*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff8015edf0ca2, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffff9a8e3a5cfcd0, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8406
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 47103
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffff80000003
BUGCHECK_P2: fffff8015edf0ca2
BUGCHECK_P3: 0
BUGCHECK_P4: ffff9a8e3a5cfcd0
EXCEPTION_PARAMETER2: ffff9a8e3a5cfcd0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
BAD_STACK_POINTER: fffff80153c81158
STACK_TEXT:
fffff801`53c81158 fffff801`4dcf4b0e : 00000000`0000001e ffffffff`80000003 fffff801`5edf0ca2 00000000`00000000 : nt!KeBugCheckEx
fffff801`53c81160 fffff801`4dbfe642 : fffff801`4dcf4aec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff801`53c811a0 fffff801`4db2bf97 : fffff801`53c81710 00000000`00000000 fffff801`53c6cc60 fffff801`4dbf92ee : nt!RtlpExecuteHandlerForException+0x12
fffff801`53c811d0 fffff801`4db2ab86 : fffff801`53c6c018 fffff801`53c81e20 fffff801`53c6c018 fffff801`53c6c2e4 : nt!RtlDispatchException+0x297
fffff801`53c818f0 fffff801`4dbf6612 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff801`53c81fb0 fffff801`4dbf65e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff801`53c6bed8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
SYMBOL_NAME: nvlddmkm+6d0ca2
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 6d0ca2
FAILURE_BUCKET_ID: 0x1E_80000003_STACKPTR_ERROR_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {190d579c-5762-fb1d-d0aa-ccf876db757e}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008886, The subtype of the bugcheck.
Arg2: ffff9f7ffffeedb0
Arg3: ffff9f7fffe5ab00
Arg4: 0000000000000500
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8733
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 22478
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 8886
BUGCHECK_P2: ffff9f7ffffeedb0
BUGCHECK_P3: ffff9f7fffe5ab00
BUGCHECK_P4: 500
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff808a`6d33f928 fffff800`7d817ef0 : 00000000`0000001a 00000000`00008886 ffff9f7f`fffeedb0 ffff9f7f`ffe5ab00 : nt!KeBugCheckEx
ffff808a`6d33f930 fffff800`7d83f273 : ffff808a`00000002 fffff800`00000000 0000000f`fffffa49 00000000`00000000 : nt!MiUnlinkPageFromList+0xcb0
ffff808a`6d33f9c0 fffff800`7d83f1cb : 00000000`00000005 ffff9f7f`fffeedb0 ffff9f80`0000818a ffff9f80`0000818a : nt!MiRelinkStandbyPage+0x3f
ffff808a`6d33f9f0 fffff800`7d8404d5 : fffff800`00000000 fffff800`7e250b40 00000000`00000000 ffffe208`6c04b010 : nt!MiEmptyDecayClusterTimers+0x16f
ffff808a`6d33fa60 fffff800`7d9b4e37 : 00000000`00000005 00000000`00000005 00000000`ffffffff ffff8780`e7790180 : nt!MiWorkingSetManager+0x85
ffff808a`6d33fb20 fffff800`7d917e25 : ffffe208`6c0ad040 00000000`00000080 fffff800`7d9b4ce0 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffff808a`6d33fc10 fffff800`7d9fcdd8 : ffff8780`e7790180 ffffe208`6c0ad040 fffff800`7d917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff808a`6d33fc60 00000000`00000000 : ffff808a`6d340000 ffff808a`6d33a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiUnlinkPageFromList+cb0
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: cb0
FAILURE_BUCKET_ID: 0x1a_8886_nt!MiUnlinkPageFromList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e6c4a407-fb91-8f9b-d936-43ef8f99a8cf}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff948384cd11c0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff948384cd1118, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 14468
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 82779
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff948384cd11c0
BUGCHECK_P3: ffff948384cd1118
BUGCHECK_P4: 0
TRAP_FRAME: ffff948384cd11c0 -- (.trap 0xffff948384cd11c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdd83e6df0188 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffdd83e6decbe8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076d712b51 rsp=ffff948384cd1350 rbp=0000000000000000
r8=ffff948384cd1330 r9=0000000000000044 r10=fffff80761340d40
r11=ffff948384cd1370 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85:
fffff807`6d712b51 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff948384cd1118 -- (.exr 0xffff948384cd1118)
ExceptionAddress: fffff8076d712b51 (dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x0000000000000085)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff9483`84cd0e98 fffff807`61407769 : 00000000`00000139 00000000`00000003 ffff9483`84cd11c0 ffff9483`84cd1118 : nt!KeBugCheckEx
ffff9483`84cd0ea0 fffff807`61407b90 : 00000000`00000000 00000000`38616956 ffff6abc`87de61d3 fffff807`6123c5b9 : nt!KiBugCheckDispatch+0x69
ffff9483`84cd0fe0 fffff807`61405f23 : 00000000`00000000 00000000`00000000 00000000`00000103 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9483`84cd11c0 fffff807`6d712b51 : 00000000`00000060 fffff807`61260913 ffffdd83`e5a11080 ffffdd83`e0a53160 : nt!KiRaiseSecurityCheckFailure+0x323
ffff9483`84cd1350 fffff807`6d712c5b : ffffdd83`e6df0cc0 ffffdd83`e6df0cc0 00000000`40001dc0 ffff8106`beed6ed0 : dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+0x85
ffff9483`84cd1380 fffff807`6d7135d5 : ffffdd83`e0a53160 ffff9483`84cd1430 ffff8106`beed6de0 ffff8106`beed6de0 : dxgkrnl!DXGSYNCOBJECT::Destroy+0xff
ffff9483`84cd13c0 fffff807`6d7186b0 : ffffdd83`e6df0cc0 ffff8106`be4d2720 ffffdd83`e6df0cc0 ffff8106`be4d2720 : dxgkrnl!DXGGLOBAL::DestroySyncObject+0x285
ffff9483`84cd1470 fffff807`6d7138e5 : ffff8106`beed6de0 00000000`000020d0 ffff8106`beed6de0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x328
ffff9483`84cd16e0 fffff807`6d606b67 : 00000000`00000000 ffff8106`beed6de0 ffffdd83`dda80350 fffff807`66ae4713 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff9483`84cd1830 fffff807`6163759f : 00000000`00000000 ffffdd83`e5905080 00000000`0000ff00 ffffdd83`e5b76050 : dxgkrnl!DxgkProcessNotify+0xf7
ffff9483`84cd1890 fffff807`61662894 : ffffdd83`e5905000 ffffdd83`e5905080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff9483`84cd1960 fffff807`61706552 : ffffdd83`e5a114b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
ffff9483`84cd1990 fffff807`61709a8e : ffffdd83`00000000 00000000`00000001 00000000`00000000 00000005`dd770000 : nt!PspExitThread+0x5b2
ffff9483`84cd1a90 fffff807`614071b8 : ffffdd83`e5905080 ffffdd83`e5a11080 ffff9483`84cd1b80 ffffdd83`e5905080 : nt!NtTerminateProcess+0xde
ffff9483`84cd1b00 00007fff`2364c534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000005`dd54fbb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2364c534
SYMBOL_NAME: dxgkrnl!DXGADAPTERSYNCOBJECT::~DXGADAPTERSYNCOBJECT+85
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 85
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!DXGADAPTERSYNCOBJECT::_DXGADAPTERSYNCOBJECT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {45500ca4-091f-73c0-5a5a-21a7c0e5a624}
Followup: MachineOwner
---------