KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffc0738ca0740, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffc0738ca0698, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2218
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2226
Key : Analysis.Init.CPU.mSec
Value: 343
Key : Analysis.Init.Elapsed.mSec
Value: 1810
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffffc0738ca0740
BUGCHECK_P3: fffffc0738ca0698
BUGCHECK_P4: 0
TRAP_FRAME: fffffc0738ca0740 -- (.trap 0xfffffc0738ca0740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb6817d1dcd80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff94080d032158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80241a651f3 rsp=fffffc0738ca08d0 rbp=ffffb6817d1d5180
r8=0000000000000000 r9=00000027e0bad18a r10=0000000000000002
r11=fffffc0738ca0968 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x5c3:
fffff802`41a651f3 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffc0738ca0698 -- (.exr 0xfffffc0738ca0698)
ExceptionAddress: fffff80241a651f3 (nt!KiCommitThreadWait+0x00000000000005c3)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffc07`38ca0418 fffff802`41c07b69 : 00000000`00000139 00000000`00000003 fffffc07`38ca0740 fffffc07`38ca0698 : nt!KeBugCheckEx
fffffc07`38ca0420 fffff802`41c07f90 : fffff802`3ccfc180 00000000`00000000 ffffb681`7d389180 ffff9408`0d5f9080 : nt!KiBugCheckDispatch+0x69
fffffc07`38ca0560 fffff802`41c06323 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffc07`38ca0740 fffff802`41a651f3 : ffff9408`00000005 00000000`00000000 fffffc07`38ca09e0 ffffb681`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffffc07`38ca08d0 fffff802`41a64623 : ffffb681`00000000 fffff802`00000000 000f8067`b4bbbd00 ffff9408`0d0ca1c0 : nt!KiCommitThreadWait+0x5c3
fffffc07`38ca0970 fffff802`41e2cb01 : ffff9408`0d4ac460 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
fffffc07`38ca0a60 fffff802`41e2cbaa : ffff9408`0d0ca080 000000fb`f7ecf738 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
fffffc07`38ca0ac0 fffff802`41c075b8 : 00000256`4eafa020 fffffc07`38ca0b80 fffffc07`38ca0b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
fffffc07`38ca0b00 00007ffe`93c6cc94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fb`f7ecf708 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`93c6cc94
SYMBOL_NAME: nt!KiCommitThreadWait+5c3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.867
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5c3
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {369b7001-cfef-011b-6243-985c04f34d42}
Followup: MachineOwner
---------
3: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2134]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 2202
BiosReleaseDate = 07/14/2020
SystemManufacturer = System manufacturer
SystemProductName = MODART-PC-MA1-V6
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = B450M-DRAGON
BaseBoardVersion = Rev X.0x
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80152aaf493, Address of the instruction which caused the bugcheck
Arg3: fffff88b41d2b520, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3749
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3795
Key : Analysis.Init.CPU.mSec
Value: 499
Key : Analysis.Init.Elapsed.mSec
Value: 26685
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80152aaf493
BUGCHECK_P3: fffff88b41d2b520
BUGCHECK_P4: 0
CONTEXT: fffff88b41d2b520 -- (.cxr 0xfffff88b41d2b520)
rax=0000000000000000 rbx=ffffc28907ade180 rcx=ffffc28900200200
rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffc28900200100
rip=fffff80152aaf493 rsp=fffff88b41d2bf28 rbp=00000000ff80ffa0
r8=0000000000000000 r9=ffffc28907ade180 r10=0000000000000000
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000020 r15=0000000079737355
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlpHpSegDescriptorValidate+0x13:
fffff801`52aaf493 498b4010 mov rax,qword ptr [r8+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
STACK_TEXT:
fffff88b`41d2bf28 fffff801`52d8ed19 : 00000000`00000000 ffffb6fb`7b800000 ffffc2e5`03a566d0 00c00020`03883e78 : nt!RtlpHpSegDescriptorValidate+0x13
fffff88b`41d2bf30 fffff801`52d8ec47 : ffffc289`00200100 fffff88b`41d2cb80 ffffc289`07ade180 fffff88b`41d2cb80 : nt!RtlpHpSizeHeapInternal+0x89
fffff88b`41d2bf80 fffff801`52c2d33a : ffffc289`00200100 00000000`11000000 fffff88b`41d2cb80 ffffc289`00000000 : nt!RtlpHpSizeHeap+0x5f
fffff88b`41d2bfb0 fffff801`531b1019 : 00000000`00000000 fffff88b`41d2c000 ffffc2e5`03bc57f0 01000000`00100000 : nt!ExFreeHeapPool+0x1e0baa
fffff88b`41d2c090 ffffc2e5`03bc5842 : ffffffff`ffffd8f0 ffffc289`05f1e8a0 00000000`00041cff ffff9b06`f40df080 : nt!ExFreePool+0x9
fffff88b`41d2c0c0 ffffc2e5`0388c3e7 : 00000000`00000000 ffffc289`07ade190 ffffc289`07ade190 ffffc289`05f1e8a0 : win32kfull!Win32FreePoolImpl+0x52
fffff88b`41d2c0f0 ffffc2e5`03b92c28 : 00000000`00000000 ffffc289`05f1e8a0 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
fffff88b`41d2c120 ffffc2e5`04046fcf : fffff88b`41d2caa8 00000000`00000000 0000007f`00000001 fffff88b`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
fffff88b`41d2ca50 fffff801`52c075b8 : 0000007f`09aff560 00000000`00000108 00000000`00000040 0000007f`09afed60 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
fffff88b`41d2ca90 00007fff`c5efa104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007f`09aff3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`c5efa104
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.867
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff88b41d2b520 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
3: kd> !error 00000000c0000005
Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff9f6c11796f16, Address of the instruction which caused the bugcheck
Arg3: fffff884ac89f9f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3483
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6822
Key : Analysis.Init.CPU.mSec
Value: 608
Key : Analysis.Init.Elapsed.mSec
Value: 24092
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff9f6c11796f16
BUGCHECK_P3: fffff884ac89f9f0
BUGCHECK_P4: 0
CONTEXT: fffff884ac89f9f0 -- (.cxr 0xfffff884ac89f9f0)
rax=ffff9f16466bc1e0 rbx=ffff9f16466bc130 rcx=ffff9f16466bc130
rdx=ffff9f16466bc1e0 rsi=ffff9f1644a51010 rdi=ffff9f1644a511f0
rip=ffff9f6c11796f16 rsp=fffff884ac8a03f0 rbp=fffff884ac8a0b80
r8=ffff9f16466bc1e0 r9=ffffb08d47604dc8 r10=ffffb08d4a29da50
r11=ffff9f16466bc130 r12=0000000000000001 r13=0000000000a200a0
r14=ffff9f1644a51330 r15=0000000000000001
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
win32kfull!xxxReadPostMessage+0x356:
ffff9f6c`11796f16 418b4d08 mov ecx,dword ptr [r13+8] ds:002b:00000000`00a200a8=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
STACK_TEXT:
fffff884`ac8a03f0 ffff9f6c`11795465 : ffff9f16`44a51010 fffff884`ac8a09d8 00000000`00000000 00000000`00000000 : win32kfull!xxxReadPostMessage+0x356
fffff884`ac8a04b0 ffff9f6c`11794f48 : fffff884`ac8a09d8 00000000`00000000 00000000`00000000 fffff884`ac8a0aa8 : win32kfull!xxxRealInternalGetMessage+0x4b5
fffff884`ac8a0980 ffff9f6c`123c71ad : ffffb08d`47ef6080 00000093`09a1fa88 fffff884`ac8a0aa8 00000000`00000000 : win32kfull!NtUserPeekMessage+0x158
fffff884`ac8a0a40 fffff807`69e075b8 : 00000093`09a1fb80 00000000`00000108 00000000`00000040 00000093`09a1f380 : win32k!NtUserPeekMessage+0x29
fffff884`ac8a0a90 00007ffb`91901064 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000093`09a1fa68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`91901064
SYMBOL_NAME: win32kfull!xxxReadPostMessage+356
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.870
STACK_COMMAND: .cxr 0xfffff884ac89f9f0 ; kb
BUCKET_ID_FUNC_OFFSET: 356
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!xxxReadPostMessage
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b95dabba-224b-46a9-b91c-9cc42dc654dd}
Followup: MachineOwner
---------
RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffff9109648d3490, Address of resource
Arg2: ffff910952327080, Address of thread
Arg3: ffff910967e31ce0, Address of owner table if there is one
Arg4: 0000000000000002
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4092
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 27360
Key : Analysis.Init.CPU.mSec
Value: 640
Key : Analysis.Init.Elapsed.mSec
Value: 21801
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: e3
BUGCHECK_P1: ffff9109648d3490
BUGCHECK_P2: ffff910952327080
BUGCHECK_P3: ffff910967e31ce0
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
STACK_TEXT:
ffff858f`e8f3a898 fffff800`7b432e6f : 00000000`000000e3 ffff9109`648d3490 ffff9109`52327080 ffff9109`67e31ce0 : nt!KeBugCheckEx
ffff858f`e8f3a8a0 fffff800`7b2631a9 : ffff9109`648d3490 ffffd28f`84c3f010 ffffd28f`8083c930 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x1d183f
ffff858f`e8f3a960 ffffd2d5`c70d9f64 : 00000000`00000000 00000000`00000000 ffffd28f`84c3f010 00000000`00000000 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9
ffff858f`e8f3a9c0 ffffd2d5`c6cb439d : 00000000`00000001 00000000`00000401 00000000`00000000 00000000`00000000 : win32kbase!UserSessionSwitchLeaveCrit+0x74
ffff858f`e8f3aa30 ffffd2d5`c6a7723d : ffff9109`52327080 ffff858f`e8f3ab80 00000000`00000000 ffff858f`e8f3ab80 : win32kfull!NtUserPostMessage+0x15d
ffff858f`e8f3aac0 fffff800`7b4075b8 : 000001c4`bea144b0 00000000`00000000 ffff858f`e8f3ab80 ffff9109`00000000 : win32k!NtUserPostMessage+0x15
ffff858f`e8f3ab00 00007ffe`3ee31224 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000049`af6ff188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3ee31224
SYMBOL_NAME: win32kbase!UserSessionSwitchLeaveCrit+74
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.1140
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 74
FAILURE_BUCKET_ID: 0xE3_win32kbase!UserSessionSwitchLeaveCrit
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f42413ee-5fb5-c6d3-b0eb-f79aa2def38b}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8187f93f83e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8187f93f8338, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3734
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12894
Key : Analysis.Init.CPU.mSec
Value: 531
Key : Analysis.Init.Elapsed.mSec
Value: 19486
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff8187f93f83e0
BUGCHECK_P3: ffff8187f93f8338
BUGCHECK_P4: 0
TRAP_FRAME: ffff8187f93f83e0 -- (.trap 0xffff8187f93f83e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa90b9e317040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8027ba43edf rsp=ffff8187f93f8570 rbp=ffff8187f93f8639
r8=0000000000000000 r9=0000000000000000 r10=ffffc38137f89180
r11=ffffa90b9d4efdd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!KeWaitForMultipleObjects+0x43f:
fffff802`7ba43edf cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff8187f93f8338 -- (.exr 0xffff8187f93f8338)
ExceptionAddress: fffff8027ba43edf (nt!KeWaitForMultipleObjects+0x000000000000043f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff8187`f93f80b8 fffff802`7bc07b69 : 00000000`00000139 00000000`00000003 ffff8187`f93f83e0 ffff8187`f93f8338 : nt!KeBugCheckEx
ffff8187`f93f80c0 fffff802`7bc07f90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8187`f93f8200 fffff802`7bc06323 : ffffc381`37f89180 00000000`00000000 00000000`00000000 00000000`0000003f : nt!KiFastFailDispatch+0xd0
ffff8187`f93f83e0 fffff802`7ba43edf : ffffa90b`a482e080 00000000`00000000 00000000`00040246 fffff802`7ba4a891 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8187`f93f8570 fffff55a`efa6d768 : fffff55a`efc23210 ffff8187`fab6b210 00000000`00000003 fffff523`006da900 : nt!KeWaitForMultipleObjects+0x43f
ffff8187`f93f8680 fffff55a`ef0dbbef : 00000000`00000010 00000000`00000003 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x88
ffff8187`f93f87b0 fffff55a`ef9dd063 : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
ffff8187`f93f8970 fffff55a`ef0b3a30 : ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff8187`f93f8aa0 fffff55a`eee0474d : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff8187`f93f8ad0 fffff802`7bc075b8 : ffffa90b`00000005 00000000`00000005 000001a9`74004140 00000000`00000348 : win32k!NtUserCallNoParam+0x15
ffff8187`f93f8b00 00007ff8`e6a810e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000035`4743fe48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e6a810e4
SYMBOL_NAME: win32kbase!LegacyInputDispatcher::WaitAndDispatch+88
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.1140
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 88
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_win32kbase!LegacyInputDispatcher::WaitAndDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ec713815-b628-d3b4-9812-1937faa1c4d7}
Followup: MachineOwner
---------