff8085e820d4b8 -- (.exr 0xffff8085e820d4b8)
ExceptionAddress: fffff80520a35e6f (nt!KiInsertTimerTable+0x00000000001cf1ef)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffff8085`e820d238 fffff805`20a07a69 : 00000000`00000139 00000000`00000003 ffff8085`e820d560 ffff8085`e820d4b8 : nt!KeBugCheckEx
ffff8085`e820d240 fffff805`20a07e90 : 000de1ba`0000ffff 00000000`000000ff 00000000`ffffffff 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8085`e820d380 fffff805`20a06223 : ffffd181`db9a5080 ffff8085`e820d500 00000000`00000000 fffff805`209fc806 : nt!KiFastFailDispatch+0xd0
ffff8085`e820d560 fffff805`20a35e6f : ffff8085`e820d710 ffff8085`e820d708 00000000`0000003f 00000000`0000003f : nt!KiRaiseSecurityCheckFailure+0x323
ffff8085`e820d6f0 fffff805`20864fed : ffffd181`dbecb080 fffff805`3168d272 00000000`00000000 ffffd181`00000000 : nt!KiInsertTimerTable+0x1cf1ef
ffff8085`e820d770 fffff805`208686b3 : ffffd181`00000016 ffffd181`00000000 00000000`00000001 00000000`00000001 : nt!KiCommitThreadWait+0x3bd
ffff8085`e820d810 fffff805`208680e8 : ffffd181`dbe18a00 00000000`00000001 ffffd181`de8161f0 fffff805`00000002 : nt!KeRemoveQueueEx+0x263
ffff8085`e820d8b0 fffff805`20cb7e9d : 00000000`00000000 00000000`00000000 fffff805`1dba1180 fffff805`2084a31a : nt!IoRemoveIoCompletion+0x98
ffff8085`e820d9e0 fffff805`20a074b8 : ffffd181`dbecb080 00000044`6a25f358 ffff8085`e820daa8 00000237`84172620 : nt!NtRemoveIoCompletion+0x13d
ffff8085`e820da90 00007fff`a92ec744 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000044`6a25f338 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a92ec744

SYMBOL_NAME: nt!KiInsertTimerTable+1cf1ef

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1cf1ef

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff983c3efb810, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff983c3efb768, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2609

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 11020

Key : Analysis.Init.CPU.mSec
Value: 593

Key : Analysis.Init.Elapsed.mSec
Value: 21186

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff983c3efb810

BUGCHECK_P3: fffff983c3efb768

BUGCHECK_P4: 0

TRAP_FRAME: fffff983c3efb810 -- (.trap 0xfffff983c3efb810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd489e0080158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc20041f47d80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800038127b0 rsp=fffff983c3efb9a0 rbp=fffff80001509180
r8=0000000000000000 r9=0000000000000000 r10=0000fffff8000300
r11=ffffa2000a10a8c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiTryUnwaitThread+0x1c6460:
fffff800`038127b0 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffff983c3efb768 -- (.exr 0xfffff983c3efb768)
ExceptionAddress: fffff800038127b0 (nt!KiTryUnwaitThread+0x00000000001c6460)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
fffff983`c3efb4e8 fffff800`03807a69 : 00000000`00000139 00000000`00000003 fffff983`c3efb810 fffff983`c3efb768 : nt!KeBugCheckEx
fffff983`c3efb4f0 fffff800`03807e90 : 00000000`00000000 00000000`00000005 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff983`c3efb630 fffff800`03806223 : 00000000`c3000001 00000001`00000000 ffffd489`dfb19080 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff983`c3efb810 fffff800`038127b0 : 00000000`0000a292 fffff800`03a2b3c1 00000000`00000000 fffff983`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff983`c3efb9a0 fffff800`0364a388 : ffffd489`dac0c5e0 00000000`00000000 fffff800`01509180 00000000`00000000 : nt!KiTryUnwaitThread+0x1c6460
fffff983`c3efba00 fffff800`039fb17d : 00000000`00000000 fffff983`c3efbb80 00000000`1aa7e798 ffffd489`e00801c0 : nt!KeSetEvent+0x158
fffff983`c3efba90 fffff800`038074b8 : ffffd489`de78a080 ffffd489`e29e2560 fffff983`00000000 ffffd489`00000000 : nt!NtSetEvent+0xbd
fffff983`c3efbb00 00000000`77e41cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1aa7f088 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77e41cfc

SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffdf0f108dd560, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffdf0f108dd4b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2531

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 7420

Key : Analysis.Init.CPU.mSec
Value: 484

Key : Analysis.Init.Elapsed.mSec
Value: 19118

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffdf0f108dd560

BUGCHECK_P3: ffffdf0f108dd4b8

BUGCHECK_P4: 0

TRAP_FRAME: ffffdf0f108dd560 -- (.trap 0xffffdf0f108dd560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbe864319b1a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffbe864319b1a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80571e35e6f rsp=ffffdf0f108dd6f0 rbp=0000000375f56a41
r8=0000000375f56a41 r9=fffff80571a00000 r10=fffff8056f9d8ac0
r11=ffffdf0f108dd800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!KiInsertTimerTable+0x1cf1ef:
fffff805`71e35e6f cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffdf0f108dd4b8 -- (.exr 0xffffdf0f108dd4b8)
ExceptionAddress: fffff80571e35e6f (nt!KiInsertTimerTable+0x00000000001cf1ef)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffdf0f`108dd238 fffff805`71e07a69 : 00000000`00000139 00000000`00000003 ffffdf0f`108dd560 ffffdf0f`108dd4b8 : nt!KeBugCheckEx
ffffdf0f`108dd240 fffff805`71e07e90 : 00000000`0000003f 00000000`0000003f 00000000`00000008 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffdf0f`108dd380 fffff805`71e06223 : ffffbe86`3fd41080 ffffdf0f`108dd500 00000000`00000000 fffff805`71dfc806 : nt!KiFastFailDispatch+0xd0
ffffdf0f`108dd560 fffff805`71e35e6f : ffffdf0f`108dd710 ffffdf0f`108dd708 00000000`0000003f 00000000`0000003f : nt!KiRaiseSecurityCheckFailure+0x323
ffffdf0f`108dd6f0 fffff805`71c64fed : ffffbe86`4319b080 fffff805`8252d272 00000000`00000000 ffffbe86`00000000 : nt!KiInsertTimerTable+0x1cf1ef
ffffdf0f`108dd770 fffff805`71c686b3 : ffffbe86`0000007d ffffbe86`00000000 00000000`00000001 00000000`00000001 : nt!KiCommitThreadWait+0x3bd
ffffdf0f`108dd810 fffff805`71c680e8 : ffffbe86`40e7fec0 00000000`00000001 ffffbe86`444dea30 fffff805`00000002 : nt!KeRemoveQueueEx+0x263
ffffdf0f`108dd8b0 fffff805`720b7e9d : 00000000`00000000 00000000`00000000 ffff9480`639ea180 fffff805`71c4a31a : nt!IoRemoveIoCompletion+0x98
ffffdf0f`108dd9e0 fffff805`71e074b8 : ffffbe86`4319b080 000000da`9c9ff618 ffffdf0f`108ddaa8 00000239`4730a960 : nt!NtRemoveIoCompletion+0x13d
ffffdf0f`108dda90 00007ffa`ab46c744 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000da`9c9ff5f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ab46c744

SYMBOL_NAME: nt!KiInsertTimerTable+1cf1ef

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1cf1ef

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8075ab55a25, Address of the instruction which caused the bugcheck
Arg3: fffff8075e6c4920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3343

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 17879

Key : Analysis.Init.CPU.mSec
Value: 562

Key : Analysis.Init.Elapsed.mSec
Value: 16545

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8075ab55a25

BUGCHECK_P3: fffff8075e6c4920

BUGCHECK_P4: 0

CONTEXT: fffff8075e6c4920 -- (.cxr 0xfffff8075e6c4920)
rax=ffffc1839dd05378 rbx=ffffc1839dd52080 rcx=ffffc183983f8080
rdx=c1838fe59eb05e65 rsi=ffffc1839dd52378 rdi=ffffc1839dd52080
rip=fffff8075ab55a25 rsp=ffffd30ef7e676d0 rbp=ffffc183983f8080
r8=0000000000000001 r9=0000000000000000 r10=0000fffff8075ab6
r11=ffff87f934c00000 r12=0000000000000002 r13=0000000000000001
r14=ffffc183983f8080 r15=0000000000000001
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!KeTerminateThread+0x9d:
fffff807`5ab55a25 48397208 cmp qword ptr [rdx+8],rsi ds:002b:c1838fe5`9eb05e6d=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

STACK_TEXT:
ffffd30e`f7e676d0 fffff807`5af069a9 : ffffc183`9dd524b8 00000000`00000000 ffffd30e`f7e67920 00000000`00000000 : nt!KeTerminateThread+0x9d
ffffd30e`f7e67760 fffff807`5aed2868 : 00000000`40010004 00000000`00000000 00000000`00004438 00000000`421aa000 : nt!PspExitThread+0x489
ffffd30e`f7e67860 fffff807`5aa67fb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffd30e`f7e678a0 fffff807`5abfa020 : 00000000`00000002 ffffd30e`f7e67950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffffd30e`f7e67950 fffff807`5ac0755f : 00000000`4debf310 ffffc183`9dd52080 00000000`4debf328 ffffd30e`f7e67aa8 : nt!KiInitiateUserApc+0x70
ffffd30e`f7e67a90 00000000`77281cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`4debf308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77281cfc

SYMBOL_NAME: nt!KeTerminateThread+9d

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .cxr 0xfffff8075e6c4920 ; kb

BUCKET_ID_FUNC_OFFSET: 9d

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KeTerminateThread

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {fda1cdc8-9131-aeee-19ba-1ee82538d84d}
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffc987bf0a98f8, Virtual address for the attempted execute.
Arg2: 81000001d7ea3963, PTE contents.
Arg3: ffffdc8f18aca5e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2937

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 12863

Key : Analysis.Init.CPU.mSec
Value: 593

Key : Analysis.Init.Elapsed.mSec
Value: 14105

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: fc

BUGCHECK_P1: ffffc987bf0a98f8

BUGCHECK_P2: 81000001d7ea3963

BUGCHECK_P3: ffffdc8f18aca5e0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

TRAP_FRAME: ffffdc8f18aca5e0 -- (.trap 0xffffdc8f18aca5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffde098f607138 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000019 rsi=0000000000000000 rdi=0000000000000000
rip=ffffc987bf0a98f8 rsp=ffffdc8f18aca770 rbp=ffff870075140180
r8=0000000100000143 r9=ffff870075140180 r10=ffffde098a666340
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffc987`bf0a98f8 28990abf87c9 sub byte ptr [rcx-367840F6h],bl ds:ffffffff`c987bf0a=??
Resetting default scope

STACK_TEXT:
ffffdc8f`18aca2f8 fffff806`7b4718f0 : 00000000`000000fc ffffc987`bf0a98f8 81000001`d7ea3963 ffffdc8f`18aca5e0 : nt!KeBugCheckEx
ffffdc8f`18aca300 fffff806`7b22aed6 : ffffc987`bf0a98f8 ffffdc8f`18aca500 ffffdc8f`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x159368
ffffdc8f`18aca340 fffff806`7b20c960 : 00000000`00000000 00000000`00000011 ffffdc8f`18aca660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffdc8f`18aca440 fffff806`7b403c5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffdc8f`18aca5e0 ffffc987`bf0a98f8 : ffffc987`00000002 fffff806`00000003 00000000`00000000 ffffde09`00000000 : nt!KiPageFault+0x35e
ffffdc8f`18aca770 ffffc987`00000002 : fffff806`00000003 00000000`00000000 ffffde09`00000000 ffffc987`00000000 : 0xffffc987`bf0a98f8
ffffdc8f`18aca778 fffff806`00000003 : 00000000`00000000 ffffde09`00000000 ffffc987`00000000 ffffde09`8f58db00 : 0xffffc987`00000002
ffffdc8f`18aca780 00000000`00000000 : ffffde09`00000000 ffffc987`00000000 ffffde09`8f58db00 ffff8700`00000000 : 0xfffff806`00000003

SYMBOL_NAME: nt!MiCheckSystemNxFault+159368

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 159368

FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe585c1909560, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe585c19094b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2577

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 6325

Key : Analysis.Init.CPU.mSec
Value: 624

Key : Analysis.Init.Elapsed.mSec
Value: 11490

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffe585c1909560

BUGCHECK_P3: ffffe585c19094b8

BUGCHECK_P4: 0

TRAP_FRAME: ffffe585c1909560 -- (.trap 0xffffe585c1909560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd586768451e0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd586768451e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80626435e6f rsp=ffffe585c19096f0 rbp=00000007eeb5b724
r8=00000007eeb5b724 r9=fffff80626000000 r10=fffff80623860ac0
r11=ffffe585c1909800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiInsertTimerTable+0x1cf1ef:
fffff806`26435e6f cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffe585c19094b8 -- (.exr 0xffffe585c19094b8)
ExceptionAddress: fffff80626435e6f (nt!KiInsertTimerTable+0x00000000001cf1ef)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffe585`c1909238 fffff806`26407a69 : 00000000`00000139 00000000`00000003 ffffe585`c1909560 ffffe585`c19094b8 : nt!KeBugCheckEx
ffffe585`c1909240 fffff806`26407e90 : 00000000`0000003f 00000000`0000003f 00000000`00000008 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffe585`c1909380 fffff806`26406223 : ffffd586`76841080 ffffe585`c1909500 00000000`00000000 fffff806`263fc806 : nt!KiFastFailDispatch+0xd0
ffffe585`c1909560 fffff806`26435e6f : 00000000`00000000 00000000`c1909708 00000000`00000000 00000000`0000003f : nt!KiRaiseSecurityCheckFailure+0x323
ffffe585`c19096f0 fffff806`26264fed : ffffd586`768450c0 fffff806`00000000 00000000`00000000 ffffd586`00000000 : nt!KiInsertTimerTable+0x1cf1ef
ffffe585`c1909770 fffff806`262686b3 : ffffd586`000000ad ffffd586`00000000 00000000`00000001 00000000`00000001 : nt!KiCommitThreadWait+0x3bd
ffffe585`c1909810 fffff806`262680e8 : ffffd586`76476b80 00000000`00000001 ffffd586`7acc29e0 fffff806`00000002 : nt!KeRemoveQueueEx+0x263
ffffe585`c19098b0 fffff806`266b7e9d : 00000000`00000000 00000000`00000000 ffffc381`f5742180 fffff806`2624a31a : nt!IoRemoveIoCompletion+0x98
ffffe585`c19099e0 fffff806`264074b8 : ffffd586`768450c0 000000b6`46bff8e8 ffffe585`c1909aa8 0000021a`b4d69fa0 : nt!NtRemoveIoCompletion+0x13d
ffffe585`c1909a90 00007ff9`be56c744 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b6`46bff8c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`be56c744

SYMBOL_NAME: nt!KiInsertTimerTable+1cf1ef

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1cf1ef

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000a297a3f0, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8054de773d0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3015

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 15461

Key : Analysis.Init.CPU.mSec
Value: 561

Key : Analysis.Init.Elapsed.mSec
Value: 32580

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: a

BUGCHECK_P1: a297a3f0

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8054de773d0

READ_ADDRESS: fffff8054e8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000a297a3f0

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffdd0f216374f0 -- (.trap 0xffffdd0f216374f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a297a3f0 rbx=0000000000000000 rcx=0000000000000000
rdx=00000002f649e8dd rsi=0000000000000000 rdi=0000000000000000
rip=fffff8054de773d0 rsp=ffffdd0f21637680 rbp=0000000000000001
r8=0000000000000001 r9=ffffde8ea4cc6101 r10=0000fffff8054dee
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!KeAcquireSpinLockAtDpcLevel+0x30:
fffff805`4de773d0 f0480fba2b00 lock bts qword ptr [rbx],0 ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffffdd0f`216373a8 fffff805`4e007a69 : 00000000`0000000a 00000000`a297a3f0 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffdd0f`216373b0 fffff805`4e003d69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffdd0f`216374f0 fffff805`4de773d0 : ffff9681`6c940180 fffff805`4de72230 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffdd0f`21637680 fffff805`4e161275 : 00000000`00000200 fffffd17`1b07af70 00000002`f649e89e ffffde8e`a4cc6100 : nt!KeAcquireSpinLockAtDpcLevel+0x30
ffffdd0f`216376b0 fffff805`4de70d62 : ffffde8e`a4cc6010 00000000`00000000 ffffde8e`a4cc6010 00000002`f649e89e : nt!PpmIdleUpdateConcurrency+0x35
ffffdd0f`216376f0 fffff805`4de70154 : 00000000`00000000 00001f80`00f3003b 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xa92
ffffdd0f`21637af0 fffff805`4dff95a4 : ffffffff`00000000 ffff9681`6c94b1c0 ffffde8e`ae16d080 00000000`000006c0 : nt!PoIdle+0x374
ffffdd0f`21637c60 00000000`00000000 : ffffdd0f`21638000 ffffdd0f`21632000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54

SYMBOL_NAME: nt!KeAcquireSpinLockAtDpcLevel+30

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 30

FAILURE_BUCKET_ID: AV_nt!KeAcquireSpinLockAtDpcLevel

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {83a2e79c-7ee0-6968-f863-105a1ecf5ef5}
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc50c32d4b2a0, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffc50c32d4b2a0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3140

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 63751

Key : Analysis.Init.CPU.mSec
Value: 687

Key : Analysis.Init.Elapsed.mSec
Value: 412966

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffc50c32d4b2a0

BUGCHECK_P2: 11

BUGCHECK_P3: ffffc50c32d4b2a0

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff80282cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc50c32d4b2a0

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: ffff9001d49fe5e0 -- (.trap 0xffff9001d49fe5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc50c32d131d8 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000005c rsi=0000000000000000 rdi=0000000000000000
rip=ffffc50c32d4b2a0 rsp=ffff9001d49fe770 rbp=ffffb1809ff40180
r8=00000001000000f0 r9=ffffb1809fbea180 r10=ffffc50c2f9de080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffc50c`32d4b2a0 a0b2d4320cc5ffffa0 mov al,byte ptr [A0FFFFC50C32D4B2h] ds:a0ffffc5`0c32d4b2=??
Resetting default scope

STACK_TEXT:
ffff9001`d49fe338 fffff802`82435de9 : 00000000`00000050 ffffc50c`32d4b2a0 00000000`00000011 ffff9001`d49fe5e0 : nt!KeBugCheckEx
ffff9001`d49fe340 fffff802`82212d00 : ffff9001`d49fe4a0 00000000`00000011 ffff9001`d49fe660 00000000`00000000 : nt!MiSystemFault+0x1ae0e9
ffff9001`d49fe440 fffff802`823ec01e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff9001`d49fe5e0 ffffc50c`32d4b2a0 : ffffc50c`00000002 00000000`00000005 00000000`00000000 ffffb180`00000000 : nt!KiPageFault+0x35e
ffff9001`d49fe770 ffffc50c`00000002 : 00000000`00000005 00000000`00000000 ffffb180`00000000 ffffc50c`2ee2d000 : 0xffffc50c`32d4b2a0
ffff9001`d49fe778 00000000`00000005 : 00000000`00000000 ffffb180`00000000 ffffc50c`2ee2d000 ffffc50c`307b2248 : 0xffffc50c`00000002
ffff9001`d49fe780 00000000`00000000 : ffffb180`00000000 ffffc50c`2ee2d000 ffffc50c`307b2248 ffffc50c`00000000 : 0x5

SYMBOL_NAME: nt!MiSystemFault+1ae0e9

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 1ae0e9

FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}

Followup: MachineOwner
---------

3: kd> db ffffc50c32d4b2a0
ffffc50c`32d4b2a0 a0 b2 d4 32 0c c5 ff ff-a0 b2 d4 32 0c c5 ff ff ...2.......2....
ffffc50c`32d4b2b0 50 1d aa 30 0c c5 ff ff-00 00 00 00 00 00 00 00 P..0............
ffffc50c`32d4b2c0 50 31 d1 32 0c c5 ff ff-50 31 d1 32 0c c5 ff ff P1.2....P1.2....
ffffc50c`32d4b2d0 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
ffffc50c`32d4b2e0 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
ffffc50c`32d4b2f0 01 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
ffffc50c`32d4b300 00 00 00 00 00 00 00 00-ff ff ff ff ff ff ff ff ................
ffffc50c`32d4b310 00 ff 19 02 46 69 6c 65-ff ff ff ff ff ff ff ff ....File........
3: kd> !address ffffc50c32d4b2a0
Mapping user range ...
ERROR: !address: extension exception 0x80004005.
"ExtRemoteTyped::Set from type and offset"
3: kd> u ffffc50c32d4b2a0
ffffc50c`32d4b2a0 a0b2d4320cc5ffffa0 mov al,byte ptr [A0FFFFC50C32D4B2h]
ffffc50c`32d4b2a9 b2d4 mov dl,0D4h
ffffc50c`32d4b2ab 320cc5ffff501d xor cl,byte ptr [rax*8+1D50FFFFh]
ffffc50c`32d4b2b2 aa stos byte ptr [rdi]
ffffc50c`32d4b2b3 300cc5ffff0000 xor byte ptr [rax*8+0FFFFh],cl
ffffc50c`32d4b2ba 0000 add byte ptr [rax],al
ffffc50c`32d4b2bc 0000 add byte ptr [rax],al
ffffc50c`32d4b2be 0000 add byte ptr [rax],al
3: kd> r
rax=0000000000000000 rbx=ffffc50c32d4b2a0 rcx=0000000000000050
rdx=ffffc50c32d4b2a0 rsi=0000000000000000 rdi=ffff9001d49fe500
rip=fffff802823ddf40 rsp=ffff9001d49fe338 rbp=ffffc50c2ee2d080
r8=0000000000000011 r9=ffff9001d49fe5e0 r10=0000000000000000
r11=ffff9001d49fe5e0 r12=0000000000000000 r13=ffff800000000000
r14=ffffc50c32d4b2a0 r15=0000000000001000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040246
nt!KeBugCheckEx:
fffff802`823ddf40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9001`d49fe340=0000000000000050

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000018, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000018, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2827

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 12097

Key : Analysis.Init.CPU.mSec
Value: 624

Key : Analysis.Init.Elapsed.mSec
Value: 504924

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: d1

BUGCHECK_P1: 18

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: 18

READ_ADDRESS: fffff80378afa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000018

PROCESS_NAME: chrome.exe

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

TRAP_FRAME: ffffb78f78ab5500 -- (.trap 0xffffb78f78ab5500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd58160140180
rdx=fffff80377e00000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000018 rsp=ffffb78f78ab5690 rbp=0000000000000000
r8=ffffb78f78ab56c0 r9=ffffd58160140180 r10=000000000000003f
r11=ffffb78f78ab55d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
00000000`00000018 ?? ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000018 ?? ???

STACK_TEXT:
ffffb78f`78ab53b8 fffff803`781efe29 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffb78f`78ab53c0 fffff803`781ec129 : ffffd581`6014e000 ffffa70c`fd8c2080 00000000`00000000 00000000`00000090 : nt!KiBugCheckDispatch+0x69
ffffb78f`78ab5500 00000000`00000018 : 00000000`00000003 ffffb78f`78ab56c8 ffffb78f`78ab56c0 ffffd581`60140180 : nt!KiPageFault+0x469
ffffb78f`78ab5690 00000000`00000003 : ffffb78f`78ab56c8 ffffb78f`78ab56c0 ffffd581`60140180 ffffd581`60140180 : 0x18
ffffb78f`78ab5698 ffffb78f`78ab56c8 : ffffb78f`78ab56c0 ffffd581`60140180 ffffd581`60140180 fffff803`7820ce76 : 0x3
ffffb78f`78ab56a0 ffffb78f`78ab56c0 : ffffd581`60140180 ffffd581`60140180 fffff803`7820ce76 ffffd581`00000000 : 0xffffb78f`78ab56c8
ffffb78f`78ab56a8 ffffd581`60140180 : ffffd581`60140180 fffff803`7820ce76 ffffd581`00000000 00000000`00000000 : 0xffffb78f`78ab56c0
ffffb78f`78ab56b0 ffffd581`60140180 : fffff803`7820ce76 ffffd581`00000000 00000000`00000000 ffffa70c`fe010100 : 0xffffd581`60140180
ffffb78f`78ab56b8 fffff803`7820ce76 : ffffd581`00000000 00000000`00000000 ffffa70c`fe010100 fffff803`00000000 : 0xffffd581`60140180
ffffb78f`78ab56c0 fffff803`780272cf : ffffe582`00000002 fffff803`00000004 00000000`00000000 ffffa70d`00000000 : nt!KiSwapThread+0x1e55d6
ffffb78f`78ab5770 fffff803`7802ac03 : ffffa70d`00000000 ffffa70d`00000000 00000000`00000000 00000000`00000001 : nt!KiCommitThreadWait+0x14f
ffffb78f`78ab5810 fffff803`7802a638 : ffffa70d`0b214240 00000000`00000001 ffffa70d`15f72600 fffff803`00000000 : nt!KeRemoveQueueEx+0x263
ffffb78f`78ab58b0 fffff803`784dd26d : 00000000`00000000 00000000`00000000 ffffd581`60140180 fffff803`7803e2aa : nt!IoRemoveIoCompletion+0x98
ffffb78f`78ab59e0 fffff803`781ef878 : ffffa70d`0ce24080 000000b8`0cfff758 ffffb78f`78ab5aa8 000001f4`cd5518e0 : nt!NtRemoveIoCompletion+0x13d
ffffb78f`78ab5a90 00007fff`365abee4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b8`0cfff738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`365abee4

SYMBOL_NAME: nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 469

FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd28282668660, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd282826685b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3014

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 6813

Key : Analysis.Init.CPU.mSec
Value: 468

Key : Analysis.Init.Elapsed.mSec
Value: 83598

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd28282668660

BUGCHECK_P3: ffffd282826685b8

BUGCHECK_P4: 0

TRAP_FRAME: ffffd28282668660 -- (.trap 0xffffd28282668660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff990a1d50d6c0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff840170740180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8045722c457 rsp=ffffd282826687f0 rbp=ffffd28282668b80
r8=0000000000000001 r9=0000000000000000 r10=00000000ffffffff
r11=0000000000000025 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!IopCompleteRequest+0x1e2c97:
fffff804`5722c457 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffd282826685b8 -- (.exr 0xffffd282826685b8)
ExceptionAddress: fffff8045722c457 (nt!IopCompleteRequest+0x00000000001e2c97)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

IRP_ADDRESS: ffff990a1c18fb88

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffd282`82668338 fffff804`57207a69 : 00000000`00000139 00000000`00000003 ffffd282`82668660 ffffd282`826685b8 : nt!KeBugCheckEx
ffffd282`82668340 fffff804`57207e90 : ffffd282`82668571 fffff804`570501c1 ffff990a`0c010340 ffff990a`0c0141c0 : nt!KiBugCheckDispatch+0x69
ffffd282`82668480 fffff804`57206223 : 00000000`00000000 ffff8401`7074b1c0 ffff990a`1c355080 01800080`70740180 : nt!KiFastFailDispatch+0xd0
ffffd282`82668660 fffff804`5722c457 : 00000000`00000001 ffffd282`82668b80 ffff990a`1c355080 fffff804`570686b3 : nt!KiRaiseSecurityCheckFailure+0x323
ffffd282`826687f0 fffff804`570683e3 : ffff990a`1c18fc00 00000000`00000001 ffff990a`1c18fc80 ffff990a`1d50d6a0 : nt!IopCompleteRequest+0x1e2c97
ffffd282`826688b0 fffff804`574b7e9d : 00000000`00000000 00000000`00000000 ffff8401`703ea180 fffff804`5704a31a : nt!IoRemoveIoCompletion+0x393
ffffd282`826689e0 fffff804`572074b8 : ffff990a`1c355080 000000e1`afdff4f8 ffffd282`82668aa8 000002b2`a1491de0 : nt!NtRemoveIoCompletion+0x13d
ffffd282`82668a90 00007ffa`2106c744 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e1`afdff4d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`2106c744

SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000005fbf4930, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8034de773d0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2655

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 10883

Key : Analysis.Init.CPU.mSec
Value: 390

Key : Analysis.Init.Elapsed.mSec
Value: 86210

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: a

BUGCHECK_P1: 5fbf4930

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8034de773d0

READ_ADDRESS: fffff8034e8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000005fbf4930

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffcb8e2c2374f0 -- (.trap 0xffffcb8e2c2374f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000005fbf4930 rbx=0000000000000000 rcx=0000000000000000
rdx=0000003f943160d6 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034de773d0 rsp=ffffcb8e2c237680 rbp=0000000000000001
r8=0000000000000001 r9=ffffe00961be2101 r10=0000fffff8034dee
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!KeAcquireSpinLockAtDpcLevel+0x30:
fffff803`4de773d0 f0480fba2b00 lock bts qword ptr [rbx],0 ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffffcb8e`2c2373a8 fffff803`4e007a69 : 00000000`0000000a 00000000`5fbf4930 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffcb8e`2c2373b0 fffff803`4e003d69 : 00000000`00140001 00000000`0000003f 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcb8e`2c2374f0 fffff803`4de773d0 : ffffcd00`62140180 fffff803`4de72230 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffcb8e`2c237680 fffff803`4e161275 : 00000000`00000200 ffffb04e`64ca8931 0000003f`943160a2 ffffe009`61be2100 : nt!KeAcquireSpinLockAtDpcLevel+0x30
ffffcb8e`2c2376b0 fffff803`4de70d62 : ffffe009`61be2010 00000000`00000000 ffffe009`61be2010 0000003f`943160a2 : nt!PpmIdleUpdateConcurrency+0x35
ffffcb8e`2c2376f0 fffff803`4de70154 : 00000000`00000000 00001fa0`00f3003b 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xa92
ffffcb8e`2c237af0 fffff803`4dff95a4 : ffffffff`00000000 ffffcd00`6214b1c0 ffffe009`6f2055c0 00000000`00000438 : nt!PoIdle+0x374
ffffcb8e`2c237c60 00000000`00000000 : ffffcb8e`2c238000 ffffcb8e`2c232000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54

SYMBOL_NAME: nt!KeAcquireSpinLockAtDpcLevel+30

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 30

FAILURE_BUCKET_ID: AV_nt!KeAcquireSpinLockAtDpcLevel

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {83a2e79c-7ee0-6968-f863-105a1ecf5ef5}

Followup: MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80748e645d1, Address of the instruction which caused the bugcheck
Arg3: ffffda80f4fff920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2577

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 4660

Key : Analysis.Init.CPU.mSec
Value: 499

Key : Analysis.Init.Elapsed.mSec
Value: 89176

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80748e645d1

BUGCHECK_P3: ffffda80f4fff920

BUGCHECK_P4: 0

CONTEXT: ffffda80f4fff920 -- (.cxr 0xffffda80f4fff920)
rax=ffffb50cfa4d79e8 rbx=ffffb50cf9bdd080 rcx=ffffb50c05040001
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffb50cfa4d79e0
rip=fffff80748e645d1 rsp=ffffea815f230110 rbp=ffffea815f2301a1
r8=0000000000000000 r9=00000000e9fe5849 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=ffffda80f4bea180
r14=0000000000000000 r15=ffffb50cf9bdd1c0
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050283
nt!KeWaitForSingleObject+0x1e1:
fffff807`48e645d1 483901 cmp qword ptr [rcx],rax ds:002b:ffffb50c`05040001=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Spotify.exe

STACK_TEXT:
ffffea81`5f230110 fffff807`48e43efb : ffffb50c`fa4d79e0 00001f80`00000006 00000000`00000001 ffffda80`f4e80100 : nt!KeWaitForSingleObject+0x1e1
ffffea81`5f230200 fffff807`491f7aa0 : ffffea81`5f2305c0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KeWaitForMultipleObjects+0x45b
ffffea81`5f230310 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForMultipleObjects+0x2f0

SYMBOL_NAME: nt!KeWaitForSingleObject+1e1

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .cxr 0xffffda80f4fff920 ; kb

BUCKET_ID_FUNC_OFFSET: 1e1

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KeWaitForSingleObject

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {5b409308-384c-7d02-5716-ce0af54fd5df}
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc48d1c4a04d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc48d1c4a0428, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3890

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 141349

Key : Analysis.Init.CPU.mSec
Value: 514

Key : Analysis.Init.Elapsed.mSec
Value: 91445

Key : Analysis.Memory.CommitPeak.Mb
Value: 79

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc48d1c4a04d0

BUGCHECK_P3: ffffc48d1c4a0428

BUGCHECK_P4: 0

TRAP_FRAME: ffffc48d1c4a04d0 -- (.trap 0xffffc48d1c4a04d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc48d1c4a0960 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80172c43edf rsp=ffffc48d1c4a0660 rbp=ffffc48d1c4a0729
r8=0000000000000000 r9=0000000000000000 r10=ffffc5812e896180
r11=ffffc48d1c4a0900 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!KeWaitForMultipleObjects+0x43f:
fffff801`72c43edf cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffc48d1c4a0428 -- (.exr 0xffffc48d1c4a0428)
ExceptionAddress: fffff80172c43edf (nt!KeWaitForMultipleObjects+0x000000000000043f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffc48d`1c4a01a8 fffff801`72e07a69 : 00000000`00000139 00000000`00000003 ffffc48d`1c4a04d0 ffffc48d`1c4a0428 : nt!KeBugCheckEx
ffffc48d`1c4a01b0 fffff801`72e07e90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc48d`1c4a02f0 fffff801`72e06223 : ffffc581`2e740100 ffffc581`2e74b1c0 ffff8e03`e2133080 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc48d`1c4a04d0 fffff801`72c43edf : 00000000`00000001 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc48d`1c4a0660 fffff801`81eceb81 : 00000000`00000200 00000000`00989680 ffff8e03`e77f2460 ffff8e03`e77f2460 : nt!KeWaitForMultipleObjects+0x43f
ffffc48d`1c4a0770 fffff801`81f0909c : ffffc581`00000008 ffff8e03`e77f2460 fffff801`81f09060 ffff8e03`e77f2460 : dxgkrnl!BLTQUEUE::BltQueueWorker+0x2dd
ffffc48d`1c4a0be0 fffff801`72d17e25 : ffff8e03`e2133080 fffff801`81f09060 ffff8e03`e77f2460 00000000`00000001 : dxgkrnl!BLTQUEUE::BltQueueWorkerThread+0x3c
ffffc48d`1c4a0c10 fffff801`72dfd0d8 : ffffc581`2e896180 ffff8e03`e2133080 fffff801`72d17dd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffc48d`1c4a0c60 00000000`00000000 : ffffc48d`1c4a1000 ffffc48d`1c49b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: dxgkrnl!BLTQUEUE::BltQueueWorker+2dd

MODULE_NAME: dxgkrnl

IMAGE_NAME: dxgkrnl.sys

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 2dd

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!BLTQUEUE::BltQueueWorker

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c37780bf-65ad-6f36-df59-1976243cb246}
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8042518a967, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3874

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 39925

Key : Analysis.Init.CPU.mSec
Value: 562

Key : Analysis.Init.Elapsed.mSec
Value: 93506

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: a

BUGCHECK_P1: 0

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8042518a967

READ_ADDRESS: fffff80425afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffff388bda37480 -- (.trap 0xfffff388bda37480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9a0063d40180 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff388bda37698 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042518a967 rsp=fffff388bda37610 rbp=0000000000000200
r8=fffff388bda37678 r9=0000000000000000 r10=000000000002d19f
r11=ffffd08e391273e8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!HvlGetPpmStatsForProcessor+0x37:
fffff804`2518a967 4d8b04c9 mov r8,qword ptr [r9+rcx*8] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
fffff388`bda37338 fffff804`25207a69 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff388`bda37340 fffff804`25203d69 : 00000000`00004d7c 00000000`00000000 0000000d`80ec4391 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff388`bda37480 fffff804`2518a967 : fffff388`bda37680 ffffdbbc`eb7241a7 00000000`00000001 ffffd08e`390bf398 : nt!KiPageFault+0x469
fffff388`bda37610 fffff804`2523ab96 : ffffd08e`390e5330 ffff9a00`63d48218 000000e4`1993d9ac ffff9a00`63d48210 : nt!HvlGetPpmStatsForProcessor+0x37
fffff388`bda37640 fffff804`25070e63 : 00000000`00009558 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PpmUpdatePerformanceFeedback+0x1c8d36
fffff388`bda376f0 fffff804`25070154 : 00000000`00000000 00001f80`0013003b 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xb93
fffff388`bda37af0 fffff804`251f95a4 : ffffffff`00000000 ffff9a00`63d4b1c0 ffffd08e`41a95080 00000000`000007e0 : nt!PoIdle+0x374
fffff388`bda37c60 00000000`00000000 : fffff388`bda38000 fffff388`bda32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54

SYMBOL_NAME: nt!HvlGetPpmStatsForProcessor+37

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 37

FAILURE_BUCKET_ID: AV_nt!HvlGetPpmStatsForProcessor

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {fd5527ca-e73f-b9f5-58be-487b87626f6f}

Followup: MachineOwner
---------

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff898f46269738, Virtual address for the attempted execute.
Arg2: 81000001b1b1a963, PTE contents.
Arg3: ffffd18dcec305e0, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2468

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 4497

Key : Analysis.Init.CPU.mSec
Value: 577

Key : Analysis.Init.Elapsed.mSec
Value: 96509

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: fc

BUGCHECK_P1: ffff898f46269738

BUGCHECK_P2: 81000001b1b1a963

BUGCHECK_P3: ffffd18dcec305e0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

TRAP_FRAME: ffffd18dcec305e0 -- (.trap 0xffffd18dcec305e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffac09e30062d8 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000009e rsi=0000000000000000 rdi=0000000000000000
rip=ffff898f46269738 rsp=ffffd18dcec30770 rbp=ffffc10111340180
r8=00000001000000b7 r9=ffffc10111340180 r10=ffffac09e09ee080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffff898f`46269738 689726468f push 0FFFFFFFF8F462697h
Resetting default scope

STACK_TEXT:
ffffd18d`cec302f8 fffff801`416718f0 : 00000000`000000fc ffff898f`46269738 81000001`b1b1a963 ffffd18d`cec305e0 : nt!KeBugCheckEx
ffffd18d`cec30300 fffff801`4142aed6 : ffff898f`46269738 ffffd18d`cec30500 00000000`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x159368
ffffd18d`cec30340 fffff801`4140c960 : ffffd18d`cec30470 00000000`00000011 ffffd18d`cec30660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffd18d`cec30440 fffff801`41603c5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffd18d`cec305e0 ffff898f`46269738 : ffff898f`00000002 fffff801`00000005 00000000`00000000 ffffac09`00000000 : nt!KiPageFault+0x35e
ffffd18d`cec30770 ffff898f`00000002 : fffff801`00000005 00000000`00000000 ffffac09`00000000 ffff898f`00000000 : 0xffff898f`46269738
ffffd18d`cec30778 fffff801`00000005 : 00000000`00000000 ffffac09`00000000 ffff898f`00000000 ffffac09`e0b75bc0 : 0xffff898f`00000002
ffffd18d`cec30780 00000000`00000000 : ffffac09`00000000 ffff898f`00000000 ffffac09`e0b75bc0 ffffc101`00000000 : 0xfffff801`00000005

SYMBOL_NAME: nt!MiCheckSystemNxFault+159368

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 159368

FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup: MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffd01dac4c730, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffd01dac4c688, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2890

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 4811

Key : Analysis.Init.CPU.mSec
Value: 514

Key : Analysis.Init.Elapsed.mSec
Value: 99443

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: fffffd01dac4c730

BUGCHECK_P3: fffffd01dac4c688

BUGCHECK_P4: 0

TRAP_FRAME: fffffd01dac4c730 -- (.trap 0xfffffd01dac4c730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffd01dac4ca88 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff80774e074b8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80774e5ff9c rsp=fffffd01dac4c8c0 rbp=ffffc4012cf40180
r8=fffffd01dac4c9c8 r9=0000000000000001 r10=ffff980bb9070110
r11=00007fffffff0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!IopQueueIrpToFileObject+0x171f3c:
fffff807`74e5ff9c cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffffd01dac4c688 -- (.exr 0xfffffd01dac4c688)
ExceptionAddress: fffff80774e5ff9c (nt!IopQueueIrpToFileObject+0x0000000000171f3c)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
fffffd01`dac4c408 fffff807`74e07a69 : 00000000`00000139 00000000`00000003 fffffd01`dac4c730 fffffd01`dac4c688 : nt!KeBugCheckEx
fffffd01`dac4c410 fffff807`74e07e90 : ffffc401`00000000 fffff807`74f193ce ffff980b`c989e080 fffffd01`dac4c500 : nt!KiBugCheckDispatch+0x69
fffffd01`dac4c550 fffff807`74e06223 : 00000000`00000008 ffffc401`2cf40180 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffd01`dac4c730 fffff807`74e5ff9c : 980bc743`5c40b719 00000000`001a019f fffffd01`dac4c8f8 00000175`309368e0 : nt!KiRaiseSecurityCheckFailure+0x323
fffffd01`dac4c8c0 fffff807`74ffd970 : fffffd01`dac4cb80 fffff807`7502b17e ffff980b`d1364b70 00000000`00000000 : nt!IopQueueIrpToFileObject+0x171f3c
fffffd01`dac4c910 fffff807`74fe59b9 : ffff980b`00000000 fffffd01`dac4cb80 00000000`00000000 00000062`871ff7c0 : nt!IopSynchronousServiceTail+0x2a0
fffffd01`dac4c9b0 fffff807`74e074b8 : ffff980b`00000000 00000000`00000000 00000000`00000000 00000175`309368e0 : nt!NtReadFile+0x599
fffffd01`dac4ca90 00007ff8`fa4ec6e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000062`871ff738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`fa4ec6e4

SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.804

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner
---------

KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffff9905ca010100, Address of the heap that reported the corruption
Arg3: ffff9905dd384000, Address at which the corruption was detected
Arg4: 0000000000000000

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4499

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 112269

Key : Analysis.Init.CPU.mSec
Value: 686

Key : Analysis.Init.Elapsed.mSec
Value: 209643

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 13a

BUGCHECK_P1: 12

BUGCHECK_P2: ffff9905ca010100

BUGCHECK_P3: ffff9905dd384000

BUGCHECK_P4: 0

CORRUPTING_POOL_ADDRESS: fffff80381efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9905dd384000

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: msedge.exe

STACK_TEXT:
fffff581`8f7a3708 fffff803`8178d1c8 : 00000000`0000013a 00000000`00000012 ffff9905`ca010100 ffff9905`dd384000 : nt!KeBugCheckEx
fffff581`8f7a3710 fffff803`8178d228 : 00000000`00000012 fffff581`8f7a3820 ffff9905`ca010100 00000000`00000000 : nt!RtlpHeapHandleError+0x40
fffff581`8f7a3750 fffff803`8178ce55 : ffff9905`dd384000 ffff9905`ca010280 ffff9905`ca010280 ffff9905`c96f3830 : nt!RtlpHpHeapHandleError+0x58
fffff581`8f7a3780 fffff803`81667dde : ffff9905`dd3e6b20 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
fffff581`8f7a37b0 fffff803`814c73d4 : ffff9905`00000000 ffff9905`dd3e6a60 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x19f51e
fffff581`8f7a3850 fffff803`81bb1019 : 00000000`000c6060 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffff581`8f7a3930 fffff803`817ff8c8 : 00010268`00000000 00000058`2ebfef70 00000000`00000000 00000000`00000001 : nt!ExFreePool+0x9
fffff581`8f7a3960 fffff803`817ff109 : 00000058`2ebfeee8 00000000`00000000 00000058`2ebfef70 00000058`2ebfef50 : nt!IopCreateFile+0x7a8
fffff581`8f7a3a00 fffff803`81606bb8 : ffff9905`c9b2a080 fffff581`8f7a3b80 00000058`2ebfe4e8 fffff581`8f7a3aa8 : nt!NtCreateFile+0x79
fffff581`8f7a3a90 00007ff9`406ec844 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000058`2ebfee58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`406ec844

SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption

IMAGE_VERSION: 10.0.19041.631

MODULE_NAME: Pool_Corruption

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: 0x13a_12_nt!ExFreePool

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {0e8bc89c-9b1f-e697-ed6c-83210db041e2}

Followup: Pool_corruption
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80233643ca4, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2936

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 38572

Key : Analysis.Init.CPU.mSec
Value: 546

Key : Analysis.Init.Elapsed.mSec
Value: 177207

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80233643ca4

READ_ADDRESS: fffff802340fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: audiodg.exe

TRAP_FRAME: ffffd40149a92060 -- (.trap 0xffffd40149a92060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000020f618 rbx=0000000000000000 rcx=ffffac00ed928180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80233643ca4 rsp=ffffd40149a921f0 rbp=ffffd40149a922b9
r8=0000000000000000 r9=0000000000000000 r10=ffffac00ed928180
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeWaitForMultipleObjects+0x204:
fffff802`33643ca4 4b8b1cfb mov rbx,qword ptr [r11+r15*8] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffffd401`49a91f18 fffff802`33807769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd401`49a91f20 fffff802`33803a69 : 00031902`ed92ffff 00000000`ed9331ff ffff9685`ffffffff 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd401`49a92060 fffff802`33643ca4 : 00000000`00000001 00000000`000000ff ffffd401`49a92200 00000000`00000000 : nt!KiPageFault+0x469
ffffd401`49a921f0 fffff802`339f7740 : 00000000`000000c0 ffffd401`49a92340 ffff9685`3bc68fb0 00000000`00000000 : nt!KeWaitForMultipleObjects+0x204
ffffd401`49a92300 fffff802`339f7419 : 00000000`00000000 00000000`00000774 00000000`00000000 00000000`00000001 : nt!ObWaitForMultipleObjects+0x2f0
ffffd401`49a92800 fffff802`338071b8 : 00000000`00000000 00000000`00000000 ffff9685`34ba2080 fffff802`33ab9c10 : nt!NtWaitForMultipleObjects+0x119
ffffd401`49a92a90 00007ffd`554ecb04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000052`938ffa18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`554ecb04

SYMBOL_NAME: nt!KeWaitForMultipleObjects+204

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.746

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 204

FAILURE_BUCKET_ID: AV_nt!KeWaitForMultipleObjects

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {0d335bc1-87c8-f4ad-8a69-d4d9985e727a}

Followup: MachineOwner
---------

MULTIPLE_IRP_COMPLETE_REQUESTS (44)
A driver has requested that an IRP be completed (IoCompleteRequest()), but
the packet has already been completed. This is a tough bug to find because
the easiest case, a driver actually attempted to complete its own packet
twice, is generally not what happened. Rather, two separate drivers each
believe that they own the packet, and each attempts to complete it. The
first actually works, and the second fails. Tracking down which drivers
in the system actually did this is difficult, generally because the trails
of the first driver have been covered by the second. However, the driver
stack for the current request can be found by examining the DeviceObject
fields in each of the stack locations.
Arguments:
Arg1: ffffbb028e1780a0, Address of the IRP
Arg2: 0000000000001232
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3280

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 6612

Key : Analysis.Init.CPU.mSec
Value: 687

Key : Analysis.Init.Elapsed.mSec
Value: 181091

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 44

BUGCHECK_P1: ffffbb028e1780a0

BUGCHECK_P2: 1232

BUGCHECK_P3: 0

BUGCHECK_P4: 0

IRP_ADDRESS: ffffbb028e1780a0

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

STACK_TEXT:
ffff9588`c24fb678 fffff800`76c2babc : 00000000`00000044 ffffbb02`8e1780a0 00000000`00001232 00000000`00000000 : nt!KeBugCheckEx
ffff9588`c24fb680 fffff800`76a48727 : ffffbb02`8c6e8080 00000000`00000002 ffffbb02`8c5be9d0 ffffbb02`00000000 : nt!IopfCompleteRequest+0x1e337c
ffff9588`c24fb770 fffff800`82c1d834 : 00000000`00000000 00000000`15f5dd38 ffffbb02`8df64280 ffffbb02`8c6e8080 : nt!IofCompleteRequest+0x17
ffff9588`c24fb7a0 fffff800`76a52f55 : ffffbb02`7d8c5950 ffffbb02`7d8c5950 00000000`00000001 ffffbb02`8df64280 : Npfs!NpFsdWrite+0x94
ffff9588`c24fb810 fffff800`736b4906 : 00000000`00000000 00000000`76aec5ca 00000000`00000000 ffffbb02`8c6e8050 : nt!IofCallDriver+0x55
ffff9588`c24fb850 fffff800`76a52f55 : ffffbb02`8df64280 ffff8581`d9728180 ffffbb02`8c6e8080 fffff800`76a64d7f : FLTMGR!FltpDispatch+0xd6
ffff9588`c24fb8b0 fffff800`76dfd518 : ffffbb02`8df64280 00000000`00000000 ffffbb02`8df64280 00000000`00000000 : nt!IofCallDriver+0x55
ffff9588`c24fb8f0 fffff800`76de448f : ffffe309`00000000 ffff9588`c24fbb80 00000000`145cf1b4 ffff9588`c24fbb80 : nt!IopSynchronousServiceTail+0x1a8
ffff9588`c24fb990 fffff800`76c071b8 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`0cc24d78 : nt!NtWriteFile+0x66f
ffff9588`c24fba90 00000000`772d1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`144cebd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772d1cfc

SYMBOL_NAME: Npfs!NpFsdWrite+94

MODULE_NAME: Npfs

IMAGE_NAME: Npfs.SYS

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 94

FAILURE_BUCKET_ID: 0x44_Npfs!NpFsdWrite

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {947b2e94-712f-fbfc-7620-19ee913c5b76}

Followup: MachineOwner
---------

2: kd> lmvm Npfs
Browse full module list
start end module name
fffff800`82c10000 fffff800`82c2c000 Npfs # (pdb symbols) C:\ProgramData\Dbg\sym\npfs.pdb\B6BDF22083B39213E8C6DAA6F39837F41\npfs.pdb
Loaded symbol image file: Npfs.SYS
Mapped memory image file: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS
Image path: \SystemRoot\System32\Drivers\Npfs.SYS
Image name: Npfs.SYS
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 9E3E4C73 (This is a reproducible build file hash, not a timestamp)
CheckSum: 000192F7
ImageSize: 0001C000
File version: 10.0.19041.1030
Product version: 10.0.19041.1030
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: npfs.sys
OriginalFilename: npfs.sys
ProductVersion: 10.0.19041.1030
FileVersion: 10.0.19041.1030 (WinBuild.160101.0800)
FileDescription: NPFS Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff803712fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4046

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 37825

Key : Analysis.Init.CPU.mSec
Value: 530

Key : Analysis.Init.Elapsed.mSec
Value: 183214

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff803712fa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff803768af610 -- (.trap 0xfffff803768af610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a0490b84 rbx=0000000000000000 rcx=fffff803768af7f0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80370844567 rsp=fffff803768af7a0 rbp=fffff8036e5c7180
r8=0000000000000102 r9=0000000000000000 r10=fffff8036e5caac0
r11=00000010fadf37aa r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff803`70844567 4883c420 add rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffff803`768bdc88 fffff803`70a3aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`712fa320 : nt!KeBugCheckEx
fffff803`768bdc90 fffff803`7087541d : 0000184b`f15ab990 fffff803`6e5c7180 00000000`00000246 00000000`00073d35 : nt!KeAccumulateTicks+0x1c880c
fffff803`768bdcf0 fffff803`708759c1 : 00000000`00000000 00000000`00045098 fffff803`6e5c7180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff803`768bdd40 fffff803`7086f833 : fffff803`6e5c7180 00000000`00000000 fffff803`71231650 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff803`768bde80 fffff803`708781f2 : fffff803`768af610 fffff803`768af690 fffff803`768af600 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff803`768bdf30 fffff803`70927ef5 : 00000011`427a9086 fffff803`712f39a0 fffff803`712f3a50 ffff4c5f`cfcfacfc : nt!HalpTimerClockInterrupt+0xe2
fffff803`768bdf60 fffff803`709f722a : fffff803`768af690 fffff803`712f39a0 00000000`00000102 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`768bdfb0 fffff803`709f7797 : fffff803`768af630 fffff803`768af628 ffff9408`b5d04080 fffff803`709f77a4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff803`768af610 fffff803`70844567 : 00000000`00000010 00000000`00000286 fffff803`768af7c8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff803`768af7a0 fffff803`7084c620 : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KeYieldProcessorEx+0x17
fffff803`768af7d0 fffff803`708452d6 : ffff9408`b5d04188 00000000`00000000 ffff9408`b5d04250 00000000`00000000 : nt!KiTryUnwaitThread+0x2d0
fffff803`768af830 fffff803`70844e7c : ffff9408`b5d04180 00000000`00000000 fffff803`768afb18 00000000`00000000 : nt!KiTimerWaitTest+0x1e6
fffff803`768af8e0 fffff803`708072e9 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00043ecf : nt!KiProcessExpiredTimerList+0xdc
fffff803`768af9d0 fffff803`709f92ee : 00000000`00000000 fffff803`6e5c7180 fffff803`71326600 ffff9408`b2fca080 : nt!KiRetireDpcList+0x9d9
fffff803`768afc60 00000000`00000000 : fffff803`768b0000 fffff803`768aa000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: nt!KeAccumulateTicks+1c880c

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.746

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1c880c

FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup: MachineOwner
---------

0: kd> !pcr
KPCR for Processor 0 at fffff8036e5c7000:
Major 1 Minor 1
NtTib.ExceptionList: fffff803768a5fb0
NtTib.StackBase: fffff803768a4000
NtTib.StackLimit: 0000000016f0ed78
NtTib.SubSystemTib: fffff8036e5c7000
NtTib.Version: 000000006e5c7180
NtTib.UserPointer: fffff8036e5c7870
NtTib.SelfTib: 0000000000809000

SelfPcr: 0000000000000000
Prcb: fffff8036e5c7180
Irql: 0000000000000000
IRR: 0000000000000000
IDR: 0000000000000000
InterruptMode: 0000000000000000
IDT: 0000000000000000
GDT: 0000000000000000
TSS: 0000000000000000

CurrentThread: fffff80371326600
NextThread: 0000000000000000
IdleThread: fffff80371326600

DpcQueue: Unable to read nt!_KDPC_DATA.DpcListHead.Flink @ fffff8036e5ca240

0: kd> dt nt!_KPRCB fffff8036e5c7180 Dpc*
+0x3090 DpcRuntimeHistoryHashTable : (null)
+0x3098 DpcRuntimeHistoryHashTableCleanupDpc : (null)
+0x30c0 DpcData : [2] _KDPC_DATA
+0x3110 DpcStack : 0xfffff803`768b6fb0 Void
+0x311c DpcRequestRate : 0
+0x3124 DpcLastCount : 0x9e3f55
+0x312a DpcRoutineActive : 0 ''
+0x312c DpcRequestSummary : 0n43
+0x312c DpcRequestSlot : [2] 0n43
+0x312c DpcNormalProcessingActive : 0y1
+0x312c DpcNormalProcessingRequested : 0y1
+0x312c DpcNormalThreadSignal : 0y0
+0x312c DpcNormalTimerExpiration : 0y1
+0x312c DpcNormalDpcPresent : 0y0
+0x312c DpcNormalLocalInterrupt : 0y1
+0x312c DpcNormalSpare : 0y0000000000 (0)
+0x312c DpcThreadActive : 0y0
+0x312c DpcThreadRequested : 0y0
+0x312c DpcThreadSpare : 0y00000000000000 (0)
+0x7b80 DpcGate : _KGATE
+0x7be8 DpcWatchdogPeriod : 0n7680
+0x7bec DpcWatchdogCount : 0n7680
+0x7bf4 DpcWatchdogProfileCumulativeDpcThreshold : 0x1b80
+0x7c2c DpcWatchdogSequenceNumber : 0x6ccf7
+0x7e8c DpcTime : 0x1b0e
+0x7e9c DpcTimeCount : 0
+0x7ea0 DpcTimeLimit : 0x500
+0x7f00 DpcWatchdogProfileSingleDpcThreshold : 0x496
+0x8258 DpcWatchdogDpc : _KDPC
+0x8298 DpcWatchdogTimer : _KTIMER
+0x84a8 DpcWatchdogProfile : 0xffff9408`a2035000 -> 0x00000000`0000000d Void
+0x84b0 DpcWatchdogProfileCurrentEmptyCapture : 0xffff9408`a2047c78 -> (null)
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8064eefa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3890

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 10890

Key : Analysis.Init.CPU.mSec
Value: 562

Key : Analysis.Init.Elapsed.mSec
Value: 185419

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8064eefa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffffc58f34837500 -- (.trap 0xffffc58f34837500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a7ab8559 rbx=0000000000000000 rcx=ffffc58f34837728
rdx=ffffdb8c0a2df0c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064e444567 rsp=ffffc58f34837690 rbp=00000025c1d35b20
r8=ffffc58f348378e8 r9=0000000000000000 r10=0000000000000000
r11=ffffc58f348378c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff806`4e444567 4883c420 add rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
ffff8b01`4a17fc88 fffff806`4e63aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`4eefa320 : nt!KeBugCheckEx
ffff8b01`4a17fc90 fffff806`4e47541d : 00003f81`058208b5 ffff8b01`4a128180 00000000`00000246 00000000`0012f5e2 : nt!KeAccumulateTicks+0x1c880c
ffff8b01`4a17fcf0 fffff806`4e4759c1 : 00000000`00000000 00000000`000b4d23 ffff8b01`4a128180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
ffff8b01`4a17fd40 fffff806`4e46f833 : ffff8b01`4a128180 00000000`00000000 fffff806`4ee31530 00000000`00000000 : nt!KiUpdateTime+0x4a1
ffff8b01`4a17fe80 fffff806`4e4781f2 : ffffc58f`34837500 ffffc58f`34837580 ffffc58f`34837500 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
ffff8b01`4a17ff30 fffff806`4e527ef5 : 0000002d`34a5c43e ffffdb8c`00d03200 ffffdb8c`00d032b0 ffffc78c`4a3d79e2 : nt!HalpTimerClockInterrupt+0xe2
ffff8b01`4a17ff60 fffff806`4e5f722a : ffffc58f`34837580 ffffdb8c`00d03200 ffffc58f`34837b10 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8b01`4a17ffb0 fffff806`4e5f7797 : ffffc58f`34837560 00000000`00000000 ffffdb8c`0a2df0c0 fffff806`4e5f77a4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffc58f`34837500 fffff806`4e444567 : 00000000`00000010 00000000`00000282 ffffc58f`348376b8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffc58f`34837690 fffff806`4e44b78a : 00000000`00000246 fffff806`4e44a891 00000000`00000000 00000000`00000000 : nt!KeYieldProcessorEx+0x17
ffffc58f`348376c0 fffff806`4e444c4d : 00000000`000b3b5a ffffc58f`34837b10 00000000`00000080 ffff8b01`4a128180 : nt!KiDeferredReadySingleThread+0xc3a
ffffc58f`348378b0 fffff806`4e445030 : ffff8b01`4a128180 00000000`00000000 ffffdb8c`0a48a260 00000000`00000000 : nt!KiReadyThread+0x4d
ffffc58f`348378e0 fffff806`4e406eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000b3b5a : nt!KiProcessExpiredTimerList+0x290
ffffc58f`348379d0 fffff806`4e5f92ee : ffffffff`00000000 ffff8b01`4a128180 ffff8b01`4a1331c0 ffffdb8c`16fde080 : nt!KiRetireDpcList+0x5dd
ffffc58f`34837c60 00000000`00000000 : ffffc58f`34838000 ffffc58f`34832000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: nt!KeAccumulateTicks+1c880c

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.746

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1c880c

FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup: MachineOwner
---------

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffbe8093da0e70
Arg3: ffffe3854bca8f40
Arg4: fffff8033560c58d

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2827

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 7331

Key : Analysis.Init.CPU.mSec
Value: 483

Key : Analysis.Init.Elapsed.mSec
Value: 187848

Key : Analysis.Memory.CommitPeak.Mb
Value: 73

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffbe8093da0e70

BUGCHECK_P3: ffffe3854bca8f40

BUGCHECK_P4: fffff8033560c58d

TRAP_FRAME: ffffbe8093da0e70 -- (.trap 0xffffbe8093da0e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffe3854bca8000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8033560c58d rsp=ffffe3854bca8f40 rbp=ffffe3854bca9160
r8=ffffe3854bca9200 r9=ffffe3854bca90e0 r10=ffffe3854bca8000
r11=ffffe3854bca90d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MmAccessFault+0x2d:
fffff803`3560c58d 4c89642430 mov qword ptr [rsp+30h],r12 ss:0018:ffffe385`4bca8f70=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

STACK_OVERFLOW: Stack Limit: ffffe3854bca9000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xfffff8033572ab86 was blamed for the stack overflow. It is using 8640 bytes of stack total in 5 instances (likely recursion).

STACK_TEXT:
ffffe385`4bca8f40 fffff803`3580395e : fd37d8da`8d04c865 4141a307`7a78fd2f 2e1c02fc`80b01881 79aa40f5`feef84e0 : nt!MmAccessFault+0x2d
ffffe385`4bca90e0 fffff803`357fe246 : ffffe385`4bca9430 ffffe385`4bca94a0 fffff803`3572be19 ffffe385`4bca94e0 : nt!KiPageFault+0x35e
ffffe385`4bca9278 fffff803`3572be19 : ffffe385`4bca94e0 00000000`00000000 ffffe385`4bca9ca8 555a8e07`000004d0 : nt!_chkstk+0x36
ffffe385`4bca9290 fffff803`3572ab86 : ffffe385`4bca9ca8 ffffe385`4bca99e0 ffffe385`4bca9ca8 fffff803`354b1678 : nt!RtlDispatchException+0x119
ffffe385`4bca94b0 fffff803`358078ac : 00000000`00001000 ffffe385`4bca9d50 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffe385`4bca9b70 fffff803`35803a43 : 21c3db22`0c97a711 816df942`b57d72e4 eb205c27`757f7e5a 44395c5a`c3ea0e31 : nt!KiExceptionDispatch+0x12c
ffffe385`4bca9d50 fffff803`3572e028 : f0da9290`24527bc7 812d41a3`ffa0505f 0c2f8c7f`fc808c19 0ab75c0c`42d558c4 : nt!KiPageFault+0x443
ffffe385`4bca9ee0 fffff803`3572da94 : fffff803`35400000 fffff803`00000000 00000000`000000e0 00007fff`fffeffff : nt!RtlpUnwindPrologue+0x248
ffffe385`4bca9f40 fffff803`3572c1af : fffff803`354e38d4 ffffe385`00000000 ffffe385`4bcaaf58 fffff803`354e38d4 : nt!RtlpxVirtualUnwind+0x104
ffffe385`4bca9fc0 fffff803`3572bece : ffffe385`4bcaa580 00000000`00000000 ffffe385`4bcaea90 fffff803`358071b8 : nt!RtlVirtualUnwind+0x5f
ffffe385`4bcaa040 fffff803`3572ab86 : ffffe385`4bcaaf58 ffffe385`4bcaac90 ffffe385`4bcaaf58 fffff803`354b1678 : nt!RtlDispatchException+0x1ce
ffffe385`4bcaa760 fffff803`358078ac : 00000000`00001000 ffffe385`4bcab000 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffe385`4bcaae20 fffff803`35803a43 : 00000002`4ee80429 400010a9`25247f75 25248001`4ee80661 40001a81`00000002 : nt!KiExceptionDispatch+0x12c
ffffe385`4bcab000 fffff803`3572e028 : 25246b71`43714f31 4ee80429`00000380 43714f31`0000000a 3ada33c1`50b6a811 : nt!KiPageFault+0x443
ffffe385`4bcab190 fffff803`3572da94 : fffff803`35400000 fffff803`00000000 00000000`000000e0 00007fff`fffeffff : nt!RtlpUnwindPrologue+0x248
ffffe385`4bcab1f0 fffff803`3572c1af : fffff803`354e38d4 ffffe385`00000000 ffffe385`4bcac208 fffff803`354e38d4 : nt!RtlpxVirtualUnwind+0x104
ffffe385`4bcab270 fffff803`3572bece : ffffe385`4bcab830 00000000`00000000 ffffe385`4bcaea90 fffff803`358071b8 : nt!RtlVirtualUnwind+0x5f
ffffe385`4bcab2f0 fffff803`3572ab86 : ffffe385`4bcac208 ffffe385`4bcabf40 ffffe385`4bcac208 fffff803`354b1678 : nt!RtlDispatchException+0x1ce
ffffe385`4bcaba10 fffff803`358078ac : 00000000`00001000 ffffe385`4bcac2b0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffe385`4bcac0d0 fffff803`35803a43 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffe385`4bcac2b0 fffff803`3572e028 : 000000f8`00000001 000001d3`d39e8dc0 000001d3`d39e8dc8 000001d3`d39e8dc8 : nt!KiPageFault+0x443
ffffe385`4bcac440 fffff803`3572da94 : fffff803`35400000 fffff803`00000000 00000000`000000e0 00007fff`fffeffff : nt!RtlpUnwindPrologue+0x248
ffffe385`4bcac4a0 fffff803`3572c1af : fffff803`354e38d4 ffffe385`00000000 ffffe385`4bcad4b8 fffff803`354e38d4 : nt!RtlpxVirtualUnwind+0x104
ffffe385`4bcac520 fffff803`3572bece : ffffe385`4bcacae0 00000000`00000000 ffffe385`4bcaea90 fffff803`358071b8 : nt!RtlVirtualUnwind+0x5f
ffffe385`4bcac5a0 fffff803`3572ab86 : ffffe385`4bcad4b8 ffffe385`4bcad1f0 ffffe385`4bcad4b8 00000000`00000000 : nt!RtlDispatchException+0x1ce
ffffe385`4bcaccc0 fffff803`358078ac : 00000000`00000000 00000006`00020410 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffe385`4bcad380 fffff803`35801216 : fffff803`3540f8f8 ffffaa0c`08cf0990 00000000`00000003 fffff803`35656d89 : nt!KiExceptionDispatch+0x12c
ffffe385`4bcad560 fffff803`35703864 : ffffe385`4bcad758 ffffe385`4bcad798 00000000`00000000 ffffe385`4bcad800 : nt!KiBreakpointTrap+0x316
ffffe385`4bcad6f0 fffff803`357cbecb : fffff803`359e57e0 fffff803`354fbc88 00000000`00000000 00000000`00000000 : nt!KeCheckStackAndTargetAddress+0x54
ffffe385`4bcad720 fffff803`357fe642 : fffff803`354fbc88 ffffe385`4bcadd00 fffff803`357cbe90 00000000`00000000 : nt!_C_specific_handler+0x3b
ffffe385`4bcad790 fffff803`3572bf97 : ffffe385`4bcadd00 00000000`00000000 ffffe385`4bcae9b0 fffff803`359e57e0 : nt!RtlpExecuteHandlerForException+0x12
ffffe385`4bcad7c0 fffff803`3572ab86 : ffffe385`4bcae6d8 ffffe385`4bcae410 ffffe385`4bcae6d8 ffffbe80`93d40180 : nt!RtlDispatchException+0x297
ffffe385`4bcadee0 fffff803`358078ac : 00000000`00001000 ffffe385`4bcae780 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffe385`4bcae5a0 fffff803`35803a43 : 00000000`00000002 ffffbe80`93c80180 00000000`00000001 fffff803`3564b0b6 : nt!KiExceptionDispatch+0x12c
ffffe385`4bcae780 00000000`00000000 : ffffaa0c`1e0d6080 fffff803`35a2ad3e ffffaa0c`1ebf4080 00000000`00000001 : nt!KiPageFault+0x443

STACK_COMMAND: .trap 0xffffbe8093da0e70 ; kb

SYMBOL_NAME: nt!KiDispatchException+186

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.746

BUCKET_ID_FUNC_OFFSET: 186

FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {cbb9a1ac-821c-b542-365f-2dd5602e6100}
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80071436c6d, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5155

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 130846

Key : Analysis.Init.CPU.mSec
Value: 577

Key : Analysis.Init.Elapsed.mSec
Value: 190173

Key : Analysis.Memory.CommitPeak.Mb
Value: 85

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80071436c6d

WRITE_ADDRESS: fffff80071efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffec89752376a0 -- (.trap 0xffffec89752376a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000ffff7f rbx=0000000000000000 rcx=0000000000000005
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80071436c6d rsp=ffffec8975237830 rbp=ffffb30536a42250
r8=0000000000000102 r9=0000000000000000 r10=fffff8006e220ac0
r11=0000002d129388f7 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei ng nz ac po nc
nt!KiTimerWaitTest+0x19d:
fffff800`71436c6d f02107 lock and dword ptr [rdi],eax ds:00000000`00000000=????????
Resetting default scope

STACK_TEXT:
ffffec89`75237558 fffff800`715efe29 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffec89`75237560 fffff800`715ec129 : 00000000`00000003 00000000`0012e7a1 ffffda81`baf40180 fffff800`714cca80 : nt!KiBugCheckDispatch+0x69
ffffec89`752376a0 fffff800`71436c6d : ffffb305`36a42188 00000000`00000000 ffffb305`36a42250 00000000`00000000 : nt!KiPageFault+0x469
ffffec89`75237830 fffff800`7143685c : ffffb305`36a42180 00000000`00000000 ffffec89`75237b18 00000000`00000000 : nt!KiTimerWaitTest+0x19d
ffffec89`752378e0 fffff800`7143a189 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000b44bc : nt!KiProcessExpiredTimerList+0xdc
ffffec89`752379d0 fffff800`715e1aae : ffffffff`00000000 ffffda81`baf40180 ffffda81`baf4b1c0 ffffb305`385e4080 : nt!KiRetireDpcList+0x9d9
ffffec89`75237c60 00000000`00000000 : ffffec89`75238000 ffffec89`75232000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: nt!KiTimerWaitTest+19d

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 19d

FAILURE_BUCKET_ID: AV_nt!KiTimerWaitTest

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {8c029a8d-9f29-4bde-2664-6010a6365158}

Followup: MachineOwner
---------

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff805756fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6593

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 127618

Key : Analysis.Init.CPU.mSec
Value: 734

Key : Analysis.Init.Elapsed.mSec
Value: 193094

Key : Analysis.Memory.CommitPeak.Mb
Value: 87

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff805756fa320

DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff805790ae280 -- (.trap 0xfffff805790ae280)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000044edcb8e rbx=0000000000000000 rcx=fffff805790ae470
rdx=ffffb386673e8958 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80574c333b7 rsp=fffff805790ae410 rbp=ffffcd09005bd050
r8=0000000000000488 r9=0000000000000000 r10=fffff80574d116a0
r11=ffffd2f905a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff805`74c333b7 4883c420 add rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffff805`790bce18 fffff805`74e595ba : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff805`790bce20 fffff805`74cc98bd : 00001cc1`74f63ecc 00000000`00000000 fffff805`790ae300 fffff805`70f3f180 : nt!KeAccumulateTicks+0x18cb6a
fffff805`790bce80 fffff805`74cc973a : fffff805`756f37c0 fffff805`790ae300 fffff805`000891f2 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
fffff805`790bcf30 fffff805`74c08725 : fffff805`756f37c0 fffff805`790bcf40 00000000`0000000c ffffd4bd`3b8bdc67 : nt!HalpTimerClockIpiRoutine+0x1a
fffff805`790bcf60 fffff805`74ddf9ea : fffff805`790ae300 fffff805`756f37c0 ffffcd09`02953000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff805`790bcfb0 fffff805`74ddff57 : 00000000`00000010 fffff805`884e8499 fffff805`790ae4d8 fffff805`74ddff64 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff805`790ae280 fffff805`74c333b7 : ffffffff`ffffffd2 fffff805`74ca7e8e 00000000`00000010 00000000`00000286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff805`790ae410 fffff805`74ca7e8a : 00000000`00000001 fffff805`790ae4c0 ffffcd08`fe04c300 fffff805`8825b347 : nt!KeYieldProcessorEx+0x17
fffff805`790ae440 fffff805`74d11700 : ffffcd08`44edcb8e 00000000`ffffff00 fffff805`790ae4c0 ffffcd08`fe026000 : nt!KxWaitForLockOwnerShip+0x2a
fffff805`790ae470 fffff805`87c26cef : 00000000`00000000 ffffcd08`fe04c3f0 00000000`00000001 fffff805`8825f232 : nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x60
fffff805`790ae4a0 fffff805`834a3361 : fffff805`790ae599 00000000`00000000 fffff805`790aeb20 00001cb0`b957dd20 : dxgmms2!VidSchDdiNotifyDpc+0x1df
fffff805`790ae550 fffff805`88209bff : ffffcd08`fc50c030 00000000`00000000 ffffcd08`fc50c030 ffffcd08`fc593000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff805`790ae600 ffffcd08`fc50c030 : 00000000`00000000 ffffcd08`fc50c030 ffffcd08`fc593000 fffff805`88209b92 : nvlddmkm+0x79bff
fffff805`790ae608 00000000`00000000 : ffffcd08`fc50c030 ffffcd08`fc593000 fffff805`88209b92 ffffcd08`fc593000 : 0xffffcd08`fc50c030

SYMBOL_NAME: dxgmms2!VidSchDdiNotifyDpc+1df

MODULE_NAME: dxgmms2

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1df

FAILURE_BUCKET_ID: 0x133_DPC_dxgmms2!VidSchDdiNotifyDpc

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4e6d2d74-350e-3780-03d1-7dfcf1a310f1}

Followup: MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8d035e0ae560, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8d035e0ae4b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2656

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 21112

Key : Analysis.Init.CPU.mSec
Value: 577

Key : Analysis.Init.Elapsed.mSec
Value: 195477

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff8d035e0ae560

BUGCHECK_P3: ffff8d035e0ae4b8

BUGCHECK_P4: 0

TRAP_FRAME: ffff8d035e0ae560 -- (.trap 0xffff8d035e0ae560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc08eebbbb1a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc08eebbbb1a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026180d7e7 rsp=ffff8d035e0ae6f0 rbp=000000b19b8b0be5
r8=000000b19b8b0be5 r9=fffff80261400000 r10=fffff8025d4f9ac0
r11=ffff8d035e0ae800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!KiInsertTimerTable+0x1e4617:
fffff802`6180d7e7 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffff8d035e0ae4b8 -- (.exr 0xffff8d035e0ae4b8)
ExceptionAddress: fffff8026180d7e7 (nt!KiInsertTimerTable+0x00000000001e4617)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffff8d03`5e0ae238 fffff802`617efe29 : 00000000`00000139 00000000`00000003 ffff8d03`5e0ae560 ffff8d03`5e0ae4b8 : nt!KeBugCheckEx
ffff8d03`5e0ae240 fffff802`617f0250 : 00000000`0000003f 00000000`0000003f 00000000`00000008 ffffc08e`00000000 : nt!KiBugCheckDispatch+0x69
ffff8d03`5e0ae380 fffff802`617ee5e3 : ffffc08e`e3596080 ffff8d03`5e0ae500 00000000`00000000 fffff802`617e4cc6 : nt!KiFastFailDispatch+0xd0
ffff8d03`5e0ae560 fffff802`6180d7e7 : ffff8d03`5e0ae710 ffff8d03`5e0ae708 00000000`0000003f 00000000`0000003f : nt!KiRaiseSecurityCheckFailure+0x323
ffff8d03`5e0ae6f0 fffff802`6162753d : ffffc08e`ebbbb080 fffff802`6fe1d272 00000000`00000000 ffffc08e`00000000 : nt!KiInsertTimerTable+0x1e4617
ffff8d03`5e0ae770 fffff802`6162ac03 : ffffc08e`000000e2 ffffc08e`00000000 00000000`00000001 00000000`00000001 : nt!KiCommitThreadWait+0x3bd
ffff8d03`5e0ae810 fffff802`6162a638 : ffffc08e`e8b3fac0 00000000`00000001 ffffc08e`eb3bb250 fffff802`00000002 : nt!KeRemoveQueueEx+0x263
ffff8d03`5e0ae8b0 fffff802`61add26d : 00000000`00000000 00000000`00000000 ffffe700`30896180 fffff802`6163e2aa : nt!IoRemoveIoCompletion+0x98
ffff8d03`5e0ae9e0 fffff802`617ef878 : ffffc08e`ebbbb080 00000096`20fff788 ffff8d03`5e0aeaa8 000001f5`28cf1150 : nt!NtRemoveIoCompletion+0x13d
ffff8d03`5e0aea90 00007ffd`0810bee4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`20fff768 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`0810bee4

SYMBOL_NAME: nt!KiInsertTimerTable+1e4617

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1e4617

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

Followup: MachineOwner
---------

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff807410fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6093

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 234601

Key : Analysis.Init.CPU.mSec
Value: 515

Key : Analysis.Init.Elapsed.mSec
Value: 197983

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff807410fa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffffef0c93baa5b0 -- (.trap 0xffffef0c93baa5b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a34fc5dd rbx=0000000000000000 rcx=ffffef0c93baa7a8
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807406333b7 rsp=ffffef0c93baa740 rbp=0000000000000000
r8=0000000000000000 r9=ffffb3802c550180 r10=0000000000000000
r11=fffff80740400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff807`406333b7 4883c420 add rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: nvcontainer.exe

STACK_TEXT:
ffffb380`2c569e18 fffff807`4085963e : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`410fa320 : nt!KeBugCheckEx
ffffb380`2c569e20 fffff807`406c98bd : 00012455`e2af7e6e 00000000`00000000 ffffef0c`93baa600 ffffb380`2c550180 : nt!KeAccumulateTicks+0x18cbee
ffffb380`2c569e80 fffff807`406c973a : ffffdc8c`b5905600 ffffef0c`93baa630 00000000`006b857e 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
ffffb380`2c569f30 fffff807`40608725 : ffffdc8c`b5905600 00000000`00000000 00000000`00000000 ffff21cc`2397026a : nt!HalpTimerClockIpiRoutine+0x1a
ffffb380`2c569f60 fffff807`407df9ea : ffffef0c`93baa630 ffffdc8c`b5905600 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffb380`2c569fb0 fffff807`407dff57 : ffffef0c`93baa7a8 ffffdc8c`be997180 ffffdc8c`b5905600 ffffdc8c`be997180 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffef0c`93baa5b0 fffff807`406333b7 : ffffffff`ffffffd2 fffff807`4062981c 00000000`00000010 00000000`00040286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffef0c`93baa740 fffff807`4062981a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeYieldProcessorEx+0x17
ffffef0c`93baa770 fffff807`40627f6c : ffffb380`2c340180 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCancelTimer+0x37a
ffffef0c`93baa820 fffff807`406272cf : ffffdc8c`00000002 00000000`00000003 ffffef0c`93baa9e0 00000000`00000000 : nt!KiSwapThread+0x6cc
ffffef0c`93baa8d0 fffff807`40626b73 : 00000000`00000097 fffff807`00000000 00000000`00000001 ffffdc8c`be9971c0 : nt!KiCommitThreadWait+0x14f
ffffef0c`93baa970 fffff807`409fb6b1 : ffffdc8c`bfc9abe0 00000000`00000006 ffffdc8c`00000001 00000000`00000c00 : nt!KeWaitForSingleObject+0x233
ffffef0c`93baaa60 fffff807`409fb75a : ffffdc8c`be997080 000000c9`d51ff758 00000000`00000000 00000296`2fcea800 : nt!ObWaitForSingleObject+0x91
ffffef0c`93baaac0 fffff807`407ef878 : 00000000`00000000 00000000`00000000 ffffef0c`93baab18 ffffffff`ffb38db0 : nt!NtWaitForSingleObject+0x6a
ffffef0c`93baab00 00007ffa`d162be44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c9`d51ff728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`d162be44

SYMBOL_NAME: nt!KeAccumulateTicks+18cbee

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 18cbee

FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup: MachineOwner
---------

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077791cfc, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffad8993d09b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3218

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 6442

Key : Analysis.Init.CPU.mSec
Value: 452

Key : Analysis.Init.Elapsed.mSec
Value: 8011

Key : Analysis.Memory.CommitPeak.Mb
Value: 72

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 1

BUGCHECK_P1: 77791cfc

BUGCHECK_P2: 0

BUGCHECK_P3: 1

BUGCHECK_P4: ffffad8993d09b80

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steam.exe

STACK_TEXT:
ffffad89`93d09948 fffff806`44c07769 : 00000000`00000001 00000000`77791cfc 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
ffffad89`93d09950 fffff806`44c07633 : 00000000`07c3fda0 00000000`77794660 00000000`07e1f7a4 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffad89`93d09a90 00000000`77791cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000000`07c3ed48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77791cfc

SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.685

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1fe

FAILURE_BUCKET_ID: 0x1_SysCallNum_1b0007_nt!KiSystemServiceExitPico

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {1d25e8fe-40eb-1b84-9166-c3af30bbaf7e}
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8025e530e36, The address that the exception occurred at
Arg3: fffff909f0775ef8, Exception Record Address
Arg4: fffff909f0775730, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : AV.Dereference
Value: NullClassPtr

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 4452

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 103447

Key : Analysis.Init.CPU.mSec
Value: 546

Key : Analysis.Init.Elapsed.mSec
Value: 10200

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8025e530e36

BUGCHECK_P3: fffff909f0775ef8

BUGCHECK_P4: fffff909f0775730

EXCEPTION_RECORD: fffff909f0775ef8 -- (.exr 0xfffff909f0775ef8)
ExceptionAddress: fffff8025e530e36 (nvlddmkm+0x00000000007c0e36)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048

CONTEXT: fffff909f0775730 -- (.cxr 0xfffff909f0775730)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc604dfbdc1d8
rdx=0000000000000000 rsi=ffffdb00d1a48c57 rdi=ffffc604dfb46000
rip=fffff8025e530e36 rsp=fffff909f0776130 rbp=ffffc604dfb67f20
r8=0000000000000003 r9=0000000000000000 r10=0000000000000000
r11=ffffdb00d1a48cc3 r12=0000000000000000 r13=0000000000000000
r14=0000000000000002 r15=ffffc604dfb46180
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nvlddmkm+0x7c0e36:
fffff802`5e530e36 ff5048 call qword ptr [rax+48h] ds:002b:00000000`00000048=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff8024eafa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000048

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 0000000000000048

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
fffff909`f0776130 00000000`00000000 : fffff802`5ded9543 00000000`00000001 fffff802`4e1d3608 00000000`000000ff : nvlddmkm+0x7c0e36

SYMBOL_NAME: nvlddmkm+7c0e36

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr 0xfffff909f0775730 ; kb

BUCKET_ID_FUNC_OFFSET: 7c0e36

FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000011, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8041344a81c, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3218

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 4396

Key : Analysis.Init.CPU.mSec
Value: 468

Key : Analysis.Init.Elapsed.mSec
Value: 13061

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: a

BUGCHECK_P1: 11

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8041344a81c

READ_ADDRESS: fffff80413efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000011

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

TRAP_FRAME: ffffa78aa6ba3800 -- (.trap 0xffffa78aa6ba3800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000a9 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffdf81a9b28180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041344a81c rsp=ffffa78aa6ba3990 rbp=ffffdf81a9a87ca8
r8=00000000000008e1 r9=000000000000002f r10=0000fffff804134e
r11=ffffcf7939e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiExitDispatcher+0xcc:
fffff804`1344a81c 0fb64611 movzx eax,byte ptr [rsi+11h] ds:00000000`00000011=??
Resetting default scope

STACK_TEXT:
ffffa78a`a6ba36b8 fffff804`13607769 : 00000000`0000000a 00000000`00000011 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa78a`a6ba36c0 fffff804`13603a69 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`13465a1c : nt!KiBugCheckDispatch+0x69
ffffa78a`a6ba3800 fffff804`1344a81c : ffffa78a`a6ba39e0 00000000`001f0003 ffffa887`f54f0000 fffff804`1382af81 : nt!KiPageFault+0x469
ffffa78a`a6ba3990 fffff804`1344a31a : 00000000`00000000 00000000`00000000 ffffcd87`308e9760 00000000`00000000 : nt!KiExitDispatcher+0xcc
ffffa78a`a6ba3a00 fffff804`137fae1d : 00000000`00000000 ffffa78a`a6ba3b80 ffffcd87`00000000 ffffcd87`32c4e440 : nt!KeSetEvent+0xea
ffffa78a`a6ba3a90 fffff804`136071b8 : ffffcd87`2210e080 00000000`00000000 ffffa78a`00000000 ffffcd87`00000000 : nt!NtSetEvent+0xbd
ffffa78a`a6ba3b00 00007ffa`1166c174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e8`6e5fe008 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`1166c174

SYMBOL_NAME: nt!KiExitDispatcher+cc

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.746

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: cc

FAILURE_BUCKET_ID: AV_nt!KiExitDispatcher

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {fa0b8b4b-4ad8-a0c3-2a8d-0bdbe49a67e8}
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff803007969e8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80177f1920b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2889

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 4049

Key : Analysis.Init.CPU.mSec
Value: 421

Key : Analysis.Init.Elapsed.mSec
Value: 15547

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 50

BUGCHECK_P1: fffff803007969e8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80177f1920b

BUGCHECK_P4: 2

READ_ADDRESS: Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f908
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f918
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f928
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f938
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f948
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f958
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f968
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f978
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f988
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f998
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f9a8
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f9b8
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f9c8
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
GetUlongFromAddress: unable to read from fffff801786168c4
fffff803007969e8

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

TRAP_FRAME: ffffef0a3ee30460 -- (.trap 0xffffef0a3ee30460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff801786fa368 rbx=0000000000000000 rcx=ffff958c3122f080
rdx=00000000620271a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80177f1920b rsp=ffffef0a3ee305f0 rbp=ffff8381de728180
r8=00000000310138d0 r9=00000000310138d0 r10=ffff958c2eb8c080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiConvertDynamicHeteroPolicy+0x4b:
fffff801`77f1920b 8b0490 mov eax,dword ptr [rax+rdx*4] ds:fffff803`007969e8=????????
Resetting default scope

STACK_TEXT:
ffffef0a`3ee301b8 fffff801`77e1e8bb : 00000000`00000050 fffff803`007969e8 00000000`00000000 ffffef0a`3ee30460 : nt!KeBugCheckEx
ffffef0a`3ee301c0 fffff801`77c0c960 : 00000000`00000000 00000000`00000000 ffffef0a`3ee304e0 00000000`00000000 : nt!MiSystemFault+0x1f40ab
ffffef0a`3ee302c0 fffff801`77e0395e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffef0a`3ee30460 fffff801`77f1920b : ffff958c`00000002 ffffef0a`00000005 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffef0a`3ee305f0 fffff801`77f195c7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiConvertDynamicHeteroPolicy+0x4b
ffffef0a`3ee30620 fffff801`77c4b0b6 : ffff958c`350c0b70 00000000`00000000 000001e8`d130a350 00000000`00000010 : nt!KiHeteroChooseTargetProcessor+0xa7
ffffef0a`3ee306f0 fffff801`77c4a891 : 000001e8`d130a350 00000000`0000038c ffff958c`3194b648 fffff801`77c43a4b : nt!KiDeferredReadySingleThread+0x566
ffffef0a`3ee308e0 00000000`00000000 : 00000000`00000000 000001e8`d130a350 0000007c`f21ffbc8 ffff958c`350c0b70 : nt!KiExitDispatcher+0x141

SYMBOL_NAME: nt!KiConvertDynamicHeteroPolicy+4b

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.746

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 4b

FAILURE_BUCKET_ID: AV_R_INVALID_nt!KiConvertDynamicHeteroPolicy

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {82612117-fdf5-7a3e-5637-9d80a974c40f}
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffd0, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80033e611d6, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys

Could not read faulting driver name

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2796

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 45610

Key : Analysis.Init.CPU.mSec
Value: 484

Key : Analysis.Init.Elapsed.mSec
Value: 19019

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffffffffffffd0

BUGCHECK_P2: 2

BUGCHECK_P3: fffff80033e611d6

BUGCHECK_P4: 2

READ_ADDRESS: fffff800348fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffd0

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: XboxPcApp.exe

TRAP_FRAME: ffffe28adddda9a0 -- (.trap 0xffffe28adddda9a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=000000007457624f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80033e611d6 rsp=ffffe28addddab30 rbp=ffffe28addddabb0
r8=ffffbf8f77374196 r9=0000000000000026 r10=00000000ffffffff
r11=000000000000016e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfDereferenceObjectWithTag+0x26:
fffff800`33e611d6 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
Resetting default scope

STACK_TEXT:
ffffe28a`dddda6f8 fffff800`3401e8bb : 00000000`00000050 ffffffff`ffffffd0 00000000`00000002 ffffe28a`dddda9a0 : nt!KeBugCheckEx
ffffe28a`dddda700 fffff800`33e0c960 : 00000000`00000000 00000000`00000002 ffffe28a`ddddaa20 00000000`00000000 : nt!MiSystemFault+0x1f40ab
ffffe28a`dddda800 fffff800`3400395e : 00000000`00000000 ffffa900`b3b28180 ffffbf8f`891d4340 fffff800`33e64d7f : nt!MmAccessFault+0x400
ffffe28a`dddda9a0 fffff800`33e611d6 : ffffe28a`ddddae20 fffff800`345b1019 00000000`00000000 ffffbf8f`891d4340 : nt!KiPageFault+0x35e
ffffe28a`ddddab30 fffff800`341f7786 : ffffe28a`ddddae18 00000000`ffffffff ffffbf8f`8b74fe10 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0x26
ffffe28a`ddddab70 ffff8210`87c34fb2 : 00000000`000186a0 00000000`00030d40 ffff8251`472cb530 ffffbf8f`82256970 : nt!ObWaitForMultipleObjects+0x336
ffffe28a`ddddb070 00000000`000186a0 : 00000000`00030d40 ffff8251`472cb530 ffffbf8f`82256970 00000000`00000001 : win32kfull+0x154fb2
ffffe28a`ddddb078 00000000`00030d40 : ffff8251`472cb530 ffffbf8f`82256970 00000000`00000001 ffffe28a`ddddb001 : 0x186a0
ffffe28a`ddddb080 ffff8251`472cb530 : ffffbf8f`82256970 00000000`00000001 ffffe28a`ddddb001 00000000`00000000 : 0x30d40
ffffe28a`ddddb088 ffffbf8f`82256970 : 00000000`00000001 ffffe28a`ddddb001 00000000`00000000 ffff8210`8784d781 : 0xffff8251`472cb530
ffffe28a`ddddb090 00000000`00000001 : ffffe28a`ddddb001 00000000`00000000 ffff8210`8784d781 00000004`00000001 : 0xffffbf8f`82256970
ffffe28a`ddddb098 ffffe28a`ddddb001 : 00000000`00000000 ffff8210`8784d781 00000004`00000001 00000000`00000000 : 0x1
ffffe28a`ddddb0a0 00000000`00000000 : ffff8210`8784d781 00000004`00000001 00000000`00000000 00000000`00000000 : 0xffffe28a`ddddb001

SYMBOL_NAME: win32kfull+154fb2

MODULE_NAME: win32kfull

IMAGE_NAME: win32kfull.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 154fb2

FAILURE_BUCKET_ID: AV_INVALID_win32kfull!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {813dd5ff-825f-5763-1a47-2fbfb9dbb6be}
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000102, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021c86457e, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3093

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 10685

Key : Analysis.Init.CPU.mSec
Value: 437

Key : Analysis.Init.Elapsed.mSec
Value: 4877

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: a

BUGCHECK_P1: 102

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8021c86457e

WRITE_ADDRESS: fffff8021d2fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000102

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: EpicGamesLauncher.exe

TRAP_FRAME: ffffe402ad1bf7e0 -- (.trap 0xffffe402ad1bf7e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000034d569 rbx=0000000000000000 rcx=ffffa3806e919180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021c86457e rsp=ffffe402ad1bf970 rbp=ffffe402ad1bfa01
r8=0000000000000001 r9=0000007df719da83 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeWaitForSingleObject+0x18e:
fffff802`1c86457e f00fba2f07 lock bts dword ptr [rdi],7 ds:00000000`00000000=????????
Resetting default scope

STACK_TEXT:
ffffe402`ad1bf698 fffff802`1ca07769 : 00000000`0000000a 00000000`00000102 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffe402`ad1bf6a0 fffff802`1ca03a69 : ffffa380`6e728100 ffff28e6`a3ede428 00000000`00000000 ffffd104`1f7e9180 : nt!KiBugCheckDispatch+0x69
ffffe402`ad1bf7e0 fffff802`1c86457e : ffffd104`000000c6 fffff802`00000000 fffff802`1ad41101 ffffd104`1f7e91c0 : nt!KiPageFault+0x469
ffffe402`ad1bf970 fffff802`1cc2c6a1 : 00000000`00000102 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18e
ffffe402`ad1bfa60 fffff802`1cc2c74a : ffffd104`1f7e9080 000000d0`210bf918 00000000`00000000 00000000`00040213 : nt!ObWaitForSingleObject+0x91
ffffe402`ad1bfac0 fffff802`1ca071b8 : 00000261`f0fbdae0 00000000`00000000 ffffe402`ad1bfb18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffe402`ad1bfb00 00007ffb`3d4cc034 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d0`210bf8e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`3d4cc034

SYMBOL_NAME: nt!KeWaitForSingleObject+18e

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.746

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 18e

FAILURE_BUCKET_ID: AV_nt!KeWaitForSingleObject

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {505415ce-6277-25db-2465-e86127b1616c}

Farklı bir ekran kartına sahip değilim. Evde tek bilgisayar var. Farklı bir yöntemi var mı? Memtest'i göndereceğim. Sizce sorun monitörümden kaynaklı olabilir mi? HDMI kullanırken Display Port'a geçtim ve normalde saat başı olurken bu sefer 4 saat sonra yaşandı.
 
Monitör kaynaklı olduğunu hiç sanmıyorum. Bellek testini yapın, sorun yoksa emanet bir ekran kartı bulmanızı isteyeceğim.

Tamamdır indirdim flashıma başlatıyorum şimdi. Bu sorun yüzünden garantiye gönderdiğimde ne olur ne olmaz RAM'leri değiştirdik demişlerdi ama emin olmakta fayda var.

Hocam ayrıca sorunum sadece video izlerken ve dersteyken yaşanıyor. Sabahtan akşama kadar oyun oynasam bile hiç sorun yaşatmıyor. Belki işinize yarar bir bilgidir söyleyeyim dedim.
 
Durum
Mesaj gönderimine kapalı.

Yeni konular

Geri
Yukarı