KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffc0738ca0740, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffc0738ca0698, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2218
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2226
Key : Analysis.Init.CPU.mSec
Value: 343
Key : Analysis.Init.Elapsed.mSec
Value: 1810
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffffc0738ca0740
BUGCHECK_P3: fffffc0738ca0698
BUGCHECK_P4: 0
TRAP_FRAME: fffffc0738ca0740 -- (.trap 0xfffffc0738ca0740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb6817d1dcd80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff94080d032158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80241a651f3 rsp=fffffc0738ca08d0 rbp=ffffb6817d1d5180
r8=0000000000000000 r9=00000027e0bad18a r10=0000000000000002
r11=fffffc0738ca0968 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x5c3:
fffff802`41a651f3 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffc0738ca0698 -- (.exr 0xfffffc0738ca0698)
ExceptionAddress: fffff80241a651f3 (nt!KiCommitThreadWait+0x00000000000005c3)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffc07`38ca0418 fffff802`41c07b69 : 00000000`00000139 00000000`00000003 fffffc07`38ca0740 fffffc07`38ca0698 : nt!KeBugCheckEx
fffffc07`38ca0420 fffff802`41c07f90 : fffff802`3ccfc180 00000000`00000000 ffffb681`7d389180 ffff9408`0d5f9080 : nt!KiBugCheckDispatch+0x69
fffffc07`38ca0560 fffff802`41c06323 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffc07`38ca0740 fffff802`41a651f3 : ffff9408`00000005 00000000`00000000 fffffc07`38ca09e0 ffffb681`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffffc07`38ca08d0 fffff802`41a64623 : ffffb681`00000000 fffff802`00000000 000f8067`b4bbbd00 ffff9408`0d0ca1c0 : nt!KiCommitThreadWait+0x5c3
fffffc07`38ca0970 fffff802`41e2cb01 : ffff9408`0d4ac460 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
fffffc07`38ca0a60 fffff802`41e2cbaa : ffff9408`0d0ca080 000000fb`f7ecf738 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
fffffc07`38ca0ac0 fffff802`41c075b8 : 00000256`4eafa020 fffffc07`38ca0b80 fffffc07`38ca0b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
fffffc07`38ca0b00 00007ffe`93c6cc94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fb`f7ecf708 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`93c6cc94
SYMBOL_NAME: nt!KiCommitThreadWait+5c3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.867
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5c3
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {369b7001-cfef-011b-6243-985c04f34d42}
Followup: MachineOwner
---------
3: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2134]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 2202
BiosReleaseDate = 07/14/2020
SystemManufacturer = System manufacturer
SystemProductName = MODART-PC-MA1-V6
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = B450M-DRAGON
BaseBoardVersion = Rev X.0x
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80152aaf493, Address of the instruction which caused the bugcheck
Arg3: fffff88b41d2b520, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3749
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3795
Key : Analysis.Init.CPU.mSec
Value: 499
Key : Analysis.Init.Elapsed.mSec
Value: 26685
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80152aaf493
BUGCHECK_P3: fffff88b41d2b520
BUGCHECK_P4: 0
CONTEXT: fffff88b41d2b520 -- (.cxr 0xfffff88b41d2b520)
rax=0000000000000000 rbx=ffffc28907ade180 rcx=ffffc28900200200
rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffc28900200100
rip=fffff80152aaf493 rsp=fffff88b41d2bf28 rbp=00000000ff80ffa0
r8=0000000000000000 r9=ffffc28907ade180 r10=0000000000000000
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000020 r15=0000000079737355
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlpHpSegDescriptorValidate+0x13:
fffff801`52aaf493 498b4010 mov rax,qword ptr [r8+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
STACK_TEXT:
fffff88b`41d2bf28 fffff801`52d8ed19 : 00000000`00000000 ffffb6fb`7b800000 ffffc2e5`03a566d0 00c00020`03883e78 : nt!RtlpHpSegDescriptorValidate+0x13
fffff88b`41d2bf30 fffff801`52d8ec47 : ffffc289`00200100 fffff88b`41d2cb80 ffffc289`07ade180 fffff88b`41d2cb80 : nt!RtlpHpSizeHeapInternal+0x89
fffff88b`41d2bf80 fffff801`52c2d33a : ffffc289`00200100 00000000`11000000 fffff88b`41d2cb80 ffffc289`00000000 : nt!RtlpHpSizeHeap+0x5f
fffff88b`41d2bfb0 fffff801`531b1019 : 00000000`00000000 fffff88b`41d2c000 ffffc2e5`03bc57f0 01000000`00100000 : nt!ExFreeHeapPool+0x1e0baa
fffff88b`41d2c090 ffffc2e5`03bc5842 : ffffffff`ffffd8f0 ffffc289`05f1e8a0 00000000`00041cff ffff9b06`f40df080 : nt!ExFreePool+0x9
fffff88b`41d2c0c0 ffffc2e5`0388c3e7 : 00000000`00000000 ffffc289`07ade190 ffffc289`07ade190 ffffc289`05f1e8a0 : win32kfull!Win32FreePoolImpl+0x52
fffff88b`41d2c0f0 ffffc2e5`03b92c28 : 00000000`00000000 ffffc289`05f1e8a0 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
fffff88b`41d2c120 ffffc2e5`04046fcf : fffff88b`41d2caa8 00000000`00000000 0000007f`00000001 fffff88b`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
fffff88b`41d2ca50 fffff801`52c075b8 : 0000007f`09aff560 00000000`00000108 00000000`00000040 0000007f`09afed60 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
fffff88b`41d2ca90 00007fff`c5efa104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007f`09aff3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`c5efa104
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.867
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff88b41d2b520 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
3: kd> !error 00000000c0000005
Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff9f6c11796f16, Address of the instruction which caused the bugcheck
Arg3: fffff884ac89f9f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3483
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6822
Key : Analysis.Init.CPU.mSec
Value: 608
Key : Analysis.Init.Elapsed.mSec
Value: 24092
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff9f6c11796f16
BUGCHECK_P3: fffff884ac89f9f0
BUGCHECK_P4: 0
CONTEXT: fffff884ac89f9f0 -- (.cxr 0xfffff884ac89f9f0)
rax=ffff9f16466bc1e0 rbx=ffff9f16466bc130 rcx=ffff9f16466bc130
rdx=ffff9f16466bc1e0 rsi=ffff9f1644a51010 rdi=ffff9f1644a511f0
rip=ffff9f6c11796f16 rsp=fffff884ac8a03f0 rbp=fffff884ac8a0b80
r8=ffff9f16466bc1e0 r9=ffffb08d47604dc8 r10=ffffb08d4a29da50
r11=ffff9f16466bc130 r12=0000000000000001 r13=0000000000a200a0
r14=ffff9f1644a51330 r15=0000000000000001
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
win32kfull!xxxReadPostMessage+0x356:
ffff9f6c`11796f16 418b4d08 mov ecx,dword ptr [r13+8] ds:002b:00000000`00a200a8=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
STACK_TEXT:
fffff884`ac8a03f0 ffff9f6c`11795465 : ffff9f16`44a51010 fffff884`ac8a09d8 00000000`00000000 00000000`00000000 : win32kfull!xxxReadPostMessage+0x356
fffff884`ac8a04b0 ffff9f6c`11794f48 : fffff884`ac8a09d8 00000000`00000000 00000000`00000000 fffff884`ac8a0aa8 : win32kfull!xxxRealInternalGetMessage+0x4b5
fffff884`ac8a0980 ffff9f6c`123c71ad : ffffb08d`47ef6080 00000093`09a1fa88 fffff884`ac8a0aa8 00000000`00000000 : win32kfull!NtUserPeekMessage+0x158
fffff884`ac8a0a40 fffff807`69e075b8 : 00000093`09a1fb80 00000000`00000108 00000000`00000040 00000093`09a1f380 : win32k!NtUserPeekMessage+0x29
fffff884`ac8a0a90 00007ffb`91901064 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000093`09a1fa68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`91901064
SYMBOL_NAME: win32kfull!xxxReadPostMessage+356
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.870
STACK_COMMAND: .cxr 0xfffff884ac89f9f0 ; kb
BUCKET_ID_FUNC_OFFSET: 356
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!xxxReadPostMessage
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b95dabba-224b-46a9-b91c-9cc42dc654dd}
Followup: MachineOwner
---------
RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffff9109648d3490, Address of resource
Arg2: ffff910952327080, Address of thread
Arg3: ffff910967e31ce0, Address of owner table if there is one
Arg4: 0000000000000002
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4092
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 27360
Key : Analysis.Init.CPU.mSec
Value: 640
Key : Analysis.Init.Elapsed.mSec
Value: 21801
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: e3
BUGCHECK_P1: ffff9109648d3490
BUGCHECK_P2: ffff910952327080
BUGCHECK_P3: ffff910967e31ce0
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
STACK_TEXT:
ffff858f`e8f3a898 fffff800`7b432e6f : 00000000`000000e3 ffff9109`648d3490 ffff9109`52327080 ffff9109`67e31ce0 : nt!KeBugCheckEx
ffff858f`e8f3a8a0 fffff800`7b2631a9 : ffff9109`648d3490 ffffd28f`84c3f010 ffffd28f`8083c930 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x1d183f
ffff858f`e8f3a960 ffffd2d5`c70d9f64 : 00000000`00000000 00000000`00000000 ffffd28f`84c3f010 00000000`00000000 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9
ffff858f`e8f3a9c0 ffffd2d5`c6cb439d : 00000000`00000001 00000000`00000401 00000000`00000000 00000000`00000000 : win32kbase!UserSessionSwitchLeaveCrit+0x74
ffff858f`e8f3aa30 ffffd2d5`c6a7723d : ffff9109`52327080 ffff858f`e8f3ab80 00000000`00000000 ffff858f`e8f3ab80 : win32kfull!NtUserPostMessage+0x15d
ffff858f`e8f3aac0 fffff800`7b4075b8 : 000001c4`bea144b0 00000000`00000000 ffff858f`e8f3ab80 ffff9109`00000000 : win32k!NtUserPostMessage+0x15
ffff858f`e8f3ab00 00007ffe`3ee31224 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000049`af6ff188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3ee31224
SYMBOL_NAME: win32kbase!UserSessionSwitchLeaveCrit+74
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.1140
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 74
FAILURE_BUCKET_ID: 0xE3_win32kbase!UserSessionSwitchLeaveCrit
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f42413ee-5fb5-c6d3-b0eb-f79aa2def38b}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8187f93f83e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8187f93f8338, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3734
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12894
Key : Analysis.Init.CPU.mSec
Value: 531
Key : Analysis.Init.Elapsed.mSec
Value: 19486
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff8187f93f83e0
BUGCHECK_P3: ffff8187f93f8338
BUGCHECK_P4: 0
TRAP_FRAME: ffff8187f93f83e0 -- (.trap 0xffff8187f93f83e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa90b9e317040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8027ba43edf rsp=ffff8187f93f8570 rbp=ffff8187f93f8639
r8=0000000000000000 r9=0000000000000000 r10=ffffc38137f89180
r11=ffffa90b9d4efdd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!KeWaitForMultipleObjects+0x43f:
fffff802`7ba43edf cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff8187f93f8338 -- (.exr 0xffff8187f93f8338)
ExceptionAddress: fffff8027ba43edf (nt!KeWaitForMultipleObjects+0x000000000000043f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff8187`f93f80b8 fffff802`7bc07b69 : 00000000`00000139 00000000`00000003 ffff8187`f93f83e0 ffff8187`f93f8338 : nt!KeBugCheckEx
ffff8187`f93f80c0 fffff802`7bc07f90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8187`f93f8200 fffff802`7bc06323 : ffffc381`37f89180 00000000`00000000 00000000`00000000 00000000`0000003f : nt!KiFastFailDispatch+0xd0
ffff8187`f93f83e0 fffff802`7ba43edf : ffffa90b`a482e080 00000000`00000000 00000000`00040246 fffff802`7ba4a891 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8187`f93f8570 fffff55a`efa6d768 : fffff55a`efc23210 ffff8187`fab6b210 00000000`00000003 fffff523`006da900 : nt!KeWaitForMultipleObjects+0x43f
ffff8187`f93f8680 fffff55a`ef0dbbef : 00000000`00000010 00000000`00000003 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x88
ffff8187`f93f87b0 fffff55a`ef9dd063 : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
ffff8187`f93f8970 fffff55a`ef0b3a30 : ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff8187`f93f8aa0 fffff55a`eee0474d : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff8187`f93f8ad0 fffff802`7bc075b8 : ffffa90b`00000005 00000000`00000005 000001a9`74004140 00000000`00000348 : win32k!NtUserCallNoParam+0x15
ffff8187`f93f8b00 00007ff8`e6a810e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000035`4743fe48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e6a810e4
SYMBOL_NAME: win32kbase!LegacyInputDispatcher::WaitAndDispatch+88
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.1140
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 88
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_win32kbase!LegacyInputDispatcher::WaitAndDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ec713815-b628-d3b4-9812-1937faa1c4d7}
Followup: MachineOwner
---------
Minidump ile ilgili pek bir şey bilmem ama bluescreenwiew programından minidump hatalarına baktığımda hepsinde aynı hatayı gördüm sizde gormussunuzdur. High CPU falan yaziyor kudu yazinca neden kaynaklanmis olabilir bu sorun.
Hocam size sorunun nelerden olabileceğini yazdım hepsini yapın önce sonra düzelmez ise diğer minidumpları da atarsın.
BIOS sürümünü 3002 sürümüne güncelle.
B450M-DRAGON - Destek
www.asus.com
BIOS üzerinden XMP özelliğini kapatabilir misin?
"DISM" rehberini uygula.
Rehber: DISM aracı nedir ve nasıl kullanılır?
Herkese iyi günler. Bu rehberde sizlere DISM komutunun ne işe yaradığını, ne tarz durumlarda kullanılacağını ve nasıl kullanılacağını göstereceğim. İlk önce DISM nedir onu öğrenelim. DISM aracı yani “Deployment Image Servicing and Management” aracı sistemde tıpkı SFC komutunun yaptığı işlev...www.technopat.net
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffc0738ca0740, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffc0738ca0698, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2218
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2226
Key : Analysis.Init.CPU.mSec
Value: 343
Key : Analysis.Init.Elapsed.mSec
Value: 1810
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffffc0738ca0740
BUGCHECK_P3: fffffc0738ca0698
BUGCHECK_P4: 0
TRAP_FRAME: fffffc0738ca0740 -- (.trap 0xfffffc0738ca0740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb6817d1dcd80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff94080d032158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80241a651f3 rsp=fffffc0738ca08d0 rbp=ffffb6817d1d5180
r8=0000000000000000 r9=00000027e0bad18a r10=0000000000000002
r11=fffffc0738ca0968 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x5c3:
fffff802`41a651f3 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffc0738ca0698 -- (.exr 0xfffffc0738ca0698)
ExceptionAddress: fffff80241a651f3 (nt!KiCommitThreadWait+0x00000000000005c3)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffc07`38ca0418 fffff802`41c07b69 : 00000000`00000139 00000000`00000003 fffffc07`38ca0740 fffffc07`38ca0698 : nt!KeBugCheckEx
fffffc07`38ca0420 fffff802`41c07f90 : fffff802`3ccfc180 00000000`00000000 ffffb681`7d389180 ffff9408`0d5f9080 : nt!KiBugCheckDispatch+0x69
fffffc07`38ca0560 fffff802`41c06323 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffc07`38ca0740 fffff802`41a651f3 : ffff9408`00000005 00000000`00000000 fffffc07`38ca09e0 ffffb681`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffffc07`38ca08d0 fffff802`41a64623 : ffffb681`00000000 fffff802`00000000 000f8067`b4bbbd00 ffff9408`0d0ca1c0 : nt!KiCommitThreadWait+0x5c3
fffffc07`38ca0970 fffff802`41e2cb01 : ffff9408`0d4ac460 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
fffffc07`38ca0a60 fffff802`41e2cbaa : ffff9408`0d0ca080 000000fb`f7ecf738 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
fffffc07`38ca0ac0 fffff802`41c075b8 : 00000256`4eafa020 fffffc07`38ca0b80 fffffc07`38ca0b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
fffffc07`38ca0b00 00007ffe`93c6cc94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fb`f7ecf708 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`93c6cc94
SYMBOL_NAME: nt!KiCommitThreadWait+5c3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.867
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5c3
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {369b7001-cfef-011b-6243-985c04f34d42}
Followup: MachineOwner
---------
3: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2134]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 2202
BiosReleaseDate = 07/14/2020
SystemManufacturer = System manufacturer
SystemProductName = MODART-PC-MA1-V6
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = B450M-DRAGON
BaseBoardVersion = Rev X.0x
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80152aaf493, Address of the instruction which caused the bugcheck
Arg3: fffff88b41d2b520, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3749
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3795
Key : Analysis.Init.CPU.mSec
Value: 499
Key : Analysis.Init.Elapsed.mSec
Value: 26685
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80152aaf493
BUGCHECK_P3: fffff88b41d2b520
BUGCHECK_P4: 0
CONTEXT: fffff88b41d2b520 -- (.cxr 0xfffff88b41d2b520)
rax=0000000000000000 rbx=ffffc28907ade180 rcx=ffffc28900200200
rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffc28900200100
rip=fffff80152aaf493 rsp=fffff88b41d2bf28 rbp=00000000ff80ffa0
r8=0000000000000000 r9=ffffc28907ade180 r10=0000000000000000
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000020 r15=0000000079737355
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlpHpSegDescriptorValidate+0x13:
fffff801`52aaf493 498b4010 mov rax,qword ptr [r8+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
STACK_TEXT:
fffff88b`41d2bf28 fffff801`52d8ed19 : 00000000`00000000 ffffb6fb`7b800000 ffffc2e5`03a566d0 00c00020`03883e78 : nt!RtlpHpSegDescriptorValidate+0x13
fffff88b`41d2bf30 fffff801`52d8ec47 : ffffc289`00200100 fffff88b`41d2cb80 ffffc289`07ade180 fffff88b`41d2cb80 : nt!RtlpHpSizeHeapInternal+0x89
fffff88b`41d2bf80 fffff801`52c2d33a : ffffc289`00200100 00000000`11000000 fffff88b`41d2cb80 ffffc289`00000000 : nt!RtlpHpSizeHeap+0x5f
fffff88b`41d2bfb0 fffff801`531b1019 : 00000000`00000000 fffff88b`41d2c000 ffffc2e5`03bc57f0 01000000`00100000 : nt!ExFreeHeapPool+0x1e0baa
fffff88b`41d2c090 ffffc2e5`03bc5842 : ffffffff`ffffd8f0 ffffc289`05f1e8a0 00000000`00041cff ffff9b06`f40df080 : nt!ExFreePool+0x9
fffff88b`41d2c0c0 ffffc2e5`0388c3e7 : 00000000`00000000 ffffc289`07ade190 ffffc289`07ade190 ffffc289`05f1e8a0 : win32kfull!Win32FreePoolImpl+0x52
fffff88b`41d2c0f0 ffffc2e5`03b92c28 : 00000000`00000000 ffffc289`05f1e8a0 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
fffff88b`41d2c120 ffffc2e5`04046fcf : fffff88b`41d2caa8 00000000`00000000 0000007f`00000001 fffff88b`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
fffff88b`41d2ca50 fffff801`52c075b8 : 0000007f`09aff560 00000000`00000108 00000000`00000040 0000007f`09afed60 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
fffff88b`41d2ca90 00007fff`c5efa104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007f`09aff3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`c5efa104
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.867
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff88b41d2b520 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
3: kd> !error 00000000c0000005
Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff9f6c11796f16, Address of the instruction which caused the bugcheck
Arg3: fffff884ac89f9f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3483
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6822
Key : Analysis.Init.CPU.mSec
Value: 608
Key : Analysis.Init.Elapsed.mSec
Value: 24092
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff9f6c11796f16
BUGCHECK_P3: fffff884ac89f9f0
BUGCHECK_P4: 0
CONTEXT: fffff884ac89f9f0 -- (.cxr 0xfffff884ac89f9f0)
rax=ffff9f16466bc1e0 rbx=ffff9f16466bc130 rcx=ffff9f16466bc130
rdx=ffff9f16466bc1e0 rsi=ffff9f1644a51010 rdi=ffff9f1644a511f0
rip=ffff9f6c11796f16 rsp=fffff884ac8a03f0 rbp=fffff884ac8a0b80
r8=ffff9f16466bc1e0 r9=ffffb08d47604dc8 r10=ffffb08d4a29da50
r11=ffff9f16466bc130 r12=0000000000000001 r13=0000000000a200a0
r14=ffff9f1644a51330 r15=0000000000000001
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
win32kfull!xxxReadPostMessage+0x356:
ffff9f6c`11796f16 418b4d08 mov ecx,dword ptr [r13+8] ds:002b:00000000`00a200a8=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
STACK_TEXT:
fffff884`ac8a03f0 ffff9f6c`11795465 : ffff9f16`44a51010 fffff884`ac8a09d8 00000000`00000000 00000000`00000000 : win32kfull!xxxReadPostMessage+0x356
fffff884`ac8a04b0 ffff9f6c`11794f48 : fffff884`ac8a09d8 00000000`00000000 00000000`00000000 fffff884`ac8a0aa8 : win32kfull!xxxRealInternalGetMessage+0x4b5
fffff884`ac8a0980 ffff9f6c`123c71ad : ffffb08d`47ef6080 00000093`09a1fa88 fffff884`ac8a0aa8 00000000`00000000 : win32kfull!NtUserPeekMessage+0x158
fffff884`ac8a0a40 fffff807`69e075b8 : 00000093`09a1fb80 00000000`00000108 00000000`00000040 00000093`09a1f380 : win32k!NtUserPeekMessage+0x29
fffff884`ac8a0a90 00007ffb`91901064 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000093`09a1fa68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`91901064
SYMBOL_NAME: win32kfull!xxxReadPostMessage+356
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.870
STACK_COMMAND: .cxr 0xfffff884ac89f9f0 ; kb
BUCKET_ID_FUNC_OFFSET: 356
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!xxxReadPostMessage
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b95dabba-224b-46a9-b91c-9cc42dc654dd}
Followup: MachineOwner
---------
RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffff9109648d3490, Address of resource
Arg2: ffff910952327080, Address of thread
Arg3: ffff910967e31ce0, Address of owner table if there is one
Arg4: 0000000000000002
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4092
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 27360
Key : Analysis.Init.CPU.mSec
Value: 640
Key : Analysis.Init.Elapsed.mSec
Value: 21801
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: e3
BUGCHECK_P1: ffff9109648d3490
BUGCHECK_P2: ffff910952327080
BUGCHECK_P3: ffff910967e31ce0
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
STACK_TEXT:
ffff858f`e8f3a898 fffff800`7b432e6f : 00000000`000000e3 ffff9109`648d3490 ffff9109`52327080 ffff9109`67e31ce0 : nt!KeBugCheckEx
ffff858f`e8f3a8a0 fffff800`7b2631a9 : ffff9109`648d3490 ffffd28f`84c3f010 ffffd28f`8083c930 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x1d183f
ffff858f`e8f3a960 ffffd2d5`c70d9f64 : 00000000`00000000 00000000`00000000 ffffd28f`84c3f010 00000000`00000000 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9
ffff858f`e8f3a9c0 ffffd2d5`c6cb439d : 00000000`00000001 00000000`00000401 00000000`00000000 00000000`00000000 : win32kbase!UserSessionSwitchLeaveCrit+0x74
ffff858f`e8f3aa30 ffffd2d5`c6a7723d : ffff9109`52327080 ffff858f`e8f3ab80 00000000`00000000 ffff858f`e8f3ab80 : win32kfull!NtUserPostMessage+0x15d
ffff858f`e8f3aac0 fffff800`7b4075b8 : 000001c4`bea144b0 00000000`00000000 ffff858f`e8f3ab80 ffff9109`00000000 : win32k!NtUserPostMessage+0x15
ffff858f`e8f3ab00 00007ffe`3ee31224 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000049`af6ff188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3ee31224
SYMBOL_NAME: win32kbase!UserSessionSwitchLeaveCrit+74
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.1140
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 74
FAILURE_BUCKET_ID: 0xE3_win32kbase!UserSessionSwitchLeaveCrit
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f42413ee-5fb5-c6d3-b0eb-f79aa2def38b}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8187f93f83e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8187f93f8338, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3734
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12894
Key : Analysis.Init.CPU.mSec
Value: 531
Key : Analysis.Init.Elapsed.mSec
Value: 19486
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff8187f93f83e0
BUGCHECK_P3: ffff8187f93f8338
BUGCHECK_P4: 0
TRAP_FRAME: ffff8187f93f83e0 -- (.trap 0xffff8187f93f83e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa90b9e317040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8027ba43edf rsp=ffff8187f93f8570 rbp=ffff8187f93f8639
r8=0000000000000000 r9=0000000000000000 r10=ffffc38137f89180
r11=ffffa90b9d4efdd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!KeWaitForMultipleObjects+0x43f:
fffff802`7ba43edf cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff8187f93f8338 -- (.exr 0xffff8187f93f8338)
ExceptionAddress: fffff8027ba43edf (nt!KeWaitForMultipleObjects+0x000000000000043f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff8187`f93f80b8 fffff802`7bc07b69 : 00000000`00000139 00000000`00000003 ffff8187`f93f83e0 ffff8187`f93f8338 : nt!KeBugCheckEx
ffff8187`f93f80c0 fffff802`7bc07f90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8187`f93f8200 fffff802`7bc06323 : ffffc381`37f89180 00000000`00000000 00000000`00000000 00000000`0000003f : nt!KiFastFailDispatch+0xd0
ffff8187`f93f83e0 fffff802`7ba43edf : ffffa90b`a482e080 00000000`00000000 00000000`00040246 fffff802`7ba4a891 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8187`f93f8570 fffff55a`efa6d768 : fffff55a`efc23210 ffff8187`fab6b210 00000000`00000003 fffff523`006da900 : nt!KeWaitForMultipleObjects+0x43f
ffff8187`f93f8680 fffff55a`ef0dbbef : 00000000`00000010 00000000`00000003 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x88
ffff8187`f93f87b0 fffff55a`ef9dd063 : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
ffff8187`f93f8970 fffff55a`ef0b3a30 : ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff8187`f93f8aa0 fffff55a`eee0474d : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff8187`f93f8ad0 fffff802`7bc075b8 : ffffa90b`00000005 00000000`00000005 000001a9`74004140 00000000`00000348 : win32k!NtUserCallNoParam+0x15
ffff8187`f93f8b00 00007ff8`e6a810e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000035`4743fe48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e6a810e4
SYMBOL_NAME: win32kbase!LegacyInputDispatcher::WaitAndDispatch+88
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.1140
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 88
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_win32kbase!LegacyInputDispatcher::WaitAndDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ec713815-b628-d3b4-9812-1937faa1c4d7}
Followup: MachineOwner
---------
Merhaba,
İlk ama ilk olarak BIOS güncellemesi yapın:
B450M-DRAGON|Anakart|ASUS Türkiye
ASUS madencilik anakartları, 19 PCI Express® (PCIe®) yuvasına sahiptir. Yerleşik 18 adet PCIe x1 ve bir adet PCIe x16 yuvası ve ayrıca üç bölgeli ATX12V güç konektörü ile B250 Mining Expert, megahash oranlarınızı en üst düzeye çıkarmak için paralel olarak 19 NVIDIA veya AMD GPU* çalıştırmanıza...www.asus.com
Sorun devam ederse XMP kaaptın ama güncelleme sonrası sorun kalmamalı.
Kod:KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption. could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: fffffc0738ca0740, Address of the trap frame for the exception that caused the bugcheck. Arg3: fffffc0738ca0698, Address of the exception record for the exception that caused the bugcheck. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2218. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 2226. Key : Analysis.Init.CPU.mSec Value: 343. Key : Analysis.Init.Elapsed.mSec Value: 1810. Key : Analysis.Memory.CommitPeak.Mb Value: 71. Key : FailFast.Name Value: CORRUPT_LIST_ENTRY. Key : FailFast.Type Value: 3 Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 139. BUGCHECK_P1: 3 BUGCHECK_P2: fffffc0738ca0740. BUGCHECK_P3: fffffc0738ca0698. BUGCHECK_P4: 0 TRAP_FRAME: fffffc0738ca0740 -- (.trap 0xfffffc0738ca0740) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffb6817d1dcd80 rbx=0000000000000000 rcx=0000000000000003 rdx=ffff94080d032158 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80241a651f3 rsp=fffffc0738ca08d0 rbp=ffffb6817d1d5180 r8=0000000000000000 r9=00000027e0bad18a r10=0000000000000002 r11=fffffc0738ca0968 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po cy. nt!KiCommitThreadWait+0x5c3: fffff802`41a651f3 cd29 int 29h. Resetting default scope. EXCEPTION_RECORD: fffffc0738ca0698 -- (.exr 0xfffffc0738ca0698) ExceptionAddress: fffff80241a651f3 (nt!KiCommitThreadWait+0x00000000000005c3) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001. NumberParameters: 1 Parameter[0]: 0000000000000003. Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: EpicGamesLauncher.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409. EXCEPTION_PARAMETER1: 0000000000000003. EXCEPTION_STR: 0xc0000409. STACK_TEXT: fffffc07`38ca0418 fffff802`41c07b69 : 00000000`00000139 00000000`00000003 fffffc07`38ca0740 fffffc07`38ca0698 : nt!KeBugCheckEx fffffc07`38ca0420 fffff802`41c07f90 : fffff802`3ccfc180 00000000`00000000 ffffb681`7d389180 ffff9408`0d5f9080 : nt!KiBugCheckDispatch+0x69 fffffc07`38ca0560 fffff802`41c06323 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0 fffffc07`38ca0740 fffff802`41a651f3 : ffff9408`00000005 00000000`00000000 fffffc07`38ca09e0 ffffb681`00000000 : nt!KiRaiseSecurityCheckFailure+0x323 fffffc07`38ca08d0 fffff802`41a64623 : ffffb681`00000000 fffff802`00000000 000f8067`b4bbbd00 ffff9408`0d0ca1c0 : nt!KiCommitThreadWait+0x5c3 fffffc07`38ca0970 fffff802`41e2cb01 : ffff9408`0d4ac460 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233 fffffc07`38ca0a60 fffff802`41e2cbaa : ffff9408`0d0ca080 000000fb`f7ecf738 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91 fffffc07`38ca0ac0 fffff802`41c075b8 : 00000256`4eafa020 fffffc07`38ca0b80 fffffc07`38ca0b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a fffffc07`38ca0b00 00007ffe`93c6cc94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000fb`f7ecf708 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`93c6cc94 SYMBOL_NAME: nt!KiCommitThreadWait+5c3 MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.867 STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 5c3. FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {369b7001-cfef-011b-6243-985c04f34d42} Followup: MachineOwner. --------- 3: kd> !sysinfo machineid. Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2134] BiosMajorRelease = 5 BiosMinorRelease = 13. BiosVendor = American Megatrends Inc. BiosVersion = 2202. BiosReleaseDate = 07/14/2020 SystemManufacturer = System manufacturer. SystemProductName = MODART-PC-MA1-V6 SystemFamily = To be filled by O.E.M. SystemVersion = System Version. SystemSKU = SKU. BaseBoardManufacturer = ASUSTeK COMPUTER INC. BaseBoardProduct = B450M-DRAGON BaseBoardVersion = Rev X.0x SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff80152aaf493, Address of the instruction which caused the bugcheck. Arg3: fffff88b41d2b520, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3749. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 3795. Key : Analysis.Init.CPU.mSec Value: 499. Key : Analysis.Init.Elapsed.mSec Value: 26685. Key : Analysis.Memory.CommitPeak.Mb Value: 86. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff80152aaf493. BUGCHECK_P3: fffff88b41d2b520. BUGCHECK_P4: 0 CONTEXT: fffff88b41d2b520 -- (.cxr 0xfffff88b41d2b520) rax=0000000000000000 rbx=ffffc28907ade180 rcx=ffffc28900200200 rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffc28900200100 rip=fffff80152aaf493 rsp=fffff88b41d2bf28 rbp=00000000ff80ffa0 r8=0000000000000000 r9=ffffc28907ade180 r10=0000000000000000 r11=00000000000000ff r12=000000000000002b r13=00000000000000a9 r14=0000000000000020 r15=0000000079737355 iopl=0 nv up ei pl zr na po nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!RtlpHpSegDescriptorValidate+0x13: fffff801`52aaf493 498b4010 mov rax,qword ptr [r8+10h] ds:002b:00000000`00000010=???????????????? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: NVIDIA Share.exe STACK_TEXT: fffff88b`41d2bf28 fffff801`52d8ed19 : 00000000`00000000 ffffb6fb`7b800000 ffffc2e5`03a566d0 00c00020`03883e78 : nt!RtlpHpSegDescriptorValidate+0x13 fffff88b`41d2bf30 fffff801`52d8ec47 : ffffc289`00200100 fffff88b`41d2cb80 ffffc289`07ade180 fffff88b`41d2cb80 : nt!RtlpHpSizeHeapInternal+0x89 fffff88b`41d2bf80 fffff801`52c2d33a : ffffc289`00200100 00000000`11000000 fffff88b`41d2cb80 ffffc289`00000000 : nt!RtlpHpSizeHeap+0x5f fffff88b`41d2bfb0 fffff801`531b1019 : 00000000`00000000 fffff88b`41d2c000 ffffc2e5`03bc57f0 01000000`00100000 : nt!ExFreeHeapPool+0x1e0baa fffff88b`41d2c090 ffffc2e5`03bc5842 : ffffffff`ffffd8f0 ffffc289`05f1e8a0 00000000`00041cff ffff9b06`f40df080 : nt!ExFreePool+0x9 fffff88b`41d2c0c0 ffffc2e5`0388c3e7 : 00000000`00000000 ffffc289`07ade190 ffffc289`07ade190 ffffc289`05f1e8a0 : win32kfull!Win32FreePoolImpl+0x52 fffff88b`41d2c0f0 ffffc2e5`03b92c28 : 00000000`00000000 ffffc289`05f1e8a0 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37 fffff88b`41d2c120 ffffc2e5`04046fcf : fffff88b`41d2caa8 00000000`00000000 0000007f`00000001 fffff88b`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508 fffff88b`41d2ca50 fffff801`52c075b8 : 0000007f`09aff560 00000000`00000108 00000000`00000040 0000007f`09afed60 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f fffff88b`41d2ca90 00007fff`c5efa104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 0000007f`09aff3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`c5efa104 SYMBOL_NAME: nt!ExFreePool+9 IMAGE_NAME: Pool_Corruption. IMAGE_VERSION: 10.0.19041.867 MODULE_NAME: Pool_Corruption. STACK_COMMAND: .cxr 0xfffff88b41d2b520 ; kb. BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064} Followup: Pool_corruption. --------- 3: kd> !error 00000000c0000005. Error code: (NTSTATUS) 0xc0000005 (3221225477) - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s. SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: ffff9f6c11796f16, Address of the instruction which caused the bugcheck. Arg3: fffff884ac89f9f0, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3483. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 6822. Key : Analysis.Init.CPU.mSec Value: 608. Key : Analysis.Init.Elapsed.mSec Value: 24092. Key : Analysis.Memory.CommitPeak.Mb Value: 81. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: ffff9f6c11796f16. BUGCHECK_P3: fffff884ac89f9f0. BUGCHECK_P4: 0 CONTEXT: fffff884ac89f9f0 -- (.cxr 0xfffff884ac89f9f0) rax=ffff9f16466bc1e0 rbx=ffff9f16466bc130 rcx=ffff9f16466bc130 rdx=ffff9f16466bc1e0 rsi=ffff9f1644a51010 rdi=ffff9f1644a511f0 rip=ffff9f6c11796f16 rsp=fffff884ac8a03f0 rbp=fffff884ac8a0b80 r8=ffff9f16466bc1e0 r9=ffffb08d47604dc8 r10=ffffb08d4a29da50 r11=ffff9f16466bc130 r12=0000000000000001 r13=0000000000a200a0 r14=ffff9f1644a51330 r15=0000000000000001 iopl=0 nv up ei ng nz na pe nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282 win32kfull!xxxReadPostMessage+0x356: ffff9f6c`11796f16 418b4d08 mov ecx,dword ptr [r13+8] ds:002b:00000000`00a200a8=???????? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: NVIDIA Share.exe STACK_TEXT: fffff884`ac8a03f0 ffff9f6c`11795465 : ffff9f16`44a51010 fffff884`ac8a09d8 00000000`00000000 00000000`00000000 : win32kfull!xxxReadPostMessage+0x356 fffff884`ac8a04b0 ffff9f6c`11794f48 : fffff884`ac8a09d8 00000000`00000000 00000000`00000000 fffff884`ac8a0aa8 : win32kfull!xxxRealInternalGetMessage+0x4b5 fffff884`ac8a0980 ffff9f6c`123c71ad : ffffb08d`47ef6080 00000093`09a1fa88 fffff884`ac8a0aa8 00000000`00000000 : win32kfull!NtUserPeekMessage+0x158 fffff884`ac8a0a40 fffff807`69e075b8 : 00000093`09a1fb80 00000000`00000108 00000000`00000040 00000093`09a1f380 : win32k!NtUserPeekMessage+0x29 fffff884`ac8a0a90 00007ffb`91901064 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000093`09a1fa68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`91901064 SYMBOL_NAME: win32kfull!xxxReadPostMessage+356 MODULE_NAME: win32kfull. IMAGE_NAME: win32kfull.sys IMAGE_VERSION: 10.0.19041.870 STACK_COMMAND: .cxr 0xfffff884ac89f9f0 ; kb. BUCKET_ID_FUNC_OFFSET: 356. FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!xxxReadPostMessage OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {b95dabba-224b-46a9-b91c-9cc42dc654dd} Followup: MachineOwner. --------- RESOURCE_NOT_OWNED (e3) A thread tried to release a resource it did not own. Arguments: Arg1: ffff9109648d3490, Address of resource. Arg2: ffff910952327080, Address of thread. Arg3: ffff910967e31ce0, Address of owner table if there is one. Arg4: 0000000000000002. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4092. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 27360. Key : Analysis.Init.CPU.mSec Value: 640. Key : Analysis.Init.Elapsed.mSec Value: 21801. Key : Analysis.Memory.CommitPeak.Mb Value: 87. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: e3. BUGCHECK_P1: ffff9109648d3490. BUGCHECK_P2: ffff910952327080. BUGCHECK_P3: ffff910967e31ce0. BUGCHECK_P4: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: NVIDIA Share.exe STACK_TEXT: ffff858f`e8f3a898 fffff800`7b432e6f : 00000000`000000e3 ffff9109`648d3490 ffff9109`52327080 ffff9109`67e31ce0 : nt!KeBugCheckEx ffff858f`e8f3a8a0 fffff800`7b2631a9 : ffff9109`648d3490 ffffd28f`84c3f010 ffffd28f`8083c930 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x1d183f ffff858f`e8f3a960 ffffd2d5`c70d9f64 : 00000000`00000000 00000000`00000000 ffffd28f`84c3f010 00000000`00000000 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9 ffff858f`e8f3a9c0 ffffd2d5`c6cb439d : 00000000`00000001 00000000`00000401 00000000`00000000 00000000`00000000 : win32kbase!UserSessionSwitchLeaveCrit+0x74 ffff858f`e8f3aa30 ffffd2d5`c6a7723d : ffff9109`52327080 ffff858f`e8f3ab80 00000000`00000000 ffff858f`e8f3ab80 : win32kfull!NtUserPostMessage+0x15d ffff858f`e8f3aac0 fffff800`7b4075b8 : 000001c4`bea144b0 00000000`00000000 ffff858f`e8f3ab80 ffff9109`00000000 : win32k!NtUserPostMessage+0x15 ffff858f`e8f3ab00 00007ffe`3ee31224 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000049`af6ff188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3ee31224 SYMBOL_NAME: win32kbase!UserSessionSwitchLeaveCrit+74 MODULE_NAME: win32kbase. IMAGE_NAME: win32kbase.sys IMAGE_VERSION: 10.0.19041.1140 STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 74. FAILURE_BUCKET_ID: 0xE3_win32kbase!UserSessionSwitchLeaveCrit OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {f42413ee-5fb5-c6d3-b0eb-f79aa2def38b} Followup: MachineOwner. --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption. could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: ffff8187f93f83e0, Address of the trap frame for the exception that caused the bugcheck. Arg3: ffff8187f93f8338, Address of the exception record for the exception that caused the bugcheck. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3734. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 12894. Key : Analysis.Init.CPU.mSec Value: 531. Key : Analysis.Init.Elapsed.mSec Value: 19486. Key : Analysis.Memory.CommitPeak.Mb Value: 86. Key : FailFast.Name Value: CORRUPT_LIST_ENTRY. Key : FailFast.Type Value: 3 Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 139. BUGCHECK_P1: 3 BUGCHECK_P2: ffff8187f93f83e0. BUGCHECK_P3: ffff8187f93f8338. BUGCHECK_P4: 0 TRAP_FRAME: ffff8187f93f83e0 -- (.trap 0xffff8187f93f83e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000003 rdx=ffffa90b9e317040 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8027ba43edf rsp=ffff8187f93f8570 rbp=ffff8187f93f8639 r8=0000000000000000 r9=0000000000000000 r10=ffffc38137f89180 r11=ffffa90b9d4efdd0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac pe nc. nt!KeWaitForMultipleObjects+0x43f: fffff802`7ba43edf cd29 int 29h. Resetting default scope. EXCEPTION_RECORD: ffff8187f93f8338 -- (.exr 0xffff8187f93f8338) ExceptionAddress: fffff8027ba43edf (nt!KeWaitForMultipleObjects+0x000000000000043f) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001. NumberParameters: 1 Parameter[0]: 0000000000000003. Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: csrss.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409. EXCEPTION_PARAMETER1: 0000000000000003. EXCEPTION_STR: 0xc0000409. STACK_TEXT: ffff8187`f93f80b8 fffff802`7bc07b69 : 00000000`00000139 00000000`00000003 ffff8187`f93f83e0 ffff8187`f93f8338 : nt!KeBugCheckEx ffff8187`f93f80c0 fffff802`7bc07f90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffff8187`f93f8200 fffff802`7bc06323 : ffffc381`37f89180 00000000`00000000 00000000`00000000 00000000`0000003f : nt!KiFastFailDispatch+0xd0 ffff8187`f93f83e0 fffff802`7ba43edf : ffffa90b`a482e080 00000000`00000000 00000000`00040246 fffff802`7ba4a891 : nt!KiRaiseSecurityCheckFailure+0x323 ffff8187`f93f8570 fffff55a`efa6d768 : fffff55a`efc23210 ffff8187`fab6b210 00000000`00000003 fffff523`006da900 : nt!KeWaitForMultipleObjects+0x43f ffff8187`f93f8680 fffff55a`ef0dbbef : 00000000`00000010 00000000`00000003 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x88 ffff8187`f93f87b0 fffff55a`ef9dd063 : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf ffff8187`f93f8970 fffff55a`ef0b3a30 : ffffa90b`9e2b0080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3 ffff8187`f93f8aa0 fffff55a`eee0474d : ffffa90b`9e2b0080 ffffa90b`9e2b0080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70 ffff8187`f93f8ad0 fffff802`7bc075b8 : ffffa90b`00000005 00000000`00000005 000001a9`74004140 00000000`00000348 : win32k!NtUserCallNoParam+0x15 ffff8187`f93f8b00 00007ff8`e6a810e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000035`4743fe48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e6a810e4 SYMBOL_NAME: win32kbase!LegacyInputDispatcher::WaitAndDispatch+88 MODULE_NAME: win32kbase. IMAGE_NAME: win32kbase.sys IMAGE_VERSION: 10.0.19041.1140 STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 88. FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_win32kbase!LegacyInputDispatcher::WaitAndDispatch OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {ec713815-b628-d3b4-9812-1937faa1c4d7} Followup: MachineOwner. ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.