Çözüldü KERNEL_SECURITY_CHECK_FAILURE mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10

TheEnjoYu

Femtopat
Katılım
19 Mart 2021
Mesajlar
12
Yer
Eskişehir
Daha fazla  
Cinsiyet
Erkek
Bilgisiyarımdan oyun oynarken durmadan mavi ekran hatası alıp duruyorum minidump dosyaların paylaştım. Yardımcı olursanız sevinirim.
Not: Oyun oynarken mavi ekran yemiyorum sadece ana ekrandayken alıyorum.
 
Çözüm
Merhaba,

ilk ama ilk olarak BIOS güncellemesi yapın:


Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Sorun devam ederse XMP kaaptın ama güncelleme sonrası sorun kalmamalı.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffc0738ca0740, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffc0738ca0698, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2218

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 2226

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1810

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffffc0738ca0740

BUGCHECK_P3: fffffc0738ca0698

BUGCHECK_P4: 0

TRAP_FRAME:  fffffc0738ca0740 -- (.trap 0xfffffc0738ca0740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb6817d1dcd80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff94080d032158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80241a651f3 rsp=fffffc0738ca08d0 rbp=ffffb6817d1d5180
 r8=0000000000000000  r9=00000027e0bad18a r10=0000000000000002
r11=fffffc0738ca0968 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x5c3:
fffff802`41a651f3 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffffc0738ca0698 -- (.exr 0xfffffc0738ca0698)
ExceptionAddress: fffff80241a651f3 (nt!KiCommitThreadWait+0x00000000000005c3)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffffc07`38ca0418 fffff802`41c07b69     : 00000000`00000139 00000000`00000003 fffffc07`38ca0740 fffffc07`38ca0698 : nt!KeBugCheckEx
fffffc07`38ca0420 fffff802`41c07f90     : fffff802`3ccfc180 00000000`00000000 ffffb681`7d389180 ffff9408`0d5f9080 : nt!KiBugCheckDispatch+0x69
fffffc07`38ca0560 fffff802`41c06323     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffc07`38ca0740 fffff802`41a651f3     : ffff9408`00000005 00000000`00000000 fffffc07`38ca09e0 ffffb681`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffffc07`38ca08d0 fffff802`41a64623     : ffffb681`00000000 fffff802`00000000 000f8067`b4bbbd00 ffff9408`0d0ca1c0 : nt!KiCommitThreadWait+0x5c3
fffffc07`38ca0970 fffff802`41e2cb01     : ffff9408`0d4ac460 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
fffffc07`38ca0a60 fffff802`41e2cbaa     : ffff9408`0d0ca080 000000fb`f7ecf738 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
fffffc07`38ca0ac0 fffff802`41c075b8     : 00000256`4eafa020 fffffc07`38ca0b80 fffffc07`38ca0b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
fffffc07`38ca0b00 00007ffe`93c6cc94     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fb`f7ecf708 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`93c6cc94


SYMBOL_NAME:  nt!KiCommitThreadWait+5c3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5c3

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {369b7001-cfef-011b-6243-985c04f34d42}

Followup:     MachineOwner
---------

3: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2134]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 2202
BiosReleaseDate = 07/14/2020
SystemManufacturer = System manufacturer
SystemProductName = MODART-PC-MA1-V6
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = B450M-DRAGON
BaseBoardVersion = Rev X.0x
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80152aaf493, Address of the instruction which caused the bugcheck
Arg3: fffff88b41d2b520, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3749

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3795

    Key  : Analysis.Init.CPU.mSec
    Value: 499

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26685

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80152aaf493

BUGCHECK_P3: fffff88b41d2b520

BUGCHECK_P4: 0

CONTEXT:  fffff88b41d2b520 -- (.cxr 0xfffff88b41d2b520)
rax=0000000000000000 rbx=ffffc28907ade180 rcx=ffffc28900200200
rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffc28900200100
rip=fffff80152aaf493 rsp=fffff88b41d2bf28 rbp=00000000ff80ffa0
 r8=0000000000000000  r9=ffffc28907ade180 r10=0000000000000000
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000020 r15=0000000079737355
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlpHpSegDescriptorValidate+0x13:
fffff801`52aaf493 498b4010        mov     rax,qword ptr [r8+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT: 
fffff88b`41d2bf28 fffff801`52d8ed19     : 00000000`00000000 ffffb6fb`7b800000 ffffc2e5`03a566d0 00c00020`03883e78 : nt!RtlpHpSegDescriptorValidate+0x13
fffff88b`41d2bf30 fffff801`52d8ec47     : ffffc289`00200100 fffff88b`41d2cb80 ffffc289`07ade180 fffff88b`41d2cb80 : nt!RtlpHpSizeHeapInternal+0x89
fffff88b`41d2bf80 fffff801`52c2d33a     : ffffc289`00200100 00000000`11000000 fffff88b`41d2cb80 ffffc289`00000000 : nt!RtlpHpSizeHeap+0x5f
fffff88b`41d2bfb0 fffff801`531b1019     : 00000000`00000000 fffff88b`41d2c000 ffffc2e5`03bc57f0 01000000`00100000 : nt!ExFreeHeapPool+0x1e0baa
fffff88b`41d2c090 ffffc2e5`03bc5842     : ffffffff`ffffd8f0 ffffc289`05f1e8a0 00000000`00041cff ffff9b06`f40df080 : nt!ExFreePool+0x9
fffff88b`41d2c0c0 ffffc2e5`0388c3e7     : 00000000`00000000 ffffc289`07ade190 ffffc289`07ade190 ffffc289`05f1e8a0 : win32kfull!Win32FreePoolImpl+0x52
fffff88b`41d2c0f0 ffffc2e5`03b92c28     : 00000000`00000000 ffffc289`05f1e8a0 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
fffff88b`41d2c120 ffffc2e5`04046fcf     : fffff88b`41d2caa8 00000000`00000000 0000007f`00000001 fffff88b`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
fffff88b`41d2ca50 fffff801`52c075b8     : 0000007f`09aff560 00000000`00000108 00000000`00000040 0000007f`09afed60 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
fffff88b`41d2ca90 00007fff`c5efa104     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007f`09aff3e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`c5efa104


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.867

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xfffff88b41d2b520 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c9913766-80de-cdf5-a1a8-15c856d3f064}

Followup:     Pool_corruption
---------

3: kd> !error 00000000c0000005
Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff9f6c11796f16, Address of the instruction which caused the bugcheck
Arg3: fffff884ac89f9f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3483

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6822

    Key  : Analysis.Init.CPU.mSec
    Value: 608

    Key  : Analysis.Init.Elapsed.mSec
    Value: 24092

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff9f6c11796f16

BUGCHECK_P3: fffff884ac89f9f0

BUGCHECK_P4: 0

CONTEXT:  fffff884ac89f9f0 -- (.cxr 0xfffff884ac89f9f0)
rax=ffff9f16466bc1e0 rbx=ffff9f16466bc130 rcx=ffff9f16466bc130
rdx=ffff9f16466bc1e0 rsi=ffff9f1644a51010 rdi=ffff9f1644a511f0
rip=ffff9f6c11796f16 rsp=fffff884ac8a03f0 rbp=fffff884ac8a0b80
 r8=ffff9f16466bc1e0  r9=ffffb08d47604dc8 r10=ffffb08d4a29da50
r11=ffff9f16466bc130 r12=0000000000000001 r13=0000000000a200a0
r14=ffff9f1644a51330 r15=0000000000000001
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
win32kfull!xxxReadPostMessage+0x356:
ffff9f6c`11796f16 418b4d08        mov     ecx,dword ptr [r13+8] ds:002b:00000000`00a200a8=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT: 
fffff884`ac8a03f0 ffff9f6c`11795465     : ffff9f16`44a51010 fffff884`ac8a09d8 00000000`00000000 00000000`00000000 : win32kfull!xxxReadPostMessage+0x356
fffff884`ac8a04b0 ffff9f6c`11794f48     : fffff884`ac8a09d8 00000000`00000000 00000000`00000000 fffff884`ac8a0aa8 : win32kfull!xxxRealInternalGetMessage+0x4b5
fffff884`ac8a0980 ffff9f6c`123c71ad     : ffffb08d`47ef6080 00000093`09a1fa88 fffff884`ac8a0aa8 00000000`00000000 : win32kfull!NtUserPeekMessage+0x158
fffff884`ac8a0a40 fffff807`69e075b8     : 00000093`09a1fb80 00000000`00000108 00000000`00000040 00000093`09a1f380 : win32k!NtUserPeekMessage+0x29
fffff884`ac8a0a90 00007ffb`91901064     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000093`09a1fa68 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`91901064


SYMBOL_NAME:  win32kfull!xxxReadPostMessage+356

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.870

STACK_COMMAND:  .cxr 0xfffff884ac89f9f0 ; kb

BUCKET_ID_FUNC_OFFSET:  356

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!xxxReadPostMessage

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b95dabba-224b-46a9-b91c-9cc42dc654dd}

Followup:     MachineOwner
---------

RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffff9109648d3490, Address of resource
Arg2: ffff910952327080, Address of thread
Arg3: ffff910967e31ce0, Address of owner table if there is one
Arg4: 0000000000000002

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4092

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 27360

    Key  : Analysis.Init.CPU.mSec
    Value: 640

    Key  : Analysis.Init.Elapsed.mSec
    Value: 21801

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  e3

BUGCHECK_P1: ffff9109648d3490

BUGCHECK_P2: ffff910952327080

BUGCHECK_P3: ffff910967e31ce0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT: 
ffff858f`e8f3a898 fffff800`7b432e6f     : 00000000`000000e3 ffff9109`648d3490 ffff9109`52327080 ffff9109`67e31ce0 : nt!KeBugCheckEx
ffff858f`e8f3a8a0 fffff800`7b2631a9     : ffff9109`648d3490 ffffd28f`84c3f010 ffffd28f`8083c930 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x1d183f
ffff858f`e8f3a960 ffffd2d5`c70d9f64     : 00000000`00000000 00000000`00000000 ffffd28f`84c3f010 00000000`00000000 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9
ffff858f`e8f3a9c0 ffffd2d5`c6cb439d     : 00000000`00000001 00000000`00000401 00000000`00000000 00000000`00000000 : win32kbase!UserSessionSwitchLeaveCrit+0x74
ffff858f`e8f3aa30 ffffd2d5`c6a7723d     : ffff9109`52327080 ffff858f`e8f3ab80 00000000`00000000 ffff858f`e8f3ab80 : win32kfull!NtUserPostMessage+0x15d
ffff858f`e8f3aac0 fffff800`7b4075b8     : 000001c4`bea144b0 00000000`00000000 ffff858f`e8f3ab80 ffff9109`00000000 : win32k!NtUserPostMessage+0x15
ffff858f`e8f3ab00 00007ffe`3ee31224     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000049`af6ff188 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3ee31224


SYMBOL_NAME:  win32kbase!UserSessionSwitchLeaveCrit+74

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.1140

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  74

FAILURE_BUCKET_ID:  0xE3_win32kbase!UserSessionSwitchLeaveCrit

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f42413ee-5fb5-c6d3-b0eb-f79aa2def38b}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8187f93f83e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8187f93f8338, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3734

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12894

    Key  : Analysis.Init.CPU.mSec
    Value: 531

    Key  : Analysis.Init.Elapsed.mSec
    Value: 19486

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff8187f93f83e0

BUGCHECK_P3: ffff8187f93f8338

BUGCHECK_P4: 0

TRAP_FRAME:  ffff8187f93f83e0 -- (.trap 0xffff8187f93f83e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa90b9e317040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8027ba43edf rsp=ffff8187f93f8570 rbp=ffff8187f93f8639
 r8=0000000000000000  r9=0000000000000000 r10=ffffc38137f89180
r11=ffffa90b9d4efdd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
nt!KeWaitForMultipleObjects+0x43f:
fffff802`7ba43edf cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff8187f93f8338 -- (.exr 0xffff8187f93f8338)
ExceptionAddress: fffff8027ba43edf (nt!KeWaitForMultipleObjects+0x000000000000043f)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff8187`f93f80b8 fffff802`7bc07b69     : 00000000`00000139 00000000`00000003 ffff8187`f93f83e0 ffff8187`f93f8338 : nt!KeBugCheckEx
ffff8187`f93f80c0 fffff802`7bc07f90     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8187`f93f8200 fffff802`7bc06323     : ffffc381`37f89180 00000000`00000000 00000000`00000000 00000000`0000003f : nt!KiFastFailDispatch+0xd0
ffff8187`f93f83e0 fffff802`7ba43edf     : ffffa90b`a482e080 00000000`00000000 00000000`00040246 fffff802`7ba4a891 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8187`f93f8570 fffff55a`efa6d768     : fffff55a`efc23210 ffff8187`fab6b210 00000000`00000003 fffff523`006da900 : nt!KeWaitForMultipleObjects+0x43f
ffff8187`f93f8680 fffff55a`ef0dbbef     : 00000000`00000010 00000000`00000003 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x88
ffff8187`f93f87b0 fffff55a`ef9dd063     : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
ffff8187`f93f8970 fffff55a`ef0b3a30     : ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff8187`f93f8aa0 fffff55a`eee0474d     : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff8187`f93f8ad0 fffff802`7bc075b8     : ffffa90b`00000005 00000000`00000005 000001a9`74004140 00000000`00000348 : win32k!NtUserCallNoParam+0x15
ffff8187`f93f8b00 00007ff8`e6a810e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000035`4743fe48 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e6a810e4


SYMBOL_NAME:  win32kbase!LegacyInputDispatcher::WaitAndDispatch+88

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.1140

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  88

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_win32kbase!LegacyInputDispatcher::WaitAndDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ec713815-b628-d3b4-9812-1937faa1c4d7}

Followup:     MachineOwner
---------
Minidump ile ilgili pek bir şey bilmem ama bluescreenwiew programından minidump hatalarına baktığımda hepsinde aynı hatayı gördüm sizde gormussunuzdur. High CPU falan yaziyor kudu yazinca neden kaynaklanmis olabilir bu sorun.

Hocam size sorunun nelerden olabileceğini yazdım hepsini yapın önce sonra düzelmez ise diğer minidumpları da atarsın.
 
Öncelikle selamlar bilgisayarım bu hatayı alıyorum driverları DDU ile silip en son sürümü yükledim sys dosyalarını düzelttim ancak olmadı. Yardımcı olabilir misiniz? Bir de Memtest testi yaptım temiz çıktı. Bilginize.
Yardımcı olursanız sevinirim.
Hocam size sorunun nelerden olabileceğini yazdım hepsini yapın önce sonra düzelmez ise diğer minidumpları da atarsın.

Hocam eskiden 4 farklı konuda hata alıyordum şimdi sadece bir hata kodu alıyorum ona da bakarsan çok minnettar olurum.
 
BIOS sürümünü 3002 sürümüne güncelle.

BIOS üzerinden XMP özelliğini kapatabilir misin?

"DISM" rehberini uygula.
 
BIOS sürümünü 3002 sürümüne güncelle.

BIOS üzerinden XMP özelliğini kapatabilir misin?

"DISM" rehberini uygula.

XMP'yi kapatırsam RAM frekansım düser kapatmam gerekiyor mu?
 
Merhaba,

ilk ama ilk olarak BIOS güncellemesi yapın:


Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Sorun devam ederse XMP kaaptın ama güncelleme sonrası sorun kalmamalı.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffc0738ca0740, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffc0738ca0698, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2218

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 2226

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1810

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffffc0738ca0740

BUGCHECK_P3: fffffc0738ca0698

BUGCHECK_P4: 0

TRAP_FRAME:  fffffc0738ca0740 -- (.trap 0xfffffc0738ca0740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb6817d1dcd80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff94080d032158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80241a651f3 rsp=fffffc0738ca08d0 rbp=ffffb6817d1d5180
 r8=0000000000000000  r9=00000027e0bad18a r10=0000000000000002
r11=fffffc0738ca0968 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x5c3:
fffff802`41a651f3 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffffc0738ca0698 -- (.exr 0xfffffc0738ca0698)
ExceptionAddress: fffff80241a651f3 (nt!KiCommitThreadWait+0x00000000000005c3)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffffc07`38ca0418 fffff802`41c07b69     : 00000000`00000139 00000000`00000003 fffffc07`38ca0740 fffffc07`38ca0698 : nt!KeBugCheckEx
fffffc07`38ca0420 fffff802`41c07f90     : fffff802`3ccfc180 00000000`00000000 ffffb681`7d389180 ffff9408`0d5f9080 : nt!KiBugCheckDispatch+0x69
fffffc07`38ca0560 fffff802`41c06323     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffc07`38ca0740 fffff802`41a651f3     : ffff9408`00000005 00000000`00000000 fffffc07`38ca09e0 ffffb681`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffffc07`38ca08d0 fffff802`41a64623     : ffffb681`00000000 fffff802`00000000 000f8067`b4bbbd00 ffff9408`0d0ca1c0 : nt!KiCommitThreadWait+0x5c3
fffffc07`38ca0970 fffff802`41e2cb01     : ffff9408`0d4ac460 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
fffffc07`38ca0a60 fffff802`41e2cbaa     : ffff9408`0d0ca080 000000fb`f7ecf738 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
fffffc07`38ca0ac0 fffff802`41c075b8     : 00000256`4eafa020 fffffc07`38ca0b80 fffffc07`38ca0b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
fffffc07`38ca0b00 00007ffe`93c6cc94     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fb`f7ecf708 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`93c6cc94


SYMBOL_NAME:  nt!KiCommitThreadWait+5c3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5c3

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {369b7001-cfef-011b-6243-985c04f34d42}

Followup:     MachineOwner
---------

3: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2134]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 2202
BiosReleaseDate = 07/14/2020
SystemManufacturer = System manufacturer
SystemProductName = MODART-PC-MA1-V6
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = B450M-DRAGON
BaseBoardVersion = Rev X.0x
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80152aaf493, Address of the instruction which caused the bugcheck
Arg3: fffff88b41d2b520, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3749

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3795

    Key  : Analysis.Init.CPU.mSec
    Value: 499

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26685

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80152aaf493

BUGCHECK_P3: fffff88b41d2b520

BUGCHECK_P4: 0

CONTEXT:  fffff88b41d2b520 -- (.cxr 0xfffff88b41d2b520)
rax=0000000000000000 rbx=ffffc28907ade180 rcx=ffffc28900200200
rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffc28900200100
rip=fffff80152aaf493 rsp=fffff88b41d2bf28 rbp=00000000ff80ffa0
 r8=0000000000000000  r9=ffffc28907ade180 r10=0000000000000000
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000020 r15=0000000079737355
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlpHpSegDescriptorValidate+0x13:
fffff801`52aaf493 498b4010        mov     rax,qword ptr [r8+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT: 
fffff88b`41d2bf28 fffff801`52d8ed19     : 00000000`00000000 ffffb6fb`7b800000 ffffc2e5`03a566d0 00c00020`03883e78 : nt!RtlpHpSegDescriptorValidate+0x13
fffff88b`41d2bf30 fffff801`52d8ec47     : ffffc289`00200100 fffff88b`41d2cb80 ffffc289`07ade180 fffff88b`41d2cb80 : nt!RtlpHpSizeHeapInternal+0x89
fffff88b`41d2bf80 fffff801`52c2d33a     : ffffc289`00200100 00000000`11000000 fffff88b`41d2cb80 ffffc289`00000000 : nt!RtlpHpSizeHeap+0x5f
fffff88b`41d2bfb0 fffff801`531b1019     : 00000000`00000000 fffff88b`41d2c000 ffffc2e5`03bc57f0 01000000`00100000 : nt!ExFreeHeapPool+0x1e0baa
fffff88b`41d2c090 ffffc2e5`03bc5842     : ffffffff`ffffd8f0 ffffc289`05f1e8a0 00000000`00041cff ffff9b06`f40df080 : nt!ExFreePool+0x9
fffff88b`41d2c0c0 ffffc2e5`0388c3e7     : 00000000`00000000 ffffc289`07ade190 ffffc289`07ade190 ffffc289`05f1e8a0 : win32kfull!Win32FreePoolImpl+0x52
fffff88b`41d2c0f0 ffffc2e5`03b92c28     : 00000000`00000000 ffffc289`05f1e8a0 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
fffff88b`41d2c120 ffffc2e5`04046fcf     : fffff88b`41d2caa8 00000000`00000000 0000007f`00000001 fffff88b`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
fffff88b`41d2ca50 fffff801`52c075b8     : 0000007f`09aff560 00000000`00000108 00000000`00000040 0000007f`09afed60 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
fffff88b`41d2ca90 00007fff`c5efa104     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007f`09aff3e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`c5efa104


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.867

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xfffff88b41d2b520 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c9913766-80de-cdf5-a1a8-15c856d3f064}

Followup:     Pool_corruption
---------

3: kd> !error 00000000c0000005
Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff9f6c11796f16, Address of the instruction which caused the bugcheck
Arg3: fffff884ac89f9f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3483

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6822

    Key  : Analysis.Init.CPU.mSec
    Value: 608

    Key  : Analysis.Init.Elapsed.mSec
    Value: 24092

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff9f6c11796f16

BUGCHECK_P3: fffff884ac89f9f0

BUGCHECK_P4: 0

CONTEXT:  fffff884ac89f9f0 -- (.cxr 0xfffff884ac89f9f0)
rax=ffff9f16466bc1e0 rbx=ffff9f16466bc130 rcx=ffff9f16466bc130
rdx=ffff9f16466bc1e0 rsi=ffff9f1644a51010 rdi=ffff9f1644a511f0
rip=ffff9f6c11796f16 rsp=fffff884ac8a03f0 rbp=fffff884ac8a0b80
 r8=ffff9f16466bc1e0  r9=ffffb08d47604dc8 r10=ffffb08d4a29da50
r11=ffff9f16466bc130 r12=0000000000000001 r13=0000000000a200a0
r14=ffff9f1644a51330 r15=0000000000000001
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
win32kfull!xxxReadPostMessage+0x356:
ffff9f6c`11796f16 418b4d08        mov     ecx,dword ptr [r13+8] ds:002b:00000000`00a200a8=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT: 
fffff884`ac8a03f0 ffff9f6c`11795465     : ffff9f16`44a51010 fffff884`ac8a09d8 00000000`00000000 00000000`00000000 : win32kfull!xxxReadPostMessage+0x356
fffff884`ac8a04b0 ffff9f6c`11794f48     : fffff884`ac8a09d8 00000000`00000000 00000000`00000000 fffff884`ac8a0aa8 : win32kfull!xxxRealInternalGetMessage+0x4b5
fffff884`ac8a0980 ffff9f6c`123c71ad     : ffffb08d`47ef6080 00000093`09a1fa88 fffff884`ac8a0aa8 00000000`00000000 : win32kfull!NtUserPeekMessage+0x158
fffff884`ac8a0a40 fffff807`69e075b8     : 00000093`09a1fb80 00000000`00000108 00000000`00000040 00000093`09a1f380 : win32k!NtUserPeekMessage+0x29
fffff884`ac8a0a90 00007ffb`91901064     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000093`09a1fa68 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`91901064


SYMBOL_NAME:  win32kfull!xxxReadPostMessage+356

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.870

STACK_COMMAND:  .cxr 0xfffff884ac89f9f0 ; kb

BUCKET_ID_FUNC_OFFSET:  356

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!xxxReadPostMessage

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b95dabba-224b-46a9-b91c-9cc42dc654dd}

Followup:     MachineOwner
---------

RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffff9109648d3490, Address of resource
Arg2: ffff910952327080, Address of thread
Arg3: ffff910967e31ce0, Address of owner table if there is one
Arg4: 0000000000000002

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4092

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 27360

    Key  : Analysis.Init.CPU.mSec
    Value: 640

    Key  : Analysis.Init.Elapsed.mSec
    Value: 21801

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  e3

BUGCHECK_P1: ffff9109648d3490

BUGCHECK_P2: ffff910952327080

BUGCHECK_P3: ffff910967e31ce0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT: 
ffff858f`e8f3a898 fffff800`7b432e6f     : 00000000`000000e3 ffff9109`648d3490 ffff9109`52327080 ffff9109`67e31ce0 : nt!KeBugCheckEx
ffff858f`e8f3a8a0 fffff800`7b2631a9     : ffff9109`648d3490 ffffd28f`84c3f010 ffffd28f`8083c930 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x1d183f
ffff858f`e8f3a960 ffffd2d5`c70d9f64     : 00000000`00000000 00000000`00000000 ffffd28f`84c3f010 00000000`00000000 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9
ffff858f`e8f3a9c0 ffffd2d5`c6cb439d     : 00000000`00000001 00000000`00000401 00000000`00000000 00000000`00000000 : win32kbase!UserSessionSwitchLeaveCrit+0x74
ffff858f`e8f3aa30 ffffd2d5`c6a7723d     : ffff9109`52327080 ffff858f`e8f3ab80 00000000`00000000 ffff858f`e8f3ab80 : win32kfull!NtUserPostMessage+0x15d
ffff858f`e8f3aac0 fffff800`7b4075b8     : 000001c4`bea144b0 00000000`00000000 ffff858f`e8f3ab80 ffff9109`00000000 : win32k!NtUserPostMessage+0x15
ffff858f`e8f3ab00 00007ffe`3ee31224     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000049`af6ff188 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3ee31224


SYMBOL_NAME:  win32kbase!UserSessionSwitchLeaveCrit+74

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.1140

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  74

FAILURE_BUCKET_ID:  0xE3_win32kbase!UserSessionSwitchLeaveCrit

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f42413ee-5fb5-c6d3-b0eb-f79aa2def38b}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8187f93f83e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8187f93f8338, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3734

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12894

    Key  : Analysis.Init.CPU.mSec
    Value: 531

    Key  : Analysis.Init.Elapsed.mSec
    Value: 19486

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff8187f93f83e0

BUGCHECK_P3: ffff8187f93f8338

BUGCHECK_P4: 0

TRAP_FRAME:  ffff8187f93f83e0 -- (.trap 0xffff8187f93f83e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa90b9e317040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8027ba43edf rsp=ffff8187f93f8570 rbp=ffff8187f93f8639
 r8=0000000000000000  r9=0000000000000000 r10=ffffc38137f89180
r11=ffffa90b9d4efdd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
nt!KeWaitForMultipleObjects+0x43f:
fffff802`7ba43edf cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff8187f93f8338 -- (.exr 0xffff8187f93f8338)
ExceptionAddress: fffff8027ba43edf (nt!KeWaitForMultipleObjects+0x000000000000043f)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff8187`f93f80b8 fffff802`7bc07b69     : 00000000`00000139 00000000`00000003 ffff8187`f93f83e0 ffff8187`f93f8338 : nt!KeBugCheckEx
ffff8187`f93f80c0 fffff802`7bc07f90     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8187`f93f8200 fffff802`7bc06323     : ffffc381`37f89180 00000000`00000000 00000000`00000000 00000000`0000003f : nt!KiFastFailDispatch+0xd0
ffff8187`f93f83e0 fffff802`7ba43edf     : ffffa90b`a482e080 00000000`00000000 00000000`00040246 fffff802`7ba4a891 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8187`f93f8570 fffff55a`efa6d768     : fffff55a`efc23210 ffff8187`fab6b210 00000000`00000003 fffff523`006da900 : nt!KeWaitForMultipleObjects+0x43f
ffff8187`f93f8680 fffff55a`ef0dbbef     : 00000000`00000010 00000000`00000003 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x88
ffff8187`f93f87b0 fffff55a`ef9dd063     : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
ffff8187`f93f8970 fffff55a`ef0b3a30     : ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff8187`f93f8aa0 fffff55a`eee0474d     : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff8187`f93f8ad0 fffff802`7bc075b8     : ffffa90b`00000005 00000000`00000005 000001a9`74004140 00000000`00000348 : win32k!NtUserCallNoParam+0x15
ffff8187`f93f8b00 00007ff8`e6a810e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000035`4743fe48 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e6a810e4


SYMBOL_NAME:  win32kbase!LegacyInputDispatcher::WaitAndDispatch+88

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.1140

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  88

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_win32kbase!LegacyInputDispatcher::WaitAndDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ec713815-b628-d3b4-9812-1937faa1c4d7}

Followup:     MachineOwner
---------
 
Çözüm
Merhaba,

İlk ama ilk olarak BIOS güncellemesi yapın:


Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Sorun devam ederse XMP kaaptın ama güncelleme sonrası sorun kalmamalı.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffc0738ca0740, Address of the trap frame for the exception that caused the bugcheck.
Arg3: fffffc0738ca0698, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2218.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 2226.

Key : Analysis.Init.CPU.mSec
Value: 343.

Key : Analysis.Init.Elapsed.mSec
Value: 1810.

Key : Analysis.Memory.CommitPeak.Mb
Value: 71.

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: fffffc0738ca0740.

BUGCHECK_P3: fffffc0738ca0698.

BUGCHECK_P4: 0

TRAP_FRAME: fffffc0738ca0740 -- (.trap 0xfffffc0738ca0740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb6817d1dcd80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff94080d032158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80241a651f3 rsp=fffffc0738ca08d0 rbp=ffffb6817d1d5180
r8=0000000000000000 r9=00000027e0bad18a r10=0000000000000002
r11=fffffc0738ca0968 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy.
nt!KiCommitThreadWait+0x5c3:
fffff802`41a651f3 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: fffffc0738ca0698 -- (.exr 0xfffffc0738ca0698)
ExceptionAddress: fffff80241a651f3 (nt!KiCommitThreadWait+0x00000000000005c3)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: EpicGamesLauncher.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
fffffc07`38ca0418 fffff802`41c07b69 : 00000000`00000139 00000000`00000003 fffffc07`38ca0740 fffffc07`38ca0698 : nt!KeBugCheckEx
fffffc07`38ca0420 fffff802`41c07f90 : fffff802`3ccfc180 00000000`00000000 ffffb681`7d389180 ffff9408`0d5f9080 : nt!KiBugCheckDispatch+0x69
fffffc07`38ca0560 fffff802`41c06323 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffc07`38ca0740 fffff802`41a651f3 : ffff9408`00000005 00000000`00000000 fffffc07`38ca09e0 ffffb681`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffffc07`38ca08d0 fffff802`41a64623 : ffffb681`00000000 fffff802`00000000 000f8067`b4bbbd00 ffff9408`0d0ca1c0 : nt!KiCommitThreadWait+0x5c3
fffffc07`38ca0970 fffff802`41e2cb01 : ffff9408`0d4ac460 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
fffffc07`38ca0a60 fffff802`41e2cbaa : ffff9408`0d0ca080 000000fb`f7ecf738 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
fffffc07`38ca0ac0 fffff802`41c075b8 : 00000256`4eafa020 fffffc07`38ca0b80 fffffc07`38ca0b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
fffffc07`38ca0b00 00007ffe`93c6cc94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fb`f7ecf708 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`93c6cc94

SYMBOL_NAME: nt!KiCommitThreadWait+5c3

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.867

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 5c3.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {369b7001-cfef-011b-6243-985c04f34d42}

Followup: MachineOwner.
---------

3: kd> !sysinfo machineid.
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2134]
BiosMajorRelease = 5
BiosMinorRelease = 13.
BiosVendor = American Megatrends Inc.
BiosVersion = 2202.
BiosReleaseDate = 07/14/2020
SystemManufacturer = System manufacturer.
SystemProductName = MODART-PC-MA1-V6
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version.
SystemSKU = SKU.
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = B450M-DRAGON
BaseBoardVersion = Rev X.0x
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff80152aaf493, Address of the instruction which caused the bugcheck.
Arg3: fffff88b41d2b520, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3749.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 3795.

Key : Analysis.Init.CPU.mSec
Value: 499.

Key : Analysis.Init.Elapsed.mSec
Value: 26685.

Key : Analysis.Memory.CommitPeak.Mb
Value: 86.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80152aaf493.

BUGCHECK_P3: fffff88b41d2b520.

BUGCHECK_P4: 0

CONTEXT: fffff88b41d2b520 -- (.cxr 0xfffff88b41d2b520)
rax=0000000000000000 rbx=ffffc28907ade180 rcx=ffffc28900200200
rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffc28900200100
rip=fffff80152aaf493 rsp=fffff88b41d2bf28 rbp=00000000ff80ffa0
r8=0000000000000000 r9=ffffc28907ade180 r10=0000000000000000
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000020 r15=0000000079737355
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlpHpSegDescriptorValidate+0x13:
fffff801`52aaf493 498b4010 mov rax,qword ptr [r8+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: NVIDIA Share.exe

STACK_TEXT:
fffff88b`41d2bf28 fffff801`52d8ed19 : 00000000`00000000 ffffb6fb`7b800000 ffffc2e5`03a566d0 00c00020`03883e78 : nt!RtlpHpSegDescriptorValidate+0x13
fffff88b`41d2bf30 fffff801`52d8ec47 : ffffc289`00200100 fffff88b`41d2cb80 ffffc289`07ade180 fffff88b`41d2cb80 : nt!RtlpHpSizeHeapInternal+0x89
fffff88b`41d2bf80 fffff801`52c2d33a : ffffc289`00200100 00000000`11000000 fffff88b`41d2cb80 ffffc289`00000000 : nt!RtlpHpSizeHeap+0x5f
fffff88b`41d2bfb0 fffff801`531b1019 : 00000000`00000000 fffff88b`41d2c000 ffffc2e5`03bc57f0 01000000`00100000 : nt!ExFreeHeapPool+0x1e0baa
fffff88b`41d2c090 ffffc2e5`03bc5842 : ffffffff`ffffd8f0 ffffc289`05f1e8a0 00000000`00041cff ffff9b06`f40df080 : nt!ExFreePool+0x9
fffff88b`41d2c0c0 ffffc2e5`0388c3e7 : 00000000`00000000 ffffc289`07ade190 ffffc289`07ade190 ffffc289`05f1e8a0 : win32kfull!Win32FreePoolImpl+0x52
fffff88b`41d2c0f0 ffffc2e5`03b92c28 : 00000000`00000000 ffffc289`05f1e8a0 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
fffff88b`41d2c120 ffffc2e5`04046fcf : fffff88b`41d2caa8 00000000`00000000 0000007f`00000001 fffff88b`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
fffff88b`41d2ca50 fffff801`52c075b8 : 0000007f`09aff560 00000000`00000108 00000000`00000040 0000007f`09afed60 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
fffff88b`41d2ca90 00007fff`c5efa104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007f`09aff3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`c5efa104

SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption.

IMAGE_VERSION: 10.0.19041.867

MODULE_NAME: Pool_Corruption.

STACK_COMMAND: .cxr 0xfffff88b41d2b520 ; kb.

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}

Followup: Pool_corruption.
---------

3: kd> !error 00000000c0000005.
Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: ffff9f6c11796f16, Address of the instruction which caused the bugcheck.
Arg3: fffff884ac89f9f0, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3483.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 6822.

Key : Analysis.Init.CPU.mSec
Value: 608.

Key : Analysis.Init.Elapsed.mSec
Value: 24092.

Key : Analysis.Memory.CommitPeak.Mb
Value: 81.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: ffff9f6c11796f16.

BUGCHECK_P3: fffff884ac89f9f0.

BUGCHECK_P4: 0

CONTEXT: fffff884ac89f9f0 -- (.cxr 0xfffff884ac89f9f0)
rax=ffff9f16466bc1e0 rbx=ffff9f16466bc130 rcx=ffff9f16466bc130
rdx=ffff9f16466bc1e0 rsi=ffff9f1644a51010 rdi=ffff9f1644a511f0
rip=ffff9f6c11796f16 rsp=fffff884ac8a03f0 rbp=fffff884ac8a0b80
r8=ffff9f16466bc1e0 r9=ffffb08d47604dc8 r10=ffffb08d4a29da50
r11=ffff9f16466bc130 r12=0000000000000001 r13=0000000000a200a0
r14=ffff9f1644a51330 r15=0000000000000001
iopl=0 nv up ei ng nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
win32kfull!xxxReadPostMessage+0x356:
ffff9f6c`11796f16 418b4d08 mov ecx,dword ptr [r13+8] ds:002b:00000000`00a200a8=????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: NVIDIA Share.exe

STACK_TEXT:
fffff884`ac8a03f0 ffff9f6c`11795465 : ffff9f16`44a51010 fffff884`ac8a09d8 00000000`00000000 00000000`00000000 : win32kfull!xxxReadPostMessage+0x356
fffff884`ac8a04b0 ffff9f6c`11794f48 : fffff884`ac8a09d8 00000000`00000000 00000000`00000000 fffff884`ac8a0aa8 : win32kfull!xxxRealInternalGetMessage+0x4b5
fffff884`ac8a0980 ffff9f6c`123c71ad : ffffb08d`47ef6080 00000093`09a1fa88 fffff884`ac8a0aa8 00000000`00000000 : win32kfull!NtUserPeekMessage+0x158
fffff884`ac8a0a40 fffff807`69e075b8 : 00000093`09a1fb80 00000000`00000108 00000000`00000040 00000093`09a1f380 : win32k!NtUserPeekMessage+0x29
fffff884`ac8a0a90 00007ffb`91901064 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000093`09a1fa68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`91901064

SYMBOL_NAME: win32kfull!xxxReadPostMessage+356

MODULE_NAME: win32kfull.

IMAGE_NAME: win32kfull.sys

IMAGE_VERSION: 10.0.19041.870

STACK_COMMAND: .cxr 0xfffff884ac89f9f0 ; kb.

BUCKET_ID_FUNC_OFFSET: 356.

FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!xxxReadPostMessage

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b95dabba-224b-46a9-b91c-9cc42dc654dd}

Followup: MachineOwner.
---------

RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffff9109648d3490, Address of resource.
Arg2: ffff910952327080, Address of thread.
Arg3: ffff910967e31ce0, Address of owner table if there is one.
Arg4: 0000000000000002.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4092.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 27360.

Key : Analysis.Init.CPU.mSec
Value: 640.

Key : Analysis.Init.Elapsed.mSec
Value: 21801.

Key : Analysis.Memory.CommitPeak.Mb
Value: 87.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: e3.

BUGCHECK_P1: ffff9109648d3490.

BUGCHECK_P2: ffff910952327080.

BUGCHECK_P3: ffff910967e31ce0.

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: NVIDIA Share.exe

STACK_TEXT:
ffff858f`e8f3a898 fffff800`7b432e6f : 00000000`000000e3 ffff9109`648d3490 ffff9109`52327080 ffff9109`67e31ce0 : nt!KeBugCheckEx
ffff858f`e8f3a8a0 fffff800`7b2631a9 : ffff9109`648d3490 ffffd28f`84c3f010 ffffd28f`8083c930 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x1d183f
ffff858f`e8f3a960 ffffd2d5`c70d9f64 : 00000000`00000000 00000000`00000000 ffffd28f`84c3f010 00000000`00000000 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9
ffff858f`e8f3a9c0 ffffd2d5`c6cb439d : 00000000`00000001 00000000`00000401 00000000`00000000 00000000`00000000 : win32kbase!UserSessionSwitchLeaveCrit+0x74
ffff858f`e8f3aa30 ffffd2d5`c6a7723d : ffff9109`52327080 ffff858f`e8f3ab80 00000000`00000000 ffff858f`e8f3ab80 : win32kfull!NtUserPostMessage+0x15d
ffff858f`e8f3aac0 fffff800`7b4075b8 : 000001c4`bea144b0 00000000`00000000 ffff858f`e8f3ab80 ffff9109`00000000 : win32k!NtUserPostMessage+0x15
ffff858f`e8f3ab00 00007ffe`3ee31224 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000049`af6ff188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3ee31224

SYMBOL_NAME: win32kbase!UserSessionSwitchLeaveCrit+74

MODULE_NAME: win32kbase.

IMAGE_NAME: win32kbase.sys

IMAGE_VERSION: 10.0.19041.1140

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 74.

FAILURE_BUCKET_ID: 0xE3_win32kbase!UserSessionSwitchLeaveCrit

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {f42413ee-5fb5-c6d3-b0eb-f79aa2def38b}

Followup: MachineOwner.
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8187f93f83e0, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffff8187f93f8338, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3734.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 12894.

Key : Analysis.Init.CPU.mSec
Value: 531.

Key : Analysis.Init.Elapsed.mSec
Value: 19486.

Key : Analysis.Memory.CommitPeak.Mb
Value: 86.

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffff8187f93f83e0.

BUGCHECK_P3: ffff8187f93f8338.

BUGCHECK_P4: 0

TRAP_FRAME: ffff8187f93f83e0 -- (.trap 0xffff8187f93f83e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa90b9e317040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8027ba43edf rsp=ffff8187f93f8570 rbp=ffff8187f93f8639
r8=0000000000000000 r9=0000000000000000 r10=ffffc38137f89180
r11=ffffa90b9d4efdd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc.
nt!KeWaitForMultipleObjects+0x43f:
fffff802`7ba43edf cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffff8187f93f8338 -- (.exr 0xffff8187f93f8338)
ExceptionAddress: fffff8027ba43edf (nt!KeWaitForMultipleObjects+0x000000000000043f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: csrss.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffff8187`f93f80b8 fffff802`7bc07b69 : 00000000`00000139 00000000`00000003 ffff8187`f93f83e0 ffff8187`f93f8338 : nt!KeBugCheckEx
ffff8187`f93f80c0 fffff802`7bc07f90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8187`f93f8200 fffff802`7bc06323 : ffffc381`37f89180 00000000`00000000 00000000`00000000 00000000`0000003f : nt!KiFastFailDispatch+0xd0
ffff8187`f93f83e0 fffff802`7ba43edf : ffffa90b`a482e080 00000000`00000000 00000000`00040246 fffff802`7ba4a891 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8187`f93f8570 fffff55a`efa6d768 : fffff55a`efc23210 ffff8187`fab6b210 00000000`00000003 fffff523`006da900 : nt!KeWaitForMultipleObjects+0x43f
ffff8187`f93f8680 fffff55a`ef0dbbef : 00000000`00000010 00000000`00000003 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x88
ffff8187`f93f87b0 fffff55a`ef9dd063 : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
ffff8187`f93f8970 fffff55a`ef0b3a30 : ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff8187`f93f8aa0 fffff55a`eee0474d : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff8187`f93f8ad0 fffff802`7bc075b8 : ffffa90b`00000005 00000000`00000005 000001a9`74004140 00000000`00000348 : win32k!NtUserCallNoParam+0x15
ffff8187`f93f8b00 00007ff8`e6a810e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000035`4743fe48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e6a810e4

SYMBOL_NAME: win32kbase!LegacyInputDispatcher::WaitAndDispatch+88

MODULE_NAME: win32kbase.

IMAGE_NAME: win32kbase.sys

IMAGE_VERSION: 10.0.19041.1140

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 88.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_win32kbase!LegacyInputDispatcher::WaitAndDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {ec713815-b628-d3b4-9812-1937faa1c4d7}

Followup: MachineOwner.
---------

Çok teşekkür ederim hocam bilgisiyarımda hiçbir sıkıntı kalmadı Allah razı olsun.
 

Yeni konular

Geri
Yukarı