IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00007ffccb85f8ec, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8078065bc44, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32kbase.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16186
Key : Analysis.Init.CPU.mSec
Value: 702
Key : Analysis.Init.Elapsed.mSec
Value: 15515
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: a
BUGCHECK_P1: 7ffccb85f8ec
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8078065bc44
WRITE_ADDRESS: fffff80781105450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00007ffccb85f8ec
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
TRAP_FRAME: ffffbf8ac1341730 -- (.trap 0xffffbf8ac1341730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8e004aee9180
rdx=ffffbf8ac13418f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8078065bc44 rsp=ffffbf8ac13418c0 rbp=ffffbf8ac1341940
r8=8000002010000000 r9=ffffbf8ac1341a80 r10=0000000000000000
r11=ffff7df8b1a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExpAcquireResourceSharedLite+0xc4:
fffff807`8065bc44 488717 xchg rdx,qword ptr [rdi] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffbf8a`c13415e8 fffff807`808256a9 : 00000000`0000000a 00007ffc`cb85f8ec 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffbf8a`c13415f0 fffff807`80821800 : ffffbf8a`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffbf8a`c1341730 fffff807`8065bc44 : 00000000`00000000 ffff80aa`4e897f9b 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x440
ffffbf8a`c13418c0 fffff807`8072eba8 : 00007ffc`cb85f88c 00000031`adffd000 00000000`00000000 ffffe50f`3fff9f70 : nt!ExpAcquireResourceSharedLite+0xc4
ffffbf8a`c1341970 ffff80aa`4e81a17b : 00000000`00000000 00000000`00010001 ffffe50f`41ffa230 ffff80aa`4e87e594 : nt!ExEnterCriticalRegionAndAcquireResourceShared+0x38
ffffbf8a`c13419b0 00000000`00000000 : 00000000`00010001 ffffe50f`41ffa230 ffff80aa`4e87e594 00000000`00000000 : win32kbase+0x1a17b
SYMBOL_NAME: win32kbase+1a17b
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a17b
FAILURE_BUCKET_ID: AV_win32kbase!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1ab6e7a2-65bd-b9f3-ea94-1ade7965c39c}
Followup: MachineOwner
---------
KERNEL_THREAD_PRIORITY_FLOOR_VIOLATION (157)
An illegal operation was attempted on the priority floor of a particular
thread.
Arguments:
Arg1: ffffe68bc69bb080, The address of the thread
Arg2: 0000000000000003, The target priority value
Arg3: 0000000000000002, The priority counter for the target priority underflowed
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3514
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12181
Key : Analysis.Init.CPU.mSec
Value: 749
Key : Analysis.Init.Elapsed.mSec
Value: 14538
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 157
BUGCHECK_P1: ffffe68bc69bb080
BUGCHECK_P2: 3
BUGCHECK_P3: 2
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
STACK_TEXT:
ffffd584`1b7db348 fffff800`104be539 : 00000000`00000157 ffffe68b`c69bb080 00000000`00000003 00000000`00000002 : nt!KeBugCheckEx
ffffd584`1b7db350 fffff800`10338365 : 00000000`1e977d04 ffffe68b`c77da6c0 ffffe68b`00000002 ffffe68b`00000000 : nt!KiAbThreadUnboostCpuPriority+0x1861a1
ffffd584`1b7db3e0 fffff800`102588d6 : ffffe68b`c77da6c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiAbThreadRemoveBoostsSlow+0x3d
ffffd584`1b7db410 fffff800`1069911a : ffffe68b`c77da6b0 ffffe68b`b5ec7140 00000000`00000001 00000000`00000001 : nt!ExReleasePushLockEx+0x156
ffffd584`1b7db450 fffff800`106981e6 : fffff800`1032f0e0 fffff800`10328868 00000000`00000000 00000000`00000000 : nt!ObpIncrementHandleCountEx+0x23a
ffffd584`1b7db560 fffff800`1069377c : 00000000`6e657645 ffffe68b`b6010380 00000000`00000080 ffffd584`1b7db851 : nt!ObpCreateHandle+0x226
ffffd584`1b7db750 fffff800`1072d521 : 00000000`00000000 ffffd584`1b7dbb60 00000000`00000001 00000000`00000000 : nt!ObInsertObjectEx+0x48c
ffffd584`1b7dba00 fffff800`10425078 : ffffe68b`c69bb080 00000000`0e83e608 ffffd584`1b7dba88 00000000`00000000 : nt!NtCreateEvent+0xe1
ffffd584`1b7dba70 00007ffb`c8fa3bd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0e83e5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`c8fa3bd4
SYMBOL_NAME: nt!KiAbThreadUnboostCpuPriority+1861a1
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.194
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1861a1
FAILURE_BUCKET_ID: 0x157_nt!KiAbThreadUnboostCpuPriority
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {03e733ff-5f32-e77d-52c7-8d68e2c27280}
Followup: MachineOwner
---------
MODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8011aadcedd, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3077
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9321
Key : Analysis.Init.CPU.mSec
Value: 812
Key : Analysis.Init.Elapsed.mSec
Value: 18398
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8011aadcedd
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff8011b505450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffe600`e1d030f8 fffff801`1ad491fa : 00000000`0000001e ffffffff`c0000005 fffff801`1aadcedd 00000000`00000000 : nt!KeBugCheckEx
ffffe600`e1d03100 fffff801`1ac1c312 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe600`e1d031e0 : nt!HvlpVtlCallExceptionHandler+0x22
ffffe600`e1d03140 fffff801`1ab030e7 : ffffe600`e1d036e0 fffff801`1ac16abe ffffaa02`be245990 ffffe600`e1d031e0 : nt!RtlpExecuteHandlerForException+0x12
ffffe600`e1d03170 fffff801`1ab07031 : ffffffff`ffffffff ffffaa02`be245620 ffffaa02`be245620 ffffe600`e1d03900 : nt!RtlDispatchException+0x2d7
ffffe600`e1d038d0 fffff801`1ac13a82 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b1
ffffe600`e1d03fb0 fffff801`1ac13a50 : fffff801`1ac257c7 00000000`00000000 00000000`00000001 ffffaa02`be2455a0 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffaa02`be245438 fffff801`1ac257c7 : 00000000`00000000 00000000`00000001 ffffaa02`be2455a0 fffff801`1aae584a : nt!KiExceptionDispatchOnExceptionStackContinue
ffffaa02`be245440 fffff801`1ac2138f : ffffffff`be000001 00000001`00000003 00000007`00000000 00000000`ffffffff : nt!KiExceptionDispatch+0x107
ffffaa02`be245620 fffff801`1aadcedd : ffff950d`1ff3f188 00000000`00000000 ffff950d`1ff3f250 ffff950d`1ff3f180 : nt!KiGeneralProtectionFault+0x30f
ffffaa02`be2457b0 fffff801`1aadcb4a : ffff950d`1ff3f180 00000000`00000058 ffffaa02`be245af8 00000000`00000000 : nt!KiTimerWaitTest+0xad
ffffaa02`be245860 fffff801`1aadb566 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000101cd : nt!KiProcessExpiredTimerList+0xda
ffffaa02`be245990 fffff801`1ac16abe : 00000000`00000000 ffffe600`e1c91180 ffffe600`e1c9d1c0 ffff950d`1016f080 : nt!KiRetireDpcList+0xa16
ffffaa02`be245c40 00000000`00000000 : ffffaa02`be246000 ffffaa02`be240000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiTimerWaitTest+ad
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.194
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: ad
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KiTimerWaitTest
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {60392e1e-177d-1e45-9fd7-b743dcff84fd}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff80276305330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for afd.sys
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6515
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 25068
Key : Analysis.Init.CPU.mSec
Value: 780
Key : Analysis.Init.Elapsed.mSec
Value: 15496
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff80276305330
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: ffffd08c03c4b0e0 -- (.trap 0xffffd08c03c4b0e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd08c03c4b2a8 rbx=0000000000000000 rcx=fffff8027621be40
rdx=00000443fba8aa02 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8027594c9c0 rsp=ffffd08c03c4b270 rbp=00000443fba7aadc
r8=0000000000100000 r9=ffffd08c03c4b318 r10=0000000000010000
r11=00000443fba7aadc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!PspUnlockQuotaExpansion+0x1c:
fffff802`7594c9c0 488d7910 lea rdi,[rcx+10h]
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
DPC_STACK_BASE: FFFFD08C03C4CFB0
STACK_TEXT:
ffffd381`542fcdd8 fffff802`758ebf0e : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffffd381`542fcde0 fffff802`758eb991 : 000002ac`9d416507 fffff802`00000500 00000000`00000002 fffff802`758e71ee : nt!KeAccumulateTicks+0x39e
ffffd381`542fce50 fffff802`758e9b7a : ffffd381`5429a200 ffffd08c`03c4b0e0 ffffd381`5429a388 00000000`00000278 : nt!KiUpdateRunTime+0x61
ffffd381`542fceb0 fffff802`758e9966 : ffff800f`f1f24d40 ffff800f`f1f24df0 ffff800f`00000000 ffffd381`542fcfc0 : nt!KeClockInterruptNotify+0x11a
ffffd381`542fcf40 fffff802`7590dc40 : 00000000`00000010 fffff4f8`b4f9ffc5 fffff802`7621be50 fffff802`75a1451b : nt!HalpTimerClockIpiRoutine+0x16
ffffd381`542fcf70 fffff802`75a1477a : ffffd08c`03c4b160 ffff800f`f1f24d40 000002ac`947ff6a3 ffff800f`f6a840c0 : nt!KiCallInterruptServiceRoutine+0xa0
ffffd381`542fcfb0 fffff802`75a14d47 : 00000000`000008ac 00000000`00010000 00000443`ed34aadc 00000000`00100000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffd08c`03c4b0e0 fffff802`7594c9c0 : 00000000`000008ac fffff802`75911d93 fffff802`7621be40 ffffd08c`03c4b310 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffd08c`03c4b270 fffff802`7594c966 : 00000443`fba8aadc 00000443`fba7aadc fffff802`7621be40 00000000`000008ac : nt!PspUnlockQuotaExpansion+0x1c
ffffd08c`03c4b2b0 fffff802`758a87f7 : 00000000`00000002 00000443`fba8aadc ffff800f`f6a840c0 fffff802`86ed4fd1 : nt!PspExpandQuota+0x8e
ffffd08c`03c4b310 fffff802`86ecd599 : 00000443`fba7aadc ffff8001`04bb8840 ffff800f`fbed30c0 00000000`00000000 : nt!PsChargeProcessPoolQuota+0x187
ffffd08c`03c4b370 00000443`fba7aadc : ffff8001`04bb8840 ffff800f`fbed30c0 00000000`00000000 00000000`00000546 : afd+0xd599
ffffd08c`03c4b378 ffff8001`04bb8840 : ffff800f`fbed30c0 00000000`00000000 00000000`00000546 ffffd08c`03c4b400 : 0x00000443`fba7aadc
ffffd08c`03c4b380 ffff800f`fbed30c0 : 00000000`00000000 00000000`00000546 ffffd08c`03c4b400 00000000`00000000 : 0xffff8001`04bb8840
ffffd08c`03c4b388 00000000`00000000 : 00000000`00000546 ffffd08c`03c4b400 00000000`00000000 fffff802`7b714376 : 0xffff800f`fbed30c0
SYMBOL_NAME: afd+d599
MODULE_NAME: afd
IMAGE_NAME: afd.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d599
FAILURE_BUCKET_ID: 0x133_DPC_afd!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {52a6610d-5b73-cb8a-6c15-cffe25f12e18}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffbd81eba766c0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffbd81eba76618, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 14106
Key : Analysis.Init.CPU.mSec
Value: 796
Key : Analysis.Init.Elapsed.mSec
Value: 13795
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffbd81eba766c0
BUGCHECK_P3: ffffbd81eba76618
BUGCHECK_P4: 0
TRAP_FRAME: ffffbd81eba766c0 -- (.trap 0xffffbd81eba766c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffad8c64f6a158 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80150440c3a rsp=ffffbd81eba76850 rbp=ffffbd81eba768d9
r8=0000000000000000 r9=0000000000000001 r10=ffffbd81eba76706
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!KiDeferredReadySingleThread+0x162e9a:
fffff801`50440c3a cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffbd81eba76618 -- (.exr 0xffffbd81eba76618)
ExceptionAddress: fffff80150440c3a (nt!KiDeferredReadySingleThread+0x0000000000162e9a)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: DeadByDaylight
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffbd81`eba76398 fffff801`504256a9 : 00000000`00000139 00000000`00000003 ffffbd81`eba766c0 ffffbd81`eba76618 : nt!KeBugCheckEx
ffffbd81`eba763a0 fffff801`50425af2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffbd81`eba764e0 fffff801`50423dd2 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`5044d1c2 : nt!KiFastFailDispatch+0xb2
ffffbd81`eba766c0 fffff801`50440c3a : 00000000`00000000 ffffad8c`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x312
ffffbd81`eba76850 fffff801`5025b397 : ffff9b80`bbce9180 ffff9b80`bbe9a000 ffffbd81`eba769f0 00000000`00000000 : nt!KiDeferredReadySingleThread+0x162e9a
ffffbd81`eba76940 fffff801`5028ca35 : 00000000`00000000 ffffad8c`00000000 ffffffff`00000001 00000000`00000001 : nt!KiExitDispatcher+0x167
ffffbd81`eba769f0 fffff801`506b37cb : 00000000`00000000 00000000`00000000 ffffbd81`eba76b60 ffffad8c`615448e0 : nt!KeReleaseSemaphore+0xa5
ffffbd81`eba76a80 fffff801`50425078 : ffffad8c`6143e080 00000000`ffffffff 00000000`00000000 00000000`00000001 : nt!NtReleaseSemaphore+0x9b
ffffbd81`eba76ae0 00007ffd`26203414 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000009f`c14df868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`26203414
SYMBOL_NAME: nt!KiFastFailDispatch+b2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.194
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b2
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------