"Kernel_securıty_check_failure" mavi ekran hatası

diaBoLik53

Femtopat
Katılım
19 Ekim 2020
Mesajlar
16
Daha fazla  
Cinsiyet
Erkek
Bilgisayar bilgileri;

İşlemci: Ryzen 5 3600
Anakart: Gigabyte B450 Aorus Elite 3600MHz(OC)
Ekran kartı: AREZ RX580 series
RAM: Crucial Ballistix 8 GB X2

Yeni format atıldı sadece ekran kartı driverı AMD'nin sitesinden indirildi onun haricinde ki tüm driverlar Microsoft driverı. RAM'lere Memtest testi ile test yapıldı herhangi bir hata vermedi. Ekran kartını da MSI kombustor ile test ettim 1:30 saat gibi bir sürede mavi ekran verdi. RAM testinde XMP kapatma gibi bir işlem yapmadım yeni okudum forumları gezerken şimdi tekrar kontrol edeceğim. Hata dosyalarını kontrol edip bir dönüş yaparsanız sevinirim farklı bir sebebi varsa ona göre yol izleyeyim. Şimdiden teşekkürler.

Minidump Dosyaları
 
Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin, hangi sürümünü kurmuştunuz?

Tencent Emülatör kaldırın. BIOS güncelleyin. Ayrıca Kaspersky indirip tam tarama yapın.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc3d4d3fdf518, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8064315a7ff, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6358

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7982

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffc3d4d3fdf518

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8064315a7ff

WRITE_ADDRESS: fffff80643afa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80643a0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff80643a0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffc3d4d3fdf518

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff60a2cc826d0 -- (.trap 0xfffff60a2cc826d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff60a2cc82928 rbx=0000000000000000 rcx=ffffc3d4d3fdf518
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064315a7ff rsp=fffff60a2cc82860 rbp=fffff60a2cc82919
r8=0000000000000000  r9=0000000000000002 r10=fffff8064315a7d0
r11=ffff84fe7c000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeReleaseInStackQueuedSpinLock+0x2f:
fffff806`4315a7ff f0480fb139      lock cmpxchg qword ptr [rcx],rdi ds:ffffc3d4`d3fdf518=????????????????
Resetting default scope

STACK_TEXT:
fffff60a`2cc82588 fffff806`43205e69     : 00000000`0000000a ffffc3d4`d3fdf518 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff60a`2cc82590 fffff806`43202169     : ffffe40b`f8734000 fffff806`579ded85 ffffe40b`f4e0e030 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff60a`2cc826d0 fffff806`4315a7ff     : 00000000`ffffffff 00000000`00000000 ffffe40b`fbc03000 00000000`00000000 : nt!KiPageFault+0x469
fffff60a`2cc82860 fffff806`51336868     : 00000000`00000000 00000000`00989680 ffffe40b`fbaca000 ffffe40c`00f08620 : nt!KeReleaseInStackQueuedSpinLock+0x2f
fffff60a`2cc82890 fffff806`513364f5     : 00000000`0000000f ffffe40b`fbac8000 ffffe40b`00000000 fffff806`00000002 : dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker+0x354
fffff60a`2cc82980 fffff806`5133fb63     : ffffe40b`f4e10030 ffffe40b`fbc03000 ffffe40b`fe69d530 00000000`00000000 : dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBInternal+0x6d
fffff60a`2cc829b0 fffff806`51d3d43e     : ffffe40b`fbaca000 ffffe40b`fbc03000 ffffffff`ffffffff 00000000`00000000 : dxgkrnl!DxgSetPowerComponentActiveNoWaitForceAsyncCB+0x43
fffff60a`2cc82a20 fffff806`51d2b81d     : ffffe40b`fbaca000 00000000`00000000 ffffffff`ffffffff 00000000`00989680 : dxgmms2!VidSchiSwitchContextWithCheck+0x10a2e
fffff60a`2cc82ac0 fffff806`51daabb5     : ffffe40b`ff5b3200 ffffe40b`fbaca000 ffffe40b`ff5b3260 ffffe40b`fe69d530 : dxgmms2!VidSchiScheduleCommandToRun+0x11d
fffff60a`2cc82b80 fffff806`51daab6a     : ffffe40b`fbaca400 fffff806`51daaaa0 ffffe40b`fbaca000 ffff9500`9ed6a100 : dxgmms2!VidSchiRun_PriorityTable+0x35
fffff60a`2cc82bd0 fffff806`43066dd5     : ffffe40b`fb962580 fffff806`00000001 ffffe40b`fbaca000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
fffff60a`2cc82c10 fffff806`431fb4f8     : ffff9500`9ed6a180 ffffe40b`fb962580 fffff806`43066d80 cb7f72b6`0b2580bc : nt!PspSystemThreadStartup+0x55
fffff60a`2cc82c60 00000000`00000000     : fffff60a`2cc83000 fffff60a`2cc7d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker+354

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  354

FAILURE_BUCKET_ID:  AV_dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a533151a-1aae-b601-c7af-0921bbb04a67}

Followup:     MachineOwner
---------



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80100000001, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000eb, value 0 = read operation, 1 = write operation
Arg4: fffff80100000001, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4855

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff80100000001

BUGCHECK_P2: ff

BUGCHECK_P3: eb

BUGCHECK_P4: fffff80100000001

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffffc8b44eb5580 -- (.trap 0xfffffc8b44eb5580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80100000001 rbx=0000000000000000 rcx=ffffe40e0f9681b0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80100000001 rsp=fffffc8b44eb5718 rbp=0000000000000000
r8=0000000000000001  r9=00000000ffffffff r10=0000fffff8010000
r11=ffffac7913200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
fffff801`00000001 ??              ???
Resetting default scope

STACK_TEXT:
fffffc8b`44eb5438 fffff801`63405e69     : 00000000`0000000a fffff801`00000001 00000000`000000ff 00000000`000000eb : nt!KeBugCheckEx
fffffc8b`44eb5440 fffff801`63402169     : 00000000`00000000 fffff801`75002d23 00000000`00000005 fffff801`635193ce : nt!KiBugCheckDispatch+0x69
fffffc8b`44eb5580 fffff801`00000001     : fffff801`633078d2 00000000`00000060 fffffff6`00000001 00000000`00000000 : nt!KiPageFault+0x469
fffffc8b`44eb5718 fffff801`633078d2     : 00000000`00000060 fffffff6`00000001 00000000`00000000 00000000`00000000 : 0xfffff801`00000001
fffffc8b`44eb5720 fffff801`63306fe4     : 00000000`00000000 00001f80`00000000 00000000`00000000 00000000`00000002 : nt!PpmIdleExecuteTransition+0x772
fffffc8b`44eb5af0 fffff801`633f79c4     : ffffffff`00000000 ffffbc80`0f80b340 ffffe40e`1afaf080 00000000`00000534 : nt!PoIdle+0x374
fffffc8b`44eb5c60 00000000`00000000     : fffffc8b`44eb6000 fffffc8b`44eb0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_nt!KiPageFault

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {22523384-75ca-2e7e-4899-20e7e5aa6dea}

Followup:     MachineOwner
---------



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000006b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffffc309377c184, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5155

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5272

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: 6b8

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffffc309377c184

WRITE_ADDRESS: fffff8011befa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8011be0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8011be0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000000006b8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  ffff828b2aab21e0 -- (.trap 0xffff828b2aab21e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a22ae080 rbx=0000000000000000 rcx=0000000000040202
rdx=ffff828b2aab2b01 rsi=0000000000000000 rdi=0000000000000000
rip=fffffc309377c184 rsp=ffff828b2aab2370 rbp=0000000000000000
r8=000000000000082f  r9=000000000000001f r10=0000fffff8011b56
r11=ffff9188a220c080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+0x104:
fffffc30`9377c184 4889abb8060000  mov     qword ptr [rbx+6B8h],rbp ds:00000000`000006b8=????????????????
Resetting default scope

STACK_TEXT:
ffff828b`2aab2098 fffff801`1b605e69     : 00000000`0000000a 00000000`000006b8 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff828b`2aab20a0 fffff801`1b602169     : 00000000`00000000 fffff801`183b129b ffff068f`c666bfb4 ffffcf7b`25200000 : nt!KiBugCheckDispatch+0x69
ffff828b`2aab21e0 fffffc30`9377c184     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff828b`2aab2370 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+0x104


SYMBOL_NAME:  win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+104

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  104

FAILURE_BUCKET_ID:  AV_win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {26c568e6-c857-f32c-7ccc-09c89c9ce870}

Followup:     MachineOwner
---------



APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077c41cfc, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffa48af5a05b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3609

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5243

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1

BUGCHECK_P1: 77c41cfc

BUGCHECK_P2: 0

BUGCHECK_P3: 1

BUGCHECK_P4: ffffa48af5a05b80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  aow_exe.exe

STACK_TEXT:
ffffa48a`f5a05948 fffff804`40005e69     : 00000000`00000001 00000000`77c41cfc 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
ffffa48a`f5a05950 fffff804`40005d33     : 00000000`023d8000 00000000`2fddeeb0 ffffa584`f10ca780 ffffe481`60c80180 : nt!KiBugCheckDispatch+0x69
ffffa48a`f5a05a90 00000000`77c41cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000000`3a6bef98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c41cfc


SYMBOL_NAME:  nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1fe

FAILURE_BUCKET_ID:  0x1_SysCallNum_1b0007_nt!KiSystemServiceExitPico

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1d25e8fe-40eb-1b84-9166-c3af30bbaf7e}

Followup:     MachineOwner
---------



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffef05f7bb8750, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffef05f7bb86a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3327

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4936

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffef05f7bb8750

BUGCHECK_P3: ffffef05f7bb86a8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffef05f7bb8750 -- (.trap 0xffffef05f7bb8750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff87830ad086c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017847e8af rsp=ffffef05f7bb88e0 rbp=ffffef05f7bb89a9
r8=0000000000000000  r9=0000000000000000 r10=ffff9a0183fc0180
r11=ffffef05f7bb8a68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KeWaitForMultipleObjects+0x43f:
fffff801`7847e8af cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffef05f7bb86a8 -- (.exr 0xffffef05f7bb86a8)
ExceptionAddress: fffff8017847e8af (nt!KeWaitForMultipleObjects+0x000000000000043f)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffef05`f7bb8428 fffff801`78605e69     : 00000000`00000139 00000000`00000003 ffffef05`f7bb8750 ffffef05`f7bb86a8 : nt!KeBugCheckEx
ffffef05`f7bb8430 fffff801`78606290     : 00000000`00000002 00000000`00000010 ffff8783`0169ecd8 ffff8783`0169ecd0 : nt!KiBugCheckDispatch+0x69
ffffef05`f7bb8570 fffff801`78604623     : 00000000`00000000 ffff8783`0b079000 ffff8783`07b8d7ff fffff801`78496134 : nt!KiFastFailDispatch+0xd0
ffffef05`f7bb8750 fffff801`7847e8af     : 00000000`00000000 ffffef05`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffef05`f7bb88e0 fffff801`85facfad     : ffffef05`f7bb8a00 00000000`00989680 00000065`76dce379 00000000`00000002 : nt!KeWaitForMultipleObjects+0x43f
ffffef05`f7bb89f0 fffff801`85f3b9ca     : 00000000`00000000 ffff8783`0ae7c000 ffffef05`f7bb8b19 00000000`00989680 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffffef05`f7bb8ac0 fffff801`85fbabb5     : ffff8783`11e71a00 ffff8783`0ae7c000 ffff8783`11e71a20 ffff8783`0c6c58e0 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffffef05`f7bb8b80 fffff801`85fbab6a     : ffff8783`0ae7c400 fffff801`85fbaaa0 ffff8783`0ae7c000 ffff9a01`83fc0100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffffef05`f7bb8bd0 fffff801`78466dd5     : ffff8783`0ad08580 fffff801`00000001 ffff8783`0ae7c000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffef05`f7bb8c10 fffff801`785fb4f8     : ffff9a01`83fc0180 ffff8783`0ad08580 fffff801`78466d80 17e8c118`698b4d48 : nt!PspSystemThreadStartup+0x55
ffffef05`f7bb8c60 00000000`00000000     : ffffef05`f7bb9000 ffffef05`f7bb3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VidSchiWaitForSchedulerEvents+25d

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25d

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiWaitForSchedulerEvents

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d16ce6d3-4b12-3833-fa73-8960c98e70a6}

Followup:     MachineOwner
---------



SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffb163423a9999, Address of the instruction which caused the bugcheck
Arg3: ffffc20e9dcfad20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4421

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4454

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffb163423a9999

BUGCHECK_P3: ffffc20e9dcfad20

BUGCHECK_P4: 0

CONTEXT:  ffffc20e9dcfad20 -- (.cxr 0xffffc20e9dcfad20)
rax=ffffb12fc471b278 rbx=ffffb12fc471b240 rcx=ffffb12fc07a9eb0
rdx=0000000000000fff rsi=ffffb12fc471b288 rdi=0000000000000200
rip=ffffb163423a9999 rsp=ffffc20e9dcfb720 rbp=ffffb12fc471b288
r8=0000000000000000  r9=0000000000000000 r10=ffffb1634209f530
r11=ffffc20e9dcfb790 r12=00000000000000ac r13=00000000000000ac
r14=ffffb12fc471b274 r15=ffffb12fc471b270
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
win32kfull!TimersProc+0x339:
ffffb163`423a9999 48390a          cmp     qword ptr [rdx],rcx ds:002b:00000000`00000fff=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
ffffc20e`9dcfb720 ffffb163`423a9346     : 00000000`00000010 00000000`09a3002f 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x339
ffffc20e`9dcfb7b0 ffffb163`42081eb3     : ffff9f02`a7f72080 ffff9f02`a7f72080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
ffffc20e`9dcfb970 ffffb163`42348960     : ffff9f02`a7f72080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffffc20e`9dcfbaa0 ffffb163`4294474d     : ffff9f02`a7f72080 ffff9f02`a7f72080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffffc20e`9dcfbad0 fffff806`2e2058b8     : ffff9f02`00000005 00000000`00000005 0000026a`5ba04150 00000000`00022210 : win32k!NtUserCallNoParam+0x15
ffffc20e`9dcfbb00 00007ff8`069210e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000006f`1c8bf9a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`069210e4


SYMBOL_NAME:  win32kfull!TimersProc+339

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .cxr 0xffffc20e9dcfad20 ; kb

BUCKET_ID_FUNC_OFFSET:  339

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!TimersProc

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e19a4cac-ba4d-937b-93bc-07ff9528cd63}

Followup:     MachineOwner
---------
 
1) Tencent Emulator/Gameloop kaldırın.

2) Ekran kartı sürücünüzü DDU ile kaldırıp WHQL sürücü kurun.

3) BIOS güncelleyin. Güncel BIOS dosyanızı aşağıdaki linkten indirebilirsiniz.

4) Aşağıdaki rehberi okuyup uygulayın ve sonuçları paylaşın.
 
Son düzenleme:
Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin, hangi sürümünü kurmuştunuz?

Tencent Emülatör kaldırın. BIOS güncelleyin. Ayrıca Kaspersky indirip tam tarama yapın.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc3d4d3fdf518, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8064315a7ff, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6358

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7982

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffc3d4d3fdf518

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8064315a7ff

WRITE_ADDRESS: fffff80643afa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80643a0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff80643a0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffc3d4d3fdf518

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff60a2cc826d0 -- (.trap 0xfffff60a2cc826d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff60a2cc82928 rbx=0000000000000000 rcx=ffffc3d4d3fdf518
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064315a7ff rsp=fffff60a2cc82860 rbp=fffff60a2cc82919
r8=0000000000000000  r9=0000000000000002 r10=fffff8064315a7d0
r11=ffff84fe7c000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeReleaseInStackQueuedSpinLock+0x2f:
fffff806`4315a7ff f0480fb139      lock cmpxchg qword ptr [rcx],rdi ds:ffffc3d4`d3fdf518=????????????????
Resetting default scope

STACK_TEXT:
fffff60a`2cc82588 fffff806`43205e69     : 00000000`0000000a ffffc3d4`d3fdf518 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff60a`2cc82590 fffff806`43202169     : ffffe40b`f8734000 fffff806`579ded85 ffffe40b`f4e0e030 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff60a`2cc826d0 fffff806`4315a7ff     : 00000000`ffffffff 00000000`00000000 ffffe40b`fbc03000 00000000`00000000 : nt!KiPageFault+0x469
fffff60a`2cc82860 fffff806`51336868     : 00000000`00000000 00000000`00989680 ffffe40b`fbaca000 ffffe40c`00f08620 : nt!KeReleaseInStackQueuedSpinLock+0x2f
fffff60a`2cc82890 fffff806`513364f5     : 00000000`0000000f ffffe40b`fbac8000 ffffe40b`00000000 fffff806`00000002 : dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker+0x354
fffff60a`2cc82980 fffff806`5133fb63     : ffffe40b`f4e10030 ffffe40b`fbc03000 ffffe40b`fe69d530 00000000`00000000 : dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBInternal+0x6d
fffff60a`2cc829b0 fffff806`51d3d43e     : ffffe40b`fbaca000 ffffe40b`fbc03000 ffffffff`ffffffff 00000000`00000000 : dxgkrnl!DxgSetPowerComponentActiveNoWaitForceAsyncCB+0x43
fffff60a`2cc82a20 fffff806`51d2b81d     : ffffe40b`fbaca000 00000000`00000000 ffffffff`ffffffff 00000000`00989680 : dxgmms2!VidSchiSwitchContextWithCheck+0x10a2e
fffff60a`2cc82ac0 fffff806`51daabb5     : ffffe40b`ff5b3200 ffffe40b`fbaca000 ffffe40b`ff5b3260 ffffe40b`fe69d530 : dxgmms2!VidSchiScheduleCommandToRun+0x11d
fffff60a`2cc82b80 fffff806`51daab6a     : ffffe40b`fbaca400 fffff806`51daaaa0 ffffe40b`fbaca000 ffff9500`9ed6a100 : dxgmms2!VidSchiRun_PriorityTable+0x35
fffff60a`2cc82bd0 fffff806`43066dd5     : ffffe40b`fb962580 fffff806`00000001 ffffe40b`fbaca000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
fffff60a`2cc82c10 fffff806`431fb4f8     : ffff9500`9ed6a180 ffffe40b`fb962580 fffff806`43066d80 cb7f72b6`0b2580bc : nt!PspSystemThreadStartup+0x55
fffff60a`2cc82c60 00000000`00000000     : fffff60a`2cc83000 fffff60a`2cc7d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker+354

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  354

FAILURE_BUCKET_ID:  AV_dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a533151a-1aae-b601-c7af-0921bbb04a67}

Followup:     MachineOwner
---------



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80100000001, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000eb, value 0 = read operation, 1 = write operation
Arg4: fffff80100000001, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4855

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff80100000001

BUGCHECK_P2: ff

BUGCHECK_P3: eb

BUGCHECK_P4: fffff80100000001

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffffc8b44eb5580 -- (.trap 0xfffffc8b44eb5580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80100000001 rbx=0000000000000000 rcx=ffffe40e0f9681b0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80100000001 rsp=fffffc8b44eb5718 rbp=0000000000000000
r8=0000000000000001  r9=00000000ffffffff r10=0000fffff8010000
r11=ffffac7913200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
fffff801`00000001 ??              ???
Resetting default scope

STACK_TEXT:
fffffc8b`44eb5438 fffff801`63405e69     : 00000000`0000000a fffff801`00000001 00000000`000000ff 00000000`000000eb : nt!KeBugCheckEx
fffffc8b`44eb5440 fffff801`63402169     : 00000000`00000000 fffff801`75002d23 00000000`00000005 fffff801`635193ce : nt!KiBugCheckDispatch+0x69
fffffc8b`44eb5580 fffff801`00000001     : fffff801`633078d2 00000000`00000060 fffffff6`00000001 00000000`00000000 : nt!KiPageFault+0x469
fffffc8b`44eb5718 fffff801`633078d2     : 00000000`00000060 fffffff6`00000001 00000000`00000000 00000000`00000000 : 0xfffff801`00000001
fffffc8b`44eb5720 fffff801`63306fe4     : 00000000`00000000 00001f80`00000000 00000000`00000000 00000000`00000002 : nt!PpmIdleExecuteTransition+0x772
fffffc8b`44eb5af0 fffff801`633f79c4     : ffffffff`00000000 ffffbc80`0f80b340 ffffe40e`1afaf080 00000000`00000534 : nt!PoIdle+0x374
fffffc8b`44eb5c60 00000000`00000000     : fffffc8b`44eb6000 fffffc8b`44eb0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_nt!KiPageFault

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {22523384-75ca-2e7e-4899-20e7e5aa6dea}

Followup:     MachineOwner
---------



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000006b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffffc309377c184, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5155

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5272

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: 6b8

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffffc309377c184

WRITE_ADDRESS: fffff8011befa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8011be0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8011be0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000000006b8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  ffff828b2aab21e0 -- (.trap 0xffff828b2aab21e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a22ae080 rbx=0000000000000000 rcx=0000000000040202
rdx=ffff828b2aab2b01 rsi=0000000000000000 rdi=0000000000000000
rip=fffffc309377c184 rsp=ffff828b2aab2370 rbp=0000000000000000
r8=000000000000082f  r9=000000000000001f r10=0000fffff8011b56
r11=ffff9188a220c080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+0x104:
fffffc30`9377c184 4889abb8060000  mov     qword ptr [rbx+6B8h],rbp ds:00000000`000006b8=????????????????
Resetting default scope

STACK_TEXT:
ffff828b`2aab2098 fffff801`1b605e69     : 00000000`0000000a 00000000`000006b8 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff828b`2aab20a0 fffff801`1b602169     : 00000000`00000000 fffff801`183b129b ffff068f`c666bfb4 ffffcf7b`25200000 : nt!KiBugCheckDispatch+0x69
ffff828b`2aab21e0 fffffc30`9377c184     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff828b`2aab2370 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+0x104


SYMBOL_NAME:  win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+104

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  104

FAILURE_BUCKET_ID:  AV_win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {26c568e6-c857-f32c-7ccc-09c89c9ce870}

Followup:     MachineOwner
---------



APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077c41cfc, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffa48af5a05b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3609

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5243

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1

BUGCHECK_P1: 77c41cfc

BUGCHECK_P2: 0

BUGCHECK_P3: 1

BUGCHECK_P4: ffffa48af5a05b80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  aow_exe.exe

STACK_TEXT:
ffffa48a`f5a05948 fffff804`40005e69     : 00000000`00000001 00000000`77c41cfc 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
ffffa48a`f5a05950 fffff804`40005d33     : 00000000`023d8000 00000000`2fddeeb0 ffffa584`f10ca780 ffffe481`60c80180 : nt!KiBugCheckDispatch+0x69
ffffa48a`f5a05a90 00000000`77c41cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000000`3a6bef98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c41cfc


SYMBOL_NAME:  nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1fe

FAILURE_BUCKET_ID:  0x1_SysCallNum_1b0007_nt!KiSystemServiceExitPico

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1d25e8fe-40eb-1b84-9166-c3af30bbaf7e}

Followup:     MachineOwner
---------



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffef05f7bb8750, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffef05f7bb86a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3327

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4936

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffef05f7bb8750

BUGCHECK_P3: ffffef05f7bb86a8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffef05f7bb8750 -- (.trap 0xffffef05f7bb8750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff87830ad086c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017847e8af rsp=ffffef05f7bb88e0 rbp=ffffef05f7bb89a9
r8=0000000000000000  r9=0000000000000000 r10=ffff9a0183fc0180
r11=ffffef05f7bb8a68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KeWaitForMultipleObjects+0x43f:
fffff801`7847e8af cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffef05f7bb86a8 -- (.exr 0xffffef05f7bb86a8)
ExceptionAddress: fffff8017847e8af (nt!KeWaitForMultipleObjects+0x000000000000043f)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffef05`f7bb8428 fffff801`78605e69     : 00000000`00000139 00000000`00000003 ffffef05`f7bb8750 ffffef05`f7bb86a8 : nt!KeBugCheckEx
ffffef05`f7bb8430 fffff801`78606290     : 00000000`00000002 00000000`00000010 ffff8783`0169ecd8 ffff8783`0169ecd0 : nt!KiBugCheckDispatch+0x69
ffffef05`f7bb8570 fffff801`78604623     : 00000000`00000000 ffff8783`0b079000 ffff8783`07b8d7ff fffff801`78496134 : nt!KiFastFailDispatch+0xd0
ffffef05`f7bb8750 fffff801`7847e8af     : 00000000`00000000 ffffef05`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffef05`f7bb88e0 fffff801`85facfad     : ffffef05`f7bb8a00 00000000`00989680 00000065`76dce379 00000000`00000002 : nt!KeWaitForMultipleObjects+0x43f
ffffef05`f7bb89f0 fffff801`85f3b9ca     : 00000000`00000000 ffff8783`0ae7c000 ffffef05`f7bb8b19 00000000`00989680 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffffef05`f7bb8ac0 fffff801`85fbabb5     : ffff8783`11e71a00 ffff8783`0ae7c000 ffff8783`11e71a20 ffff8783`0c6c58e0 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffffef05`f7bb8b80 fffff801`85fbab6a     : ffff8783`0ae7c400 fffff801`85fbaaa0 ffff8783`0ae7c000 ffff9a01`83fc0100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffffef05`f7bb8bd0 fffff801`78466dd5     : ffff8783`0ad08580 fffff801`00000001 ffff8783`0ae7c000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffef05`f7bb8c10 fffff801`785fb4f8     : ffff9a01`83fc0180 ffff8783`0ad08580 fffff801`78466d80 17e8c118`698b4d48 : nt!PspSystemThreadStartup+0x55
ffffef05`f7bb8c60 00000000`00000000     : ffffef05`f7bb9000 ffffef05`f7bb3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VidSchiWaitForSchedulerEvents+25d

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25d

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiWaitForSchedulerEvents

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d16ce6d3-4b12-3833-fa73-8960c98e70a6}

Followup:     MachineOwner
---------



SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffb163423a9999, Address of the instruction which caused the bugcheck
Arg3: ffffc20e9dcfad20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4421

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4454

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffb163423a9999

BUGCHECK_P3: ffffc20e9dcfad20

BUGCHECK_P4: 0

CONTEXT:  ffffc20e9dcfad20 -- (.cxr 0xffffc20e9dcfad20)
rax=ffffb12fc471b278 rbx=ffffb12fc471b240 rcx=ffffb12fc07a9eb0
rdx=0000000000000fff rsi=ffffb12fc471b288 rdi=0000000000000200
rip=ffffb163423a9999 rsp=ffffc20e9dcfb720 rbp=ffffb12fc471b288
r8=0000000000000000  r9=0000000000000000 r10=ffffb1634209f530
r11=ffffc20e9dcfb790 r12=00000000000000ac r13=00000000000000ac
r14=ffffb12fc471b274 r15=ffffb12fc471b270
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
win32kfull!TimersProc+0x339:
ffffb163`423a9999 48390a          cmp     qword ptr [rdx],rcx ds:002b:00000000`00000fff=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
ffffc20e`9dcfb720 ffffb163`423a9346     : 00000000`00000010 00000000`09a3002f 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x339
ffffc20e`9dcfb7b0 ffffb163`42081eb3     : ffff9f02`a7f72080 ffff9f02`a7f72080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
ffffc20e`9dcfb970 ffffb163`42348960     : ffff9f02`a7f72080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffffc20e`9dcfbaa0 ffffb163`4294474d     : ffff9f02`a7f72080 ffff9f02`a7f72080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffffc20e`9dcfbad0 fffff806`2e2058b8     : ffff9f02`00000005 00000000`00000005 0000026a`5ba04150 00000000`00022210 : win32k!NtUserCallNoParam+0x15
ffffc20e`9dcfbb00 00007ff8`069210e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000006f`1c8bf9a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`069210e4


SYMBOL_NAME:  win32kfull!TimersProc+339

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .cxr 0xffffc20e9dcfad20 ; kb

BUCKET_ID_FUNC_OFFSET:  339

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!TimersProc

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e19a4cac-ba4d-937b-93bc-07ff9528cd63}

Followup:     MachineOwner
---------

Ekran kartını DDU ile kaldırıp microsoft driverını yüklettim, sürümüne dikkat etmedim fakat beta sürüm değildi yüklediğim. Tencent 'in ne gibi bir sıkıntısı var ?

1) Tencent Emulator/Gameloop kaldırın.

2) Ekran kartı sürücünüzü DDU ile kaldırıp WHQL sürücü kurun.

3) BIOS güncelleyin. Güncel BIOS dosyanızı aşağıdaki linkten indirebilirsiniz.

4) Aşağıdaki rehberi okuyup uygulayın ve sonuçları paylaşın.
Test bittikten sonra dosya taramasını yaparım fakat format atmadan öncede böyleydi durum hem sürüm yükseltmek hem de yeniden bir kurulum yapmak için format atmıştım.
 
Son düzenleyen: Moderatör:
Rica ederiz. 6 saatlik kullanım biraz erken. Sorun şimdilik çözülmüş gibi, devam edecek olursa bu mesajımdan sonra yazınız.
 

Yeni konular

Geri
Yukarı